Home
Symantec NORTON INTERNET SECURITY 2004 RETAIL (10098800) for PC
Contents
1. 3 In the Signatures list select the attack signature that you want to exclude Click Exclude When you are done excluding signatures click OK aw F In the Intrusion Detection window click OK 120 Guarding against intrusion attempts Customize Intrusion Detection If you have excluded attack signatures that you want to monitor again you can include them in the list of active signatures To include attack signatures 1 Inthe main window double click Intrusion Detection 2 In the Intrusion Detection window click Advanced 3 In the Excluded Signatures list select the attack signature that you want to monitor Click Include When you are done including signatures click OK aw F In the Intrusion Detection window click OK Enable or disable AutoBlock When Norton Internet Security detects an attack it automatically blocks the connection to ensure that your computer is safe The program can also activate AutoBlock which automatically blocks all incoming communication from the attacking computer for a set period of time even if the incoming communication does not match an attack signature If AutoBlock is blocking a computer or computers you need to access you can turn off AutoBlock Make sure to turn AutoBlock back on when you are done To turn AutoBlock on and off 1 Inthe main window double click Intrusion Detection 2 In the Intrusion Detection window check or uncheck Turn on AutoBloc
2. 224 Index files adding to Quarantine 146 reinfected after virus removal 200 filtering and SSL 175 changing rule priority 177 email 61 identifying email senders 62 63 training 64 with text strings 177 180 181 firewall and LiveUpdate 100 and network 100 troubleshooting 193 Windows XP 36 firewall rules processing order 109 for Web servers 193 floppy drives unable to boot from 204 folders scanning 132 scanning for viruses 130 FTP restricting 166 full system scans 131 G glossary 78 H Help online 78 window and dialog box 79 Home Networking 108 109 configuration 108 zones 108 109 ignoring files 143 infected files cannot repair 201 reinfected 200 Information Wizard features 43 how to use 43 Inoculation alerts 145 options 91 responding to alerts 146 installing 37 components 41 if problems are found 16 your product with a virus 16 instant messenger and Privacy Control 170 options 90 protecting private information 170 scanning transferred files 129 supported programs 33 virus protection 30 Interactive mode for LiveUpdate 98 Internet access statistics contents 185 resetting 184 Knowledge Base articles 191 options 90 Symantec service and support Web site 191 Symantec Web sites 80 Internet enabled programs 111 Intrusion Detection about 25 configuring 118 service 96 updates 96 italicized terms 78 J Java applets 193 L LiveUpdate Interactive and Express modes 98 options 85 90
3. Installing Norton Internet Security After installation After installation After Norton Internet Security is installed and you have restarted your computer the Information Wizard appears Use the Information Wizard The Information Wizard lets you activate your copy of Norton Internet Security get information about updates select post installation tasks to be done automatically and review your security settings See When to activate your product on page 24 If you choose not to register the software using the Information Wizard or if registration fails for some reason you can register by using the Product Registration option on the Help menu or by using the Symantec Web site at www symantec com On the Web site go to the Products page for the registration link To use the Information Wizard 1 In the welcome window click Next You must activate the software within 15 days On the Product Activation window click Activate and register your product now Click Next Make sure that your computer is connected to the Internet then click Next If you purchased your computer with Norton Internet Security already installed you must accept the icense agreement in order to use Norton Internet Security Click I accept the license agreement then click Next In the first Registration window select the Country Region from which you are registering If you would like information from Symantec about orton I
4. Eudora Light 3 0 Eudora Pro 4 0 Eudora 5 0 Privacy Control AOL Instant Messenger version 4 3 or later instant messaging s yahoo Messenger version 5 0 or later scannin g MSN Messenger and Windows Messenger version 4 6 or later Norton AntiVirus AOL Instant Messenger version 4 7 or later instant messaging ss Yahoo Messenger version 5 0 or later scanning MSN Messenger and Windows Messenger version 3 6 or later Compatibility with other software and hardware Norton Internet Security works well with Symantec pcAnywhere and most routers Internet connection sharing programs and popular VPNs Symantec pcAnywhere See Change an You should have no problems using Symantec existing firewall pcAnywhere as either a client or host with Norton iie on page Tii Internet Security For maximum protection if you run a Symantec pcAnywhere host edit the rule to limit its use 34 Installing Norton Internet Security System requirements Routers to only the computers with which you use it Symantec pcAnywhere passwords are also necessary for maximum security Norton Internet Security adds to the protection provided by the router In some cases you might want to reduce the protection provided by the router so that you can use programs like NetMeeting or MSN Messenger Norton Internet Security also provides features that might not be available with cable and DSL routers such as privacy protection
5. If Norton AntiVirus finds a virus or a file containing a virus or a potential security risk on your computer there are several possible resolutions to the problem Fix infection Removes the virus from the file or if the threat is a worm or Trojan horse deletes the file Quarantine infection Makes the file inaccessible by any programs other than a Symantec antivirus program You cannot accidentally open the file and spread the virus but you can still evaluate it for possible submission to Symantec Delete the file Removes the virus from your computer by deleting the file that contains the virus worm or Trojan horse It should be used only if the file cannot be repaired or quarantined Exclude at risk files Excludes the files at risk from future scans If you exclude a file you are doing so permanently from future scans The threat may still be on your computer Viruses can be found during a manual or scheduled scan or by Auto Protect when you perform an action with an 140 What to do if a virus is found If a virus is found during a scan infected file Threats and security risks can appear during an instant messenger session when sending an email message or during a manual or scheduled scan If a virus is found during a scan If Norton AntiVirus finds a virus Trojan horse worm or security risk during a scan or from an instant messenger session you either receive a summary of the automatic repair or d
6. 7 Click OK to close the Ad Blocking window Norton Internet Security maintains records of all incoming and outgoing Internet connections and any actions that the program takes to protect your computer You should periodically review this information to spot potential problems There are several sources of information Status amp Settings window Statistics window Detailed statistics window Event Log Basic information about which protection features are active Recent information about firewall and content blocking activities Detailed information about network activity and actions that Norton Internet Security has taken Internet activities and any actions Norton Internet Security has taken View the Statistics window The Statistics window provides a snapshot of your computer s network activity since the last time you started Windows Use this information to identify ongoing attack attempts and review how your Privacy Control and Parental Control settings affect your protection 184 Monitoring Norton Internet Security Review detailed statistics The Statistics window includes information on the following Personal Firewall Online Content Blocking Parental Control Any recent attacks on this computer including the time of the most recent attack and the address of the attacking computer The number of cookies images and other online content that has been blocked and the number
7. Monitoring Norton Internet Security 189 About the Log Viewer 3 Inthe left pane select the log that you want to review Your options are Threat alerts A history of threat alerts such as the ID and type of threat date and time when it occurred the action taken and the version of the virus definitions used Application A history of scanning activities such as activities when scanning occurred and with what results Errors Detailed information about any problems encountered when scanning your computer such as the date error code and message As you Select each log the right pane changes and displays details specific to the particular log The most recent activities appear at the top of the log 4 When you are finished viewing the information click File gt Exit 190 Monitoring Norton Internet Security About the Log Viewer The information in this chapter will help you solve the most frequently encountered problems If you can t find the solution to your problem here there is a wealth of information on the Symantec Web site Explore the Symantec service and support Web site On the Symantec service and support Web site you can find the latest protection and program updates patches online tutorials Knowledge Base articles and virus removal tools To explore the Symantec service and support Web site 1 On the Internet go to www symantec com techsupp 2 On the service and support Web p
8. Privacy Control continued using with HTTPS 174 private information adding 170 modifying 170 options 172 problems troubleshooting Norton AntiSpam 196 troubleshooting Norton AntiVirus 199 troubleshooting Norton Internet Security 193 troubleshooting Rescue Disks 203 product key 24 program patches 95 updates 95 Program Control 110 Automatic 110 manually adding programs 112 scanning for programs 111 settings 112 Program Scan configuring 111 running 111 programs See also Internet enabled programs configuring with Program Scan 111 creating firewall rules 113 manually adding to Program Control 112 manually configuring Internet access 113 protection downloading from Symantec Web site 98 maintaining 20 maximum 129 Index 227 protection continued preparing for emergencies 21 system scans 131 updating 101 protection updates defined 96 proxy servers 193 Q Quarantine actions in 146 adding files to 146 files in 146 infected files in 142 options 146 restoring items 146 R Readme file 79 register your software 43 removing Ad Blocking strings 181 Norton AntiVirus 46 Norton Internet Security 46 other antivirus programs 36 previous copies of Norton Internet Security 36 spam rules 176 Repair Wizard 140 repairing infected files in Windows 2000 XP 143 in Windows 98 98SE Me 142 viruses 29 required computer configuration 31 Rescue Disks creating 71 creating folder on hard disk 72 disabling Auto Protect 7
9. 106 Guarding against intrusion attempts Customize firewall protection improper connection attempts Trojan horses and malicious Web content Customize firewall protection The default Personal Firewall settings should provide adequate protection for most users If the default protection is not appropriate you can customize Personal Firewall protection by using the Security Level slider to select preset security levels or by changing individual security settings Change the Security Level See About Norton Internet Security accounts on page 149 The Security Level slider lets you select Minimal Medium or High security settings When you change the slider position the protection level changes Changing the Security Level does not affect the protection provided by Intrusion Detection You can set individual Security Level settings for each Norton Internet Security user To change the Security Level 1 Inthe main window double click Personal Firewall 2 Inthe Personal Firewall window in the Choose a security level for drop down list select the account that you want to change 3 Move the slider to the Security Level that you want Click OK Change individual security settings If the Security Level options do not meet your needs you can change the settings for the Personal Firewall Java and ActiveX protection levels Changing an individual setting overrides the Security Level but it does not change th
10. Trusted computers for signs of zombies and other remote control attacks Intrusion Detection relies on an extensive list of attack signatures to detect and block suspicious network activity Run LiveUpdate regularly to ensure that your list of attack signatures is up to date 117 18 Guarding against intrusion attempts Customize Intrusion Detection Customize Intrusion Detection The default Intrusion Detection settings should provide adequate protection for most users You can customize Intrusion Detection by excluding specific network activity from monitoring enabling or disabling AutoBlock and restricting blocked computers Turn Intrusion Detection alerts on and off See Identify the source of Internet traffic on page 58 You can choose whether you want to receive alerts when Intrusion Detection blocks suspected attacks The alerts include more information about the attacking computer and information about the attack You can also trace the connection attempt using Visual Tracking To turn Intrusion Detection alerts on and off 1 Inthe main window double click Intrusion Detection Norton Internet Security Intrusion Detection More Info Intrusion Detection protects your computer frorn Internet attacks Turn on Intrusion Detection Notify me when Intrusion Detection blocks connections Advanced AutoBlock When you are attacked AutoBlock blocks the attacking computer Turn
11. Use Web You can also customize cookie blocking for individual assistant on sites using Web assistant page 57 Enable or disable Browser Privacy Browser Privacy prevents Web sites from learning the type of computer and browser that you are using the Web site that you last visited and other information about your browsing habits Some Web sites that depend on JavaScript may not work correctly if they cannot identify the type of browser that you are using To enable or disable Browser Privacy 1 In the main window double click Privacy Control 2 Inthe Privacy Control window in the Privacy Control settings for drop down list select the account that you want to change 3 Click Custom Level 4 Inthe Customize Privacy Settings dialog box check or uncheck Enable Browser Privacy 5 Click OK 174 Protecting your privacy Customize Privacy Control Disable or enable secure Web connections When you visit a secure Web site your browser sets up an encrypted connection with the Web site By default all accounts can use secure connections If you want to ensure that users are not sending private information to secure Web sites you can disable secure Web connections If you disable secure Web connections your browser will not encrypt any information that it sends You should only disable secure Web connections if you are protecting your personal data in the Private Information list To disable or enable secure Web conne
12. by AutoBlock To exclude specific computers from AutoBlock 1 Inthe main window double click Intrusion Detection 2 Inthe Intrusion Detection window click Exceptions 122 Guarding against intrusion attempts Customize Intrusion Detection 3 Doone of the following In the Currently blocked list select a blocked IP address then click Exclude Click Add then type the computer s name IP address network identification or a range of IP addresses containing the computer that you want to exclude 4 When you are done excluding IP addresses click OK 5 In the Intrusion Detection window click OK Restrict a blocked computer You can add a blocked computer to your Restricted Zone to permanently prevent that computer from accessing your computer Computers in the Restricted Zone do not appear on the blocked list because all communication with restricted computers is blocked To restrict a blocked computer 1 Inthe main window double click Intrusion Detection 2 Inthe list of computers that are currently blocked by AutoBlock select the computer to add to the Restricted Zone 3 Click Restrict 4 When you are done restricting computers click OK 5 In the Intrusion Detection window click OK Use Network Detector to create and customize security settings for different networks This makes it easy for mobile users who connect to the Internet from the road to stay protected at all times About Network Detecto
13. collectively the Software is the property of Symantec or its icensors and is protected by copyright law While Symantec continues to own the Software You will have certain rights to use the Software after Your acceptance of this license This icense governs any releases revisions or enhancements to the Software that Symantec may furnish to You Except as may be modified y a Symantec license certificate license coupon or license key each a License Module that accompanies precedes or ollows this license Your rights and obligations with respect to the use of this Software are as ollows You may A use one copy of the Software on a single computer If a License Module accompanies precedes or follows this license You may make the number of copies of the Software licensed to You by Symantec as provided in Your License Module Your License Module shall constitute proof of Your right to make such copies B make one copy of the Software for archival purposes or copy the Software onto the hard disk of Your computer and retain the original for archival purposes C use the Software on a network provided that You have a licensed copy of the Software for each computer that can access the Software over that network D after written notice to Symantec transfer the Software on a permanent basis to another person or entity provided that You retain no copies of the Software and the transferee a
14. spam Norton AntiSpam begins filtering email as soon as it is installed If you are using a supported email program it will also be available from within that program after installation Adjust the email filter You can determine how strictly Norton AntiSpam filters your email Adjust the Norton AntiSpam parameters from the main window To adjust the email filter 1 Inthe main window double click AntiSpam 2 Inthe Norton AntiSpam window in the Norton AntiSpam settings for drop down list select the account that you want to change Norton AntiSpam General Allowed List Blocked List Spam Rules General More Info Norton AntiSpam helps eliminate unwanted email before you see it F Turn on Norton AntiSpam Move the slider to set the Norton AntiSpam level _ Medium recommended Moderate filtering More spam is correctly identified if Likely to identify some personal email as spam Default Level 3 Inthe General window ensure that Turn on Norton AntiSpam is checked 62 Basics Manage how Norton AntiSpam detects spam 4 Use the Norton AntiSpam slider to control how Norton AntiSpam filters email Your options are High Medium recommended Low Maximum filtering Most spam is correctly identified More likely to identify personal email messages as spam Moderate filtering More spam is correctly identified Likely to identify some personal email mess
15. whenever you use LiveUpdate you will receive a warning that your subscription has expired Follow the on screen instructions to complete your subscription renewal 103 104 Keeping current with LiveUpdate About your subscription Guarding against intrusion attempts The Personal Firewall and Intrusion Detection features protect your computer from online attacks unwanted connection attempts malicious Web content port scans and other suspicious behavior About the Personal Firewall When the Personal Firewall is active it monitors communications among your computer and other computers on the Internet It also protects your computer from such common security problems as the following Improper connection attempts Security and privacy incursions by malicious Web content Port scans Intrusions Warns you of any connection attempts from other computers and attempts by programs on your computer to connect to other computers Monitors all Java applets and ActiveX controls and lets you choose whether to run or block the program Cloaks inactive ports on your computer and detects port scans Detects and blocks malicious traffic and attempts by outside users to attack your computer See Customize firewall protection on page 106 You can control the level of protection that the Personal Firewall provides by using the Security Level slider You can also control how the Personal Firewall reacts to
