Home

Symantec Norton Internet Security 2013

image

Contents

1.
2. Responding to Worm Blocking alerts If a program tries to email itself or a copy of itself it could be a worm trying to spread through email A worm can send itself or send a copy of itself in an email message without any interaction with you Worm Blocking continually scans outgoing email attachments for worms If it detects a worm you receive an alert notifying you that a malicious worm was found Worm Blocking alert appears only when you enable the Ask me what to do option under How to respond when an outbound threat is found in the Email Antivirus Scan window If the Ask me what to do option is disabled Norton Internet Security automatically quarantines the detected worm and notifies you The alert presents you with options and asks you what to do If you do not send an email message at that time then it is probably a worm and you should quarantine the file Responding to security issues 207 What to do if a security risk is found To respond to Worm Blocking alerts Inthe alert window select the action that you want to take Your options are Permanently stops the worm by putting it in Security History While in Security History the worm is unable to spread This Quarantine is the safest action Sends the email message for which you have received the worm blocking alert If you allow the email message it could infect the recipient s computer Select this option if you are sure that the email is no
3. 416 Monitoring protection features About Security History The various features of Identity Safe help you manage your identities and provide additional security while you perform online transactions The Identity view in the Security History window displays the Antiphishing definitions that Norton Internet Security downloads when you run LiveUpdate to obtain the latest virus definitions Norton Product Tamper Protection lets you protect your Norton product from any attack or modification by unknown suspicious or malicious applications The Norton Product Tamper Protection view in the Security History window displays details about unauthorized attempts to modify Symantec processes The tasks that your Symantec product blocks also appear in the list Moni Performance Alert Network Cost Awareness oring protection features 417 About Security History The performance alert feature lets you view monitor and analyze the impact of the system activities on your computer The Performance Alert view in the Security History window provides details about the impact of the processes that run on your computer The details include the process name the resources used the extent of resource utilization and the overall impact of the process on your computer In addition logs related to performance alerts and the programs that you have excluded from performance
4. Save all open files and then click Go If you do not respond to this dialog box it closes automatically without resolving and closing the suspected security risk This chapter includes the following topics About the Smart Firewall About Download Insight About Intrusion Prevention About Vulnerability Protection About the types of security risks About Norton AntiSpam About configuring POP3 and SMTP ports About the Network Security Map About Network Cost Awareness About the Smart Firewall The Smart Firewall monitors the communications between your computer and other computers on the 212 Protecting Internet activities About the Smart Firewall Internet It also protects your computer from such common security problems as the following Warns you of connection attempts from other computers and of attempts by programs on your computer to connect to other computers Cloaks the inactive ports on your computer thereby providing protection against attacks through hacking techniques such as port scanning Monitors the network traffic to or from your computer for suspicious behavior and stops any attack before they threaten your system A firewall blocks hackers and other unauthorized traffic while it allows authorized traffic to pass Turning off Smart Firewall reduces your system protection Always ensure that the Smart Firewall is turned on Turning off or turning on Smart F
5. The security risks include the suspicious programs that can compromise the security of your computer The Resolved Security Risks view in the Security History window displays a list of security risks that Norton Internet Security has detected and then repaired quarantined or removed The quarantined items are listed in the Quarantine view You can also view the quarantined items in the Quarantine view The security risks include the suspicious programs that can compromise the security of your computer The Unresolved Security Risks view in the Security History window displays a list of security risks that Norton Internet Security was not able to repair remove or quarantine Certain threats require system restart Logs for such threats can be cleared only after you restart your system 411 412 Monitoring protection features About Security History Quarantine SONAR Activity The Security History Quarantine provides a safe location on your computer where you can isolate items while you decide an action to take on them The Quarantine view in the Security History window displays all of the security risks that are isolated in the Security History Quarantine Symantec Online Network for Advanced Response SONAR identifies new threats based on the suspicious behavior of applications SONAR detects and protects your computer against malicious code even before virus definitions are av
6. To turn off a security protection feature 1 Inthe Norton Internet Security main window click Settings 456 Customizing protection features About turning off automatic features In the Settings window click the Network tab In the left pane click Intrusion Prevention In the Intrusion Prevention row move the On Off switch to the right to the Off position In the left pane click Smart Firewall In the Smart Firewall row move the On Off switch to the right to the Off position You may need to scroll the window to see the option In the Settings window click Apply In the Select the duration drop down list select the amount of time that the security protection feature should be turned off and then click OK To ensure that your computer remains protected you can turn on security protection features manually before the specified time frame concludes To turn on a security protection feature 1 In the Norton Internet Security main window click Settings In the Settings window click the Network tab In the left pane click Intrusion Prevention In the Intrusion Prevention row move the On Off switch to the left to the On position In the left pane click Smart Firewall In the Smart Firewall row move the On Off switch to the left to the On position In the Settings window click Apply Turning off or turning on Web settings Web settings features are automatically turned on when you install Norton I
7. 9 Inthe Confirmation dialog box click Yes 10 When you are done removing rules click OK 11 In the Program Control window click OK 12 Click OK About Smart Firewall settings The Smart Firewall options let you customize how the firewall monitors and responds to inbound communications and outbound communications You can change the Smart Firewall settings only if you have the administrator permissions You can set the following Smart Firewall options Control settings of the advanced protection features of Smart Firewall Control settings for the programs that access the Internet View the networks that your computer is connected to and add the networks and computers to the Trusted list or the Restricted list Protecting Internet activities 239 About the Smart Firewall Lets you configure how Norton Internet Security must control the network communications to and from your computer For instance you may have to be away from your system for a very long time During this period you want to secure your system by not allowing it to communicate with the other computers on the network In such cases you can use the Block All Network Traffic option to block all the communications to and from your computer About Smart Firewall Program Control settings Smart Firewall Program Control settings let you control options for the programs that access the Internet In the list of programs you can m
8. To access the Identity Safe settings from the Norton menu 1 Start your Web browser Securing your sensitive data 397 About securing your sensitive data 2 On the Norton Toolbar in the Norton menu select one of the following Lets you report to Symantec about the current Antiphishing evaluation Lets you minimize the Norton Toolbar When you check this option the Identity Safe phrase and the Safe Web phrase disappear and only the Identity Safe and Safe Web indicators remain In addition the size of the Norton Safe Search box is reduced amp The Minimize Toolbar option appears only in the Internet Explorer browser Lets you open the Web tab in the Norton Internet Security Settings window Lets you open the Norton Safe Web site http www safeweb norton com 398 Securing your sensitive data About securing your sensitive data Lets you turn on the Norton Safe Web feature which provides a safe online browsing experience The following are the unique features of Norton Safe Web Displays the site safety rating icons next to the search results Displays the site safety rating icons when you are on a Web site Lets you view the Norton Safe Search box You can type a search string in the Norton Safe Search box and perform a search The search box displays relevant search suggestions in a pop up window By default the Norton Safe Search box is enabled If you want to disable
9. 1 Inthe Norton Internet Security main window click Advanced 2 Under Network Protection click Network Security Map 3 Inthe Network Security Map window in the network map click the computer for which you want to disable Remote Monitoring 4 Inthe device details area next to Remote Monitoring click Disable 5 Inthe confirmation dialog box click Yes Adding a device to the Network Security Map You can manually add a computer or device to the Network Security Map You can add the following details when you add a device The name or description The IP address or physical address The Network Security Map finds any computers that are connected to your network However you can add the computers and the devices that are currently not connected Norton Internet Security adds to the Trust Control network all the devices that you manually add to Network Security Map You can select the Trust Control network in the Network Details drop down list to view the devices that you added You can also edit the name of the device db You cannot edit the Trust Control network details 312 Protecting Internet activities About the Network Security Map The default trust level of the devices that you add to the Network Security Map is Protected However you can change the trust level of the devices If you trust a device that is not on your network you can expose your computer to potential security risks To add a dev
10. 57 About Norton Bootable Recovery Tool Norton Bootable Recovery Tool automatically downloads the latest virus definitions from Symantec servers and uses these virus definitions to secure your computer from all types of viruses and latest security threats If Dynamic Host Configuration Protocol DHCP is enabled virus definitions are automatically updated when your computer is connected to the Internet Therefore you must use an Ethernet connection to update the virus definitions in Norton Bootable Recovery Tool You cannot update the Norton Bootable Recovery Tool virus definitions by using a wireless network connection If the virus definitions are out of date Norton Bootable Recovery Tool may not detect and remove all the latest security threats from your computer To use Norton Bootable Recovery Tool you must use the product key of the Norton product that you purchased If you use a trial version of Norton Internet Security you need to create a Norton Account to receive a product key to use Norton Bootable Recovery Tool To use the Norton Bootable Recovery Tool 1 Insert the Norton Bootable Recovery Tool recovery media 2 Turn on or Restart your computer and enter to the BIOS mode You can enter the BIOS mode by pressing the key that is displayed immediately after your system is turned on 3 Select the recovery media on which you have created the Norton Bootable Recovery Tool and then press Enter If you are using UEFI
11. Age Indicates the age of the file based on the data that millions of Norton Community Watch customers shared and Symantec s research analysis Protecting Internet activities 261 About the Smart Firewall Trust Level Shows the trust level of the file Symantec assigns the following trust levels Norton Trusted Indicates the file that is Norton Trusted Good Symantec has high indications that the file is trusted Unproven Symantec does not have enough information about the file to assign a trust level to the file The file is neither safe nor unsafe Poor Symantec has only a few indications that the file is not trusted Bad Symantec has very high indications that the file is not trusted This file is suspicious and can harm your computer If the Security Alert window displays Poor or Bad reputation Symantec recommends that you select the Terminate or Block Always option from the Options drop down list This action terminates or blocks all access attempts by the program or process This program or process is suspicious and can harm your computer About Download Insight 262 Protecting Internet activities About Download Insight Download Insight provides information about the reputation of any executable file that you download from the supported portals The reputation details indicate whether the downloaded file is safe to install You can use these details to decide th
12. Customizing protection features About customizing settings and options Message Protection Customizing protection features 477 About customizing settings and options Message Protection protects your computer against the threats that you may receive through email attachments You can use the Email Antivirus Scan option the AntiSpam option and the Protected Ports Settings option to configure your email program for protection against viruses and other security threats Email Antivirus Scan protects you from the threats that are sent or received in email attachments You can use the Email Antivirus Scan options to define how Norton Internet Security should behave when it scans email messages Based on the options you choose Norton Internet Security automatically scans the email messages that you send or receive Norton AntiSpam lets you categorize the email messages that you receive into spam email and legitimate email You can use the following AntiSpam options to do the following t Specify the addresses in your address book that Norton Internet Security must not add to the Allowed List Specify the addresses or domains from which you want to receive or block email Select the email programs in 478 Customizing protection features About customizing settings and options your computer with which you want to integrate Norton AntiSpam Send feedback about any misclassified email message to
13. Updates provides the following options Automatic LiveUpdate Pulse Updates Smart Definitions Apply update on reboot 3 Inthe Settings window click the Network tab 4 Inthe Intrusion Prevention section in the Intrusion Prevention row move the On Off switch to the left to the On position 128 Protecting your files and data About the Norton Internet Security scans 5 Inthe Smart Firewall section in the Smart Firewall row move the On Off switch to the left to the On position 6 Inthe Message Protection section move the On Off switch to the left to the On position click Configure and check all options for the following features Email Antivirus Scan provides the following options Scan incoming email messages Scan outgoing email messages Scan outgoing messages for suspected worms Protect against timeouts Display progress indicator You should configure any new instant messenger programs that you installed after you installed Norton Internet Security Select the instant messenger clients that you want to protect 7 Inthe Settings window click the General tab 8 Inthe left pane click Other Settings 9 Inthe Insight Protection row move the On Off switch to the left to the On position 10 Click Apply and then click OK About the Norton Internet Security scans Norton Internet Security scans secure your computer from all types of viruses and unknown threats using the latest virus d
14. You can view the file name and the URL of the source from where the file was downloaded The lineage details of a file are available only if you downloaded or created the file after you installed Norton Internet Security cd Ifthe historical details of a file are not available Norton Internet Security disables this Origin section Monitoring protection features 431 About Security History Provides the details about the suspicious actions performed by the file on your computer It also provides information about the resource usage of a process and the effect of the process on the overall CPU utilization of your computer Based on the severity of the security risks and the risk type Norton Internet Security might display one or more of the following options in the File Insight window Locate Lets you locate the file on your computer This option is available at the top of the window Copy to Clipboard Lets you copy the data from the File Insight window to the clipboard After you copy the content to the Clipboard you can open a document paste the data and save the document 432 Monitoring protection features About Security History Restore Let you return the security risk that is quarantined to the original location on your computer Returns the selected Quarantine item to its original location without repairing it and excludes the item from being detected in the future scans If you
15. editing details 314 Index 537 device continued excluding from Intrusion Prevention scan 320 purging from exclusion list 278 remotely monitoring 303 removing from the Network Security Map 322 viewing 303 devices changing trust level 316 domains adding allowed 289 adding blocked 291 Download Insight about 262 configuring alerts 268 turning off notifications 266 turning on notifications 266 Download Intelligence turning off 265 turning on 265 E email menu 293 program 293 spam 284 emergency preparations 125 ensuring protection settings 126 EULA checking 516 Events graph monitoring activities 83 F features 443 email filtering 449 security protection 448 538 Index features continued security risk protection 447 Feedback Norton AntiSpam 295 file extensions of infected files 208 filter importing allowed 289 Web Query 296 filtering email 285 identifying email senders 289 291 SSL 284 web based 296 firewall rules about 214 adding 224 changing the order of 235 creating 217 225 default 215 modifying 233 processing order 214 235 removing 237 turning on and off 236 Full Screen Detection about 182 Full System Scan running Full System Scan 136 scheduling 148 G General Rules adding 224 changing 233 removing 237 turning on and off 236 H high risk security threats excluding from scanning 177 Identity Safe about 344 accessing 357 396 backing up 382 changing password
16. 4 Under Download Intelligence in the Download Insight Notifications row do one of the following To receive Download Insight notifications only for the infected or the suspicious executable files that you download move the Download Insight Notifications switch to the right to the Risks Only position To receive Download Insight notifications for all files that you download move the Download Insight Notifications switch to the left to the On position 5 Inthe Settings window click Apply and then click OK 268 Protecting Internet activities About Download Insight Configuring the Show Report on Launch of Files option The Show Report on Launch of Files option lets you specify when and for what type of file you want to be prompted to select a suitable action For example you can specify the type of downloaded files for which Download Insight asks you to decide what to do with the file and how frequently these prompts for a suitable action must appear You can use the following options to configure Show Report on Launch of Files When you set the Show Report on Launch of Files option to Always Download Insight prompts you for a suitable action in case of safe and unknown files In this case the Download Insight window appears whenever you try to launch any downloaded file that has a safe or an unknown reputation score In this window you can view details about the file and the options that let you sel
17. At the end of a scan the Threats Detected window provides you different ways to resolve any items that were not automatically resolved during the scan The Threats Detected window provides the information such as the severity of the risk the name of the risk and the status of the risk It also provides the action that you can take to resolve the item The Threats Detected window provides you the different options such as Fix Manual Fix Exclude Get Help and Rescan to resolve the item It also provides the Ignore option only once during the first time detection of low risk items Ignore option is available once until you do not change the default settings for the Low Risks option under Computer Scan The options in the Threats Detected window vary based on the types of files that Norton Internet Security identified as infected during the scan Protecting your files and data 141 About the Norton Internet Security scans About custom scans You can create a custom scan if you regularly scan a particular segment of your computer This custom scan lets you scan the segment frequently without having to specify it every time You can also schedule the custom scan to run automatically on specific dates and times or at periodic intervals You can schedule a scan according to your preferences If the scheduled scan begins when you use your computer you can run the scan in the background instead of stopping your work You can delet
18. If any of the filtered files is suspicious or vulnerable Norton Internet Security assigns Bad or Poor trust level Apart from reputation information Norton Internet Security also checks for the latest virus definitions on the Cloud Your computer must be connected to the Internet to access the latest reputation information and virus definitions from the Cloud If your computer is not connected to the Internet Norton Internet Security uses the reputation information that is available locally When you perform a Reputation Scan Norton Internet Security considers only the following categories of files Executable files This category includes Windows executable files exe and script files scr Protecting your files and data 157 About the Norton Internet Security scans System files This category includes Windows System files sys dynamic link library files dll and device driver files drv Developer files This category includes ActiveX control files ocx Miscellaneous files This category includes Windows Installer Package files msi and resource only DLL files loc Norton Internet Security lets you scan specific areas of your computer based on the type of Reputation Scan that you select You can manually run the following types of Reputation Scan Quick Scan Scans the important locations of your computer that the viruses and other security threats often target When you perform a Quick Scan Nor
19. Limited Warranty Symantec warrants that any media manufactured by Symantec on which the Software is distributed will be free from defects for a period of sixty 60 days from the date of delivery of the Software to You Your sole remedy in the event of a breach of this warranty will be that Symantec will at its option replace any defective media returned to Symantec within the warranty period or refund the money You paid for the Software Symantec does not warrant that the Software will meet Your requirements or that operation of the Software will be uninterrupted or that the Software will be error free For the avoidance of doubt references to Software in the foregoing sentence shall include but not be limited to the Online Backup Feature and Technical Support TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALLOTHER WARRANTIES WHETHER EXPRESS OR IMPLIED INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE AND NON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS YOU MAY HAVEOTHERRIGHTS WHICH VARY FROM STATE TO STATE AND COUNTRY TO COUNTRY 8 Disclaimer of Damages SOME STATES AND COUNTRIES DO NOT ALLOW THELIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES SO THE BELOW LIMITATION OREXCLUSION MAY NOT APPLY TO YOU TO THE MAXIMUM EXTENT PERMITTED BY APPL
20. Norton Internet Security adds the security risk to the appropriate exclusions list Lets you resolve the risk using a manual fix tool If you resolve a threat manually you must remove the threat information from the Security History window Removes the security risk from your computer and quarantines it This option is available for the security risks that require your attention Responding to security issues 205 What to do if a security risk is found Removes the selected security risk from the computer and quarantines it This option is available for the security risks that require your attention for manual removal This option is also available for the security risks that are manually quarantined Removes the selected security risk item from the Security History log Takes you to the Symantec Security Response Web site This option is available for the security risks that require your attention for manual removal You can refer the Symantec Security Response Web site for manual removal instructions or other information about the risk 206 Responding to security issues What to do if a security risk is found Sends the security risk to Symantec In some cases Norton Internet Security might not identify an item as a security threat but you might suspect that the item is infected In such cases you can use this option to submit the item to Symantec for further analysis
21. The Symantec server stores the hash value and confidence level details of the Files of Interest The server provides the details immediately after you open the Norton Insight Application Ratings window Even the slightest modification of the file causes a change in the hash value and the confidence level of the file Typically most Files of Interest belong to the operating system or known applications and they never change These files do not require repeated scanning or monitoring For example Excel exe is a file that never changes but you always scan it during a normal security scan 114 Monitoring your system s performance About System Insight Symantec assigns the following confidence levels to Files of Interest Symantec analyzes the file as trusted based on the statistical evaluation that is done on the files that are available within the Norton Community If the file has three green bars Symantec rates the file as Norton Trusted The files that have three green bars display a Norton Trusted pop up text when you move the mouse pointer over the green bars Symantec analyzes the file as good based on the statistical evaluation that is done on the files that are available within the Norton Community Symantec rates the trusted files as follows If the file has two green bars Symantec rates the file as Good If the file has one green bar Symantec rates the file as Favorable Symantec
22. When Silent Mode is enabled Norton Internet Security suppresses most of the alerts and suspends background activities Only those activities run that are involved in protecting your computer from viruses and other security threats Minimum background activities also ensure high performance of your computer The activities that are suspended run after you finish using the application in the full screen mode Silent Mode also helps you maintain an uninterrupted Media Center Extender session A Media Center Extender session is an extended session of Media Center to an entertainment device such as a television The alerts and notifications that appear during a Media Center Extender session disconnect the session between the host computer and the entertainment device Norton Internet Security identifies a Media Center Extender session as an active full screen application and turns on Silent Mode When Silent Mode is enabled Norton Internet Security suppresses alerts and Protecting your files and data 187 About the Norton Internet Security scans notifications and suspends background activities to provide uninterrupted sessions for Silent Mode options such as Full Screen Detection or Media Center applications Turning off or turning on Full Screen Detection You can use the Full Screen Detection option in the Settings window to turn on or turn off Silent Mode automatically when Norton Internet Security detects a full screen application
23. When the LiveUpdate session is complete you can use the View Summary link to view the summary of the updates that are installed on your computer To check for updates manually 1 Inthe Norton Internet Security main window click LiveUpdate LiveUpdate connects to the Symantec server checks for available updates and then downloads and installs them automatically 2 Inthe Norton LiveUpdate window when the installation is complete click OK Some program updates may require you to restart your computer after you install them About keeping your protection up to date Definition updates are available to you as long as you maintain an active product status The ways in which 72 Getting started About LiveUpdate you can acquire the product and maintain your status are as follows The product includes a limited time subscription to definition updates When the subscription is due to expire you are prompted to renew Follow the on screen instructions to complete your subscription renewal After your product expires you cannot obtain updates of any kind and all the security features are turned off If you do not renew your product you are no longer protected against security threats Though LiveUpdate continues to check for updates after expiration you must renew your product to enable all the security features If you do not activate your service or renew your subscription you cannot e obtain updates of any kind and
24. analyzed this Web site and determined that this Web site has some threats that are classified as Annoyance Factors These annoyance factors are not dangerous but it can install unwanted applications on your computer without your permission In addition to the site safety information Norton Safe Web provides the following shopping safety information Norton Safe Web has analyzed this Web site and determined that you can have a safe shopping experience Securing your sensitive data 339 About securing your sensitive data Norton Safe Web does not have sufficient information about this Web site to provide a shopping safety rating Norton Safe Web has analyzed this Web site and determined that the site has shopping risks Symantec recommends that you do not visit this page The Web site may sell counterfeit items without proper indication Norton Safe Web has analyzed this Web site and has only some information about the Web site to provide shopping safety information The information is not sufficient to declare that the Web site is safe to shop When you visit any Web site that has an unsafe status Norton Safe Web blocks that Web page If you still want to view the Web site use the Continue to site anyway option that appears on the blocked page You can use the Block Malicious Pages option to block malicious pages To access the Block Malicious Pages option go to the Norton Internet Secur
25. and Germany The Privacy Safeguard feature is available only for the United States the United Kingdom and Canada 342 Securing your sensitive data About securing your sensitive data You can use Norton Safe Search even when you turn off the Identity Safe features Norton Safe Search is supported only in the Internet Explorer Firefox or Chrome Web browsers To search the Web using Norton Safe Search 1 Start your Web browser 2 Onthe Norton Toolbar in the Norton Safe Search box type the search string that you want to search 3 Do one of the following Click Search In the pop up window that appears select a search suggestion that matches your search string Turning off or turning on Norton Safe Web Norton Safe Web protects your computer while you browse the Internet using Internet Explorer Firefox or Chrome Web browsers It analyzes the security levels of the Web sites that you visit and indicates if the Web sites are free from threats It provides you a safe environment on the Web by displaying the site rating icons next to each search result The site rating icons lets you know if a Web site is malicious or not even before you visit it You can turn off or turn on Norton Safe Web in the Safe Surfing section under the Web tab The Web tab is available under the Settings window To turn off or turn on Norton Safe Web 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window
26. and view the file externally without using Security History You can import only the log files that have mcf file extension When you import a log file the exported list of Security History information in the log file appears This list replaces the current security events list You can select an option in the Show drop down list to view the option specific details that are saved in the log file To revert to the current Security History list you must click the Close file file_name mcf link To export Security History information 1 Inthe Norton Internet Security main window click Advanced 2 Inthe Computer Protection pane click History 3 Inthe Security History window in the Show drop down list select an option 4 Click Export 436 Monitoring protection features About Security History 5 Inthe Save As dialog box that appears navigate to a location and specify the name for the file The category name in the Show drop down list appears as the default file name You can provide a file name of your choice 6 Inthe Save as type box select the format in which you want to save your log file 7 Click Save To import Security History information 1 Inthe Norton Internet Security main window click Advanced 2 Inthe Computer Protection pane click History 3 Inthe Security History window click Import 4 Inthe Open dialog box that appears browse to the folder that has the file you want to import 5 Select the mcf
27. changing password 373 changing URL 371 changing user name 373 configuring 360 creating new folder 368 deleting 368 editing 368 importing 356 managing 368 saving 367 updating 374 low resource profile on battery turning off 91 turning on 91 M main window options 18 maintaining protection about 125 avoiding security risks 125 Manage Logins about 365 Manage Notes about 380 540 Index Manual Repair reviewing remaining risks in 208 Manual Repair window reviewing remaining risks in 136 138 Media Center Extender Silent Mode 186 Memory graph about 94 obtaining historical data 96 Miscellaneous Settings about 484 Monthly Report about 122 viewing 123 N Network changing trust level 316 discovering devices 309 editing details 316 forming 309 joining 309 managing 301 Network Cost Awareness about 326 defining bandwidth 328 turning off 327 turning on 327 Network Proxy Settings about 76 configuring 78 Network Security Map about 301 adding devices 311 modifying communication port 325 purging 322 removing devices 322 turning off 310 Network Security Map continued turning off Network Security Overview 301 turning on Network Security Overview 301 viewing device details 324 viewing devices 303 wireless network viewing status 323 Network Security Overview turning off 301 turning on 301 Network Settings about 473 new version checking 518 newsletter 528 non admin account 458 Norton
28. click Identity Safe 4 Under Identity Safe in the Log in to Identity Safe row click Configure 5 Inthe Enter the Password box type your Identity Safe password If you forget your password Identity Safe lets you enter wrong password three times If your attempts are unsuccessful the Trouble Logging In window appears 6 Inthe Trouble Logging In window click Reset Identity Safe If you forget the Identity Safe password of your online vault you need to provide your Norton Account credentials to reset your Identity Safe 7 Inthe confirmation dialog box click Yes Accessing Identity Safe You can access the Identity Safe settings from the following sections of Norton Internet Security From the Web tab in the Norton Internet Security Settings window 358 Securing your sensitive data About securing your sensitive data From the Norton Toolbar With Norton Internet Security you can access and configure all the Identity Safe features even after the product expires The following are the features that you can view or access after the product expires You can view the Edit Logins window using the Identity Safe menu on the Norton Toolbar You can use this feature to take a backup of your Identity Safe data The data that you back up are stored as DAT file You must be logged in to Identity Safe to access the Identity Safe features The Identity Safe features are supported only in the Internet Explorer
29. click Run next to File Scan select the files that you want to scan and then click Add You can also press Ctrl and select multiple files to scan You can use the following options to suspend a scan Suspends a custom scan temporarily Click Resume to continue the scan Terminates the scan Click Yes to confirm 4 Inthe Results Summary window do one of the following Ifno items require attention click Finish If any items require attention review them on the Threats Detected window About the Results Summary window Norton Internet Security displays the Result Summary window when you run a manual scan At the end of a scan the Results Summary window provides the summary of the scan results If your most recent scan was a Quick Scan this window shows the results of a fast scan of the areas of your 140 Protecting your files and data About the Norton Internet Security scans computer Viruses spyware and other risks often target these areas If your most recent scan was a Full System Scan this window shows the results of a comprehensive scan of your entire computer The Result Summary window displays the following information Total items scanned Total security risks detected Total security risks resolved Total items that require your attention About the Threats Detected window Norton Internet Security displays the Threats Detected window when it detects threats
30. send email messages or transmit other communications 6 Click OK To change the trust level of a device 1 Inthe Norton Internet Security main window click Advanced 2 Under Network Protection click Network Security Map 3 In the Network Security Map window do one of the following To edit the trust level of a device that is on your network in the network map click the device To edit the trust level of a device that you manually added in the Network Details drop down list click Trust Control and then click the device 4 Inthe device details section next to Trust Level click Edit 320 Protecting Internet activities About the Network Security Map 5 Toselect a trust level for a device in the Edit Device Trust Level window click one of the following Adds a device to the Full Trust list Full Trust devices are monitored only for known attacks and infections You should select this setting only when you are sure that the device is completely safe Adds a device to the Restricted list Restricted devices do not have access to your computer Adds a device to a default trust level The devices that are removed from the Full Trust level or Restricted trust level take the default trust level of the network The trust level of the network can be Full Trust Restricted Protected or Shared 6 Click OK Norton Internet Security displays the trust level status of each restricted devic
31. the drivers and plug ins start functioning during the computer start time before their specified time delay This option ensures better boot performance along with good security levels 196 Protecting your files and data About the Norton Internet Security scans Off Turns off boot time protection If you turn off the Enable Boot Time Protection option the protection level of your computer reduces Configuring boot time protection The boot time protection feature provides enhanced security level from the time you start your computer As soon as you start your computer Norton Internet Security starts Auto Protect and all required drivers and plug ins start functioning This feature ensures higher level of security from the moment you turn on your computer To configure boot time protection 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window in the left pane click Real Time Protection 3 Inthe Enable Boot Time Protection row click on one of the settings Your options are Aggressive Normal Off 4 Click Apply and then click OK About Early Launch Anti Malware Protection The early launch anti malware protection feature provides enhanced security level when you start your computer It ensures better security by running all the necessary components of Norton Internet Security that are required to block any malware from functioning when you start your computer To enable early
32. 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the General tab 3 Inthe left pane click Performance Monitoring 4 Under Performance Monitoring in the Performance Alerting row do one of the following To turn off performance alerts move the Performance Alerting switch to the Off position To turn on performance alerts move the Performance Alerting switch to the On position To suppress the performance alerts move the Performance Alerting switch to the Log Only position 5 Under Alert for High Usage of do one of the following If you want Norton Internet Security to monitor the CPU usage move the CPU switch to the left to the On position If you want Norton Internet Security to monitor the memory usage move the Memory switch to the left to the On position If you want Norton Internet Security to monitor the disk usage move the Disk switch to the left to the On position If you want Norton Internet Security to monitor the handle count move the Handles switch to the left to the On position By default this option is turned off 6 Click Apply and then click OK Configuring the resource threshold profile The threshold limit for the system resources determines at which point Norton Internet Security should notify you with performance alerts When a specific program exceeds the threshold limit of using Monitoring your system s performance 91 About System Insight
33. 2 Inthe Run dialog box type cma 3 Click OK 4 Atthe command prompt type ipconfig and then press Enter 5 Write down the IP address To find the IP address by using ipconfig on Windows Vista 1 On the computer you want to identify on the Windows taskbar click Start 2 Inthe Start Search text box type cma and then press Enter on your keyboard 3 At the command prompt type ipconfig and then press Enter 4 Write down the IP address To find the IP address by using ipconfig on Windows 7 1 On the computer you want to identify on the Windows taskbar click Start 2 Inthe Search programs and files text box type cma and then press Enter on your keyboard 3 At the command prompt type ipconfig and then press Enter 4 Write down the IP address 314 Protecting Internet activities About the Network Security Map To find the IP address by using ipconfig on Windows 8 1 Onthe Apps screen under Windows System click Command Prompt 2 At the command prompt type ipconfig and then press Enter 3 Write down the IP address Editing device details You can change the name and category of a device that is available on the Network Security Map You can select the categories such as Generic Device Laptop Media Device or Game Console You cannot change the category of the device that you added manually By default Norton Internet Security displays the category of the manually added device as USER DEFINED The
34. 3 In the left pane click Intrusion Prevention 4 Under Intrusion Prevention in the Intrusion AutoBlock row click Configure 5 Inthe Intrusion AutoBlock window under AutoBlock do one of the following To turn off Intrusion AutoBlock click Off To turn on Intrusion AutoBlock click On Recommended and then in the AutoBlock attacking computers for drop down list select how long you want to turn on AutoBlock 6 Click OK Unblocking AutoBlocked computers In some cases benign network activity can appear to be similar to an attack and AutoBlock blocks the network activity automatically to ensure that your computer is safe The list of computers that AutoBlock has currently blocked may include the computer that you should be able to communicate with If a computer that you need to access appears on the list of blocked computers you can unblock it You may want to reset your AutoBlock list if you have changed your protection settings To reset the AutoBlock list you can unblock all of the computers that are on the list at one time To unblock AutoBlocked computers 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Intrusion Prevention 4 Under Intrusion Prevention in the Intrusion AutoBlock row click Configure Protecting Internet activities 277 About Intrusion Prevention 5 Inthe Intrusion AutoBlock window under Computers
35. 390 configuring 360 information 331 logging in and out 359 logins 365 Norton toolbar 359 password 386 restoring data 383 security 386 turning off or turning on 456 Identity Safe Password amp Security options about 386 Identity Safe profiles about 348 creating 349 identity theft Internet 331 Idle Time Optimizer about 103 turning off 104 turning on 104 Idle Time Out setting 174 Idle Time Scans about 171 Full System Scan 171 Quick Scan 171 turning off 173 turning on 173 import logins 356 Insight Network about 152 cloud computing 152 Insight Network scan 152 Quick Scan 152 scan 152 shortcut menu scan 152 Single File Scan 152 Insight Protection turning off 154 turning on 154 installation problems 49 56 Instant Messenger virus protection 443 integration with email clients 286 integration with email programs 293 Intrusion AutoBlock blocking computers permanently 277 turning on and off 275 unblocking computers 276 Intrusion Prevention about 272 448 exclusion list 277 turning individual notifications on and off 273 turning notifications on and off 273 turning on and off 455 Intrusion Prevention scan excluding a device 320 exclusion list 277 purging devices 278 remove devices 278 IP addresses 313 finding 313 Index 539 items submitting from Quarantine 441 K keystroke logging 282 447 L LiveUpdate about 64 Smart Definitions 67 68 using 70 when to run 69 Login adding manually 368
36. Account about 32 accessing 37 creating 36 Norton AntiSpam 284 about 284 Address Book Exclusions 288 configure 285 Feedback 295 settings 285 SSL 284 Web Query 296 Norton Autofix support assistants 519 Norton Bootable Recovery Tool about 47 using 56 Norton Bootable Recovery Tool Wizard downloading 49 Norton Community Watch about 45 joining 45 Norton Community Watch continued turning off or turning on 454 Norton Firewall Diagnosis about 255 Norton Insight about 112 Files of Interest 115 refreshing trust level 115 trusted files 112 viewing processes 115 Norton Internet Security about securing 507 activating 14 Allowed and Blocked lists 449 background jobs 104 EULA 516 icon 61 main window 18 new version 518 password 508 509 protecting 509 registering 36 securing 508 settings 459 473 shortcut menu 63 starting from the DOS command prompt 61 uninstalling 529 upgrading 516 version number 515 Norton Internet Security scan about 128 accessing Norton Internet Security scans 133 command line scanning 150 Computer Scan 128 custom scans 141 Full System Scan 136 Idle Time Scan 128 Insight Network 152 Index 541 Norton Internet Security scan continued Insight Network scan 128 Quick Scan 137 Reputation Scan 128 Norton Internet Security settings resetting password 509 Norton LiveUpdate about 64 obtaining updates 70 Norton Product Tamper Protection about 505 turning off 506 turning on 506 Norton Safe S
37. Activities view in the Security History window displays the rules that firewall creates The rules that you create also appear in this view The Security History Advanced Details window for this category shows the created Program rules It also lets you allow a blocked program rule Intrusion Prevention scans all the network traffic that enters and exits your computer for known threats The Intrusion Prevention view in the Security History window displays details about recent Intrusion Prevention activities The Security History Advanced Details window for this category lets you control whether or not to be notified when Intrusion Prevention detects an Intrusion Prevention signature Monitoring protection features About Security History Download Insight processes any executable file that you download for analysis of its reputation level It then informs you about the processing results based on the Download Insight settings The Download Insight view in the Security History window displays details of all events that Download Insight processes and notifies This view also contains information about the actions that you take based on the reputation data of the events Norton AntiSpam protects your computer from exposure to unsolicited email The AntiSpam view in the Security History window displays details about the email messages that AntiSpam has processed 415
38. After the scan is complete you can double click a file name in the list and get more information about the item Getting started 61 Starting Norton Internet Security from the command prompt Starting Norton Internet Security from the command prompt If you work from the command line for example writing a script or code you can start Norton Internet Security while you are still in DOS To start Norton Internet Security from the command prompt 1 At the command line prompt type the directory where Norton Internet Security is located and the executable In 32 bit version of Windows Norton Internet Security and the executable are located at the following path Program Files Norton Internet Security Engine version Uistub exe Where version represents the version number of installed Norton Internet Security In 64 bit version of Windows Norton Internet Security and the executable are located at the following path Program Files x86 Norton Internet Security Engine version Uistub exe Where version represents the version number of installed Norton Internet Security 2 Press Enter About the Norton Internet Security icon After you install Norton Internet Security it displays an icon in the notification area at the far right of the Windows taskbar This icon indicates the current status of your computer Norton Internet Security displays alerts and notifications to inform you how viruses and other security th
39. Autofill sites containing security threats option to specify how you want Identity Safe to respond to the Web sites that have security threats You can also turn off the browser s password manager using the Turn off the browser s password manager option About Password amp Security You can use Password amp Security to change your Identity Safe password You can also use this option to set the level of security that you want for Identity Safe password usage The following sections let you change the Identity Safe password and set security levels for your password Identity Safe Password Change your Identity Safe password and set a new password hint using the Change Password option Securing your sensitive data 387 About securing your sensitive data Password Security 388 Securing your sensitive data About securing your sensitive data Specify the Identity Safe password security level Identity Safe provides four levels of security to protect your Identity Safe password Choose one of the following options Ask for my password at the beginning of each login session Prompts for your Identity Safe password the first time you access Identity Safe If you are logged in to Windows you do not need to provide the password again You should use this option to make your login credentials more secure Ask for my password before filling out a login or form Prompts for your Identit
40. Firefox or Chrome Web browsers To access Identity Safe settings from the main window 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Under Identity Safe for the Identity Safe feature that you want to open click Configure To access Identity Safe settings from the Norton Toolbar 1 Start your Web browser 2 On the Norton Toolbar in the Norton menu click Settings 3 For the Identity Safe feature that you want to open click Configure Securing your sensitive data 359 About securing your sensitive data Logging in to and logging out of Identity Safe You can log in to or log out of Identity Safe from the following areas of Norton Internet Security The Web tab in the Norton Internet Security Settings window The Norton Toolbar To secure your Identity Safe data from others log out of Identity Safe whenever you are away from your computer Identity Safe automatically logs you out of the current vault when you are logged in to your local vault or online vault and click Identity Safe Setup to create a new vault To log in to Identity Safe 1 Inthe Norton Internet Security main window click Settings 2 In the Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Inthe Open Vault window in the Enter the Password box type the password of the vault you want to log in 5 Click Lo
41. Internet Security cannot automatically repair or delete an infected file is that you do not have the current definition updates Run LiveUpdate and then scan again Before running LiveUpdate to receive protection updates ensure that Quick Scan is turned on it is turned on by default After LiveUpdate retrieves the latest definition updates Quick Scan automatically Responding to security issues 209 What to do if a security risk is found checks for the infections that have processes running in memory It also checks for the infections that the start up files and folders refer If that does not work read the information on the Threats Detected window to identify the types of files that cannot be repaired You can take one of the following actions depending on the file type You can view the file type of the detected risk This information helps you to decide the action that can be taken depending on the file type For example you can view the infected files with the following file name extensions any file can be infected m exe tm doc dot xis Use the Threats Detected window to solve the problem Replace using your operating system disks Resolving a suspected security risk Norton Internet Security needs to close a suspected security risk program to resolve it 210 Responding to security issues What to do if a security risk is found To resolve the suspected security risk
42. Monitoring your system s performance About System Insight disk optimizations threat detections performance alerts or Quick Scans The graph displays the activities as icon or stripe and the description for each icon or stripe is provided at the bottom of the graph The pop up that appears when you move the mouse pointer over an icon provides you the details about the activity The View Details link in the pop up lets you view additional details about the activity in the Security History window You can use the tabs at the top of the graph to obtain details for the current month and details for the last two months To rearrange the organization of files on your computer Optimizing your system helps you maximize the usable free space on a disk by grouping files based on how they are accessed The Optimize option at the top of the Events graph lets you defragment your system To view and analyze the effect of Norton Internet Security on the performance of your computer The Performance graph that appears at the bottom of the window provides a graphical representation of your CPU usage and memory usage The CPU tab displays a graph that represents the overall system CPU usage and Norton specific CPU usage When you click at any point on the CPU graph and memory graph Norton Internet Security displays a list of the processes that consume maximum resources at that point It also displays the percentage of usage for each process Yo
43. Network Security Map window displays different icons depending on the category that you select Icons help you identify the devices that are listed in the network map To edit the details of the device that is on your network 1 Inthe Norton Internet Security main window click Advanced 2 Under Network Protection click Network Security Map 3 Inthe Network Security Map window in the network map click a device icon 4 Inthe device details section next to Device Name click Edit 5 Inthe Edit Device Details window in the Name box type a new name The maximum character length of the device name is 15 characters Protecting Internet activities 315 About the Network Security Map 6 Inthe Category drop down list click one of the following device categories GENERIC DEVICE DESKTOP PC LAPTOP SERVER PC NETWORK PRINTER ROUTER SWITCH CABLE DSLMODEM MEDIA DEVICE GAME CONSOLE PDA MOBILE PHONE NETWORK STORAGE DEVICE WEBCAMERA TABLET MUSIC PLAYER TV 7 Click OK To edit the name of the device that you added manually 1 Inthe Norton Internet Security main window click Advanced 2 Under Network Protection click Network Security Map 3 Inthe Network Security Map window in the Network Details drop down list click Trust Control 4 Inthe network map select a device that you added 5 Inthe device details area next to Device Name click Edit 6 In the Edit Device Details dialog box in th
44. Norton Community Watch Silent Mode LiveUpdate Monitoring protection features 407 About Security History You can view the security items based on the category of events that you select and the search string that you provide Norton Internet Security restricts the number of search results that appear on each page in the Security History window Therefore Security History divides the items that are returned for any search criteria and displays them on separate pages You can use the pagination scroll at the bottom of the window to navigate to different pages sequentially In case you want to view a specific page you can use the Goto page option to open the page The maximum number of items that appear per page is 100 Based on the security status of an item in an information category you can take an appropriate action to resolve a risk or a threat The actions that you can perform include the following Restore and exclude a quarantined item Remove an item from Security History Submit an item to Symantec for further analysis Trust or restrict devices on a selected network Remove the trusted or restricted status of devices on the selected network Allow a selected program to access the Internet Configure Norton Internet Security to notify you when it blocks a selected attack signature Norton Internet Security also lets you save the security events history You can view the security event information when
45. Norton specific background tasks Norton Internet Security runs most of the background tasks when your computer is idle The Norton Tasks window provides the details of the background tasks that Norton Internet Security performs The details include Monitoring your system s performance 105 About System Insight The name of the Norton task You can use the icon that appears before the name of a background job to start or stop a background task You can start or stop a background task at any time The timestamp of the Norton task You can view details such as the date on which the background job last ran and the time These details help you decide whether to start a background task or wait for Norton Internet Security to run the job during idle time The duration of the Norton task You can view the length of time that a Norton task ran the last time The details also help you determine the length of time a background task takes to complete if you start it The background task has run during idle time or not This detail helps you determine if a task has already run during idle time or you should run it The status of the Norton task You can view details about the completion of the task The power source that the Norton Task uses You can specify the type of power source that each of the Norton Tasks uses Use the Configure link that is available next to the power source icon to configure the power source for the Norton Tas
46. Protecting Internet activities 229 About the Smart Firewall 5 Click Next and then select the computers that apply to the rule Your options are The rule applies to all computers This rule applies only to computers in the local subnet An organization s network is divided into subnets to facilitate efficient Internet communications Asubnet represents all of the computers in the same LAN 230 Protecting Internet activities About the Smart Firewall The rule applies only to the computers sites or domains that you specify You can specify the names and addresses of computers that apply to the rule The details of the specified computers appear in the list You can also remove computers from the list When you select this option the Add option becomes available When you click Add Norton Internet Security displays the Networking dialog box in which you can specify individual computers a range of computers or specify all computers on a subnet or network You can use the Add option or the Remove option to add or remove a computer Protecting Internet activities 231 About the Smart Firewall 6 Click Next and then select the protocols for the rule Your options are The rule applies to TCP Transmission Control Protocol communications The rule applies to UDP User Datagram Protocol communications The rule applies to TCP an
47. Quick Scan 4 Inthe Edit Scan window under When do you want the scan torun set the frequency and time at which you want the scan to run Most of the frequency options include the additional options that you can use to refine the schedule Set the additional options as required 5 Click Next 6 Inthe Scan Options tab click Save Editing a scheduled scan You can change the schedule of any scheduled custom scan Quick Scan or Full System Scan from the Scans window 150 Protecting your files and data About the Norton Internet Security scans To edit a scheduled scan from Norton Internet Security Scans dialog box 1 In the Norton Internet Security main window click Scan Now In the Computer Scan pane click Custom Scan In the Scans window in the Edit Scan column click the edit icon next to the scan that you want to edit In the Edit Scan window on the Scan Schedule tab change the schedule as required Most of the frequency options include the additional options that you can use to refine the schedule Set the additional options as required Click Next 6 Inthe Scan Options tab click Save Running a scan at the command prompt You can scan with Norton Internet Security from the command prompt without opening the Norton Internet Security main window You type the path and name of the file that you want to scan or customize the scan by adding a specific command The following commands are available N
48. Safe Web Enable Norton Safe Search Disable Norton Safe Search My Norton Account Help amp The Minimize Toolbar option appears only in the Internet Explorer browser Also the Community Buzz option is available only in English language versions of Windows 392 Securing your sensitive data About securing your sensitive data Lets you access the Identity Safe data stored in your online vault You can add edit or delete your Logins Cards and Notes under this section You can use the Norton Safe Search option to enhance your Web search experience The Norton Safe Search uses Ask com to generate the search results Norton Safe Search generates the search results based upon the site safety status and Norton rating for each of the search results You can also set this page as your default home page Lets you share the Web site with your friends through the popular networking sites such as Facebook Twitter LinkedIn Yahoo Mail Hot Mail or Google Mail Lets you know if the Web site you visit is safe or unsafe The Antiphishing and Norton Safe Web options under the Safe Surfing section on the Web tab of the Settings window analyze the security level of the Web sites you visit It then displays the results in the Norton Site Safety pop up window Securing your sensitive data About securing your sensitive data Lets you view the logins and cards that you ha
49. Scan 160 restore Identity Safe data 382 restoring items Quarantine 439 result resolved risks 139 Results Summary about 139 resolved risks 139 total items scanned 139 543 544 Index risks intrusions 212 port scans 212 rules changing 225 233 creating 224 225 Running custom scans scanning required files 144 scanning required folders 144 running Full System Scan Reputation Scan 159 scanning entire computer 136 running Quick Scan fast scan 137 Insight Network Quick Scan 137 Quick Scan 137 Reputation Scan 160 S Safe Surfing about 331 Safe Web turning off 342 turning on 342 scan at the command prompt command line scanning 150 Scan Complete appearing after a scan 208 Scan Complete window appearing after ascan 136 138 Scan Facebook Wall about 168 enabling 170 scanned total items scanned 139 scanning automatically 146 entire computer 136 individual elements 138 problems found during 208 Scans command line 150 Computer Scan 134 create a custom scan 141 Custom Scan 134 deleting custom scans 145 file 138 floppy disk 138 folder 138 Full System Scan 134 hard drive 138 Insight Network 152 Norton Bootable Recovery Tool 56 Quick Scan 134 removable drive 138 running custom scans 144 using custom 141 scheduling custom scans 146 scans 146 scheduling custom scan multiple schedules 146 scheduling custom scans scheduling Full System Scan 146 searching Security History 434 Security History about 405 A
50. Security main window click Settings In the Settings window click the General tab In the left pane click Other Settings In the Monthly Report row click View Report View the report and close the window Protecting your files and data This chapter includes the following topics About maintaining protection About the Norton Internet Security scans About maintaining protection After you have installed your product and run LiveUpdate you have complete protection from viruses and other security risks However new security risks are aconstant threat Security risks can spread when you start your computer from an infected disk or when you run an infected program You can do several things to avoid security risks Practicing regular file maintenance and keeping your security protection up to date helps in protecting your computer To avoid security risks Stay informed about the latest viruses and other security risks by logging in to the Symantec Security Response Web site at the following URL http securityresponse symantec com The Web site includes extensive frequently updated information on viruses and automatic virus protection Keep Automatic LiveUpdate turned on at all times to continually receive definition updates 126 Protecting your files and data About maintaining protection Run LiveUpdate regularly to receive new program updates Keep Auto Protect turned on at all times to prevent
51. Settings that are turned on Protecting your files and data 183 About the Norton Internet Security scans Norton Internet Security provides the following options under Silent Mode Settings Norton Internet Security allows you to manually turn on for a specified duration using Silent Mode option Norton Internet Security turns on this option automatically when it detects a full screen application and turns off when you stop using the full screen application Norton Internet Security turns on this option automatically when it detects a disk burning task or a Media Center TV recording task Norton Internet Security also turns on Quiet Mode automatically when you run a program that you included in the Quiet Mode Programs list Norton Internet Security turns off Quiet Mode when the disk burning session or TV program recording session is complete Norton Internet Security also turns off Quiet Mode when it stops detecting running instances of the programs that you included in the Quiet Mode Programs list The Norton Internet Security icon displays the turn on status of Silent Mode in the notification area at the far right of the taskbar The icon changes to a crescent patterned icon when Silent Mode is turned on Norton Internet Security also notifies you after Silent Mode is turned off 184 Protecting your files and data About the Norton Internet Security scans You can view the summary of the Silent Mode sessi
52. Tool Wizard If your attempt to install a Norton product fails you can download the Norton Bootable Recovery Tool Wizard This easy to use wizard helps you create Norton Bootable Recovery Tool on a CD DVD or USB key You can use Norton Bootable Recovery Tool to scan your computer and remove any security threats that prevent successful installation It is recommended that you download and install Norton Bootable Recovery Tool Wizard on a computer that does not have any security threats and create Norton Bootable Recovery Tool If you create Norton Bootable Recovery Tool on an infected computer there is a chance that the recovery CD DVD or USB key might get infected To use Norton Bootable Recovery Tool you must use the product key of the Norton product that you purchased If you use a trial version of Norton Internet Security you need to create a Norton Account to receive a product key to use Norton Bootable Recovery Tool 50 Getting started About Norton Bootable Recovery Tool You can download Norton Bootable Recovery Tool Wizard in one of the following ways From the Start menu From the Norton Support Web site To download the Norton Bootable Recovery Tool Wizard from the Start menu 1 2 On the Windows taskbar do one of the following In Windows XP click Start gt Programs gt Norton Internet Security gt Norton Recovery Tools In Windows Vista or Windows 7 click Start gt All Programs gt Nor
53. URLs Lets you view the URL location of the downloaded file If you have uninstalled the Norton Toolbar from your Chrome browser you must reinstall Norton Internet Security to access the Norton Toolbar on your Chrome browser again Norton Internet Security lets you install the Norton Toolbar for free even after you uninstall the product When you uninstall Norton Internet Security it offers to leave the Norton Toolbar without any cost to search and browse safely over the Internet However when you choose to install the Norton Toolbar the only features that you have are Norton Safe Search and Norton Safe Web Your computer must be connected to the Internet to avail this option Norton Internet Security does not offer to leave the Norton Toolbar if you upgrade your product to the latest version or choose to reinstall another Norton product Hiding and showing the Norton Toolbar You can hide the Norton Toolbar if you do not want to see the evaluation of every Web site that you visit When you hide the toolbar Norton Internet Security does not display the Norton Site Safety pop up window Securing your sensitive data 395 About securing your sensitive data However Norton Internet Security notifies you about suspicious and fraudulent Web sites or if an error needs your attention To hide or show the Norton Toolbar in the Internet Explorer and Firefox Web browsers 1 At the top of your browser window click View 2 On the
54. View by drop down list 3 Inthe list of currently installed programs do one of the following In Windows XP click Norton Internet Security and then click Change Remove In Windows Vista Windows 7 or Windows 8 click Norton Internet Security and then click Uninstall Change Finding additional solutions 531 About uninstalling 4 Inthe page that appears under Select Your Uninstall Preference click one of the following Lets you retain your settings passwords and preferences for Norton features before you uninstall Norton Internet Security Select this option if you want to reinstall Norton Internet Security or another Norton product Lets you completely remove Norton Internet Security without saving your settings passwords and preferences 5 If Norton Internet Security offers to install the Norton Toolbar after uninstall do one of the following To keep the Norton Toolbar after uninstall click Agree amp Install To uninstall Norton Internet Security without keeping the Norton Toolbar click Skip 6 To uninstall Norton Internet Security click Next 7 Doone of the following Click Restart Now recommended to restart the computer Click Restart Later to restart the computer later Norton Internet Security is not fully uninstalled until you restart your computer 532 Finding additional solutions About uninstalling To uninstall Norton Internet Security from the Start menu 1 Do
55. a high heuristic detection threshold It excludes well known applications from heuristic detection to prevent false detection of well known applications and to ensure a high detection rate of malicious applications Viewing the files using Norton Insight Norton Insight provides information about the Files of Interest that are available on your computer Norton Internet Security lets you view specific categories of files based on the option that you select in the Norton Insight Application Ratings window 116 Monitoring your system s performance About System Insight The drop down list that is available in the Norton Insight Application Ratings window provides you the following options Lists the processes that run on your computer at that point in time when you selected this option Lists the Files of Interest Lists the programs that start when you start your computer Lists all the files and programs that are currently loaded on to the program memory space Lists the programs that consume maximum resources of your computer Norton Internet Security displays a list of top 10 resources that highly affect the performance of your computer Lists the files that have the maximum community usage Monitoring your system s performance About System Insight Lists the Files of Interest that you manually trusted in the File Insight window This category does not list t
56. a safe automatic and efficient way to protect your computer If you want to change or customize your protection you can access most features from the main window If you want to control additional settings such as Trust Control or Program Control you can use the Norton Internet Security Settings window To configure Norton Internet Security settings for individual features 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click any of the settings tab to open it 3 Move the switch to the desired position 4 Click Configure for the feature that you want to change 5 Inthe window that appears make the necessary changes and then click OK 6 To apply the default settings in a specific section click Use Section Defaults on the tab 7 Inthe Settings window do one of the following To save your changes and close the Settings window click OK To save your changes without closing the Settings window click Apply To apply the default settings click Default All and then click OK or Apply 8 If Security Request dialog box appears select the duration for how long you want to turn off a feature and then click OK To configure Norton Internet Security Settings 1 Inthe Norton Internet Security main window click Settings 460 Customizing protection features About customizing settings and options 2 In the Settings window configure your settings in the following
57. about 174 emerging threats 174 heuristic technology 174 SONAR Advanced Mode 174 turning off 175 turning on 175 spyware about 282 found by Auto Protect 201 managing protection using the main window 282 protection features 447 SSL Secure Sockets Layer Norton AntiSpam 284 starting spam blocking 453 virus protection 443 546 Index startup files 200 startup items delaying and running 100 disabling or enabling 99 Startup Manager about 97 delaying and running delayed items 100 disabling or enabling startup items 99 stopping spam blocking 453 submission items toSymantec 441 subscription maintaining 527 product updates 71 summary product features 443 Supervisor user account creating firewall rules 217 Support AutoFix Scan 520 Self Help 523 solving problems 520 worldwide service 527 Support policy 527 Symantec Security Response 441 viewing submitted files 408 Symantec Support Web site about 523 using 524 Symantec Web site blogs and forums 521 System Insight about 81 Events graph 81 monitoring activities 83 Performance graph 81 system status graph activity details 86 System Status indicators responding 30 T technical support about 523 using 524 threats avoiding 125 newly discovered 71 protection from 211 Trust Control about 448 Intrusion Prevention and 272 options 241 trust level changing 316 device 316 network 316 U Uninstall about 529 procedure 529 unknown viruses 443 updates automaticall
58. after the trial period Monthly Report displays the activation status of your product However when your product expires after the subscription period Monthly Report displays the subscription status of your product Monitoring your system s performance 123 About System Insight Norton Internet Security provides reports based on the following categories Lets you view the details of the various attacks your computer is protected from For example you can view the total number of viruses and spyware from which you are protected Lets you view the various types of Internet attacks from which you are protected For example you can view the total number of intrusion attempts that are blocked Lets you view the details of Antiphishing activities For example you can view the total number of known authenticated sites that you visited Monthly Report lets you view the latest news on Internet security and also provides information on how to stay safe while you are online You can click Read More in the Norton Monthly Report window to view more information on how to stay safe online Viewing the Monthly Report The Monthly Report provides you with the statistics that are up to date At a glance you can see what Norton Internet Security has done for you since installation 124 Monitoring your system s performance About System Insight To view the Monthly Report 1 uo kFwWN In the Norton Internet