16. Internet connection sharing programs For basic protection install Norton Internet Security on the gateway computer For maximum protection against Trojan horses or other problem programs that initiate outbound communications install Norton Internet Security on all computers that share the connection You must have a license for each copy of Norton Internet Security you install Virtual Private Networks Norton Internet Security works with the following Virtual Private Networks VPNs Symantec Enterprise VPN Symantec VelociRaptor Nortel VPNremote PGP SecureRemote With most VPNs when the VPN client is active you cannot see the Internet or other computers on your local network You can only see what is available through the VPN server to which you are connected Installing Norton Internet Security 35 Before installation About encrypted email connections Norton Internet Security does not support email connections using Secure Sockets Layer Secure Sockets Layer SSL is a Netscape protocol designed to provide secure communications on the Internet If you use an SSL connection to access your email you are not protected by Norton Internet Security To send email messages through SSL layer connections turn off Privacy Control and Norton AntiSpam If you have installed Norton AntiVirus you must also turn off incoming and outgoing email protection To send email through SSL 1 Inthe main window click Privacy Contr
17. Inthe Norton AntiSpam window in the Norton AntiSpam settings for drop down list select the account that you want to change 3 In the Norton AntiSpam window click Spam Rules Blocking unwanted email messages 177 Customize Norton AntiSpam 4 Inthe Spam Rules window select the Norton AntiSpam entry with which you want to work 5 Do one of the following Click Edit to change the entry and follow the same steps as adding an entry Click Delete to delete the entry 6 Click OK to close the Spam Rules window Change the priority of a spam rule When Norton AntiSpam compares an email message to he list of spam rules it starts with the rule at the top of he list then continues down the list until it finds a match When a match is found Norton AntiSpam categorizes the email message accordingly and moves to he next message If you find that the spam email messages you receive tend to match one rule more than he others you may want to move that rule to the top of he list To change the priority of a spam rule 1 Inthe main window double click AntiSpam In the Norton AntiSpam window click Spam Rules Select the rule that you want to move FWN Do one of the following Click Move Up to make the rule a higher priority Click Move Down to make the rule a lower priority 5 Click OK 178 Blocking unwanted email messages Customize Norton AntiSpam Use the Ad When Ad Blocking is enabled it transparentl
18. Norton AntiVirus S v Norton antivirus Scan for Viruses Status Task Schedule Scan for Viruses lt Reports 9 Scan tiles Actions Schedule Task gt Scan New gt gt gt Schedule AntiVirus 2 Inthe Scan for Viruses pane under Task click Scan my computer 3 Under Actions click Scan When the scan is complete a scan summary appears 4 When you are done reviewing the summary click Finished 131 132 Protecting disks files and data from viruses Create and use custom scans Scan individual elements Occasionally you may want to scan a particular file removable drives a floppy disk any of your computer s drives or any folders or files on your computer You may have been working with floppy disks or have received a compressed file in an email message and suspect a virus You can scan just a particular disk or individual element that you want to check To scan individual elements 1 On the left side of the main window under Norton AntiVirus click Scan for Viruses 2 Inthe Scan for Viruses pane under Task select the scan that you want to run 3 Under Actions click Scan If you choose to scan all removable drives or a floppy disk the scan starts automatically If you choose to scan drives folders or files a dialog box appears in which you choose which drives folders or files to scan 4 In the dialog box make your selection then click Scan When the sc
19. Service amp Support Web site You ll be led through the online options first and then to the telephone contact options Support for old and discontinued versions When Symantec announces that a product will no longer be marketed or sold telephone support is discontinued 60 days later Technical information may still be available through the Service amp Support Web site at http service symantec com Subscription policy If your Symantec product includes virus firewall or Web content protection you may be entitled to receive updates via LiveUpdate Subscription length varies by Symantec product After your initial subscription ends you must renew it before you can update your virus firewall or Web Service and support solutions 209 Worldwide service and support content protection Without these updates you will be vulnerable to attacks When you run LiveUpdate near the end of your subscription period you are prompted to subscribe for a nominal charge Simply follow the instructions on the screen Worldwide service and support Technical support and customer service solutions vary by country For Symantec and International Partner locations outside of the United States contact one of the service and support offices listed below or connect to http service symantec com and select your region under Global Service and Support 210 Service and support solutions Worldwide service and support Service and s
20. States Government end users with only those rights as granted to all other end users according to the terms and conditions contained in this license agreement Manufacturer is Symantec Corporation 20330 Stevens Creek Blvd Cupertino CA 95014 8 Export Regulation The Software and its related documentation including technical data may not be exported or re exported in violation of the U S Export Administration Act its implementing laws and regulations the laws and regulations of other U S agencies or the export and import laws of he jurisdiction in which the Software was obtained Export to any individual entity or country specifically designated by applicable aw is strictly prohibited 9 General f You are located in North America or Latin America this Agreement will be governed by he laws of the State of California United States of America Otherwise this Agreement will be governed by the laws of England and Wales This Agreement and any related License Module is the entire agreement between You and Symantec relating to the Software and i supersedes all prior or contemporaneous oral or written communications proposals and representations with respect to its subject matter and ii prevails over any conflicting or additional terms of any quote order acknowledgment or similar communications etween the parties This Agreement shall erminate upon Your breach of any term contained herein and
21. any time You can start the Rescue Disk Wizard from the main window of your Symantec product 72 Basics Create and use Rescue Disks If you start the Rescue Disk Wizard from the main window temporarily disable Auto Protect while you are creating the Rescue Disk set If you do not restart your computer after creating Rescue Disks remember to enable Auto Protect again When you select a floppy disk drive the Rescue Disk program calculates the number of disks that you will need to complete the set Depending on what items you want to include in the Rescue Disk set you might need ten or more floppy disks If you choose to create Rescue Disks on a network drive a second physical hard disk or some other large capacity disk drive but not a CD your Rescue Disk set is placed in a folder on the selected disk Make sure that you also have a bootable floppy disk in a safe location This disk should contain the network drivers or other files necessary to start your computer and access the drive on which you placed your Rescue Disk set Creating a Rescue Disk set on a startup hard disk for example drive C is not recommended because you will not be able to access the rescue programs and configuration files if your hard disk is damaged and unable to start To create Rescue Disks 1 Inthe main window click Rescue 2 Inthe Rescue Disk window select the drive on which to create the Rescue Disk set To create a Rescue Disk set on floppy d
22. appears in all copies and that both that copyright notice and this permission notice appear in supporting documentation Silicon Graphics makes no representations about the suitability of this software for any purpose It is provided as is without express or implied warranty Copyright 1994 Hewlett Packard Company Permission to use copy modify distribute and sell this software and its documentation for any purpose is hereby granted without fee rovided that the above copyright notice appears in all copies and that both that copyright notice and this permission notice appear in supporting documentation Hewlett Packard Company makes no representations about the suitability of this software for any purpose t is provided as is without express or implied warranty Trademarks Symantec the Symantec logo Norton Internet Security Norton Personal Firewall LiveUpdate Norton AntiSpam and Norton AntiVirus are U S registered trademarks of Symantec Corporation Rescue Disk is a trademark of Symantec Corporation Microsoft MS DOS MSN Windows and the Windows logo are registered trademarks of Microsoft Corporation AOL and CompuServe are registered trademarks of America Online Inc Pentium is a registered trademark of Intel Corporation Other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged Printed in the Uni
23. by Auto Protect and Worm Blocking scanning of your email attachments and files transferred by instant messenger and frequent system scans All of these tasks can be set to occur automatically For added protection in Norton AntiVirus on Windows 98 98SE Me enable Inoculation to alert you if a system file changes Ensure that protection settings are enabled Norton AntiVirus is configured to provide you with complete protection against viruses It is unlikely that you need to change any settings However for maximum protection you should ensure that your protection features are enabled For specific information about a particular option and its protection settings see the online Help This table summarizes the maximum protection settings and where you can find them Feature In the main window Then for maximum click protection select Auto Protect Norton AntiVirus gt On Auto Protect gt Enable 130 Protecting disks files and data from viruses Manually scan disks folders and files Email scanning Timeout protection Instant messenger scanning Worm Blocking Inoculation Windows 98 Options gt Norton AntiVirus gt Email Options gt Norton AntiVirus gt Email Options gt Norton AntiVirus gt Instant Messenger Options gt Norton AntiVirus gt Email Options gt Norton AntiVirus gt Inoculation Scan incoming Email Scan outgoing Email If your email
24. can be an IP address a URL such as service symantec com or a Microsoft Network computer name such as Mojave You can find the names of computers on your local network in Network Neighborhood or Network Places on your Windows desktop To specify an individual computer 1 Inthe dialog box click Individually 2 Type the name or IP address of a single computer 3 Click OK 16 Guarding against intrusion attempts Identify computers to Norton Internet Security Specify a range of computers You can enter a range of computers by specifying the starting lowest numerically IP address and the ending highest numerically IP address All of the computers within that range of IP addresses are included In almost every case the first three of the four numbers of the IP addresses entered should be the same To specify a range of computers 1 In the dialog box click Using a range 2 Inthe Starting Internet Address text box type the starting lowest numerically IP address 3 In the Ending Internet Address text box type the ending highest numerically IP address 4 Click OK Specify computers using a network address You can identify all of the computers on a single subnet by specifying an IP address and a subnet mask The IP address that you specify can be any address in the subnet that you are identifying To specify computers using a network address 1 In the dialog box click Using a network address 2 Inthe Network Addres
25. changes to Norton Internet Security settings All users regardless of their access levels can make changes to Norton AntiVirus settings To protect your settings from unwanted changes set a password for Norton Internet Security and Norton AntiVirus options To change settings for individual features 1 In the main window do one of the following Double click a feature you want to customize Select a feature then in the lower right corner of the window click Customize 2 Configure the feature 3 When you are done making changes click OK If you have installed accounts you can customize some Norton Internet Security features for individual users Other settings apply to all users To change settings for individual accounts 1 In the main window do one of the following Double click a feature you want to customize Select a feature then in the lower right corner of the window click Customize 2 In the feature s window on the Settings For menu select the account that you want to configure 3 Configure the feature 4 When you are done making changes click OK If you are using Windows 2000 XP and you do not have Local Administrator access you cannot change Norton Internet Security options Options Set Norton Internet Security options To customize Norton Internet Security 1 At the top of the main window click Options If a menu appears click Norton Internet Security 2 Select the tab on which you want to ch
26. contact your network administrator Keeping current with LiveUpdate 101 Run LiveUpdate automatically Run LiveUpdate automatically You can have LiveUpdate check for protection updates automatically on a set schedule by enabling Automatic LiveUpdate You must continue to run LiveUpdate manually to receive product updates db Automatic LiveUpdate checks for an Internet connection every five minutes until a connection is found and then every four hours If you have an ISDN router that is set to automatically connect to your Internet service provider ISP many connections will be made with connection and phone charges possibly being incurred for each connection If this is a problem you can set your ISDN router to not automatically connect to the ISP or disable Automatic LiveUpdate To enable Automatic LiveUpdate 1 At the top of the main window click Options If a menu appears click Norton Internet Security If you set a password for Options you must provide the password before you can continue 2 In the Options dialog box on the LiveUpdate tab check Enable Automatic LiveUpdate 3 If you want to be notified when updates are available check Notify me when Norton Internet Security updates are available 4 Select the updates for which you want Automatic LiveUpdate to check 102 Keeping current with LiveUpdate Run LiveUpdate automatically 5 For each type of update for which you want Automatic LiveUpdate to che
27. each item that should have been marked as spam Using the buttons added to your email program by Norton AntiSpam click This is Spam If you have set your options to ask before adding senders to the Blocked List answer the prompt accordingly Open the Norton AntiSpam folder Select each item that should not have been marked as spam Using the buttons added to your email program by Norton AntiSpam click This is not Spam If you have set your options to ask before adding senders to the Allowed List answer the prompt accordingly Close your email program 66 Basics Manage advertising filters Manage advertising filters Ad Blocking can block several kinds of ads that appear on Web sites while you are browsing the Internet You can set individual Ad Blocking settings for each user Supervisor and Adult users can make changes to program settings Child and Teenager users cannot make any changes to Ad Blocking Enable or disable Ad Blocking Ad Blocking compares the addresses of ads that are being downloaded by your browser with its own list of ads to block If it finds a match it removes the ad so that it does not appear in your browser leaving the rest of the Web page intact Sometimes you may want to view ads that have been blocked In this case you can temporarily disable Ad Blocking To enable or disable Ad Blocking 1 In the main window double click Ad Blocking Ad Blocking Ad Blocking More info
28. excluding 141 attack signatures 117 119 222 Index attacks 59 122 about 117 alerts 118 blocking 118 excluding 119 network 105 tracing 58 59 from AutoBlock 59 from Statistics 59 AutoBlock 120 122 Automatic LiveUpdate 90 101 Automatic Program Control 110 Auto Protect disabling 72 enabling 129 failure to load on startup 199 functions 29 options 89 backing up files before repair 91 banner ads 180 Block Traffic about 59 using 59 Blocked list 63 blocking advertisements 66 180 browser information 195 computers 120 cookies 172 193 email addresses 173 spam 175 Web sites 161 by category 161 by name 162 exceptions 163 Bloodhound technology description 30 options 89 booting Auto Protect failure to load 199 booting continued changing boot sequence 204 floppy disk drive fails 204 Rescue Disks fail 203 browser information 195 privacy 173 C CD ROM drive starting from 17 changing feature settings 85 firewall rules 114 individual security settings 106 options 84 order of firewall rules 114 scan schedules 136 Security Level 106 checking for updates 85 version number 49 vulnerability to attack 58 clearing 127 computer blocking 120 emergency procedures 15 names 115 requirements 31 specifying 115 individually 115 ranges 116 with a network address 116 connecting to the Internet automatically 101 Cookie Blocking options 173 troubleshooting 193 cookies 172 193 creating accounts 150 custom virus
29. items that you want to scan Your options are Add files Select individual files to be scanned Add folders Select folders and drives to be scanned You can use both options to select the combination of items that you want 5 Inthe resulting dialog box select the items that you want to scan If you select a folder all files in that folder are included If you select a drive all folders and files on that drive are included 6 Add the selected items to the list of items to scan by doing one of the following In the Scan Files dialog box click Open In the Scan Folders dialog box click Add 7 Ifyou need to remove an item from the list select it then click Remove 8 When you are done creating the list of items to be scanned click Next 134 Protecting disks files and data from viruses Delete a custom scan 9 Type a name for the scan by which you can identify it in the list of scans 10 Click Finish Run a custom scan When you run a custom scan you do not have to redefine what you want to scan To run a custom scan 1 On the left side of the main window under Norton AntiVirus click Scan for Viruses In the Scan for Viruses pane under Task select the custom scan Under Actions click Scan When the scan is complete a scan summary appears When you are done reviewing the summary click Finished Delete a custom scan You can delete custom scans if they are no longer needed To d
30. malicious users Computers in the Trusted Zone are not regulated by the Personal Firewall They have as much access to your computer as they would have if you did not have a firewall Computers in the Restricted Zone cannot communicate with your computer at all The Home Network Wizard is the fastest way to organize computers into zones You can also manually add individual computers to zones To categorize computers with the Home Network Wizard 1 Inthe main window double click Personal Firewall 2 In the Personal Firewall window on the Networking tab click Wizard 3 In the Home Network Wizard opening window click Next 4 In the resulting list check the network adapters that you want to configure automatically and add to your Trusted Zone 5 Click Next 6 Click Finish to close the wizard To manually add computers to zones 1 Inthe main window double click Personal Firewall 2 In the Personal Firewall window on the Networking tab select the zone to which you want to add a computer 3 If you have turned on Network Detector select the Location you want to customize 4 Click Add See Identify computers to Norton Internet Security on page 115 Guarding against intrusion attempts Customize firewall rules 5 Inthe Specify Computers window identify the computer 6 When you have finished adding computers click OK To remove computers from zones 1 Inthe main window double click Personal Firew
31. meet the following minimum requirements Operating System Requirements Windows 98 98SE 133 MHz or higher processor 64 MB of RAM 200 MB of available hard disk space Internet Explorer 5 01 with Service Pack 2 or later 5 5 recommended CD ROM or DVD ROM drive Windows Me 150 MHz or higher processor 96 MB of RAM 200 MB of available hard disk space Internet Explorer 5 01 with Service Pack 2 or later 5 5 recommended CD ROM or DVD ROM drive Windows 2000 133 MHz or higher processor Professional 96 MB of RAM 200 MB of available hard disk space Internet Explorer 5 01 with Service Pack 2 or later 5 5 recommended CD ROM or DVD ROM drive Windows XP 300 MHz or higher processor Professional or 128 MB of RAM Home Edition 200 MB of available hard disk space Internet Explorer 5 01 with Service Pack 2 or later 5 5 recommended CD ROM or DVD ROM drive Installing Norton Internet Security 33 System requirements Supported email and instant messenger programs Norton Internet Security adds security features to the following email and instant messenger programs Norton AntiSpam Microsoft Outlook Express 5 5 and later integration Microsoft Outlook 2000 XP 3 Eudora 5 0 and later Email scanning Any POP3 compatible program including Microsoft Outlook Express 4 0 5 X t Microsoft Outlook 97 98 2000 XP Netscape Messenger 4 X Netscape Mail 6 0
32. of times private information has been blocked Web sites and programs that have been blocked To view the Statistics window Inthe main window click Statistics Reset information in the Statistics window The statistics in the Statistics window are automatically cleared when you restart Windows You can also clear the statistics manually This helps you see if a configuration change affects the statistics To reset information in the Statistics window 1 Inthe main window click Statistics 2 Inthe Statistics window click Clear Statistics Review detailed statistics Along with the overall statistics in the Statistics window Norton Internet Security maintains real time network counters that track users Internet usage and any actions that the program takes Monitoring Norton Internet Security 185 View Norton Internet Security logs The detailed statistics include the following information Network TCP and UDP bytes sent and received the number of open network connections and the highest number of simultaneous open network connections since the program started Online content The number of graphics cookies spam and private information that have been blocked and the number of open HTTP connections Firewall TCP The number of blocked and permitted TCP connections Connections Firewall UDP The number of blocked and permitted UDP connections Datagrams Firewall Rules All of the rules defined for your firewa
33. off this option within your email client Consult your email client manual for instructions on how to do this or disable Norton AntiVirus outgoing email scanning To disable outgoing email scanning 1 At the top of the main window click Options If a menu appears click Norton AntiVirus 2 Inthe Options window under Internet click Email 3 Uncheck Scan outgoing Email 4 Click OK Troubleshooting 203 Troubleshoot Rescue Disks Troubleshoot Rescue Disks Check here for possible solutions to issues that might arise with Rescue Disks My Rescue Disk does not work See Create and Due to the number of product specific technologies used use Rescue Disks by manufacturers to configure and initialize hard drives on page 71 the Rescue program cannot always create a bootable disk automatically If your Rescue Boot Disk does not work properly do one of the following Be sure you have downloaded the latest Rescue Disk update from LiveUpdate If you have a special startup disk for your computer add it to your Rescue Disk set In an emergency start rom that disk Remove the disk and insert your Rescue Boot Disk At the DOS prompt type A RSHELL press Enter then follow the on screen instructions Use the Disk Manager or similarly named program hat came with your computer to make your Rescue Boot Disk bootable Make sure to test your modified Rescue Boot Disk Sometimes your Rescue Boot Disk does not work pro
34. procedure 97 locations 127 about 124 adding networks 126 creating 124 125 customizing 127 deleting 128 descriptions 124 Network Detector alert 126 removing networks from 127 Log Viewer contents 188 monitoring activities in 188 reviewing 186 using 186 logs See Log Viewer M Miscellaneous options 90 91 mobile computing and Network Detector 123 N Network Detector 123 128 about 25 123 adding networks to locations 126 creating new locations 124 customizing 127 locations 124 adding networks 126 clearing 127 creating 124 125 customizing 127 deleting 128 Index 225 Network Detector 123 128 continued locations 124 continued etwork Detector alert 126 removing networks from 127 networks configuring with Home Networking Wizard 108 internal LiveUpdate server 100 troubleshooting 194 using LiveUpdate 100 new features in Norton AntiVirus 29 newsgroups exceptions 167 newsletters 82 Norton AntiSpam 175 about 26 Allowed and Blocked lists 27 and SSL 175 customizing 175 enabling and disabling 61 features 27 modify entry 176 troubleshooting 196 Norton AntiVirus Auto Protect 29 Bloodhound technology 30 customizing 88 starting from the main window 53 starting from the Windows Explorer toolbar 53 starting from the Windows system tray 53 virus protection 29 virus protection updates 29 Norton Internet Security creating accounts 150 154 disabling 70 Email options 86 Firewall options 85 General options 85 L
35. scans 132 Emergency Disks 18 creating continued firewall rules 109 Rescue Disks 71 credit card numbers 170 custom installation 41 custom scans creating 132 deleting 134 deleting schedule 137 running 134 scheduling 134 135 136 using 132 customizing Allowed list 62 Blocked list 63 installation 41 Intrusion Detection 117 Personal Firewall 105 spam filter 175 D default options 92 definitions of technical terms 78 deleting custom scans 134 infected files 143 locations 128 scan schedules 137 description of product features 23 detailed statistics about 184 categories 185 viewing 184 disabling Automatic LiveUpdate 102 Norton Internet Security 51 70 Windows XP firewall 36 disks manually scanning 130 protecting 129 scanning for viruses 130 Index 223 displaying the Norton AntiVirus toolbar 54 drive A boot sequence 204 using for Emergency Disks 18 using for Rescue Disks 72 76 E electronic newsletter 82 email menu 52 options 90 program toolbar 52 protection 90 spam 175 supported clients 33 emergency preparations 21 recovery procedures 15 Emergency Disks creating 18 using 19 enabling Ad Blocking 66 Automatic LiveUpdate 98 Office Plug in 91 Popup Window Blocking 67 encryption 174 Event Log See Log Viewer excluding at risk files 139 141 Express mode for LiveUpdate 98 F FAQs 199 features about 25 Norton AntiVirus 29 file extensions of infected files 148 unusual 200
36. site from opening unrequested browser windows Opens the Ad Trashcan which lets you choose the ads you want to block Opens the main Norton Internet Security window After installing Norton Internet Security the Web assistant button appears in your Internet Explorer toolbar If you have locked your toolbars the Web assistant button may be hidden To view or hide Web assistant In Microsoft Internet Explorer right click the toolbar then click Web assistant 57 58 Basics Check your computer s vulnerability to attack Check your computer s vulnerability to attack Use Security Check to test your computer s vulnerability to security intrusions The Security Check link in Norton Internet Security connects you to the Symantec Web site where you can scan for vulnerabilities and get detailed information about Security Check scans You must be connected to the Internet to check your computer s vulnerability To check your computer s vulnerability to attack 1 In the main window click Security 2 Click Check Security 3 On the Security Check Web page click Scan for Security Risks 4 To learn more about the Security Check tests click About Scan for Security Risks When the scan is complete the results page lists all of the areas that were checked and your level of vulnerability in each one For any area marked as at risk you can get more details about the problem and how to fix it To get more i
37. that it takes to display Web pages some ads contain offensive content cause software conflicts or use HTML tricks to open additional browser windows Norton AntiSpam incorporates several powerful features to reduce your exposure to unwanted online content Automatic Automatically creates a toolbar in supported email integration with programs email programs See Use your email program toolbar on page 52 Allowed and m Uses user defined address list to expedite scanning Blocked lists of email Accepts all mail from Allowed list Treats all mail from Blocked list as spam See Manage how Norton AntiSpam detects spam on page 61 Simplified import Imports lists of addresses from supported email of addresses programs Allows all or selected addresses to be imported See Identify authorized senders on page 62 Self training Uses outgoing mail to refine spam definition See Teach Norton AntiSpam your email preferences on page 64 28 Feature summary Norton AntiSpam features Custom spam rules Lets you identify email addresses and text that should and should not be filtered See Customize Norton AntiSpam on page 175 Ad blocking Blocks ads based on user defined criteria See Blocking Internet advertisements on page 179 Popup blocking Blocks pop up windows based on user defined criteria See Enable or disable Popup Window Blocking on page 67 Live update of Updates copies of S
38. under Task select the custom scan that you want to schedule db If you click the button next to the scan name the scan runs 3 Under Schedule Task click Schedule 4 Inthe Schedule dialog box if Show multiple schedules is checked click New to enable the scheduling fields If it is not checked the fields are already enabled 5 Set the frequency and time at which you want the scan to run Most of the frequency options include additional options that let you further refine the schedule Set the additional options as necessary 6 When you are done click OK You can also create multiple schedules for a scan For example you could run the same scan at the beginning of your work day and at the end 136 Protecting disks files and data from viruses Schedule scans To create multiple schedules for a single scan 1 On the left side of the main window under Norton AntiVirus click Scan for Viruses 2 Inthe Scan for Viruses pane under Task select the custom scan that you want to schedule db If you click the button next to the scan name the scan runs 3 Under Schedule Task click Schedule 4 Inthe Schedule dialog box check Show multiple schedules 5 To set an additional schedule click New 6 Set the frequency and time at which you want the scan to run Most of the frequency options include additional options that let you further refine the schedule Set the additional options as necessary 7 When you are
39. updated your operating system or repartitioned your hard disk or you could have a virus Norton AntiVirus alerts you when a change occurs in your system files If you get an alert about a change in your system files you have two options You can update your Inoculation snapshot or repair the file Before you repair the file be sure that your virus definitions are up to date and run a scan 146 What to do if a virus is found If Norton AntiVirus places files in Quarantine To respond to Inoculation changes In the Alert window select the action that you want to take Your options are Update the saved Use if the alert appears after a copy of my Master legitimate change in system files Boot Record Restore my Master Use if you are certain the system Boot Record did not change for legitimate reasons If Norton AntiVirus places files in Quarantine Add Item Properties Repair Item Restore Item Delete Item Once a file has been placed in Quarantine you have several options All of the actions that you take on files in Quarantine must be performed in the Quarantine window The toolbar at the top of the Quarantine window contains all of the actions that you can perform on quarantined files Adds files to Quarantine Use this action to quarantine a file that you suspect is infected This action has no effect on files that are already in Quarantine Provides detailed information about t
40. will be able to override program restrictions on a per program basis Block and permit categories of Internet programs Parental Control organizes Internet programs into categories By default Child users can access the Internet with programs in the General Email Web Browsers and User categories only Blocking a program from accessing the Internet does not prevent users from running the program A program may stop responding when Parental Control prevents it from connecting to the Internet Before making changes to program settings ensure that users understand that their computers may stop responding if they use blocked programs 166 Controlling individuals Internet use Customize Parental Control To block and permit categories of Internet programs 1 Inthe main window double click Parental Control 2 Inthe Parental Control window on the Settings For menu select the account that you want to change 3 Click Programs Programs Programs More Info Choose the types of programs that this account can use to access the nternet Program Categories General Chat Conferencing amp Collaboration E mail Education amp Family File Transfer Instant Messaging Newsreaders 11141517715 Cancel 4 Inthe Programs dialog box under Program Categories select the categories of programs that this account is allowed to use 5 Click OK Restrict newsgroup access Parental Control blocks n
41. 0 day period following the date of purchase 5 Limited Warranty Symantec warrants that the media on which the Software is distributed will be free from defects for a period of sixty 60 days from the date of delivery of the Software to You Your sole remedy in the event of a breach of this warranty will be that Symantec will at its option replace any defective media returned to Symantec within the warranty period or refund the money You paid for the Software Symantec does not warrant that the Software will meet Your requirements or that operation of the Software will be uninterrupted or that the Software will be error free TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL OTHER WARRANTIES WHETHER EXPRESS OR IMPLIED INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS YOU MAY HAVE OTHER RIGHTS WHICH VARY FROM STATE TO STATE AND COUNTRY TO COUNTRY 6 Disclaimer of Damages SOME STATES AND COUNTRIES INCLUDING MEMBER COUNTRIES OF THE EUROPEAN ECONOMIC AREA DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES SO THE BELOW LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU O THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH HEREIN FA
42. 2 failure to start from 203 not current 76 supported platforms 71 228 Index Rescue Disks continued testing 73 troubleshooting 203 updating 74 using 76 restarting after installation 41 and Block Traffic 60 Windows in safe mode 199 restoring items in Quarantine 146 system with Inoculation 91 system with Rescue Disks 76 risks intrusions 105 port scans 105 S safe mode 199 scan summary 140 scanning Automatic Program Control 110 automatically 134 before installation 37 email messages 90 entire computer 131 files at startup 91 for Internet enabled programs 110 individual elements 132 port 105 problems found during 132 scans creating custom 132 deleting custom 134 file 132 floppy disk 132 folder 132 full system 131 hard drive 132 removable drive 132 running custom 134 scans continued using custom 132 scheduling custom scans 135 multiple schedules for a scan 135 virus scans 134 secure Web connections disabling and enabling 174 security attacks 117 122 levels 106 Security Check 58 Security Level changing 106 changing individual settings 106 Security Response Web page 81 security risks attacks 105 117 finding 139 port scans 105 Service and Support 207 settings Personal Firewall 106 Program Control 112 Setup program changing boot drive sequence 204 spam blocking 175 filters 177 changing priority 177 modifying 176 SSL Secure Sockets Layer and Norton AntiSpam 175 starting Ad Blocki
43. 81 For more information To access the Web site from the Help menu Select the solution that you want Your options are Symantec Security Takes you to the Security Response Response page of the Symantec Web site from which you can update your protection and read the latest information about antithreat technology More Symantec Takes you to the Symantec Store solutions Web site from which you can get product information on every Symantec product Within your Symantec product the Reports page contains a link to the Symantec online Virus Encyclopedia as does the Windows Explorer toolbar To access the Web site from the Reports page 1 Inthe main window under Norton AntiVirus click Reports 2 On the Reports page next to Online Virus Encyclopedia click View Report To access the Symantec Web site from Windows Explorer 1 Open Windows Explorer 2 On the toolbar on the Norton AntiVirus menu click View Virus Encyclopedia This option connects you to the Symantec Security Response Web page from which you can search for information on all types of viruses To access the Symantec Web site in your browser On the Internet go to www symantec com 82 Basics For more information Subscribe to the Symantec Security Response newsletter Each month Symantec publishes a free electronic newsletter that is focused on the needs of Internet security customers It discusses the latest antivirus tech
44. 8s symantec Norton Internet Security User s Guide Norton Internet Security User s Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement Documentation version 7 0 PN 10103115 Copyright Notice Copyright 2003 Symantec Corporation All Rights Reserved Any technical documentation that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation NO WARRANTY The technical documentation is being delivered to you AS IS and Symantec Corporation makes no warranty as to its accuracy or use Any use of the technical documentation or the information contained therein is at the risk of the user Documentation may include technical or other inaccuracies or typographical errors Symantec reserves the right to make changes without prior notice No part of this publication may be copied without the express written ermission of Symantec Corporation 20330 Stevens Creek Blvd Cupertino CA 95014 Standard Template Library his product utilizes the Standard Template Library a C library of container classes algorithms and iterators Copyright 1996 1999 Silicon Graphics Computer Systems Inc Permission to use copy modify distribute and sell this software and its documentation for any purpose is hereby granted without fee rovided that the above copyright notice