59. and you still want the system status to be Secure In this case you can ignore the protection status of Browser Protection and then turn off the option When you ignore the protection status of a feature it does not affect the overall System Status You can also monitor the protection status of the feature that has been ignored at any time You can ignore or monitor the protection status of only selected features that are available in the Advanced window The features are Antivirus Antispyware SONAR Protection Smart Firewall Intrusion Prevention Email Protection Browser Protection 32 Getting started About your Norton Account Safe Surfing To monitor the protection status of a feature 1 Inthe Norton Internet Security main window click Advanced 2 Inthe window that appears move your mouse pointer over the feature name 3 Inthe pop up that appears do one of the following To ignore the protection status of the feature that affects your computer s overall health evaluation click Ignore To monitor the protection status of the feature that has been ignored click Monitor About your Norton Account When you create a Norton Account you can manage all of your Norton products in one place You can store your product keys in your Norton Account and also buy additional product keys You can also register your product with the Norton Account It takes only a few moments to create your Norton Accou
60. based on the programs that are installed on your computer To improve your protection status ensure that your installed programs are up to date The System Status indicator displays the following statuses Indicates that your computer and activities are protected from threats risks and damage Indicates that your computer and activities require attention Take appropriate action to improve your protection status Indicates that your computer and activities are at risk Take immediate action to improve your protection status You can respond to the System Status indicators directly from the main window Getting started 31 About Norton Internet Security main window To respond to System Status indicators from the main window 1 Inthe bottom section of the Norton Internet Security main window click Fix Now 2 Follow the on screen instructions Monitoring the protection status of a feature The Norton Internet Security main window acts as a security management interface You can access the main features and monitor the performance of your computer from the main window At times you may want to turn off any option for a particular purpose But by doing so the status of your system changes to Attention or At Risk In such cases you can ignore the protection status of a particular feature to maintain a healthy overall system status For example you want to turn off Browser Protection for a limited period
61. being detected in the future scans 4 Inthe Quarantine Restore window click Yes In case of non viral threats you can use the option that is available in this window to exclude the security risk Norton Internet Security does not detect the security risks that you exclude in the future scans 5 Inthe Browse for Folder dialog select the folder or drive where you want to restore the file and then click OK 6 Click Close Monitoring protection features 441 About Security History Manually submitting an item to Symantec When a virus or other risk is detected it is automatically submitted to Symantec Security Response Web site for analysis If you have turned off the option to submit risks automatically you can manually submit them from the Security History Quarantine You must have an Internet connection to submit an item When you submit files to Symantec automatically or manually you contribute to the effectiveness of your Symantec product For example you can submit an item that has not been detected during scanning that you believe may be a security risk Symantec Security Response analyzes the file If it is identified as a security risk it is added to a future definition update Personally identifiable information is never included in submissions In some cases it is necessary for Symantec Security Response to block submissions of a particular type or volume These items appear as Not Submitted in Security Hist
62. bought your product from Best Buy store the Norton Product Key is available in the product CD box If you are not able to locate your Product Key contact Best Buy If you bought a Norton product CD online or from a local store the Norton Product Key is printed on the back of the CD envelope You can also log on to your Norton Account and find your Product Key If you downloaded a Norton product from the Norton Online Store the Product Key is in your confirmation email message You can also see it in your order details In addition you can log on to your Norton Account and find your Product Key If you purchased your Norton product from an ISP the activation PIN is in your confirmation email message from your ISP If you are not able to locate your activation PIN contact your ISP In case you use Norton Security Suite or Norton Business Suite you can find your activation PIN in the following way 1 Go to the following URL http www comcast net security 2 Under Get Norton Now click Windows 3 Click Get It Now 4 Log onto your Comcast account and then find your activation PIN under the product name You can use this activation PIN when you use Norton Bootable Recovery Tool Getting started 53 About Norton Bootable Recovery Tool Creating Norton Bootable Recovery Tool on a CD or DVD Norton Bootable Recovery Tool is integrated with Windows Preinstallation Environment WinPE Therefore you can run Norton Bootab
63. can set up No Limit policy so that Norton Internet Security connects to Symantec servers to ensure complete protection However if you think that Norton Internet Security uses too much of your Internet connection you can restrict the Internet usage of Norton Internet Security Network Cost Awareness helps you manage the Internet usage of Norton Internet Security To connect to the Internet Norton Internet Security accesses the gateway through a network connection The connecting device can be a 3G phone an Internet data card or a wireless network card Network Cost Awareness lets you set up a policy for each network connection that Norton Internet Security uses to connect to the Internet Protecting Internet activities 327 About Network Cost Awareness You can set up one of the following policies for each of the network connection that Norton Internet Security uses to connect to the Internet Auto Allows Norton Internet Security to receive all product and virus definition updates based on the Windows 8 cost awareness policy By default the Auto policy has unlimited Internet connection on LAN and Wi Fi O The Auto option is available only in Windows 8 No Limit Allows Norton Internet Security use the network bandwidth that is required to receive all product and virus definition updates Symantec recommends that you apply this policy If you do not use Windows 8 the default policy is set to No Limit Economy Allow
64. cannot obtain updates of any kind and the software no longer functions When you run LiveUpdate near the end of your subscription period you are prompted to subscribe for a nominal charge Follow the on screen instructions to renew your subscription When you renew your subscription the definition updates and new product features are available throughout the subscription period Please note that features may be added modified or removed during this period Worldwide service and support Worldwide service and support solutions vary by country To contact one of our Support offices please go to the following Web site and select your language 528 Finding additional solutions About Support ClubNorton www norton com support If you are a Norton One Premium Member go to the following Norton One support Web site for information on this topic https one norton com support ClubNorton is your one stop resource center for Internet security As a Norton customer Symantec wants to make your experience with your computer safe enjoyable and productive Whether you use your computer to manage your personal finances shop online or share your latest digital photos with friends and family ClubNorton makes your experience a good one Our goal is to consistently provide the proper tools and information to keep you up to date For more information go to the following URL and select your country or region in the Select You
65. control these spam mails you can use the spam filtering By default spam protection remains active If for any reason you want to disable it you can turn it off from within the program itself Turning off Norton AntiSpam increases your exposure to receive unsolicited email messages To turn off spam filtering 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Message Protection 4 Inthe AntiSpam row move the On Off switch to the right to the Off position 5 In the Settings window click Apply 6 Inthe Security Request window in the Select the duration drop down list select the duration for which you want to turn off spam filtering 7 Click OK 8 In the Settings window click OK To turn on spam filtering 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Message Protection 4 Inthe AntiSpam row move the On Off switch to the left to the On position 5 In the Settings window click Apply Turning off or turning on Norton Community Watch You can use the Norton Community Watch option to send information about a suspicious file to Symantec for analysis Symantec assesses the data to determine the new threats and their sources The Norton features such as Norton Insight and Insight Network use the Symantec assessed information to detect the security
66. data About securing your sensitive data 5 Inthe Scam Insight row do one of the following To turn off Scam Insight in the Scam Insight row move the On Off switch to the right to the Off position To turn on Scam Insight in the Scam Insight row move the On Off switch to the left to the On position In the Settings window click Apply Click OK 8 Click Close N Oo About Identity Safe Identity Safe helps you manage your identities and provides additional security while you perform online transactions The following features in Identity Safe provide secure storage of your sensitive information Stores login information such as your login credentials for your online bank account email user ID and password Stores your personal information such as addresses date of birth and credit card information Stores the details such as passport numbers and social security numbers In addition to being a depository of sensitive information Identity Safe provides the following features Protects you from identity theft when you perform online transactions Securing your sensitive data 345 About securing your sensitive data Antiphishing also helps to protect you from malicious Web sites when you perform online transactions Manages your card information when you have multiple credit cards to maintain Safeguards the data that you save on your computer By saving your data with a local vault yo
67. depending on the reputation level of the downloaded file The following are some of the options that are available in this window Lets you install the executable program Protecting Internet activities 265 About Download Insight Cancel run Lets you cancel the installation of the executable program Remove this file from my Lets you remove the file from system your computer Security History logs details of all events that Download Insight processes and notifies It also contains information about the safety level of the file and the action that you take on the file if any You can view these details in the Download Insight category in Security History When you turn off Auto Protect Norton Internet Security automatically turns off Download Insight In this case your computer is not adequately protected from Internet threats and security risks Therefore ensure that you always keep Auto Protect turned on to protect your computer from security risks When Silent Mode is turned on Norton Internet Security suppresses the Download Insight notifications Turning off or turning on Download Intelligence Download Insight protects your computer against any unsafe file that you may run or execute after you download it using a supported Web browser By default the Download Intelligence option is turned on In this case Download Insight notifies you about the reputation levels of any executable file that you downlo
68. do not want to exclude the item from future scans uncheck the check box available in the Quarantine Restore window Options Lets you access the Threat Detected window and view more details and perform actions About the Threat Detected window The Threat Detected window appears whenever Norton Internet Security detects a security risk on your computer You can use this window to view details about the risk and select an action for the risk Sometimes you may want to access the Threat Detected window for the same risk again In that case the window can be opened at any time from Security History Security History is the centralized location where you can access the Threat Detected windows of risks that belong to some of the following categories This category includes the security risks or the infected files that Norton Internet Security has detected and then repaired quarantined or removed Monitoring protection features 433 About Security History This category includes the security risks or the infected files that Norton Internet Security was not able to repair remove or quarantine This category includes the security risk items that are isolated from the rest of your computer while they await your attention for a suitable action The action options in the Threat Detected window for a risk vary depending on the risk type and its severity level The following are some of the options that are availabl
69. does not have enough information about the file to assign a trust level to the file Symantec has only a few indications that the file is not trusted Monitoring your system s performance 115 About System Insight Norton Internet Security also provides different profiles to configure your scan performance When you use the Full Scan profile Norton Internet Security follows the Blacklist technique to scan your computer It scans all of the files on your computer against the signatures that it obtained during definition updates When you use the Standard Trust or High Trust profile Norton Internet Security follows the Whitelist technique to scan the files based on their confidence level This way Norton Internet Security significantly reduces the time that is required to scan your computer completely for security threats The Whitelist technique that Norton Insight uses also helps in heuristic detection of suspicious applications Normally the execution behavior of well known applications appears identical to the execution behavior of unknown applications Such behavior results in false identification of good applications as suspicious and therefore necessitates security applications to maintain a low heuristic detection threshold However keeping a low detection threshold does not provide a complete heuristic protection against malicious applications Norton Internet Security uses the Whitelist technique that helps maintain
70. from all types of security threats In addition to the virus and security risk updates users of these products receive definition updates for security protection For the products that contain protection against phishing users receive definition updates against phishing The security definition updates provide the latest predefined firewall rules the updated lists of applications that access the Internet Intrusion Prevention signatures and Symantec spam definition files These lists are used to identify unauthorized access attempts to your computer Getting started 67 About LiveUpdate Users of these products receive the latest virus definitions from Symantec that protects your computer from all types of security threats In addition users of these products receive Symantec spam definition files and definition updates against phishing Users of these products receive the latest virus definitions from Symantec that protects your computer from all types of security threats In addition users of these products receive Symantec spam definition files and definition updates against phishing About Smart Definitions Norton Internet Security downloads and installs virus definitions regularly to protect your computer from the latest security threats For faster downloads and installation purpose Norton Internet Security classifies these virus definitions into two sets The virus definit
71. has violated the process policy of the firewall 256 Protecting Internet activities About the Smart Firewall The traffic has violated the traffic policy of the firewall The traffic comes from the restricted zone of networks or computers The traffic matches an Intrusion Prevention attack signature You can use the Firewall Diagnostics Wizard as a guide to troubleshoot the network connection problem by yourself For each case of network block the Wizard contains the firewall s analysis of the cause and the possible solutions to fix the block Norton Internet Security recommends that you use the Firewall Diagnostics Wizard to remove any type of block The solutions in the Wizard let you analyze the issue and take a suitable action to resolve the problem Using the Wizard to troubleshoot the problem has the following advantages It automatically tries to fix the problem by itself It lets you modify the settings that are related to the block It lets you view the log details related to the network block event It provides you the option to turn off firewall as the last means to resolve the issue About Reputation Firewall The Reputation Firewall feature lets Norton Internet Security to take firewall decisions based on information on the trust worthiness of programs and running processes that access the network It provides the reputation information in the firewall alerts Firewall alerts notify you of connecti
72. is slower The performance is slower because the drive head locates loads saves and keeps track of all of the fragments of the file If free space is also fragmented the drive head might have to track adequate free space to store temporary files or newly added files Optimization rearranges file fragments into adjacent or contiguous clusters When the drive head accesses all of the file data in one location the file is read into the memory faster Optimization also maximizes the usable free space on a disk by grouping most frequently used files and infrequently used files Optimization consolidates free space to avoid fragmenting newly added files It adds extra space after major data structures so that they can grow without immediately becoming fragmented again You can optimize your boot volume manually by using the Optimize option in the Performance window You can also configure Norton Internet Security to defragment your boot volume or the local disk that contains boot volume when your computer is idle Norton Internet Security automatically schedules the optimization when it detects the installation of an 102 Monitoring your system s performance About System Insight application on your computer The optimization process starts next time when your computer is idle You can use the Idle Time Optimizer option to optimize the boot volume during the idle time To access the Idle Time Optimizer option go to the Norton Inte
73. is subject to very limited review by courts Arbitrators can award the same damages and relief that a court can award You agree that by agreeing to this License Agreement the U S Federal Arbitration Act governs the interpretation and enforcement of this arbitration provision and that You and Symantec are each waiving the right to a trial by jury or to participate in a class action This arbitration provision shall survive termination of this License Agreement and or the termination of Your Symantec product license If You elect to seek arbitration You must first send to Symantec by certified mail a written Notice of Your claim Notice of Claim The Notice of Claim to Symantec should be addressed to General Counsel Symantec Inc 350 Ellis Street Mountain View CA 94043 and should be prominently captioned NOTICE OF CLAIM The Notice of Claim should include both the mailing address and email address You would like Symantec to use to contact You If Symantec elects to seek arbitration it will send by certified mail a written Notice of Claim to Your billing address on file A Notice of Claim whether sent by You or by Symantec must a describe the nature and basis of the claim or dispute and b set forth the specific amount of damages or other relief sought Demand If You and Symantec do not reach an agreement to resolve the claim within thirty 30 days after the Notice of Claim is received You or Symantec
74. issues 201 What to do if a security risk is found You can view information about detected viruses and other security threats in Security History Security History also includes information about spyware adware and other security risks Reviewing Auto Protect notifications Auto Protect scans files for viruses worms and Trojan horses when you perform an action with them such as moving them copying them or opening them It also scans for spyware adware and other security risks If Auto Protect detects suspicious activity it logs a notification in Security History that tells you that a risk was found and resolved If Auto Protect detect one or more viruses it either repairs or deletes the viruses and notifies you The notification provides information on which file was repaired or deleted and which virus Trojan horse or worm infected the file No further action is necessary To review Auto Protect notifications 1 Inthe Norton Internet Security main window click Advanced 2 Inthe Computer Protection pane click History 202 Responding to security issues What to do if a security risk is found 3 Inthe Show drop down list select the category for which you want to review Auto Protect alerts Your options are Recent History Full History Resolved Security Risks Unresolved Security Risks Review Auto Protect notifications that you received in the last seven days Review all of the Auto P
75. item is infected In such cases you can use this option to submit the item to Symantec for further analysis You can also navigate to this window by using the Options link in the File Insight window for some risks 4 Follow the on screen instructions Monitoring protection features 439 About Security History Adding an item to the Quarantine Security History Quarantine provides a safe location on your computer in which you can isolate items while you decide on an action to take on each item The Quarantine view in the Security History window displays a list of quarantined items You can view the name and the risk status of each quarantined item You can manually add an item to the Security History Quarantine You can use the Add to Quarantine option in the Quarantine view in the Security History window to quarantine the items that you suspect are infected This action has no effect on the items that are already quarantined O You cannot add a known Good File to Quarantine To add an item to the Quarantine 1 Inthe Security History window in the Quarantine view click Add to Quarantine 2 Inthe Manual Quarantine dialog box in the Description text box type a short name for the item that you want to add This text appears in the Quarantine so you should use a recognizable description 3 Click Browse 4 Inthe Select File to Quarantine dialog box browse to the item that you want to add select it and then c
76. launch the Web site login page Fills in your login automatically when you revisit Web pages Lets you manually add logins Lets you change the URL of your saved logins Lets you view the last time you made changes to the settings of your saved logins Edit Logins also lets you access all the login features that you saved for a Web site even after Norton Internet Security expires To create a new folder 1 7 8 In the Norton Internet Security main window click Settings In the Settings window click the Web tab In the left pane click Identity Safe Under Identity Safe in the Edit Logins row click Configure In the Edit Logins window click Create New Folder In the New Folder dialog box in the Enter new folder name box type a folder name Click OK Click Close To add a login manually 1 In the Norton Internet Security main window click Settings In the Settings window click the Web tab In the left pane click Identity Safe Under Identity Safe in the Edit Logins row click Configure In the Edit Logins window click Create New Login In the New Login dialog box type the URL of the Web site or a name for which you want to use this login If it is a URL ensure that you prefix it with HTTP or HTTPS 370 Securing your sensitive data About securing your sensitive data Click OK In the Username dialog box in the Enter new username box type the user name of the login and then c
77. list When you remove all the devices from the saved exclusion list Intrusion Prevention scans every request from all the devices that access your computer To remove all the devices from the Intrusion Prevention exclusion list 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Intrusion Prevention Under Intrusion Prevention in the Exclusion List row click Purge 5 Inthe confirmation dialog box click Yes 6 In the Settings window click OK 280 Protecting Internet activities About Vulnerability Protection About Vulnerability Protection Vulnerability Protection is a component of Intrusion Prevention System Vulnerability Protection provides information about the susceptibility of the programs that may be on your computer against malicious attacks It also provides information about the known attacks that they are protected from Vulnerabilities are flaws in your programs or your operating system that can create weaknesses in overall security of your system Improper computer configurations or security configurations also create vulnerabilities External attackers exploit these vulnerabilities and perform malicious actions on your computer Examples of such malicious attacks are active desktop monitoring keylogging and hacking Such attacks can slow down the performance of your computer cause program failure or expose your per
78. local vault when you upgrade to new version of the Norton Internet Security In addition to the local vault on your Windows user account you can save your Identity Safe data in online vault The Identity Safe data is stored online vault using your Norton Account You can access the Identity Safe data that you stored online from any computer that meets the following criteria The latest version of Norton Internet Security must be installed The computer must be connected to the Internet You can create only one online vault for a Norton Account You must log in to your Norton Account to move Identity Safe data from the local vault to the online vault 350 Securing your sensitive data About securing your sensitive data You can create Identity Safe vaults from the Identity Safe section of the Settings window The Identity Safe section is available in the Web tab Creating online vault Identity Safe lets you create an online vault and save your Identity Safe data You can create one online vault for each Norton Account You cannot create a new local vault but use your existing local vault when you upgrade to new version of the Norton Internet Security In addition to the local vault on your Windows user account you can save your Identity Safe data in online vault The Identity Safe data is stored online vault using your Norton Account You can access the Identity Safe data that you stored online from any computer t
79. may commence an arbitration proceeding or file a claim in small claims court You may download or copy a form of notice and a form to initiate arbitration at www adr org If You are required to pay a filing fee Symantec will promptly reimburse You for Your payment of the filing fee after arbitration is commenced The arbitration will be governed by the Commercial Arbitration Rules and the Supplementary Procedures for Consumer Related Disputes collectively AAA Rules of the American Arbitration Association AAA as modified by this License Agreement and will be administered by the AAA The AAA Rules and Forms are available online at www adr org or by calling the AAA at 1 800 778 7879 The arbitrator is bound by the terms of this License Agreement All issues are for the arbitrator to decide including issues relating to the scope and enforceability of this arbitration provision Unless Symantec and You agree otherwise any arbitration hearings will take place in the county or parish of either the mailing address You provided in Your Notice or ifno address was provided in Your Notice Your billing address on file If Your claim is for U S 10 000 or less Symantec agrees that You may choose whether the arbitration will be conducted solely on the basis of documents submitted to the arbitrator through a telephonic hearing or by an in person hearing as established by the AAA Rules If Your claim exceeds U S 10 000 the right to
80. messages from senders in the Blocked List as spam Allows and blocks email messages from entire domains as well as individual email addresses See About Norton AntiSpam settings on page 285 Automatically imports lists of addresses from supported email programs to keep your list of allowed email senders and blocked email senders in sync See Identifying authorized senders on page 289 Lets you query the Symantec Web servers to filter the spam email messages which the local filters fail to classify as spam See About Web Query on page 296 Updates the copies of Symantec spam definition files automatically See Checking for updates manually on page 70 About Parental Control The Parental Controls option lets you create your Norton Online Family account Norton Online Family is a parental control application that provides a smart way to keep your children safe when they are online Customizing protection features 451 Feature summary Norton Online Family helps parents to get a better understanding of what children do online so that they can better protect and guide them You can use the Online Family icon at the bottom of the main window to create your Norton Online Family account The icon may not be available with some versions of Norton Internet Security In such case you may not be able to access Norton Online Family options You need to install Norton Safety Minder
81. network Your wireless network statuses are Wireless Network Secure Indicates that your wireless network is secure Wireless Network Not Indicates that your wireless Secure network is not secure Viewing the device details The Network Security Map lets you view the details of your computer You can view the following details The configuration status of your protection features such as Auto Protect Intrusion Prevention and Email Scanning The configuration status of your definition updates such as Automatic LiveUpdate and Pulse Updates The version number of your Norton product The subscription status of your Norton product The configuration status of your transaction security such as Identity Safe and Antiphishing Protecting Internet activities 325 About the Network Security Map To view the device details 1 Inthe Norton Internet Security main window click Advanced 2 Under Network Protection click Network Security Map 3 Inthe Network Security Map window in the network map click the device for which you want to see the details You can view the details of only the computers that you remotely monitor 4 Inthe device details section next to Category click Details 5 In the Device Details window view the details of the device 6 Click Close Modifying the communication port for Network Security Map The Network Security Map settings let you configure the communication port nu
82. of the following Does not prompt you to select a suitable action for any type of file that you download if the Alert on Poor Stability option is turned off The Download Insight window does not appear whenever you try to open any downloaded file Prompts you to select a suitable action when you try to download an unstable file if the Alert on Poor Stability option is turned on Norton Internet Security identifies unsafe files as security threat and removes them By default the Alert on Poor Stability option is turned off 272 Protecting Internet activities About Intrusion Prevention To turn on or turn off Alert on Poor Stability 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Download Intelligence 4 Under Download Intelligence in the Alert on Poor Stability row do one of the following To turn on Alert on Poor Stability move the On Off switch to the left to the On position To turn off Alert on Poor Stability move the On Off switch to the right to the Off position 5 Click Apply and then click OK About Intrusion Prevention Intrusion Prevention scans all the network traffic that enters and exits your computer and compares this information against a set of attack signatures Attack signatures contain the information that identifies an attacker s attempt to exploit a known operating system or program vulnerability Intr
83. of the settings Your options are Full Scan Standard Trust High Trust 4 Click Apply and then click OK 122 Monitoring your system s performance About System Insight To configure Scan Performance Profiles from the Norton Insight Application Ratings window 1 Inthe Norton Internet Security main window click Advanced 2 Inthe window that appears in the Computer Protection pane click Application Ratings 3 Inthe Norton Insight Application Ratings window move the Scan Performance Profiles slider to one of the settings Your options are Full Scan Standard Trust High Trust 4 Click Close About Monthly Report Monthly Report lets you view a summary of what Norton Internet Security has done for you Norton Internet Security displays the monthly report every 30 days after you install your product After 30 days of installation Norton Internet Security displays the Monthly Report automatically If you do not want Norton Internet Security to display the Monthly Report automatically you can select the Do not display monthly reports automatically option in the Norton Monthly Report window To turn on the Monthly Report option go to the Norton Internet Security main window and then click Settings gt General gt Other Settings gt Monthly Report gt On The Norton Monthly Report window displays the Tip of the month to recommend some of the product s features and services When your product expires
84. of your product If you want to upgrade your Norton product or want to reach the customer support for assistance you must know your product version number You can find the version number of your product on your computer To find the version number of your product 1 Inthe Norton Internet Security main window click Support 2 Inthe Support drop down menu move your mouse pointer over About You can note the version number of your product in the pop up that appears 516 Finding additional solutions Finding the End User License Agreement Finding the End User License Agreement End User License Agreement EULA is a legal document that you agree to while installing the product EULA contains information such as the restriction on sharing or usage of the software the user rights on the software and the support information You can read the EULA to learn more about the following information The usage policies of Norton Internet Security The terms and conditions for using Norton Internet Security To find the End User License Agreement 1 Inthe Norton Internet Security main window click Support 2 Inthe Support drop down menu click User License Agreement 3 Read the Norton License Agreement and click Close About upgrading your product Norton Internet Security helps you upgrade your product if you have an active subscription You can upgrade your current product to the latest version without any cost
85. on Smart Definitions Smart Definitions are a subset of virus definitions that contains most important definitions for the latest security threats Getting started 69 About LiveUpdate As the Smart Definitions are of considerably smaller size it results in lesser download time lesser installation time lesser boot time and lesser memory consumption It also occupies lesser amount of disk space as compared to the full set of virus definitions Therefore Smart Definitions result in faster performance of your computer Norton Internet Security checks the Smart Definitions option settings during each LiveUpdate session If the option is turned on the Smart Definitions are downloaded and installed If the option is turned off all of the virus definitions are downloaded and installed To turn off or turn on Smart Definitions 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window in the left pane click Updates 3 Inthe Smart Definitions row do one of the following To turn off Smart Definitions move the On Off switch to the right to the Off position To turn on Smart Definitions move the On Off switch to the left to the On position 4 Inthe Settings window click Apply 5 Click OK About running LiveUpdate You should run LiveUpdate as soon as you install Norton Internet Security Some Symantec products run LiveUpdate automatically to keep your protection up to date If you do no
86. on each computer that your children use If your children use the same computer you need to create user accounts for each child and install Norton Safety Minder on the computer You can also use the Parental Controls link in the Web Protection pane in the Norton Internet Security advanced window to create your Norton Online Family account Symantec recommends that you use your Norton Account credentials to register with Norton Online Family After you set up your account you can configure your settings in Norton Online Family Web site to monitor your children s Internet activities You can sign in to your Norton Online Family account at any time to view their online activities You can also use the Online Family icon at the bottom of the main window to sign in to your account and view your child s Internet activities By using Norton Online Family you can manage the Internet activities of your children in the following ways Monitor and manage the Web sites that your children visit Manage and monitor the computer usage of your children Monitor and manage the social networking activities of your children Monitor and manage the instant messaging activities of your children 452 Customizing protection features About turning off automatic features Monitor and manage the Internet search that your children perform Define House Rules for your children based on their age and maturity db Norton Online Family ma
87. one of the following On the Windows taskbar click Start gt All Programs gt Norton Internet Security gt Uninstall Norton Internet Security In Windows 8 go to Start screen and then click Uninstall Norton Internet Security 2 Inthe page that appears under Select Your Uninstall Preference click one of the following Lets you retain your settings passwords and preferences for Norton features before you uninstall Norton Internet Security Select this option if you want to reinstall Norton Internet Security or another Norton product Lets you completely remove Norton Internet Security without saving your settings passwords and preferences 3 If Norton Internet Security offers to install the Norton Toolbar after uninstall do one of the following To keep the Norton Toolbar after uninstall click Agree amp Install To uninstall Norton Internet Security without keeping the Norton Toolbar click Skip 4 To uninstall Norton Internet Security click Next Finding additional solutions 533 About uninstalling 5 Do one of the following Click Restart Now recommended to restart the computer Click Restart Later to restart the computer later Norton Internet Security is not fully uninstalled until you restart your computer See About uninstalling on page 529 534 Finding additional solutions About uninstalling Index A about customer support 523 accessing Facebook S
88. options most recent definitions Norton Community Watch Lets you submit selected security and application data to Symantec for analysis Symantec analyses the data to determine any possible security risks and provides you the useful statistical information about the applications The Detailed Error Data Collection option lets you allow or deny some of the detailed data submissions These detailed data may vary depending on the Norton specific errors and components You can use the Always Never and Ask Me options to configure the submissions 492 Customizing protection features About customizing settings and options Remote Management Lets you remotely view your device s security status and fix some security issues by using Norton Management Norton One and Norton Studio Norton Sudio is an app that works on Windows 8 When you turn on Remote Management Norton Internet Security publishes details such as your subscription status security status of your device and other details to the Norton Management Norton One and Norton Studio app These details help you view and fix security issues of your device You can access these details by using Norton Studio app in Windows 8 or using Norton Management and Norton One from anywhere to manage Norton Internet Security on your device cd By default this feature is disabled unless you register your Norton Internet Security with your Norto
89. performance related logs under the Performance Alert category in the Security History window Configuring performance alerts You can use the Performance Alerting option to receive performance alerts when there is an increased usage of system resources by any program or process Monitoring your system s performance About System Insight You can use the following options to configure performance alerts Off Log Only Turns off performance alerts Select this option if you do not want Norton Internet Security to notify you with performance alerts Turns on performance alerts Select this option if you want Norton Internet Security to notify you with performance alerts when a program or process exceeds the threshold limit of the system resource usage By default the Performance Alerting option is turned on Monitors and records the system resource usage Select this option if you want Norton Internet Security to only monitor the system resource usage of every program or process running on your computer When a program or process exceeds the threshold limit of the system resource usage Norton Internet Security records these details in the Security History window You can view the details that are related to performance alerts under Performance Alert category in the Security History window 89 90 Monitoring your system s performance About System Insight To configure performance alerts
90. port you can remove the port from the Protected Ports window Norton Internet Security automatically protects the default SMTP port 25 and the default POP3 port 110 You cannot remove these default ports To remove an email port from Protected Ports 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 In the left pane click Message Protection 4 Inthe Protected Ports Settings row click Configure 5 Inthe Protected Ports window click the port that you want to remove and then click Remove 6 Click Apply and then click OK 7 Inthe Settings window click OK Protecting Internet activities 301 About the Network Security Map About the Network Security Map A home network typically consists of the computers and other devices that share your Internet connection The Network Security Map helps you view and manage your network After you configure Network Security Map Norton Internet Security automatically detects the devices that are connected to your network and lists them in the Network Security Map You can view devices and customize the Network Security Map to remotely monitor the computers on which a Norton product is installed db Ensure that the computers that you want to remotely monitor have a version of a Norton product that supports Remote Monitoring You can monitor the following items in the Network Security Map Security status of the compute
91. product You can also let Norton Internet Security notify you when a new version of your product is available You can do so by turning on the Automatic Download of New Version option To turn on the Automatic Download of New Version option go the Norton Internet Security main window and then click Settings gt Updates gt Automatic Download of New Version gt On The latest version of your product may contain new and enhanced features for better protection against security threats When you check for a new version details about your product such as product name and version are sent to Symantec servers The servers then check whether a new version of the specified product is available or not If a new version is available you can download and install it from the Web page If a new version is not available the Web page informs you about it In such case you can run LiveUpdate to obtain latest program and definition updates and keep the existing version of your product up to date The upgrade process might not work if your Web browser is incompatible to communicate with the Symantec servers You can use Internet Explorer version 6 0 or later Chrome version 10 0 or later and Firefox version 3 6 or later Finding additional solutions 519 About Norton Autofix db Your product must be activated and you need an Internet connection to check if a new version is available and install new version of the product To check for a new
92. started About Norton Internet Security main window Studio Lets you access Norton Studio Norton Studio is an app that is available on your Windows 8 Apps Store Norton Studio lets you manage your Norton products and Norton product keys from one location You can view the security status of each of your devices and resolve the security issues by using the Norton Studio from any location around the world You can go to Windows 8 App Store and download and install Norton Studio Your activation status or subscription status appears at the bottom of the main window You can use the Activate Now option to activate or subscribe your Norton product You can also monitor the overall system CPU usage and the Norton specific CPU usage in this window About the Norton Internet Security advanced window The Norton Internet Security advanced window acts as a security management interface The options in this window help you address all the important security and performance issues of your computer The options are classified in different panes Each pane contains the important features that you can easily access or configure from this window Getting started 29 About Norton Internet Security main window The panes are Computer Protection Provides you the essential computer protection options It also contains links to scan your computer view the history of protection events and manage quarantined items You can also vie
93. that you store to automatically fill forms This feature lets you provide sensitive information without typing it when you are online In this way Identity Safe protects you from keyloggers that steal and misuse your identity Lets you manage your various login information Logins include information such as your email login credentials and Internet banking credentials When you save all of your login information in the Identity Safe you can do the following Easily track all your logins Quickly launch your login Web sites View or update your password for the Web site Use folders to organize your logins Change your login settings 363 364 Securing your sensitive data About securing your sensitive data Lets you store and manage sensitive information You can save social security number driver s license number insurance policy number and passport number You can also save private accounts lock combinations documents notes frequent flier numbers bank account number security challenge questions and legal and financial information Lets you back up the Identity Safe data in DAT or CSV file formats cd You should back up all of your Identity Safe data periodically Lets you import the Identity Safe data from the backed up file or from the portable profile that you have from the older versions of Norton Internet Security When you import the Identity Safe data you have the followin
94. the file is trusted Good Symantec has a high indication that the file is trusted Unknown Symantec does not have enough information about the file to assign a trust level to the file Poor Symantec has a few indications that the file is not trusted Bad Symantec has a high indication that the file is not trusted If you have a file that has Poor or Bad trust level Norton Internet Security displays a red cross x icon next to the trust level You can click on the red cross x icon and quarantine the 166 Protecting your files and data About the Norton Internet Security scans Community Usage suspicious file Indicates the community usage level of the file The search results are grouped in to the following categories Very Few Users Shows the files that have very low community usage Few Users Shows the files that have average community usage Many Users Shows the files that have very high community usage You can also use the community usage of a file to determine the legitimacy of the file Symantec uses a stringent statistical method to evaluate the trustworthiness of a file and to classify the file as a Good file Protecting your files and data 167 About the Norton Internet Security scans Resource Usage Indicates the system resource usage level of the file The usage levels are as follows Low Indicates that the file consumes minimum system resources Moderat
95. the Settings window click Apply 6 Inthe Turnon Silent Mode dialog box in the Select the duration drop down list select how long you want to turn on Silent Mode and then click OK 7 Inthe Settings window click OK To turn off Silent Mode from the Settings window 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the General tab 3 Inthe left pane click Silent Mode Settings 4 Inthe Silent Mode row move the On Off switch to the right to the Off position 5 In the Settings window click Apply 186 Protecting your files and data About the Norton Internet Security scans 6 Click OK To turn on Silent Mode from the notification area 1 Inthe notification area on the Windows taskbar right click the Norton Internet Security icon and then click Turn on Silent Mode 2 Inthe Turnon Silent Mode dialog box in the Select the duration drop down list select how long you want to turn on Silent Mode and then click OK To turn off Silent Mode from the notification area Inthe notification area on the Windows taskbar right click the Norton Internet Security icon and then click Turn off Silent Mode About the Silent Mode that turns on automatically When you watch a movie play games or make a presentation you run the application in the full screen mode Norton Internet Security detects the application that you run in the full screen mode and automatically enables Silent Mode
96. the rule 10 Click OK Removing a program from Program Control You can remove programs from Program Control if necessary In this case Norton Internet Security removes all the rules that are associated with the application that you remove The firewall settings for the programs are not migrated from previous versions of Norton Internet Security If you removed any programs in the previous version and Protecting Internet activities 223 About the Smart Firewall do not want them in the current version you must remove them again To remove a program from Program Control 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Smart Firewall 4 Under Smart Firewall in the Program Control row click Configure 5 Inthe Program Control window in the Program column select the program that you want to remove 6 Click Remove 7 Inthe Confirmation dialog box click Yes The confirmation dialog box appears only when the Automatic Program Control option is turned off 8 Click OK Customizing Program Control After you use Norton Internet Security for a while you might need to change the access settings for certain programs To customize Program Control 1 Inthe Norton Internet Security main window click Settings 2 In the Settings window click the Network tab 3 Inthe left pane click Smart Firewall 4 Under Smart Firewall i
97. threats Customizing protection features 455 About turning off automatic features db Norton Community Watch collects and submits detailed data about the Norton specific errors and components only It does not collect or store any personal information of any user You can use Security History to review the information that has been sent to Symantec To turn off or turn on Norton Community Watch 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the General tab 3 Inthe left pane click Other Settings 4 Inthe Norton Community Watch row do one of the following Toturn off Norton Community Watch move the On Off switch to the right to the Off position To turn on Norton Community Watch move the On Off switch to the left to the On position 5 Inthe Settings window click Apply 6 Click OK Turning off or turning on security protection features There may be times when you want to turn off a security protection feature For example you might want to see if the Smart Firewall prevents a Web page from appearing as expected Turning off security protection features reduces your computer s security When you turn off a feature you can specify the amount of time it should remain off After that time limit the feature turns on automatically To ensure that your computer remains protected you can turn on security protection features manually before the specified time frame concludes
98. threats quickly compared to the traditional signature based threat detection techniques SONAR detects and protects you from malicious programs even before virus definitions are available through LiveUpdate SONAR monitors your computer for malicious activities using heuristic detections It automatically blocks and removes high certainty threats Norton Internet Security notifies you when high certainty threats are detected and removed However you can configure Norton Internet Security to exclude certain programs from the Norton Internet Security Auto Protect scans and SONAR scans You should exclude programs only if you are confident that they are not infected You can exclude the programs from the Auto Protect scans and SONAR scans by adding them to the Real Time Exclusions window When you add a program to the Real Time Exclusions window Norton Internet Security ignores the file when it performs Auto Protect scan and SONAR scan This option also excludes subfolders within a folder Protecting your files and data 177 About the Norton Internet Security scans Exclude a program from Norton Internet Security scans only if you are confident that the program is safe For example if another program relies on a security risk program to function you might decide to keep the program on your computer To add programs to the Real Time Exclusions window go to the Norton Internet Security main window and then click Settings gt Comput
99. to a CD or DVD and use it as a recovery CD or DVD on any computer You can also use this ISO file to point to any virtual machine as a virtual CD ROM To create Norton Bootable Recovery Tool ISO file 1 Inthe Norton Bootable Recovery Tool Wizard main window click Create ISO file 2 Inthe Create ISO file window do the following If you want to save the ISO file to a specific location click Change next to Select location You can browse and select the folder location If you want to add drivers click Add next to Add drivers If you want to change the default language click Change next to Specify language You can change the language in the Select Language window By default Norton Bootable Recovery Tool is created in English 3 Click Next 4 Review the results and do one of the following Click Done to close Norton Bootable Recovery Tool Click Back to Main to create or update Norton Bootable Recovery Tool in another media Creating Norton Bootable Recovery Tool on a USB key You can create Norton Bootable Recovery Tool ona USB key and use it to run Norton Bootable Recovery Tool on your computer When you create Norton Bootable Recovery Tool ona USB key all the data that are stored in this USB key are permanently deleted and the USB key is formatted Ensure that you back up all the data before creating Norton Bootable Recovery Tool on a USB key Getting started 55 About Norton Bootable Recovery Tool To creat
100. to connect to the Internet you must specify the proxy server details The Network Proxy Settings window lets you enter automatic configuration settings proxy settings and proxy server authentication settings The Network Proxy settings let you connect to the Internet while you perform tasks such as activating the product or accessing the support options To configure Network Proxy Settings 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Network Security Settings 4 Inthe Proxy Server row click Configure Getting started 79 About Network Proxy Settings In the Network Proxy Settings window do the following If you want your browser to automatically detect network connection settings under Automatic Configuration check Automatically detect settings If the proxy server requires an automatic configuration URL under Automatic Configuration check Use automatic configuration script Type the URL of the PAC file in the URL box If your network uses a proxy server under Proxy Settings check Use a proxy server for your HTTP connections In the Address box type the URL or IP address of your proxy server and in the Port box type the port number of your proxy server You can specify a value from 1 to 65535 If your proxy server requires a user name and password under Authentication check I need authentication to connect throu
101. to run irrespective if the computer uses external power or battery power If you choose this option Norton Internet Security performs the Norton Task when the computer is idle It does not consider the type of power source the computer uses 5 Click OK 6 Inthe Norton Tasks window click Close About Norton Insight Norton Insight allows the smart scanning of files on your computer It improves the performance of Norton Internet Security scans by letting you scan fewer files without compromising the security of your computer A Norton Internet Security scan can identify threats on your computer in the following ways At regular intervals Norton Internet Security obtains definition updates from Symantec These updates contain signatures of known threats Each time when Norton Internet Security obtains the definition updates it performs a scan of all of the files that are available on your computer It compares the signature of the files against the known threat signatures to identify threats on your computer Monitoring your system s performance 113 About System Insight Norton Internet Security obtains specific information about the Files of Interest and submits the information to Symantec during idle time The information includes things such as file name file size and hash key Symantec analyzes the information of each File of Interest and its unique hash value and provides a confidence level to the file
102. to the latest available version db The features listed above vary for different Norton products and devices Accessing Norton Management on Windows You can access Norton Management in one of the following ways Using a Web browser on any computer From the main window of Norton security products To access Norton Management from the main window of a Norton security product you need to install the Norton Management agent on that device Your device must be connected to the Internet to access Norton Management To access Norton Management using a browser 1 Open your browser and go to https manage norton com 2 Click Sign In 3 Inthe Email Address box type your Norton Account email address 4 Inthe Password box type your Norton Account password 5 Ifyou want Norton Management to remember your email address every time when you log on check Remember me on this computer 6 Click Sign In To access Norton Management from Norton security products 1 At the bottom of the Norton security product main window click the Manage icon 2 Click Log in 3 Type your email address that you use for Norton Account 40 Getting started About Norton Management 4 Type your password that you use for Norton Account 5 Click Go 6 Click Manage Devices To access Norton Management from the Windows notification area 1 Go to the Windows device on which Norton Management is installed 2 Inthe notification area
103. up Norton Internet Security to turn off your computer or move it to sleep mode or hibernate mode automatically when the scheduled scan is complete Scheduling a scan You have complete flexibility in scheduling custom scans When you select how frequently you want a scan to run daily weekly or monthly you are presented with additional options For example you can request a monthly scan and then schedule it to occur on multiple days instead In addition to the custom scans that you create Norton Internet Security lets you schedule the Full System Scan and Quick Scan You can also schedule the scan to run in specific time intervals hours or days You can schedule a custom scan in the Scans window Protecting your files and data 147 About the Norton Internet Security scans Norton Internet Security lets you select multiple dates if you schedule a monthly scan To schedule a custom scan 1 Inthe Norton Internet Security main window click Scan Now 2 Inthe Computer Scan pane click Custom Scan 3 Inthe Scans window in the Edit Scan column click the edit icon next to the custom scan that you want to schedule 4 Inthe Edit Scan window on the Scan Schedule tab do one of the following If you do not want to run the scan at any particular time but want to keep the scan options and scan items saved select Do not schedule this scan Torun the scan at specific time intervals select Run at a specific time int
104. uses to connect to the Internet 6 Under the Policy column click the drop down list next to the network connection for which you want to set up a policy 330 Protecting Internet activities About Network Cost Awareness 7 Select one of the following Auto Allows Norton Internet Security to receive all product and virus definition updates based on the Windows 8 cost awareness policy By default the Auto policy has unlimited Internet connection on LAN and Wi Fi db The Auto option is available only in Windows 8 No Limit Allows Norton Internet Security use the network bandwidth that is required to receive all product and virus definition updates If you do not use Windows 8 the default policy is set to No Limit Economy Allows Norton Internet Security access the Internet only to receive critical product updates and virus definitions If you have a limited Internet connection you can select the Economy option to ensure protection from critical security threats No Traffic Blocks Norton Internet Security from connecting to the Internet If you choose this policy Norton Internet Security cannot receive critical virus definitions and program updates which can lead to potential dangers and virus attacks 8 Click Apply and then click OK 9 In the Settings window click OK Securing your sensitive data This chapter includes the following topics About securing your sensitive data About securing your sensit
105. viruses from infecting your computer Watch for email messages from unknown senders Do not open attachments from these senders Keep Email Protection turned on to avoid sending or receiving infected email attachments Keep all recommended maximum protection settings turned on Keep the default options turned on at all times You should be always prepared in case a virus infects your computer Ensuring that protection settings are turned on Norton Internet Security is configured to provide your computer with complete protection against viruses In addition Norton Internet Security protects your computer against spyware adware and other security risks The default settings provide complete protection for your computer However you should ensure that your protection features are turned on for maximum protection To ensure that protection settings are turned on 1 Inthe Norton Internet Security main window click Settings Protecting your files and data 127 About maintaining protection 2 Inthe Settings window in the Computer tab move the On Off switch to the left to the On position for the following settings Computer Scan provides the following options Compressed Files Scan Microsoft Office Automatic Scan Rootkits and Stealth Items Scan Network Drives Scan Real Time Protection provides the following options Antispyware Auto Protect Caching Removable Media Scan SONAR Protection
106. work properly with the 64 bit version of Web browsers You must enable JavaScript and cookies on your browser to access Norton Internet Security About Norton Community Watch Norton Community Watch helps in identifying new security risks by submitting selected security and application data to Symantec for analysis Symantec assesses the data to determine the new threats and their sources The collective efforts from Norton security product users help in quick identification of solutions for these threats and risks Norton Community Watch improves user security and product functionality In addition it helps Symantec to analyze the execution schedule and efficiency of Norton specific tasks and settings on your computer Norton Community Watch collects and submits the following types of data 46 Getting started About Norton Community Watch Identified malicious software such as portable executable files and running processes Any Web site URL that your product identifies as fraudulent All the Web site URLs that you visited before the detection of a risk The applications and processes that run on your computer regularly and during any security risk detection Response instances that your computer sends to any potential security risk General system information and performance attributes from the computer General information about your computer such as idle time standby and screensaver settings After the potentia
107. you receive when an Email error occurs Details include the Error ID and the Error message This view also displays information about subject sender address and the recipient address that are related to the email message in the alert The Norton Community Watch feature lets you submit any suspicious security or suspicious application data to Symantec for analysis Symantec assesses the data to determine the new threats The Norton Community Watch view in the Security History window displays a list of files that you have submitted to Symantec for analysis Files at various stages of submission also appear in the list 419 420 Monitoring protection features About Security History Silent Mode LiveUpdate Silent Mode suppresses alerts and notifications and temporarily suspends most of the background activities The Silent Mode view in the Security History window displays the summary of the Silent Mode sessions The summary includes the following information The type of Silent Mode such as Silent Mode or Quiet Mode The type of program that turns on Silent Mode such as disk burning or TV recording The name of User Specified program that turns on Silent Mode Whether Silent Mode is turned on or turned off LiveUpdate obtains the latest virus definition updates and the program updates to all the Symantec products that you installed on your computer These updates protect your
108. your computer When you turn off the Apply updates only on reboot option the Apply Now option appears in the Norton LiveUpdate window When you click Apply Now the program updates that do not require system restart are applied instantly However the program updates that require system restart are automatically applied the next time you restart your computer To turn on or turn off Apply updates only on reboot 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window in the left pane click Updates 3 Inthe Apply updates only on reboot row do one of the following Toturn off Apply updates only on reboot move the On Off switch to the right to the Off position To turn on Apply updates only on reboot move the On Off switch to the left to the On position Getting started 75 About LiveUpdate 4 Inthe Settings window click Apply 5 Click OK About Pulse Updates In addition to the definition updates that Automatic LiveUpdate downloads Norton Internet Security uses streaming technology to download the latest virus definitions These downloads are called Pulse Updates The Pulse Updates are lighter and faster than Automatic LiveUpdate They keep your computer secure from the ongoing threats that exist on the Internet Pulse Updates protect you against the rapidly changing environment of security threats without compromising your computer s performance Pulse Updates should always be turned on to g
109. your computer safe from security risks Security protection features include Protects your computer from Internet attacks port scans and other suspicious behavior See About the Smart Firewall on page 211 Scans each piece of information that enters and exits your computer and automatically blocks any Internet attacks See About Intrusion Prevention on page 272 Customizing protection features 449 Feature summary Detects when your computer connects to a new network You can then allow or block connections from all computers that are connected to that network See About Smart Firewall Trust Control settings on page 241 About spam filtering features With the increase in usage of email many users receive a number of unwanted and unsolicited commercial email messages that are known as spam Not only does spam make it difficult to identify valid email messages but some spam contains offensive messages and images Norton Internet Security provides several powerful features to reduce your exposure to unwanted online content Adds several options to the toolbar in supported email programs See About your email program toolbar on page 293 450 Customizing protection features Feature summary Uses a user defined address list to expedite the scanning of email Accepts all email messages from senders in the Allowed List Treats all email
110. your system resource Norton Internet Security notifies you with a performance alert To configure the resource threshold profile 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the General tab 3 Inthe left pane click Performance Monitoring Under Performance Monitoring in the Resource Threshold Profile for Alerting row select one of the following options Low Configures a low threshold limit for alerting Symantec recommends you to select this option when your computer runs on battery power Medium Configures a medium threshold limit for alerting By default the threshold limit is set to medium High Configures a high threshold limit for alerting Symantec recommends you to select this option when your computer runs tasks that require high resource 5 Click Apply and then click OK Turning off or turning on the Use Low Resource Profile On Battery Power option When your computer runs on battery power it is important that all active software programs consume 92 Monitoring your system s performance About System Insight minimum resource usage By reducing resource usage your computer gains longer battery life and becomes more energy efficient You can configure a low threshold profile and ensure that all programs consume minimum resource usage When the resource usage of a program or a process exceeds the low threshold limit Norton Internet Security n
111. 2010 or later Norton 360 version 3 0 or later Norton Business Suite 4 0 or later Norton Security Suite 4 0 or later Norton Bootable Recovery Tool does not have a separate Product Key or activation PIN To use Norton Bootable Recovery Tool you must provide the Product Key or activation PIN of the Norton product that you purchased If you purchased your Norton product from an Internet service provider ISP you would have received an activation PIN When you use Norton Bootable Recovery Tool you must use this activation PIN Norton Bootable Recovery Tool does not automatically locate the Product Key or the activation PIN ona computer that has multiple operating systems If you use a computer that has multiple operating systems you need to write down the Product Key or the activation PIN before you start Norton Bootable Recovery Tool and provide the key when prompted You can locate your Norton Product Key or activation PIN in any of the following ways 52 Getting started About Norton Bootable Recovery Tool If you received your Norton product preinstalled by the computer manufacturer the Product Key is available on your Norton Account When you are prompted you need to register for a Norton Account After you complete registration you can log on to your Norton Account and find your Product Key You can also click on the Account link on the main window of your product and register and access Norton Account If you
112. 3 Inthe left pane click Performance Monitoring 4 Under Performance Monitoring in the Program Exclusions row click Configure 5 Inthe Program Exclusions window select the program that you want to delete and then click Remove To remove all the programs available in the Program Exclusions window click Remove All In the Program Exclusions window click Apply Click OK 8 In the Settings window click OK N Oo About CPU graph and memory graph Norton Internet Security monitors the overall system CPU usage and memory usage and the Norton specific CPU usage and memory usage Norton Internet Security displays the details in the CPU graph and the memory graph The CPU graph and memory graph are real time graphs of CPU utilization and memory utilization The graphs display a performance time for the last 90 minutes or for the duration since you started your computer The graphs update the information at an interval of every 15 seconds The graphs progress from right to left and the most recent data appear on the far right of the graph The blue pattern in the graphs depicts the overall system usage and the yellow pattern depicts the Norton specific usage The gray blocks that are labeled as Idle indicate the idle period of your computer The gray blocks include the period when your computer is in shutdown sleep or log out state The graphs show a default performance time of 90 minutes However you can use the Zoom options to d
113. AVW32 launches help and terminates Scans all drives Scans the local drives Enables or disables subfolders scanning Protecting your files and data 151 About the Norton Internet Security scans BI I Enables or disables boot record scanning and master boot record scanning for example NAVW32 C B or NAVW32 C B BOOT Scans only the boot records QUICK Runs a Quick Scan SE Enables or disables a Quick Scan ST I Enables or disables scanning of stealth items folder_path Scans the files that matches specified wild card drive folder file Scans the specified drive folder or file SESCAN Performs Quick Scan in the background amp Norton Internet Security displays the scans window only when a threat is detected 152 Protecting your files and data About the Norton Internet Security scans To run a scan from the command prompt 1 Atthe command prompt type the path in which Norton Internet Security is located and the executable s file name The following examples show the syntax of a scan command m Program Files Norton Internet Security Engine version NAVW32 command_name Where version represents the version number of Norton Internet Security and command_name represents the command Program Files Norton Internet Security Engine version NAVW32 path file_name Where version represents the version number of Norton Int
114. About setting up Norton Identity Safe Account Identity Safe helps you manage your sensitive information and provide additional security while you perform online transactions The features in Identity Safe provide a secure storage for your personal information such as your address login information passwords and credit card details Identity Safe provides a secure storage for the following Login information such as user IDs and passwords of your email accounts Personal information such as your address date of birth passport number and social security number Credit card details including card number and card expiry date You can view all the options that are available in Identity Safe only after you set up Identity Safe Identity Safe lets you create an online vault and save your Identity Safe data You can create one online vault for each Norton Account You cannot create a new local vault but use your existing local vault when you upgrade to new version of the Norton Internet Security In addition to the local vault on your Windows user account you can save your Identity Safe data in online vault The Identity Safe data is stored online vault using your Norton Account You can access the Identity Safe data that you stored online from any computer that meets the following criteria The latest version of Norton Internet Security must be installed Securing your sensitive data 347 About securing your sensitive da
115. About uninstalling cccc cece eee ee neues 529 Contents 11 12 Contents This chapter includes the following topics Activation protects you About Norton Internet Security main window About your Norton Account About Norton Management About Norton Community Watch About Norton Bootable Recovery Tool About Norton Power Eraser Starting Norton Internet Security from the command prompt About the Norton Internet Security icon About LiveUpdate About Network Proxy Settings Activation protects you Product activation protects users from pirated or counterfeit software It protects you by limiting the use of a product to those users who have acquired the product legitimately Product activation requires a product key for each installation of a product You must 14 Getting started Activation protects you activate the product within a limited time period after you install it If you are connected to the Internet product activation takes place automatically when you start the product for the first time after installation After activation the Norton Account window appears You can create your Norton Account and register your product If you are not connected to the Internet you can click Try Later in the Activation not complete window to start your product The Activation window reappears every time you start your product until you activate your product If you choose not to activate
116. By default the Full Screen Detection option remains turned on after you install Norton Internet Security To turn off Full Screen Detection 1 Inthe Norton Internet Security main window click Settings 2 In the Settings window click the General tab 3 Inthe left pane click Silent Mode Settings 4 Inthe Full Screen Detection row move the On Off switch to the right to the Off position 5 Inthe Settings window click Apply 6 Click OK To turn on Full Screen Detection 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the General tab 3 Inthe left pane click Silent Mode Settings 4 Inthe Full Screen Detection row move the On Off switch to the left to the On position 5 Inthe Settings window click Apply 6 Click OK About Quiet Mode Norton Internet Security automatically enables Quiet Mode when you perform tasks that require higher utilization of your system resources When Quiet Mode is turned on Norton Internet Security suspends the 188 Protecting your files and data About the Norton Internet Security scans background activities and lets the task use the maximum resources for better performance You can choose to set Norton Internet Security to automatically enable Quiet Mode when you do the following tasks IMAPI 2 0 Disk Burn Media Center TV Recording User Specified Programs Protecting your files and data 189 About the Norton Internet Security sca
117. Control If you have selected this option you must manually specify the Internet access settings for all inbound traffic and outbound traffic in the firewall alerts The Automatic Learn IPv6 NAT Traversal Traffic option is available only when Automatic Program Control is set to Aggressive or Automatic Norton Internet Security provides this option to control the network traffic that uses Teredo to communicate with your computer Some of the Windows 7 and Windows 8 features such as Remote Media Experience and Remote Assistance work only when Automatic Learn IPv6 NAT Traversal Traffic is on 252 Protecting Internet activities About the Smart Firewall When you turn off Automatic Program Control you can turn on Advanced Events Monitoring You can use the Advanced Events Monitoring options to configure the Internet access settings for Internet enabled programs the first time that they run When you turn on the Advanced Events Monitoring feature you are prompted with numerous firewall alerts If you do not want to receive firewall alerts you can set Automatic Program Control to Automatic If you want to manually specify Internet access settings for programs with Unproven or Poor trust level receiving inbound traffic you can set Automatic Program Control to Aggressive The Advanced Events Monitoring settings consist of the following categories that provide your computer with advanced protecti
118. D SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING PERFORMANCE OR USE OF THIS DOCUMENTATION THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12 212 and subject to restricted rights as defined in FAR Section 52 227 19 Commercial Computer Software Restricted Rights and DFARS 227 7202 et seq Commercial Computer Software and Commercial Computer Software Documentation as applicable and any successor regulations Any use modification reproduction release performance display or disclosure of the Licensed Software and Documentation by the U S Government shall be solely in accordance with the terms of this Agreement Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com Printed in the United States of America 10987654321 Norton License Agreement Norton Internet Security IMPORTANTPLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT LICENSE AGREEMENT CAREFULLY BEFORE USING THE SOFTWARE AS DEFINED BELOW SYMANTEC CORPORATION IF YOU ARE LOCATED IN THE AMERICAS OR SYMANTEC ASIA PACIFIC PTELTD IF YOU ARE LOCATED IN THE ASIA PACIFIC RIM ORJAPAN ORSYMANTEC LIMITED IF YOU ARE LOCATED IN EUROPE THE MIDDLE EAST OR AFRICA SYMANTEC IS WILLING TO LICENSE THE
119. General rule with the following criteria all inbound connections from Internet address 192 168 1 1 through port 8080 When you select Block Smart Firewall blocks all connections satisfying the criteria of this General rule Protecting Internet activities 227 About the Smart Firewall Monitor Update the Firewall Activities category in the event log each time that communication of this type takes place This option lets you monitor how often this firewall rule is used Norton Internet Security notifies you every time that the traffic matching the monitor rule criteria passes through your computer You can use the links in these notifications to view the logs You can view the event log under Firewall Activities category in the Security History window Norton Internet Security creates separate action rules to allow or block the programs that have only a Monitor rule associated with them The Monitor rule must be of higher order than the action rule for successful log entry of the network event that is related to the program 3 Click Next 228 Protecting Internet activities About the Smart Firewall 4 Select the type of connection for the rule Your options are The rule applies to outbound connections from your computer to another computer The rule applies to inbound connections from another computer to your computer The rule applies to inbound and to outbound connections
120. ICABLE LAW AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH HEREIN FAILS OF ITS ESSENTIAL PURPOSE INNO EVENT WILLSYMANTEC ORITS LICENSORS BE LIABLETO YOUFOR ANY SPECIAL CONSEQUENTIAL INDIRECT OR SIMILAR DAMAGES INCLUDING ANY LOST PROFITS OR LOST DATA ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE INCLUDING BUT NOT LIMITED TO USE OF THE ONLINE BACKUP FEATURE AND TECHNICAL SUPPORT EVEN IF SYMANTEC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES IN NO CASE SHALL SYMANTEC S OR ITS LICENSORS LIABILITY EXCEED THE PURCHASE PRICE WHICH YOU PAID FOR THE APPLICABLE SERVICE PERIOD The disclaimers and limitations set forth above willapply regardless of whether You accept the Software 9 U S Government Restricted Rights For U S Government procurements the Software is deemed to be commercial computer software as defined in FAR 12 212 and subject to restricted rights as defined in FAR Section 52 227 19 Commercial Computer Software Restricted Rights and DFARS 227 7202 Rights in Commercial Computer Software or Commercial Computer Software Documentation as applicable and any successor regulations Any use modification reproduction release performance display or disclosure of the Software by the U S Government shall be solely in accordance with the terms of this License Agreement 10 Export Regulation You acknowledge that the Software and related technical data and services collectively Co
121. Norton Internet Security Product Manual X Norton Care for our Environment It s the right thing to do Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products This manual is made from recycled materials Norton Internet Security Product Manual The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement Documentation version 20 1 Copyright 2012 Symantec Corporation All rights reserved Symantec the Symantec Logo LiveUpdate Norton 360 and Norton are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U S and other countries Portions of this product Copyright 1996 2011 Glyph amp Cog LLC Other names may be trademarks of their respective owners The product described in this document is distributed under licenses restricting its use copying distribution and decompilation reverse engineering No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors if any THE DOCUMENTATION IS PROVIDED AS IS AND ALL EXPRESS OR IMPLIED CONDITIONS REPRESENTATIONS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE OR NON INFRINGEMENT ARE DISCLAIMED EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALI
122. Norton Internet Security When you click the Backup icon the main window displays Norton Online Backup Log in option Norton Online Backup provides a secure online backup solution that safeguards your important data against system crash accidental deleting virus infection and other disasters You can access or restore the backed up data from any computer that is connected to the Internet Getting started 27 About Norton Internet Security main window Safe Web Lets you check the safety of a Web site You can also perform a safe search This option may not be available with some versions of Norton Internet Security When you click the Safe Web icon the Norton Internet Security main window displays Norton Safe Web options You can use the Check Site option to analyze the security levels of any Web site that you want to visit When you type a Web site address in the text box and click Check Site it shows the Symantec s ratings for the Web site You can use the Safe Search option to search for information on the Internet The Norton Safe Search uses Ask com to generate the search results Norton Safe Search provides a site safety status and a Norton rating for each of the search results generated You can use the View recent Norton Safe Web activity option to view the recent Norton Safe Web statistics on malicious sites and URLs You can also view the list of new malicious URLs 28 Getting
123. Norton Management window click User License Agreement read the user license agreement and then click Agree amp Install 10 If you are prompted to provide your email address in the Email Address box type the email address that you use to log on to your Norton Account and then click Next 11 If you are prompted to provide your password in the Password box type the password that you use to log on to your Norton Account and then click Next 12 In the Set up this computer window in the Name this computer box type a display name for the device The name that you specify must be unique and must not exceed 40 characters 13 Click Finish 14 In the Congratulations window click Manage Devices To install the Norton Management agent from a Norton security product 1 At the bottom of the Norton security product main window click the Manage icon 2 Click Get Started 3 Inthe Welcome to Norton Management window click the User License Agreement link read the user license agreement and then click Agree amp Install 42 Getting started About Norton Management 4 Ifyou are prompted to provide your email address in the Email Address box type the email address that you use to log on to your Norton Account and then click Next 5 Ifyou are prompted to provide your password in the Password box type the password that you use to log on to your Norton Account and then click Next 6 Inthe Set up this computer win
124. Norton Safe Search you can use the Disable Norton Safe Search option Lets you open the Web site https account norton com Norton Account lets you register your product with Symantec and manage all of your Norton products in one place Lets you view the Norton menu help page Securing your sensitive data 399 About securing your sensitive data Accessing the Vault Open Vault Closed menu The Vault Open Vault Closed menu on the Norton Toolbar lets you view and manage the logins Identity cards and notes that you saved You can also access the Web tab of the Settings window using the Vault Open Vault Closed menu In addition you can do the following Navigate to any Web site for which you have saved the login credentials Submit feedback about your experience with Identity Safe Export your Identity Safe data Import your Identity Safe data from the file you backed up or from the portable profile Convert your local vault to online vault When you visit any login Web page without setting up your Identity Safe a menu bar appears in the Norton Toolbar You can use the Setup option that is available in the menu bar to set up Identity Safe Vault Open Vault Closed menu lets you view the logins that you saved even after the product expires To access your logins from the Vault Open Vault Closed menu 1 Start your Web browser 400 Securing your sensitive data About securing your sensit
125. Notes window click OK About exporting and importing Identity Safe data You can export your Identity Safe data for security purposes data recovery or when you transfer your Identity Safe data to anew computer The backup files are saved as DAT files You can protect the files that you backed up with a password Symantec recommends that you use a password to keep your Identity Safe data more secure The backup password does not need to be the same as your Identity Safe password You must provide the password when you restore the Identity Safe data that you backed up You can import your Identity Safe data from the file that you previously backed up You can also import the Identity Safe data from the portable profile When you import the Identity Safe data you have the following options Merge the imported data in to the vault that you are currently logged in Replace the existing Identity Safe data that you stored in your vault that you are logged in with the imported data You can also delete the data once the import is complete Exporting your Identity Safe data You can export your Identity Safe data for security purposes data recovery or when you transfer your Identity Safe data to a new computer You can retrieve Identity Safe data when your product expires To export your Identity Safe data 1 Inthe Norton Internet Security main window click Settings Securing your sensitive data 383 About securing y
126. Online Lets you open the Sync Identity Safe Data Online window You can move your Identity Safe data that you stored in your local vault to online vault You must log in to your Norton Account to move your data online This option appears in the Vault Open menu only when you are logged in to your local vault Ignore this page You can select this option if you do not want to Securing your sensitive data 403 About securing your sensitive data autofill the login information in the current Web page Report Issue Lets you open the Norton Feedback Web site You can submit feedback on your experience with Identity Safe You can also submit the problems that you encountered with Identity Safe You can select from the list of problems or you can describe your problem Close Vault Lets you log out of or log in to Identity Safe You should log out of Identity Safe to secure your Identity Safe data when you are away from your computer 404 Securing your sensitive data About securing your sensitive data Monitoring protection features This chapter includes the following topics About Security History About Security History Security History window lets you do the following View the summary of alerts and event messages View the results of scans that are run on your computer View the items that you submitted to Symantec Security Response Web site Manage Quarantine items Monitor the
127. Performance Submissions and Errors Informational The items that are related to the various product features appear under their respective categories in the Security History window For example the security Monitoring protection features 409 About Security History items that are related to the Quarantine feature appear under Quarantine category in the Security History window In addition the Security History window displays details of each item in the Details pane To view items in Security History 1 Inthe Norton Internet Security main window click Advanced 2 Inthe Computer Protection pane click History 410 Monitoring protection features About Security History 3 InSecurity History window in the Show drop down list select the category of items that you want to view Your options are The Recent History view in the Security History window displays the alerts that you received during the last seven days It lists the history of certain recent security events The Full History view in the Security History window displays the complete Security History You can scan your computer to check if any virus spyware malware or security risk has infected your computer The Scan Results view in the Security History window displays the details about the scans that are run on your computer Monitoring protection features About Security History
128. Recovery Tool on a USB key the latest virus definitions are automatically downloaded and included in the USB key You can update the virus definitions in Norton Bootable Recovery Tool on a USB key that you created earlier Getting started 59 About Norton Power Eraser To update Norton Bootable Recovery Tool virus definitions on a USB key 1 Insert your Norton Bootable Recovery Tool USB key into the USB port of your computer 2 Inthe Norton Bootable Recovery Tool Wizard main window click Update USB key definitions 3 Inthe Update USB key definitions window from the Specify drive drop down list select the USB drive 4 Click Next 5 Review the results and click Done About Norton Power Eraser Norton Power Eraser is a powerful removal tool that can help you clean up the security risks that are difficult to remove from your computer If a program hijacked your computer and you have difficulty in removing it Norton Power Eraser helps you remove the security threat from your computer Norton Power Eraser includes detection and removal capabilities for the security risks that impersonate legitimate applications The tool uses more aggressive techniques than your Norton security product hence there is a risk that it may flag legitimate programs for removal You should carefully review the scan results page before removing any files Downloading and accessing Norton Power Eraser You can download Norton Power Eraser using yo
129. SOFTWARE TO YOU AS THE INDIVIDUAL THE COMPANY OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE REFERENCED BELOW AS YOU OR YOUR ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT THIS IS A LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU AND SYMANTEC BY OPENING THIS PACKAGE BREAKING THE SEAL CLICKING THE I AGREE OR YES BUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY OR LOADING THE SOFTWARE YOU AGREE TO THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS CLICK THE CANCEL OR NO OR CLOSE WINDOW BUTTON OR OTHERWISE INDICATE REFUSAL MAKE NO FURTHER USE OF THE SOFTWARE AND CONTACT YOUR VENDOR OR SYMANTEC CUSTOMER SERVICE USING THE CONTACT DETAILS IN SECTION 12 OF THIS LICENSE AGREEMENT FOR INFORMATION ON HOW TO OBTAIN A REFUND OF THE AMOUNT YOU PAID FOR THE CURRENT SERVICE PERIOD DEFINED BELOW LESS SHIPPING HANDLING AND ANY APPLICABLE TAXES EXCEPT IN CERTAIN STATES AND COUNTRIES WHERE SHIPPING HANDLING AND TAXES ARE REFUNDABLE AT ANY TIME DURING THE SIXTY 60 DAY PERIOD FOLLOWING THE DATE OF PURCHASE OF AN ANNUAL SUBSCRIPTION OR WITHIN THIRTY 30 DAYS FOLLOWING THE DATE OF PURCHASE OF A MONTHLY SUBSCRIPTION 1 License The software including all its accompanying features and services and software documentation including any product packaging the Documentation that accom
130. Scan on specific dates and times or at periodic intervals You can schedule a Full System Scan in the Scans window To schedule a Full System Scan 1 In the Norton Internet Security main window click Scan Now In the Computer Scan pane click Custom Scan In the Scans window in the Edit Scan column click the edit icon next to Full System Scan In the Edit Scan window under When do you want the scan torun set the frequency and time at which you want the scan to run Most of the frequency options include the additional options that you can use to refine the schedule Set the additional options as required Protecting your files and data 149 About the Norton Internet Security scans 5 Click Next 6 Inthe Scan Options tab click Save Scheduling a Quick Scan Quick Scan scans the important locations of your computer that the viruses and other security threats often target When you perform a Quick Scan Norton Internet Security scans only the running processes and the loaded programs Quick Scan takes less time to scan than a Full System Scan because this scan does not scan your entire computer Norton Internet Security lets you schedule a Quick Scan You can schedule a Quick Scan in the Scans window To schedule a Quick Scan 1 Inthe Norton Internet Security main window click Scan Now 2 Inthe Computer Scan pane click Custom Scan 3 Inthe Scans window in the Edit Scan column click the edit icon next to
131. Security Risks category in the Security History window Turning off or turning on SONAR Protection SONAR protects you against malicious code even before virus definitions are available through LiveUpdate By default SONAR Protection is turned on to proactively detect unknown security risks on your computer When you turn off SONAR Protection you are prompted with a protection alert This protection alert lets you specify the amount of time for which you want SONAR Protection to be turned off db When Auto Protect is turned off SONAR Protection is also disabled In this case your computer is not protected against emerging threats To turn off or turn on SONAR Protection 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window in the left pane click Real Time Protection 176 Protecting your files and data About the Norton Internet Security scans 3 Inthe SONAR Protection row do one of the following To turn off SONAR Protection move the On Off switch to the right to the Off position To turn on SONAR Protection move the On Off switch to the left to the On position 4 Inthe Settings window click Apply About Real Time Exclusions Symantec Online Network for Advanced Response SONAR provides real time protection against threats and proactively detects unknown security risks on your computer SONAR identifies emerging threats based on the behavior of applications SONAR identifies
132. Symantec for analysis Classify the spam email messages effectively Instant Messenger Scan option lets you customize the scanning of the files the instant messenger programs receive You can select the supported instant messenger programs from which you may receive files Norton Internet Security scans the files that you receive from the selected instant messenger programs You can use the Protected Ports Settings option to protect the POP3 and SMTP ports that are associated with your email program Norton Internet Security automatically protects the default SMTP port 25 and the default POP3 port 110 If your email program is not configured with the default ports you can manually configure Norton Internet Security to protect your POP3 and SMTP ports Customizing protection features 479 About customizing settings and options 480 Customizing protection features About customizing settings and options The Network Cost Awareness option lets you set up policies and restrict the Internet usage of Norton Internet Security You can define the amount of network bandwidth that Norton Internet Security can use The Network Security Map option provides a pictorial representation of the devices on the network to which your computer is connected You can view the security status and trust level of the devices that are connected to the network to which your computer is connected Network Security Map al
133. To turn off detection of a disk burning session in the IMAPI 2 0 Disk Burn row move the On Off switch to the right to the Off position To turn on detection of a disk burning session in the IMAPI 2 0 Disk Burn row move the On Off switch to the left to the On position In the Settings window click Apply Click OK To turn off or turn on Media Center TV Recording 1 In the Norton Internet Security main window click Settings In the Settings window click the General tab In the left pane click Silent Mode Settings 4 Inthe Silent Mode Settings under Quiet Mode on Detection of do one of the following To turn off detection of a TV program recording session in the MediaCenter TV Recording row move the On Off switch to the right to the Off position To turn on detection of a TV program recording session in the MediaCenter TV Recording row move the On Off switch to the left to the On position In the Settings window click Apply 6 Click OK Protecting your files and data 193 About the Norton Internet Security scans About User Specified Programs Norton Internet Security automatically turns on Quiet Mode when it detects a TV program recording session or adisk burning session In addition you can manually add the programs for which you want Norton Internet Security to turn on Quiet Mode to the Quiet Mode Programs list When Norton Internet Security detects arunning instance of a program that you added in t
134. Tool Norton Bootable Recovery Tool detects and resolves the following security threats Viruses Trojan horses Hacking tools Spyware Adware Programs that infect another program boot sector partition sector or document by inserting themselves or attaching themselves to that medium Most viruses just replicate many also do damage Programs containing malicious codes that are disguised as or hiding in something benign such as a game or utility Tools that are used by a hacker to gain unauthorized access to your computer One type of hacking tool a keystroke logger tracks and records your individual keystrokes and can send this information back to the hacker Programs that can scan systems or monitor activity and relay the information to other computers or locations in cyberspace Programs that facilitate the delivery of advertising content through their own window or by using another program s interface Getting started 49 About Norton Bootable Recovery Tool Trackware Programs that track system activity gather system information or track user habits and relay this information to third party organizations The information that is gathered by such programs is neither personally identifiable nor confidential Trackware programs are installed with the user s consent and may also be packaged as part of other software that is installed by the user Downloading the Norton Bootable Recovery
135. Toolbars submenu do one of the following Uncheck Norton Toolbar to hide the toolbar Check Norton Toolbar to show the toolbar To hide or show the Norton Toolbar in the Chrome Web browser 1 At the top right corner of your Web browser click the Wrench icon 2 Inthe main menu that appears click Tools gt Extensions 3 Inthe Web page that appears under Extensions do one of the following Click Disable to hide the toolbar You can also hide the Norton Toolbar by right clicking the Norton Toolbar icon near the Wrench icon However you cannot enable the Norton Toolbar using the Norton Toolbar icon Click Enable to show the toolbar To hide the Norton Toolbar button in the Chrome Web browser At the top right corner of your Web browser right click the Norton Toolbar icon and then click Hide button option To show the Norton Toolbar button in the Chrome Web browser 1 At the top right corner of your Web browser click the Wrench icon 2 Inthe main menu that appears click Tools gt Extensions 3 Under Extensions page click Show button option 396 Securing your sensitive data About securing your sensitive data Accessing Identity Safe settings from the Norton Toolbar When you install Norton Internet Security it adds the Norton Toolbar to the Internet Explorer Firefox and Chrome Web browsers The Vault Open menu on the Norton Toolbar provides quick links to access the options under Identity Safe
136. Web page provide the details about your account information and then click Sign Up To create a Norton Account and register your product after activation 1 Inthe Norton Internet Security main window click Account 2 Inthe Complete Your Activation window type your email address and then click Next 3 Inthe Create your Norton Account window provide your account details and then click Next Your product information gets saved in your Norton Account only after you log in to your Norton Account 4 Inthe window that appears click Done To log in to your Norton Account and access your product information visit https account norton com Accessing your Norton Account The product key for each Norton product is conveniently stored in your Norton Account After you have created your Norton Account successfully you can access your account from anywhere in the world You can log in to your Norton Account any time by visiting the following URL https account norton com You can easily find and update your account product and billing information from your Norton Account You can also change your Norton Account password if required Your computer must be connected to the Internet to access your Norton Account 38 Getting started About Norton Management Symantec products that are older than the 2006 product year do not appear in your Norton Account To access Norton Account 1 Inthe Norton Internet Securi
137. a hearing will be determined by the AAA Rules Regardless of the manner in which the arbitration is conducted the arbitrator shall issue a reasoned written decision sufficient to explain the essential findings and conclusions on which the award is based If the arbitrator issues You an award that is greater than the value of Symantec s last written settlement offer made before an arbitrator was selected or if Symantec did not make a settlement offer before an arbitrator was selected then Symantec will pay You in addition to the award either U S 500 or 10 of the amount awarded whichever is greater Except as expressly set forth herein the payment of all filing administration and arbitrator fees will be governed by the AAA Rules YOU AND SYMANTEC AGREE THAT EACH MAY BRING CLAIMS AGAINST THE OTHER ONLY IN YOUR OR ITS INDIVIDUAL CAPACITY AND NOT AS A PLAINTIFF OR CLASS MEMBER IN ANY PURPORTED CLASS OR REPRESENTATIVE PROCEEDING Further unless both You and Symantec agree otherwise the arbitrator may not consolidate more than one person s claims with Your claims and may not otherwise preside over any form of a representative or class proceeding If this specific provision is found to be unenforceable then the entirety of this arbitration provision shall be null and void The arbitrator may award declaratory or injunctive relief only in favor of the individual party seeking relief and only to the extent necessary to provide r
138. ack or modification by unknown or suspicious applications Settings Password Protection Lets you set upa password to protect Norton Internet Security settings It protects the product settings from unauthorized access If you set a password you must enter the password each time that you want Customizing protection features 501 About customizing settings and options to view or configure your product settings However if you forget your settings password you can reset the password in the window that appears when you choose to uninstall Norton Internet Security You do not need to uninstall the product to reset your password You canuse the reset settings password option in the uninstall preference window to reset your password 502 Customizing protection features About customizing settings and options Silent Mode Settings Customizing protection features 503 About customizing settings and options Lets you turn on or turn off Silent Mode Your options are Silent Mode When you turn on the Silent Mode option Silent Mode is enabled for a specified duration Norton Internet Security suppresses all alerts and suspends the background activities for the duration that you specify Full Screen Detection When you turn on the Full Screen Detection option Norton Internet Security automatically detects the applications that are run in full screen mode and enables Silent Mode Nor
139. ad The reputation details that Download Insight provides indicate whether the downloaded file is safe to install There may be times when you want to turn off Download Insight For example if you want to download an unsafe file In this case you must turn off Download Insight so that Norton Internet Security lets you download the file and does not remove it from your computer 266 Protecting Internet activities About Download Insight You can use the Download Intelligence option to turn off or turn on Download Insight To turn off Download Intelligence 1 In the Norton Internet Security main window click Settings In the Settings window click the Web tab In the left pane click Download Intelligence In the Download Intelligence row move the On Off switch to the right to the Off position In the Settings window click Apply 6 Inthe Security Request dialog box in the Select the duration drop down list select how long you want to turn off Download Insight and then click OK In the Settings window click Apply and then click OK To turn on Download Intelligence 1 In the Norton Internet Security main window click Settings In the Settings window click the Web tab In the left pane click Download Intelligence In the Download Intelligence row move the On Off switch to the left to the On position In the Settings window click Apply and then click OK Configuring the Download Insight Noti
140. afe data amp You must log in to your Norton Account to create an online vault 362 Securing your sensitive data About securing your sensitive data Browsing Options Lets you configure the way you want Identity Safe to collect store and display the login information for the Web pages you visit You can configure Identity Safe to display your cards that you created for the Web sites that have forms You can also configure the autofill settings for the Web sites that contain security threats In addition you can do the following activities Configure the region for your card information Specify how you want Norton Identity Safe to use the autofill feature Set the options that make Identity Safe to display a message to notify you that you have inserted an external drive Set the options that make Identity Safe to warn you about the unsafe removal of external drives Turn off the browser s password manager Password amp Security Lets you change the password settings and the security level of your Identity Safe password cd You should change your Identity Safe password frequently to keep your Identity Safe data from being misused Securing your sensitive data About securing your sensitive data Lets you manage your personal information such as name date of birth email address and credit card information in one place You can use the information
141. ailable through LiveUpdate The SONAR Activity view in the Security History window displays details about the security risks that SONAR detects This category also lists any activity that modifies the configuration or the settings of your computer The More Details option for this category provides details about the resources that this activity affects Monitoring protection features 413 About Security History The firewall monitors the communications between your computer and other computers on the Internet The Firewall Network and Connections category in the Security History window displays information about the networks that your computer connects to It also displays the actions that you have taken to trust or to restrict networks and computers This category also displays a history of all of the TCP IP network connections that were made with your computer Network connections are logged when the connection is closed The Security History Advanced Details window for this category lets you modify trust or restrict settings for computers and networks 414 Monitoring protection features About Security History Firewall Activities Intrusion Prevention The firewall monitors the communications between your computer and other computers on the Internet The firewall maintains rules to control Internet access to and from your computer The Firewall
142. ake on quarantined items must be performed in the Security History Quarantine To open the Quarantine 1 Inthe Norton Internet Security main window click Advanced 2 Inthe Computer Protection pane click Quarantine To perform an action on a quarantined item 1 Inthe Security History window in the Quarantine view select the item on which you want to perform the action 2 Inthe Details pane click Restore amp Options You can use the More Details link to view more details about the item before you select an action for it The link opens the File Insight window that contains more information about the risk 438 Monitoring protection features About Security History 3 Inthe Threat Detected window select the action that you want to perform Some of the options are Returns the security risk that is quarantined to the original location on your computer This option is available only for the detected viral threats Returns the selected Quarantine item to its original location without repairing it and excludes the item from being detected in the future scans This option is available for the detected viral and non viral threats Removes the selected item from the Security History log Sends the selected item to Symantec for evaluation of the security risk In some cases Norton Internet Security might not identify an item as a security threat but you might suspect that the
143. alerts also appear in the list Network Cost Awareness lets you set up policies and restrict the Internet usage of Norton Internet Security You can define the amount of network bandwidth that Norton Internet Security can use The Network Cost Awareness view in the Security History window provides details about the actions that you performed to restrict the Internet usage of Norton Internet Security 418 Monitoring protection features About Security History In some cases you might have submitted evaluation of certain Web pages to Symantec The Sites Reported to Symantec view in the Security History window displays all the Web sites that you reported to Symantec to verify authenticity Norton Internet Security may generate errors in some cases For example an error can occur when you run LiveUpdate or scan a folder Engine errors timeout errors and program errors are some of the types of errors The Norton Error Reporting view in the Security History window displays any error that Norton Internet Security has generated Moni Email Errors Norton Community Watch oring protection features About Security History Email errors include any failure that occurs when Norton Internet Security tries to send download or scanan email message that you send or receive The Email Errors view in the Security History displays details about any Email Error alerts that
144. an My Facebook Wall 4 Inthe Facebook login Web page log in to your Facebook profile 5 Inthe Request for permission page click Allow 6 Inthe Web page that appears click Please grant us permission to access your News Feed and Wall 7 Follow the on screen instructions to let Norton Safe Web access your Facebook Wall About Idle Time Scans Norton Internet Security keeps your computer secure from ongoing threats by automatically running scans on your computer by using the Idle Time Scans feature Idle Time Scans detect the time when you do not use your computer and intelligently run scans depending on the scan history of your computer The Idle Time Scans option is automatically turned on when you install Norton Internet Security Even though Idle Time Scans automatically run the scans you can still customize the settings of Idle Time Scans Norton Internet Security decides when to run Idle Time Scans depending on your settings and a few other predefined parameters 172 Protecting your files and data About the Norton Internet Security scans The following list provides details on the settings that you can make and the predefined parameters You can set the duration after which Norton Internet Security should identify your computer as idle You can select a value in minutes between 1 minute and 30 minutes When you do not use your computer for the duration that you specify Norton Internet Security checks for the o
145. ans amp perform this scan by running an Insight Network scan on single file using the Custom Scan option on the Scans window Insight Network context menu scan When you right click a file the shortcut menu displays Norton Internet Security and then Insight Network Scan You can use this command to scan a file using both local definitions and definitions that are hosted in the Cloud This Insight Network Scan command is available only for single file Turning off or turning on Insight Protection Insight Protection option lets Norton Internet Security perform an Insight Network scan on your computer When the Insight Protection option is turned on Norton Internet Security performs a traditional scan and an Insight Network scan simultaneously The traditional scan uses the definitions from the local system and the Insight Network scan uses the definitions that are hosted in the Cloud Norton Internet Security performs only a traditional scan if the Insight Protection option is turned off Norton Internet Security performs an Insight Network scan only when the Insight Protection option is turned on By default the Insight Protection option is turned on To turn off or turn on the Insight Protection 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the General tab 3 Inthe left pane click Other Settings Protecting your files and data 155 About the Norton Internet Securit
146. any program or process Memory When this option is turned on Norton Internet Security detects and notifies you about the increased usage of memory by any program or process Disk When this option is turned on Norton Internet Security detects and notifies you about the increased usage of your disk by any program or process Handles When this option is turned on Norton Internet Security detects and notifies you 498 Customizing protection features About customizing settings and options about the increased usage of handles by any program or process Program Exclusions Lets you select specific programs to exclude from appearing in performance alerts Customizing protection features 499 About customizing settings and options Product Security 500 Customizing protection features About customizing settings and options Lets you protect Norton Internet Security from unauthorized changes Your options are Non Admins Access to Settings Lets you access and configure all the options in the Settings window from a non admin user account as well By default this option is turned off You need to log in to your computer as an administrator to turn on this option You cannot access the Settings window if the Settings window is opened in some other user account on your computer Norton Product Tamper Protection Lets you protect your Norton product from an att
147. ap window under Remote Monitoring click Setup 4 Inthe Remote Monitoring Setup window type a Passkey The Passkey should be between 6 and 20 characters in length The Passkey is case sensitive 5 Under Choose the default mode for Computer Discovery select one of the following options Lets your computer always discover other computers that are connected to the network Lets your computer discover other computers that are connected to the network when the Network Security Map window is open 6 Click OK 7 Set up Remote Monitoring for all other computers that you want to monitor remotely Turning off Remote Monitoring When you turn off Remote Monitoring you stop remote monitoring of the computers that are connected to your network You can turn off Remote Monitoring for the following All of the computers that you remotely monitor Anindividual computer that you remotely monitor You can turn off Remote Monitoring only after you complete the Remote Monitoring Setup process To turn off Remote Monitoring for all computers 1 Inthe Norton Internet Security main window Click Advanced Protecting Internet activities 311 About the Network Security Map 2 Under Network Protection click Network Security Map 3 On the left side of the Network Security Map window under Remote Monitoring click Disable 4 Inthe confirmation dialog box click Yes To turn off Remote Monitoring for an individual computer
148. appear in the future check the Don t show this again option before you click Close Norton Internet Security notifies the successful integration of Norton AntiSpam with your email client Norton AntiSpam also automatically imports the lists of addresses from the supported email programs during the initial client integration It helps you keep your list of allowed and blocked email senders in sync with your current address books When Norton AntiSpam imports the addresses from your Outlook address book or Windows address book it also imports the addresses that are available in the Safe Sender and the Blocked Sender lists Norton Internet Security supports Norton AntiSpam integration with the following email programs gt Microsoft Outlook 2002 2003 2007 2010 Outlook Express 6 0 or later Norton Internet Security supports only the 32 bit version of Microsoft Outlook 2010 After successful integration Outlook Express restarts automatically To configure Client Integration 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Message Protection 4 Under AntiSpam in the Client Integration row click Configure 5 In the Client Integration window check the programs with which you want Norton AntiSpam to integrate 288 Protecting Internet activities About Norton AntiSpam 6 Select one or more address books to be imported automatically
149. as long as you have an active subscription with the current product If anew version of your product is available Norton Internet Security lets you download the new version The Automatic Download of New Version option automatically downloads the latest available version of Norton Internet Security and prompts you for free installation To get the latest version of Norton Internet Security you need to turn on the Automatic Download of New Version option To turn on the Automatic Download of New Version option go the Norton Internet Security main window and then click Settings Finding additional solutions 517 About upgrading your product gt Updates gt Automatic Download of New Version gt On If you choose to install the latest version of the product Norton Internet Security downloads and seamlessly installs the latest version Ensure that you have saved all your important data such as pictures and financial records before you install the new version of the product If you download and install the latest version of your product your subscription status remains the same as your previous version of product For example you have 200 days of subscription left with your current version of product and you upgrade your product to the latest version In this case the subscription status of your upgraded product remains 200 days only If anew version is not available the Web page informs you that no new version is available and
150. as product key and the registration date You can also buy a new product key to protect additional computers You can use the Update option to check and download the latest product version using Norton Update Center Contains order information of the Norton products you bought from Norton online store 34 Getting started About your Norton Account Saves your account information and your billing details The Profile options are Account Information You can update your Norton Account information and your shipping address on the Account Information tab After you update click Update to save the changes Billing Information You can Save your credit card information and your billing address on the Billing Information tab It makes it easier for saving online orders After you update click Update to save the changes Change Password You can change your current Norton Account password on the Change Password tab You can use the icons at the bottom of your Norton Account Web page to access and use the following Norton Online Family Norton Online Family monitors and manages your child s Internet activities and computer usage Getting started 35 About your Norton Account Norton Online Backup Norton Online Backup provides a secure and easy to use online backup solution that safeguards your important data against system crash accidental deleting virus infection and other disasters Nort
151. as required See Configuring the scan options on page 143 8 Click Save Selecting the scan items When you configure a custom scan you must select the items that you want to include in the scan You can include individual files folders or drives You can include multiple drives folders and files to add to the scan You can also exclude items from the scan When you select a drive all the items in the drive including the files and folders are automatically added to the scan When you select a folder all of the files in folder are added to the scan To select the scan items 1 Inthe Norton Internet Security main window click Scan Now 2 Inthe Computer Scan pane click Custom Scan 3 Inthe Scans window do one of the following To add items for a new scan click Create Scan You must provide a name for the scan in the Scan Name box To add items for an existing scan in the Edit Scan column click the edit icon for the scan that you want to modify Protecting your files and data 143 About the Norton Internet Security scans 4 Inthe window that appears on the Scan Items tab do the following To add drives click Add Drives in the Scan Drives dialog box select the drives to be scanned and click Add To add folders click Add Folders in the Scan Folders dialog box select the folders to be scanned and click Add To add files click Add Files in the Files to Scan dialog box select the files t
152. at block malware intrusion when you start your computer d This feature is available only in Windows 8 470 Customizing protection features About customizing settings and options Updates Customizing protection features 471 About customizing settings and options Norton Internet Security protects your computer from vulnerabilities through the latest program and definition updates Definition updates contain the information that lets Norton Internet Security recognize and alert you to the presence of a specific virus or security threat You can use the options in the Updates section to obtain the latest virus definitions and keep your computer secure from the latest security threats Your options are Automatic LiveUpdate Automatic LiveUpdate automatically checks for definition updates and program updates to your virus protection when you are connected to the Internet Pulse Updates In addition to the definition updates that Automatic LiveUpdate downloads Norton Internet Security uses streaming technology to download the latest virus definitions These downloads are called Pulse Updates The Pulse Updates are lighter and faster and keep your computer secure from the ongoing threats on the World Wide Web Automatic Download of New Version Automatically downloads the 472 Customizing protection features About customizing settings and options latest available version and
153. at appears in the Reset Password Key box type the randomly generated key that is displayed against Reset Password Key 6 Inthe New Password box type the new password 7 Inthe Confirm New Password box type the new password again 8 Click OK About Remote Management The Remote Management feature lets you remotely manage Norton Internet Security using Norton Studio app Norton Management and Norton One It allows Norton Internet Security to send the product related details to Norton Management Norton One and Norton Studio app The details that Remote Management publishes help you view and fix some security issues of the device By default this feature is disabled unless you register your Norton Internet Security with your Norton Account Norton Studio is a Metro App and works only on Windows 8 But you can view the security status and fix security issues of your devices running earlier versions of Windows from Norton Studio app In this case you must turn on the Remote Management option in your Norton product that is installed on your devices For example you have a Norton Studio app and Norton 360 installed on your laptop running Windows 8 You also have Norton Internet Security and Norton AntiVirus installed on your desktops running Windows XP and Vista respectively In this case you can view the security status of all three devices in the Norton Studio app If any of the device is at risk you can also fix them from t
154. at logs you in 4 Inthe Savenew password for login menu bar click Save About Edit Cards The Edit Cards option in Identity Safe lets you manage your personal information such as name date of birth email address and credit card information in one place You can use the information that you store in the cards to do the following Automatically fill forms Provide sensitive information without having to type it while you are online In this way Identity Safe protects you from keyloggers that steal and misuse your identity db Some Web sites have forms with fields for credit cards or other personal information The Vault Open menu on the Norton Toolbar lists the cards that you created for autofill You can choose a card from the list to fill the forms automatically You can add view edit and duplicate the details of any card that you create You can also delete a card if it is no longer needed In addition Edit Cards provides you the following features Lets you password protect the card to protect yourself from misuse of your sensitive information and personal information Recognizes the Web pages that have forms and immediately displays a pop up window with the list of cards Provides you a quick view of any of your cards that is not password protected Identity Safe provides additional security for your password protected cards by not displaying the summary of the card 376 Securing your sensitive d
155. at that time you receive an alert that reminds you to activate the product You can also activate your product from the Norton Internet Security main window If you do not activate the product within the time period that the alert specifies the product stops working You can activate it after the time period has elapsed but you are not protected until you activate the product Activating your product If you did not activate your product during installation you receive an activation needed alert regularly until you activate the product Product activation reduces software piracy and ensures that you use authentic Symantec software Activation provides you with a specified period of subscription to your Norton product You can also renew your subscription to continue using Norton Internet Security You must activate your product within the time period that the alert specifies or your product stops working You can activate your product directly from the activation needed alert or from the main window Activation should take only a few minutes Getting started 15 Activation protects you During activation the Norton Account window appears You can create your Norton Account and register your product You can also view details such as your product key your registration date and recent updates to the product If you skip the Norton Account window the product is activated but the product key is not saved in the Norton Acco
156. at you add Manually configured Firewall settings for programs override any settings that Automatic Program Control makes However Symantec recommends you to retain the settings that Automatic Program Control makes as and when you run your programs To add a program to Program Control 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Smart Firewall 4 Under Smart Firewall in the Program Control row click Configure 5 Inthe Program Control window click Add 6 In the Select a program dialog box browse to the executable file for the program that you want to add 7 Click Open 8 Inthe Security Alert window analyze the reputation information of the program Norton Internet Security fetches and displays the reputation information and the recommended access setting 222 Protecting Internet activities About the Smart Firewall 9 Inthe Options drop down list select the access level that you want this program to have Your options are Allow all access attempts by this program Deny all access attempts by this program Create the rules that control how this program accesses the Internet You can set the following criteria for a rule Action Connections Computers Communications m Advanced Description If you select this option you must follow the instructions in the wizard that appears and configure
157. at you suspect is a phishing site but Antiphishing reports that no fraud was detected In either case you can report the Web site to Symantec for further evaluation The Web site you want to report to Symantec for further evaluation must be kept open in your Web browser To report an incorrect evaluation of a suspicious Web site 1 Open your browser and go to the Web site that you think is suspicious 2 Onthe Norton Toolbar in the Norton menu click Report site 3 Inthe dialog box that appears verify that the Web site address and click Submit 4 Inthe confirmation dialog box click Close To report an incorrect evaluation of a safe Web site 1 Open your browser and go to the Web site that you think is safe 2 On the Norton Toolbar in the Norton menu click Report site 3 In the dialog box that appears verify that the Web site address and click Submit 4 Inthe confirmation dialog box click Close Turning off or turning on Antiphishing Antiphishing protects you from visiting unsafe Web sites The Antiphishing feature in Norton Internet Security analyzes the security level of all the Web sites that you visit and displays the results in the Norton Site Safety pop up window Antiphishing also blocks Securing your sensitive data 335 About securing your sensitive data navigation to the Web sites that are confirmed to be fraudulent The Norton Site Safety pop up window helps you understand if the Web site that you vis
158. ata About securing your sensitive data Identity Safe automatically detects login fields which are not auto filled or filled incorrect by Identity safe in the Web pages and displays the Need Assistance menu bar below the Norton Toolbar in your browser The Need Assistance menu bar lets you choose the required card from the list of cards that you have saved You can also click Login Assistant option to select the card to fill the Web site with the details that are saved in the card You can also copy and edit the required fields from the selected card in the Login Assistant window By default the important data such as Passwords Credit Card number and birth date are hidden you need to select Show option to view and copy the data Symantec recommends you to clear your data copied from the cards by selecting Clear Clipboard option Adding cards The cards in the Edit Identity Cards window help you to automatically fill forms on Web sites with a single click You can create cards to store information such as personal details contact details and credit card details You can provide a card name to help you identify a specific card If you have more than one credit card you can create multiple cards with different sets of information When you visit a transactional Web site you can provide the credit card details that are present in any of the cards that you created You can also create anonymous cards for use on unfamiliar Web sit
159. atures 487 About customizing settings and options Lets you configure your Norton Tasks settings Your options are Automatic Resume Delay From Sleep or Hibernation This option delays the automatic background tasks for a specific duration even if your computer is idle for that period You can specify Automatic Resume Delay duration for a period of one minute to 20 minutes By default the Automatic Resume Delay From Sleep or Hibernation option is set to 10 minutes Automatic Tasks Delay Lets you delay the start up of Norton specific programs on your computer that run automatically when you turn on your computer Automatic Tasks Delay does not delay Norton Internet Security protection You can specify Automatic Tasks Delay duration for a period of one minute to 20 minutes The default duration is 20 minutes Idle Time Optimizer Lets you configure Norton Internet Security to 488 Customizing protection features About customizing settings and options defragment your boot volume or the local disk that contains the boot volume when your computer is idle When the option is turned on Norton Internet Security automatically schedules the optimization after you install an application on your computer Optimization improves the performance of your computer by defragmenting the fragmented parts of the disk Idle Time Out Lets you specify the Idle Time Out duration after Norton Interne
160. blem if your computer is unable to connect to the Internet 1 Inthe Norton Internet Security main window click Support 2 Inthe Support drop down menu click Get Support 3 Follow the on screen instructions in the Checking Your Connection window to attempt to correct your connection issue 4 Inthe Checking Your Connection window click Retry 5 If you use a proxy server to connect to the Internet you may be prompted to authenticate If you are prompted then in the Proxy Settings Detected window do the following In the Username box type the user name that you provided when you configured your Network Proxy settings Inthe Password box type the password that you provided when you configured your Network Proxy settings Click OK 6 Ifthe problem still persists in the Norton Autofix window click the click here link Under Support Contact Numbers select the region and then your country to view the contact details You can use the contact details to contact the technical support team Staying informed about protection issues If you need help using Norton Internet Security you can find helpful information on the Symantec Web site It contains many useful and informative features that are especially designed to complement Norton Internet Security including the following Detailed background information about current threats and outbreaks 522 Finding additional solutions Staying informed about protectio
161. bout securing your sensitive data amp About Edit Notes card to fill the Web site with the details that are saved in the card You can also copy and edit the required fields from the selected card in the Login Assistant window By default the important data such as Passwords Credit Card number and birth date are hidden you need to select Show option to view and copy the data Symantec recommends you to clear your data copied from the cards by selecting Clear Clipboard option Identity Safe stores and manages your sensitive information It becomes difficult to manage all of the identity numbers that you use when you browse the Web The Edit Notes option in Identity Safe stores all your sensitive IDs in a very secure way and lets you use them easily when you are online You can use Edit Notes to save information such as social security number driver s license number insurance policy number and legal and financial information Editing Notes You can use the Edit Notes option in Identity Safe to store your personal information which you can retrieve and use when needed You can use this information to fill out Web site registration forms You can also view edit and delete the notes that you have saved To create Notes 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Under Identity Safe in the Edit Notes row click Co
162. c collects If your computer is not connected to the Internet Norton Internet Security uses the reputation information that is available locally Protecting Internet activities 259 About the Smart Firewall In the left pane of the firewall alerts you can find the following reputation information Stability Shows the stability rating of the file on your computer The stability rating depends on how frequently the program crashes The different stability ratings are as follows Reliable Indicates that the program is reliable Stable Indicates that the program is comparatively stable However it crashes sometimes Slightly Unstable Indicates that the program is slightly unstable Unstable Indicates that the program is unstable Very Unstable Indicates that the program frequently crashes Unknown Indicates that the crash history of the program is not known amp Stability ratings vary depending upon your operating system 260 Protecting Internet activities About the Smart Firewall Prevalence Shows the user prevalence of the file This data is based on the information that millions of Norton Community Watch customers shared and Symantec s research analysis The different categories are Very Few Users Indicates that the file has very low user prevalence Few Users Indicates that the file has average user prevalence Many Users Indicates that the file has high user prevalence
163. can 133 accessing Norton Internet Security scans Computer Scan 133 Reputation Scan 133 Actions window deleting security risks 421 performing actions 421 restoring security risks 421 submission items to Symantec 421 activation about 13 alerts 14 Norton Account 32 problems 17 procedure 14 troubleshooting 17 Add Rule Wizard opening 224 using 225 Address Book Exclusions setting 288 addresses adding allowed 289 adding blocked 291 importing allowed 289 Advanced Mode allow anevent 174 adware about 282 found by Auto Protect 201 in freeware programs 282 protection features 447 Aggressive SONAR Protection 174 alerts responding to 217 Worm Blocking 206 Allowed List 289 Antiphishing about 332 hiding the toolbar 394 showing the toolbar 394 turning off 334 turning on 334 AntiSpam about 284 Address Book Exclusions 288 Allowed List 289 Blocked List 291 Client Integration 286 configure 285 Feedback 295 settings 285 Web Query 296 Index Antispyware managing using the main window 283 Application Ratings check trust level 118 Scan Performance Profiles 120 attack signatures 272 attacks network 212 attention infected files 208 infected items 140 resolve any items 140 Attention Required about 140 resolving the risk 140 Auto Protect functions 443 notifications 201 turning on and off 452 automatic features disabling 452 Automatic LiveUpdate turning off or turning on 72 Automatic Program Contro
164. can all the files in your computer you must clear the reputation information of the excluded files To clear IDs of files that are excluded during scans 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window in the left pane click AntiVirus and SONAR Exclusions Protecting your files and data 181 About the Norton Internet Security scans 3 In the Clear file IDs excluded during scans row click Clear All 4 Inthe Warning window click Yes 5 Inthe Settings window click Apply and then click OK About scanning Office documents Norton Internet Security protects all Office documents that you receive through email messages through Internet download and through inserted floppy disks or other removable media By automatically scanning all Office files Norton Internet Security maintains a higher level of security Norton Internet Security scans the Office document when you open them You can use the Microsoft Office Automatic Scan option in the Settings window to scan documents of the following Microsoft Office applications Microsoft Word Microsoft Excel Microsoft PowerPoint Microsoft Visio Microsoft Access Microsoft Project Norton Internet Security scans the Office documents and protect against threats including virus macros and infected embedded objects By default the Microsoft Office Automatic Scan option in the Settings window is turned off Turn on this optio
165. ccount If you have Identity Safe data that is stored on any external drives from the older versions of Norton Internet Security you can convert that portable profile to local vault or online vault When you connect your external drive to your computer the Vault Open menu in the Norton Toolbar provides option to merge the Identity Safe data from your portable profile You can merge the data from the portable profile to your local vault or online vault Securing your sensitive data 349 About securing your sensitive data In addition to the features such as saving logins cards and notes you can do the following using your Identity Safe vault Import your Identity Safe data from the file you already backed up You can also import the data that you stored in portable profile from an older version of the product to the current version Export your Identity Safe data to DAT file Reset your Identity Safe About creating Identity Safe vaults Identity Safe helps you manage your sensitive information and provide additional security while you perform online transactions The various features in Identity Safe provide a secure storage for your personal information such as your address login information passwords and credit card details Identity Safe lets you create an online vault and save your Identity Safe data You can create one online vault for each Norton Account You cannot create a new local vault but use your existing
166. ced Settings row click Configure 234 Protecting Internet activities About the Smart Firewall In the Advanced Settings window in the General Rules row click Configure In the General Rules window select the rule that you want to change Click Modify In the Modify Rule window make the necessary changes to modify any aspect of the rule When you have finished changing the rule click OK 10 In the General Rules window click OK 11 In the Advanced Settings window click OK To modify a Program rule 1 In the Norton Internet Security main window click Settings In the Settings window click the Network tab In the left pane click Smart Firewall Under Smart Firewall in the Program Control row click Configure In the Program Control window in the Program column select the program that you want to change Click Modify You can also use the Access drop down list next to the program to modify the access level for the program Accordingly Smart Firewall modifies or creates the relevant rule for the program In the Rules window select the rule that you want to change Click Modify In the Modify Rule window make the necessary changes to modify to change any aspect of the rule 10 When you have finished changing the rule click OK 11 In the Rules window click OK 12 In the Program Control window click OK Protecting Internet activities 235 About the Smart Firewall Changing the order of f
167. ces from the network map and create a new list of devices For example you can purge all the devices that were present in your previous network before you connect to a new network Ensure that you disable Remote Monitoring before you purge the network map Norton Internet Security cannot purge the network map when the Remote Monitoring is turned on Also ensure that you close the Network Security Map window before you purge the network map You cannot purge the network map when the Network Security Map window is open Norton Internet Security purges the devices that you add manually in the Trust Control network depending upon their trust level It does not purge the devices that have a trust level as Full Trust or Restricted Protecting Internet activities 323 About the Network Security Map When you remove an individual device the online devices appear again the next time you open the Network Security Map However Norton Internet Security permanently removes the offline devices To remove an individual device 1 Inthe Norton Internet Security main window click Advanced 2 Under Network Protection click Network Security Map 3 Inthe Network Security Map window do one of the following To remove a device that is on your network in the network map click the device To remove a device that you manually added in the Network Details drop down list select Trust Control and then click the device 4 On the left side of t
168. chapter includes the following topics What to do if a security risk is found What to do if a security risk is found Your product provides many solutions and features for handling viruses and other security threats that it detects When Norton Internet Security detects a security risk on your computer you must take appropriate action on the risk Norton Internet Security notifies you when it detects a security risk You can view details about the risk in the window that appears and select an action that you want Norton Internet Security to perform on the risk By default Norton Internet Security removes the security risk from your computer and quarantines it However you can restore the file from the Quarantine to its original location and exclude it from future scans Exclude a program from Norton Internet Security scans only if you are confident that the program is safe For example if another program relies on a security risk program to function you might decide to keep the program on your computer In some cases Norton Internet Security requires your attention to manually resolve the detected security 200 Responding to security issues What to do if a security risk is found risk You can access the Symantec Security Response Web site and refer the manual removal instructions In some cases Norton Internet Security might not identify an item as a security threat but you might suspect that the item is infected I
169. characters each separated by hyphens The location of the product key varies depending on how you acquired the product The locations of the product key are as follows The product key is either on a sticker on the CD sleeve or on an insert in the product package The product key is on the DVD package The product key is stored on your computer as part of the download process and is included in the confirmation email from the Symantec Store The product key is provided as part of the activation process Be sure to save your product key by creating or signing in to your Norton Account or by printing the key You may need the product key if you ever want to reinstall your product Getting started 17 Activation protects you The product key is printed on the card along with instructions on how to use it Be sure to save your product key by creating or signing in to your Norton Account You need the product key if you ever want to reinstall the product To recover or access your 1 product key log on to https account norton com If you are not registered register for Norton Account You can find the product key on the Products tab in the Norton Account page About problems during activation If you cannot connect to the Symantec servers to activate your product first check your Internet connection You then need to see if you have parental cont
170. chments or instant messenger attachments You can also use the options in the Network tab to protect your computer against intrusion attempts and unauthorized traffic 474 Customizing protection features About customizing settings and options Your options are Intrusion Prevention Customizing protection features 475 About customizing settings and options Intrusion Prevention scans all the network traffic to and from your computer and compares this information against a set of attack signatures Attack signatures contain the information that identifies an attacker s attempt to exploit a known vulnerability in the operating system or ina program If the information matches an attack signature Intrusion Prevention blocks the traffic from the suspicious computer The following are some activities that you can do using the Intrusion Prevention options View the list of Intrusion Prevention signatures Exclude individual signatures from being monitored Specify whether or not you must be notified when Intrusion Prevention signatures are detected Activate AutoBlock for a specified duration to block all incoming traffic from a computer that continues to attack your system View restrict or unblock the list of computers that AutoBlock blocks View or unblock the list of computers that AutoBlock blocks Determine whether or not you are notified when Intrusion Prevention activities are detected 476
171. ck Edit You can view the details of the network in the Edit Network Details window before you change the trust level 318 Protecting Internet activities About the Network Security Map 5 To select a trust level for a network in the Edit Network Trust Level window click one of the following Adds the network to the Trusted list All the network traffic that your computer receives from a Trusted network is filtered and allowed through firewall However known attacks and infections are still monitored You should select this setting only when you are sure that the network is completely safe Adds the network to the Shared list All the network traffic that your computer receives from a Shared network is filtered Only shared resources on your computer such as files folders and printers are allowed You should select this setting if you want the firewall to protect you from all traffic except those that pertain to file and printer sharing Adds the network to the Protected list A network is in the Protected Trust Level when it has not been classified as Trusted Shared or Restricted You remain protected from known attacks and all unexpected traffic Protecting Internet activities 319 About the Network Security Map Adds the network to the Restricted list The devices that are on Restricted network cannot communicate with your computer However you can still use the network to browse Web sites
172. click the Web tab 3 Inthe left pane click Safe Surfing Securing your sensitive data 343 About securing your sensitive data 4 Inthe Norton Safe Web row do one of the following To turn off Norton Safe Web in the Norton Safe Web row move the On Off switch to the right to the Off position To turn on Norton Safe Web in the Norton Safe Web row move the On Off switch to the left to the On position 5 In the Settings window click Apply 6 Click OK Turning off or turning on Scam Insight Scam Insight prevents you from divulging your sensitive information such as Social Security Numbers or credit card information to fraudulent Web sites It helps you detect the Web sites that are suspicious or vulnerable using reputation based threat detection It mainly focuses the Web sites that require you to enter your personal information You can turn on or turn off the Scam Insight feature using the Scam Insight option from the Safe Surfing section of the Settings window The Safe Surfing section is available in the Web tab The Norton Site Safety pop up window helps you understand if the Web site that you visit is safe or unsafe To turn off or turn on Scam Insight 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Safe Surfing 4 Inthe Settings window under Detailed Settings click Identity Protection 344 Securing your sensitive