45. Ad Blocking helps eliminate unwanted ad banners and pop up ads on Web pages M Turn on Ad Blocking Turn on Popup Window Blocking ET The Ad Trashcan lets you remove ads from Web pages and create new Ad Blocking rules Advanced Configure Ad Blocking for individual Web sites Basics 67 Manage advertising filters 2 Inthe Ad Blocking window check or uncheck Turn on Ad Blocking 3 Click OK Enable or disable Popup Window Blocking Pop up and pop under ads are secondary windows that Web sites open when you visit or leave the sites Pop ups appear on top of the current window while pop unders appear behind the current window When Popup Window Blocking is enabled Ad Blocking automatically blocks the programming code Web sites use to open secondary windows without your knowledge Sites that open secondary windows when you click a link or perform other actions are not affected In some cases you may want to view pop up windows on a site In this case you can temporarily disable Popup Window Blocking To enable or disable Popup Window Blocking 1 Inthe main window double click Ad Blocking 2 In the Ad Blocking window check or uncheck Turn on Popup Window Blocking 3 Click OK 68 Basics Check Norton AntiVirus configuration status Check Norton AntiVirus configuration status See Customize Norton AntiVirus on page 88 If Norton AntiVirus is behaving in an unexpected way
46. D into the CD ROM drive 2 Restart your computer Your computer displays the following information 1 Boot from Hard Drive 2 Boot from CD ROM 3 Press 2 Boot from CD ROM to restart from the CD After the computer restarts the Emergency program automatically begins to scan for and remove viruses 4 When Norton AntiVirus has finished scanning remove the CD from your CD ROM drive 18 Responding to emergencies Create Emergency Disks Create Emergency Disks See If you need to use Emergency Disks on page 19 Emergency Disks are used to start your computer in case of a problem If your computer can start from a CD you can use the product CD in place of Emergency Disks and do not need to create them If you downloaded the software or do not have a CD the program for creating Emergency Disks NED exe is included in the download Navigate to the location to which you downloaded the software and begin with step 3 of these instructions If you cannot start your computer from a CD you can use these instructions to create Emergency Disks on another computer or go to http www symantec com techsupp ebd html and download the Emergency Disk program Follow the instructions included in the download to create the Emergency Disks You will need several formatted 1 44 MB disks To create Emergency Disks from the CD Insert the CD into the CD ROM drive Click Browse CD Double click the Support folder Double click the Edisk fol
47. ILS OF ITS ESSENTIAL PURPOSE IN NO EVENT WILL SYMANTEC OR ITS LICENSORS E TO YOU FOR ANY SPECIAL CONSEQUENTIAL INDIRECT OR SIMILAR DAMAGES INCLUDING ANY LOST PROFITS OR LOST DATA ARISING OUT OF THE USE OR NABILITY TO USE THE SOFTWARE EVEN IF SYMANTEC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES N NO CASE SHALL SYMANTEC S OR ITS LICENSORS LIABILITY EXCEED THE PURCHASE PRICE FOR THE SOFTWARE The disclaimers and limitations set forth above will apply regardless of whether You accept the Software ies 7 U S Government Restricted Rights RESTRICTED RIGHTS LEGEND All Symantec products and documentation are commercial in nature The software and software ocumentation are Commercial Items as that term is defined in 48 C F R section 2 101 consisting of Commercial Computer Software and Commercial Computer Software Documentation as such terms are defined in 48 C F R section 252 227 7014 a 5 and 48 C F R section 252 227 7014 a 1 and used in 48 C F R section 12 212 and 48 C F R section 227 7202 as applicable Consistent with 48 C F R section 12 212 48 C F R section 252 227 7015 48 C F R section 227 7202 through 227 7202 4 48 C F R section 52 227 14 and other relevant sections of the Code of Federal Regulations as applicable Symantec s computer software and computer software ocumentation are licensed to United
48. Information dialog box click Add In the Add Private Information dialog box under Type Of Information To Protect select a category In the Descriptive Name text box type a description to help you remember why you are protecting this information In the Information To Protect text box type the information that you want to block from being sent over insecure Internet connections Under Secure this private information in select the Internet programs in which Privacy Control should block this information Your options are Web browsers Instant messengers Email programs Click OK Modify or remove private information You can modify or remove private information at any time To modify or remove private information 1 2 In the main window double click Privacy Control In the Privacy Control window click Private Information Select the private information that you want to change or remove Select one of the following Modify Remove Protecting your privacy 171 Customize Privacy Control 5 Click OK Customize Privacy Control Privacy Control protects four areas Private Blocks specific text that you do not want sent over the Information Internet Cookie Blocking Stops Web sites from retrieving personal information stored in cookie files Browser Privacy Protects information about your browsing habits Secure Prevents users from establishing secure connections to Connections online stor
49. Office Plug in status 1 At the top of the main window click Options If a menu appears click Norton AntiVirus 2 Inthe left pane of the Options window under Other click Miscellaneous 3 Verify that Office Plug in is enabled 70 Basics Temporarily disable Norton Internet Security Temporarily disable Norton Internet Security See About Norton Internet Security accounts on page 149 There may be times when you want to temporarily disable Norton Internet Security or one of its features For example you might want to see if Norton Internet Security is preventing a Web page from appearing correctly Only Supervisor users can temporarily disable Norton Internet Security Child and Teenager users cannot disable any portion of Norton Internet Security Disabling Norton Internet Security also disables all of the individual features To temporarily disable Norton Internet Security 1 In the main window click Security 2 Inthe lower right corner of the window click Turn Off Norton Internet Security is automatically turned back on the next time that you start your computer You can also disable individual security features For example you might want to see if the Personal Firewall is preventing a program from operating correctly To disable a protection feature 1 In the main window select the feature that you want to disable 2 Inthe lower right corner of the window click Turn Off Basics 71 C
50. Programs tab select the Location you want to customize 3 Check Turn on Automatic Program Control 4 Click OK Scan for Internet enabled programs Scanning for Internet enabled programs lets you quickly customize Internet access for multiple programs Program Scan scans the computer for programs that it recognizes and suggests appropriate settings for each program To scan for Internet enabled programs 1 Inthe main window double click Personal Firewall 2 Inthe Personal Firewall window on the Programs tab click Program Scan 3 Select the disk or disks on your computer that you want to scan 4 Click Next 5 Inthe Program Scan window review the list of Internet enabled programs that Program Scan identified 6 Do one of the following a Check the boxes next to the programs you want to configure To customize the Internet access settings Program Scan suggested for a program select it then click Modify To leave a program unconfigured uncheck the box next to the program You will receive an alert the next time this program accesses the Internet 7 Click Next 8 Ifyou have turned on Network Detector select the Locations that should use these settings 9 Click Finish 10 Click OK 12 Guarding against intrusion attempts Customize firewall rules Manually add a program to Program Control See Customize Add programs to Program Control to strictly control the firewall programs ability to access the Int
51. Rescue Disks After you have created the Rescue Disk set you are prompted to test your disks This requires that you restart your computer using the Rescue Disks O If you created Rescue Disks on a network drive a second physical hard disk or some other large capacity disk drive you will have to restart into DOS from an external floppy disk navigate to the Rescue folder and run Rescue exe To test your Rescue Disks 1 Close all open Windows programs See My Rescue 2 Insert the disk labeled Basic Rescue Boot Floppy Disk Disk does not into drive A then click Restart Siler ON page 203 If the Rescue Disk screen appears on your monitor the Rescue Disk works properly If the Rescue Disk screen does not appear you have several options for correcting the problem 74 Basics Create and use Rescue Disks 3 Press Escape to exit to DOS 4 Remove the disk from drive A and slide open the plastic tab on the back of the disk to write protect it 5 Restart your computer Update your Rescue Disks See Test your Rescue Disks on page 73 You can update your Rescue Disks as often as you like Rescue Disk lets you update your basic Rescue Disk set without having to recreate them If you are updating a floppy disk set make sure that your disks are not write protected before you begin To update your Rescue Disks 1 Inthe main window click Rescue 2 Inthe Rescue Disk window under Select Destination Drive click dri
52. SUSI tae ae ara ideciensueh ak E EAEE For more information Look up glossary terms ceeseesseessessesseesteseeseesees 78 Use online Help maera a 78 Readme fileren na n 79 Access the User s Guide PDF sssssssssssssssssessssssssss 79 Symantec products on the Wep eccere 80 Subscribe to the Symantec Security Response newsletter eeeccseeseesseeseeseeees 82 Options Set Norton Internet Security options ow 84 About General options About LiveUpdate options About Firewall options oo eeesseesseees About Email options c eeeecessesssesesseesnesesseeeeeeee Password protect Norton Internet Security OPHONS anh arcades O E ude Reset options password Customize Norton AntiVirus 0 esseesseeseeseeseereeseeers About System Options 0 ceceeeeeseeessseseeseeseeneese About Internet Options 0 0 eceseeseeseecseesseeeseeeees About Other Options 0 eseessesseeseeeseeeseeeneeeeeeeees Set Norton AntiVirus Options eee If you need to restore default Norton AntiVirus settings ececcsecsesssessseesseeenes 92 Password protect Norton AntiVirus options 93 Keeping current with LiveUpdate About program updates About protection updates Obtain updates using LiveUpdate ou eeseeeeeseeeee 97 When you Should update 0 eeseeecsesssseescsseceesesneeseneeese 97 9 10 Contents Chapter 7 If you can t use LiveUpdate 0 ccceeeeseeseessesteeeeeees Set LiveUpdate to Interactive o
53. What to do if a virus is found If a virus is found by Auto Protect Erases both the threat and the infected file Select Delete if Repair is not successful Replace the deleted file with the original program file or backup copy If the virus Trojan horse or worm is detected again your original copy is infected Stops the current operation to prevent you from using an infected file This action does not solve the problem You will receive an alert the next time that you perform the same activity Adds the file that is suspected of containing a threat to the Exclusions list When you add a file to the Exclusions list the file is excluded from any future virus scans unless you remove it from the list Select this option only if you know that the file does not contain a virus Continues the current operation Select this option only if you are sure that a virus Trojan horse or worm is not at work You will receive an alert again If you are not sure what to do select Do not open the file but leave the problem alone If a file cannot be repaired you receive an alert telling you that the repair was not made and recommending that you quarantine the file You have the same options as those listed in the table with the exception of Repair the infected file If you are using Windows 2000 XP If a virus is found and either repaired or automatically deleted by Auto Protect in Windows 2000 XP you receive an alert telling you which fi
54. You shall cease use of and destroy all copies of the Software The disclaimers of warranties and damages and imitations on liability shall survive ermination Software and documentation is delivered Ex Works California U S A or Dublin Ireland respectively ICC INCOTERMS 2000 This Agreement may only be modified y a License Module that accompanies this icense or by a written document that has been signed by both You and Symantec Should You have any questions concerning this Agreement or if You desire to contact Symantec for any reason please write to i Symantec Customer Service 555 International Way Springfield OR 97477 U S A ii Symantec Authorized Service Center Postbus 1029 3600 BA Maarssen The Netherlands or iii Symantec Customer Service 1 Julius Ave North Ryde NSW 2113 Australia This Software utilizes the Standard Template Library a C library of container classes algorithms and iterators Copyright 1996 1999 Silicon Graphics Computer Systems Inc Copyright 1994 Hewlett Packard Company Contents Chapter 1 Chapter 2 Chapter 3 Responding to emergencies f your product won t install 0 eeesseesseeeseeseeseeneeees f your computer won t Start eesseesseeeseeseeeseeereeeseeees Scan for viruses using the CD Create Emergency Disks eeecceesecssesesseeseesseeseesseeseeees f you need to use Emergency Disks eseecssecseeseees 19 How to maintain protection
55. a a eee a deen 194 Why can t I print to a shared printer or connect to a computer on my local MECWOPK anhini n 194 How can a Web site get my browser informatio sadciaucanwlasiicdaniaaeh 195 Troubleshoot Norton AntiSpam 196 Why do I still receive Spam essen 196 How will email messages from addresses on my Blocked list be handled 196 What if I mistakenly put an address on the BIOCK EG iSt e Rieu 196 Why did an email message someone sent me never arrive sss 196 How do I keep my protection updated 197 Why do I need a subscription to spam definitions 5 ccsscbettedeovscsnantaccatatedsecrenesenneretes 197 Why does so much spam include clusters of meaningless Characters ccssecsseesseeeees 197 14 Contents Troubleshoot Ad Blocking cecssseecsssecssecssessssecesseees 198 Does Ad Blocking block all advertising on the current Page sccescscvecssereccvwecrnesccesecsesess 198 Will Popup Window Blocking block all pop ups or only pop up ads eee 198 Are there security issues associated with advertisements oo seeeecsssesecssseeesseesteceenneeees 198 Troubleshoot Norton AntiVirus u 199 Auto Protect does not load when I start IMY COMPULEN siirsin a 199 I have scanned and removed a virus but it keeps infecting my file eee 200 Norton AntiVirus cannot repair my infected Alesa alana a ania 201 I can t receive email messages ou eee 201 I can t send em
56. a destination address on a network without establishing a connection A file that some Web servers put on your disk when you view pages from those servers Cookies store preferences create online shopping carts and identify repeat visitors A user or program that takes up all of the system resources by launching a multitude of requests leaving no resources and thereby denying service to other users A TCP IP protocol that assigns a temporary IP address to each device on a network DSL and cable routers use DHCP to allow multiple computers to share a single Internet connection A connection in which a computer calls a server and operates as a local workstation on the network DNS Domain Name System DNS server Domain Name System server domain DOS window download driver encryption Ethernet executable file Glossary The naming system used on the Internet DNS translates domain names such as www symantec com into IP addresses that computers understand such as 206 204 212 71 A computer that maps domain names to IP addresses When you visit www symantec com your computer contacts a DNS server that translates the domain name into an IP address 206 204 212 71 The common Internet address for a single company or organization such as symantec com See also host name A method of accessing the MS DOS operating system to execute DOS programs through the Windows graphical environmen
57. about networks Gateway MAC id Gateway IP address Subnet identifier Interface type Network Detector alerts include detailed information about networks that your computer joins The details section of a Network Detector alert includes information about the following The Media Access Control MAC address of this network s router The IP address of this network s router The subnet mask used on this network How your computer is connected to this network Customizing protection for different locations j 127 About Network Detector Interface Information about the network adapter that made the connection connection description Domain This network s domain name if available To learn more about networks In the Network Detector alert click Show details Customize a location s settings You can customize the Program Control and Trusted Zone settings for the predefined locations and any new locations that you create Any changes that you make will apply to all of the networks that use the location To customize a location s settings 1 Inthe main window double click Personal Firewall 2 Inthe Personal Firewall window do one of the following To change Automatic Program Control settings click the Programs tab To change Trusted Zone settings click the Networking tab 3 In the Settings for menu select the location you want to customize 4 When you are finished making changes click OK Remov
58. acters Special characters like and that act as placeholders for one or more characters Wildcards let you match several items with a single specification worm A program that replicates without infecting other programs Some worms spread by copying themselves from disk to disk while others replicate only in memory to slow a computer down 220 Glossary Index A access Block Traffic 59 options 85 Security Check 58 Visual Tracking 58 59 accounts creating 150 154 creating with Parental Control Wizard 150 levels 149 logging on 156 Not Logged In 150 passwords 154 set startup 154 using Windows accounts 155 activate and register 43 software 43 activation 24 55 active content protection from 105 troubleshooting 193 ActiveX controls 193 Activity Log checking 188 viewing 188 Ad Blocking 180 about 25 enabling and disabling 66 identifying ads to block 180 Ad Blocking 180 continued modifying text strings 182 Ad Trashcan 179 adding files to Quarantine 146 addresses adding allowed 62 adding blocked 63 importing allowed 62 Adobe Acrobat Reader installing 79 using to view PDF 79 advertisements Ad Trashcan 179 blocking 180 filters 180 Alert Assistant 26 56 alerts Alert Assistant 56 Inoculation 145 Intrusion Detection 118 Network Detector 126 New Location 56 overview 56 Worm Blocking 144 Allowed list 62 applications accessing Internet See Internet enabled programs at risk files about 139
59. age under the heading home amp home office small business click Continue 3 Onthe home amp home office small business page click start online support 4 Follow the links to the information that you want If you cannot find what you are looking for using the links on the introduction page try searching the Web site 192 Troubleshooting Explore the Symantec service and support Web site To search the Symantec service and support Web site 1 On the left side of any Symantec Web site page click search On the search page type a word or phrase that best represents the information for which you are looking Use the following guidelines when searching the Symantec Web site Type a single word in lowercase letters to find all occurrences of the word including partial matches For example type install to find articles that include the word install installation installing and so on Type multiple words to find all occurrences of any of the words For example type virus definitions to find articles that include virus or definitions or both Type a phrase enclosed in quotation marks to find articles that include this exact phrase Type a plus sign in front of all of the search terms to retrieve documents containing all of the words For example Internet Security finds articles containing both words For an exact match type the search words in uppercase letters To search for multiple phrases enclo