173. computer from newly discovered threats The LiveUpdate view in the Security History window shows the details of the LiveUpdate activities on your computer The details include the severity the status and the duration of the LiveUpdate sessions on your computer Monitoring protection features 421 About Security History 4 Click a row to view details for that item If you want to view additional information about an item click the More Details option in the Details pane or double click the particular row You can view the advanced details about the item in the Security History Advanced Details window and take actions as needed For some categories the More Details option opens the File Insight window that displays the details about the selected Security History event You must use the Options link in the Security History window to select an action that Norton Internet Security must perform on any item in these categories The Options link is also available in the File Insight window for certain items About the Security History Advanced Details window The Security History Advanced Details window lets you view more information about the items that you select in the Show drop down list in the Security History window You can also perform any action that is available for the selected item from this window 422 Monitoring protection features About Security History The following table lists the categories that provid
174. ction status When you connect a new device to your network Norton Internet Security automatically refreshes the Network Security Map window and displays the device db Norton Internet Security requires you to configure the Symantec Security Driver to open the Network Security Map You cannot install the Symantec Security Driver when you run LiveUpdate You can either allow the Norton LiveUpdate to complete or close the Norton LiveUpdate session before you install the Symantec Security Driver To view devices on the Network Security Map 1 Inthe Norton Internet Security main window click Advanced 2 Under Network Protection click Network Security Map 304 Protecting Internet activities About the Network Security Map 3 Ifthe Product Configuration panel appears click Continue The Product Configuration panel appears when you click Network Security Map for the first time The Product Configuration panel helps you install Symantec Security Driver that is required to view the Network Security Map window The process of installation of the Symantec Security Driver disrupts your network connection temporarily 4 Ifthe Network Security Overview window appears click OK The Network Security Overview window lets you view the summary of features of the Network Security Map The Network Security Overview window appears in the following instances When you open the Network Security Map window for the first time When you turn o
175. ctions window 421 adding items to the Quarantine 408 firewall alerts 408 full alert history 408 importing or exporting 434 manual scan results 408 network alerts 408 opening 407 Quarantine 436 Quick Search 434 Security History continued recent alert history 408 searching 434 security risks 408 submission items to Symantec 408 suspicious email 408 traffic alerts 408 viewing items 408 viewing quarantineditems 408 security protection about 448 security risks about 282 447 adding to Quarantine 439 assessment 447 attacks 212 found by Auto Protect 199 201 managing protection using the main window 282 other programs 282 port scans 212 protection features 447 restoring 447 restoring from Quarantine 439 scan 447 security status indicator viewing 31 self healing 519 Settings accessing 459 configuring 459 customizing 458 Miscellaneous 484 settings password resetting 509 turning off 509 Settings Password Protection about 507 configuring 508 resetting 509 Index 545 Settings Password Protection continued turning off 509 Signature Exclusions about 178 Signature Ezclusions excluding items 178 signatures including and excluding 274 Silent Mode about 182 Full Screen Detection 186 Media Center Extender 186 turning off 185 187 turning on 185 187 484 turning on manually 184 Smart Definitions about 67 turning on or turning off 68 Smart Firewall about 211 customizing 214 options 242 SONAR Protection
176. curity threats Full System Scan performs a deep scan of your computer to remove viruses and other security threats It checks all boot records files and running processes to which the user has access Consequently when you run a Full System Scan with administrator privileges it scans more files than when you run it without administrator privileges Norton Internet Security automatically runs a Full System Scan when your computer is in idle state ch Full System Scan scans all the local drives mapped network drives and removable drives except floppy drives You can also minimize and run a Full System Scan in the background 136 Protecting your files and data About the Norton Internet Security scans wee ap Custom Scan Scans a specific file folder drive or removable drive that you choose Computer Scan provides details about the scanned items You can view the details such as total number of files scanned security risks detected security risks resolved and the total items that require attention It also provides you the different ways to resolve any items that were not automatically resolved during the scan You can also view the severity of the risk the name of the risk and the status of the risk about the resolved items Running a Full System Scan Full System Scan performs a deep scan of the system to remove viruses and other security threats It checks all boot records files and r
177. curity monitors the overall system CPU usage and memory usage and the Norton specific CPU usage and memory usage The CPU tab and the Memory tab at the top of the Performance graph display the CPU graph and the memory graph respectively The Zoom options provide you the magnified view of the CPU graph and memory graph For example if you select the 10min option Norton Internet Security displays the magnified view of CPU graph or memory 96 Monitoring your system s performance About System Insight graph for the last 10 minutes If you select the 1W option Norton Internet Security displays the CPU graph and memory graph for the last one week By default the graphs display performance time for the last 90 minutes To view CPU graph and memory graph 1 Inthe Norton Internet Security main window click Performance 2 Inthe Performance window do one of the following To view the CPU graph click the CPU tab To view the memory graph click the Memory tab To magnify or shrink the graph click 10min 30min 1D 1W or 1M next to the Zoom option Obtaining historical data of your CPU and memory usage The Zoom options also provide you the historical data of the CPU graph and memory graph For example if you select the 1D option Norton Internet Security displays the data of CPU graph or memory graph for the last one day To view historical data of your CPU or memory usage 1 Inthe Norton Internet Security main window cl
178. currently blocked by AutoBlock do one of the following To unblock one computer select its IP address and then click Unblock 6 Click OK Permanently blocking a computer that has been blocked by AutoBlock You can permanently block a computer that AutoBlock has blocked The permanently blocked computer is removed from the AutoBlock list and added as a Restricted computer in the Network Security Map To permanently block a computer that has been blocked by AutoBlock 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Intrusion Prevention 4 Under Intrusion Prevention in the Intrusion AutoBlock row click Configure 5 Inthe Intrusion AutoBlock window under Computers currently blocked by AutoBlock click the computer that you want to block permanently 6 Under the Action column select Restrict 7 Click OK About Intrusion Prevention exclusion list The Intrusion Prevention System in Norton Internet Security scans all the network traffic that enters and exits your computer When a device on your network requests access to your computer Intrusion Prevention scans this request to ensure that it is not a virus attack If the information matches an attack signature Intrusion Prevention blocks the traffic from the suspicious device and protects your computer 278 Protecting Internet activities About Intrusion Prevention Scanning
179. d You agree to such updated terms B Certain software uses content that is updated from time to time including but not limited to the following software antivirus and crimeware software use updated virus definitions antispyware software uses updated spyware definitions antispam software uses updated antispam rules content filtering and antiphishing software use updated URL lists some firewall software use updated firewall rules vulnerability assessment products use updated vulnerability data and web site authentication software uses updated lists of authenticated web pages these updates are collectively referred to as Content Updates or alternatively referred to as Protection Updates or Security Updates at times You shall have the right to receive Content Updates for the Software during Your Service Period 3 Product Installation Required Activation A During the installation process the Software may uninstall or disable other security products or features of such products if such products or features are incompatible with the Software or for purposes of improving the overall functionality of the Software B There may be technological measures in this Software that are designed to prevent unlicensed or illegal use of the Software You agree that Symantec may use these measures to protect Symantec against software piracy This Software may contain enforcement technology that limits the ability
180. d to UDP communications The rule applies to ICMP Internet Control Message Protocol communications This option is available only when you add or modify a General rule The rule applies to ICMPv6 Internet Control Message Protocol for Internet Protocol version 6 communications This option is available only when you add or modify a General rule 232 Protecting Internet activities About the Smart Firewall All The rule applies to all supported protocols When you select this option you cannot specify the types of communications or ports that apply to the rule 7 Select the ports for the rule Your options are All types of communication all ports local and remote Only communications that match all types and ports listed below The rule applies to communications that use any port The rule applies to the ports that you specify You can specify the ports by selecting from the listed ports or by adding specific ports or port ranges cd Ifyou select ICMP or ICMPv6 protocol you can specify the commands To do so select a command from the list of known commands or add specific commands or command ranges When you select this option the Add option becomes available You can use the Add option or the Remove option to specify or remove a port or a command Protecting Internet activities 233 About the Smart Firewall 8 Click Next 9 Check Create a Security H
181. d your financial information such as credit card details You can also manage other personal information such as social security number or driver s license number You can also safely browse the Internet In addition you can protect your Web browser against attacks by malicious Web sites You can also configure Norton Internet Security to indicate whether the executable file that you download is safe to install or not Your options are Browser Protection Download Intelligence Identity Safe Safe Surfing Customizing protection features 463 About customizing settings and options Lets you configure the appearance and security of your product In addition you can configure how Norton Internet Security submits risk details to Symantec You can specify your proxy settings to obtain definition updates You can also configure Silent Mode Performance Monitoring Idle Time Out duration Monthly Report and other miscellaneous options Your options are Norton Tasks Other Settings Performance Monitoring Product Security Silent Mode Settings If you set a password to access the Settings window you must enter the password to view or configure settings even if you are an administrator Therefore ensure that you set an easy password However if you forget your settings password you can reset the password in the window that appears when you choose to uninstall Norton In
182. data About securing your sensitive data 2 Type your login details and then click the option or link that logs you in Norton Internet Security automatically saves your login details when you enter them for the first time To save additional logins for a Web site 1 Goto the Web page for which you want to save another login Your login credentials automatically appear on the Web page 2 Clear the login credentials that appear on the Web page 3 Type the new login and then click the option or link that logs you in 4 On the Norton Toolbar in the Login Saved to Your Vault row click Options 5 Inthe Save Login for Site dialog box type a name for your login in the Name box select the folder in which you want to save your login from the Folder drop down list 6 Click Save Editing logins Edit Logins lets you view all of the logins that you want Identity Safe to manage Edit Logins provides the following features Lets you safely store Web site login information Lets you save multiple IDs or accounts and passwords for a Web site Lets you organize your logins under various folders Intelligently searches for a particular login Lets you save the Web site name with a name other than the default name Displays the login ID and lets you show or hide the password Displays the strength of the password for each of the logins Securing your sensitive data 369 About securing your sensitive data Lets you quickly
183. dd the programs that consume high CPU memory or disk usage to the Program Exclusions list When you add a program to the Program Exclusions list Norton Internet Security does not alert you when the program exceeds the resource consumption threshold limit To exclude a program from performance alerts 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the General tab 3 Inthe left pane click Performance Monitoring 4 Under Performance Monitoring in the Program Exclusions row click Configure 5 Inthe Program Exclusions window click Add 6 In the Select a program dialog box browse to the executable file for the program that you want to add 7 Click Open 8 Inthe Program Exclusions window click Apply 9 Click OK 10 In the Settings window click Apply 11 Click OK Removing programs from Program Exclusions The Program Exclusions window lists all the programs that are excluded from performance alerts If you want you can remove any of the programs that you already added to the Program Exclusions window When you remove a program the program appears in the performance alert the next time it crosses the defined threshold limit for resource consumption To remove a program from Program Exclusions 1 Inthe Norton Internet Security main window click Settings 94 Monitoring your system s performance About System Insight 2 Inthe Settings window click the General tab
184. dentify spam email messages The email messages that the local filters do not identify as spam are then scanned additionally through the Web Query filter Web Query filter analyzes the signature and URL hashes of the email messages to classify them as legitimate email or spam email If the email message is identified as spam then Norton AntiSpam alters the subject of the email message 298 Protecting Internet activities About configuring POP3 and SMTP ports Norton AntiSpam then sends the email message to your email program Based on predefined email rules the email program then moves the email message to the Junk folder or the Norton AntiSpam folder Symantec recommends you to keep the Web Query option turned on Turning off the Web Query option increases your exposure to the spam email messages that contain phishing or spam URLs To turn off the Web Query filter 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Message Protection 4 Under AntiSpam in the Web Query row move the On Off switch to the right to the Off position 5 Inthe Settings window click Apply 6 Click OK To turn on the Web Query filter 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Message Protection 4 Under AntiSpam in the Web Query row move the On Off switch to the
185. des the files that Norton Internet Security identifies as a security risk or a threat Unsafe files are characterized by bad or poor reputation levels and Norton Internet Security removes them from your computer 264 Protecting Internet activities About Download Insight Includes the files that are neither safe nor unsafe Unknown files have unproven reputation These files might harm your computer In the case of an unknown file Download Insight notifies you that it is unsure of the reputation level of the file You can use the View Details link in the notifications to view more details of the file For unknown files Norton Internet Security lets you decide the action that you want to perform on the file For example you can run a file stop the file from running or remove the file from your computer By default Download Insight lets you install safe files For files of unknown reputation levels Download Insight prompts you to select an action that you want to perform on the file In case of an unsafe file Download Insight informs you that Norton Internet Security has detected the file as a threat and has removed the file Based on the reputation details that the Download Insight notifications provide for the files that need attention you can take an action on the file The Download Insight window provides the various options that let you select an action The options that appear in the window vary
186. displays such information in the Performance window You can access the Performance window to view details about the important system activities CPU usage and memory usage and Norton specific background jobs You can also view Norton Insight details and defragment your boot volume To access the Performance window Inthe Norton Internet Security main window click Performance About monitoring system activities System Insight provides information about the important system activities that you performed or that occurred over a period of the last three months System Insight displays the information in the Performance 84 Monitoring your system s performance About System Insight window The Events graph at the top of the Performance window displays each activity as icon or stripe The description for each icon or stripe appears at the bottom of the graph You can use the tabs at the top of the graph to obtain details for the current month and for the last two months The activities include Provides the details about the installation activities that you performed on your system over a period of the last three months The details include the application that you installed the date on which you installed the application and the total number of installations on that date Provides the details about the application download activities that you performed on your system over a period of the last three months The detail
187. do if a security risk is found 199 Protecting Internet activities 211 About the Smart Firewall 0606 211 About Download Insight 0c 00s 262 About Intrusion Prevention 272 About Vulnerability Protection 280 About the types of security risks 282 About Norton AntiSpam 6 000 284 About configuring POP3 and SMTP POLS aan E Geen aa ee a 298 About the Network Security Map 301 About Network Cost Awareness 326 Securing your sensitive data 06 331 About securing your sensitive data 331 Monitoring protection features 405 About Security History cccceeeeeee 405 Customizing protection features 443 Feature summary ccc cece eee eee eee ees 443 About turning off automatic features 452 About customizing settings and OPONE 5 cess eg eckaeee tang E saad ye 458 Finding additional solutions 515 Finding the version number of your ProduCtr ee e t S 515 Finding the End User License Agreement sosssesessssrersesrssseeee 516 About upgrading your product 516 About Norton Autofix eeeseseeeee eese 519 Staying informed about protection ISSUES e czisdeselcderas ques iS EENAA 521 About Support cc cece ec ecceeeeeeeeeeeenes 523
188. dow in the Name this computer box type a display name for the device and then click Finish 7 Inthe Congratulations window click Manage Devices About managing devices Norton Management lets you manage your device view the security status of each of the devices and resolve security issues by using the Norton Management Web site from any location around the world Using Norton Management you can do the following Add a device to Norton Management Install a Norton product on a device View Norton products that are installed on a device View the security status of a device Fix security issues on any device Purchase a new Norton product key Renew your Norton product subscription Remove a device from Norton Management Uninstall a Norton product from a device Activate your product using another product key Upgrade your Norton products to the latest available version The features listed above vary for different Norton products and devices Getting started 43 About Norton Management About the supported devices To install and use Norton Internet Security your device must meet the following minimum system requirements Hardware requirement Windows 300 MHz or faster processor 512 MB of RAM 256 MB minimum 100 MB of available hard disk space Operating systems Platform Version Service Pack Microsoft 32 bit and 64 bit Service Pack 1 Windows 7 versions Home Basic Microso
189. e Indicates that the file consumes moderate system resources t High Indicates that the file consumes maximum system resources t Unknown Indicates that the file has performed no action in your computer 168 Protecting your files and data About the Norton Internet Security scans Stability Indicates the stability rating of the file The stability rating depends on how frequently the program crashes The different stability ratings are as follows Reliable Indicates that the program is reliable Stable Indicates that the program is comparatively stable However it crashes sometimes Slightly Unstable Indicates that the program is slightly unstable Unstable Indicates that the program is unstable Very Unstable Indicates that the program frequently crashes Unknown Indicates that the crash history of the program is not known Stability ratings vary depending upon your operating system About Scan Facebook Wall Norton Safe Web protects your computer from malicious URLs when you use Facebook It scans each URL that is available on your Facebook Wall and displays the Norton rating icons for the scanned URLs You can also check if a URL is safe or unsafe Norton Safe Web scans your Facebook News feed and provides you the safety status for each of the URL This way you are not only protected from unsafe sites but you Protecting your files and data 169 About the Norton Interne
190. e the advanced details about the Security History items Displays the following information about the item Severity This category displays the risk level of the selected item The various levels of security risks are High Medium Low and Info Activity This category displays the activity that was performed by Norton Internet Security Date amp Time This category displays the date and time of the activity Status This category displays the status of the action that has been taken on the item Recommended Action This category displays the actions that you might need to perform Displays the detailed information of the item You can view the details such as category risk level risk category submission date of the risk risk status risk description and recommended actions for the items Monitoring protection features 423 About Security History Actions 424 Monitoring protection features About Security History Displays the actions that are available for the selected item The options in the Actions view vary depending on the options that are available in the Show drop down list in the Security History window The following are some of the Actions options Trust This action allows access to or from the selected computer or all of the unclassified computers on the selected network This option is available in the Security History Firewall Network and Connection
191. e Edit Identity Cards window You can select view duplicate and edit the details of any card that you created You can delete a card if it is no longer needed You can also duplicate a saved card and change only the fields that you want to change You can view a summary of the card that you created You can select any of the cards that are present in the list of cards at the left pane of the Edit Identity Cards window When you select a card you can view a summary of the card When you lock your card with a password Identity Safe provides additional security to your card You cannot view the summary of the locked card You cannot edit delete or duplicate a card unless you provide the password If you have multiple cards use the scroll arrows to browse the list When you create duplicate or edit a card the card s region is set to the user s default region If you browse to a Web site other than the default region and use the card to fill the form on that Web site the fields may not fill correctly For example your card has a default United States region but you are on a France Web page In this case you must use the card with France as the region to fill the Web page form To edit a card 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Under Identity Safe in the Edit Cards row click Configure 5 Inthe Edit Identity Ca
192. e Name box type a new name 7 Click OK 316 Protecting Internet activities About the Network Security Map Editing network details You can view the details and change the name of your network in the Edit Network Details window You cannot edit the Trust Control network details To edit network details 1 Inthe Norton Internet Security main window click Advanced 2 Under Network Protection click Network Security Map 3 Inthe Network Security Map window on the right side of Network Details click Edit 4 Inthe Edit Network Details dialog box in the Network Name box type a new name 5 Click OK Changing the trust level of your network and devices The trust level determines the default level of access that devices on your network have to your computer Any device on your network that is not explicitly Trusted or Restricted uses the trust level of your network The initial network trust level is set based on the configuration of your computer Ensure that you change the trust level of a device to Full Trust if it is a known device and is connected to your network The following conditions are necessary for the trust level of a device to be Shared The computer should not have a public IP address Your computer does not have a public IP address if it is not directly connected to the Internet The computer should be connected to a LAN through a secure connection The network category should be priva
193. e Norton Bootable Recovery Tool on a USB key 1 Insert the USB key into the USB port of your computer 2 Inthe Norton Bootable Recovery Tool Wizard main window click Create on USB key 3 Inthe Create on USB key window do the following Select the USB drive from the Specify drive drop down list If you want to add drivers click Add next to Add drivers If you want to change the default language click Change next to Specify language You can change the language in the Select Language window By default Norton Bootable Recovery Tool is created in English 4 Click Next 5 Inthe confirmation message click Yes to let Norton Bootable Recovery Tool format your USB key before creating Norton Bootable Recovery Tool 6 Review the results and do one of the following Click Done to close Norton Bootable Recovery Tool Click Back to Main to create or update Norton Bootable Recovery Tool in another media Accessing Norton Bootable Recovery Tool Wizard Norton Bootable Recovery Tool is integrated with Windows Preinstallation Environment WinPE Therefore you can run Norton Bootable Recovery Tool only from a CD DVD or USB key Norton Bootable Recovery Tool Wizard helps you create Norton Bootable Recovery Tool You can create Norton Bootable Recovery Tool on a CD DVD or USB key You can use this media to run Norton Bootable Recovery Tool on your computer 56 Getting started About Norton Bootable Recovery Tool I
194. e Surfing section is available in the Web tab The Antiphishing and Norton Safe Web features are supported in the Internet Explorer Firefox or Chrome Web browsers When you turn off Antiphishing and Norton Safe Web Identity Safe may autofill fraudulent Web sites with your confidential information Symantec recommends that you do not browse the Web when Antiphishing and Norton Safe Web features are turned off About Antiphishing Antiphishing protects you from visiting unsafe Web sites When Antiphishing is turned on the Antiphishing component analyzes the security level of the Web sites that you visit It then displays the results in the Norton Site Safety pop up window Antiphishing also blocks navigation to the Web sites that are confirmed to be fraudulent Antiphishing provides you the following information about the Web sites you visit Ifthe Web site is safe to enter confidential information If the Web site is fraudulent If the Web site is suspicious Ifthe Web site is known to give annoying results The Norton Site Safety pop up window in Internet Explorer Firefox or Chrome Web browsers lets you Securing your sensitive data 333 About securing your sensitive data view more details about the safety status of the Web sites you visit In addition the Norton Site Safety pop up window includes information about Symantec Authenticated Web sites Web site hackers often mimic company Web sites to create fraudu
195. e action that you want to take on the file Some of the supported portals are Internet Explorer Browser Opera Browser Firefox Browser Chrome Browser AOL Browser Safari Browser Yahoo Browser MSN Explorer Browser E mail amp Chat QQ Chat ICQ Chat Skype Chat MSN Messenger Chat Yahoo Messenger Chat Limewire P2P BitTorrent P2P Thunder P2P Vuze P2P Bitcomet P2P uTorrent P2P Outlook E mail Thunderbird E mail Windows Mail E mail Outlook Express E mail FileZilla File Manager Protecting Internet activities 263 About Download Insight UseNext Download Manager FDM Download Manager Adobe Acrobat Reader PDF viewer Based on the type of portal you use to download your file Norton Internet Security does one of the following Analyzes the file based on its reputation details when the download is complete Analyzes the file based on its reputation details when the file is accessed Download Insight uses the file analysis results to provide you the reputation details of the file The basic reputation levels of the files are good bad unproven and poor Based on the reputation levels the files can be broadly classified as follows Includes the files that are either Norton trusted or User trusted Safe files have good reputation levels These files do not harm your computer By default Auto Protect allows the execution of the safe files Inclu
196. e duration that you want to specify You might need to scroll the window to view the option 4 Inthe Settings window click Apply About SONAR Protection Symantec Online Network for Advanced Response SONAR provides real time protection against threats and proactively detects unknown security risks on your computer SONAR identifies emerging threats based on the behavior of applications SONAR identifies threats quicker than the traditional signature based threat detection techniques SONAR detects and protects you against malicious code even before virus definitions are available through LiveUpdate Protecting your files and data 175 About the Norton Internet Security scans db Symantec recommends that your computer remains connected to Internet to get the real time protection against threats and proactively detects unknown security risks on your computer SONAR monitors your computer for malicious activities through heuristic detections SONAR automatically blocks and removes high certainty threats Norton Internet Security notifies you when high certainty threats are detected and removed SONAR provides you the greatest control when low certainty threats are detected You can also suppress the SONAR notifications by disabling the Show SONAR Block Notifications option The View Details link in the notification alert lets you view the summary of the resolved high certainty threats You can also view the details under Resolved
197. e in this window Returns the security risk that is quarantined to the original location on your computer Returns the selected Quarantine item to its original location without repairing it and excludes the item from being detected in the future scans Removes the security risk from your computer and quarantines it Excludes the security risk from future scan Removes the selected security risk item from the Security History log 434 Monitoring protection features About Security History Get help Takes you to the Symantec Security Response Web site Submit to Symantec Sends the security risk to Symantec Searching in Security History You can search the items that are listed in Security History You can use the Quick Search option to find items using a keyword or the name of a security risk If you want to view all of the Security History items that pertain to a particular security risk you can filter the items using Quick Search For example if you want to view all of the alerts that Auto Protect has generated you can type Auto Protect and filter the list You can clear the search results and return to the current Security History list by clicking the black cross x icon in the Quick Search box The Quick Search option works on the current view only If you want your search to include all of the items in Security History you must select the Full History view To search in Security History 1 I
198. e latest definition updates and program updates regularly from Symantec servers The definition updates protect your computer from the latest viruses and unknown security threats Using the LiveUpdate technology Symantec products help you to obtain and install these updates LiveUpdate takes little time to download and process the definition updates and program updates You can choose Smart Definitions to minimize download time installation time and memory consumption as Smart Definitions are a subset of virus definitions To access the Smart Definitions option go to the Norton Internet Security main window and then click Settings gt Updates gt Smart Definitions You can cancel the LiveUpdate session at any time LiveUpdate obtains these updates for your computer by using your Internet connection If your network uses proxy servers to connect to the Internet LiveUpdate uses the proxy settings in your product to Getting started 65 About LiveUpdate download the latest updates To configure the proxy settings of your network go to the Norton Internet Security main window and then click Settings gt Network gt Network Security Settings gt Proxy Server gt Configure db LiveUpdate does not download the latest definition updates and program updates if the Network Cost Awareness option in the Settings window is set to No Traffic Network Cost Awareness lets you define the amount of network bandwidth that Norton Internet S
199. e on the icon of the device Excluding a device from Intrusion Prevention scan The Intrusion Prevention System in Norton Internet Security scans all the network traffic that enters and exits your computer When a device on your network requests access your computer Intrusion Prevention scans this request to ensure that it is not a virus attack Protecting Internet activities 321 About the Network Security Map Scanning every request from all the devices that access your computer increases the scan time which slows down the network speed of your computer If you know that a specific device on your network is safe you can apply Full Trust level to this device In addition you can exclude this specific device from Intrusion Prevention scan When you exclude a device from Intrusion Prevention scan Norton Internet Security trusts this device and does not scan any information that is received from this device This improves the network speed of your computer and helps the trusted device to access your device quickly You can exclude only full trusted devices that are on the local subnet To exclude a device from Intrusion Prevention scan you must ensure that the IP address of the device never changes Norton Internet Security uses IP addresses to identify devices on your home network If the IP address of the device changes Norton Internet Security cannot identify the trusted device that should be excluded from Intrusion Preventio
200. e the scan when it is no longer necessary For example if you work on a project for which you need to swap files frequently with others In this case you might want to create a folder into which you copy and scan those files before using them When the project is done you can delete the custom scan for that folder Creating a custom scan Instead of running the default scans that are listed in the Scans pane you can create your own scans that meet your specific requirements For example you can create a scan that checks a folder in which you store all the downloaded files You can create a custom scan in the Scans window When you create custom scans you can also schedule them to run automatically on specific dates and times or at periodic intervals To create a custom scan 1 Inthe Norton Internet Security main window click Scan Now 2 Inthe Computer Scan pane click Custom Scan 3 Inthe Scans window click Create Scan 4 Inthe New Scan window in the Scan Name box type a name for the scan You cannot specify a scan name that is already in use 142 Protecting your files and data About the Norton Internet Security scans 5 On the Scan Items tab add the items that you want to scan See Selecting the scan items on page 142 6 On the Scan Schedule tab set the frequency and time at which you want to perform the scan See Scheduling a scan on page 146 7 Onthe Scan Options tab configure the scan options
201. eUpdate in the Pulse Updates row do one of the following To turn off Pulse Updates move the On Off switch to the right to the Off position To turn on Pulse Updates move the On Off switch to the left to the On position 4 Inthe Settings window click Apply 5 Click OK About Network Proxy Settings A proxy server regulates access to the Internet and prevents external computers from accessing your network If you are on a network that uses a proxy server to connect to the Internet you can provide proxy server details to Norton Internet Security You can use the Network Proxy Settings window to specify the automatic configuration URL the proxy settings and the authentication details Norton Internet Security uses the proxy settings and authentication details to connect to the Internet automatically whenever required For example LiveUpdate uses the specified proxy server settings to retrieve updates You must ensure that you specify the proxy server details for LiveUpdate to run successfully In some cases your network uses an automatic configuration URL or script for managing Internet access In this case you must provide the URL of the required Proxy Automatic Configuration PAC file A Getting started 77 About Network Proxy Settings PAC file contains the code that lets your browser know about the proxy settings for different Web sites over the Internet It also contains the words which you want to filter and bl
202. earch searching Web 340 Norton Safe Web about 335 enabling 170 Scan Facebook Wall 168 turning off 342 turning on 342 Norton Tasks about 104 Norton toolbar about 390 accessing 396 settings 357 Notes deleting 380 saving 380 updating 380 notification area icon 61 shortcut menu 63 notifications Auto Protect 201 Intrusion Prevention 273 542 Index 0 Office documents embedded objects 181 scanning office documents 181 turn on or turn off 182 virus macros 181 One Click Support using 520 Online transactions identity theft 344 Optimization about 101 boot volume 102 Options Client Integration 286 customizing 458 password protection 443 Smart Firewall 238 Smart Firewall Advanced Settings 242 Smart Firewall Program Control 239 Smart Firewall Trust Control 241 P Parental Control settings 450 password changing 390 editing 368 for Settings 459 saving 367 updating 374 PC Tuneup Startup Manager 97 Performance accessing 83 alerts 87 monitoring 95 performance alerts about 87 configure 88 configure threshold 90 excluding programs 93 removing programs from exclusion list 93 turning off 88 turning off low resource profile 91 turning on 88 turning on low resource profile 91 Personal data backing up 382 Personal Firewall about 448 turning on and off 455 Phishing Protection turning off or turning on 456 port scans 212 preparing for emergencies maintaining protection 125 problem solving 521 proble
203. ec may make available to You Except as may be modified by the Documentation and subject to Symantec s right to terminate for Your breach pursuant to Section 10 Your rights and obligations under this License Agreement with respect to the use of this Software are as follows During the Service Period You may A use one copy of the Software on a single Device If a greater number of copies and or number of Devices is specified within the Documentation or the applicable transaction documentation from the authorized distributor or reseller from which You obtained the Software You may use the Software in accordance with such specifications B make one copy of the Software for back up or archival purposes or copy the Software onto the hard disk of Your Device and retain the original for back up or archival purposes C use the Software on a network provided that You have a licensed copy of the Software for each Device that can access the Software over that network D permanently transfer all of Your rights in the Software granted under this License Agreement to another person or entity provided that You retain no copies of the Software and the transferee agrees to the terms of this License Agreement Partial transfer of Your rights under this License Agreement shall not be permitted For example if the applicable documentation grants You the right to use multiple copies of the Software only a transfer of the rights to u
204. ect a suitable action for the file In the case of unsafe files Norton Internet Security identifies them as threats and removes them Protecting Internet activities 269 About Download Insight When you set the Show Report on Launch of Files option to Unproven Files Only Download Insight prompts you to select a suitable action for unknown files only In this case the Download Insight window appears whenever you try to launch any downloaded file that has an unknown reputation score In this window you can view details about the file and the options that let you select a suitable action for the file By default the Show Report on Launch of Files option is set to Unproven Files Only In this case Norton Internet Security allows the execution of the safe files without prompting you for a suitable action In the case of unsafe files Norton Internet Security identifies them as threat and removes them 270 Protecting Internet activities About Download Insight When you set the Show Report on Launch of Files option to Never Download Insight does not prompt you to select a suitable action for any type of file that you download In this case the Download Insight window does not appear whenever you try to launch any downloaded file However if the Alert on Poor Stability option is turned on Download Insight prompts you to select a suitable action when you try to download an unstable file In case o
205. ecting your files and data 163 About the Norton Internet Security scans The Norton Network graph displays the details about the known good files and bad files You can view the number of trusted files that are on your computer You can also view the total number of files that Symantec analyzes within the Norton Community Your computer must be connected to the Internet to view these details Norton Internet Security connects to the Symantec servers to collect the reputation information The bottom of the Norton Reputation Scan window displays the reputation information of each scanned item For each scanned item you can view the following details File Name Indicates the file name and file type You can click a file name to view additional details about the file in the File Insight window 164 Protecting your files and data About the Norton Internet Security scans Trust Level Protecting your files and data 165 About the Norton Internet Security scans Indicates the trust level that is assigned to a file Symantec analyzes specific information about a file such as the digital signature and the hash value to determine the trust level of a file Symantec rates a file based on the statistical evaluation that is done on the file using the Norton Community Watch data and Symantec s analysis Symantec assigns the following trust levels to reputation files Trusted Symantec has a high indication that
206. ecting your files and data About the Norton Internet Security scans 2 Inthe Computer Scan pane click Quick Scan You can use the following options to suspend a Quick Scan Suspends a Quick Scan temporarily Click Resume to continue the scan Terminates a Quick Scan Click Yes to confirm 3 On the Results Summary window do one of the following Ifno items require attention click Finish If any items require attention review the risks on the Threats Detected window Scanning selected drives folders or files Occasionally you might want to scan a particular file removable drives any of your computer s drives or any folders or files on your computer For example when you work with removable media and suspect a virus you can scan that particular disk Also if you have received a compressed file in an email message and you suspect a virus you can scan that individual element To scan individual elements 1 Inthe Norton Internet Security main window click Scan Now 2 Inthe Computer Scan pane click Custom Scan Protecting your files and data 139 About the Norton Internet Security scans 3 Inthe Scans window do one of the following Toscan specific drives click Run next to Drive Scan select the drives that you want to scan and then click Scan To scan specific folders click Run next to Folder Scan select the folders that you want to scan and then click Scan To scan specific files
207. ection To access Norton Autofix ensure that your computer is connected to the Internet If you use a proxy server to connect to the Internet you must configure the proxy settings of Norton Internet Security See Configuring Network Proxy Settings on page 78 If you do not know your proxy settings contact your Internet service provider or network administrator for assistance Solving a problem using Norton Autofix Norton Autofix performs a Quick Scan of your computer and repairs problems without your intervention If a problem persists you can use the Norton Support Web site for additional online support and contact options Your computer must be connected to the Internet to access Norton Autofix If you use a proxy server to connect to the Internet you must configure the proxy settings of Norton Internet Security If you do not want to proceed with the support session you can use the Cancel option to bypass the scan To solve a problem if your computer is connected to the Internet 1 Inthe Norton Internet Security main window click Support 2 Inthe Support drop down menu click Get Support 3 Inthe Norton Autofix window do one of the following Ifthe problem is not fixed automatically click Open Support Web Site and follow the on screen instructions to find additional support If the problem is fixed click Close Finding additional solutions 521 Staying informed about protection issues To solve a pro
208. ection that is based on the local definitions However the Cloud definitions are specified with additional data about the threats that it detects which indicates that it has been obtained from the Internet Definitions in the Cloud provide a generic name for the risk detected but the local definitions provide the specific name for the risk detected For example if a Trojan horse is detected the scan results of the Insight Network might display Cloud Trojan However the scan results of the local definition might display Trojan Foo If the traditional scan completes while the Insight Network scan is still running you can view the Insight Network Scan progress status If the Insight Protection option is turned on you can manually run the following types of Insight Network scans Insight Network Quick Scan Norton Internet Security simultaneously performs a traditional Quick Scan and an Insight Network Quick Scan to scan the areas of your computer that the viruses often target Norton Internet Security also performs an Insight Network Quick Scan simultaneously with an Idle Quick Scan Insight Network Single File Scan Norton Internet Security simultaneously performs a traditional Single File Scan and an Insight Network Single File Scan to scan a file on your computer It also scans the files that are received through instant messenger programs You can 154 Protecting your files and data About the Norton Internet Security sc
209. ecurity Overview window To turn off Network Security Overview 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Network Security Settings 4 Inthe Welcome Screen row move the On Off switch to the right to the Off position 5 Click Apply 6 Click OK To turn on Network Security Overview 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Network Security Settings 4 Inthe Welcome Screen row move the On Off switch to the left to the On position 5 Click Apply 6 Click OK Protecting Internet activities 303 About the Network Security Map Viewing devices on the Network Security Map The Network Security Map window provides a pictorial representation of the devices on the network to which your computer is connected You can view the details of each device such as device name security status and IP address The Network Security Map window also provides the security status of the following computers The computer on which you view the remote monitoring status MY PC The computers that are remotely monitored The trust level of the device appears at the bottom of the icon in the network map Norton Internet Security displays devices in the following order MY PC Devices with online connection status Devices with offline conne
210. ecurity can use Therefore you must ensure that the Network Cost Awareness option is turned on and set to No Limit or Critical Updates Only for LiveUpdate to run successfully About Program and Definition Updates LiveUpdate obtains program updates and definition updates for your computer by using your Internet connection Program updates are minor improvements to your installed product These differ from product upgrades which are newer versions of the entire product Program updates are usually created to extend the operating system or hardware compatibility adjust a performance issue or fix program errors Program updates are released on an as needed basis db Some program updates may require that you restart your computer after you install them LiveUpdate automates the process of downloading and installing program updates It locates and obtains files from an Internet site installs them and then deletes the older files and downloaded definitions from the temporary folder after processing the updates Definition updates are the files that keep your Symantec products up to date with the latest antithreat technology The definition updates that you receive depend on which product you use 66 Getting started About LiveUpdate The type of definition updates that each of the Symantec products receive are as follows Users of these products receive the latest virus definitions from Symantec that protects your computer
211. efine a region of the graph that you are interested to view You can select a Zoom option to obtain magnified view or historical data of the graphs For example if you select the 10min option Norton Internet Security displays the magnified view of CPU graph or memory Monitoring your system s performance 95 About System Insight graph for the last 10 minutes If you select the 1D option Norton Internet Security displays a historical data of the last one day When you click at any point on the CPU graph or memory graph Norton Internet Security displays a list of the processes that consume maximum resources at that point It also displays the percentage of usage for each process You can click a process that is available in the list to get more information in the File Insight window The File Insight window provides information about the process such as The file name version number digital signature the date on which the process was installed The date on which the process was last used and whether it is a startup file The stability details The confidence level The resource usage details The actions that the process performs on your system In addition the File Insight window displays the CPU graph and the resource usage details for the running processes The graph shows the breakdown of overall system CPU usage and the CPU usage by the process Viewing the CPU graph and memory graph Norton Internet Se
212. efinitions It also scans all the Internet Protecting your files and data 129 About the Norton Internet Security scans activities that are performed on your computer to protect your computer from the Internet based threats that exploit software vulnerabilities Norton Internet Security automatically performs different types of scans to secure your computer from latest threats It also lets you run different types of scans manually to secure your computer By using Norton Internet Security you can run the following types of scans Computer Scan uses the latest virus definitions that are available locally in the computer If you suspect that your computer is infected you can run three types of computer scans manually to prevent virus infections on your computer The three types of scans that are available under Computer Scan are Quick Scan Full System Scan and Custom Scan 130 Protecting your files and data About the Norton Internet Security scans Insight Network Scan uses the virus definitions that are available locally and hosted in the Cloud Insight Network Scan detects the files that are suspicious or vulnerable on your computer using the reputation based threat detection Norton Internet Security performs an Insight Network Scan only when the Insight Protection option is turned on By default the Insight Protection option is turned on To turn on the Insight Protection option go to the Norton I
213. elief warranted by that party s individual claim 12 General This License Agreement will be governed by the laws of the State of California United States of America This License Agreement is the entire agreement between You and Symantec relating to the Software and i supersedes all prior or contemporaneous oral or written communications proposals and representations with respect to its subject matter and ii prevails over any conflicting or additional terms of any quote order acknowledgment or similar communications between the parties Notwithstanding the foregoing nothing in this License Agreement will diminish any rights You may have under existing consumer protection legislation or other applicable laws in Your jurisdiction that may not be waived by contract Symantec may terminate this License Agreement if You breach any term contained in this License Agreement other than a trivial or inconsequential breach and if such termination occurs You must cease use of and destroy all copies of the Software and Documentation The disclaimers of warranties and damages and limitations on liability shall survive and continue to apply after termination This License Agreement may only be modified by the Documentation or by a written document that has been signed by both You and Symantec Should You have any questions concerning this License Agreement or if You desire to contact Symantec for any reason please write to Syman
214. enabled machine select the recovery media under the Legacy Boot option instead of the UEFI Boot option The recovery media can be the Norton Bootable Recovery Tool CD DVD or USB key 58 Getting started About Norton Bootable Recovery Tool 4 Read the Norton License Agreement type your Product Key and then click I Agree If you use anon QWERTY keyboard use the Virtual Keyboard option to enter your Product Key 5 Inthe Norton Bootable Recovery Tool window click Norton Advanced Recovery Scan 6 Inthe Scan section click Start Scan When the scan is complete the scan results window lists the following The total number of files scanned The total number of threats detected The total number of resolved threats The total number of unresolved threats The details of each detected threat 7 Inthe scan results window do one of the following To fix all of the threats that are found on your computer select Set all action to Fix To perform appropriate actions for each of the threats select Fix or Ignore 8 Click Continue 9 Ifa confirmation dialog box appears click OK 10 In the Scan Summary window review the scan summary and do one of the following Click Done Torun another scan click Scan Again Updating virus definitions on a USB key Symantec virus definitions are used in Norton Bootable Recovery Tool to scan your computer for the latest security risks When you create Norton Bootable
215. er gt AntiVirus and SONAR Exclusions gt Items to Exclude from Auto Protect SONAR and Download Intelligence Detection gt Configure Excluding security threats from scanning You can use Scan Exclusions window and Real Time Exclusions window to exclude viruses and other high risk security threats from scanning To exclude high risk security threats from scanning 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window in the left pane click AntiVirus and SONAR Exclusions 3 Do one of the following In the Items to Exclude from Scans row click Configure In the Items to Exclude from Auto Protect SONAR and Download Intelligence Detection row click Configure 4 Inthe window that appears click Add 5 Inthe Add Item dialog box click the browse icon 6 Inthe dialog box that appears select the item that you want to exclude from the scan 7 Click OK 8 Inthe Add Item dialog box click OK 9 Inthe window that appears click Apply and then click OK 178 Protecting your files and data About the Norton Internet Security scans About Signature Exclusions Norton Internet Security lets you select specific known security risks and exclude them from Norton Internet Security scans Exclude a risk from Norton Internet Security scans only if you have a specific need For example if another program relies on a security risk program to function you might decide to keep the program on you
216. er Monitor This option protects you against the malicious keylogger programs that access personal information of a user ona particular computer by monitoring their keystroke activities Protecting Internet activities 255 About the Smart Firewall COM Control This option protects you against the malicious programs that manipulate an application s behavior by instantiating controlled COM objects About Norton Firewall Diagnosis There may be times when firewall may block the network traffic that you want to allow based on its configuration settings In such cases you may have issues in accessing the Internet the Network or another computer to perform tasks such as sharing resources When you experience network connection problems Norton Firewall acts quickly in identifying the cause of failure and provides its diagnosis Norton Internet Security displays the Firewall Diagnostics Wizard when you encounter network connection problems Norton Firewall Diagnosis is available only in Windows 7 and Windows 8 The Wizard contains the problem diagnosis report that is unique for different cases of network blocks For instance a network block can occur in any of the following cases The one click option to stop all network traffic is active The uncommon protocol that is handling the traffic is blocked The currently active firewall rule is conditioned to block the traffic that you want to allow The traffic
217. ernet Security and path file_name represents the location name and extension of the file 2 Press Enter About Insight Network scan The Insight Network scan uses the Cloud technology wherein a remote server on the Web contains the latest virus definitions Norton Internet Security scans your computer for the latest security threats When Norton Internet Security performs the Insight Network scan it uses the virus definitions that are available locally and in the Cloud Norton Internet Security provides additional protection by using the most recent definitions in the Cloud apart from the definitions that are available locally on your computer Norton Internet Security performs an Insight Network scan only when the Insight Protection option is turned on To turn on the Insight Protection option go to the Norton Internet Security main window and then click Settings gt General gt Other Settings gt Insight Protecting your files and data 153 About the Norton Internet Security scans Protection gt On By default the Insight Protection option is turned on When the Insight Protection option is turned on Norton Internet Security performs a traditional scan and an Insight Network scan simultaneously The traditional scan uses the definitions from the local system and the Insight Network scan uses the definitions that are hosted in the Cloud Threat detection based on the Cloud definitions is identical to the threat det
218. ers to leave the Norton Toolbar for free to search and browse safely over the Internet even after the product is uninstalled You can choose to keep the Norton Toolbar that comprises Norton Safe Search and Norton Safe Web features without any cost Norton Safe Search provides site safety status and Norton rating for each of the search results generated Norton Safe Web analyses the security levels of the Web sites you visit and indicates if the Web sites are free from threats 530 Finding additional solutions About uninstalling amp Your computer must be connected to the Internet to avail this option Norton Internet Security does not offer to leave the Norton Toolbar if you upgrade your product to the latest version or choose to reinstall another Norton product In addition the Norton Toolbar installation is available only if the operating system of your computer is English To uninstall Norton Internet Security from Windows Control Panel 1 Do one of the following On the Windows taskbar click Start gt Control Panel In Windows 8 go to Apps and under Windows System click Control Panel 2 In Windows Control Panel do one of the following In Windows XP double click Add or Remove Programs In Windows Vista click Programs and Features In Windows 7 or Windows 8 click Programs gt Programs and Features The Programs option in Windows 7 and Windows 8 is available when you select the Category option in the
219. erval Torun the scan at specific time every day select Daily Torun the scan on a specific day on a week select Weekly Torun the scan on a specific day on a month select Monthly These frequency options include the additional options that you can use to refine the schedule Set the additional options as required 5 Under Run the scan do the following Torun the scan only at idle time check Only at idle time Torun the scan only when your computer is connected with external power source check Only on AC power To prevent your computer from going to a Sleep or Standby mode check Prevent standby 148 Protecting your files and data About the Norton Internet Security scans Under After scan completion select the state at which your computer should be after the scan is complete Your options are Stay On Turn Off Sleep This option works only if you have configured the power options in your computer using the Windows Control Panel Hibernate This option works only if you have configured the power options in your computer using the Windows Control Panel Click Next 8 Inthe Scan Options tab click Save Scheduling a Full System Scan Norton Internet Security automatically detects the idle state of your computer and runs a Full System Scan Full System Scan protects your computer against infection without compromising the performance of your computer You can schedule a Full System
220. es uncommon protocols such as Internet Group Management Protocol IGMP and IPv6 Hop by Hop Option HOPOPT Protecting Internet activities 243 About the Smart Firewall 244 Protecting Internet activities About the Smart Firewall Returns the Smart Firewall to its default state You can click Reset to ensure that all recommended firewall rules and settings are configured Norton Internet Security prompts you with a confirmation dialog box when you reset firewall If you reset the firewall you remove any custom rules or settings that you have configured Resetting the firewall clears the AutoBlock computers and also changes the Trust Control settings in the Network Security Map In Windows XP Norton Internet Security prompts you to select the trust level of the network after you reset the firewall The alert appears only if your computer matches the following criteria You need to set the Automatic File Printer Sharing Control to Ask Me Your computer must have at least one shared resource or the operating system need to be Windows Media Center edition Your computer must use a private IP Protecting Internet activities 245 About the Smart Firewall address range Your computer must be connected to a secure wireless or wired connection Ensures that blocked and inactive ports do not respond to connection attempts Prevents the active ports from responding to con
221. es as a result Startup Manager helps to manage the startup items on your computer For any startup program that the Startup Manager lists you can view the detailed information such as Community Usage and Resource Usage You can also click the application name and view the File Insight details These details would help you determine whether or not to enable an application during startup You can use Startup Manager to manage programs with the following extensions Windows executable files exe 98 Monitoring your system s performance About System Insight Windows System files sys Dynamic link library files dll ActiveX control files ocx Norton Internet Security displays the community usage details under the following conditions When the Norton Community Watch option is turned on See Turning off or turning on Norton Community Watch on page 454 When the Network Cost Awareness option is configured to No Limit or Economy See Defining the Internet usage of Norton Internet Security on page 328 Startup Manager lets you view the list of programs that are included to the startup items You can configure Startup Manager to run or not run these programs when your computer starts You can also choose to delay the start of the programs and run them manually from the Startup Manager This way you can enhance the performance of your computer You can disable a program and measure the performance of yo
222. es where you may be uncomfortable providing your personal information You can automatically fill online forms when you visit a Web site To add a card 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab Securing your sensitive data About securing your sensitive data 3 Inthe left pane click Identity Safe 4 Under Identity Safe in the Edit Cards row click Configure 377 5 Inthe Edit Identity Cards window click Add Card 6 Use the following tabs to type your card details Provide details such as card name name gender and date of birth You can set a password and provide additional security for your card Online form filling is language specific In the Country Region box the country United States is selected by default You should change your region and create a new card before you fill online forms for any other language Provide your contact information in this section Contact information includes your email address postal address and phone numbers Provide your credit card details such as the type of the card expiration date and card number in this section You cannot enter a credit card number of more than 16 digits 7 Click Save 8 Click Close 378 Securing your sensitive data About securing your sensitive data Editing deleting or duplicating cards All the cards that you have saved in Identity Safe are listed in th
223. ess the Identity Safe data that you stored online from any computer that meets the following criteria The latest version of Norton Internet Security must be installed The computer must be connected to the Internet You can create only one online vault per Norton Account If you already have a Norton Account you can log in with your credentials or create a new account To sign in to Norton Account 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Under Identity Safe in the Identity Safe Setup row click Configure 352 Securing your sensitive data About securing your sensitive data 5 At the bottom of the Set Up Identity Safe window click Log In to Norton Account 6 Inthe Sign Into Norton Account window type your E mail Address and Password 7 Click Sign In Syncing local vault to online vault You can sync the Identity Safe data from your local vault to the online vault When you move the data from your local vault to online vault all the data in your local vault is removed permanently The Sync Data Online option in Identity Safe helps you to save your data online The following are the benefits of moving your Identity Safe data online Lets you access your Identity Safe data from any computer Your computer must have the latest version Norton Internet Security installed and must be connected t
224. et the latest updates Pulse Updates checks for definition updates every 5 minutes If definition updates are available LiveUpdate downloads the streamed virus definitions Pulse Updates provide the updates in between the full updates which Automatic LiveUpdate downloads automatically every hour Norton Internet Security merges the new stream that is downloaded with the last updates that are installed The Pulse Updates downloads provide additional and fast protection for the latest threats in between the full updates without disrupting your online experience Even if you do not turn on Pulse Updates LiveUpdate collects all the missed streams and it updates your computer during full definition updates Turning off or turning on Pulse Updates Pulse Updates provide frequent lightweight updates every 5 minutes in between the full updates Always ensure that the Pulse Updates option is turned on It protects you from the latest threats without compromising your system performance or disrupting your online experience 76 Getting started About Network Proxy Settings You must be connected to the Internet to obtain latest definition updates by using Pulse Updates You can turn on or turn off Pulse Updates only if Automatic LiveUpdate is turned on To turn off or turn on Pulse Updates 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window in the left pane click Updates 3 Under Automatic Liv
225. etails 5 Select the file and then click Open 6 In the File Insight window view the details of the file 7 Inthe File Insight window click Close 120 Monitoring your system s performance About System Insight To find the location of the file In the File Insight window click Locate To refresh the trust level of the file In the File Insight window click Check Trust Now To manually trust the file In the File Insight window in the Details tab click Trust Now You can manually trust the files that are poor unproven or not Norton trusted To determine the resource usage of a running process 1 In the File Insight window in the left pane click Activity 2 Inthe Show drop down list do one of the following Select Performance to view the performance graph of the process Select Performance Alert to view the performance alert related details of the process Select Network to view the network activities of the process Select Run Key change to include registry changes Configuring the Scan Performance Profiles The Scan Performance Profiles settings let you configure how Norton Internet Security should scan your computer based on the digital signature and confidence level of the files To make Norton Internet Security scans lighter faster and more effective you can exclude from scans the files that have known digital signatures or high confidence levels You can configure the Scan Performance Pr
226. ever you need not uninstall the product to reset your Settings password The reset settings password option appears in the Select Uninstall Preference window only if the Settings Password Protection option is turned on To use the Settings Password Protection option go to the Norton Internet Security main window and then click Settings gt General gt Product Security To reset your Norton Internet Security Settings password 1 On the Windows taskbar do one of the following In Windows XP Windows Vista or Windows 7 click Start gt Control Panel In Windows 8 on the Apps screen under Windows System click Control Panel 2 In Windows Control Panel do one of the following In Windows XP double click Add or Remove Programs In Windows Vista click Programs and Features In Windows 7 or Windows 8 click Programs gt Programs and Features The Programs option in Windows 7 or Windows 8 is available when you select the Category option in the View by drop down list 3 Inthe list of currently installed programs do one of the following In Windows XP click Norton Internet Security and then click Change Remove In Windows Vista Windows 7 or Windows 8 click Norton Internet Security and then click Uninstall Change Customizing protection features 511 About customizing settings and options 4 At the bottom of the Select Your Uninstall Preference window click reset settings password 5 In the dialog box th
227. ever you want If you want to analyze the security events for a particular day you can save the Security History logs for that day You can later import the file into Security History and analyze the data Opening Security History Security History provides a record of all the activities that Norton Internet Security performed on your computer 408 Monitoring protection features About Security History You can access Security History from the following areas Norton Internet Security advanced window Various alert windows and notifications Notification area of the Windows taskbar Threats Detected section in different Scan windows To open Security History 1 Inthe Norton Internet Security main window click Advanced 2 Inthe Computer Protection pane click History Viewing items in Security History Security History provides a record of all the activities that Norton Internet Security performed on your computer You can view details about all the activities including Security History alerts and event messages Results of different scans Information that you submitted to Symantec Security Response Web site Quarantined items Norton Internet Security firewall activities Security tasks that Norton Internet Security performed in the background Based on their functionalities all Security History categories appear under the following groups in the Show drop down list All Activity Protection and
228. every request from all the devices that access your computer increases the scan time which slows down the network speed of your computer If you are sure that a device on your network is safe you can change the trust level of the device to Full Trust You can configure the trust level of a device using the Network Security Map You can exclude these trusted devices from Intrusion Prevention scan Excluding Full Trust devices from the Intrusion Prevention scan saves the scan time and improves the network speed of your computer When you exclude a device that is set to Full Trust Norton Internet Security does not scan any information that is received from this device The Full Trust devices that are excluded from Intrusion Prevention scan are added to Intrusion Prevention exclusion list When a device on your network attempts to infect your computer AutoBlock stops all access requests from this device If you add this device to the Intrusion Prevention exclusion list Norton Internet Security removes the device from the exclusion list Ensure that the IP address of the devices that are added to Intrusion Prevention exclusion list never changes If you find that any of the devices that you excluded from the Intrusion Prevention scan is infected you can purge the saved exclusion list When you purge the exclusion list Norton Internet Security removes all the IPS excluded devices from the exclusion list Removing all devices from Intrusio
229. ewall alerts See About the reputation information in firewall alerts on page 257 About the reputation information in firewall alerts Firewall alerts notify you of connection attempts from other computers and of attempts by programs on your computer to connect to other computers The reputation details in the firewall alerts help you make more definite decisions on whether to allow or block communication attempts of networking applications You can use the reputation details to determine the trust worthiness of programs and running processes on your computer that access the network The 258 Protecting Internet activities About the Smart Firewall reputation based security technology provides reputation ratings for files on the Internet based on the information that is collected from Norton customers Norton Internet Security obtains specific information such as file name and hash key about the file and sends this information to the Symantec server Symantec analyzes the file information and provides a trust level for the file The Symantec server sends back the reputation information to your computer Based on the reputation information of the program you can allow or block the inbound traffic or outbound traffic If any of the file is suspicious or vulnerable Norton Internet Security assigns Poor or Bad trust level Your computer must be connected to the Internet to access the latest reputation information that Symante
230. f unsafe files Norton Internet Security identifies them as threat and removes them The alert messages that you suppress and the activity details can be reviewed at any time in Security History To configure the Show Report on Launch of Files option 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 In the left pane click Download Intelligence Protecting Internet activities 271 About Download Insight 4 Under Download Intelligence in the Show Report on Launch of Files row do one of the following If you want Download Insight to prompt you for a suitable action in case of safe and unknown files move the Show Report on Launch of Files switch to the Always position If you want Download Insight to prompts you to select a suitable action for unknown files only move the Show Report on Launch of Files switch to the Unproven Files Only position If you do not want Download Insight to prompt you to select a suitable action for any type of file move the Show Report on Launch of Files switch to the Never position 5 Inthe Settings window click Apply and then click OK Turning on or turning off Alert on Poor Stability When you turn on the Alert on Poor Stability option Download Insight prompts you to select a suitable action when you try to download an unstable file When you set the Show Report on Launch of Files option to Never Download Insight does one
231. f you have a valid Norton product key or activation PIN you can go to your Norton Account and access the Norton Bootable Recovery Tool download link To access your Norton Account go to the following address https account norton com To access Norton Bootable Recovery Tool Wizard 1 Do one of the following Double click the Norton Bootable Recovery Tool Wizard icon on your computer desktop In Windows XP Windows Vista and Windows 7 on the Windows taskbar click Start gt All Programs gt Norton Bootable Recovery Tool Wizard gt Norton Bootable Recovery Tool Wizard In Windows 8 on the Start screen click Norton Recovery Tools 2 Follow the on screen instructions to download Norton Bootable Recovery Tool Wizard Using the Norton Bootable Recovery Tool If the installation of your Norton product fails you can use the Norton Bootable Recovery Tool to scan and remove any security threats that prevent successful installation If your computer is infected and you are not able to start your Windows operating system you can use Norton Bootable Recovery Tool to remove threats and recover your computer Norton Bootable Recovery Tool is available on the product CD that you purchased You can use the product CD as a recovery media If you have purchased this product as a download go to the following URL to download the Norton Bootable Recovery Tool Wizard http www norton com recoverytool_n360 Getting started
232. features 447 Feature summary About spyware and other security risk protection features Spyware and other security risk protection features provide protection against the latest security risks such as spyware and adware These features scan for existing risks and blocks new risks before they can be installed on your computer Spyware and other security risk protection features include the following Auto Protect blocks the programs that have been identified as spyware or adware before they can be installed on your computer By default manual and scheduled scans search for spyware adware and other security risks Auto Protect scans for these items as well If ascan removes a security risk program that another program relies on for functionality you can restore the security risk program from Security History 448 Customizing protection features Feature summary If you are unsure how to handle a program that is classified as a security risk you can view the security risk assessment The security risk assessment describes the level of impact that a security risk program has on your computer You can access the security risk assessment from the Risk Details window This window is available when the scan results require input before it process a security risk program About security protection features Norton Internet Security includes a suite of security tools that help keep
233. fications option You can use the Download Insight Notifications option to choose when you want Download Insight to display notifications By default the Download Insight Notifications option is set to On Based on the type of portal you use to download your file Norton Internet Security does one of the following Notifies you each time when you download an executable file Protecting Internet activities 267 About Download Insight Notifies you only when you download a file that is infected with a local virus identification If the file that you download is infected with a cloud virus identification Norton Internet Security removes the file from your computer and notifies you with the threat details When the Download Insight Notifications option is set to Risks Only Download Insight notifies only when you download an infected or a suspicious executable file Setting the Download Insight Notifications to Risks Only does not turn off analysis of all the other executable files that you download Whether or not you receive notifications of all files Security History keeps a record of all the Download Insight activities You can review the summary of the Download Insight alerts and notifications in Security History To configure the Download Insight Notifications option 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Download Intelligence
234. file and click Open You can only open log files of mcf format in the Security History window You can open and view log files of txt file externally without using Security History In the import mode you cannot make modifications to the information For example you cannot clear the logs You can revert to the current Security History list by closing the file Managing items in the Quarantine The Security History Quarantine provides a safe location on your computer where you can isolate items while you decide on an action to take on them Quarantined items are isolated from the rest of your computer so that they cannot spread or reinfect your computer In some cases you may have an item that you think is infected but is not identified as a risk by the Norton Internet Security scans You can manually place such items in the Quarantine You cannot open quarantined items accidentally and spread the virus but you can evaluate the quarantined items for possible submission to Symantec Monitoring protection features 437 About Security History The Security History Quarantine includes the following groups of items Includes the items such as spyware and adware that are generally low risk and that another program requires to function properly You can restore these items if necessary Includes viruses and other high risk items Once an item has been quarantined you have several options All of the actions that you t
235. files You can use the Idle Time Optimizer option to optimize the boot volume during the idle time To access the Idle Time Optimizer option go to the Norton Internet Security main window and then click Settings gt General gt Norton Tasks gt Idle Time Optimizer 104 Monitoring your system s performance About System Insight Turning off or turning on Idle Time Optimizer Norton Internet Security automatically schedules the optimization when it detects the installation of anew application on your computer Norton Internet Security runs this optimization only when your computer is idle You can use the Idle Time Optimizer option to optimize the boot volume during idle time By default this option is turned on To turn off Idle Time Optimizer 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the General tab 3 Inthe left pane click Norton Tasks 4 Inthe Idle Time Optimizer row move the On Off switch to the right to the Off position 5 Click Apply and then click OK To turn on Idle Time Optimizer 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the General tab 3 Inthe left pane click Norton Tasks 4 Inthe Idle Time Optimizer row move the On Off switch to the left to the On position 5 Click Apply and then click OK About the Norton Tasks The Norton Tasks window provides an interface where you can view and monitor all
236. ft Windows 7 Home Premium Microsoft Windows 7 Professional Microsoft Windows 7 Ultimate Microsoft Windows 7 Starter 44 Getting started About Norton Management 7 icrosoft Windows Vista versions 32 bit and 64 bit Service Pack 1 and 2 Home Basic icrosoft Windows Vista Home Premium icrosoft Windows Vista Ultimate icrosoft Windows Vista Business icrosoft 32 bit versions Service Pack 2 and Windows XP 3 Home icrosoft Windows XP Pro icrosoft Windows XP edia Center Edition 2005 and later Mac OS X 10 7 Lion 2GB of RAM 1 5 GB of available hard disk space Android Android OS 2 1 Eclair or later 2 MB of available hard disk space Supported devices Windows computers desktop and laptop Mac Android smartphones Getting started 45 About Norton Community Watch Supported Norton products To use all the features of Norton Internet Security you must use the following versions of Norton security product If you use an older version of Norton product ensure that you upgrade your product to the latest version to use all the features of Norton Internet Security db Currently there are no upgrades available for Norton Anti Theft and Norton Online Family Supported browsers Internet Explorer 7 0 or later Mozilla Firefox 3 5 or later Google Chrome 6 0 or later Apple Safari 4 0 or later Opera 10 0 or later Norton Internet Security may not
237. g options t Merge the imported data in to the vault that you are currently logged in Replace the existing Identity Safe data that you stored in your vault that you are logged in with the imported data About Edit logins Securing your sensitive data 365 About securing your sensitive data Lets you move your Identity Safe data that you stored in your local vault to online vault When you sync your Identity Safe data from local vault to online vault the data in the local vault is permanently removed Lets you permanently remove the Identity Safe vault The Edit Logins feature in Identity Safe lets you view all the logins that you want Identity Safe to manage Login information includes information such as your email login credentials and Internet banking credentials Identity Safe provides you the option to save your logins when you enter your login information in a Web site s login page You can instantly save your login information in Identity Safe To manage your logins you must be logged in to Identity Safe Identity Safe offers the following features Safely stores Web site login information Lets you save multiple IDs or accounts and passwords for a Web site Lets you organize your logins under various folders Intelligently searches for a particular login Lets you save the Web site name with a name other than the default name Displays the login ID and lets you show or hide the passw
238. g In To log out of Identity Safe 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Under Identity Safe in the Log out of Identity Safe row click Log out now To log in to Identity Safe from the Norton Toolbar 1 Start your Web browser 2 On the Norton Toolbar click Vault Closed 3 Inthe Open Vault window in the Enter the Password box type the password of the vault you want to log in 360 Securing your sensitive data About securing your sensitive data 4 Click Open Vault To log out of Identity Safe from the Norton Toolbar 1 Start your Web browser 2 Onthe Norton Toolbar click Vault Open and then click Close Vault Configuring Identity Safe settings You can use the various features in Identity Safe to manage your personal sensitive information The logins cards and notes help you store and use your information in a secure way To configure Identity Safe settings 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Identity Safe Securing your sensitive data 361 About securing your sensitive data 4 Under Identity Safe identify the feature that you want to use and click Configure Your options are Lets you set up Identity Safe vault You can create a local vault or an online vault and store your Identity S
239. g your sensitive data About securing your sensitive data When you save a login you can do the following i Quickly launch the Web site login page using the URL Change the URL of the login manually Ensure that the URL you change belongs to the same domain as the current URL View the details of the date and time when you last made to the Edit Logins settings To quick launch a login Web page 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Under Identity Safe in the Edit Logins row click Configure 5 Inthe Edit Logins window under Logins select the login for which you want to launch the Web site If you have saved your login in a folder double click the folder and select the login 6 Under Details click the URL that is available next to the Address option to launch the Web site 7 Click Close To change the URL of your login 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Under Identity Safe in the Edit Logins row click Configure You can also access the Edit Logins window from the Vault Open menu on the Norton Toolbar 5 Inthe Edit Logins window under Logins select the login for which you want to launch the Web site 6 Under Details click Change that is available next to the Address option Securing yo
240. gh my firewall or proxy server Type the user name in the Username box and password in the Password box In the Network Proxy Settings window click Apply 80 Getting started About Network Proxy Settings Monitori system s ng your performance This chapter includes the following topics About System Insight About System Insight Norton Internet Security continuously monitors your computer to keep it free of any problems and run at peak efficiency Norton Internet Security constantly scans the vital areas of your computer including memory registry keys and running processes It monitors the important activities such as general file operation network traffic and Internet browsing In addition Norton Internet Security ensures that the activities that it performs on your computer do not degrade the overall performance of your computer System Insight provides you a centralized location where you can view and monitor the activities that you perform on your system System Insight displays such information in the Performance window You can use the Performance window for the following To view monthly history of the important system activities that you performed or that occurred over a period of the last three months The Events graph that appears at the top of the window provides a pictorial representation of important system activities The activities include application installations application downloads 82
241. ght window lets you view more details of events that belong to some of the following categories in the Security History window Lets you view the detailed information about the resolved security risks in an organized way The Resolved Security Risks category includes the infected files that Norton Internet Security repairs removes or quarantines This category mostly includes the medium level or the high level risks that are either quarantined or blocked The File Insight window provides details about the risk level the origin and the activity report of the resolved security risks on your system 428 Monitoring protection features About Security History Lets you view the detailed information about the unresolved security risks in an organized way The Unresolved Security Risks category includes the infected files for which Norton Internet Security was not able to take any action This category mostly includes the low level risks that require your attention for a suitable action The File Insight window provides details about the risk level the origin and the activity report of the unresolved security risks on your system Lets you view the detailed information about quarantined security risks in an organized way The Quarantine category includes the infected files that are isolated from the rest of your computer while they await your attention for a suitable action The File Insight window p
242. gram contains You can also view more details about the vulnerabilities by clicking on the program name To view the list of vulnerable programs 1 Inthe Norton Internet Security main window click Advanced 2 Inthe Network Protection pane click Vulnerability Protection 3 Inthe Vulnerability Protection window view the list of vulnerable applications 4 After you finish viewing the list click Close Viewing details about a vulnerable application The Vulnerability Protection window displays the list of the programs on your computer that are susceptible to malicious attacks In addition you can view details of the vulnerabilities that a program contains The Program Vulnerability Details window displays the names of the attack signatures that Intrusion Prevention uses to detect any attempts to exploit the vulnerabilities in the program You can click an attack signature to get additional information about the signature in the Symantec Security Response Web site The Intrusion Signatures window of Intrusion Prevention lets you view a list of attack signatures Intrusion Prevention relies on this list of attack signatures to detect and block suspicious activity You can uncheck a signature from the list if you do not want Norton Internet Security to monitor the signature 282 Protecting Internet activities About the types of security risks The Program Vulnerability Details list does not include any signature that you d
243. graphical representation of CPU and memory usage by your Norton product Lets you provide feedback on the product on a Symantec Web page This feature may not be available in some versions of Norton Internet Security Getting started 19 About Norton Internet Security main window Lets you create or access your Norton Account Norton Account lets you manage all of your Norton products in one place _ This feature may not be available in some versions of Norton Internet Security Lets you access the Norton Autofix window that provides you various support options You can also access the online Help from the Support drop down menu Help provides links to information that assists you with the specific tasks that you want to complete The online Help guides you to configure all of the product features You can also access the product s version number You can use the following options to perform the important tasks in Norton Internet Security Lets you view the overall protection status of your computer When your system status is Secure your computer is fully protected When your system status is at Attention state ensure that you fix all the issues When your system status is at At Risk state you must take immediate actions to fix the issues 20 Getting started About Norton Internet Security main window Lets you access different types of scans to pr
244. gs window click the Network tab 3 Inthe left pane click Message Protection 296 Protecting Internet activities About Norton AntiSpam 4 Under AntiSpam in the Feedback row select any one from the following three options Automatically sends the misclassified email message to Symantec when you classify an email message as spam or legitimate Prompts you before Norton AntiSpam sends the misclassified email message to Symantec when you classify an email message as spam or legitimate Does not send the misclassified email message to Symantec 5 Inthe Settings window click Apply 6 Click OK About Web Query With the increase in usage of email many users receive a number of unwanted and unsolicited commercial email messages that are known as spam Not only does spam make it difficult to identify valid email messages but some spam contains offensive messages and images The Web Query is a feature of Norton AntiSpam that Norton Internet Security uses to classify the email messages more effectively An effective spam filtration is possible when each email message that you receive is scanned through different filters With only one or two levels of email filters a high percentage of legitimate emails are misclassified as spam or spam is misclassified as legitimate To avoid such misclassification Norton AntiSpam employs different filters Each email filter uses a unique Protecting Internet activities 297 Abo
245. h you want to turn on Quiet Mode About Norton Product Tamper Protection Norton Product Tamper Protection prevents outside programs from making changes to the Norton product This security feature also prevents Windows System Restore from changing Norton files which results in the Restoration Incomplete message Norton Product Tamper Protection protects Norton Internet Security from an attack or modification by any virus or other unknown threat You can protect your product from accidental modification or deletion by keeping the Norton Product Tamper Protection option turned on If you want to temporarily turn off Norton Product Tamper Protection you can turn it off for a specified duration 506 Customizing protection features About customizing settings and options amp You cannot run System Restore on your computer when Norton Product Tamper Protection is turned on You must temporarily turn off Norton Product Tamper Protection to run a successful System Restore Turning off or turning on Norton Product Tamper Protection Norton Product Tamper Protection protects the Norton Internet Security files from an attack or modification by any virus or other unknown threat You can protect your product from accidental modification or deletion by keeping the Norton Product Tamper Protection option turned on If you want to temporarily turn off Norton Product Tamper Protection you can turn it off for a specified durati
246. hat meets the following criteria The latest version of Norton Internet Security must be installed The computer must be connected to the Internet You can create only one online vault for a Norton Account To create online vault 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Under Identity Safe in the Identity Safe Setup row click Configure 5 Click Next and enter your Norton Account credentials If you do not have a Norton Account Identity Safe automatically redirects you to Create Norton Account window to create a new Norton Account 6 Inthe Create your Vault Password window in the Create Vault Password box type your password Securing your sensitive data 351 About securing your sensitive data 7 Inthe Re type Vault Password box type the password again to confirm 8 Inthe Password Hint box type a hint for the password 9 Check Store information online through your Norton Account This option appears only if you log in to your Norton Account 10 Click Create 11 In the Identity Safe Setup Successful window click Get Started Signing in to Norton Account Identity Safe lets you create a local vault and an online vault to save your Identity Safe data You must log in to your Norton Account to create an online vault The Identity Safe data is stored online using your Norton Account You can acc
247. he list it automatically turns on Quiet Mode When Quiet Mode is turned on Norton Internet Security suspends the background activities but does not suppress alerts and notifications You can also add a running program to the Quiet Mode Programs list However when you add a running program Norton Internet Security does not detect the current running instance of the program to turn on Quiet Mode Norton Internet Security turns on Quiet Mode the next time when you execute the program You can also remove a running program from the Quiet Mode Programs list However if Quiet Mode is turned on it turns off only after the running instances of all the programs in the list are complete You cannot turn off Quiet Mode by removing a program from the list when it runs You can view the details of the programs that you add to the Quiet Mode Programs list or remove from the list in the Security History window Adding programs to User Specified Programs You can manually add the programs for which you want Norton Internet Security to turn on Quiet Mode to the Quiet Mode Programs list When you execute the program that you added to the list Norton Internet Security detects the program and turns on Quiet Mode You can also add a running program to the Quiet Mode Programs list However when you add a running program Norton Internet Security does not detect the current running instance of the program to turn on 194 Protecting your files a
248. he Network Security Map window under Total in Network click the minus symbol 5 Inthe confirmation dialog box click Yes To purge the Network Security Map 1 Inthe Norton Internet Security main window click Settings In the Settings window click the Network tab In the left pane click Network Security Settings In the Network Security Map row click Purge AWN In the confirmation dialog box click Yes Viewing the status of your wireless network You can view the status of your wireless network in the Network Security Map window The Network Security Map displays the status of your wireless network as secure or not secure A secure network requires a strong wireless encryption If your wireless network is not secure you can turn on encryption on your wireless router 324 Protecting Internet activities About the Network Security Map For more information on how to secure your wireless network on the left side of the Network Security Map window click the Why is it not secure link Follow the instructions You should only trust a wireless connection that is secure Trusting a wireless connection that is not secure puts all of the devices on your network at risk To view the status of your wireless network 1 Inthe Norton Internet Security main window click Advanced 2 Under Network Protection click Network Security Map 3 On the left side of the Network Security Map window view the status of your wireless
249. he Norton Studio app To use the Remote Management feature you need to register your Norton Internet Security with your 512 Customizing protection features About customizing settings and options Norton Account Your device needs to be connected to the Internet to use Remote Management feature When the Remote Management option is turned on Norton Internet Security publishes details such as your Norton Internet Security subscription status current security state of your device and other details to the Norton Management Norton One and Norton Studio app You can access your Norton Studio app in Windows 8 or Norton Management and Norton One from anywhere to view your Norton Internet Security details and resolve any security issue When this option is turned off Norton Internet Security does not publish any of its details in the Norton Management Norton One and Norton Studio app By default the Remote Management option is turned off You can turn on this option if you want to remotely manage Norton Internet Security on your device In the Norton Management Norton One and Norton Studio app you can do the following View the security statistics of Norton Internet Security for the last 30 days only in Norton Studio app The activities that are displayed in Norton Studio app may vary depending on the latest version of Norton product that is installed on your devices Blocked malicious software Blocked intru
250. he Smart Firewall Permit the use of the NetBIOS name service and the NetBIOS datagram service that the Microsoft Network uses in file and printer sharing NetBIOS is an acronym for Network Basic Input Output System NetBIOS provides name service session service and datagram service Name service provides resolution of names Session service manages sessions for connection oriented services and Datagram service distributes datagrams for connection oriented services Permit the use of the Bootp service Bootp is short for Bootstrap Protocol which enables a computer to discover its own IP address The General Rules window displays a list of predefined general rules These rules appear in the order of their priority levels Rules that appear higher in the list override the rules that appear lower in the list Protecting Internet activities 217 About the Smart Firewall You can add a new General rule in this window You can also do the following activities You can change the settings of a General rule that does not function the way you want However you cannot modify some of the default rules that are read only See Modifying General rules and Program rules on page 233 You can disable a General rule However you cannot turn off some of the default rules that are read only See Turning off a General rule temporarily on page 236 You can change the priority of a General rule b
251. he files that do not belong to the File of Interest even if you manually trust the files However Norton Internet Security excludes all of the manually trusted files from Norton Internet Security scan when you configure Scan Performance Profiles to High Trust You can also remove the user trust from all of the Files of Interest that you manually trusted You can use the Clear All User Trust option next to the drop down list to remove the user trust Lists the files that are not Norton Trusted You can manually trust all the files that are not trusted by clicking the Trust All Files option next to the drop down list You can view file details such as file name trust level community usage resource usage and the stability rating There may be instances when the trust level of a file has changed or a process running might have stopped running You can refresh the Norton Insight Application Ratings window to update the file list and file details The coverage meter provides a graphical representation of the percentage of the Norton Trusted Files and the total Files of Interest The higher the percentage the lesser time the scan takes 117 118 Monitoring your system s performance About System Insight To view the files using Norton Insight 1 Inthe Norton Internet Security main window click Advanced 2 Inthe Computer Protection pane click Application Ratings 3 Inthe Norton Insight Application Ratings w
252. he following Web site safety states when you browse through the Internet You can see Norton Secured icon next to the search results Symantec has analyzed this page and determined that the Web site is VeriSign trusted and is safe to visit You can see a green OK icon next to the search results When you visit a Web site with this status you can see a similar status icon on the Norton Toolbar Norton Safe Web has analyzed this Web site and determined that it is safe to visit You can see a gray question mark icon next to the search results When you visit this Web site the Norton Toolbar shows a green OK icon Norton Safe Web has not analyzed this Web site and it does not have sufficient information about this Web site As Symantec has not tested the Web site it is recommended that you do not visit this Webs site 338 Securing your sensitive data About securing your sensitive data You can see a red cross x icon next to the search results When you visit a Web site with this status you can see a similar status icon on the Norton Toolbar Norton Safe Web has analyzed this Web site and determined that the Web site is unsafe to visit This Web site may attempt to install malicious software on your computer You can see a yellow exclamation mark icon next to the search results When you visit a Web site with this status you can see a similar status icon on the Norton Toolbar Norton Safe Web has
253. he taskbar right click the Norton Internet Security icon and then click Disable Smart Firewall 2 Inthe Security Request window in the Select the duration drop down list select the duration for which you want to turn off Smart Firewall 3 Click OK 214 Protecting Internet activities About the Smart Firewall To turn on Smart Firewall from the notification area In the notification area on the taskbar right click the Norton Internet Security icon and then click Enable Smart Firewall About firewall rules A firewall is a security system that uses rules to block or allow connections and data transmission between your computer and the Internet Firewall rules control how the Smart Firewall protects your computer from malicious programs and unauthorized access The firewall automatically checks all traffic that comes in and out of your computer against these rules The Smart Firewall uses two kinds of firewall rules f r Program rules Control network access for programs on your computer General rules Control all the incoming and the outgoing network traffic About the order in which firewall rules are processed The Smart Firewall processes General rules before it processes Program rules For example consider a case when there is a Program rule that allows Internet Explorer to access Internet using port 80 with TCP protocol and a General rule that blocks TCP communication through port 80 for all applicati
254. his file is suspicious and can harm your computer When the Reputation Scan is complete you can view the summary of the scan results in the Norton Reputation Scan window You can view the reputation information such as the file name trust level age of the file stability rating and community usage for each file The trust level determines whether a file is safe or unsafe If a file has Poor or Bad trust level Norton Internet Security lets you quarantine the file Running a Reputation Full System Scan When you perform a Full System Scan Norton Internet Security scans all the Files of Interest that are available on your computer This fileset includes the files that relate to the running processes startup files and loaded programs To run a Reputation Full System Scan 1 Inthe Norton Internet Security main window click Scan Now 2 Inthe window that appears click Reputation Scan 3 Inthe Reputation Scan pane click Full System Scan In the Norton Reputation Scan window you can analyze the trust level community usage resource usage and stability of the scanned items 160 Protecting your files and data About the Norton Internet Security scans on oO If there is a file with Poor or Bad trust level under the Trust Level column click the red cross x icon In the Quarantine File window click Quarantine this file In the Manual Quarantine window click Add Click Close In the Norton Reputation Scan window c
255. ice to the Network Security Map 1 Inthe Norton Internet Security main window click Advanced 2 Under Network Protection click Network Security Map 3 On the left side of the Network Security Map window under Total in Network click the plus symbol 4 Inthe Adda Device window in the Name box type the name of the device that you want to add to the Network Security Map The maximum character length of the device name is 15 characters 5 Inthe IP or Physical Address box type the IP address or physical address of the device that you want to add to the Network Security Map You can use the following formats in the IP or Physical Address box 172 16 0 0 fe80 12ac fe44 192a 14cc 11 22 c3 5a fe a4 ftp myfiles com The address that you provide is not verified until the device is physically found on the network 6 Click Add Device Protecting Internet activities 313 About the Network Security Map Finding a computer s IP address You can find a computer s IP address in various ways On Windows 2000 XP Windows Vista Windows 7 and Windows 8 computers you can use the ipconfig command to find the IP address of a computer The ipconfig command reports the IP address of its local computer only You must run this program on the computer that you want to identify To find the IP address by using ipconfig on Windows 2000 XP 1 On the computer you want to identify on the Windows taskbar click Start gt Run
256. ich you want to change the password 6 Under Details next to the Password box click Show The Validate Password for Identity Safe window appears This window appears only if you have changed the security level of the Identity Safe password to Ask for my password before filling out alogin or form in the Password amp Security window 7 Inthe Validate Password for Identity Safe window do the following In the Enter the Password box type your Identity Safe password Click Validate 8 In the Edit Logins window in the Password box type the new password 9 Click Close 10 In the confirmation dialog box click Yes to save the changes Updating the password for a login Good security practice requires that you regularly change the password for a login You can keep your login credentials in Identity Safe updated every time you change your password for a Web page The updated information is automatically filled the next time you visit that login s associated Web page You can also update your new login information in Identity Safe when you are on the Web page Identity Safe asks you if you want to update your logins To update the password for a login 1 Go to the Web page for which you want to change the password information 2 Clear the password entry that Identity Safe autofilled Securing your sensitive data 375 About securing your sensitive data 3 Type the new password and then click the button or link th
257. ick Performance 2 Inthe Performance window do one of the following To view the CPU graph click the CPU tab To view the memory graph click the Memory tab 3 Do one of the following To obtain historical data for the last one day click 1D To obtain historical data for the last one week click 1W To obtain historical data for the last one month click 1M Monitoring your system s performance 97 About System Insight Identifying resource consuming processes You can click at any point on the CPU graph or memory graph to obtain a list of top three processes that consume maximum resources of your computer at that point You can click a process that is available in the list to get more information about the process in the File Insight window To identify resource consuming processes 1 Inthe Norton Internet Security main window click Performance 2 Inthe Performance window do one of the following To view the CPU graph click the CPU tab To view the memory graph click the Memory tab 3 Click at any point on the graph to obtain a list of resource consuming processes 4 Click the name of a process to obtain additional information about the process in the File Insight window About Startup Manager Some programs are configured to launch during startup of your computer The number of startup items increases as you install new applications and the time that is required to start your computer increas
258. ight Network Scan option is available only if the Insight Protection option is turned on To access the Insight Protection option go to the Norton Internet Security main window and then click Settings gt General gt Other Settings gt Insight Protection About Computer Scan Norton Internet Security automatically downloads latest virus definition regularly and secures your computer from all types of viruses and unknown threats When Norton Internet Security performs a Computer Scan it uses the latest virus definitions that Symantec provides The threat detections that are based on the local definition are specified with a specific name For example if a Trojan horse is detected the scan results of the Computer Scan displays the threat as Trojan Foo You can click the Scan Now option available in the Norton Internet Security main window to access the different types of computer scans Protecting your files and data 135 About the Norton Internet Security scans If you suspect that your computer is infected you can run three types of computer scans manually to prevent virus infections on your computer You can run the following types of computer scans Scans the important locations of your computer that the viruses and other security threats often target Quick Scan takes less time to scan than a Full System Scan because this scan does not scan your entire computer Scans your computer for all types of viruses and se
259. iles of Interest that are available on your computer When you run a Reputation custom scan Norton Internet Security lets you select the drive folder or file that you want to scan Reputation Scan filters the files on the basis of certain filtering criteria and performs an Insight Network Scan on the filtered files Reputation Scan filters exe files scr files sys files dll files drv files ocx files and msi files and analyzes these files Norton Internet Security displays the reputation information of the scanned files in the Norton Reputation Scan window Norton Internet Security consolidates the reputation information of your most recent scan and presents the reputation information using different graphical formats The top of the Norton Reputation Scan window displays the following statistics The Trust Level graph displays the average trust level of files on your computer It also displays the average trust level of the files that Symantec analyzes within the Norton Community The Community Usage graph displays the average community usage of files on your computer It also displays the average community usage of the files that Symantec analyzes within the Norton Community The Stability graph displays the average reliable files on your computer It also displays the average reliable files that Symantec analyzes within the Norton Community Stability ratings vary depending upon your operating system Prot
260. indow select an option from the Show drop down list to view a category of files You may need to scroll the window to view all the files that are listed in the details area 4 Click Close To refresh the list of files In the Norton Insight Application Ratings window at the top of the file icon click the refresh icon Checking the trust level of a file Norton Insight lets you check the details of the Files of Interest that are available on your computer You can view details such as signature of the file and the date on which the file was installed You can also view details such as the trust level stability details community usage resource usage and the source of the file You can use the Locate option to find the location of the file on your computer When you right click a file that is available on your computer the shortcut menu displays Norton Internet Security option and then Norton File Insight option You can use the options to check the details of a File of Interest Norton Internet Security displays the Norton File Insight option only when you right click a File of Interest In Windows Safe mode you cannot access this option for any file Norton Internet Security also categorizes any file for which you open the File Insight window to view details as a File of Interest The Symantec server stores the hash value and trust level details of the File of Interest The server provides the file details immediately af
261. into your Allowed List 7 Click OK to save the changes and close the Client Integration window Setting Address Book Exclusions When you add an email address to the Address Book Exclusions list Norton AntiSpam does not import the address into the Allowed List and Blocked List If you delete an email address from the Allowed List or Blocked List Norton AntiSpam automatically adds the address to the Address Book Exclusions list However when you delete an email address that you manually added to the Allowed List or Blocked List Norton AntiSpam does not add the address to the Address Book Exclusions list You cannot add a domain name to the Address Book Exclusions list When you delete a domain name from the Allowed List or Blocked List Norton AntiSpam does not add the domain name to the Address Book Exclusions list You can specify Address Book Exclusions before you import the address book Add all email addresses to the Address Book Exclusions list that you do not want to import from the address book of your email program To add entries to the Address Book Exclusions list 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Message Protection 4 Under AntiSpam in the Address Book Exclusions row click Configure 5 Inthe Address Book Exclusions window click Add 6 Inthe Add Email Address dialog box type the email address Optionally type
262. ion 85 86 Monitoring your system s performance About System Insight Provides the details about Quick Scans that Norton Internet Security performed on your system over a period of the last three months The details include the date on which a Quick Scan was performed and the number of Quick Scans that were performed on that date The View Details link provides additional details such as the scan time total items scanned total risk detected total risks resolved and recommended action Viewing details of your system activities System Insight lets you view details of the system activities that you performed or that occurred over the last three months in the Performance window The activities include application installations application downloads disk optimizations threat detections performance alerts or Quick Scans You can use the tabs at the top of the Events graph to obtain details for the current month and for the last two months The Events graph at the top of the Performance window displays each activity as icon or stripe The description for each icon or stripe appears at the bottom of the graph The pop up that appears when you move the mouse pointer over an icon provides you the details about the activity The details include the date on which an activity was performed and the number of such activities that you performed on that date The View Details link provides additional details of the activit
263. ion Log in to other product add ons such as Norton Online Family and Norton Online Backup Your computer must be connected to the Internet to create a Norton Account If you use a proxy server to connect to the Internet you must configure the proxy settings To configure the proxy settings of your network go to the Norton Internet Security main window and then click Settings gt Network gt Network Security Settings gt Proxy Server gt Configure You can also create a Norton Account when you activate your product When you create your Norton Account from the product your product gets registered in your account If you have an existing Norton Account you can provide the same email address in the Norton Account window in your product This way you can register your current product and add it to the list of Norton products in your existing Norton Account If you upgrade your registered product to the latest available version your product remains registered to the same Norton Account In this case you can continue using the same Norton Account login credentials Symantec products that are older than the 2006 product year do not appear in your Norton Account Getting started 37 About your Norton Account To create a Norton Account from the Norton Account Web page 1 Inthe Norton Internet Security main window click Account 2 Inthe Norton Account Web page that appears click Sign up now 3 Inthe Norton Account Sign Up
264. ion this section automatically provides you the Fix Now option to fix all the issues at once 22 Getting started About Norton Internet Security main window The options on the right side of the Norton Internet Security main window help you do the following Online Family Getting started 23 About Norton Internet Security main window Lets you monitor your child s activities on the Internet Norton Online Family may not be available in some versions of Norton Internet Security When you click the Online Family icon the Norton Internet Security main window displays Norton Online Family Log in option Norton Online Family provides you advanced controls to monitor your child s online activities Symantec recommends that you use your Norton Account login credentials to sign in to Norton Online Family If you register your product with your Norton Account your Norton Account email address is auto filled in the email address text box You can use the Click Here link to set up your account with Norton Online Family After you set up your account you can sign in to your account on the Norton Internet Security main window and view your child s Internet activities You can view details such as your child s latest search terms and the latest alerts After you sign in you can use the Get Details option to view more details on the Norton Online Family Web site 24 Getting started About Norton Inte
265. ions are classified into the following two sets Contains all the virus definitions for each threat that is known to Symantec 68 Getting started About LiveUpdate Contains the most important virus definitions that are required for latest security threats as viewed by Symantec The Core Set is a subset of the Complete Set and it is approximately 30 percent smaller than the Complete Set The Core Set minimizes download time installation time and system start time It also occupies lesser amount of disk space as compared to the Complete Set virus definitions Therefore the Core Set results in faster performance of your computer The Core Set virus definitions are called as Smart Definitions Norton Internet Security provides the Smart Definitions option to choose between Core Set virus definitions and Complete Set virus definitions for LiveUpdate sessions To access the Smart Definitions option go to the Norton Internet Security main window and then click Settings gt Updates gt Smart Definitions During Automatic LiveUpdate or each time that you run LiveUpdate manually Norton Internet Security checks if the Smart Definitions option is turned on or off It then downloads and installs the desired set of virus definitions based on the option settings By default the Smart Definitions option is turned on which means that the Core Set virus definitions are downloaded and installed Turning off or turning
266. irewall Smart Firewall monitors communications between your computer and the other computers on the Internet It also protects your computer from common security problems If you must turn off the Smart Firewall you should turn it off temporarily to ensure that it is turned on again automatically To ensure that your computer Protecting Internet activities 213 About the Smart Firewall remains protected you can turn on the Smart Firewall manually before the time that you specify concludes When the Smart Firewall is turned off your computer is not protected from Internet threats and security risks To turn off Smart Firewall 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Smart Firewall 4 Inthe Smart Firewall row move the On Off switch to the right to the Off position 5 Click Apply 6 Inthe Security Request window in the Select the duration drop down list select the duration for which you want to turn off Smart Firewall 7 Click OK 8 Click OK To turn on Smart Firewall 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Smart Firewall 4 Inthe Smart Firewall row move the On Off switch to the left to the On position 5 Click Apply 6 Click OK To turn off Smart Firewall from the notification area 1 In the notification area on t
267. irewall rules Each list of firewall rules is processed from the top down You can adjust how the firewall rules are processed by changing their order db Do not change the order of the default General rules unless you are an advanced user Changing the order of default General rules can affect firewall functionality and reduce the security of your computer To change the order of General rules 1 Inthe Norton Internet Security main window click Settings 2 In the Settings window click the Network tab 3 Inthe left pane click Smart Firewall 4 Under Smart Firewall in the Advanced Settings row click Configure 5 Inthe Advanced Settings window in the General Rules row click Configure 6 Inthe General Rules window select the rule that you want to move 7 Do one of the following To move this rule before the rule above it click Move Up To move this rule after the rule below it click Move Down 8 When you are done moving the rules click OK 9 Inthe Advanced Settings window click OK To change the order of Program rules 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Smart Firewall 4 Under Smart Firewall in the Program Control row click Configure 236 Protecting Internet activities About the Smart Firewall In the Program Control window in the Program column select the program that contains the rule that
268. isable in the Intrusion Signatures window By default all the signatures in the Intrusion Signatures window are turned on Unless you have a good reason to disable a signature you should leave the signatures turned on If you disable a signature your computer may be vulnerable to attack To view details about a vulnerable application 1 Inthe Norton Internet Security main window click Advanced 2 Inthe Network Protection pane click Vulnerability Protection 3 Inthe Vulnerability Protection window in the Program column click the program name for which you want to view the details 4 Inthe Program Vulnerability Details window view the signature details of the program 5 If you want to view additional information about the signature then click the signature name 6 After you finish viewing the vulnerability details in the Program Vulnerability Details window click Close 7 Inthe Vulnerability Protection window click Close About the types of security risks Security risks such as spyware and adware can compromise your personal information and privacy Spyware and adware programs are closely related In some cases their functionalities might overlap but while they both collect information about you the types of information that they collect can differ Spyware programs might put you at risk for identity theft or fraud These programs might log your keystrokes capture your email and instant messaging traffic The
269. istory log entry if you want Norton Internet Security to create an entry in the firewall event log Norton Internet Security creates an entry when a network communication event matches this rule You can view the event log in the Security History window under Firewall Activities If you selected the Monitor option in the Action window then the Create a Security History log entry option is automatically checked You cannot uncheck the box to turn off this option as it is the default setting 10 Check Apply this rule if you want to apply this rule to IPv6 NAT Traversal traffic 11 Click Next and then in the text box type aname for this rule 12 Click Next and then review the new rule settings 13 Click Finish 14 When you have finished adding rules click OK Modifying General rules and Program rules You can change an existing firewall rule if it does not function the way that you want You can use the Modify option to change the settings of an existing firewall rule When you change arule the firewall uses the new criteria of the modified rule to control network traffic You cannot modify some of the default rules that are read only However you can view the settings of these rules by using the View option To modify a General rule 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Smart Firewall 4 Under Smart Firewall in the Advan
270. it is safe or unsafe You can turn off or turn on Antiphishing in the Safe Surfing section of the Settings window The Safe Surfing section is available in the Web tab To turn off or turn on Antiphishing 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Safe Surfing 4 Inthe Antiphishing row do one of the following To turn off Antiphishing in the Antiphishing row move the On Off switch to the right to the Off position To turn on Antiphishing in the Antiphishing row move the On Off switch to the left to the On position 5 In the Settings window click Apply 6 Click OK About Norton Safe Web Norton Safe Web helps you surf search and shop more safely on the Internet By using Norton Safe Web you can check if a Web site is malicious or not even before you visit it Norton Safe Web analyzes the Web sites you visit and detects if there are any viruses spyware malware or other security threats that exist on the Web sites Based on the analysis Norton Safe Web provides safety ratings for all the Web sites In addition Norton Safe Web lets you view the community rating and user reviews of the Web sites you visit 336 Securing your sensitive data About securing your sensitive data amp Norton Safe Web supports Internet Explorer Firefox or Chrome Web browsers You can view the site safety status of any Web site u
271. itoring your system s performance About System Insight 4 Do one of the following Torun a background job click the play icon that appears before the name of the background job To stop arunning background job click the stop icon that appears before the name of the background job 5 Click Close About Power Source You can choose the power source for Norton Internet Security to perform the Norton Tasks when the computer is idle Norton Tasks are background tasks that Norton Internet Security performs when your computer is idle Norton Tasks include Quick Scan Automatic LiveUpdate Norton Community Watch Norton Insight Full System Scan Insight Optimizer and Pulse Updates Norton Internet Security consumes more power when it runs Norton Tasks By default Norton Internet Security performs these tasks only when your computer is connected to the external power For example if you are in an airport and your computer is running on battery power Norton Internet Security does not perform the Norton Tasks In this way you can extend the battery power of your computer However you can choose the power source for Norton Internet Security to perform the Norton Tasks You can select one of the following options External Allows the Norton Tasks to run only when your computer uses external power If you choose this option Norton Internet Security performs the Norton Tasks when the computer is idle and connected to exter
272. ity Safe If you want to change the Identity Safe password of your online vault the password you provide must have the following characteristics At least eight characters At least one capital letter At least two numerals 0 through 9 At least one symbol for example gt amp The password must not match with your Norton Account user name or password You can set your password hint here if you did not provide it when you configured Identity Safe To change the Identity Safe password 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Under Identity Safe in the Password amp Security row click Configure 5 Inthe Password amp Security window click Change Password 6 Inthe Change Identity Safe Password window type the current password and the new password and confirm the new password 7 Click OK 8 Inthe confirmation dialog box click OK About Norton Toolbar When you install Norton Internet Security it adds Norton Toolbar to Internet Explorer Firefox and Chrome Web browsers Securing your sensitive data 391 About securing your sensitive data You have the following options in the Norton Toolbar Lets you access the Web Settings and other settings The following options are available in the Norton menu Report Site Settings Go to Norton Safe Web website Enable Norton
273. ity Settings with a password using the Settings Password Protection option If the Settings Password Protection option is turned on you need to enter the Settings password each time to view or configure your Norton Internet Security settings You cannot access the product settings without providing your Settings password In case you forget your Settings password you can reset it using the reset settings password option in the Select Uninstall Preference window You can turn off the Settings Password Protection option if you do not require password protection for Norton Internet Security settings To turn off Norton Internet Security Settings password 1 Inthe Norton Internet Security main window click Settings 2 Inthe dialog box that appears in the Password box type your Settings password and then click OK 3 Inthe Settings window click the General settings tab 4 Inthe left pane click Product Security 5 Click Apply and then click OK Resetting your Norton Internet Security Settings password If you forget your Norton Internet Security Settings password you can reset the password You can reset 510 Customizing protection features About customizing settings and options your Norton Internet Security Settings password using the reset settings password option in the Select Uninstall Preference window To access the Select Uninstall Preference window you must choose to uninstall Norton Internet Security How
274. ity main window and then click Settings gt Web gt Safe Surfing gt Block Malicious Pages If you turn off the Block Malicious Pages option Norton Safe Web does not block the unsafe Web sites However Norton Toolbar displays the status of these Web sites as unsafe even when the option is turned off You can block malicious pages using the Block Malicious Pages option under Safe Surfing option in the Web tab The Web tab is available under the Settings window 340 Securing your sensitive data About securing your sensitive data In addition Norton Safe Web protects your computer while you use Facebook It scans each URL that is available on your Facebook Wall and displays the Norton rating icons for the scanned URLs You can also let other Facebook users know about the security status of any Web site To scan your Facebook Wall using Norton Safe Web use the Scan Facebook Wall option The option appears when you click the Scan Now option in the Norton Internet Security main window Searching the Web using Norton Safe Search Norton Safe Search enhances your Web search experience When you search the Internet using Norton Safe Search it uses Ask com to generate the search results Norton Safe Search provides the site safety status and Norton rating for each of the search results generated By default the Norton Safe Search box is enabled After you install Norton Internet Security and open Internet Explorer Firefox or Chr
275. ity main window click Settings 2 Inthe Settings window in the left pane click AntiVirus and SONAR Exclusions 3 Inthe Signatures to Exclude from All Detections row click Configure 4 In the Signature Exclusions window click Add 5 In the Security Risks window click on a security risk that you want to exclude and then click Add 6 Inthe Signature Exclusions window click Apply and then click OK 7 Inthe Settings window click OK About clearing file IDs that are excluded during scans When you run a Reputation Scan Norton Internet Security provides information on the trust worthiness of all programs and processes running on your computer Reputation Scan helps you detect the files that are suspicious or vulnerable on your computer using the reputation based threat detection Norton Internet Security provides reputation information such as trust level user prevalence and stability for each program and process that is scanned Norton Internet Security stores the reputation information of all scanned files All trusted and favorable files are provided with Trusted and Good trust levels If any of the scanned files is suspicious or vulnerable Norton Internet Security assigns Bad or Poor trust level During each successive scan that you run Norton Internet Security excludes the Trusted and Good files from being scanned However if you want Norton Internet Security to scan all the files in your computer you must clear
276. ive data 2 On the Norton Toolbar in the Vault Open Vault Closed menu select one of the following Merge Portable Data Drive Stop ignoring this page Recently Used Logins All Logins Lets you merge the Identity Safe data from your portable profile that you have created from the previous versions of Norton Internet Security This option appears in the Vault Open Vault Closed menu only if you have connected an external drive with portable profile You can select this option if you want to autofill the login information in the current Web page This option appears in the Vault Open Vault Closed menu only if you select Ignore this page option Lets you view the list of logins that you used recently in that computer You can view only the latest five logins that you used Lets you view the list of all the logins you have stored in Identity Safe Securing your sensitive data 401 About securing your sensitive data Settings 402 Securing your sensitive data About securing your sensitive data Lets you view the various options that are available in Identity Safe The options are Edit Logins Lets you open the Edit Logins window Edit Identity Cards Lets you open the Edit Identity Cards window Edit Notes Lets you open the Edit Notes window Export Lets you open the Export Identity Safe Data window Import Lets you open the Import Identity Safe Data window Sync to
277. ive data About Browsing Options Browsing Options lets you configure the way you want Identity Safe to collect store and display the login information for the Web pages you visit You can configure Identity Safe to display your cards that you created for the Web sites that have forms You can also configure the autofill settings for the Web sites that contain security threats db Symantec recommends you to keep the default settings for logins You can configure the following options in the Browsing Options window Display my Logins eachtime Configures Identity Safe to I visit a page with multiple display your logins each time Logins you visit a Web site that has multiple logins Autofill my logins when Automatically fills your login visit websites details when you visit a Web site Autocategorize Logins Automatically categorizes the saved logins in their respective folders such as Banking Shopping News and so on Display my Identity Cards Displays your Identity Cards each time visit a page with each time you visit a Web fillable form page with forms to fill your personal details 386 Securing your sensitive data About securing your sensitive data Save my credentials when Lets you save the login log in to Web sites credentials for the Web sites that you visit You can use the following options Yes Save Automatically No Never Save any logins Ask before saving In addition you can use the
278. ive data The Internet provides the fastest and the easiest way to exchange information In spite of the many advantages that the Internet provides you are vulnerable to information theft and identity theft Information can be stolen and misused in several ways Following are a few of the most common methods of information theft Online financial transactions Unsafe online storage of sensitive information Misuse of your identity while you communicate online The Identity Safe feature in Norton Internet Security offers several powerful ways to tackle identity theft Identity Safe is the best tool that you can use to safeguard your identity while you are online About Safe Surfing Safe Surfing comprises of the Antiphishing and the Norton Safe Web features Antiphishing analyzes the security level of the Web sites that you visit and displays the results in the Norton Site Safety pop up 332 Securing your sensitive data About securing your sensitive data window The Norton Safe Web feature provides you a safe search environment in the Web by displaying the site rating icons next to every search result When you install Norton Internet Security it adds the Norton Toolbar to the Internet Explorer Firefox or Chrome browsers Norton Internet Security protects your Web browsers when you turn on the Antiphishing and Norton Safe Web options in the Safe Surfing section of the Norton Internet Security Settings window The Saf
279. k Yes to confirm 4 Inthe Results Summary window do one of the following Ifno items require attention click Finish If any items require attention review the risks on the Threats Detected window Deleting a custom scan You can delete custom scans if they are no longer needed You can delete a custom scan in the Scans window To delete a custom scan 1 Inthe Norton Internet Security main window click Scan Now 2 Inthe Computer Scan pane click Custom Scan 3 Inthe Scans window in the Delete column click the delete icon next to the custom scan that you want to delete 146 Protecting your files and data About the Norton Internet Security scans 4 Click Yes to confirm that you want to delete the scan About scheduling scans Norton Internet Security automatically detects the idle state of your computer and runs a Full System Scan However you can schedule a Full System Scan according to your preferences You can also set up a schedule for a Quick Scan and custom virus scans that you create You can schedule scans to run automatically on specific dates and times or at periodic intervals If the scheduled scan begins when you use your computer you can run the scan in the background instead of stopping your work Norton Internet Security lets you schedule the Full System Scan Quick Scan and custom virus scans However you cannot schedule the Drive Scan Folder Scan and File Scan You can also set
280. ks 106 Monitoring your system s performance About System Insight The Norton Tasks window lets you monitor the following Norton specific tasks Automatic LiveUpdate Full System Scan Insight Optimizer Norton Community Watch Automatic LiveUpdate automatically checks for definition updates and program updates when your computer is connected to the Internet By default Automatic LiveUpdate checks for updates every hour Scans your entire computer for viruses spyware and different security vulnerabilities Optimizes the boot volume of your computer Norton Community Watch protects your computer against potential risks It collects the information about new security threats from your computer and submits the information to Symantec for analysis Symantec assesses the data to identify the new threats and resolves it Monitoring your system s performance 107 About System Insight Norton Insight Allows the smart scanning of files on your computer It improves the performance of Norton Internet Security scans by letting you scan fewer files without compromising the security of your computer Norton Insight lets you check the details of the Files of Interest that are available on your computer You can view details such as signature of the file and the date on which the file was installed You can also view details such as the trust level community usage resource usage and the source of the fi
281. l about 217 turning on and off 219 B background jobs about 104 monitoring 109 backup Identity Safe data 382 Backup and Restore about 382 Bandwidth defining usage 328 managing 326 Blocked List 291 blocking spam 284 Boot Time Protection 195 configure 196 Browsing options 385 Browsing Options about 385 C Cards about 375 adding 376 deleting 378 duplicating 378 update image 376 updating 378 changing scan schedules 149 Client Integration configuring 286 cloud technology Cloud 152 ClubNorton security tips 528 communication port modifying 325 computer protection status 31 Computer Settings about 463 computers blocking with AutoBlock 275 IP address 313 configure Identity Safe 360 CPU graph about 94 obtaining historical data 96 resource consuming processes 97 CPU usage viewing 95 Creating custom scans adding files 141 adding folders 141 Crimeware Protection turning off or turning on 456 custom scan configure scan options 143 select items 142 custom scans about 141 creating 141 deleting 145 editing 144 particular area 141 running acustom scan 144 scan frequently 141 schedule the custom scan 141 scheduling 146 149 customer support about 523 using 524 customizing Allowed List 289 Blocked list 291 D definition status 71 definition updates 65 obtaining 75 deleting custom scans 145 deleting custom scans deleting 145 detecting security risks 200 device adding 311
282. l security risks are assessed from the submitted data Symantec sends the information back to Norton Internet Security The Norton features such as Norton Insight and Insight Network use this information to identify files and processes at risk You should participate in Norton Community Watch submissions to provide valuable contribution to the entire community that uses Norton security products Symantec maintains an adequate level of protection for the collected information To allow or deny the detailed data submissions you must configure the Detailed Error Data Collection option under Norton Community Watch To access the Detailed Error Data Collection option go the Norton Internet Security main window and then click Settings gt General gt Other Settings gt Detailed Error Data Collection The detailed data may vary depending on the Norton specific errors and components You can configure the option to manage the data submissions Norton Community Watch collects and submits detailed data about the Norton specific errors and components only It does not collect or store any personal information of any user Getting started 47 About Norton Bootable Recovery Tool If you chose not to join Norton Community Watch when you installed your Norton product you can turn it on later To access the Norton Community Watch option go to the Norton Internet Security main window and then click Settings gt General gt Other Settings gt No
283. launch anti malware protection go to the Norton Internet Security main window and then Protecting your files and data 197 About the Norton Internet Security scans click Settings gt Computer gt Real Time Protection gt Early Launch Anti Malware Protection gt On By default this option is turned off O This option is available only on Windows 8 Turning on or turning off Early Launch Anti Malware Protection The Early Launch Anti Malware Protection feature provides enhanced security level during the boot time when you start your computer It ensures better protection by running all the necessary components of Norton Internet Security that are required to block any malware from functioning when you start your computer O This option is available only on Windows 8 To turn on or turn off early launch anti malware protection 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window in the left pane click Computer Scan 3 Inthe Early Launch Anti Malware Protection row do one of the following To turn on Early Launch Anti Malware Protection move the On Off switch to the left to the On position To turn off Early Launch Anti Malware Protection move the On Off switch to the right to the Off position 4 Inthe Settings window click Apply and then click OK 198 Protecting your files and data About the Norton Internet Security scans Responding to security issues This
284. le Pulse Updates Pulse Updates check for definition updates every five minutes and downloads the streamed virus definitions Pulse Updates provide the updates during the full updates which LiveUpdate downloads automatically every few hours Always ensure that the Pulse Updates option is turned on It protects you from the latest threats without compromising your system performance or disrupting your online experience 108 Monitoring your system s performance About System Insight Quick Scan Scans the important locations of your computer that the viruses and other security threats often target Quick Scan takes less time to scan than a Full System Scan because this scan does not scan your entire computer The following grayed out categories of jobs run in the background to improve your system performance and protection You can only view the last run details for the following activities Identity Safe Maintenance AntiSpam Maintenance Licensing Maintenance Insight Maintenance Performs background maintenance tasks related to Identity Safe Tasks include sending Identity Safe profile statistics and downloading the favorite icons Performs background maintenance tasks related to AntiSpam Tasks include updating contacts and AntiSpam filters Performs background maintenance tasks related to licensing Performs background maintenance tasks related to Norton Insight Tasks include maintaining de
285. le Recovery Tool only from a CD DVD or USB key To use it you first need to burn it to a CD or DVD If you choose to create Norton Bootable Recovery Tool on are writable CD or DVD all the data that are stored in the CD or DVD are permanently deleted Ensure that you back up all the data before creating Norton Bootable Recovery Tool on a re writable CD or DVD To create Norton Bootable Recovery Tool CD or DVD 1 Open your CD drive and insert an empty CD or DVD 2 Inthe Norton Bootable Recovery Tool main window click Create on CD DVD media 3 Inthe Create on CD DVD media window do of the following Select the CD drive from the Specify drive drop down list If you want to add drivers click Add next to Add drivers If you want to change the default language click Change next to Specify language You can change the language in the Select Language window By default Norton Bootable Recovery Tool is created in English 4 Click Next 5 If you create Norton Bootable Recovery Tool on a re writable CD or DVD click Yes to confirm 6 Review the results and do one of the following Click Done to close Norton Bootable Recovery Tool Click Back to Main to create or update Norton Bootable Recovery Tool in another media 54 Getting started About Norton Bootable Recovery Tool Creating Norton Bootable Recovery Tool ISO file You can create a Norton Bootable Recovery Tool ISO file on your computer You can burn this ISO file
286. left to the On position 5 In the Settings window click OK 6 Click OK About configuring POP3 and SMTP ports Norton Internet Security automatically configures your email program to protect it from viruses and other security threats Norton Internet Security supports all email accounts that use non SSL POP3 and SMTP communication protocols Norton Internet Security also scans all incoming and outgoing email messages Protecting Internet activities 299 About configuring POP3 and SMTP ports Norton Internet Security lets you manually configure your POP3 and SMTP email ports for email protection Typically your Internet service provider ISP provides you the port numbers for your email program If the SMTP and POP3 port numbers for your email program are different from the default port numbers you must configure Norton Internet Security To ensure email protection Symantec recommends that you check the POP3 and SMTP port numbers for your email program If they are not the default ports add them to the Protected Ports window To configure the Protected Ports Settings option go to the Norton Internet Security main window and then click Settings gt Network gt Message Protection gt Protected Port Settings gt Configure If you do not want Norton Internet Security to protect a port you can remove the port from the Protected Ports window db You cannot remove the default SMTP port 25 and POP3 port 110 Norton Internet Sec