60. ages as spam Light filtering Some spam is correctly identified Rarely identifies personal email messages as spam 5 Click OK Identify authorized senders To tell Norton AntiSpam that you want to receive email from a given address add it to the Allowed list If you did not import your email address book to your Allowed list during installation you can do so at any time after installation You can import some or all of the addresses You can also add names to the Allowed list individually To import your existing address book 1 Inthe main window double click Allowed List 2 Inthe Allowed List window click Import Address Book 3 Inthe Import Address Book window uncheck any ist 4 Click OK addresses that you do not want to add to your Allowed 5 Click OK to close the Allowed List window Basics 63 Manage how Norton AntiSpam detects spam To add names to your allowed list 1 Inthe main window double click Allowed List 2 Inthe Allowed List window click Add Add Address to Allowed List First Name Trusted Last Name s ender Email Address required sender symantec com 3 In the Add Address to Allowed List dialog box type the email address you want to allow and optionally the first and last name of the sender 4 Click OK to close the Add Address to Allowed List dialog box 5 Click OK to close the Allowed List window Identify senders of spam email messages When yo
61. ail messages eects 202 Troubleshoot Rescue Disks 0 seecseeeseeseeceeseecseereees 203 My Rescue Disk does not Work eeeesseeeeees 203 I cannot start from drive A ssssssssssssssssssssssssssssss 204 I get an error when testing basic Rescue DISKS issscssccsonvccdosasecssovivece Sescsedesteassieescsuecoease 204 Service and support solutions Glossary Index If you have an emergency read these sections to try to find the solution to your problem Common problems include Virus threats Trouble restarting your computer Lost or missing files Possible disk damage If you purchased this product to address any of the problems listed above read these sections first Immediate installation of the product may not always provide the best solution to your problem 16 Responding to emergencies If your product won t install If your product won t install See If your computer won t start on page 17 You must be running Windows in order to install your Symantec product If you try to install and your computer has a virus and you choose not to run the Symantec Pre Install Scanner start over and run the Symantec Pre Install Scanner as directed If you can t run the Symantec Pre Install Scanner but you can connect to the Internet go to http security symantec com and run virus detection from the Symantec Security Check Web site If you can t start your computer you need to start from an u
62. al boot disk rather than the Rescue Boot Disk In this case use the boot disk or startup disk that came with your computer If your computer is set up with more than one operating system such as Windows 2000 and Windows 98 you may need to modify the Rescue Boot Disk get an error when testing basic Rescue Disks See Create and use Rescue Disks on page 71 If you get the message Non system disk replace the disk and press any key when testing your Rescue Disks the Rescue program may not have prepared the floppy boot files correctly Troubleshooting j 205 Troubleshoot Rescue Disks To repair the Rescue Boot Disk without having to reformat the disk and create a new Rescue Disk set 1 uu FWN Remove the Rescue Boot Disk and restart your computer Insert the Rescue Boot Disk into the floppy disk drive On the Windows taskbar click Start gt Run In the Run dialog box type SYS A Click OK 206 Troubleshooting Troubleshoot Rescue Disks Service and support solutions The Service amp Support Web site at http service symantec com supports Symantec products Customer Service helps with nontechnical issues such as orders upgrades replacements and rebates Technical Support helps with technical issues such as installing configuring or troubleshooting Symantec products Methods of technical support and customer service can vary by region For information on support offerings in your region check th
63. all 2 Inthe Personal Firewall window on the Networking tab select the zone containing the computer you want to remove 3 If you have turned on Network Detector select the Location you want to customize 4 Select the computer that you want to remove Click Remove au When you have finished removing computers click OK Customize firewall rules How firewall Firewall rules control how the Personal Firewall protects your computer from malicious incoming traffic programs and Trojan horses The firewall automatically checks all data coming in or out of your computer against these rules rules are processed Firewall rules are processed in a set order based on their types System rules are processed first followed by program rules and then Trojan horse rules Once a rule that blocks or permits communications is matched all remaining rules are ignored In other words additional rules that match this type of communication are ignored if they appear below the first rule that matches If no matching rule is found the communication is blocked 109 no Guarding against intrusion attempts Customize firewall rules Create new firewall rules See About Norton Internet Security accounts on page 149 Program Control helps you create firewall rules as you use the Internet Supervisor and Adult users can create and modify firewall rules Child and Teenager users cannot make any changes to firewall rul
64. allation of a product You must activate the product within 15 days of installing it Product activation is completely separate from registration Your activation information and registration information reside on separate servers with no link between the different sets of data When to activate your product During installation you are asked to enter a product key After you have installed the product activate it by sending the product key to the Symantec servers You can activate your product by clicking Activate Now in the Configuration Wizard that runs immediately after installation If you choose not to activate at that time you will receive alerts that will remind you to activate the product You can click Activate Now in the alerts to activate the product Activation should take just a few minutes If you do not activate the product within 15 days of installing it the product will stop working You can activate it after the 15 days have elapsed but you will not be protected until you do Locate the product key The product key can most frequently be found on a sticker on your CD sleeve If it is not there then it will be on an insert in your product package If you have purchased the product on DVD look for the sticker on your DVD package If you have downloaded the product from the Symantec Store the product key is stored on your computer as part of the download process Feature summary 25 Security protection feat
65. ally provides information about the Web page you last visited and the type of computer that you re using Computers include some basic security features but they might not be enough to protect your personal information Privacy Control helps protect your privacy by giving you several levels of control over cookies and other information that your browser sends to Web sites Identify private information to protect Many Web sites ask for your name email address and other personal information While it is generally safe to provide this information to large reputable sites malicious sites can use this information to invade your privacy It is also possible for people to intercept information sent via the Web email and instant messenger programs Privacy Control lets you create a list of information that you want to remain private If users attempt to send protected information over the Internet Privacy Control can warn them about the security risk or block the connection All users on a protected computer share a single Private Information list 170 Protecting your privacy Identify private information to protect Add private information You must add information that you want to protect to the Private Information list All users on a single computer share a single Private Information list To add private information 1 7 In the main window double click Privacy Control then click Private Information In the Private
66. ameters that define how a firewall reacts to specific data or network communications A firewall rule usually contains a data pattern and an action to take if the pattern is found When the data that makes up a file is stored in noncontiguous clusters across a disk A fragmented file takes longer to read from the disk than an unfragmented file An IP packet that has been split into parts Packets are fragmented if they exceed a network s maximum packet size but malicious users also fragment them to hide Internet attacks An application protocol used for transferring files between computers over TCP IP networks such as the Internet A file attribute that makes files harder to access and more difficult to delete than other files It also prevents them from appearing in a DOS or Windows directory list The name by which most users refer to a Web site For example www symantec com is the host name for the Symantec Web site Host names are translated to IP addresses by the DNS HotSync HTML Hypertext Markup Language ICMP Internet Control Message Protocol IGMP Internet Group Management Protocol IMAP Internet Message Access Protocol version 4 infrared IR port IP Internet Protocol IP address Internet Protocol address ISP Internet service provider Java Glossary The synchronization software for Palm OS handheld devices The language used to create Web pages An extension to
67. an is complete a scan summary appears 5 When you are done reviewing the summary click Finished If problems are found during a scan See What to do if a virus is found on page 139 Create and See Schedule a custom scan on page 135 At the end of a scan a summary report appears to tell you what Norton AntiVirus found during the scan Ifa virus was found and you have requested that Norton AntiVirus repair the file automatically it is listed as repaired If the file cannot be repaired it can be quarantined or deleted use custom scans You can create a custom scan if you regularly scan a particular segment of your computer and don t want to have to specify the segment to be scanned every time Protecting disks files and data from viruses 133 Create and use custom scans You can also schedule the custom scan to run automatically You can delete the scan when it is no longer necessary For example if you are working on a project for which you need to frequently swap files with others you might want to create a folder into which you copy and scan those files before using them When the project is done you can delete the custom scan for that folder To create a custom scan 1 On the left side of the main window under Norton AntiVirus click Scan for Viruses 2 Inthe Scan for Viruses pane under Actions click New 3 In the opening window of the Norton AntiVirus Scan Wizard click Next 4 Select the
68. ange options Your options are General See About General options on page 85 LiveUpdate See About LiveUpdate options on page 85 Firewall See About Firewall options on page 85 Email See About Email options on page 86 About General options See Password protect Norton Internet Security options on page 86 General options let you control when Norton Internet Security starts protect program settings with a password and choose visual elements you want to display About LiveUpdate options See Keeping current with LiveUpdate on page 95 LiveUpdate options let you enable and disable Automatic LiveUpdate which automatically checks for updates when you are connected to the Internet For maximum security you should leave this option checked You can choose the components you want Automatic LiveUpdate to monitor You can also choose whether Automatic LiveUpdate updates the components in the background or alerts you that there are updates available About Firewall options Firewall options let you activate advanced protection features and customize the ports your computer uses to view Web pages Most people will not need to make any changes to these settings 85 86 Options Password protect Norton Internet Security options About Email options Email options let you control how Norton Internet Security notifies you when it is scanning email messages for private info
69. appears You may not be able to access the Norton AntiVirus Windows Explorer menu depending on your computer s configuration To display the Norton AntiVirus button and menu 1 On the View menu click Toolbars gt Norton AntiVirus 2 Click the arrow to the right of the button to view your options Your options are View Status Launches Norton AntiVirus and displays the Status window with system status See Check Norton AntiVirus configuration status on page 68 View Displays the Quarantine area and the Quarantine files currently stored there See If Norton AntiVirus places files in Quarantine on page 146 View Activity Displays the Log Viewer which shows Log you various Norton AntiVirus activities such as scans performed and problems found See Monitor Norton AntiVirus activities on page 188 View Virus Connects you to the Symantec Security Encyclopedia Response Web page from which you can search for information on all types of viruses Launch Scan Opens Norton AntiVirus in the Scan for Menu Viruses pane on which you can specify a scan to run Basics 55 Activate your product Activate your product amp Product activation reduces software piracy and ensures hat you have received genuine Symantec software You must activate your product within 15 days of installing it or the product will stop working If you did not activate your product using the Configuration Wizard y
70. approved users can access the Internet and your network To set or change your own password 1 Inthe main window click User Accounts 2 Inthe User Accounts screen select your account 3 Click Change Password 4 Inthe Change Password dialog box type your old password then type your new password If the account did not previously have a password the Old Password field is unavailable 5 Click OK Adult users can change passwords for Teenager and Child accounts Supervisor users can change any other accounts passwords If you change an account password be sure to inform everyone who uses that account Creating accounts for multiple users 155 Assign Norton Internet Security account types to Windows accounts To set or change passwords for other users 1 Inthe main window click User Accounts 2 Inthe User Accounts screen select the account that you want to change 3 Click Properties 4 Inthe Account Properties dialog box in the Password and Confirm Password text boxes type a new password 5 Click OK Assign Norton Internet Security account types to Windows accounts If you have created Windows accounts for multiple users you can use these accounts instead of creating new Norton Internet Security accounts Your Norton Internet Security accounts use the same names as your Windows accounts To assign Norton Internet Security account types to Windows accounts 1 Inthe main window click User Accounts 2 Inthe Use
71. ate your virus definitions with LiveUpdate and scan again If that does not work read the information in the report window to identify the types of items that cannot be 148 What to do if a virus is found Look up viruses on the Symantec Web site repaired and then take one of the following actions depending on the file type Infected files with exe doc dot Use the Repair Wizard to solve the or xls file name extensions any problem file can be infected For more information see the online Help Hard disk master boot record boot Replace using the Rescue Disks or your record or system files such as operating system disks 10 SYS or MSDOS SYS and floppy disk For more information see the online boot record and system files Help Look up viruses on the Symantec Web site The Symantec Web site contains a complete list of all known viruses and related malicious code along with descriptions You must be connected to the Internet to look up viruses To look up viruses 1 On the left side of the main window under Norton AntiVirus click Reports 2 Inthe Reports pane on the Online Virus Encyclopedia line click View Report The Symantec Web site opens in your Internet browser 3 Use the links on the Web page to access the virus information for which you are looking Creating accounts for multiple users If you have chosen to install the Accounts feature of Norton Internet Security you can creat
72. ategories Additional sites to block for all users unwantedads com Exceptions 4 Inthe Sites window click Specify blocked sites 5 Under Web site categories to block check the categories that you want to block for this account 6 Click OK 7 When you are done specifying sites click OK Block additional sites Parental Control lets you restrict access to specific Web sites or domains that are not included in one of the categories of blocked sites If you block a domain all Web sites within the domain are included For example if you block the domain uninvitedads com Parental Control will block all Web sites at that domain including www uninvitedads com and images uninvitedads com If you block images uninvitedads com only that Web site will be blocked Controlling individuals Internet use 163 Customize Parental Control To block or unblock specific sites 1 Inthe main window double click Parental Control 2 Inthe Parental Control window in the Parental Control settings for drop down list select the account that you want to change Click Sites In the Sites window click Specify blocked sites Click Add In the Add Web site to Blocked List window type the URL of the site that you want to add Click OK Repeat the previous three steps for each Web site that you want to add au Fw CO N 9 When you are done adding sites click OK Create exceptions for specific sit
73. b sites 193 U Uniform Resource Locator URL 115 uninstalling 46 Norton AntiVirus 46 Norton Internet Security 46 other antivirus programs 36 previous copies of Norton Internet Security 36 unknown viruses 30 updating from Symantec Web site 98 Rescue Disks 74 virus protection 98 URLs Uniform Resource Locators about 115 limiting access 164 User s Guide PDFs on CD 79 230 Index User s Guide PDFs continued opening 80 V version number checking 49 virtual private network VPN 34 virus alert options 142 Virus Encyclopedia 54 81 virus protection alerts 91 system scans 131 updates 29 virus repair in Windows 2000 XP 143 in Windows 98 98SE Me 142 viruses automatic protection 29 avoiding 20 descriptions 29 found by Auto Protect 142 found during a scan 140 looking up on the Symantec Web site 148 submitting to Symantec 147 unknown 30 viewing descriptions 148 Visual Tracking 58 59 trace attack from AutoBlock 59 from Statistics 59 VPN virtual private network 34 wW Web filtering service 96 sites blocking 161 submitting to Symantec 165 Symantec 80 98 191 troubleshooting 193 Web assistant about 25 57 using 57 viewing 57 Windows operating systems 31 safe mode 199 Windows 2000 system requirements 32 Windows 98 98SE Me system requirements 32 Windows Explorer toolbar displaying Norton AntiVirus 53 Windows Me system requirements 32 Windows XP system requirements 32 wiza
74. ck select how you want those updates to be applied Your options are Automatically LiveUpdate checks for and installs update my protection updates without prompting protection you LiveUpdate displays an alert when a protection update has been downloaded You should still run LiveUpdate occasionally to check for program updates Notify me LiveUpdate checks for protection updates and asks if you want to install them 6 Click OK To delete the schedule for Automatic LiveUpdate disable Automatic LiveUpdate To disable Automatic LiveUpdate 1 At the top of the main window click Options If a menu appears click Norton Internet Security If you set a password for Options you must provide the password before you can continue 2 In the Options dialog box on the LiveUpdate tab uncheck Enable Automatic LiveUpdate 3 Click OK Keeping current with LiveUpdate About your subscription About your subscription See About protection updates on page 96 Your Symantec product includes a complimentary limited time subscription to protection updates that are used by your product When the subscription is due to expire you are prompted to renew your subscription If you do not renew your subscription you can still use LiveUpdate to obtain program updates However you cannot obtain protection updates through LiveUpdate or from the Symantec Web site and will not be protected against newly discovered threats Also