287. lent Web sites Norton Internet Security identifies the fraudulent Web sites Symantec analyzes the pages of these sites and verifies if they belong to the company that it represents You can be confident that the information that you provide goes to the company with which you want to do business You can report the evaluation of a Web site you suspect to be fraudulent to Symantec for further evaluation Use the Report Site option from Norton Toolbar to report a Web site You can also report the evaluation of a Web site that you suspect to be fraudulent but Antiphishing reports as safe Even when you turn off the Antiphishing option Norton Internet Security protects you from Internet threats through its Norton Safe Web features When Antiphishing is turned off you cannot use the Report Site option in the Norton menu to submit the evaluation of the Web site to Symantec The Norton Site Safety pop up window displays the following messages Site is Safe Site is Unsafe Site Untested Norton Secured Caution Fraudulent Site Suspicious Site Page Not Analyzed 334 Securing your sensitive data About securing your sensitive data Reporting an incorrect evaluation of a Web site On rare occasions Antiphishing may report incorrect evaluation of a Web site For example you might visit a site that you shop with regularly and Antiphishing reports that the site is fraudulent On the contrary you might visit a Web site th
288. lete a login or a folder 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Under Identity Safe in the Edit Logins row click Configure 5 Inthe Edit Logins window under Logins select the Web site name or the folder that you want to delete You can only delete the folders that you manually create You cannot delete the folders created through auto categorization 6 Click Delete 7 Inthe Warning dialog box click Yes 8 Click Close You can also use Login Assistant option on the Norton Toolbar to view copy or edit the logins or cards in your online vault Identity Safe automatically detects login fields which are not auto filled or filled incorrect by Identity safe in the Web pages and displays the Need Assistance menu bar in your browser The Need Assistance menu bar will let you use the saved login credentials If you want manually enter the details from your Identity Safe data you can click Copy option to copy and paste the information You need to validate your vault password for managing the login credentials in the Login Assistant window if you have selected Require Identity Safe password before filling option in the Edit Logins window Managing your URL details Edit Logins lets you view the URL of the logins that you saved You can view the URL of the Web site logins that you save in Edit Logins 372 Securin
289. lick Performance Monitoring your system s performance 103 About System Insight 2 Inthe Performance window at the top of the security status graph click Optimize To optimize your boot volume from the Norton Tasks window 1 Inthe Norton Internet Security main window click Performance 2 Inthe Performance window click Norton Tasks 3 Inthe Norton Tasks window under the Norton Tasks column click the play icon that appears before Insight Optimizer About the Idle Time Optimizer Idle Time Optimizer lets you configure Norton Internet Security to defragment your boot volume or the local disk that contains boot volume when your computer is idle Norton Internet Security automatically schedules the optimization when it detects the installation of an application on your computer and your computer is idle If you start using your computer again Norton Internet Security stops the optimization task and starts optimizing the next time that your computer is idle This way the background job of optimization does not affect the performance of your computer Optimization rearranges file fragments into adjacent or contiguous clusters in the hard disk It improves the computer performance by reading the files into the memory faster Optimization also maximizes the usable free space on a disk by grouping most frequently used files and infrequently used files In addition it consolidates free space to avoid fragmenting newly added
290. lick Close Running a Reputation Quick Scan When you perform a Quick Scan Norton Internet Security scans only the running processes and the loaded programs Reputation Quick Scan does not scan your entire computer and it takes lesser time to run than a Reputation Full System Scan To run a Reputation Quick Scan 1 on oO In the Norton Internet Security main window click Scan Now In the window that appears click Reputation Scan In the Reputation Scan pane click Quick Scan In the Norton Reputation Scan window you can analyze the trust level community usage resource usage and stability of the scanned items If there is a file with Poor or Bad trust level under the Trust Level column click the red cross x icon In the Quarantine File window click Quarantine this file In the Manual Quarantine window click Add Click Close In the Norton Reputation Scan window click Close Running a Reputation custom scan Norton Internet Security lets you scan specific areas on your computer by using the Reputation custom scan You can scan any of your computer s drives removable drives folders or files For example if you want to Protecting your files and data 161 About the Norton Internet Security scans check the trust level of a specific file you can scan the particular file To run a Reputation custom scan 1 Inthe Norton Internet Security main window click Scan Now 2 Inthe window that appears click Reputa
291. lick OK In the Information dialog box click OK The Information dialog box prompts you to set a password for the login that you created 10 In the Edit logins window in the Password box type the password of your login 11 Click Close 12 In the Save dialog box click Yes to save the changes The Save dialog box appears only if you set a password for the login that you created To set a password for the login that you added manually 1 In the Norton Internet Security main window click Settings In the Settings window click the Web tab In the left pane click Identity Safe Under Identity Safe in the Edit Logins row click Configure In the Edit Logins window under Logins select the login for which you want to set a password Under Details next to Password box click Show The Validate Password for Identity Safe window appears This window appears only if you have changed the Identity Safe password security level to Ask for my password before filling out a login or form in the Password amp Security window In the Validate Password for Identity Safe window do the following In the Enter the Password box type your Identity Safe password Click Validate In the Edit Logins window in the Password box type your Identity Safe password Click Close Securing your sensitive data 371 About securing your sensitive data 10 In the confirmation dialog box click Yes to save the changes To de
292. lick Open 5 Click Add 6 Click Close Restoring an item from the Quarantine Some programs rely on other programs that are classified as security risks to function The program may not function if a particular security file is removed All of the removed security risks are automatically backed up in the Security History Quarantine This way Norton Internet Security lets you restore any risk 440 Monitoring protection features About Security History to regain the functionality of a program that requires the risk program to run For example a shareware or freeware program that you download may use adware to keep its price low In this case you can allow the security risk program to remain on your computer or restore it if Spyware Protection has removed it Some quarantined items are successfully disinfected after Norton Internet Security rescans them You can also restore such items If you restore an item to a directory other than its original location it may not function properly Therefore it is recommended that you reinstall the program To restore an item from the Quarantine 1 Inthe Security History window in the Quarantine view select the item that you want to restore 2 Inthe Details pane click Restore amp Options 3 Inthe Threat Detected window click Restore amp exclude this file This option returns the selected Quarantine item to its original location without repairing it and excludes the item from
293. lt General rules that appear in the list You can view the settings of these rules by using the View option Do not remove a firewall rule unless you are an advanced user Removing a firewall rule can affect firewall functionality and reduce the security of your computer To remove a General rule 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Smart Firewall 4 Under Smart Firewall in the Advanced Settings row click Configure 5 Inthe Advanced Settings window in the General Rules row click Configure 6 Inthe General Rules window select the rule that you want to remove 7 Click Remove 8 Inthe Confirmation dialog box click Yes 9 When you are done removing rules click OK 10 In the Advanced Settings window click OK To remove a Program rule 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Smart Firewall 4 Under Smart Firewall in the Program Control row click Configure 5 Inthe Program Control window in the Program column select the program that contains the rule that you want to remove 238 Protecting Internet activities About the Smart Firewall 6 Click Modify Toremove all the program rules that are associated with the program click Remove 7 Inthe Rules window select the rule that you want to remove 8 Click Remove
294. mber that Norton products use to communicate with each other over a network By default Norton products use 31077 as the communication port number If you change the communication port number of your Norton product you must change it on every computer that is connected to your home network In addition when you find more computers that use the Remote Monitoring Setup process ensure that the same port number is used on every computer O Though you can modify the communication port number it is recommended that you do not change this port number If you change the communication port number you must use a port number in the range of 1 65535 326 Protecting Internet activities About Network Cost Awareness To modify the communication port for Network Security Map 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe Communication Port box type a new communication port number You must use the same port number for each of the device that is connected to your Network Security Map 4 Click Apply 5 Click OK About Network Cost Awareness The Network Cost Awareness feature lets you set up policies to restrict the Internet usage of Norton Internet Security You can define the amount of network bandwidth that Norton Internet Security can use You can choose a communication policy that suits your Internet connection If you have unlimited Internet plan you
295. might prefer not to be alerted with any messages In such cases you can turn on Automatic Program Control Norton Internet Security does not prompt you with any firewall alerts in this state The firewall notifies you only if you have changed the Advanced Settings options of Smart Firewall from their default recommended settings Turning off Automatic Program Control Automatic Program Control automatically configures Internet access settings for Web enabled programs the first time that they run When a program tries to access the Internet for the first time Automatic Program Control creates rules for it Automatic Program Control configures Internet access only for the versions of programs that Symantec recognizes as safe An alert occurs when an infected program tries to access your computer If you want to determine the Internet access settings for your programs you can turn off Automatic Program Control When a program tries to access the Internet 220 Protecting Internet activities About the Smart Firewall for the first time an alert prompts you to configure access settings When you turn off Automatic Program Control a warning appears Symantec recommends that Automatic Program Control remain set to Aggressive By turning it off you might make the incorrect decisions that can allow malicious programs to run or block critical Internet programs and functions After you turn off Automatic Program Contr
296. move the On Off switch to the right to the Off position To turn on Identity Safe in the Identity Safe row move the On Off switch to the left to the On position 5 In the Settings window click Apply 348 Securing your sensitive data About securing your sensitive data 6 Click OK About Identity Safe vaults You can create one local vault for each Windows user account on your computer The data that you save and the Identity Safe settings that you make are specific to that local vault You cannot access the data that you save in one Windows user account from another Windows user account This way Identity Safe protects your sensitive data from misuse by multiple users of your computer Symantec recommends that you create separate password protected Windows user accounts if you want to share your computer with multiple users In addition to the local vault that you create on a Windows user account you can save your Identity Safe data in online vault When you move your Identity Safe data from local vault to online vault the data in your local vault is permanently removed The Identity Safe data is stored online using your Norton Account You can access the Identity Safe data that you stored online from any computer that meets the following criteria The latest version of Norton Internet Security must be installed The computer must be connected to the Internet You can create only one online vault for a Norton A
297. ms problems found during 208 resolve any items 208 solving 520 Product Key 16 accessing 37 product password protecting 508 product status 71 program patches 65 Program Control adding programs 221 Automatic 217 customizing 223 options 239 removing programs 222 Program Control continued turning on and off 219 Program rules adding 224 changing 233 removing 237 program updates 65 programs adding to Program Control 221 configuring Internet access 224 creating firewall rules 224 removing from Program Control 222 protection preparing for emergencies 125 system scans 136 protection settings configuring 126 ensuring 126 turning on 126 proxy server configuring 78 settings 76 Pulse Updates about 75 using 75 Q Quarantine adding anitem 439 items submitting for analysis 441 managing items 436 opening 436 restoring items 439 Quarantined Items view adding items 408 Quick Scan 443 scheduling 149 Quiet Mode about 182 187 Index Quiet Mode continued disk burning 187 options 191 turning off 191 turning on 191 TV recording 187 User Specified Programs 193 R Real Time Exclusions about 176 Remote Management about 511 turning off 513 Remote management turning on 513 Remote Monitoring setting up 309 repair actions 208 infected files 208 removable media 208 system files 208 repairing viruses 443 Reputation Scan about 155 results 161 running Custom Scan 160 running Full System Scan 159 running Quick
298. n Account Customizing protection features About customizing settings and options Parental Controls have not been installed Lets you install Norton Online Family Norton Online Family is a parental control application that helps you protect your child from Internet dangers and online predators It lets you grant permission for your child to access Web sites based on the age and maturity of your child You can use the Click here to install link to install Norton Safety Minder and to configure Norton Online Family Norton Safety Minder is an application that needs to be installed on each computer that your child uses After you install Norton Online Family the Parental Controls have not been installed option changes to Norton Online Family is installed The Click here to install link also changes to Click here to configure You can use the Click here to configure link to log on to Norton Online Family and modify the Norton Online Family settings 493 494 Customizing protection features About customizing settings and options Performance Monitoring Customizing protection features 495 About customizing settings and options Lets you monitor the performance of your computer Performance Monitoring When you turn on the Performance Monitoring option Norton Internet Security monitors the CPU usage and memory usage of your computer You can also monitor the important system ac
299. n Prevention exclusion list If you are sure that a device on your network is safe you can change the trust level of the device to Full Trust You can then select the Exclude from IPS scanning option to exclude these trusted devices from Intrusion Prevention scan Excluding Full Trust devices from Intrusion Prevention scan saves the scan time and improves the network speed of your computer Protecting Internet activities 279 About Intrusion Prevention When you exclude a Full Trust device from Intrusion Prevention scan Norton Internet Security does not scan any information that is received from this device The Full Trust devices that are excluded from Intrusion Prevention scan are added to Intrusion Prevention exclusion list If you find that any of the devices that you excluded from Intrusion Prevention scan is infected you can purge the saved exclusion list and remove all the devices You can purge the saved exclusion list under the following circumstances Any of the devices that you excluded from Intrusion Prevention scan is infected Any of the devices that you excluded from Intrusion Prevention scan attempts to infect your computer Your home network is infected When a device on your network attempts to infect your computer AutoBlock stops all the access requests from this device If you add this device to the Intrusion Prevention exclusion list Norton Internet Security removes the device from the exclusion
300. n Signatures window click an attack signature and then click Properties 6 Inthe Signature Properties window uncheck or check Notify me when this signature is detected 7 Click OK 8 In the Intrusion Signatures window click OK Excluding or including attack signatures in monitoring In some cases benign network activity may appear similar to an attack signature You may receive repeated notifications about possible attacks If you know that the attacks that trigger these notifications are safe you can create exclusion for the attack signature that matches the benign activity Each exclusion that you create leaves your computer vulnerable to attacks If you have excluded the attack signatures that you want to monitor again you can include them in the list of active signatures To exclude attack signatures from being monitored 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Intrusion Prevention 4 Under Intrusion Prevention in the Intrusion Signatures row click Configure Protecting Internet activities 275 About Intrusion Prevention 5 In the Intrusion Signatures window uncheck the attack signatures that you want to exclude 6 Click OK To include the attack signatures that were previously excluded 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe lef
301. n Welcome Screen under Network Security Map in the Settings window If you do not want to view the Network Security Overview window in the future check Donot show this again before you click OK 5 Inthe Network Details drop down list select the network that lists the device for which you want to see the details Protecting Internet activities 305 About the Network Security Map To view the details of a device on the Network Security Map 306 Protecting Internet activities About the Network Security Map Inthe Network Security Map window click a device icon You can use the scroll arrows to view the devices that are listed in the network map The device details section that is located below the network map displays the following details Shows the name of the device For a computer the Network Security Map displays the NetBIOS name by default However the Network Security Map displays the name of the device as NEW if it meets the following conditions t The device does not have a NetBIOS name The device has a firewall that is enabled You can change the device name in the Edit Device Details window Shows the name of the network adapter manufacturer of the device The adapter manufacturer s name is based on the physical address also known as Media Control Access address or MAC address of the device Protecting Internet activities 307 About the Network Security Map Shows the categor
302. n against viruses and other security threats Lets Norton Internet Security perform an Insight Network scan on your computer The Insight Network scan uses the virus definitions that are available locally and hosted in the Cloud Norton Internet Security provides additional protection by using the most recent definitions from the Cloud apart from the definitions that are available locally on your computer See About Insight Network scan on page 152 445 446 Customizing protection features Feature summary Scans for and detects viruses in instant messenger attachments Scans the instant messenger attachments for the supported instant messenger programs that were on your computer when you installed your product New instant messenger programs must be configured in Instant Messenger Scan window Detects the new and the unknown viruses by analyzing an executable file s structure and behavior Also by analyzing other attributes such as programming the logic computer instructions and any data that is contained in the file Protects Norton Internet Security Settings from unauthorized changes Checks for the infections that have processes running in memory and the infections that the startup folders and files refer Automatically runs once LiveUpdate updates your computer with program updates and definition updates See Running a Quick Scan on page 137 Customizing protection
303. n area reassures you that your protection is up to date The icon changes its color if any change in status occurs The messages that appear in the notification area might require aresponse from you such as opening a window and taking an action More often messages inform you about current activities and they disappear after afew seconds You can check the Security History window for any further details You can right click the Norton Internet Security icon to access specific Norton Internet Security activities Depending on the current activities your options include the following Lets you launch the Norton Internet Security main window to complete tasks view current status or access other features Lets you run a Quick Scan to protect possible virus infected areas of your computer Lets you run LiveUpdate to check for definition and program updates Lets you review the information about the security events for all of the categories Lets you resolve your problem easily using Norton Autofix 64 Getting started About LiveUpdate Lets you turn on or turn off Silent Mode Lets you turn off or turn on the firewall 4s Lets you turn off or turn on Antivirus Auto Protect Lets you check if new version of your product is available or not This option is available only if you have activated your product and you have an active subscription About LiveUpdate Symantec products download th
304. n issues Newsletter to which you can subscribe Protection blog that lets you post your own comments and view comments from experts The Symantec Web site is constantly updated and enhanced so the available resources may vary To stay informed about protection issues 1 Open your Web browser and go to the following URL http www symantec com 2 Inthe Symantec Web site click Norton 3 Inthe menu bar that appears do the following Click the Viruses amp Risks tab and then click any item on the left pane to find out more details about it Click the Community tab and then use one of the following Register as a user and participate in discussions You can create your own threads of topics or take help from the existing forum discussions Read the messages that prominent leaders post from inside and outside Symantec and obtain information straight from the source You can add comments or ask questions on the blogs that you are interested in Check about Norton in other Web sites and social networks that are available Finding additional solutions 523 About Support About Support If you have purchased Norton Internet Security you can access Support from the product db Support offerings may vary based on the language or product About Norton Support Web site The Norton Support Web site provides a full range of self help options By using Norton Support Web site you can do the follo
305. n off the Smart Definitions option Checking for updates manually LiveUpdate checks for updates to the product that is installed on your computer These updates protect your computer from newly discovered threats LiveUpdate uses the Internet connection to connect to the Symantec server checks for updates and then downloads and installs them automatically You should have the Automatic LiveUpdate option turned on to ensure that you have the latest definition updates and program updates Definition updates contain the information that allows the product to recognize and alert you to the presence of a specific virus or security threat Symantec issues program Getting started 71 About LiveUpdate updates periodically which are enhancements to the product Program updates are usually created to fix program errors improve the performance of the program or to extend the operating system or hardware compatibility After you install program updates you might not necessarily see a difference in the way that the product works If you are not connected to the Internet connect to the Internet first and then run LiveUpdate Or if you use a proxy server to connect to the Internet configure the proxy settings and then run LiveUpdate To configure the proxy settings of your network go to the Norton Internet Security main window and then click Settings gt Network gt Network Security Settings gt Proxy Server gt Configure
306. n scan You can exclude a trusted device from Intrusion Prevention scan only if you are sure that the device does not have any security threats When you apply Full Trust to a device and exclude it from Intrusion Prevention scan the IP address and MAC address of the device are added to the Trust Control To exclude a device from Intrusion Prevention scan 1 Inthe Norton Internet Security main window click Advanced 2 Under Network Protection click Network Security Map 3 Ifthe Network Security Overview window appears click OK 322 Protecting Internet activities About the Network Security Map 4 Inthe Network Security Map window do one of the following To edit the trust level of a device that is on your network in the network map click the device To edit the trust level of a device that you manually added in the Network Details drop down list click Trust Control and then click the device 5 Inthe device details section in the Trust Level row click Edit 6 Inthe Edit Device Trust Level window click FULL TRUST 7 Atthe bottom of the Edit Device Trust Level window check Exclude from IPS scanning 8 Inthe Exclude from IPS Scanning dialog box click Yes to confirm 9 Click OK Removing devices from the Network Security Map The Network Security Map window lists the devices that are connected to your network You can remove a device or a computer from the Network Security Map You can purge all devi
307. n such cases you can submit the item to Symantec for further analysis In addition your product provides solutions for security risks such as spyware and adware About detecting viruses spyware and other risks Viruses and other security threats can be detected during a manual or scheduled scan Auto Protect detects these threats when you perform an action with an infected file Threats can also appear during an instant messenger session when you send an email message or during a manual or scheduled scan Security risks such as spyware and adware can also be detected when these activities are performed The files that can potentially infect your system when your computer first starts up are scanned first These files include the following Files that are associated with the processes that are currently running in memory Files with startup folder entries Files with system start INI file entries Files with system start batch file entries Files that the system start registry keys refers If an infected file is detected during this portion of the manual scan it is repaired or removed Any unnecessary references are also removed from your computer Before attempting to repair quarantine or delete any infected file that has a process running in memory your product attempts to terminate the process You are alerted and prompted to close all unnecessary programs before the process is terminated Responding to security
308. n the Program Control row click Configure 5 Inthe Program Control window in the Program column select the program that you want to change 224 Protecting Internet activities About the Smart Firewall 6 Inthe drop down list next to the program that you want to change select the access level that you want this program to have Your options are Allow all access attempts by this program Deny all access attempts by this program Create the rules that control how this program accesses the Internet 7 Click OK Adding General rules and Program rules Program Control automatically creates most of the firewall rules that you need You can add custom rules if necessary Only experienced users should create their own firewall rules You can add the following types of firewall rules General rules Program rules To add a General rule 1 Inthe Norton Internet Security main window click Settings In the Settings window click the Network tab In the left pane click Smart Firewall Under Smart Firewall in the Advanced Settings row click Configure WN 5 Inthe Advanced Settings window in the General Rules row click Configure 6 Inthe General Rules window click Add Protecting Internet activities 225 About the Smart Firewall 7 Follow the instructions in the Add Rule wizard 8 Inthe General Rules window click OK 9 Inthe Advanced Settings window click OK To add a Program rule 1 In
309. n to scan Microsoft Office files automatically 182 Protecting your files and data About the Norton Internet Security scans Turning on or turning off Microsoft Office Automatic Scan Norton Internet Security maintains a higher level of security by automatically scanning all Office files You can turn on the Microsoft Office Automatic Scan option to protect your computer against the virus macros and embedded objects To Turn on or turn off Microsoft Office Automatic Scan 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window in the left pane click Computer Scan 3 Inthe Microsoft Office Automatic Scan row do one of the following To turn on Microsoft Office Automatic Scan move the On Off switch to the left to the On position To turn off Microsoft Office Automatic Scan move the On Off switch to the right to the Off position 4 Inthe Settings window click Apply and then click OK About Silent Mode Norton Internet Security provides many solutions and features to handle viruses and other security threats Norton Internet Security displays alerts and notifications to inform you how viruses and other security threats are detected and resolved When you perform important tasks on your computer you likely prefer not to receive any alert messages Norton Internet Security suppresses alerts and notifications and temporarily suspends most of the background activities based on the Silent Mode
310. n you do not use your computer Norton Internet Security then intelligently runs a scan depending on the scan history of your computer However there may be times when you want to turn off Idle Time Scans To turn off Idle Time Scans 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window in the left pane click Computer Scan 3 In the Idle Time Scans row in the drop down list select Off 4 Click Apply To turn on Idle Time Scans 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window in the left pane click Computer Scan 174 Protecting your files and data About the Norton Internet Security scans 3 In the Idle Time Scans row in the drop down list select the option that you want to set Your options are Weekly Monthly Quarterly 4 Click Apply Specifying Idle Time Out duration You can set the duration after which Norton Internet Security should identify your computer as idle You can select a value in minutes between 1 minute and 30 minutes When you do not use your computer for the duration that you specify Norton Internet Security checks for other predefined parameters and runs a Full System Scan To specify Idle Time Out duration from the Settings window 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the General tab 3 In the Idle Time Out row in the drop down list select th
311. n you perform a Reputation Quick Scan or Full System Scan Norton Internet Security considers the Files of Interest that are available on your computer After it has filtered the reputation files Norton Internet Security performs an Insight Network Scan When Norton Internet Security performs an Insight Network 156 Protecting your files and data About the Norton Internet Security scans Scan it also performs a Computer Scan Norton Internet Security uses the Computer Scan to perform the signature based threat detection It compares the signature of the filtered reputation files against the known threat signatures to identify threats on your computer If a security threat is detected Norton Internet Security automatically removes the threat from your computer Norton Internet Security uses the Insight Network Scan to detect suspicious or vulnerable files on your computer using the reputation based threat detection The Insight Network Scan uses the Cloud technology wherein a remote Symantec server on the Web stores the latest reputation information It checks the Cloud for the reputation information on the filtered files Norton Internet Security obtains specific information such as file name and hash key about the filtered reputation files and sends this information to the Cloud The Cloud analyzes the file information and provides a trust level for each file The Symantec server sends back the reputation information to your computer
312. nager window starts five minutes after you start your computer Every subsequent delayed program starts with a further delay of 10 seconds To delay startup items 1 Inthe Norton Internet Security main window click Performance 2 Inthe Performance window click Startup Manager 3 Inthe Startup Manager window in the Delay Start column select the program that you want to delay 4 Click Apply 5 Click Close To run delayed startup items manually 1 Inthe Norton Internet Security main window click Performance 2 Inthe Performance window click Startup Manager 3 Inthe Startup Manager window click Run Delayed Items Now 4 Wait for the program to start and then in the Startup Manager window click Close Monitoring your system s performance 101 About System Insight About optimization The data storage space on a disk is divided into discrete units These units are called clusters When files are written to the disk they are broken up into cluster sized pieces When all of the file pieces are located in adjacent or contiguous clusters the file can be accessed quickly Your computer s hard disk stores all of your files applications and the Windows operating system The bits of information that make up your files gradually spread over the disk This process is known as fragmentation The more that you use your computer the more fragmented the hard disk gets When a fragmented file is accessed the disk performance
313. nal power Monitoring your system s performance 111 About System Insight External and Battery Allows the Norton Tasks to run irrespective if the computer uses external power or battery power If you choose this option Norton Internet Security performs the Norton Tasks when the computer is idle It does not consider the type of power source the computer uses You can configure the power source for each of the Norton Tasks Configuring the Power Source You can choose the power source for Norton Internet Security to perform the Norton Tasks when the computer is idle Norton Tasks are background tasks that Norton Internet Security performs when your computer is idle By default Norton Internet Security performs these tasks only when your computer is connected to the external power You can configure the power source for each of the Norton Tasks To configure the power source 1 Inthe Norton Internet Security main window click Performance 2 Inthe Performance window in the left pane click Norton Tasks 3 Inthe Norton Tasks window under the Power Source column click the Configure link for the Norton Task that you want to configure the power source 112 Monitoring your system s performance About System Insight 4 Inthe Power Source window select one of the following External Allows the Norton Task to run only when your computer uses external power External and Battery Allows the Norton Task
314. nced protection features of Smart Firewall Program Control Lets you control settings for the programs that access the Internet Trust Control Lets you view the networks to which your computer is connected Block All Network Traffic Lets you configure how Norton Internet Security should control the network communications to and from your computer About Web settings Norton Internet Security provides complete protection for your sensitive information while you use the information on the World Wide Web The options in the Web tab let you configure Norton Internet Security to monitor your Internet activities Customizing protection features About customizing settings and options Your options are The Browser Protection feature checks for browser vulnerabilities in the following browsers Internet Explorer 7 0 or later Firefox 10 0 or later Chrome 17 0 or later You must turn on the Browser Protection option to enable this feature Download Insight provides the Download Intelligence option to protect your computer against any unsafe file that you download using a Web browser This feature supports only downloads using the HTTP protocol Internet Explorer versions 6 or later and Firefox 3 6 browser or later 483 484 Customizing protection features About customizing settings and options The Identity Safe feature in Norton Internet Security let
315. nd data About the Norton Internet Security scans Quiet Mode Norton Internet Security turns on Quiet Mode the next time when you execute the program You can only add the programs that have exe file extension to the Quiet Mode Programs list To add a program 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the General tab 3 Inthe left pane click Silent Mode Settings 4 Inthe Silent Mode Settings under Quiet Mode on Detection of in the User Specified Programs row click Configure 5 Inthe Quiet Mode Programs window click Add 6 Inthe Add Program dialog box navigate to the location of the file that you want to add to the Quiet Mode Programs list 7 Select the file and then click Open 8 Click Apply 9 Inthe Quiet Mode Programs window click OK Removing programs from User Specified Programs You can remove a program from the Quiet Mode Programs list After you remove a program Norton Internet Security does not turn on Quiet Mode the next time when it detects a running instance of the program You can also remove a running program from the Quiet Mode Programs list However if Quiet Mode is turned on it turns off only after the running instances of all the programs in the list are complete You cannot turn off Quiet Mode by removing a program from the list when it runs To remove a program 1 Inthe Norton Internet Security main window click Settings 2 Inthe Setting
316. nection attempts with incorrect source or destination information Automatically allows the Internet traffic that matches the connections that an application opens Check this option to do the following Analyze the network traffic that enters your computer Block the suspicious applications that try to connect to your computer 246 Protecting Internet activities About the Smart Firewall Protecting Internet activities 247 About the Smart Firewall Allows the computers on the network to share resources such as files folders and printers that are locally attached Some of the Windows 7 and Windows 8 features such as Home Media Experience work only when the trust level of the network to which your computer is connected is set to Shared or Full Trust When Automatic File Printer Sharing Control is turned on it sets the trust level of the network to Shared only if certain other security criteria such as the following match f Your computer must have at least one shared resource or the operating system need to be Windows Media Center edition Your computer must use a private IP address range Your computer must be connected to a secure wireless or wired connection You can set this option to On or Off state In Windows XP you can also set this option to Ask Me In this state Norton Internet Security prompts you before it classifies a 248 Protecting Internet activities Ab
317. nfigure Securing your sensitive data 381 About securing your sensitive data 5 Inthe Edit Notes window under Details in the Title box type a title for the note you want to save If anote already exists click Create New Notes and then under Details in the Title box type a title for the note you want to save 6 Type any additional information in the Information box 7 Click Save 8 Inthe Edit Notes window click OK To edit Notes 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Under Identity Safe in the Edit Notes row click Configure 5 Inthe Edit Notes window under Title select the title of the note that you want to edit 6 Click Edit Notes and modify the information under Details You can change the category modify the title and edit the additional information that you have provided 7 Click Save 8 Inthe Edit Notes window click OK To delete Notes 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Under Identity Safe in the Edit Notes row click Configure 5 Inthe Edit Notes window under Title select the title of the note that you want to delete 6 Click Delete Notes 7 Inthe Warning dialog box click Yes 382 Securing your sensitive data About securing your sensitive data 8 Inthe Edit
318. ng a password You can secure your Norton Internet Security Settings from unauthorized access by setting up a password for your product settings The Settings Password Protection option lets you secure your Norton Internet Security Settings using a password After you set up a password for Norton Internet Security settings you must enter the password each time to view or configure your product settings By default the Settings Password Protection option is turned off You must turn on the Settings Password Protection option to set up a password for your product settings The password must be between 8 and 256 characters in length To secure your Norton Internet Security Settings using a password 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the General tab 3 Inthe left pane click Product Security 4 Inthe Settings Password Protection row move the On Off switch to the left to the On position 5 Do one of the following In the Settings Password Protection row click Configure In the Settings window click Apply Customizing protection features 509 About customizing settings and options 6 Inthe dialog box that appears in the Password box type a password 7 Inthe Confirm Password box type the password again 8 Click OK 9 In the Settings window click OK Turning off Norton Internet Security Settings password Youcan protect your Norton Internet Secur
319. ng off or turning on Intrusion Prevention notifications You can choose whether you want to receive notifications when Intrusion Prevention blocks suspected attacks Whether or not you receive notifications Intrusion Prevention activities are recorded in Security History The Security History entries include information about the attacking computer and information about the attack You can choose whether you want to receive notifications when Intrusion Prevention blocks suspected attacks based on a particular signature To turn off or turn on Intrusion Prevention notifications 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Intrusion Prevention Under Intrusion Prevention in the Notifications row do one of the following Toturn off notifications move the On Off switch to the right to the Off position Toturn on notifications move the On Off switch to the left to the On position 5 In the Settings window click Apply 274 Protecting Internet activities About Intrusion Prevention 6 Click OK To turn off or turn on an individual Intrusion Prevention notification 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Intrusion Prevention 4 Under Intrusion Prevention in the Intrusion Signatures row click Configure 5 Inthe Intrusio
320. ns The following table explains about the various options When you use a Media Center application to burn a CD ora DVD Norton Internet Security automatically enables Quiet Mode if the IMAPI 2 0 Disk Burn option is turned on By default the IMAPI 2 0 Disk Burn option is turned on When Quiet Mode is enabled Norton Internet Security suspends background activities to improve the performance of your disk burning session However Norton Internet Security continues to display alerts and notifications during the session Norton Internet Security supports the following Media Center disk burner applications to turn on Quiet Mode IMAPI 2 0 ms J River MEDIA CENTER version 13 0 125 and later Norton Internet Security turns on Quiet Mode as soon as you start burning a CD or a DVD using a Media Center application Norton Internet Security turns off Quiet Mode after the disk burning session is complete You cannot turn off Quiet Mode during the disk burning session by turning off the IMAPI 2 0 Disk Burn option in the Settings window 190 Protecting your files and data About the Norton Internet Security scans Media Center TV When you use a Media Center Recording application to record a TV program Norton Internet Security automatically enables Quiet Mode if the Media Center TV Recording option is turned on By default the Media Center TV Recording option is turned on When Quiet Mode is enabled Norton Inte
321. nt You must be connected to the Internet to create a Norton Account After you create a Norton Account you can access and manage your account information and product information from anywhere It helps to reinstall your products and download the latest version of the products If you install your product on more than one PC you can use the same Norton Account To access your Norton Account go to the following URL https account norton com You can create a Norton Account in the following ways During activation You can create your Norton Account and register your product from the Norton Account window that appears when you activate the product You must provide your account information in the Norton Account window that appears Getting started 33 About your Norton Account Any time after activation If you skip the Norton Account window during activation you can create a Norton Account any time after activation You can create your Norton Account and register your product from the Account link that appears at the top of the Norton Internet Security main window After you log in to your Norton Account you can manage your product information with the following options Saves the information for all of the Norton products that you own The Products tab provides you the information about the Norton products that you own and the expiration date You can click the arrow icon against a product for more information such
322. nt to work Do one of the following To edit an entry click Edit to open the Edit Email Address dialog box edit the details and then click OK To delete an entry click Remove When you delete an entry that was imported Norton AntiSpam automatically adds it to the Address Book Exclusions list In the Blocked List window click Apply Click OK About your email program toolbar Norton AntiSpam adds a drop down list or a few options to the toolbar of supported email programs 294 Protecting Internet activities About Norton AntiSpam You can use the following options Marks the selected email as spam and moves the email message into the Junk folder or the Norton AntiSpam folder When you reclassify an email message as spam Norton Internet Security provides you the option to send the misclassified email message as feedback to Symantec This option appears only if the Feedback option in the Message Protection section of the Settings window is set as Ask Me The Message Protection section is available in the Network tab When you reclassify an email message as spam Norton Internet Security displays a message whether or not to add the sender s email address to the Blocked List This message appears depending on the option that you select in the drop down list present at the bottom of the Blocked List window Marks the selected email as allowed not spam and moves the email message in
323. nternet Security Web settings guards you against unsafe sites while you browse the Internet When you turn off and then turn on Web settings you must log in to Identity Safe to use the various options of Identity Safe Customizing protection features 457 About turning off automatic features To turn off Web settings 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab and do the following In the Browser Protection section in the Browser Protection row move the On Off switch to the right to the Off position In the Download Intelligence section in the Download Intelligence section in the Download Intelligence row move the On Off switch to the right to the Off position Inthe Identity Safe section in the Identity Safe row move the On Off switch to the right to the Off position Inthe Safe Surfing section in the Antiphishing row move the On Off switch to the right to the Off position In the Safe Surfing section in the Norton Safe Web row move the On Off switch to the right to the Off position 3 Click Apply To turn on Web settings 1 Inthe Norton Internet Security main window click Settings 458 Customizing protection features About customizing settings and options 2 Inthe Settings window click the Web tab and do the following In the Browser Protection section in the Browser Protection row move the On Off switch to the left t
324. nternet Security main window and then click Settings gt General gt Other Settings gt Insight Protection gt On Protecting your files and data 131 About the Norton Internet Security scans Reputation Scan displays the reputation information of the files on your computer It displays the reputation information such as trust level prevalence stability rating and resource usage Reputation Scan displays the detailed reputation information of the good files and the number of bad files that have been detected or removed Reputation Scan also internally performs Computer Scan and Insight Network Scan to detect the threats The different types of scans that are available under Reputation Scan are Quick Scan Full System Scan and Custom Scan amp Norton Internet Security Reputation Scan is applicable only for the executable files and the installer files 132 Protecting your files and data About the Norton Internet Security scans Scan Facebook Wall lets you scan the links and URLs that are available on your Facebook profile When you click the Scan Facebook Wall option Norton Internet Security takes you to the Facebook login Web page After you log in to your Facebook profile Norton Safe Web asks you to grant permission to access your Facebook wall To do so use the grant us permission to access your stream option available on the Facebook Web page and then follow the on screen instructi
325. nthe Security History window in the Quick Search text box type the name of the item that you want to search 2 Click Go Exporting or Importing Security History information Norton Internet Security lets you export the Security History events to a file You can export and save the Security History events and view them at your leisure For example you can analyze the security events on a particular day You can use the Quick Search option to obtain a list of all of the items that are related toa Monitoring protection features 435 About Security History particular security risk You can then use the Export option to save the list in the Security History log You can later import the log file and analyze the data Security History stores the information in a separate file When the file size reaches its maximum size limit information that is related to new events overwrites the information that is related to older events Youcan export the log periodically if you want to keep the entire Security History information You can save your log file in one of the following file formats Security History Log Files mcf The mcf file format is the Security History Log Files format and is proprietary to Symantec When you use this file type option you can view the file only in the Security History window Text Files txt The data is saved in a comma separated text format When you use this file type option you can open
326. ntrolled Technology may be subject to the import and export laws of the United States specifically the U S Export Administration Regulations EAR and the laws of any country where Controlled Technology is imported or re exported You agree to comply with all relevant laws and will not export any Controlled Technology in contravention to U S law nor to any prohibited country entity or person for which an export license or other governmental approval is required All Symantec product is prohibited for export or re export to Cuba North Korea Iran Syria and Sudan and to any country subject to relevant trade sanctions USEOR FACILITATION OF SYMANTEC PRODUCT IN CONNECTION WITH ANY ACTIVITY INCLUDING BUT NOT LIMITED TO THE DESIGN DEVELOPMENT FABRICATION TRAINING OR TESTING OF CHEMICAL BIOLOGICAL OR NUCLEAR MATERIALS OR MISSILES DRONES OR SPACE LAUNCH VEHICLES CAPABLE OF DELIVERING WEAPONS OF MASS DESTRUCTION IS PROHIBITED IN ACCORDANCE WITH U S LAW 11 Arbitration If You area U S customer You and Symantec agree that any dispute claim or controversy arising out of or relating in any way to the Software or this License Agreement shall be determined by binding arbitration or small claims court instead of in courts of general jurisdiction Arbitration is more informal than a lawsuit in court Arbitration uses a neutral arbitrator instead of a judge or jury allows for more limited discovery than in court and
327. o be scanned and then click Add If you need to remove an item from the list select the item and then click Remove 5 Click Next 6 Inthe Scan Schedule tab select the scan schedule as required and then click Next 7 Inthe Scan Options tab click Save Configuring the scan options Norton Internet Security lets you configure scan options for each scan that you create By default the scan options reflect the current Computer Scan settings in the Settings window The changes that you make are applicable to the current scan only Any change that is made to the Computer Scan settings in the Settings window does not affect the scan options settings for the current scan In addition to the custom scans that you create you can configure the scan options for the default scans You can configure scan options for Full System Scan Quick Scan Drive Scan Folder Scan and File Scan To configure the scan options 1 Inthe Norton Internet Security main window click Scan Now 2 Inthe Computer Scan pane click Custom Scan 144 Protecting your files and data About the Norton Internet Security scans 3 Inthe Scans window in the Edit Scan column click the edit icon next to the scan that you want to schedule 4 In the Edit Scan window on the Scan Options tab configure the scan options as required 5 Click Save Editing a custom scan You can edit a custom scan that you created You can include additional files or folde
328. o the Internet Lets you access your Identity Safe data from online vault without depending on any external drive Provides a convenient means to automatically synchronize Identity Safe data across different computers using your Norton Account You must log in to your Norton Account to move the Identity Safe data from your local vault to online vault To sync local vault to online vault 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Under Identity Safe in the Sync Data Online row click Configure Securing your sensitive data 353 About securing your sensitive data 5 Inthe Sync Identity Safe Data Online window in the Enter the Password box type the password for your local vault 6 Click Log In to Norton Account 7 Inthe Sign Into Norton Account window type your Norton Account user name and password and click Log In 8 Click Validate 9 Inthe Sync Identity Safe Data Online window create a password for your online vault 10 Click Sync Data 11 In the Sync Identity Safe Data Online window click Get Started Merging local vault to online vault Identity Safe lets you store and manage your sensitive information including your address login information passwords and credit card details You can sync your identity safe data in the local vault into the online vault When you save your data in online vault y
329. o the On position In the Download Intelligence section in the Download Intelligence row move the On Off switch to the left to the On position In the Identity Safe section in the Identity Safe row move the On Off switch to the left to the On position In the Safe Surfing section in the Antiphishing row move the On Off switch to the left to the On position In the Safe Surfing section in the Norton Safe Web row move the On Off switch to the left to the On position 3 Click Apply About customizing settings and options The default settings provide complete protection for your computer However you may want to adjust the settings to optimize system performance or disable the options that do not apply You can change the product s settings to fit your work environment From non admin accounts of your computer you need administrator authentication to change product settings If you are an administrator keep in mind that the changes that you make apply to everyone who uses the computer However you can configure your Identity Safe settings from any non admin user account also Each user account can individually configure and access their Identity Safe options only For more information select one of the sub entries for this Help topic Customizing protection features 459 About customizing settings and options Configuring Norton Internet Security settings The default Norton Internet Security settings provide
330. ock while you access the Internet You can also choose the option that lets your browser to automatically detect the proxy settings If you want your manual settings in the network ensure that you disable the Automatic Configuration options Network Proxy Settings window lets you specify the following settings Lets you specify the automatic configuration URL or script to manage Internet access You have the following options Automatically detect settings Lets your browser detect the network settings automatically If you do not want to override your manual settings for network connections you must disable this option Use automatic configuration script Lets your browser use the automatic configuration URL or script to manage Internet access Use the URL box to provide the HTTP URL or the HTTPS URL 78 Getting started About Network Proxy Settings Lets you provide the details of your Proxy Settings Under Proxy Settings check Use a proxy server for your HTTP connections and do the following Inthe Address box type the URL or IP address of your proxy server Inthe Port box type the port number of your proxy server You can specify a value from 1 to 65535 Lets you connect to the Internet through a server that requires authentication Use the Username box and Password box to type the authentication details Configuring Network Proxy Settings When you use a proxy server
331. odify Internet access for each program You can also add a program to the 240 Protecting Internet activities About the Smart Firewall list or remove a program from the list Your options are Displays the trust level of a program Symantec collects the information from the Norton Community Symantec assigns the following trust levels Norton Trusted Indicates the file that is Norton Trusted Good Symantec has high indications that the file is trusted Unproven Symantec does not have enough information about the file to assign a trust level to the file The file is neither safe nor unsafe Poor Symantec has only a few indications that the file is not trusted t Bad Symantec has very high indications that the file is not trusted This file is suspicious and can harm your computer You can set the access level for each program based on the trust level Displays the name of the program or the name of the program s executable file You can also view the location of the program on your computer Protecting Internet activities 241 About the Smart Firewall Displays the level of access that the program has You can change the access level by selecting a different entry from the drop down list Your options are Allow Block and Custom Lets you add a program to Program Control manually Opens the Rules window in which you can customize rules for a selected program Le
332. offered from within the Software shall be referred to in this License Agreement as the Technical Support Any such Technical Support shall be provided in Symantec s sole discretion without any guarantee or warranty of any kind other than any guarantees applicable under consumer laws in Your jurisdiction which cannot be excluded or limited in any way It is solely Your responsibility to complete a backup of all Your existing data software and programs before receiving any Technical Support In the course of providing the Technical Support Symantec may determine that the technical issue is beyond the scope of the Technical Support Symantec reserves the right to refuse suspend or terminate any of the Technical Support in its sole discretion 6 Money Back Guarantee If You are the original licensee of this copy of the Software and are not completely satisfied with it for any reason please make no further use of the Software and contact Symantec Customer Service using the contact details set out in Section 12 of this License Agreement for a refund of the amount You paid for the current Service Period less shipping handling and any applicable taxes except in certain states and countries where shipping handling and taxes are refundable at any time during the sixty 60 day period following the date of purchase of an annual subscription or within thirty 30 days following the date of purchase of a monthly subscription 7
333. ofiles settings to do the following Configure to Full Scan to perform a complete scan of your computer Monitoring your system s performance 121 About System Insight The complete scan includes a scan of all files on your computer irrespective of the confidence level or digital signature of the files Configure to Standard Trust to perform a scan that excludes the files that are Norton Trusted Norton Internet Security scans the files that have a confidence level other than Norton Trusted Configure to High Trust to perform a scan that excludes the files that have known digital signatures or high confidence levels Norton Internet Security does not scan the files that have confidence level as Norton Trusted or User Trusted It also excludes the Good files with high confidence level from the scan It scans the files with confidence levels as Poor Trust Unproven Trust Bad Trust and the files without a class 3 digital signature You must configure the Scan Performance Profiles settings before you run a scan or before a scan is scheduled to run Norton Internet Security scans your computer according to the configuration you specified in the Scan Performance Profiles settings To configure Scan Performance Profiles from the Settings window 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window in the left pane click Computer Scan 3 Inthe Scan Performance Profiles row click on one
334. ol you can turn on the Advanced Events Monitoring feature When you turn on any Advanced Events Monitoring feature you are prompted with numerous firewall alerts that prompt you to allow or deny network access for any unrecognized program the first time that it runs or that is not currently handled by the firewall rules or the Advanced Events Monitoring feature When you set Automatic Program Control to Aggressive or Automatic the Advanced Events Monitoring features are disabled The Advanced Events Monitoring settings that you configured are no longer applicable To turn off Automatic Program Control 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 In the left pane click Smart Firewall 4 Under Smart Firewall in the Advanced Settings row click Configure 5 Inthe Advanced Settings window in the Automatic Program Control row move the Aggressive Automatic Off switch to the right to the Off position 6 Inthe window that appears click Yes 7 Inthe Advanced Settings window click Apply and then click OK Protecting Internet activities 221 About the Smart Firewall Adding a program to Program Control You can add a program to Program Control to control their ability to access the Internet When you add the program you can configure its access settings in Program Control You can allow block or create the custom rules that are specific to the program th
335. ome Web browsers for the first time an alert message is displayed The alert message prompts you to enable Norton Safe Search You can choose to enable or disable Norton Safe Search Norton Safe Search provides you the intelligent search as you type feature that displays search suggestions when you type a few letters of the search phrase Securing your sensitive data 341 About securing your sensitive data In addition Norton Safe Search provides the following features When you search the Internet using Norton Safe Search it analyzes the security levels of the Web sites and displays the search results You can use the Filter Out Unsafe Sites option in the Norton Safe Search Web site to filter the unsafe Web sites from the search results When you click the Filter Out Unsafe Sites option the Unsafe Site Filter option is turned on By default this option is turned off Norton Safe Search enables you to erase all the data that are related to your search activities from the Ask com server The Privacy Safeguard feature of Norton Safe Search removes the search data such as your IP address user identifier and session identifier from the Ask com server You can turn on or turn off Privacy Safeguard using the Turn On Privacy Safeguard and Turn Off Privacy Safeguard options respectively Norton Safe Search feature is available only for some regions including the United States the United Kingdom Canada Australia
336. on Protecting Internet activities 253 About the Smart Firewall Program Component This option protects you against the malicious programs that launch Internet enabled programs Program Launch This option protects you against the malicious programs that attach to safe programs without being detected Command Line Execution This option protects you against the Trojan horses or malicious programs that launch trusted applications in hidden mode through command line parameters Code Injection This option protects you against the Trojan horses or malicious programs that inject code into an application s process without firewall alerts Window Messages This option protects you against the Trojan horses and other malicious programs that manipulate an application s behavior to connect to the 254 Protecting Internet activities About the Smart Firewall Internet without firewall alerts Direct Network Access This option protects you against the Trojan horses and other malicious programs that bypass network traffic These programs penetrate the Windows TCP IP layer to send and receive data without triggering firewall alerts Active Desktop Change This option protects you against the malicious programs that use the documented interfaces that the trusted applications provide to transmit data outside the network without triggering firewall alerts Key Logg
337. on You cannot run System Restore on your computer when Norton Product Tamper Protection is turned on You must temporarily turn off Norton Product Tamper Protection to run a successful System Restore To turn off Norton Product Tamper Protection 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the General tab 3 Inthe left pane click Product Security 4 Inthe Norton Product Tamper Protection row move the On Off switch to the right to the Off position 5 Click Apply 6 Inthe Security Request dialog box in the Select the duration drop down list select how long you want to turn off Norton Product Tamper Protection 7 Click OK 8 In the Settings window click OK Customizing protection features 507 About customizing settings and options To turn on Norton Product Tamper Protection 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the General tab 3 Inthe left pane click Product Security 4 Inthe Norton Product Tamper Protection row move the On Off switch to the left to the On position 5 Click Apply and then click OK About securing Norton Internet Security Settings using a password You can configure Norton Internet Security to prevent unauthorized access to your product settings If you share your computer with others and do not want them to modify your Norton Internet Security Settings you can secure Norton Internet Secu
338. on Safe Web Norton Safe Web checks the safety of a Web site and lets you perform a safe Web search Norton com The Symantec Web site provides more information about the various products of Symantec the latest updates on Internet security and various support options Norton Update Center Norton Update Center checks and lets you download the latest version of your Norton product If you forget your Norton Account password you can get a temporary password by clicking the Forgot your password link in the Norton Account sign in Web page You need to provide your email address You need to use the same email address that you provided when you created your Norton Account Symantec sends a temporary password to your email address You can use the temporary password for a limited time period You must reset your password after you log in to your Norton Account 36 Getting started About your Norton Account Creating a Norton Account Your Norton Account stores the product key and the billing information of your product You can also register your product with the Norton Account In addition Norton Account helps you to do the following Access the product key and other product information when you need it Reinstall your Norton product Buy additional product keys for your home or office Check and download the latest version of the product by using Norton Update Center Save online orders and update billing informat
339. on attempts from other computers and by programs on your computer to connect to the Internet or other computers You can use the reputation information in the firewall alerts to Protecting Internet activities 257 About the Smart Firewall make definite decisions on whether to allow or block communication attempts of networking applications In addition you can identify any suspicious programs or vulnerable programs that attempt to access your communication network When Automatic Program Controlis set to Aggressive or Automatic Norton Internet Security automatically configures Internet access settings for all Web enabled programs the first time they run When a program attempts to access Internet for the first time Automatic Program Control creates rules for it db Automatic Program Control configures network access only for the versions of programs that Symantec recognizes as safe Norton Internet Security blocks any infected program or process that attempts to connect to the Internet However if you have turned off Automatic Program Control Norton Internet Security displays firewall alerts each time a program or process attempts to access the network You must manually specify the access settings in the firewall alerts for all inbound traffic and outbound traffic You can use the reputation details that appear in the left pane in the firewall alert to make your decision To learn more about the reputation details in the fir
340. on the taskbar click the Norton Management icon 3 Inthe pop up that appears click Open Norton Management Installing the Norton Management agent on Windows Norton Management uses the Norton Management agent to monitor and manage the security status of a device You must install Norton Management agent on every device that you want to manage using Norton Management You can download and install the Norton Management agent in one of the following ways Log on to the Norton Management Web site and download the agent If your computer has Norton AntiVirus or Norton Internet Security go to the main window of the product click the Manage icon and then install the agent program You must have an administrator privilege on your device to install the Norton Management agent To install the Norton Management agent from the Norton Management Web site 1 Go to the device that you want to manage with Norton Management 2 Open your browser and go to https manage norton com Getting started 41 About Norton Management 3 Click Sign In and log on to your account using your Norton Account email address and password 4 On the My Devices page click Add Device 5 Inthe confirmation window click Yes to confirm that you are already on the device you want to manage 6 Inthe window that appears click Save File and download the installer file 7 Double click the file that you downloaded 8 Click Run 9 Inthe Welcome to
341. once merged option appears when you import the data from local or portable profile By default this option is enabled 384 Securing your sensitive data About securing your sensitive data amp When importing the file size must not be more than 15 MB for CSV files and 35 MB for NPM files To import your data 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Under Identity Safe in the Import Data row click Configure 5 Inthe Import Identity Safe Data window under Import my data from select one of the following options Portable Profile Drive Drive This option appears only if you connect an external drive with a portable profile Local Profile Select this option if you want to import the Identity Safe data from your local vault to online vault This option appears only if you are logged in to your online vault Backup File If you select this option you must type or browse to the location of the file from which you want to import the data 6 If you backed up your data with a password in the Password box type the password 7 If you want to import the data from a backup file under While importing data select one of the following options Merge with existing data Replace existing data 8 Click OK 9 Inthe confirmation dialog box click OK Securing your sensitive data 385 About securing your sensit
342. ons The Internet Explorer application cannot access the Internet as Norton Internet Security gives precedence to General rules over the Program rules Within the list of General rules rules are processed in order of appearance from top to bottom Program Control entries are not processed in order The rules within each Program Control entry however are processed in order of appearance from top to bottom Protecting Internet activities 215 About the Smart Firewall For example you have a Program rule for the Symantec pcAnywhere application that blocks the use of the application with any other computer You add another rule for the same application that allows its use with a specific computer You then move the new rule before the original rule in the program rule list Norton Internet Security processes the new rule first and lets you use Symantec pcAnywhere with that specific computer It then processes the original rule and prevents its use with any other computer About General rules Norton Internet Security includes a number of predefined general firewall rules These rules provide network functionality and protection from known Internet risks Examples of default firewall rules include the following Permit all types of outbound and safe types of inbound ICMP Internet Control Message Protocol messaging ICMP messages provide status and control information 216 Protecting Internet activities About t
343. ons After you grant permission Norton safe Web scans all the available links on your Facebook wall each time you use Scan Facebook Wall option It then displays the security status of the scanned URLs Norton Internet Security keeps your computer secure from latest threats by automatically running Full System Scan when your computer is in the idle state Norton Internet Security provides options to configure Norton Internet Security scans The computer settings and some of the options in the network settings let you configure how you want Norton Internet Security to scan your computer for viruses and other security threats You can click the Settings link available in the Norton Internet Security main window and view the options that are available under the Computer tab and Network tab Protecting your files and data 133 About the Norton Internet Security scans Accessing Norton Internet Security scans You can use Norton Internet Security scans to secure your computer from all types of viruses and unknown threats You can access Full System Scan and custom scans from the Norton Internet Security main window You can access Quick Scan from the Norton Internet Security main window or the Norton Internet Security icon on the taskbar You can also scan any particular folder using the context scan feature The context menu scan is available when you right click the folder that you want to scan If the Insight Protection o