75. cosszes yans cdccensbatactesecss 145 f Norton AntiVirus places files in Quarantine 46 f Norton AntiVirus cannot repair a file ee 147 Look up viruses on the Symantec Web site 148 12 Contents Chapter 11 Chapter 12 Chapter 13 Chapter 14 Chapter 15 Creating accounts for multiple users About Norton Internet Security accounts 149 Norton Internet Security accounts and Windows accounts sseeessseecsseecesteeeeneeeeneees 150 Create Norton Internet Security accounts 150 Set the startup account ou eee Set or change account passwords Assign Norton Internet Security account types to Windows CCOUNIS aassesiaga asses tanincuats 155 Log on to Norton Internet Security ceeeseeseeeees 156 Customize Norton Internet Security accounts 157 Controlling individuals Internet use About Parental Control o c ccccccccesseessesseeseestesseeseesnees 159 Enable or disable Parental Control 0 00 160 Customize Parental Control o c ceccceesscessesseesteeseeseeeees 161 Restrict Web Site ACCESS o seeccecessesssessessesteeseeees 161 Restrict programs that access the Internet 165 Restrict NEWS8TOUP ACCESS eeessecseesseesseesseesees 166 Protecting your privacy Identify private information to protect eee Add private information Modify or remove private information Customize Privacy Control eeeseeeseeeeeees Set the Privacy Level osn
76. ctions 1 2 In the main window double click Privacy Control In the Privacy Control window in the Privacy Control settings for drop down list select the account that you want to change Click Custom Level In the Customize Privacy Settings dialog box check or uncheck Enable Secure Connections https Click OK See Manage how Norton AntiSpam detects spam on page 61 Norton AntiSpam uses a pattern matching engine that automatically compares the contents of incoming email messages to a list of spam characteristics If the message contains many spam characteristics it is more likely to be spam than a message that contains few spam characteristics Based on this analysis Norton AntiSpam estimates the likelihood that the message is spam Norton AntiSpam uses the settings you ve chosen to determine which messages are marked as spam If Norton AntiSpam is set to Low messages must contain many spam characteristics before they are flagged as spam If Norton AntiSpam is set to High messages that contain only a few spam characteristics are flagged Some email servers use SSL Secure Sockets Layer connections to encrypt connections between your computer and the server Norton AntiSpam cannot scan email messages received via SSL connections Customize Norton AntiSpam Customize your protection by identifying email addresses and particular text strings that should and should not be filtered When Norton AntiSpam enc
77. curity accounts 3 Inthe Choose account manager screen click Create Norton Internet Security accounts 4 Click Next E Parental Control Wizard Create accounts Choose a name and an account type for each Norton Internet Security account you would like to create Afterschool Child Bill Teenager X X Chris Child MomandDad Adult Ej There are four account types Child Limited access to Internet programs and content Cannot change settings Teenager Access to more Internet programs and content than Child users Cannot change settings Adult Can change settings for their own account Supervisor Can change settings for any user You can fine tune account settings in Parental Control Tip You can create group accounts if your children are close in age or if you want several children to have the same account restrictions lt Back Next gt Close 5 Inthe Create accounts screen type one or more account names 6 On the account level menus select an appropriate account level for each account 7 Click Next In the Choose passwords screen in the Password and Confirm Password text boxes type a password for this user o 151 152 Creating accounts for multiple users Create Norton Internet Security accounts 9 Click Next If you have created more than one account repeat the previous two steps with each account Parental Control Wizard Set star
78. d window do one of the following a To block a string on all Web sites click Defaults To block a string on a Web site in the list select the site s name To block a string on a Web site not in the list click Add Site then in the New Site Domain dialog box type the site s address 4 On the Ad Blocking tab click Add 5 Inthe Add New HTML String dialog box select the action that you want to take 6 Type an HTML string to block or permit Click OK 8 When you are done click OK to close the Advanced window 9 Click OK to close the Ad Blocking window Modify or remove an Ad Blocking string If you later decide that an Ad Blocking string is too restrictive not broad enough or not appropriate you can change or remove it To modify or remove an Ad Blocking string 1 Inthe main window double click Ad Blocking 2 In the Ad Blocking window click Advanced 182 Blocking Internet advertisements Use text strings to identify ads to block or permit 3 Inthe left side of the Advanced window do one of the following To modify or remove a string in the Defaults list click Defaults To modify or remove a site specific string click the site s name 4 Inthe HTML string list select the string that you want to change 5 Doone of the following To modify a string click Modify then type your changes To remove a string click Remove 6 When you are done click OK to close the Advanced window
79. der Double click NED exe In the welcome window click OK Nou FWRN Label the first disk as instructed and insert it into drive A 8 Click Yes 9 Repeat steps 7 and 8 for the subsequent disks 10 When the procedure is complete click OK 11 Remove the final disk from drive A 12 Test the first disk in the set to ensure that you can restart your computer with it 13 Store the Emergency Disk set in a safe place Responding to emergencies 19 If you need to use Emergency Disks If you need to use Emergency Disks See Create If you have not created Rescue Disks you can use Emergency Disks Emergency Disks to restart your computer and scan for on page 18 viruses or run DOS based recovery utilities To use Emergency Disks 1 Insert Emergency Disk 1 into drive A and restart your computer The Emergency program runs in DOS 2 Select the program that you want to run For DOS program help press the F1 key while you are running the program 3 Follow the on screen instructions for inserting and removing the Emergency Disks 4 When the Emergency program is done remove the Emergency Disk from drive A and restart your computer 20 Responding to emergencies How to maintain protection How to maintain protection When Norton AntiVirus is installed you have complete virus protection However new viruses and are created constantly Viruses can spread when you start your computer from an infected disk or whe
80. done click OK Edit scheduled scans You can change the schedule of any scheduled scan including the weekly full system scan To edit a scheduled scan 1 On the left side of the main window under Norton AntiVirus click Scan for Viruses 2 Inthe Scan for Viruses pane under Task select the scan that you want to reschedule O If you click the button next to the scan name the scan runs 3 Under Schedule Task click Schedule 4 Change the schedule as desired 5 Click OK Protecting disks files and data from viruses 137 Schedule scans Delete a scan schedule You can delete any scan schedule Deleting the schedule does not delete the scan To delete a scan schedule 1 On the left side of the main window under Norton AntiVirus click Scan for Viruses 2 In the Scan for Viruses pane under Task select the scan whose schedule you want to delete db If you click the button next to the scan name the scan runs 3 Under Schedule Task click Schedule 4 Inthe Schedule dialog box check Show multiple schedules 5 Select the schedule or schedules that you want to delete 6 Click Delete Click OK 138 Protecting disks files and data from viruses Schedule scans See If Norton AntiVirus places files in Quarantine on page 146 If after reviewing the information in this chapter you have not resolved your problem see Responding to emergencies on page 15 and Troubleshooting on page 191
81. e Norton AntiSpam folder Displays the Norton AntiSpam main window Basics 53 Start Norton AntiVirus Start Norton AntiVirus After installation Norton AntiVirus automatically protects any computer on which it is installed You do not have to start the program to be protected To start Norton AntiVirus Do one of the following On the Windows taskbar click Start gt Programs gt Norton AntiVirus gt Norton AntiVirus 2004 On the Windows XP taskbar click Start gt More Programs gt Norton AntiVirus gt Norton AntiVirus 2004 On the desktop double click the Norton Internet Security icon Use the Norton AntiVirus icon in the Windows system tray See Customize Norton AntiVirus adds an icon to the Windows system Norton AntiVirus tray at the end of the Windows taskbar Use the icon in on page 88 the Windows system tray to open Norton AntiVirus and to enable or disable Auto Protect To use the Norton AntiVirus Windows system tray icon In the Windows system tray right click the Norton AntiVirus icon then on the tray icon menu select the option that you want Use the Windows Explorer toolbar Norton AntiVirus adds a button and menu to Windows Explorer 54 Basics Use the Windows Explorer toolbar When you first open Windows Explorer after installing Norton AntiVirus you may not see the Norton AntiVirus button and menu You might have to restart Windows before the toolbar button
82. e appropriate Web site listed in the sections that follow If you received this product when you purchased your computer your computer manufacturer may be responsible for providing your support Customer service The Service amp Support Web site at http service symantec com tells you how to Subscribe to Symantec newsletters a Locate resellers and consultants in your area Replace defective CD ROMs and manuals Update your product registration Find out about orders returns or a rebate status Access Customer Service FAQs Post a question to a Customer Service representative Obtain product information literature or trialware 208 Service and support solutions Technical support For upgrade orders visit the Symantec Store at http www symantecstore com Technical support Symantec offers two technical support options for help with installing configuring or troubleshooting Symantec products Online Service and Support Connect to the Symantec Service amp Support Web site at http service symantec com select your user type and then select your product and version You can access hot topics Knowledge Base articles tutorials contact options and more You can also post a question to an online Technical Support representative PriorityCare telephone support This fee based in most areas telephone support is available to all registered customers Find the phone number for your product at the
83. e ceeceeecssesseesesseseeseeeeeees 20 Avoid viruses and threats cesseseseseesseeseeees 20 Prepare for emergencies 0 eeseeeseeseeesseesseeceeecetereeerseeeeees 21 Feature summary Activation protects YOU uu eects 24 When to activate your product uu eee 24 Locate the product key Security protection features Norton AntiSpam features Virus and threat protection features 00 eee 29 Installing Norton Internet Security System TEquireMeENt siiin 31 Supported email and instant messenger PPOSTAMS sngsiednnmeninminenneniniins 33 Compatibility with other software and TAP WIE oonenminno h iinsnnennnn tens Before installation 2 esseesseesseeseeecseesseesseesneecseenseeeseees Prepare your computer Install Norton Internet Security esseeeseeeseeseeeseeee 37 Customize your installation 2 sees 41 If the opening screen does not appear 42 8 Contents Chapter 4 After installations senene n 43 Use the Information Wizard eeseeseseeeees 43 If you need to uninstall Norton Internet DOCUTILY cs scesiesitaniosmeedsapuvcstteedcconeonencetecontasswestttsdecseceess 46 Basics Check the version NUMDED cesseeecsseessececeeeesneeeeeees 49 Start Norton Internet Security 0 eseeseeseeseeseese 50 Use the Norton Internet Security tray icon 50 Use Web assistant from the Internet Explorer TOOMDAT dasi aa io a ans 51 Use your email program toolbar
84. e customized security settings for individual members of your family Norton Internet Security uses accounts to control access to the Internet An account stores the type of Internet access that is allowed for the users assigned to the account If several people share a computer you can create accounts that are specific to the needs of each user About Norton Internet Security accounts Your computer can host several accounts but all accounts fall within one of the following four access levels Child Teenager Adult Supervisor Cannot make any changes to Norton Internet Security protection Has limited access to Internet programs and Web site categories Cannot make any changes to Norton Internet Security protection Has access to more Internet programs and Web site categories than Child users Can customize all Norton Internet Security options for own account Can change all Norton Internet Security options for all users 150 Creating accounts for multiple users Create Norton Internet Security accounts See Set or change account passwords on page 154 There is also a default account Not Logged In that blocks all Internet access When a user logs off the settings for Not Logged In become active and stay active until another user logs on When you install Norton Internet Security the program creates a default account with Supervisor privileges This account is not password protected For maxim
85. e networks from a location If you ve added a network to a location you will not be alerted the next time your computer joins that network If you want to change a network s security settings you must clear the location that contains it The next time that you use a network that had been in this location Network Detector will ask you to choose a new location 128 Customizing protection for different locations About Network Detector To clear networks from a location 1 Inthe main window double click Personal Firewall 2 Inthe Personal Firewall window on the Location tab in the list of locations select the location that you want to clear 3 Click Clear 4 When you are finished clearing networks click OK Delete a location If you no longer need a location or if you want to reassign the networks in a location delete the location The next time that you use a network that had been in this location Network Detector will ask you to choose a new location O You cannot delete the preconfigured Home Office Away or Default locations To delete a location 1 Inthe main window double click Personal Firewall 2 Inthe Personal Firewall window on the Locations tab in the list of locations select the location that you want to delete 3 Click Delete 4 When you are finished deleting locations click OK Protecting disks files and data from viruses Keeping your computer protected requires regular monitoring
86. e other security settings in that level Guarding against intrusion attempts 107 Customize firewall protection To change individual security settings 1 Inthe main window double click Personal Firewall 2 Inthe Personal Firewall window in the Choose a security level for drop down list select the account that you want to change 3 Click Custom Level Firewall Customize Security Settings More Info Personal Firewall High Block everything until you allow it X Java Applet Security Medium Prompt me each time X ActiveX Control Security High Block Activex Controls v M Enable Access Control Alerts Alert when unused ports are accessed 4 Doone or more of the following a In the Personal Firewall drop down list select a level In the Java Applet Security or ActiveX Control Security drop down list select a level To be notified whenever unknown programs access the Internet check Enable Access Control Alerts To be notified whenever a remote computer attempts to connect to a port no program is using check Alert when unused ports are accessed 5 Click OK 108 Guarding against intrusion attempts Allow or block access to your computer Allow or block access to your computer Norton Internet Security allows you to organize computers on your home network and the Internet into Trusted and Restricted Zones Zones allow you to grant trusted computers more access to your computer while blocking
87. e the Norton Internet Security Options to options on add additional tools to the menu page 85 To use the Norton Internet Security tray icon 1 Inthe Windows system tray right click the Norton Internet Security icon 2 On the tray icon menu select the option you want Your options are Norton Internet Opens the Norton Internet Security Security main window Block Traffic Immediately stops all Internet communication Log Off Logs off the current user About Norton Displays more information about Internet Security Norton Internet Security LiveUpdate Lets you update your protection Help Opens the online Help Disable Stops Norton Internet Security from protecting your computer Use Web assistant from the Internet Explorer toolbar See Use Web Norton Internet Security now includes Web assistant assistant on which lets you quickly access security settings without page 57 leaving your Web browser 52 Basics Use your email program toolbar Use your email program toolbar This is Spam This is not Spam Empty The Spam Folder Open Norton AntiSpam Norton AntiSpam adds a button or buttons to the toolbar of supported email programs If a single Norton AntiSpam button is added it drops down an abbreviated Norton AntiSpam menu The buttons or menu options added are as follows Marks the selected email as spam Marks the selected email as allowed not spam Removes all email that has been placed in th
88. ears above the text box The Reset Password Key is case sensitive 7 Inthe New Password and Confirm New Password text boxes type a new password 8 Click OK 9 Inthe Remove Application window click Cancel 10 In the Exit alert click Yes 88 Options Customize Norton AntiVirus Customize Norton AntiVirus The default settings for Norton AntiVirus provide complete virus protection for your computer However you may want to adjust them to optimize system performance or disable options that do not apply Norton AntiVirus provides password protection for your option settings You can enable change and reset a password so that unauthorized users cannot tamper with your settings All of the options are organized into three main categories The options contained under each category are as follows Internet Email Instant Messenger LiveUpdate This section does not describe how to change the individual options but gives a general description of what they do and how you can find them For specific information about a particular option check the online Help Options Customize Norton AntiVirus About System options The System options control scanning and monitoring of your computer You use System options to determine what gets scanned what the scan is looking for and what happens when a virus or virus like activity is encountered With higher levels of protection there can be a slight trade off in compu