344. ons under the Recent History Full History and Silent Mode categories in the drop down list of the Show option in the Security History window The summary includes the following information The turn on or turn off status of Silent Mode Usage of Silent Mode Settings such as Silent Mode or Quiet Mode The type of program that turns on Silent Mode such as disk burning or TV recording The name of a user specified program that turns on Silent Mode The time and date when Silent Mode is turned on or turned off The severity displays the risk level of the selected item About the Silent Mode that you turn on manually Norton Internet Security lets you manually turn on Silent Mode for a specified duration When Silent Mode is turned on Norton Internet Security suppresses alerts and suspends background activities for the duration that you specify You can verify the turn on status of Silent Mode in the notification area at the far right of the taskbar The Norton Internet Security icon in the notification area changes to a crescent patterned icon to display the turn on status of Silent Mode Turning on Silent Mode manually before you perform your tasks helps you prevent alerts notifications or background activities interrupting you for the specified duration You can turn on Silent Mode for a period of one hour two hours four hours six hours or one day After the specified duration Norton Internet Security turns off Silen
345. ord Displays the strength of the password for your login 366 Securing your sensitive data About securing your sensitive data Lets you quickly launch the Web site login page Fills in your login automatically when you revisit Web pages Lets you manually add logins Lets you change the URL of your saved logins Lets you view the last time you made changes to the settings of your saved logins Lets you access the login features that you saved for a Web site even after Norton Internet Security expires The Identity Safe features are supported in the Internet Explorer Firefox or Chrome Web browsers Norton Internet Security supports latest versions of Google Chrome and Firefox You can use the Vault Open menu that is available on the Norton Toolbar to view and autofill the details of the saved logins You can also use Login Assistant option on the Norton Toolbar to view copy or edit the logins or cards in your online vault Login Assistant window has the following options Website Login Lets you view the login credentials of the web page currently loaded in your browser Cards Lets you view the Cards that you have saved in your online vault All Logins Lets you view all the login credentials that you have saved in your online vault If you have saved multiple logins for a same Web site you can choose a login from the drop down list that Securing your sensitive data 367 About securing your sensiti
346. ork Cost Awareness 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Network Security Settings 4 Inthe Network Cost Awareness row move the On Off switch to the left to the On position 5 Click Apply 6 Click OK Defining the Internet usage of Norton Internet Security If you think that Norton Internet Security uses too much of your network bandwidth you can restrict the Internet usage of Norton Internet Security You can set up policy for each network connection that Norton Internet Security uses to connect to the Internet The Network Cost Awareness Settings window lists all the network connections that your computer uses to connect to the Internet You can view the status of the network connections that are currently in use The network policy that you set up defines the amount of Protecting Internet activities 329 About Network Cost Awareness network bandwidth that Norton Internet Security can use To define the Internet usage of Norton Internet Security 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Network Security Settings In the Network Cost Awareness row move the On Off switch to the left to the On position 5 Click Configure The Network Cost Awareness Settings window lists all the network connections that Norton Internet Security
347. orm such an activity and want to avoid the warning you can turn off Auto Protect If you have set a password for settings Norton Internet Security asks you for the password before you can view or change the settings en you turn o uto Protect rotection D Wh ff Auto P SONAR P i and Download Intelligence are also turned off To turn off Auto Protect temporarily 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window in the left pane click Real Time Protection 3 Inthe Auto Protect row move the On Off switch to the right to the Off position 4 Inthe Settings window click Apply 5 In the dialog box that appears in the Select the duration drop down list select how long you want to turn off Auto Protect and then click OK To turn on Auto Protect temporarily 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window in the left pane click Real Time Protection 3 Inthe Auto Protect row move the On Off switch to the left to the On position 4 In the Settings window click Apply Turning off or turning on spam filtering With the increase in usage of email many users receive a number of unwanted and unsolicited commercial email messages known as spam Not only does spam make it difficult to identify valid email messages but some spam contains offensive messages and images 454 Customizing protection features About turning off automatic features To
348. orton Internet Security main window click Settings 2 Under Real Time Protection in the Antispyware row click Configure 3 Inthe Antispyware window check the category of security risks that you want Antispyware to detect 4 Click OK 284 Protecting Internet activities About Norton AntiSpam About Norton Antispam Norton AntiSpam lets you categorize the email messages that you receive in your email programs into spam email and legitimate email It filters legitimate email into the Inbox folder and spam email into the Junk folder or the Norton AntiSpam folder Norton AntiSpam uses Symantec enterprise class spam filtering technology to classify the spam email messages from legitimate email messages Norton AntiSpam uses a real time filter delivery mechanism and filters email messages using various local filters at different levels The local filters classify the email messages as spam or legitimate If the local filters classify the email message as legitimate Norton AntiSpam collects information such as signature and URL hashes of the email message Norton AntiSpam then sends this information to the Symantec Web server for additional analysis When the email message is classified as spam Norton AntiSpam changes the subject of the email message and sends it to your email client The email client identifies the change in the subject of the email message and moves it to the Junk folder or the Norton AntiSpam folder The No
349. orton Safe Web from your Facebook profile you can use the Application Settings option of Facebook 170 Protecting your files and data About the Norton Internet Security scans The following are the safety states that Norton Safe Web provides after it scans the links on your Facebook Wall Indicates that the site is safe to visit and Norton Trusted The sites with this rating do not harm your computer and so you can visit this site Indicates that the site has security risks The sites with this rating may install malicious software on your computer Symantec recommends that you do not visit this site Indicates that Norton Safe Web has not yet tested this site and it does not have sufficient information about this site Indicates that the site may have security threats Symantec recommends you to be cautious while you visit such Web sites Enabling your Facebook Wall Scan The Norton Safe Web feature scans your Facebook Wall and analyzes the security levels of all the available links on your Facebook Wall It then displays the security status of the scanned URLs However Norton Safe Web requires your permission to scan your Facebook Wall Protecting your files and data 171 About the Norton Internet Security scans To enable your Facebook Wall 1 Inthe Norton Internet Security main window click Scan Now 2 Inthe window that appears click Scan Facebook Wall 3 Inthe Scan Facebook Wall pane click Sc
350. ory To manually submit an item to Symantec 1 Inthe Security History window in the Quarantine view select the item that you want to submit to Symantec 2 Inthe Details pane click Restore amp Options 3 Inthe Threat Detected window click Submit to Symantec 4 Inthe dialog box that appears click OK 442 Monitoring protection features About Security History Customizing protection features This chapter includes the following topics Feature summary About turning off automatic features About customizing settings and options Feature summary Use the information in this section to familiarize yourself with the product This section includes the following information A list of all of the features in the product A brief description of each feature The feature summary can help you determine which feature to use to solve a problem Read the feature descriptions to locate the correct component to use For more information select one of the sub entries for this Help topic About virus and security risk protection features Virus and security risk protection features provide comprehensive virus prevention and security risk detection for your computer Known viruses are automatically detected and repaired Instant messenger attachments email message attachments Internet 444 Customizing protection features Feature summary downloads and other files are scanned for viruses and other potential
351. otect your computer and your sensitive data By using the Scan Now option you can run the following types of scans Computer Scan Lets you run different computer scans including Quick Scan Full System Scan and Custom Scan Reputation Scan Lets you run different reputation scans including Quick Scan Full System Scan and Custom Scan t Scan Facebook Wall Lets you scan News Feeds on your Facebook Wall periodically to protect you from malicious links Lets you run LiveUpdate to download the latest virus definitions and program updates Norton Internet Security uses the latest virus definitions from Symantec servers to detect and remove latest security threats Getting started 21 About Norton Internet Security main window Lets you access the Norton Internet Security advanced window By using the Norton Internet Security advanced window you can do the following Run different scans View Security History View the quarantined items in the Security History window View Norton Insight Application Ratings View the list of programs that are vulnerable on your computer and find how Norton protects you from the program vulnerabilities View and configure Network Security Map Manage logins and cards Configure parental controls In addition you can choose to turn on or turn off the protection features from this window When your system status is At Risk or Attent
352. otifies you with a performance alert You can choose to close the program or the process manually and free the resource If the Use Low Resource Profile On Battery Power option is turned on Norton Internet Security automatically changes the threshold profile to low when your computer runs on battery power By default this option is turned on Symantec recommends that you keep the Use Low Resource Profile On Battery Power option turned on To turn off the Use Low Resource Profile On Battery Power option 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the General tab 3 Inthe left pane click Performance Monitoring 4 Under Performance Monitoring in the Use Low Resource Profile On Battery Power row move the On Off switch to the right to the Off position 5 Click Apply and then click OK To turn on the Use Low Resource Profile On Battery Power option 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the General tab 3 In the left pane click Performance Monitoring 4 Under Performance Monitoring in the Use Low Resource Profile On Battery Power row move the On Off switch to the left to the On position 5 Click Apply and then click OK Monitoring your system s performance 93 About System Insight Excluding programs from performance alerts Norton Internet Security lets you exclude programs from performance alerts You can a
353. ou can access your Identity Safe data from any computer that has Norton Internet Security installed You can merge the Identity Safe data from your local profile into your online vault When you merge the data from local vault to online vault the data from the local vault is permanently moved to the online vault You can access the data from the online vault To merge local vault to online vault 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Under Identity Safe in the Sync Data Online row click Configure 354 Securing your sensitive data About securing your sensitive data 5 Inthe Sync Identity Safe Data Online window in the Enter the Password box type the password for your local vault 6 Click LogIn to Norton Account option at the bottom of the Sync Identity Safe Data Online window 7 Inthe SignInto Norton Account window type your Norton Account user name and password and click Sign In 8 Click Validate If you already have an online vault Norton Internet Security automatically takes you to Merge Identity Safe Online window to merge your local vault with your online vault 9 Inthe Warning dialog box click Yes This window appears only if your Norton Account already has an online vault associated with it 10 In the Merge Identity Safe Data Online window type your online vault password associated with you
354. ou use software programs on your computer insert removable media access the Internet or use document files It also monitors your computer for any unusual symptoms that may indicate an active threat You can use the Auto Protect options to customize the protection of your computer 468 Customizing protection features About customizing settings and options SONAR Protection Symantec Online Network for Advanced Response SONAR provides you with real time protection against threats by proactively detecting unknown security risks on your computer SONAR identifies emerging threats based on the behavior of applications SONAR Protection is quicker than the traditional signature based threat detection techniques SONAR detects and protects you against malicious code even before virus definitions are available through LiveUpdate You can turn on this option to proactively detect unknown security risks on your computer SONAR provides you the greatest control when low certainty threats are detected Enable Boot Time Protection Enable Boot Time Protection starts Auto Protect when you start your computer It provides enhanced security level from the time your start your computer Customizing protection features 469 About customizing settings and options Early Launch Anti Malware Protection This feature provides better protection by running all the necessary components of Norton Internet Security th
355. our computer Startup Manager helps you manage the startup items of your computer efficiently If you do not want a program to automatically start when you turn on your computer you can disable the program using Startup Manager You can also delay a startup item that you want to start at a later time To disable startup items 1 Inthe Norton Internet Security main window click Performance 2 Inthe Performance window click Startup Manager 3 In the Startup Manager window in the On Off column uncheck the program that you do not want to automatically start when you turn on your computer 4 Click Apply 5 Click Close To enable startup items 1 Inthe Norton Internet Security main window click Performance 2 Inthe Performance window click Startup Manager 100 Monitoring your system s performance About System Insight 3 In the Startup Manager window in the On Off column select the program that you want to automatically start when you turn on your computer 4 Click Apply 5 Click Close Managing startup items Norton Internet Security Startup Manager monitors and lists the programs that automatically start when you turn on your computer To reduce the start time of your computer and improve the performance you can delay the start of some of the programs when you turn on your computer Norton Internet Security delays the start of the delayed programs by five minutes The first delayed program in the Startup Ma
356. our sensitive data 2 Inthe Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Under Identity Safe in the Export Data row click Configure 5 Inthe Export Identity Safe Data window select the File Format You can select one of the following Identity Safe Backup Format Plain text 6 Inthe Export my data to box type or browse to the location to which you want your data saved 7 Type the name that you want to assign to the file 8 If you want to back up your data with a password for more security type and confirm the password 9 Click OK In the Validate Password for Identity Safe window enter your vault password to export your Identity Safe data 10 In the confirmation dialog box click OK Importing your Identity Safe data You can import your Identity Safe data from the file that you previously backed up You can also import the Identity Safe data from the portable profile that you saved in the older version of Norton Internet Security You can merge the imported data in to the vault that you are currently logged in or replace the existing Identity Safe data that you stored in your vault that you are logged in with the imported data The Merge with existing data and Replace existing data options appear only when you import Identity Safe data from a backup file When you import Identity Safe data from local or portable profile you can only merge the data The Delete Original data
357. out the Smart Firewall new network to which your computer is connected as Shared or Protected The prompt appears only when the security criteria for sharing matches Protecting Internet activities 249 About the Smart Firewall Automatic Program Control 250 Protecting Internet activities About the Smart Firewall Automatically configures Internet access settings for the Web enabled programs that are run for the first time You can configure the Automatic Program Control option to the following settings Aggressive Allows Norton Internet Security to alert you when it detects a program with Unproven or Poor trust level receiving inbound traffic You can decide whether to allow or block the traffic after viewing the reputation details of the program in the firewall alert When you Select this option Norton Internet Security does not alert you for any outbound traffic irrespective of the reputation of the program Norton Trusted Good Unproven Poor or Bad Norton Internet Security automatically takes decisions on the outbound traffic Automatic Allows Norton Internet Security to automatically take Protecting Internet activities 251 About the Smart Firewall decisions when a program receives inbound or outbound traffic When you select this option Norton Internet Security does not prompt you with any firewall alerts Off Turns off Automatic Program
358. panies this License Agreement collectively the Software is the property of Symantec or its licensors and is protected by copyright law Although Symantec continues to own the Software after Your acceptance of this License Agreement You will have certain rights to use the Software during the Service Period The Service Period shall begin on either a the date of Your initial installation of a copy of the Software on a computer mobile or mobile computing device a Device or b if You received this Software as part of a multiple product offering the date of Your initial installation of a copy of the Software or any software product or mobile application included in such offering on a Device The Service Period shall last for the period of time set out in the Documentation or the applicable transaction documentation from the authorized distributor or reseller from which You obtained the Software The Software may automatically deactivate and become non operational at the end of the Service Period and You will not be entitled to receive any feature or content updates to the Software unless the Service Period is renewed Subscriptions for renewals of the Service Period will be available in accordance with Symantec s support policy posted at http www symantec com norton support technical_support_policy jsp This License Agreement governs any releases revisions updates or enhancements to the Software that Symant
359. profile to the vault that you are currently logged in To merge the Identity Safe data from portable profile to local vault or online vault 1 On the Norton Toolbar in the Identity Safe menu click Merge Portable Data Drive This option appears only if you connect an external drive with portable profile 2 Inthe dialog box that appears click Yes 3 Inthe Import Identity Safe Data window under Import my data from click Portable Profile Drive 4 Inthe Password box type the password 5 Do one of the following If you want to delete the data from the portable profile after import check Delete original data once merged If you do not want to delete the data from the portable profile after import uncheck Delete original data once merged 356 Securing your sensitive data About securing your sensitive data Importing logins Identity Safe lets you import the logins that you have saved in Internet Explorer After you set up Identity Safe vaults the Identity Safe Setup Successful window appears You can use this window to import your logins The imported logins appear in the Vault Open menu on the Norton Toolbar and in the Edit Logins window You can use the imported logins the same way that you use the logins that you create This option is unavailable for Windows 8 Operating System To import logins 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web
360. prompts you for free installation To get the latest version this option must be turned on This feature may not work in some versions of Norton Internet Security Smart Definitions Activates the Core Set virus definitions which contain the most important virus definitions that are required for latest security threats as viewed by Symantec Turning on the Smart Definitions option minimizes download time installation time and system start time Therefore the Core Set results in faster performance of your computer Customizing protection features 473 About customizing settings and options Apply updates only on reboot Lets you choose how the program updates obtained by Automatic LiveUpdate need to be applied to your computer Certain program updates may require you to restart your computer for the updates to complete When you turn on this option program updates that require system restart are automatically applied the next time you restart your system However program updates that do not require system restart are applied instantly By default this option is turned off This option is available only in Windows 7 and Windows 8 About Network settings The options in the Network tab let you configure Norton Internet Security to monitor your Internet activities You can configure Norton Internet Security to protect your computer against any threat that you may receive through email atta
361. ption is turned on when you right click a file the shortcut menu displays Norton Internet Security and then Insight Network Scan You can use this command to scan a file using both the local definitions and the definitions that are hosted in the Cloud You can also run the Reputation Scan to view the reputation information of the files To access the scan from the Norton Internet Security main window 1 Inthe Norton Internet Security main window click Advanced 2 In Computer Protection pane click Scan Now 3 Inthe window that appears do one of the following In the Computer Scan pane click the scan that you want to run Click Reputation Scan and then click the scan that you want to run Click Scan Facebook Wall to scan the links that are available on your Facebook wall 134 Protecting your files and data About the Norton Internet Security scans To access the scan from the notification area In the notification area on the taskbar right click the Norton Internet Security icon and then click Run Quick Scan By default Insight Protection option is turned on In this case Norton Internet Security performs an Insight Network Quick Scan simultaneously with a traditional Quick Scan To scan a particular folder Right click the folder and click Norton Internet Security gt Scan Now To scan a particular file Right click the file and click Norton Internet Security gt Insight Network Scan The Ins
362. r Country Region drop down menu www clubnorton com The ClubNorton Web page includes a regularly updated article library a glossary the Norton Forums and the Norton Update Center You can also find the following useful links in the Web page Symantec Security Check Subscription Troubleshooter Home amp Home Office Security Product Manuals Product Updates Product Reviews Order Status Returns Rebates Finding additional solutions 529 About uninstalling About uninstalling To remove your Symantec product from your computer use the Add Remove Programs option in the Windows Control Panel You must restart your computer after uninstalling the product so ensure that you do not have any other programs running while you follow this procedure Uninstalling Norton Internet Security You can remove Norton Internet Security in the following ways From Windows Control Panel From the Start menu O You cannot access online Help while uninstalling Therefore you should print out the Uninstalling Norton Internet Security Help topic before continuing to uninstall You may need to uninstall Norton Internet Security for some purpose You can reinstall the product using the installation file that you downloaded from Symantec Web site or from the CD To reinstall Norton Internet Security follow the installation procedures that are available in the user guide During uninstallation Norton Internet Security off
363. r Norton Account in the Enter the Password box 11 In the Merge Identity Safe Data Online window click Merge Deleting local vault and online vault Identity Safe lets you create a local vault and an online vault to save your Identity Safe data If you no longer require your Identity Safe data that is stored in your local vault and online vault you can delete the vaults When you delete the local vault and online vault all the Identity Safe data is permanently removed To delete the local vault and online vault 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Under Identity Safe in the Delete Data row click Configure Securing your sensitive data 355 About securing your sensitive data 5 Inthe Warning window click Yes 6 Inthe Settings window click Apply 7 Click OK Merging portable profile to local vault or online vault If you have Identity Safe data that is stored on any external drives from the older versions of Norton Internet Security you can merge that portable profile to local vault or online vault When you connect your external drive to your computer the Identity Safe menu in the Norton Toolbar provides option to merge the Identity Safe data from your portable profile You can merge the data from the portable profile to local vault or online vault You can merge the Identity Safe data from the portable
364. r computer You might also decide not to be notified about the program in future scans When you exclude a known security risk from Norton Internet Security scans the protection level of your computer reduces You should exclude items only if you are confident that they are not infected To exclude a security risk from scans you need to add the specific security risk to the Signature Exclusions window The Signature Exclusions window contains the list of all security risks that can be excluded from Norton Internet Security scans For each security risk you can view the risk details and the effect of the risk on your computer To add security risks to the Signature Exclusions window go to the Norton Internet Security main window and then click Settings gt Computer gt AntiVirus and SONAR Exclusions gt Signatures to Exclude from All Detections gt Configure Adding items to the Signature Exclusions To exclude a security risk from scans you must add the specific security risk to the Signature Exclusions window You can select a known risk by name and add it to the list When you exclude a known security risk from Norton Internet Security scans the protection level of your computer reduces You should exclude items only if you are confident that they are not infected Protecting your files and data 179 About the Norton Internet Security scans To add a signature to the Signature Exclusions 1 Inthe Norton Internet Secur
365. rds window select the card that you want to edit 6 Click Edit Card Securing your sensitive data 379 About securing your sensitive data 7 Modify the required details that you want to change 8 Click Save 9 Click Close To delete a card 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Under Identity Safe in the Edit Cards row click Configure 5 In the Edit Identity Cards window select the card that you want to delete 6 Click Delete Card 7 Inthe Warning dialog box click Yes 8 Click Close To duplicate a card 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Under Identity Safe in the Edit Cards row click Configure 5 Inthe Edit Identity Cards window select the card that you want to duplicate Click Duplicate Card Modify the details that you want to change Click Save Click Close O ON Identity Safe automatically detects login fields which are not auto filled or filled incorrect by Identity safe in the Web pages and displays the Need Assistance menu bar below the Norton Toolbar in your browser The Need Assistance menu bar lets you choose the required card from the list of cards that you have saved You can also click Login Assistant option to select the 380 Securing your sensitive data A
366. reats are detected and resolved These alerts 62 Getting started About the Norton Internet Security icon and notifications appear over the notification area of your computer In most cases you can click the link available in the alert to view the details and fix the problems The Norton Internet Security icon represents the current state of your computer The icon changes its color when it actively fixes any issues or wants to inform you about any warning or urgent issues You can see the following representations of Norton Internet Security icon in the notification area Represents that your computer is completely secure Represents that there are some issues against your computer protection that require your attention Represents that there are some urgent issues against your computer protection that require immediate resolution Represents that your product is disabled Represents that Norton Internet Security is fixing issues Represents that the Silent Mode feature is turned on This icon also displays the current protection status badge You can right click the Norton Internet Security icon to open the shortcut menu to quickly access a few important tasks of Norton Internet Security Getting started 63 About the Norton Internet Security icon About Norton Internet Security shortcut menu Norton Internet Security performs background activities to keep your computer secure The icon in the notificatio
367. ress Book Exclusions Norton AntiSpam does not import the email addresses that you add to the Address Book Exclusions list 290 Protecting Internet activities About Norton AntiSpam To import an address book 1 In the Norton Internet Security main window click Settings In the Settings window click the Network tab In the left pane click Message Protection Under AntiSpam in the Allowed List row click Configure In the Allowed List window click Import In the Allowed List window click Apply Click OK To add entries to your Allowed List 1 In the Norton Internet Security main window click Settings In the Settings window click the Network tab In the left pane click Message Protection Under AntiSpam in the Allowed List row click Configure In the Allowed List window click Add 6 Inthe Add Email Address dialog box in the 8 9 Address Type drop down list select the address type You can select one the following options Email Domain Do one of the following To add an email address type the email address that you want to allow and optionally the name of the sender To add a domain name type the address of the domain for example symantec com and optionally the name of the domain Click OK In the Allowed List window click Apply 10 Click OK Protecting Internet activities 291 About Norton AntiSpam To edit or delete entries in the Allowed List 1 Inthe Nor
368. risks In addition the definition updates that Automatic LiveUpdate downloads when your computer is connected to the Internet keeps you prepared for the latest security risks Your computer is continually monitored and protected from known and unknown threats by the following features Checks for viruses and other security risks every time that you run programs on your computer Auto Protect options let you customize the protection of your computer Auto Protect options are Loads into memory when Windows starts providing constant protection while you work Checks for viruses and security risks every time that you use software programs on your computer It also checks every time when you insert removable media access the Internet or use document files Monitors your computer for any unusual symptoms that may indicate an active threat Notifies you of program updates and downloads definition updates automatically See About LiveUpdate on page 64 Customizing protection features Feature summary Detects viruses spyware and other security risks in compressed files during manual scans See What to do if a security risk is found on page 199 Protects your computer against the threats that you may receive through email attachments You can use the Email Antivirus Scan option and the AntiSpam option to configure your email program for protectio
369. rity Request dialog box in the Select the duration drop down list select how long you want to turn off Automatic LiveUpdate and then click OK 6 Inthe Settings window click OK To turn on Automatic LiveUpdate 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window in the left pane click Updates 3 Inthe Automatic LiveUpdate row move the On Off switch to the left to the On position 4 In the Settings window click Apply 5 Click OK 74 Getting started About LiveUpdate Turning on or turning off Apply updates only on reboot LiveUpdate obtains latest definition updates and the program updates that keep your computer secure from the latest security threats Definition updates contain the information that allows Norton Internet Security to recognize and alert you to the presence of a specific virus or a security threat Certain program updates require system restart for the update to complete The Apply updates only on reboot option lets you choose how the program updates needs to be applied The Apply updates only on reboot option is available only on Windows 7 and Windows 8 When you turn on the Apply updates only on reboot option the Restart Now and the Restart Later options appear in the Norton LiveUpdate window When you click Restart Now your computer is restarted and the program updates are applied When you click Restart Later the program updates are applied when you restart
370. rity Settings using a password The Settings Password Protection option lets you secure your Norton Internet Security Settings by setting up a password By default Settings Password Protection option is turned off You must turn on the Settings Password Protection option to set up a password for your product settings To use the Settings Password Protection option go to the Norton Internet Security main window and then click Settings gt General gt Product Security The password must be between 8 and 256 characters in length After you set up a password for Norton Internet Security Settings you must enter the password each time to access or configure your product settings If you forget your settings password you can reset the password in the window that appears when you choose to uninstall Norton Internet Security You do not need to uninstall the product to reset your password You can use the reset settings password option in the Select your Uninstall Preference window to reset your password 508 Customizing protection features About customizing settings and options amp The reset settings password option appears in the Select your Uninstall Preference window only when the Settings Password Protection option is turned on You can turn off the Settings Password Protection option if you no longer require password protection for your Norton Internet Security Settings Securing your Norton Internet Security Settings usi
371. rnet Security main window and then click Settings gt General gt Norton Tasks gt Idle Time Optimizer Optimizing your boot volume The Optimize option lets you optimize your boot volume to improve the boot time of your computer Optimization of your boot volume maximizes the usable free space by rearranging file fragments into adjacent and contiguous clusters When the drive head of your hard disk accesses all of the file data in one location the file is read into the memory faster When you use the Optimize option in Windows XP Norton Internet Security optimizes only the boot volume for example C Windows Therefore it requires less time to complete optimization However when you use the Optimize option in Windows Vista Windows 7 or Windows 8 Norton Internet Security optimizes the drive that contains the boot volume Therefore it requires more time to complete optimization You can access the Optimize option at the top of the security status graph in the Performance window You can also optimize your boot volume using the Insight Optimizer option in the Norton Tasks window The Insight Optimizer row in the background jobs list that is available in the Norton Tasks window displays the details of the boot volume optimization process You can view details such as timestamp duration and status of the background job To optimize your boot volume from the Performance window 1 Inthe Norton Internet Security main window c
372. rnet Security suspends background activities to improve the performance of your TV program recording session However Norton Internet Security continues to display alerts and notifications during the session Norton Internet Security supports the following Media Center applications to turn on Quiet Mode t Windows Media Center For Windows Media Center to enable Quiet Mode during TV program session you might need to restart your computer after you install Norton Internet Security ms J River MEDIA CENTER version 13 0 125 and later Norton Internet Security turns on Quiet Mode as soon as you start recording a TV program After Quiet Mode is turned on it turns off after the recording session is complete You cannot turn off Quiet Mode during the TV program recording session by turning off the Media Center TV Recording option in the Settings window Protecting your files and data 191 About the Norton Internet Security scans Norton Internet Security automatically turns on Quiet Mode when it detects a TV program recording session or a disk burning session In addition you can manually add the programs for which you want Norton Internet Security to turn on Quiet Mode to the Quiet Mode Programs list When Norton Internet Security detects a running instance of a program that you added in the list it automatically turns on Quiet Mode When Quiet Mode is turned on Norton Internet Security suspends the backgro
373. rnet Security main window Manage Lets you access Norton Management Norton Management lets you manage your Norton products on all of your devices from one location Click the Manage icon at the right side of the main window to sign up for or log into Norton Management The Norton Management agent should be installed on each device that you want to add to Norton Management You can use your existing Norton Account login information to access Norton Management dd Norton Management may not be available in some versions of Norton Internet Security Getting started 25 About Norton Internet Security main window Mobile Lets you download the Norton Mobile Security for Android You can use Norton Mobile Security on all your devices that use Android operating system When you click the Mobile icon the main window displays a Quick Response QR code for installing Norton Mobile Security You can use the Android scan app on your Android device to scan the QR code and install Norton Mobile Security You can also click the link to go to the Web site where you can download Norton Mobile Security cd Norton Mobile Security may not be available in some versions of Norton Internet Security 26 Getting started About Norton Internet Security main window Backup Lets you set up the Norton Online Backup account or access your online backup status d Norton Online Backup may not be available in some versions of
374. rnet Security with your Norton Account When the Remote Management option is turned on Norton Internet Security sends details related to your Norton product to Norton Management Norton One and Norton Studio app When this option is turned off Norton Internet Security does not publish any of its details in the Norton Management Norton One and Norton Studio app By default the Remote Management option is turned off In some cases you are prompted to enter your Norton Account password when turning on Remote Management option To turn on Remote Management 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the General tab 3 Inthe left pane click Other Settings 4 Inthe Remote Management row move the On Off switch to the left to the On position 5 Click Apply and then click OK To turn off Remote Management 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the General tab 3 Inthe left pane click Other Settings 4 Inthe Remote Management row move the On Off switch to the right to the Off position 5 Click Apply and then click OK This chapter includes the following topics Finding the version number of your product Finding the End User License Agreement About upgrading your product About Norton Autofix Staying informed about protection issues About Support About uninstalling Finding the version number
375. rol software either installed or through your ISP that might block the connection A connectivity problem can occur if you use parental control software If you suspect that parental controls might block the connection you can configure the parental controls so that they do not block the activation procedure You need to log in to your parental control software or to the Internet through your ISP as an administrator to change your configuration If you use a proxy server to connect to the Internet you must configure the proxy settings To use the Proxy Server option go to the Norton Internet Security main window and then click Settings gt Network gt Network Security Settings gt Proxy Server gt Configure 8 Getting started About Norton Internet Security main window About Norton Internet Security main window The Norton Internet Security main window acts as a security management interface You can access the main features and monitor the performance of your computer from the main window You can find the following items in the main window Lets you access the Settings window You can view and configure various options to customize the Norton Internet Security settings Lets you access the Performance window The Performance window displays a chronicle representation of all the installs downloads optimizations detections alerts and instances of Quick Scan The window also displays a detailed
376. rotect notifications that you have received Review all of the resolved security threats The Resolved Security Risks category includes the infected files that Norton Internet Security repairs removes or quarantines Review the list of unresolved security risks The Unresolved Security Risks category includes the infected files for which Norton Internet Security was not able to take any action This category mostly includes the low level risks that require your attention for a suitable action Responding to security issues 203 What to do if a security risk is found 4 Inthe right pane click the Options link The option name appears as Restore amp Options for few items If one or more security risks such as spyware are found you can take action on these items if required 204 Responding to security issues What to do if a security risk is found 5 In the Threat Detected window select the appropriate action on the risk The following are some of the options that are available in the Threat Detected window Restore amp Exclude this file Exclude this program Manual Fix recommended Remove this file may cause browser to close recommended Returns the selected Quarantine item to its original location and excludes the item from being detected in the future scans This option is available for the detected viral and non viral threats Excludes the security risk from future scan
377. rovides details about the risk level the origin and the activity report of quarantined security risks on your system Monitoring protection features 429 About Security History Lets you view the reputation details of a file that you download You can use these details to determine the safety level of the file and then decide the action that you want to perform Lets you view the performance details of any File of Interest that is available on your computer The information includes the general details the origin and lineage information the resource usage and the actions that the file has performed on your system The File Insight window provides various details about the Security History item These details are classified in different tabs in the File Insight window 430 Monitoring protection features About Security History You can select a tab to view more details about it The File Insight window provides details about a file in the following tabs Displays the information such as the confidence level community usage of a file how long ago the file was released and how stable the file is cd Stability ratings of a file may vary depending upon your operating system You can view details such as the signature and the date on which the file was created You can determine if a file is a startup file and the date on which the file was last used Provides the lineage details of a file
378. rs that are connected to the network Status of the protection features of the computers that are connected to the network Subscription status and Norton product version of the computers that are connected to your network Status of your wireless network connection Connection status of the devices that are on the network The known unknown or intruder devices that are on your network You can grant or deny permission to the networked devices to access your computer You can also modify details about a computer or device that is connected to your network Turning off or turning on Network Security Overview The Network Security Overview window provides a brief summary about the following features 302 Protecting Internet activities About the Network Security Map Wireless Security Remote Monitoring Network Map Trust Controls You can click each of the features and read the summary to learn more about using Network Security Map to manage your home network By default the Network Security Overview window appears each time you open Network Security Map If you do not want to view the Network Security Overview window you can turn it off Turning off the Network Security Overview window does not affect the performance or security of your computer You can also turn off the Network Security Overview window if you check Do not show this again option that is available at the bottom of the Network S
379. rs to the scan or remove the files and folders that you do not want to scan You can also change the name of the scan You can edit a custom scan in the Scans window To edit a custom scan 1 Inthe Norton Internet Security main window click Scan Now 2 Inthe Computer Scan pane click Custom Scan 3 Inthe Scans window in the Edit Scan column click the edit icon next to the custom scan that you want to modify 4 Inthe Edit Scan window on the Scan Items tab select the items that you want to scan See Selecting the scan items on page 142 5 On the Scan Schedule tab set the frequency and time at which you want to perform the scan See Scheduling a scan on page 146 6 Onthe Scan Options tab configure the scan options as required See Configuring the scan options on page 143 7 Click Save Running a custom scan When you run a custom scan you do not have to redefine what you want to scan You can run a custom scan from the Scans window Protecting your files and data 145 About the Norton Internet Security scans To run a custom scan 1 Inthe Norton Internet Security main window click Scan Now 2 Inthe Computer Scan pane click Custom Scan 3 Inthe Scans window click Run next to the custom scan that you want to run You can use the following options to suspend a custom scan Suspends a custom scan temporarily Click Resume to continue the scan Terminates a custom scan Clic
380. rt Web Site option in the Norton Autofix window This option takes you to the Norton Support Web site for additional online support and contact details You get the click here option in the Norton Autofix window only when you have a problem connecting to the Internet You can use the click here link to get the phone number to contact a support representative db Support offerings may vary based on the language or product If you cannot access phone support by using Norton Autofix then you can access the phone support options at the following URL 526 Finding additional solutions About Support http www norton com support Getting support by phone When you click the Get Support option in the Support drop down menu Norton Autofix performs a Quick Scan and should repair your computer problems However if the problem persists you can use the Open Support Web Site option to go to the Norton Support Web site for help by telephone email chat or forum If you have a problem connecting to the Internet you get the click here option in the Norton Autofix window You can use the click here link to get the phone number to contact a support representative Availability of support varies by region Regular telephone and Internet connection fees apply in certain countries To get support by phone if your computer is unable to connect to the Internet 1 Inthe Norton Internet Security main window click Support 2 Inthe S
381. rton Community Watch You can also review the data which Norton Community Watch collects and submits to Symantec in the Security History window About Norton Bootable Recovery Tool Norton Bootable Recovery Tool scans and removes viruses spyware and other security risks from your computer Your computer might be infected with a virus if you experience any of the following symptoms You cannot install Norton Internet Security You cannot start your computer Your computer is extremely slow Norton Bootable Recovery Tool is integrated with Windows Preinstallation Environment WinPE Therefore you can run Norton Bootable Recovery Tool only from aCD DVD or USB key You must use Norton Bootable Recovery Tool Wizard to create the Norton Bootable Recovery Tool CD DVD or USB key You cannot run Norton Bootable Recovery Tool in WinPE for more than 72 hours If you run Norton Bootable Recovery Tool for more than 72 hours your computer restarts without any notification You can use the Norton Bootable Recovery Tool CD DVD or USB key to recover a computer that is infected with viruses and other security threats This security program is not areplacement for continuous real time protection from viruses and latest security risks To protect your computer from future infections be sure to install or continue using Norton Internet Security that you already purchased 48 Getting started About Norton Bootable Recovery
382. rton AntiSpam local filters use Whitelist technique Blacklist technique and patented filtering technology to classify email messages as spam or legitimate For these filters to work efficiently Norton AntiSpam requires antispam definition updates at regular intervals through LiveUpdate These updates contain signature information of spam and legitimate email messages The updates also contain any newrule that Symantec creates to filter spam email messages Norton AntiSpam uses predefined email rules and the user defined Allowed List and Blocked List to expedite the scanning of email It accepts email messages from the list of allowed email senders and blocks email messages from the list of blocked email senders Protecting Internet activities 285 About Norton AntiSpam Norton AntiSpam also automatically imports the lists of addresses from supported email programs during the initial integration It helps you keep your list of allowed and blocked email senders in sync with your current address books When Norton AntiSpam imports the addresses from your Outlook address book or Windows address book it also imports the addresses that are available in the Safe Sender and the Blocked Sender lists db Turning off Norton AntiSpam increases your exposure to receive unsolicited email messages Always ensure that Norton AntiSpam is turned on It secures your email client from unwanted online content You can review all the antispam statistics
383. s About Security History Stop Notifying Me This action prevents Norton Internet Security from notifying you when it blocks the selected attack signature in the future This option is available in the Security History Intrusion Prevention view Notify Me This action allows Norton Internet Security to notify you when it blocks the selected attack signature in the future This option is available in the Security History Intrusion Prevention view Displays the links that provide the information that is related to the selected item For some Security History items this view lets you access the relevant settings pane of the Norton Internet Security window About the File Insight window The File Insight window provides details about any File of Interest that is available on your computer This option of file analysis is available for the files that you download scan or use to perform an activity You can access the File Insight window in different ways For example you can use the various notifications alerts scan and performance related windows and the shortcut menu of the various files that are present on your computer to open the window Monitoring protection features 427 About Security History Security History provides a centralized location where you can access the File Insight windows of the various events that are related to Security Risks Download Insight and Performance The File Insi
384. s view Restrict This action blocks access to or from the selected computer or all of the unclassified computers on the selected network This option is available in the Security History Firewall Network and Connections view Remove trust Removes the trusted status from the selected computer or from all of the unclassified computers on the selected network This option is available in the Security History Firewall Network and Connections view Remove restriction Monitoring protection features 425 About Security History This action removes the restricted status from the selected computer or from all of the unclassified computers on the selected network This option is available in the Security History Firewall Network and Connections view View Rule This action shows the firewall rule that is used to control the Internet access attempts by the selected program in the Program Control window of Norton Internet Security This option is available in the Security History Firewall Activities view Norton File Insight This action shows the details of the file that accessed the network in the File Insight window This option is available in the Security History Firewall Activities view Allow This action allows the selected program to access the Internet This option is available in the Security History Intrusion Prevention view 426 Monitoring protection feature
385. s Norton Internet Security access the Internet only to receive critical product updates virus definitions and web queries needed to protect your device No Traffic Blocks Norton Internet Security from connecting to the Internet If you choose this policy Norton Internet Security cannot receive critical virus definitions and program updates which can lead to potential dangers and virus attacks Turning off or turning on Network Cost Awareness You can set up policies to restrict the Internet usage of Norton Internet Security If you do not want to restrict the Internet usage of Norton Internet Security you can turn off Network Cost Awareness If you feel that Norton Internet Security uses too much network bandwidth you can turn on Network Cost Awareness Then you can set up policies to restrict 328 Protecting Internet activities About Network Cost Awareness the Internet usage of Norton Internet Security Norton Internet Security connects to the Internet based on the policy that you set up in the Network Cost Awareness Settings window By default Network Cost Awareness is turned on To turn off Network Cost Awareness 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Network Security Settings 4 Inthe Network Cost Awareness row move the On Off switch to the right to the Off position 5 Click Apply 6 Click OK To turn on Netw
386. s as spam or legitimate You can also use these options to empty the spam folder and to open the Settings window to configure the Norton AntiSpam settings If your email program does not have a Junk folder it also adds a Norton AntiSpam folder in the folders area You can use the Norton AntiSpam folder to sort and store spam messages However if your email client has a Norton AntiSpam folder from the previous version of Norton Internet Security Norton AntiSpam uses the Norton AntiSpam folder and not the Junk folder The following email clients do not support client integration Outlook 2010 64 bit Thunderbird Windows Mail When you classify an email message as spam or legitimate Norton AntiSpam lets you send the misclassified email message as feedback to Symantec You can use the Feedback option to send the misclassified email message to Symantec for analysis You can also import the list of addresses that are present in the supported email program into the Norton AntiSpam Allowed List and Blocked List Norton AntiSpam automatically adds the new email addresses from the address book of your supported email program once in a day when your computer is idle However if eo Protecting Internet activities 287 About Norton AntiSpam you want to manually import addresses use the Import option in the Allowed List window When you open your email client the welcome screen appears If you do not want the welcome screen to
387. s include the date on which you downloaded a file and the total number of downloads on that date You can click the file name link to view additional details about the downloaded file such as the Download Insight report file name reputation level and recommended action Indicates the optimization activities that you performed on your system over a period of the last three months Monitoring your system s performance About System Insight Provides the details about the threat detection activities that Norton Internet Security performed on your system over a period of the last three months The details include the date on which Norton Internet Security detected a threat and the total number of threats that Norton Internet Security detected on that date The View Details link provides additional details about the risk such as the risk impact and the origin of the risk The details also include the action that a threat has performed on your system and the action that Symantec recommends you to resolve the threat Provides the details about the performance alerts that Norton Internet Security displayed over a period of the last three months The details include the monitored date and the number of performance alerts generated The View Details link provides additional details about performance related activities program name program location and system resources utilizat
388. s window click the General tab 3 Inthe left pane click Silent Mode Settings Protecting your files and data 195 About the Norton Internet Security scans 4 Under Quiet Mode on Detection of in the User Specified Programs row click Configure 5 Inthe Quiet Mode Programs window select the program that you want to delete and then click Remove 6 Inthe confirmation dialog box click Yes 7 Inthe Quiet Mode Programs window click Apply and then click OK About boot time protection The boot time protection feature provides enhanced security level from the time you start your computer It ensures better security by running all the necessary components that are required for computer protection as soon as you start your computer To protect your computer during boot time you must configure the Enable Boot Time Protection option To access the Enable Boot Time Protection option go to the Norton Internet Security main window and then click Settings gt Computer gt Real Time Protection You can use the following options to configure Enable Boot Time Protection Aggressive Provides maximum protection during your computer start time This option ensures complete protection during the boot time as Auto Protect starts functioning as soon as you start your computer Normal Provides enhanced protection during your computer start time without compromising your computer s boot performance When you select this option
389. s you save and protect your logins Identity Safe provides you the following features Export Identity Safe data Move Identity Safe Online Delete Identity Safe Identity Safe Options Identity Safe Password amp Security Edit Identity Cards Edit Logins Edit Notes Import Identity Safe data Norton Internet Security protects your Internet Explorer Firefox and Chrome Web browsers with the Safe Surfing options When the options under Safe Surfing are turned on Antiphishing and Norton Safe Web analyze the security level of the Web sites that you visit It then displays the security information in the Norton Site Safety pop up window About General settings You can use General settings to schedule your product tasks and configure different Norton Internet Security settings You can access the General settings options under the General tab in the Settings window You can also configure the security settings of your product from General settings Customizing protection features 485 About customizing settings and options By using General settings you can do the following Schedule your Norton Tasks Configure the General settings of your product Monitor the performance of your system Configure the security settings Customize the Silent Mode settings 486 Customizing protection features About customizing settings and options Your options are Norton Tasks Customizing protection fe
390. se all such copies of the Software would be valid and E use the Software in accordance with any additional permitted uses which may be set forth below You may not nor may You permit any other person to A sublicense rent or lease any portion of the Software B reverse engineer decompile disassemble modify translate make any attempt to discover the source code of the Software or create derivative works from the Software C use the Software as part of a facility management timesharing service provider or service bureau arrangement or D use the Software in any manner that is not permitted pursuant to this License Agreement 2 Software and Content Updates A You shall have the right to receive new features to and versions of the Software as Symantec in its sole discretion makes such features and versions available during Your Service Period Symantec continually strives to improve the usability and performance of its products and services In order to optimize the Software and to provide You with the most current version of the Software You agree the Software may download and install new updates and versions of the Software as they are made available by Symantec in its sole discretion You agree to receive and permit Symantec to deliver such new updates and versions to Your Device Additionally Symantec may modify the terms and conditions that apply to Your use of the Software to reflect such updates an
391. se programs also steal sensitive personal information such as passwords login IDs or credit Protecting Internet activities 283 About the types of security risks card numbers These programs can then send your compromised data to other people Adware displays advertisements on your computer and collects information about your Web browsing habits It then gives this data to companies that can send you advertisements based on these preferences Tracking cookies are the small files that programs can place on your computer to track your computing activities Tracking cookies can then report that information back to a third party Some programs rely on other programs that are classified as security risks to function For example a shareware or freeware program that you download might use adware to keep its price low In this case you might want to allow the security risk program to remain on your computer Also you might need to restore the security risk program if Spyware Protection has removed it Norton Internet Security allows joke programs and other low risk items to be installed on your computer by default You can change your settings in the Settings window so that Norton Internet Security detects these security risks Checking Antispyware settings While the default settings provide maximum protection from spyware adware and other security risks these settings are customizable To check Antispyware settings 1 Inthe N
392. se the Settings option in the File Insight window to turn off the Performance Alerting option Performance alerts are not displayed when your computer is idle or in Silent Mode For each system resource such as CPU memory and hard disk there is a resource consumption threshold defined When the resource consumption of a program 88 Monitoring your system s performance About System Insight exceeds the defined threshold limit Norton Internet Security alerts you with a performance alert You can use the Resource Threshold Profile for Alerting option to configure the threshold limit To access the Resource Threshold Profile for Alerting option go to the Norton Internet Security main window and then click Settings gt General gt Performance Monitoring gt Resource Threshold Profile for Alerting You can use the Use Low Resource Profile On Battery Power option to let Norton Internet Security automatically change the resource threshold profile to low when your computer runs on battery power You can use Alert for High usage of option to configure Norton Internet Security to alert for high usage of CPU memory disk and handles In addition you can add programs to the Program Exclusions list using the Program Exclusions option When you add a program to the Program Exclusions list Norton Internet Security does not alert you when the program exceeds the defined resource consumption threshold limit You can view all the
393. security tasks that your products perform in the background Security History lets you monitor the security tasks that your product performs in the background In addition the alerts that you receive can be reviewed at any time in Security History If you cannot review an alert when you receive it you can review it later in Security History The alerts scan results and other security items that are related to various product features appear under their respective categories in the Security History window For example the security items that are related to the Quarantine feature appear under the Quarantine category In addition the Security History 406 Monitoring protection features About Security History window displays details of each item in the Details pane Based on their functionalities Security History broadly organizes all categories into the following groups All Activity Protection and Performance Submissions and Errors Informational By default the following information categories are available in the Security History window Recent History Full History Scan Results Resolved Security Risks Unresolved Security Risks Quarantine SONAR Activity Firewall Network and Connections Firewall Activities Intrusion Prevention Download Insight AntiSpam Identity Norton Product Tamper Protection Performance Alert Network Cost Awareness Sites reported to Symantec Norton Error Reporting Email Errors
394. sing the Full Report option on the Norton Site Safety pop up window You can also use the Community Buzz option on the Norton menu to view the safety status of the Web sites The Community Buzz option is available only in English language versions of Windows For each Web site that you want to know the site safety status Norton Safe Web lets you do the following View the Norton rating View the community rating Add your reviews View the user reviews View a list of keywords that are tagged to the Web site View the threat information and the general information about the Web site If you use a proxy server to connect to the Internet you must configure the Network Proxy Settings of Norton Internet Security When you search the Internet using Google Yahoo or Bing search engines Norton Safe Web displays site rating icons next to the search results As you move the mouse pointer over the Norton icon a pop up appears with site safety and shopping safety information The pop up displays brief information about the safety of the site Norton Safe Web also provides a detailed report about the safety of the Web Sites you visit You can click the icon next to the search results or the Full Report option in the Norton Site Safety pop up window to view the detailed report The report is displayed on the Norton Safe Web site Securing your sensitive data 337 About securing your sensitive data Norton Safe Web provides t
395. sions Blocked spam messages Blocked phishing Web sites Blocked Safe Web sites Quarantined items Blocked Firewall threats Total number of known threats Total number of known attacks Total number of known antiphishing sites Timestamp of last full scan Customizing protection features 513 About customizing settings and options Timestamp of last Quick Scan Timestamp when stats were published View health states of different components of your device Overall product health Computer category health Network category health Web category health Fix the following items Firewall Auto Protect Scan incoming emails Scan outgoing emails Antispyware Intrusion Prevention SONAR Antiphishing Browser Protection Perform the following tasks Resolve issues Re key Norton Internet Security Re sync license Run LiveUpdate Turning on or turning off Remote Management Remote management lets you remotely manage Norton Internet Security using Norton Management Norton One and Norton Studio app Norton Studio is a Metro App and works only on Windows 8 When you turn on Remote Management option you can view your Norton Internet Security details and fix some security issues of your device 514 Customizing protection features About customizing settings and options By default this feature is disabled unless you register your Norton Inte
396. so lets you configure the communication port that Norton products use to communicate with each other The Welcome Screen option displays the Network Security Overview window when you open Network Security Map The Proxy Server option lets you specify the automatic configuration URL proxy settings and the authentication details for firewall or proxy server In case of proxy servers Norton Internet Security uses the Network Proxy Settings to connect to the Symantec server and the Internet The following are also some activities that you can do using the Norton Security Map feature View or modify details Customizing protection features 481 About customizing settings and options related to the computers or devices that are on your network Grant or deny permissions to the networked devices to access your computer Add or Remove any device in the Network Security Map Change the trust control level for a particular Network address or an IP address 482 Customizing protection features About customizing settings and options Smart Firewall monitors communications between your computer and the other computers on the Internet It also protects your computer from common security problems You can use the Smart Firewall options to customize how the firewall monitors and responds to inbound communications and outbound communications Your options are m Advanced Settings Lets you activate adva
397. sonal data and confidential information to the hackers Norton Internet Security provides signature based solutions to protect your computer from the most common Internet attacks Attack signatures contain the information that identifies an attacker s attempt to exploit a known vulnerability in your operating system or the programs that are installed on your computer The Intrusion Prevention feature of Norton Internet Security uses an extensive list of attack signatures to detect and block suspicious network activity Vulnerability Protection lets you view the correlation between the vulnerabilities that your computer is protected against and the programs that may contain these vulnerabilities For example if Internet Explorer does not handle certain HTTP responses it can result in a vulnerability that can be exploited In this case Vulnerability Protection lists Internet Explorer as a vulnerable program It also provides details about the signatures that Intrusion Prevention uses to detect any attempt to exploit this vulnerability Protecting Internet activities 281 About Vulnerability Protection Viewing the list of vulnerable programs The Vulnerability Protection window lets you view the extensive list of programs with the known vulnerabilities that Norton Internet Security protects you against For each program you can view details such as the name of the program its vendor and the number of vulnerabilities that the pro
398. t Mode You can also manually turn off Silent Mode at any time Norton Internet Security notifies you after Silent Mode is turned off The activities that are suspended when Silent Mode is turned on run after Silent Mode is turned off Protecting your files and data 185 About the Norton Internet Security scans Turning on or turning off Silent Mode manually You can manually turn on Silent Mode for a specified duration before you perform any important task on your computer You can turn on Silent Mode for a period of one hour two hours four hours six hours or one day The Norton Internet Security icon displays the turn on status of Silent Mode in the notification area at the far right of the taskbar Norton Internet Security notifies you after Silent Mode is turned off After Silent Mode is turned off Norton Internet Security also displays alerts if it detected any security activities that occurred during the Silent Mode session You can turn on or turn off Silent Mode from the Silent Mode Settings section of the Settings window You can also turn on or turn off Silent Mode by using the Norton Internet Security icon in the notification area To turn on Silent Mode from the Settings window 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the General tab 3 Inthe left pane click Silent Mode Settings 4 Inthe Silent Mode row move the On Off switch to the left to the On position 5 In
399. t Security identifies your computer as idle You can specify the Idle Time Out for a period of one minute to 30 minutes The default duration is 10 minutes Norton Task Notification Lets you configure Norton Internet Security to show or hide the notifications that appear when automatic Norton Tasks are started Customizing protection features 489 About customizing settings and options Other Settings 490 Customizing protection features About customizing settings and options Lets you configure the miscellaneous settings Your options are Power Saving Mode Lets you save your battery power by suspending the Norton Tasks when your computer is on battery power By default this option is turned on Monthly Report Lets you view the Monthly Report for the last 30 days You can configure the Monthly Report options to remind you to view Monthly Report Special Offer Notification Lets you configure Norton Internet Security to notify you about special offers on the latest Norton products add ons and other useful information from Symantec Insight Protection Lets Norton Internet Security to perform an Insight Network scan on your computer The Insight Network scan uses the virus definitions that are available locally and hosted in the cloud Norton Internet Security provides additional protection by using the Customizing protection features 491 About customizing settings and
400. t Security scans can also let other Facebook users know the security status of any Web site However Norton Safe Web requires your permission to scan the URLs that are available on your Facebook Wall When you install the Norton Safe Web Facebook App Norton Safe Web App asks for your permission to access your Facebook Wall You can choose to allow or deny permission to let Norton Safe Web access your Facebook Wall The auto scan feature in Norton Safe Web application page helps you protect your Facebook Wall offline Norton Safe Web scans the News Feed on your Facebook Wall every day and protects you from malicious links When Norton Safe Web detects a malicious link it notifies you with a post on your Facebook Wall To activate Norton Auto Scan go to your Norton Safe Web Scan Results page on Facebook and click Enable Auto Scan The Norton Safe Web app will ask for additional permission to post in your wall when malicious links are identified while enabling this feature To remove the malicious link from your Facebook Wall go to your profile and remove the malicious link You can also click See Norton Safe Web Report to view Norton ratings and other details about this malicious link When no malicious activity is detected on your Facebook Wall Norton Safe Web posts a message notifying that your Facebook Wall is safe Norton Safe Web posts this message on your Facebook Wall once in every 30 days If you later decide to remove N