89. ect If you forget your password you can reset it from the Help button in the Norton AntiVirus main window See the online Help for more information about resetting your password To specify or remove a password 1 At the top of the main window click Options If a menu appears click Norton AntiVirus 2 In the Options window under Other click Miscellaneous 3 Check or uncheck Enable password protection for options 4 In the password dialog box type a password 5 Click OK 94 Options Password protect Norton AntiVirus options Symantec products depend on current information to protect your computer from newly discovered threats Symantec makes this information available to you through LiveUpdate Using your Internet connection LiveUpdate obtains program updates and protection updates for your computer Your normal Internet access fees apply when you use LiveUpdate O If your computer uses Windows 2000 XP you must have Administrator access privileges to run LiveUpdate About program updates Program updates are minor improvements to your installed product These differ from product upgrades which are newer versions of entire products Program updates that have self installers to replace existing software code are called patches Patches are usually created to extend operating system or hardware compatibility adjust a performance issue or fix bugs LiveUpdate automates the process of obtaining and instal
90. ee Ensure that protection settings are enabled on page 129 Auto Protect scans files for viruses when you perform an action with them such as moving them copying them or opening them If it detects a virus or virus like activity in most Cases you receive an alert telling you that a virus was found and repaired How you proceed depends on the operating system that you are using If you are using Windows 98 98SE Me If a virus or threat is found and repaired by Auto Protect in Windows 98 98SE Me you receive an alert telling you which file was repaired or deleted To close the alert Click Finish If you have set your options so that Auto Protect asks you what to do when it finds a virus the alert asks you to choose one of the following actions The recommended action is always preselected Repair the infected file Quarantine the infected file Automatically eliminates the virus Trojan horse or worm and repairs or deletes the infected file When a virus is found Repair is always the best choice Isolates the infected file but does not remove the threat Select Quarantine if you suspect that the infection is caused by an unknown threat and you want to submit the threat to Symantec for analysis Delete the infected file Do not open the file but leave the problem alone Ignore the problem and do not scan this file in the future Ignore the problem and continue with the infected file
91. eeeece 52 Start Norton AntiVirus ssssssssssssssssssssssssssssssssssssssssssssssssss 53 Use the Norton AntiVirus icon in the Windows system Tay erorii Use the Windows Explorer toolbar s e Activate your PrOdUct eceesssesseecseecseeeseeeseecseeseeseeeees Respond to Norton Internet Security alerts Learn more with the Alert Assistant Use Web assistant Check your computer s vulnerability to attack Identify the source of Internet traffic 0 Stop all Internet communication eeeeeeeseeeeeeees Manage how Norton AntiSpam detects spam Adjust the email filter soscant Identify authorized senders Identify senders of spam email messages 63 Teach Norton AntiSpam your email PEEIELENGES zi oo cece tel oelittee 64 Manage advertising filters cc ccecsecsseesseesseesseesseeesee 66 Enable or disable Ad Blocking 0 eseseesseseeeees 66 Enable or disable Popup Window BlOCKING ces coeacttignchinsdawiamens 67 Check Norton AntiVirus configuration status 68 Check Office Plug in Status w ccccccsesssecsseecssees 69 Temporarily disable Norton Internet Security 70 Chapter 5 Chapter 6 Contents Create and use Rescue Disks About Rescue Disks Create a Rescue Disk set Test your Rescue Disks Update your Rescue Disks 00 eeseesseeeseeseeeeee 74 Rescue Disk Options 00 sesecsesseeseeeseeeseeesneereeers 74 If you need to use Rescue Disks to restore your SV
92. elete a custom scan 1 On the left side of the main window under Norton AntiVirus click Scan for Viruses In the Scan for Viruses pane under Task select the custom scan that you want to delete If you click the button next to the scan name the scan runs Under Actions click Delete Click Yes to verify that you want to delete the scan Schedule scans After installation Norton AntiVirus automatically runs a weekly full system scan You can also set up a schedule for custom virus scans Protecting disks files and data from viruses 135 Schedule scans You can schedule customized virus scans that run unattended on specific dates and times or at periodic intervals If you are using the computer when the scheduled scan begins it runs in the background so that you do not have to stop working O You cannot schedule the predefined scans in the scan list but you can schedule any custom scans that you have created Schedule a custom scan You have complete flexibility in scheduling custom scans When you select how frequently you want a scan to run such as daily weekly or monthly you are presented with additional fields with which you can refine your request For example you can request a daily scan then schedule it to occur every two days or every three days instead To schedule a custom scan 1 On the left side of the main window under Norton AntiVirus click Scan for Viruses 2 Inthe Scan for Viruses pane
93. eletion results or use the Repair Wizard to resolve the problem Review the repair details If you have set your manual scan options so that Norton AntiVirus repairs or deletes files automatically and all infected files could be repaired or deleted the scan summary lists the number of files found infected and repaired or deleted This information is presented for status purposes only you don t need to take further action to protect your computer If you want to know more you can check the repair details to see which files were infected and with which threats To review the repair details 1 In the scanner window in the Summary pane click More Details 2 When you are done reviewing the results click Finished Use the Repair Wizard If there are files that could not be fixed or if you have set options so that Norton AntiVirus asks you what to do when a virus or threat is found the Repair Wizard opens If Norton AntiVirus did not attempt a repair the Repair Wizard opens in the Fix Infection pane Otherwise it opens in the Quarantine window What to do if a virus is found If a virus is found during a scan To use the Repair Wizard 1 If the Repair Wizard opens in the Fix Infections pane uncheck any files that you don t want Norton AntiVirus to fix All files are checked by default This is the recommended action Click Fix If any files cannot be fixed or deleted the Quarantine Infections window opens All f
94. ept the License Agreement lt Back Next gt Cancel 8 Read the License Agreement then click I accept the License Agreement If you decline you cannot continue with the installation Installing Norton Internet Security 39 Install Norton Internet Security 9 Click Next Norton Internet Security Setup Activation Enter your Norton Internet Security activation key Please enter your 24 digit product key exactly as printed Your product key can be found on a sticker that looks like this DO NOT LOSE THIS PRODUCT KEY You must use it when you install this software This product will stop working in 15 days if it is not activated with the key below Please see insert for more details Product Key Y0XX XXK 000 10001 100 00 190000000901 This sticker is usually on the back of the CD sleeve B c D E See When to 10 In the text boxes type the product key for activation activate your 11 Click Next product on i page 24 Norton Internet Security Setup Select the installation type Select the desired installation type Install Now Installs all of Norton Intemet Security on your computer including all optional components and tools Recommended F O Custom at Customize Norton Internet Security installation selecting which applications and features to install on your computer Destination Folder D Program Files Norton Intemet Securi
95. ergency programs that Rescue Disk stores on the Rescue Disk set You can use these DOS based utilities to recover your system Norton AntiVirus program files Virus definitions files used by Norton AntiVirus to scan your system in an emergency There are several of these disks Files you have added to the Rescue Disk set Add files to this list by clicking Add Files Remove files from this list by clicking the file then clicking Remove File 76 Basics If you need to use Rescue Disks to restore your system If you need to use Rescue Disks to restore your system amp Rescue Disks are available only for Windows 98 Me Sometimes a virus or threat prevents your computer from starting normally Some viruses can only be removed if the computer is started from a clean disk not the infected hard disk Often a Norton AntiVirus alert tells you when to use your Rescue Disks You first need to determine if your Rescue Disks are current This means that you have created or updated your Rescue Disks since you did any of the following Added modified or removed internal hardware Added modified or removed hard disk partitions Upgraded your operating system Updated virus definitions If your Rescue Disks are not current you can still use them to remove viruses from your computer When the Rescue Disk screen appears use only the Norton AntiVirus task To use your Rescue Disks 1 Insert the Basic Rescue Boo
96. ernet This overrides protection on page 106 any settings made by Automatic Program Control To add a program to Program Control 1 2 8 In the main window double click Personal Firewall In the Personal Firewall window on the Programs tab select the Location you want to customize Click Add Select the program s executable file Executable file names typically end in exe Click Open In the Program Control alert select the access level you want this program to have To see risks that this program could pose to your computer click Show Details Click OK Customize Program Control After using Norton Internet Security for a while you may find that you need to change access settings for certain programs To customize Program Control 1 2 In the main window double click Personal Firewall In the Personal Firewall window on the Programs tab select the Location you want to customize In the list of programs click the program that you want to change Click Modify In the Program Control alert select the access level you want this program to have Click OK Guarding against intrusion attempts 113 Customize firewall rules Manually add a firewall rule While Program Control automatically creates most of the firewall rules that you need you may want to add specific rules Only experienced Internet users should create their own firewall rules There are three sets of firewall rules
97. es If a site you need to view belongs to a blocked category you can create an exception for this site This allows you to permit access to specific Web sites that belong to blocked categories while still blocking other sites of this type To create exceptions for specific sites 1 In the main window double click Parental Control 2 Inthe Parental Control window in the Parental Control settings for drop down list select the account hat you want to change Click Sites In the Sites window click Specify blocked sites Click Exceptions In the Exceptions window click Add Now Fw In the Add Web site to Exception List window type he URL of the site that you want to add 8 Click OK 9 Repeat the previous three steps for each Web site that you want to add to your exceptions list 10 When you are done adding sites click OK 164 Controlling individuals Internet use Customize Parental Control Create a list of permitted Web sites You can strictly control Web access by creating a list of Web sites that people using this computer are allowed to access Any sites that are not on the list of permitted Web sites are blocked Everyone who uses this computer can visit approved sites only regardless of their account types To create a list of permitted Web sites 1 Inthe main window double click Parental Control 2 Inthe Parental Control window in the Parental Control settings for drop down list select the acc
98. es There are four ways to create firewall rules with Program Control Enable Automatic Program Control Use Program Scan Manually add programs Respond to alerts Automatically configures access for well known programs the first time that users run them This is the easiest way to set up firewall rules Finds and configures access for all Internet enabled programs on a computer at once Closely manage the list of programs that can access the Internet Norton Internet Security warns users when a program attempts to access the Internet for the first time Users can then allow or block Internet access for the program Enable Automatic Program Control Automatic Program Control automatically configures Internet access settings for programs the first time that they run Automatic Program Control only configures Internet access for the versions of programs that Symantec has identified as safe When Automatic Program Control configures access for a new program Norton Internet Security displays a message above the Windows toolbar If an unknown program or an unknown version of a known program attempts to access the Internet you receive an alert You can then choose to allow or block Internet access for the program Guarding against intrusion attempts 111 Customize firewall rules To enable Automatic Program Control 1 Inthe main window double click Personal Firewall 2 Inthe Personal Firewall window on the
99. es and other Web sites Supervisor and Adult users can make changes to program settings Child and Teenager users cannot make any changes to Privacy Control There are two ways to adjust Privacy Control settings Set the Privacy Level Use the slider in the main Privacy Control pane to select pre set security levels Adjust individual Privacy Control settings Customize your protection by manually adjusting individual settings You can set individual Privacy Control settings for each user Set the Privacy Level Privacy Control offers pre set security levels that help you set several options at one time The Privacy Level slider lets you select minimal medium or high protection 172 Protecting your privacy Customize Privacy Control To set the Privacy Level 1 In the main window double click Privacy Control 2 Inthe Privacy Control window in the Privacy Control settings for drop down list select the account that you want to change 3 Move the slider to the Privacy Level that you want 4 Click OK Adjust individual Privacy Control settings You can change the settings for Private Information Cookie Blocking Browser Privacy and Secure Connections if the Privacy Level settings do not meet your needs For example you can choose to block all attempts to send private information while allowing Web sites to customize their pages using your browser information Change the Private Information setting C
100. ettings turned on Responding to emergencies Prepare for emergencies Prepare for emergencies It is also important that you are prepared in case your computer is infected by a virus To prepare for emergencies Back up files regularly and keep more than just the most recent backup If you are using a computer that cannot start from a CD create a set of Emergency Disks from which you can start your computer and scan for viruses See Create and If you are using Windows 98 Me create a set of use Rescue Disks Rescue Disks and keep them updated You can use on page 71 them to start your computer in DOS mode and use Norton AntiVirus to fix virus related problems and recover from a system crash 21 22 Responding to emergencies Prepare for emergencies Use the information in this section to familiarize yourself with the product This section includes A list of all of the features in the product A brief description of each feature The feature summary can help you determine which feature to use to solve a problem Read the feature descriptions to locate the correct component to use 24 Feature summary Activation protects you Activation protects you Product activation is a technology that protects users from pirated or counterfeit software by limiting use of a product to those users who have acquired the product legitimately Product activation requires a unique product key for each inst
101. ewsgroups based on text strings which are groups of letters found in the names of the newsgroups When users access newsgroups Parental Control compares the names of the newsgroups that they attempt to view with a list of text strings you create Parental Control then blocks or permits access to newsgroups containing those text strings When newsgroups are blocked newsreader programs will not include their names in the master list of available newsgroups that users can view If a user attempts to post a message in the newsgroup Norton Internet Security automatically blocks the post Controlling individuals Internet use 167 Customize Parental Control See To block and By default Child users cannot use newsreader programs eae eT To allow Child users to view newsgroups you must of Interne programs on unblock the newsreaders program category page 166 Enter text strings to block or permit Parental Control includes a list of text strings that block newsgroups that many people would find objectionable You can add strings to customize Parental Control db Each computer can have only one list of permitted or blocked newsgroups To enter text strings to block or permit 1 Inthe main window double click Parental Control 2 In the Parental Control window on the Settings For menu select the account that you want to change 3 Click Newsgroups 4 In the Specify Newsgroups window select the action that you want
102. f alerts that you receive Click No to turn off Automatic Program Control You will be alerted the first time that programs attempt to connect to the Internet Click Next In the Save location window type a name for this new location Choose a unique name so that this location is easy to identify Click Next In the Save location window review this location s settings Click Finish 126 Customizing protection for different locations About Network Detector Add new networks to locations See Create a new location on page 124 Network Detector alerts you every time that your computer connects to an unrecognized network You can choose to place this network in an existing location or create a new location To add a new network to one of the preconfigured locations Da In the Network Detector alert on the Which location do you want to use menu select a location To create a new location for this network 1 Inthe Network Detector alert on the Which location do you want to use menu click Use custom settings 2 Use the Network Detector Wizard to create a new location To add a new network to a custom location that you have created 1 Inthe Network Detector alert on the Which location do you want to use menu click Use custom settings 2 Inthe Use custom settings window on the Choose a location drop down menu select the location that you want to use 3 Click Finish Learn more
103. grees to the terms of this license and E use the Software in accordance with any additional permitted uses set forth below You may not A copy the printed documentation that accompanies the Software B sublicense rent or lease any portion of the Software reverse engineer decompile disassemble modify translate make any attempt to discover the source code of the Software or create derivative works from the Software C use the Software as part of a facility management timesharing service provider or service bureau arrangement D use a previous version or copy of the Software after You have received a disk replacement set or an upgraded version Upon upgrading the Software all copies of the prior version must be destroyed E use a later version of the Software than is provided herewith unless You have purchased upgrade insurance or have otherwise separately acquired the right to use such later version F use if You received the software distributed on media containing multiple Symantec products any Symantec software on the media for which You have not received a permission in a License Module G use the Software in any manner not authorized by this license nor H use the Software in any manner that contradicts any additional restrictions set forth below 2 Content Updates Certain Software utilize content that is updated from time to time including but not limited to the following Software antiv