401. t infected with a worm Ignores this risk If a malicious worm is found it should be quarantined To quarantine a worm infected file 1 Inthe alert in the drop down list click Quarantine 208 Responding to security issues What to do if a security risk is found 2 After the worm has been quarantined perform the following tasks Run LiveUpdate to ensure that you have the latest definition updates See About Program and Definition Updates on page 65 Scan your computer See Running a Full System Scan on page 136 If nothing is detected submit the infected file to Symantec Security Response Also indicate that the file was detected and that you have scanned it with the latest definition updates Symantec Security Response replies to you within 48 hours About responding to risks detected during a scan At the end of a scan the Results Summary window provides the summary of the scan results You can use the Threats Detected window to resolve any items that were not automatically resolved during the scan You can use the Show drop down list that is available in the Security History window to resolve any items that were not automatically resolved during the scan The Recommended Action section in the Security History window displays the action that you should take to resolve the security threat About actions when Norton Internet Security cannot repair a file One of the common reasons that Norton
402. t pane click Intrusion Prevention 4 Under Intrusion Prevention in the Intrusion Signatures row click Configure 5 In the Intrusion Signatures window check the attack signatures that you want to include 6 Click OK Turning off or turning on AutoBlock When an attack is detected from a computer the attack is automatically blocked to ensure that your computer is safe If a different attack signature is detected from the same computer Norton Internet Security activates AutoBlock The AutoBlock feature blocks all traffic between your computer and the attacking computer for aspecific time period During this period AutoBlock also blocks the traffic that does not match an attack signature db You can specify the period for which you want Norton Internet Security to block the connections from attacking computers By default Norton Internet Security blocks all traffic between your computer and the attacking computer for a period of 30 minutes AutoBlock stops traffic between your computer and a specific computer If you want to stop all traffic to and from your computer you can use the Block All Network Traffic option If AutoBlock blocks a computer or computers that you need to access you can turn off AutoBlock 276 Protecting Internet activities About Intrusion Prevention To turn off or turn on AutoBlock 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab
403. t use the Automatic LiveUpdate option you should manually run LiveUpdate once a week In addition to the definition updates that Automatic LiveUpdate downloads the product uses streaming technology to download the latest virus definitions 70 Getting started About LiveUpdate These downloads are called Pulse Updates The Pulse Updates are lighter and faster than Automatic LiveUpdate It keeps your computer secure from the ongoing threats on the World Wide Web When Pulse Updates are enabled LiveUpdate checks for definition updates every few minutes and downloads the streamed virus definitions The Pulse Updates protect your computer from the latest security threats without compromising your system performance Even if you turn off Pulse Updates LiveUpdate picks all the missed streams and it updates your computer during the full definition updates Each LiveUpdate session checks if the Smart Definitions option is turned on or off and downloads and installs the updates based on the option settings To access the Smart Definitions option go to the Norton Internet Security main window and then click Settings gt Updates gt Smart Definitions By default the Smart Definitions option is turned on As Smart Definitions are only a subset of all the virus definitions you can minimize download time installation time and memory consumption However if you want all of the virus definitions to be downloaded and installed you can tur
404. ta The computer must be connected to the Internet The Identity Safe data is stored online using your Norton Account You can create only one online vault for a Norton Account db If you have Identity Safe data that is stored on any external drives from the older versions of Norton Internet Security you can convert that portable profile to local vault or online vault When you connect your external drive to your computer the Identity Safe menu in the Norton Toolbar provides option to merge or delete the Identity Safe data from your portable profile You can merge the data from the portable profile to local vault or online vault Turning off or turning on Identity Safe Identity Safe helps you manage your identity and provides additional security while you perform online transactions You can use the various features in Identity Safe to manage your personal data such as addresses date of birth and credit card information The logins cards and notes help you store and use your personal information in a secure way O After you turn on Identity Safe you must log in to Identity Safe to access the various features To turn off or turn on Identity Safe from Settings window 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Inthe Identity Safe row do one of the following To turn off Identity Safe in the Identity Safe row
405. tab 3 Inthe left pane click Identity Safe 4 Under Identity Safe in the Identity Safe Setup row click Configure 5 Set up Identity Safe 6 Inthe Identity Safe Setup Successful window do one of the following Check Import my logins from Internet Explorer to import all the logins that you saved in your Web browser Uncheck Import my logins from Internet Explorer if you do not want to import all the logins that you saved in your Web browser 7 Inthe Identity Safe Setup Successful window click Done Resetting Identity Safe There may be instances when you need to reset your Identity Safe You may need to reset your Identity Safe in the following occasions Securing your sensitive data 357 About securing your sensitive data You experience a computer failure You forget your Identity Safe password db If you forget your Identity Safe password you cannot restore it You can only reset your Identity Safe and store all your data again Norton Internet Security lets you enter an incorrect password three times If your attempts are unsuccessful Norton Internet Security provides you an option to reset your Identity Safe If you reset the Identity Safe you lose all the Identity Safe data that you stored such as your login information cards and notes To reset your Identity Safe 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane
406. tabs Lets you configure how you want Norton Internet Security to scan your computer for viruses and other security threats You can also configure Norton Internet Security to obtain regular updates for complete protection of your computer You can include additional protection to your computer by using the most recent definitions from Cloud during scans Your options are AntiVirus and SONAR Exclusions Computer Scan Real Time Protection Updates Customizing protection features 461 About customizing settings and options Network Lets you configure how you want Norton Internet Security to monitor your network activities You can protect your computer against the threats that you might receive through email attachments instant messaging program attachments You can also configure the communication port that Norton products use to communicate with each other In addition you can protect your computer against intrusion attempts and unauthorized traffic You can also configure Norton AntiSpam options to filter out unsolicited email messages Your options are Intrusion Prevention t Message Protection t Network Security Settings Smart Firewall 462 Customizing protection features About customizing settings and options Web Lets you safeguard your sensitive information and online transactions You can manage your login information such as email login credentials an
407. tails about the stability and trust level of files in your computer Monitoring your system s performance 109 About System Insight Product Maintenance Performs background maintenance tasks related to Norton Internet Security Tasks include clearing install logs and rescanning consolidated firewall rule You can also manually turn on Silent Mode for a specified duration Monitoring background jobs of Norton Internet Security The Norton Tasks window provides the details of the background tasks that Norton Internet Security performs and lets you view and monitor the background tasks Norton Internet Security runs most of the background tasks when your computer is idle Performing all background tasks when your computer is idle helps your computer to run at peak efficiency when you use your computer However you can manually start or stop a task at any time You can also specify the Idle Time Out duration After the Idle Time Out duration is reached Norton Internet Security identifies the computer as idle and run the background tasks You can use the Idle Countdown bar to confirm the idle state of your computer You can also view the CPU graph and memory graph to obtain the performance data of your computer To monitor background jobs 1 Inthe Norton Internet Security main window click Performance 2 Inthe Performance window click Norton Tasks 3 Inthe Norton Tasks window view the details of background jobs 110 Mon
408. te in Windows Vista Protecting Internet activities 317 About the Network Security Map In addition the trust level of a device is Shared in any of the following cases When the computer on the network has one or more folders or printers that are shared When the computer is Media Center compatible for example if you have Windows XP Media Center Edition Windows Vista Home Premium Windows Vista Ultimate Windows 7 Home Premium Windows 7 Professional or Windows 7 Ultimate If you use a wireless network that is not secure the default trust level of all the devices that are on the network is Protected The trust level of a device also depends on the trust level of its network When you change the trust level of anetwork Norton Internet Security assigns the same trust level to all the devices that are connected to that network However Norton Internet Security does not change the trust level of the devices that you individually trust or restrict You can modify these settings if you want to change the trust level for the following Your network Devices that are connected to the Network Security Map To change the trust level of your network 1 Inthe Norton Internet Security main window click Advanced 2 Under Network Protection click Network Security Map 3 Inthe Network Security Map window on the right side of Network Details click Edit 4 Inthe Edit Network Details window next to Trust Level cli
409. tec Customer Service 555 International Way Springfield OR 97477 U S A or visit the Support page at www symantec com ADDITIONAL TERMS AND CONDITIONS Your use of the Software is subject to the terms and conditions below in addition to those stated above Contents Chapter 1 Chapter 2 Chapter 3 Getting started ec ceeeceeeee eens 13 Activation protects YOU ccceceeeeee ees 13 About Norton Internet Security main WINGOW asics aar EA E ERR 18 About your Norton Account 0 000008 32 About Norton Management 5665 38 About Norton Community Watch 45 About Norton Bootable Recovery TOO E EE 47 About Norton Power Eraser 6 006 59 Starting Norton Internet Security from the command prompt cececeeeee ee ene 61 About the Norton Internet Security ICON jis cezenans oegeasicasasaneasesaear seman aa 61 About LiveUpdate ccc cece ec eeeeeeenes 64 About Network Proxy Settings 76 Monitoring your system s performance 0 0 cece ecccecceeeeeeeeeeeens 81 About System Insight ccccceceeeeeee 81 Protecting your files and data 125 About maintaining protection 125 About the Norton Internet Security 10 Contents Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Responding to security issues 199 What to
410. ter you open the Norton Monitoring your system s performance 119 About System Insight Insight Application Ratings window However you can use the Check Trust Now option in the File Insight window to update the trust value of a file You can also manually trust any well known files You can change the trust level of any file to User Trusted other than the files that are Norton Trusted You can determine the resource usage of a file that is available on your computer The File Insight window displays the CPU graph and the system resource usage details for the running processes The graph shows the breakdown of overall system CPU usage and the CPU usage or memory usage by the process To check the trust level of a file 1 Inthe Norton Internet Security main window click Advanced 2 Inthe window that appears in the Computer Protection pane click Application Ratings 3 Inthe Norton Insight Application Ratings window click a file for which you want to check the details 4 Inthe File Insight window view the details of the file 5 In the File Insight window click Close To check the trust level of a specific file 1 Inthe Norton Internet Security main window click Advanced 2 Inthe window that appears in the Computer Protection pane click Application Ratings 3 Inthe Norton Insight Application Ratings window click Check a Specific File 4 Browse to the location of the file for which you want to check the d
411. ternet Security You need not uninstall the product to reset your password You can use the reset settings password option in the uninstall preference window to reset your password About Computer settings The various options in the Computer tab let you configure how you want Norton Internet Security to 464 Customizing protection features About customizing settings and options scan your computer for viruses and other security threats Your options are AntiVirus and SONAR Exclusions options let you specify the items that Norton Internet Security excludes from its scans Scans and signatures are some items that you can exclude from scanning AntiVirus and SONAR Exclusions options also let you choose which categories of risks you want Norton Internet Security to detect cd AntiVirus and SONAR Exclusions reduce your level of protection and should be used only if you have a specific need Customizing protection features 465 About customizing settings and options Norton Internet Security lets you run different types of scans to detect and prevent any virus infection on your computer You can use the various Computer Scan options to select the scan type file types to scan and the scan schedule You can also specify scanning of compressed files and Microsoft Office documents You can perform a Full System Scan You can also individually scan drives folders or files The Computer Scan options also let
412. the software no longer functions nis Your product status is always active as long as your security service is active with your service provider If your security service is not active you cannot obtain updates of any kind and the software no longer functions Turning off or turning on Automatic LiveUpdate You can have LiveUpdate check for definition updates and product updates automatically on a set schedule by turning on the Automatic LiveUpdate option You can also run LiveUpdate manually when the Automatic LiveUpdate option is turned on However you must Getting started 73 About LiveUpdate run LiveUpdate manually to obtain updates if you have turned off the Automatic LiveUpdate option If you are connected to the Internet Automatic LiveUpdate downloads product updates and definition updates every hour If you have an Integrated Services Digital Network ISDN router that is set to automatically connect to your Internet service provider ISP it may incur charges each time If you do not want this setup you can turn off the automatic connection on your ISDN router or turn off the Automatic LiveUpdate option To turn off Automatic LiveUpdate 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window in the left pane click Updates 3 Inthe Automatic LiveUpdate row move the On Off switch to the right to the Off position 4 In the Settings window click Apply 5 Inthe Secu
413. the Norton Internet Security main window click Settings 2 In the Settings window click the Network tab 3 Inthe left pane click Smart Firewall 4 Under Smart Firewall in the Program Control row click Configure 5 Inthe Program Control window in the Program column select the program to which you want to add a rule 6 Click Modify You can also use the Access drop down list next to the program to modify the access level for the program Accordingly Smart Firewall modifies or creates the relevant rule for the program 7 Inthe Rules window click Add 8 Follow the instructions in the Add Rule wizard 9 Inthe Rules window click OK 10 In the Program Control window click OK Using the Add Rule Wizard The Add Rule Wizard leads you through the steps that are necessary to create firewall rules To use the Add Rule Wizard 1 Open the Add Rule Wizard by creating a General rule or a Program rule 226 Protecting Internet activities About the Smart Firewall 2 Inthe first panel of the Add Rule Wizard select the action that you want for this rule Your options are Allow communication of this type For example consider a General rule with the following criteria all inbound connections from Internet address 192 168 1 1 through port 8080 When you select Allow Smart Firewall allows all connections satisfying the criteria of this General rule Prevent communication of this type For example consider a
414. the list Protecting Internet activities 309 About the Network Security Map Shows if the device is excluded from Intrusion Prevention scan You can exclude a Full Trust device from Intrusion Prevention scan When you exclude a trusted device from Intrusion Prevention scan Norton Internet Security trusts this device and does not scan any information that is received from this device This improves the network speed of your computer and helps the trusted device to access your device quickly Setting up Remote Monitoring You can set up Remote Monitoring by allowing computers on your network to communicate with your computer db Ensure that the computers that you want to remotely monitor have a version of a Norton product that supports Remote Monitoring Norton Internet Security requires a Passkey to set up Remote Monitoring You must type the same Passkey for all the computers that you want to remotely monitor After you set up Remote Monitoring you can connect any computer to your network and enter the same Passkey Norton Internet Security automatically identifies the computer and connects it to the Network Security Map To set up Remote Monitoring 1 Inthe Norton Internet Security main window click Advanced 2 Under Network Protection click Network Security Map 310 Protecting Internet activities About the Network Security Map 3 On the left side of the Network Security M
415. the name that corresponds to the email address for easy identification Protecting Internet activities 289 About Norton AntiSpam 7 Click OK to close the Add Email Address dialog box 8 Click OK to save and close the Address Book Exclusions window To edit or delete entries in the Address Book Exclusions list 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Message Protection 4 Under AntiSpam in the Address Book Exclusions row click Configure 5 Inthe Address Book Exclusions window select the item with which you want to work 6 Do one of the following To edit an entry click Edit to open the Edit Email Address window edit the details and then click OK To delete an entry click Remove 7 Click OK to save and close the Address Book Exclusions window Identifying authorized senders If you are sure that an email address or domain is safe and do not want Norton AntiSpam to block them you can add them to the Allowed List When your computer is idle Norton AntiSpam automatically imports the address book entries and Safe Sender List entries once in a day If you have added a new supported email program you can import its address book manually to your Allowed List immediately or at any time You can also add names and domains to the Allowed List individually db Before you import the address book you can specify your Add
416. the reputation information of the excluded files 180 Protecting your files and data About the Norton Internet Security scans amp When you exclude a reputation based threat Norton Internet Security does not add the signature of the excluded threat to the Signature Exclusions window This is because the reputation based threats are excluded by hash value You can use the Clearing IDs of files that are excluded during scans option to clear the excluded reputation based threats To clear the reputation information of files that are excluded from scans In the Norton Internet Security main window click Settings gt Computer gt AntiVirus and SONAR Exclusions gt Clear file IDs excluded during scans gt Clear All Clearing IDs of files that are excluded during scans Norton Internet Security tags all trusted and favorable files with Trusted and Good trust levels When a file is tagged as Trusted or Good Norton Internet Security does not scan this file again This can improve the scan performance of Norton Internet Security on your computer However if you want Norton Internet Security to scan all the files in your computer you must clear the reputation information of the excluded files When you clear IDs of files that are excluded during scans it might take a longer time to complete scan Norton Internet Security excludes the Trusted and Good files from being scanned However if you want Norton Internet Security to s
417. ther predefined parameters and runs Idle Time Scans Some of the predefined parameters that Norton Internet Security checks are CPU idle time disk usage and type of electric current you use to operate your computer For example you set the Idle Time Out duration as 10 minutes and watch an online video for 11 minutes without any intervention In this case Idle Time Scans do not run because of the CPU intensive task db You must run your computer on alternating current AC power for Norton Internet Security to run Idle Time Scans You can view the results of the scans in any of the following locations The Scan Results category in the Security History window The Norton Tasks category in the Norton Tasks window Protecting your files and data 173 About the Norton Internet Security scans Norton Internet Security discontinues any Idle Time Scans that it started during idle time if you begin to use your computer again However it resumes the scan when your computer is idle again db You must turn off Idle Time Scans to schedule a Full System Scan However you should always keep Idle Time Scans turned on to allow Norton Internet Security to scan your computer when it becomes idle Turning off or turning on Idle Time Scans The Idle Time Scans option is automatically turned on when you install Norton Internet Security When the Idle Time Scans option is turned on Norton Internet Security detects the time whe
418. tion Scan 3 Inthe Reputation Scan pane click Custom Scan 4 Inthe Reputation Custom Scan window do one of the following Click Drive Scan select the drive that you want to scan and then click Scan Click Folder Scan select the folder that you want to scan and then click OK Click File Scan select the file that you want to scan and then click Open In the Norton Reputation Scan window you can analyze the trust level community usage resource usage and stability of the scanned items 5 If there is a file with Poor or Bad trust level under the Trust Level column click the red cross x icon 6 Inthe Quarantine File window click Quarantine this file 7 Inthe Manual Quarantine window click Add 8 Click Close 9 Inthe Norton Reputation Scan window click Close About the Reputation Scan results Norton Internet Security lets you run different Reputation Scans to detect any suspicious programs or vulnerable programs on your computer Norton Internet Security lets you manually run the following types of Reputation Scan Reputation Quick Scan Reputation Full System Scan Reputation Custom Scan 162 Protecting your files and data About the Norton Internet Security scans When you run a Reputation Quick Scan Norton Internet Security considers the Files of Interest which include running processes and loaded programs When you run a Reputation Full System Scan Norton Internet Security considers all the F
419. tivities that you performed for the last three months in the Performance window In addition Norton Internet Security notifies you with performance alerts when there is high usage of your system resources by a program or process Your options are Performance Alerting Lets you configure Norton Internet Security to detect and notify you about the increased usage of your computer resources by any program or process Norton Internet Security notifies you with the details of the program name and resources that the program uses You can set Performance Alerting to the On 496 Customizing protection features About customizing settings and options Log Only or the Off mode The Details amp Settings link in the notification alert lets you view additional details about the resource consumption by the program in the File Insight window Resource Threshold Profile for Alerting Lets you configure the resource threshold profile for displaying performance alerts Use Low Resource Profile On Battery Power Lets you configure Norton Internet Security to change the resource threshold to low profile when your computer runs on battery power Customizing protection features 497 About customizing settings and options of Alert for High Usage CPU When this option is turned on Norton Internet Security detects and notifies you with the details of increased usage of the CPU resource by
420. to install and uninstall the Software on a Device to not more than a finite number of times for a finite number of Devices This License Agreement and the Software containing enforcement technology may require activation as further set out in the Documentation If so the Software will only operate for a finite period of time prior to Software activation by You During activation You may be required to provide Your unique activation code accompanying the Software and Device configuration in the form of an alphanumeric code over the Internet to verify the authenticity of the Software If You do not complete the activation within the finite period of time set forth in the Documentation or as prompted by the Software the Software will cease to function until activation is complete at which time the Software functionality will be restored In the event that You are not able to activate the Software over the Internet or through any other method specified during the activation process You may contact Symantec Customer Support using the information provided by Symantec during activation or as set out below 5 Technical Support In connection with Your use of the Software You may choose to access certain technical support features that may be offered from within the Software which may include live chat with a technical support agent and or assistance from a technical support agent via remote computer access any such technical support
421. to the Inbox When you reclassify an email message as legitimate Norton Internet Security provides you the option to send the misclassified email message as feedback to Symantec This option appears only if the Feedback option in the Message Protection section of the Settings window is set as Ask Me The Message Protection section is available in the Network tab When you reclassify an email message as legitimate Norton Internet Security displays a message whether or not to add the sender s email address to the Allowed List This message appears depending on the option that you select in the drop down list present at the bottom of the Allowed List window Protecting Internet activities 295 About Norton AntiSpam Empty Removes all email that has been placed in the Spam Junk folder or the Norton AntiSpam folder Folder Open Displays the Message Protection section of the Norton Settings window AntiSpam The Message Protection section is available in the Network tab Setting the Feedback option Email messages in the email client might sometimes get wrongly classified as spam or legitimate The Feedback option lets you send the misclassified email message as feedback to Symantec for analysis The Feedback option is available only when Microsoft Outlook or Outlook Express is installed on your computer To set the Feedback option 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settin
422. ton Internet Security considers the Files of Interest that related to loaded programs and the running processes 158 Protecting your files and data About the Norton Internet Security scans Full System Scan Scans all the Files of Interest that are available on your computer When you perform a Full System Scan Norton Internet Security searches for Files of Interest on all the locations on your computer The locations include all drives running processes loaded programs and startup files Custom Scan Scans a specific file folder drive or removable drive When you perform a custom scan Norton Internet Security considers only the filtered reputation files Symantec rates a file based on the statistical evaluation that is done on the file using the Norton Community Watch data and Symantec s analysis Symantec assigns the following confidence levels to reputation files Trusted Symantec has a high indication that the file is trusted Good Symantec has a high indication that the file is trusted Unknown Symantec does not have enough information about the file to assign a trust level to the file The file is neither safe nor unsafe Protecting your files and data 159 About the Norton Internet Security scans Poor Symantec has a few indications that the file is not trusted This file is suspicious and can harm your computer Bad Symantec has a high indication that the file is not trusted T
423. ton Internet Security gt Norton Recovery Tools In Windows 8 on the Start screen click Norton Recovery Tools Follow the on screen instructions To download the Norton Bootable Recovery Tool Wizard from the Internet 1 2 Open your Web browser and go to the following URL http www norton com recoverytool Follow the on screen instructions To download the Norton Bootable Recovery Tool Wizard from Norton Internet Security 1 In the Norton Internet Security main window click Scan Now In the Computer Scan pane do one of the following Click Quick Scan Click Full System Scan At the bottom of the scan window next to If you think there are still risks click click here In the Norton Rescue Tools Web page click Download Norton Bootable Recovery Tool Follow the on screen instructions Getting started 51 About Norton Bootable Recovery Tool About locating your Norton Product Key or activation PIN To use Norton Bootable Recovery Tool you must start the computer from any of the following recovery media and then provide your Norton Product Key or the activation PIN when prompted Norton Bootable Recovery Tool CD or DVD Norton Bootable Recovery Tool USB key If you already installed and activated any one of the following Norton product on your computer you do not have to enter the Product Key for Norton Bootable Recovery Tool Norton Internet Security 2010 or later Norton AntiVirus
424. ton Internet Security suppresses most of the alerts and suspends the background activities The only activities that run are those that protect your computer from viruses and other security threats Quiet Mode on Detection of IMAPI 2 0 Disk Burn When you use the Media Center application to burn a CD or DVD Norton Internet Security detects the activity and automatically 504 Customizing protection features About customizing settings and options turns on Quiet Mode When Quiet Mode is turned on Norton Internet Security suppresses the background activities but continues to display alerts and notifications Media Center TV Recording When you use the Media Center application to record a TV program Norton Internet Security detects the activity and automatically turns on Quiet Mode When Quiet Mode is turned on Norton Internet Security suppresses the background activities but continues to display alerts and notifications Customizing protection features 505 About customizing settings and options User Specified Programs When you run an application that is listed in the User Specified Programs list Norton Internet Security detects the activity and automatically turns on Quiet Mode When Quiet Mode is turned on Norton Internet Security suppresses the background activities but continues to display alerts and notifications You can configure the list of programs for whic
425. ton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 3 Inthe left pane click Message Protection 4 Under AntiSpam in the Allowed List row click Configure 5 Inthe Allowed List window select the item that you want to edit or delete 6 Do one of the following To edit an entry click Edit to open the Edit Email Address dialog box edit the details and click OK To delete an entry click Remove When you delete an entry that was imported Norton AntiSpam automatically adds it to the Address Book Exclusions list 7 Inthe Allowed List window click Apply 8 Click OK Identifying senders of spam If you do not want to receive any email messages from a specific address or domain you can add it to the Blocked List Norton AntiSpam marks all email messages from this address or domain as spam db Norton AntiSpam also automatically imports the lists of addresses that are available in the Blocked Sender lists of your email program into the Blocked List during the initial client integration or address book import Norton AntiSpam lets you type invalid email addresses to the Blocked List O Always add suspicious email addresses and domains to the Blocked List so that you do not receive unsolicited email messages from such addresses or domains 292 Protecting Internet activities About Norton AntiSpam To import addresses to the Blocked List 1 In the Norton Internet Securit
426. ts you remove a selected program from Program Control Lets you change the description for the selected program In this case the file name does not change About Smart Firewall Trust Control settings You can use the Smart Firewall Trust Control settings to view the devices on the network to which your computer is connected This feature also lets you do the following Select the networks or computers you can trust at certain levels of access Select the networks or computers you want to completely restrict from directly accessing your computer When you select Trust Control the Network Security Map window appears Some of the activities that you can do in this window are the following 242 Protecting Internet activities About the Smart Firewall View the details of the devices that are present in the network Monitor the connection status of the devices that are present in the network View the security status of your network connection View the security status of each computer that you remotely monitor View the Trust Control status of all the devices that are on your Network Security Map About Smart Firewall Advanced Settings Smart Firewall Advanced Settings let you activate advanced protection features of Smart Firewall Your options are Determines how the Smart Firewall controls incoming network traffic and outgoing network traffic Determines how the Smart Firewall handl
427. ty main window click Account 2 Inthe Web page that appears type your email address and password and click Sign In About Norton Management Norton Management lets you manage all of your Norton products and Norton product keys from one location You can add your devices such as personal computers and laptops to Norton Management and remotely install and manage your Norton products on the device You can view the security status of each of your devices and resolve the security issues by using the Norton Management Web site from any location around the world The Norton Management agent must be installed on each device that you want to manage in Norton Management Norton Management uses the Norton Management agent to install and uninstall Norton products on your devices and to resolve the security issues on your device remotely After you install the Norton Management agent on a device it can be managed remotely using the Web site You can do the following using Norton Management Add a device to Norton Management Install a Norton product on a device View Norton products that are installed on a device View the security status of a device Fix security issues on a device Purchase a new Norton product key Renew your Norton product subscription Remove a device from Norton Management Getting started 39 About Norton Management Activate your product using another product key Upgrade your Norton products
428. u can prevent your sensitive Identity Safe data on your computer from being misused A local vault is specific to each of the Windows user accounts present on your computer Provides you the ease of carrying and using your Identity Safe data when you are on the move By saving your data using an online vault you can access your sensitive Identity Safe data from any computer that has Norton Internet Security installed Norton Internet Security adds the Norton Toolbar to the Internet Explorer Firefox or Chrome Web browsers The Norton Toolbar has the following components Norton menu Norton Safe Search Share Safe Web indicator Vault Open Vault Closed menu Login Assistant When you have cards or logins in Identity Safe the Vault Open menu displays the list of cards and logins Norton Internet Security supports latest versions of Google Chrome and Firefox If you turn off Identity Safe you cannot access your logins and Identity Safe features from the Norton Toolbar Norton Internet Security lets you access all the Identity Safe features from your browser s toolbar even after 346 Securing your sensitive data About securing your sensitive data the product expires This way you can still view or manage your login details even after Norton Internet Security expires However it is not safe to browse the Internet after Norton Internet Security expires as you are vulnerable to online thefts and phishing attacks
429. u can click a process that is available in the list to get more information about the process in the File Insight window The Memory tab displays a graph that represents overall memory usage and Norton specific memory usage You can select any of the Zoom options to obtain magnified view or historical data of the graphs To view the details of Norton specific jobs that are currently running in the background Monitoring your system s performance 83 About System Insight The Norton Tasks window provides the details such as the timestamp the duration and the status of the background jobs The details also include the type of power the job needs to run and if a job ran during idle time You can select different power sources for the background jobs You can also start or stop a background job at any time To view the details of the Files of Interest The Norton Insight Application Ratings window provides details on the trust level prevalence resource usage and stability ratings for the Files of Interest You can use the Performance Monitoring option to monitor the performance of your computer To access the Performance Monitoring option go to the Norton Internet Security main window click Settings gt General gt Performance Monitoring gt Performance Monitoring Accessing the Performance window System Insight provides you a centralized location where you can view and monitor your system activities System Insight
430. und activities but does not suppress alerts and notifications You can also add or remove a running program to the Quiet Mode Programs list Turning off or turning on the Quiet Mode options You can turn off or turn on the Quiet Mode options such as IMAPI 2 0 Disk Burn and Media Center TV Recording in the Settings window By default the Quiet Mode options are turned on If you perform a task for an option that you turned on Norton Internet Security detects the task and automatically turns on Silent Mode For example you turn on the IMAPI 2 0 Disk Burn option and start burning a disk using a Media Center application In this case Norton Internet Security detects the disk burning session and turns on Quiet Mode Norton Internet Security turns on Quiet Mode as soon as you start recording a TV program or burning a CD or a DVD Once Quiet Mode is turned on it turns off 192 Protecting your files and data About the Norton Internet Security scans only after the TV program recording session or disk burning session is complete You cannot turn off Quiet Mode during the sessions by using the options in the Settings window To turn off or turn on IMAPI 2 0 Disk Burn 1 5 6 In the Norton Internet Security main window click Settings In the Settings window click the General tab In the left pane click Silent Mode Settings In the Silent Mode Settings under Quiet Mode on Detection of do one of the following
431. under the AntiSpam category in the Security History window About Norton AntiSpam settings With the increase in usage of email many users receive a number of unwanted and unsolicited commercial email messages that are known as spam Not only does spam make it difficult to identify valid email messages but some spam contains offensive messages and images Norton AntiSpam incorporates several powerful features to reduce your exposure to unwanted online content Norton AntiSpam settings help you configure the following The email client with which Norton AntiSpam should integrate The list of allowed email senders The list of blocked email senders The email addresses and domains that Norton AntiSpam should not import into the list of allowed and blocked email senders The option to send feedback to Symantec about misclassified email 286 Protecting Internet activities About Norton AntiSpam The option to filter email messages through Web Query to maintain high spam detection efficiency Configuring Client Integration The Client Integration window lists the supported email programs or clients that are installed on your computer and their associated address books When you select an email program Norton Internet Security adds a Norton AntiSpam drop down list or a few options to the toolbar of the supported email program You can use the Norton AntiSpam drop down list or the options to classify the email message
432. unning processes to which the user has access Consequently when you run a Full System Scan with administrator privileges it scans more files than when you run it without administrator privileges You can also minimize and run a Full System Scan in the background To run a Full System Scan 1 Inthe Norton Internet Security main window click Scan Now Protecting your files and data 137 About the Norton Internet Security scans 2 Inthe Computer Scan pane click Full System Scan You can use the following options to suspend a Full System Scan Suspends a Full System Scan temporarily Click Resume to continue the scan Terminates a Full System Scan Click Yes to confirm 3 On the Results Summary window do one of the following Ifno items require attention click Finish If any items require attention review the risks on the Threats Detected window Running a Quick Scan Quick Scan is a fast scan of the areas of your computer that the viruses and other security risks often target Because this scan does not scan your entire computer it takes less time to run than a Full System Scan When the Insight Protection option is turned on Norton Internet Security simultaneously performs a traditional Quick Scan and an Insight Network Quick Scan By default the Insight Protection option is turned on To run a Quick Scan 1 Inthe Norton Internet Security main window click Scan Now 138 Prot
433. unt You can print the product key to reinstall your product in the future To activate your product from the alert 1 Inthe alert do one of the following If you purchased a subscription version of a retail product or the product came installed on your computer select Activate Now Recommended If you want to renew the subscription of your product select Renew Now You can also activate or renew the subscription of your product from any non admin user account 2 Click OK 3 Follow the on screen instructions to activate or renew your product 4 Inthe window that appears click Done To activate your product from the main window 1 Inthe Norton Internet Security main window do one of the following If you purchased a subscription version of a retail product click Activate Now If the product came installed on your computer click Activate Online Now If you want to renew the subscription of your product click Renew You can also activate or renew the subscription of your product from any non admin user account 2 Follow the on screen instructions to activate or subscribe your product 3 Inthe window that appears click Done 16 Getting started Activation protects you Where to find your product key The product key is a unique key that helps you to install and activate the Symantec product on your computer The product key is a 25 character alphanumeric string that is shown in five groups of five
434. upport drop down menu click Get Support 3 Follow the on screen instructions 4 Inthe Norton Autofix window click the click here link 5 Inthe Norton Autofix window under Support Contact Numbers select the region and then the location You can use the phone number to contact a support representative To get support by phone if your computer is connected to the Internet 1 Inthe Norton Internet Security main window click Support 2 Inthe Support drop down menu click Get Support 3 After Norton Autofix scans click the Open Support Web Site link The Norton Support Web page appears Finding additional solutions 527 About Support 4 Click the Contact Us option at the bottom of the Web page and follow the on screen instructions Support policy Symantec recommends that you have the latest version of the product as it contains new and enhanced features for better protection against security threats Current help and support for your Norton product can be found at the following URL www norton com support Symantec reserves the right to change its support policies at any time without notice You can view the latest version of the support policy at the following URL www symantec com supportpolicy About keeping your subscription current Subscription period lengths vary by Symantec product To maintain uninterrupted protection you must keep your subscription up to date If you do not renew your subscription you
435. ur Web browser After you download you can scan your computer with Norton Power Eraser to remove security threats To download and access Norton Power Erase 1 Open your Web browser and go the following URL http security symantec com nbrt npe aspx 60 Getting started About Norton Power Eraser In the page that appears click Download Norton Power Eraser Save the NPE exe file to your Desktop Double click the NPE exe file on your Desktop Read the license agreement and then click Accept Scanning your computer with Norton Power Eraser You can scan your computer with Norton Power Eraser to remove threats even if you have a Symantec security product If you cannot start your computer in Normal mode you can run Norton Power Eraser in Safe mode To scan your computer with Norton Power Eraser 1 2 Double click the NPE icon on your desktop Read the End User License Agreement and click Accept In the Norton Power Eraser window click Scan for Risks In the window that appears click Restart Norton Power Eraser restarts your computer and starts the system scan after you log back in to your computer By default Norton Power Eraser performs a Rootkit scan and requires a system restart If Norton Power Eraser finds some issues or risks you may need to follow the on screen instructions to resolve the issues Scanning your computer may take several minutes The scan progress screen displays the items being scanned
436. ur computer the next time you start your computer Norton Internet Security delays the start of the delayed programs by five minutes The first delayed program in the Startup Manager window starts five minutes after you start your computer Every subsequent delayed program starts with a further delay of 10 seconds When you uninstall or if your Norton Internet Security expires the programs that you had added to the Startup Manager are reset to their default startup setting Sometimes you may see some startup programs missing from the startup list Norton Internet Security removes a startup program from the list for the following reasons When you disable a program that has a startup setting Monitoring your system s performance 99 About System Insight When you update a program that can possibly reset all startup settings to default When you use another program to manage your startup programs When you edit the registry keys manually db To adda startup item you can open your Startup folder that is available in your Windows Start menu and add programs as required For more information on adding programs in Windows Startup go to Microsoft Technical Support Web site or Windows online Help Disabling or enabling startup items Whenever you start your computer there are some programs that automatically start and run in parallel These programs are called startup items The startup items increase the start time of y
437. ur sensitive data 373 About securing your sensitive data 7 Inthe Update URL window in the Enter the new URL here box type the new URL Ensure that the URL you modify is valid and is prefixed with HTTP or HTTPS 8 Click OK 9 Inthe Edit Logins window click Close Changing the user name and password Identity Safe lets you change the user name and password for the logins that you have saved in the Edit Logins window The updated information is automatically filled the next time you visit that Web page To change the user name 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Under Identity Safe in the Edit Logins row click Configure 5 Inthe Edit Logins window under Logins select the Web site name for which you want to change the user name 6 Under Details next to Username box click Change 7 Inthe Username dialog box in the Enter new username box type the new user name 8 Click OK 9 Inthe Edit Logins window click Close To change the password 1 Inthe Norton Internet Security main window click Settings 2 In the Settings window click the Web tab 3 Inthe left pane click Identity Safe 4 Under Identity Safe in the Edit Logins row click Configure 374 Securing your sensitive data About securing your sensitive data 5 Inthe Edit Logins window under Logins select the Web site name for wh
438. urity automatically protects these default ports Adding POP3 and SMTP ports to Protected Ports Norton Internet Security supports all email programs that use POP3 and SMTP communication protocols with default ports However if your email program is not configured with the default ports you can manually configure your POP3 and SMTP email ports To ensure email protection the POP3 and SMTP port numbers must be protected If the POP3 and SMTP port numbers are not the default ports Symantec recommends that you add the port numbers to the Protected Ports window To add POP3 and SMTP ports to Protected Ports 1 Inthe Norton Internet Security main window click Settings 2 Inthe Settings window click the Network tab 300 Protecting Internet activities About configuring POP3 and SMTP ports 3 Inthe left pane click Message Protection 4 Inthe Protected Ports Settings row click Configure 5 Inthe Protected Ports window click Add 6 Inthe Add Port to protect window in the Port Type drop down list do one of the following To add the incoming email port click POP3 To add the outgoing email port click SMTP 7 Inthe Port box type the port number The port number must be between 1 and 65535 8 Click OK 9 Inthe Protected Ports window click Apply and then click OK 10 In the Settings window click OK Removing an email port from Protected Ports If you do not want Norton Internet Security to protect a
439. usion Prevention protects your computer against most common Internet attacks For more information about the attacks that Intrusion Prevention blocks go to the following URL http www symantec com business security_response attacksignatures If the information matches an attack signature Intrusion Prevention automatically discards the packet and breaks the connection with the computer that sent the data This action protects your computer from being affected in any way Intrusion Prevention scanning of every request from all the devices that access your computer increases the scan time which slows down the network speed of your computer You can reduce the scan time and improve the network speed of your computer by excluding the trusted devices from Intrusion Prevention scanning Protecting Internet activities 273 About Intrusion Prevention If you are sure that a device on your network is safe you use the Edit Device Trust Level window to change the trust level of the device to Full Trust You can then select the Exclude from IPS scanning option to exclude these trusted devices from Intrusion Prevention scan Intrusion Prevention relies on an extensive list of attack signatures to detect and block suspicious network activity Norton Internet Security runs LiveUpdate automatically to keep your list of attack signatures up to date If you do not use Automatic LiveUpdate you should manually run LiveUpdate once a week Turni
440. ut Norton AntiSpam approach to filter spam email messages from legitimate email messages The email messages that you receive in your email program undergo scanning through different local filters of Norton AntiSpam The local filters use Whitelist technique Blacklist technique and patented filtering technology to classify email messages as legitimate or spam If the local filters classify an email message as spam Norton AntiSpam changes the subject of the email message Norton AntiSpam then sends the email message to your email client If the local filters fail to classify the email message as spam Norton AntiSpam collects information such as signature and URL hashes of the email message Norton AntiSpam then sends this information to the Web Query filter for additional analysis The Web Query filter analyzes the signature and URL hashes of the email message and then sends the analysis report to Norton AntiSpam If the email message is identified as spam Norton AntiSpam alters the subject of the email message and sends it to your email program Based on predefined email rules the email program then moves the email message to the Junk folder or the Norton AntiSpam folder Symantec recommends that you keep the Web Query option turned on Turning off the Web Query option increases your exposure to the spam email messages that contain phishing or spam URLs Turning off or turning on Web Query Norton AntiSpam uses local filters to i
441. ut installing configuring and troubleshooting errors Norton Support Web site contains answers to the most common customer questions You can find the latest product manual knowledge base articles and virus removal tools Norton Support Web site contains problem solving articles that are presented in an easy step by step format The articles are categorized and listed on the left side of the Web page Using the categories you can browse through the available support topics You can Finding additional solutions 525 About Support also use the Search Support box to find solution using a keyword Norton Support Web site also contains useful links to the product manual the Norton Account the Norton Forum and the spyware help under Additional Resources To use the Norton Support Web site 1 Inthe Norton Internet Security main window click Support 2 Inthe Support drop down menu click Get Support 3 Follow the on screen instructions 4 Inthe Norton Autofix window click Open Support Web Site The Norton Support Web page appears 5 Follow the on screen instructions About phone support Norton Autofix offers a range of technical support and customer service options When you click the Get Support option in the Support drop down menu Norton Autofix performs a Quick Scan and repairs problems without your intervention If the problem persists and you have an active Internet connection you can use the Open Suppo
442. ve data appears on the top left corner of the Login Assistant window Identity Safe automatically detects login fields which are not auto filled or filled incorrect by Identity safe in the Web pages and displays the Need Assistance menu bar in your browser The Need Assistance menu bar will let you use the saved login credentials If you want manually enter the details from your Identity Safe data you can click Copy option to copy and paste the information You need to validate your vault password for managing the login credentials in the Login Assistant window if you have selected Require Identity Safe password before filling option in the Edit Logins window Saving logins If you do not want your logins to be saved automatically you can use the following option in the Browsing Option window Yes Save Automatically No Never Save any logins Ask before saving By default Yes Save Automatically option is set After Identity Safe saves a login it automatically fills the login details next time you visit the Web site You must be logged in to Identity Safe to save and use autofill passwords If the password or user name field is blank Identity Safe does not prompt you to save the login Identity Safe lets you access all the login features that you saved for a Web site even after the product expires To save a login 1 Goto the Web site for which you want to save your login 368 Securing your sensitive
443. ve saved in Identity Safe Some Web sites have forms to fill or require login information You can use the Vault Open Vault Closed menu to fill the details in those Web sites The Vault Open Vault Closed menu displays the list of all logins and cards that you saved You can select a login from the list and a use it to log in to the Web site You can also select a card from the list and use to fill forms You can access all the Identity Safe options from the Vault Open Vault Closed menu You should be logged in to any of the Identity Safe vault to access the Vault Open Vault Closed menu Lets you view and copy the logins or cards that you saved in your Identity Safe vault You can select the desired login or card from the drop down menu to fill in the Web site amp You must enable Show Fill Form Assistant option under the Vault Open menu on the Norton Toolbar In Google Chrome Web browser the Norton Toolbar can be accessed as a Chrome Extension In the Extensions page of the Chrome browser you can enable 393 394 Securing your sensitive data About securing your sensitive data or disable the Norton Toolbar and uninstall the Norton Toolbar from your Chrome browser If the Norton Toolbar is enabled you can access the following options Allow in incognito Lets you browse internet in stealth mode without storing data of your browsing session in browsing or download histories Allow access to file
444. version of the product 1 Inthe Norton Internet Security main window click Support 2 Inthe Support drop down menu click New Version Check This option is available only if your product is activated The Web page that appears displays whether a new version of the product is available or not 3 Follow the on screen instructions to download the new product About Norton Autofix Norton Autofix provides additional product support with one click access from the Norton Internet Security main window Norton Autofix performs a Quick Scan of your computer and repairs problems without your intervention If the problem persists you can use the Open Support Web Site option to go to the Norton Support Web site for help using our online forum chat email or telephone In addition the Norton Support Web site provides access to the knowledge base articles By using these articles you can easily find solutions to your technical problems The support technicians can help you solve more complex problems by using remote assistance technology The remote assistance technology allows Symantec support technicians to access your computer as remote users so that they can perform maintenance or service db Support offerings can vary based on the language or product 520 Finding additional solutions About Norton Autofix When you click the Get Support option in the Support drop down menu Norton Internet Security checks your Internet conn
445. w the Norton Insight Application Ratings window and improve the performance of Norton Internet Security scans In addition you can run LiveUpdate It also displays the updates availability as to when the last virus definitions were updated Network Protection Provides you the essential network protection options It also contains links to the list of vulnerable programs and Network Security Map Web Protection Provides you the essential Web protection options It also contains links to managing logins and credit cards In addition you can monitor and manage the computer usage and Internet activities of your child amp The parental control feature is not available in some of the versions of Norton Internet Security 30 Getting started About Norton Internet Security main window You can view the different protection features on the right side of the window You can move your mouse pointer over each feature to view a brief summary about the feature You can also choose to ignore or monitor the protection status of a feature You can choose to turn on or turn off the protection features from this window Responding to System Status indicators Norton Internet Security displays the overall protection status of your computer under the Secure section of the main window When the system status needs attention or is at risk you can take appropriate action to improve the System Status Your computer protection is
446. wing Find help with your product download product subscription product activation product installation and other issues Find and download the latest product manual Manage your products and services using Norton Account Search Norton Forum to find the additional product help about installing configuring and troubleshooting errors You can also post your questions in the forum and get answers from experts To post your questions you need to first register for Norton Forum Find information about the latest virus threats and removal tools db Availability of support varies by region language or product For additional support go to the following URL http www norton com support In addition to the self help options you can use the Contact Us option at the bottom of the Web page to 524 Finding additional solutions About Support contact the technical support team in the following ways Live Chat Email Phone Norton Forums Using the Norton Support Web site Chat in real time with a support representative For more complex technical issues chat offers the option to allow a support representative to connect remotely to your computer and resolve your problem Submit your question on our Web site and receive a response by email Email support has a slower response time than chat or phone Speak to a support representative in real time Search for additional product help abo
447. y Safe password with every online form before it autofills any login You can specify that individual logins require your Identity Safe password before autofill occurs Automatically log out of Identity Safe if it is inactive for Automatically logs you out of Identity Safe when do not use your Identity Safe for a specified time Securing your sensitive data 389 About securing your sensitive data period You can specify the idle time out period as 15 30 or 45 minutes Use this option if other people have access to your computer Ask for my password after sleep or hibernation Prompts you for your Identity Safe password when your system restores from suspended state This option prevents misuse of your Identity Safe data by validating your Identity Safe password each time your system restores from suspended state amp Norton Internet Security prompts you to enter your Identity Safe password only if you had logged into your Identity Safe vault when the system moved to the suspended state You must validate your Identity Safe password each time you change the security level of the vault to a setting that is less secure than the current security level 390 Securing your sensitive data About securing your sensitive data Changing the Identity Safe password You should change your Identity Safe Password regularly to prevent unauthorized access to your personal information in Ident
448. y in the Security History window Monitoring your system s performance 87 About System Insight To view details of your system activities 1 Inthe Norton Internet Security main window click Performance 2 Inthe Performance window at the top of the Events graph click the tab for a month to view the details 3 Inthe Events graph move the mouse pointer over the icon or the stripe for an activity 4 Inthe pop up that appears view the details of the activity 5 Ifthe View Details option appears in the pop up click View Details to view additional details in the Security History window About performance alerting Norton Internet Security monitors your system performance If it detects an increased usage of system resources by any program or process it notifies you with performance alerts Performance alerting works only when the Performance Monitoring option and Performance Alerting option are turned on Performance alerting notifies you with information about the program name and resources that the program uses excessively The Details amp Settings link in the performance notification alert lets you view additional details about the resource consumption by the program The File Insight window opens and displays the details of the file the origin of the file the process ID and the complete resource usage list of the program From the File Insight window you can choose to exclude the program from being monitored You can u
449. y 72 checking 70 obtaining 75 Pulse Updates 75 summary 65 upgrading new version 516 User Specified Programs about 193 adding programs 193 Quiet Mode 193 removing programs 194 V Vault accessing 399 version number checking 515 virus protection about 443 system scans 136 updates 443 viruses automatic protection 443 descriptions 443 unknown 443 Vulnerability Protection about 280 281 viewing programs 281 W Web pages launching 371 protection 332 reporting 334 Web Query about 296 turning off 297 turning on 297 Web Settings about 482 wireless network viewing status 323 Worm Blocking threats found by 206 worms found by Worm Blocking 206 in email messages 206 Index 547 Norton from Symantec products protect consumers from traditional threats with antivirus antispam and Spyware Protection They also protect against bots drive by downloads and identity theft and are light on system resources In addition Symantec provides services such as online backup and PC Tuneup and is a trusted source for family online safety For more information please click one of the following links Antivirus Antispam Spyware Protection Online Backup Copyright 2012 Symantec Corporation All rights reserved Symantec Norton and the Norton Logo are trademarks or registered trademarks of Symantec Corporation and its affiliates in the U S and other countries Other names may be trademarks of their respective owners
450. y changing the order in which it appears in the list Only advanced users or novice users at the direction of technical support should perform this action See Changing the order of firewall rules on page 235 About Program rules Program rules control network access for the programs that are on your computer You can use the Program Control feature to create and modify rules for programs 218 Protecting Internet activities About the Smart Firewall The Program Control window displays a list of programs In this window you can do the following Adda program Rename a program Modify the rules for a program Add a rule for a program Modify the access settings of a program rule Modify the priority of rules for a program by changing the sequence of rules in the list Remove a program rule Remove a program View the trust level of a program You can create Program rules in the following ways Lets the firewall automatically configure access for programs the first time that users run them This method is the easiest way to create firewall rules Manages the list of programs that can access the Internet Protecting Internet activities 219 About the Smart Firewall Lets the firewall notify you when a program attempts to access the Internet You can then allow or block Internet access for the program In some instances such as when you watch a movie you
451. y main window click Settings In the Settings window click the Network tab In the left pane click Message Protection Under AntiSpam in the Allowed List row click Configure In the Allowed List window click Import In the Allowed List window click Apply Click OK To add entries to the Blocked List 1 In the Norton Internet Security main window click Settings In the Settings window click the Network tab In the left pane click Message Protection Under AntiSpam in the Blocked List row click Configure In the Blocked List window click Add 6 Inthe Add Email Address dialog box in the 8 9 Address Type drop down list select the address type You can select one of the following Email Domain Do one of the following To add an email address type the email address that you want to block and the name of the sender To adda domain enter the address of the domain for example symantec com and the name of the domain Click OK In the Blocked List window click Apply 10 Click OK Protecting Internet activities 293 About Norton AntiSpam To edit or delete entries in the Blocked List 1 In the Norton Internet Security main window click Settings In the Settings window click the Network tab In the left pane click Message Protection 4 Under AntiSpam in the Blocked List row click 7 8 Configure In the Blocked List window select the item with which you wa
452. y not be available with some versions of Norton Internet Security In such case you may not be able to access the Norton Online Family options About turning off automatic features Your Symantec product is set by default to provide complete protection for your computer Many of these settings include the automatic features that provide continuous protection Under certain circumstances you might need to turn off an automatic feature to complete a task db When you have completed the task for which you turned off the automatic feature make sure that you turn the feature on again See Turning off Auto Protect temporarily and turning it on again on page 452 See Turning off or turning on spam filtering on page 453 Turning off Auto Protect temporarily and turning it on again If you have not changed the default option settings Auto Protect loads when you start your computer Auto Protect also guards against viruses Trojan horses worms and other malicious threats It checks programs for viruses when programs run and monitors your computer It also checks the removable media for any activity that might indicate the presence of a virus When Auto Protect detects a virus or virus like activity it alerts you Customizing protection features 453 About turning off automatic features In some cases Auto Protect might warn you about a virus like activity that you know are not the work of a virus If you perf
453. y scans 4 Inthe Insight Protection row do one of the following To turn off Insight Protection move the On Off switch to the right to the Off position To turn on Insight Protection move the On Off switch to the left to the On position 5 In the Settings window click Apply About Reputation Scan Reputation Scan provides information on the trust worthiness of all programs and processes running on your computer It helps you detect the files that are suspicious or vulnerable on your computer using the reputation based threat detection Reputation based threat detection maintains information of every file submitted by millions of other Norton users The information include trust level community usage stability etc During reputation scan reputation based threat detection uses this information to detect suspicious or vulnerable files on your computer Norton Internet Security lets you run different types of Reputation Scan and detect suspicious programs on your computer Reputation Scan filters the files on the basis of certain filtering criteria and performs an Insight Network Scan on the filtered files Reputation Scan filters the files as reputation files It filters running processes and the loaded DLLs startup files services drivers and auto run apps portable executable files mentioned in the Windows prefetch cache and executable files that are listed in the Run registry keys and RunOnce registry keys Whe
454. y to which the device belongs The device category icon provides details on the connection status and security status Norton Internet Security labels all unknown devices as NEW and sets the category as GENERIC DEVICE This category may include computer related devices such as printers media devices and game consoles You can change the device category in the Edit Device Details window Shows how well your computer is protected from threats risks and damage The security status appears only for MY PC and the computers that are remotely monitored Shows the connection status of Remote Monitoring The statuses are ON OFF You can turn off Remote Monitoring for an individual computer or for all the computers that you remotely monitor 308 Protecting Internet activities About the Network Security Map Shows the access level that is granted to a remote device to connect to your computer The initial trust level is set based on the configuration of your computer You can set trust level for all devices other than MY PC Shows the status of the connection The statuses are ONLINE OFFLINE Shows the physical address also known as the Media Access Control address or MAC address of the computer or device Shows the IP address of the computer or device If you change the IP address of a device the updated IP address appears in the Network Security Map window when you refresh
455. you specify scans to detect rootkits other stealth items network drives tracking cookies and unknown security threats The Scan Performance Profiles option lets you configure a Norton Internet Security scan based on the digital signature and trust level of the files on your computer cd You must configure the Scan Performance Profiles settings before you run a scan or before a scan is scheduled to run Norton Internet Security scans your computer according to the configuration that you specified in the Scan Performance Profiles settings 466 Customizing protection features About customizing settings and options Real Time Protection Customizing protection features 467 About customizing settings and options Real Time Protection option protects your computer by continuously checking for viruses and other security risks You can use the Real Time Protection options to control the scanning and monitoring of your computer Your options are Antispyware Antispyware protects your computer against the security risks that can compromise your personal information and privacy Antispyware options let you choose which categories of risk you want Norton Internet Security to detect for manual email and instant messenger scanning Auto Protect Auto Protect loads into memory when Windows starts providing constant protection while you work Auto Protect checks for security risks every time that y
456. you want to move 6 Click Modify 9 In the Rules window select the rule that you want to move Do one of the following To move this rule before the rule above it click Move Up To move this rule after the rule below it click Move Down When you are done moving the rules click OK 10 In the Program Control window click OK Turning off a General rule temporarily You can temporarily turn off a general rule if you want to allow specific access to a computer or a program You must remember to turn on the rule again when you are done working with the program or computer that required the change You cannot turn off some of the default firewall rules that appear in the list You can only view the settings of these rules by using the View option To turn off a General rule temporarily 1 In the Norton Internet Security main window click Settings In the Settings window click the Network tab In the left pane click Smart Firewall Under Smart Firewall in the Advanced Settings row click Configure In the Advanced Settings window in the General Rules row click Configure In the General Rules window uncheck the box next to the rule you want to turn off Click OK 8 Inthe Advanced Settings window click OK Protecting Internet activities 237 About the Smart Firewall Removing a firewall rule You can remove some of the firewall rules if necessary However you cannot remove some of the defau
457. your product is up to date Symantec recommends that you have the latest version of the product as it contains new and enhanced features for better protection against security threats Product upgrade is different from the program updates and the definition updates that are minor improvements to your installed product The main differences are as follows Product upgrade lets you download and install a new version of the entire product Definition updates are the files that keep your Symantec products up to date with the latest antithreat technology Program updates are enhancements to Norton Internet Security that Symantec issues periodically If a new version of the product is not available ensure that you have all the latest program updates and definition updates LiveUpdate automates the process of obtaining and installing program and definition updates You can use LiveUpdate to obtain the latest updates 518 Finding additional solutions About upgrading your product The upgrade process might not work if your Web browser is incompatible to communicate with the Symantec servers Your product must be activated and you need an Internet connection to check and install new product version Checking for a new version of the product You can upgrade your product to the latest version if you have an active subscription If you have a new version available you can download and install the new version of your

Download Pdf Manuals

image

Related Search

Related Contents

gs/super premium 35 dr  仕 様 書 - 鳥取県産業技術センター  建設部(PDF:658KB)  Sony PCWA-DE80 User's Manual    Blaupunkt Melbourne C30 Car Stereo System User Manual  Toshiba Satellite C855D-S5116  CONJUNTO HABITACIONAL ORLÂNDIA F 1 2 0 6 4 7 C 0 0 P E  Amasoft MFT - Manual do usuário  vegapuls 66 - VEGA Americas, Inc.  

Copyright © All rights reserved.
Failed to retrieve file