104. hange the Private Information setting to control how Privacy Control handles attempts to send information on the Private Information list over the Internet To change the Private Information setting 1 In the main window double click Privacy Control 2 Inthe Privacy Control window in the Privacy Control settings for drop down list select the account that you want to change 3 Click Custom Level 4 Select the Private Information setting that you want 5 Click OK Change the Cookie Blocking setting Many Web sites store information they collect in cookies placed on your hard disk When you return to a site that has set a cookie on your computer the Web server opens and reads the cookie Most cookies are harmless Sites use them to personalize Web pages remember choices that you have made on the Protecting your privacy 173 Customize Privacy Control site and deliver optimized pages for your computer However sites can also use cookies to track your Internet usage and browsing habits Change the Cookie Blocking setting to control how Privacy Control handles sites that attempt to place cookies on your computer To change the Cookie Blocking setting 1 Inthe main window double click Privacy Control 2 In the Privacy Control window in the Privacy Control settings for drop down list select the account that you want to change 3 Click Custom Level 4 Select the Cookie Blocking setting that you want 5 Click OK See
105. hat there is a task that requires immediate attention such as a system crash or a Virus Alert A shortcut icon that points to an original object such as a file folder or disk A protocol that is used by some network devices such as printers and servers to communicate A data pattern that is characteristic of an Internet attack Intrusion Detection uses attack signatures to distinguish attacks from legitimate traffic To transfer certain programs and data between two handheld devices using built in infrared technology 212 Glossary boot record bootable disk cache cache file compressed file connection based protocol connectionless protocol cookie denial of service attack DHCP Dynamic Host Configuration Protocol dial up A sector at the start of a disk that describes the disk sector size cluster size and so on On startup disks the boot record also has a program that loads the operating system A disk that can be used to start a computer A location on your disk in which data is stored for reuse A Web browser cache stores Web pages and files such as graphics as you view them A file that is used to improve the performance of Windows A file whose content has been made smaller so that the resulting data occupies less physical space on the disk A protocol that requires a connection before information packets are transmitted A protocol that sends a transmission to
106. he selected file and the virus that is infecting it Attempts to repair the selected file Use this action if you have received new virus definitions since the file was added to Quarantine Returns the selected file to its original location without repairing it Deletes the selected file from your computer What to do if a virus is found 147 If Norton AntiVirus cannot repair a file Submit Item LiveUpdate Sends the selected file to Symantec Use this option if you suspect that a file is infected even if Norton AntiVirus did not detect it Runs LiveUpdate to check for new protection and program updates Use this if you haven t updated your virus definitions for a while and then try to repair the files in Quarantine To open the Quarantine window 1 On the left side of the main window under Norton AntiVirus click Reports 2 Inthe Reports pane on the Quarantined items line click View Report To perform an action on a file in Quarantine 1 Inthe Quarantine window select the file on which you want to perform the action 2 On the toolbar select the action that you want to perform 3 When you are finished on the File menu click Exit If Norton AntiVirus cannot repair a file See Keeping current with LiveUpdate on page 95 One of the most common reasons that Norton AntiVirus cannot automatically repair or delete an infected file is that you do not have the most up to date virus definitions Upd
107. houses If you regularly switch between several networks you may find that this gives you more control over your protection You can create a new location from a Network Detector alert and from the main Norton Internet Security window To create a new location from a Network Detector alert 1 Inthe Network Detector alert on the Which location do you want to use menu select Use custom settings 2 Inthe Use Custom Settings window click Create new location 3 Click Next 4 Inthe Setup Program Control window do one of the following To Customizing protection for different locations 125 About Network Detector Click Yes recommended to turn on Automatic Program Control This reduces the number of alerts that you receive Click No to turn off Automatic Program Control You will be alerted the first time that programs attempt to connect to the Internet Click Next In the Save location window type a name for this new location Choose a unique name so that this location is easy to identify Click Next In the Save location window review this location s settings Click Finish create a new location from the main window In the main window double click Personal Firewall In the Personal Firewall window on the Locations tab click Wizard In the Setup Program Control window do one of the following Click Yes recommended to turn on Automatic Program Control This reduces the number o
108. i giaa Adjust individual Privacy Control settings 172 Blocking unwanted email messages Customize Norton AntiSpam ou 175 Change the priority of a spam rule 177 Blocking Internet advertisements Use the Ad Trashcan cccsseeccssssescssseesessnteseesneeseenneeees 179 Use text strings to identify ads to block OM POM siyas nnno kinnon a 180 How to identify Ad Blocking strings 180 Add an Ad Blocking String ccceccseesseesseeesees 181 Modify or remove an Ad Blocking string 181 Contents 13 Chapter 16 Monitoring Norton Internet Security View the Statistics WINdOW ccesccseseceeseeseeseesees 183 Reset information in the Statistics WINGOW eescesecseesesseesesesseesteeee Review detailed statistics 0 ecccceessesseeseseeeeseeses View Norton Internet Security logs Review log information Monitor Norton AntiVirus activities hs About the Log Viewer eeeceesessesssesseeseestesseeseesteeseenees Check the Activity Log w ceeeeeeeeseesesseeseeeene Chapter 17 Troubleshooting Explore the Symantec service and support Web Site hinisna i n 191 Troubleshoot Norton Internet Security 2 193 What is wrong with this Web site uw 193 Why can t I post information online 194 Why did an email message I sent never GUTIVE piei re N ANERE 194 Why doesn t Norton Internet Security notify me before letting programs access the Internet
109. ich you connected the service or port number used the amount of information transferred and the total time the connection was active Firewall Communication intercepted by the firewall including rules that were processed alerts displayed unused ports blocked and AutoBlock events Intrusion Whether Intrusion Detection is Detection active attack signatures being monitored and the number of intrusions blocked Privacy The cookies that have been blocked including the name of the cookie and the Web site that requested the cookie Private A history of all protected private Information information sent over the Internet Monitoring Norton Internet Security 187 View Norton Internet Security logs System Severe system errors the current status of IP filtering if the logged program started as a Windows service and information about programs that are using too many resources or otherwise operating under less than optimum conditions Web History URLs visited by the computer providing a history of Web activity Alerts Any security alerts triggered by possible attacks on your computer Restrictions The Internet programs newsgroups and Web sites blocked by Parental Control Norton AntiSpam Details about emails identified as spam As you click each log the right pane changes and displays details specific to the particular log The most recent activities appear at the top of the log 3 When you are fin
110. iles are checked to be added to Quarantine by default This is the recommended action In the Quarantine window uncheck any files that you do not want to quarantine Click Quarantine If any files could not be quarantined the Delete window opens All files are checked to be deleted by default In the Delete window uncheck any files that you do not want to delete If you do not delete the infected files the virus or file at risk remains on your computer and can cause damage or be transmitted to others Click Delete If any files could not be deleted the Exclude At risk Files window opens to allow you to exclude files considered to be at risk from future scans In the Exclude At risk Files window select any files that you want to exclude 8 Click Exclude 9 Once all of the files have been repaired quarantined deleted or excluded the Scan Summary window opens If any files could not be deleted they appear in the Scan Summary window with a status of at risk or delete failed There are a variety of reasons why some files cannot be deleted a file could be in use or part of a larger program Norton AntiVirus recommends that you select the threat name to review the information 141 142 What to do if a virus is found If a virus is found by Auto Protect from the Internet and determine the appropriate action 10 When you are done reviewing the summary click Finished If a virus is found by Auto Protect S
111. irus software utilize updated virus definitions content filtering software utilize updated URL lists some firewall software utilize updated firewall rules and vulnerability assessment products utilize updated vulnerability data these updates are collectively referred to as Content Updates You shall have the right to obtain Content Updates for any period for which You have purchased maintenance except for those Content Updates that Symantec elects to make available by separate paid subscription or for any period for which You have otherwise separately acquired the right to obtain Content Updates Symantec reserves the right to designate specified Content Updates as requiring purchase of a separate subscription at any time and without notice to You provided however that if You purchase maintenance hereunder that includes particular Content Updates on the date of purchase You will not have to pay an additional fee to continue receiving such Content Updates through the term of such maintenance even if Symantec designates such Content Updates as requiring separate purchase This License does not otherwise permit Licensee to obtain and use Content Updates 3 Product Installation and Required Activation There are technological measures in this Software that are designed to prevent unlicensed or illegal use of the Software You agree that Symantec may use these measures to protect Symantec against sof
112. ished viewing the information click File gt Exit 188 Monitoring Norton Internet Security Monitor Norton AntiVirus activities Monitor Norton AntiVirus activities Occasionally you may need to look at previous Norton AntiVirus activities such as when the last system scan was done or how many viruses were detected last week Norton AntiVirus displays a record of its threat detection application and error activities in the Log Viewer About the Log Viewer The Log Viewer displays the history of activities in each Activity Log An Activity Log is a collection of multiple log files one for each type of information collected threat alerts application activities and errors Using the information in the Log Viewer you can View detailed information recorded in each log by selecting the log in the left column and viewing the the details in the right pane Delete the activity entries for a log by selecting the log then clicking Clear If you never clear the entries for a category it expands until it reaches the maximum size Then it starts overwriting the oldest entries Check the Activity Log Check the Activity Log to see what tasks were performed and the results of those tasks to make sure that your Options settings are appropriate for your particular needs To check the Activity Log 1 Inthe main window under Norton AntiVirus click Reports 2 Inthe Reports pane on the Activity Log line click View Report
113. isks select drive A When you select a floppy disk drive the Basic Rescue program displays the number of floppy disks that you will need to create the Rescue Disk set 3 To make changes to the default Rescue Disk settings click Options and do the following On the Rescue Files tab specify the files to include in the Rescue Disk set If you change the default file selection the number of required floppy disks will also change On the Format Settings tab select the type of format if any that you want Rescue Disk to use Basics 73 Create and use Rescue Disks when it prepares the bootable floppy disk for the Rescue Disk set 4 Click OK to return to the Rescue Disk window 5 When you have either assembled the required number of floppy disks or identified another location for the Rescue Disk files click Create If you selected a floppy disk drive Rescue Disk displays the Basic Rescue Disk List window and an estimate of how much time you will need to create the entire set 6 Label the disks as specified in the Basic Rescue Disk List window or type a descriptive name then click OK Rescue Disk prompts you to insert the first disk in the floppy disk drive If you selected a network drive or other larger format drive Rescue Disk prompts you for a Rescue Folder drive location 7 Insert the disks as requested 8 When you have finished creating the basic Rescue Disk set in the Rescue Disk window click Close Test your
114. iveUpdate options 85 226 Index Norton Internet Security continued Log Viewer 183 logging on 156 monitoring 183 statistics 183 Visual Tracking 58 59 0 Office Plug in enabling 91 status 69 online Help 78 Virus Encyclopedia 148 operating systems 31 multiple 203 options 83 accessing 85 Auto Protect Advanced 89 Bloodhound 89 Exclusions 89 categories 88 changing 92 changing settings for 88 customizing 88 email Advanced 90 scanning 90 Inoculation 91 instant messenger 90 Internet 90 LiveUpdate 85 90 Manual Scan Bloodhound 89 Exclusions 89 Miscellaneous 90 91 Norton Internet Security Email 86 Firewall 85 General 85 LiveUpdate 85 options 83 continued Other 90 password protection in Norton AntiVirus 30 protecting with password 86 resetting defaults 92 resetting password 86 Threat Categories 91 Worm Blocking 90 Other options 90 p Parental Control about 26 creating accounts 150 154 Wizard 150 password protection option 91 passwords changing 154 resetting 86 setting 154 Personal Firewall about 25 105 customizing 109 security settings 106 troubleshooting rules 193 Popup Window Blocking about 28 and Web assistant 57 enabling and disabling 67 troubleshooting 198 port scans 105 Privacy Control about 25 169 and secure Web connections 174 Browser Privacy 173 Cookie Blocking 173 in instant messengers 170 private information adding 170 modifying 170 Private Information setting 172
115. k 3 Click OK By default AutoBlock blocks each computer for 30 minutes Use the drop down menu to choose how long you want to block attacking computers Guarding against intrusion attempts 121 Customize Intrusion Detection To customize the AutoBlock duration 1 Inthe main window double click Intrusion Detection 2 Inthe Intrusion Detection window under AutoBlock on the AutoBlock attacking computer for menu select a new duration 3 Click OK See Stop all AutoBlock stops all inbound communications with a Internet specific computer To stop all inbound and outbound communication communication with all computers use Block Traffic on page 59 Unblock AutoBlocked computers If a computer that you need to access appears on the list of computers currently blocked by AutoBlock unblock it If you have changed your protection settings and want to reset your AutoBlock list you can unblock all of the computers on the AutoBlock list at once To unblock computers currently blocked by AutoBlock 1 Inthe main window double click Intrusion Detection 2 Inthe Intrusion Detection window do one of the following To unblock one computer select its IP address then click Unblock To unblock all computers on the AutoBlock list click Unblock Al 3 Click OK Exclude computers from AutoBlock If a computer you need to access is repeatedly placed in the AutoBlock list you can exclude it from being blocked
116. k that Network Detector d t ize Y on page 123 a network that Network Detector does not recognize You will likely receive a New Location Alert the first time you go online after installing Norton Internet Security Learn more with the Alert Assistant Each Norton Internet Security alert includes a link to the Alert Assistant The Alert Assistant includes customized information about each alert including The type of alert The threat level The communication that triggered this alert What these types of alerts indicate How to reduce the number of these alerts you receive To use the Alert Assistant 1 Inany alert click Alert Assistant 2 Inthe Alert Assistant window review the information about the alert 3 To respond to the alert close the Alert Assistant Basics Use Web assistant Use Web assistant Block cookies on this site Block ads on this site Block popups on this site Open Ad Trashcan Configure security settings Web assistant lets you customize Ad Blocking and Privacy Control settings for individual Web sites without leaving your browser Web assistant adds a button to your Microsoft Internet Explorer toolbar that gives you fast access to Ad Blocking Privacy Control and the Norton Internet Security main window The Web assistant menu includes the following tasks Prevents this site from setting or reading cookie files Removes ad images from pages on this site Prevents this
117. l Internet communication Block Traffic lets you immediately halt any communication between your computer and another This can be a convenient way to limit any damage to your computer if it is attacked if a Trojan horse is sending personal information without your permission or if you inadvertently allow an untrusted person to access files on your computer When this option is active Norton Internet Security stops all communication to and from your computer To the 60 Basics Stop all Internet communication outside world it appears that your computer has completely disconnected from the Internet If you want to block all traffic into and out of your computer Block Traffic is more effective than simply using your Internet software to disconnect Most Internet programs can automatically connect without any input from the user so a malicious program could reconnect when you are away from the computer Block Traffic is meant to be used as a temporary measure while you address a security problem If you restart your computer Norton Internet Security automatically allows all incoming and outgoing communication To stop all Internet communication using Block Traffic 1 Inthe main window click Block Traffic 2 Use Norton Internet Security tools to address the security problem 3 When you have fixed the problem click Allow Traffic Basics 61 Manage how Norton AntiSpam detects spam Manage how Norton AntiSpam detects
118. l is on Norton Internet fone om Program Security creates rules for programs that it recognizes ontrol on i oe page 110 without notifying you Why can t I print to a shared printer or connect to a computer on my local network Norton Internet Security blocks the use of Microsoft networking to prevent someone from connecting to your computer over the Internet See Allow or block To allow the use of your local network including file and access to your printer sharing place the computers on your local computer on network in the Trusted Zone page 108 Troubleshooting 195 Troubleshoot Norton Internet Security How can a Web site get my browser information The Browser Privacy settings prevent your browser from sending browser information However some diagnostic sites on the Internet might report browser information even though the Browser Privacy settings are blocking it 196 Troubleshooting Troubleshoot Norton AntiSpam Troubleshoot Norton AntiSpam This information will help you solve the most frequently encountered problems with Norton AntiSpam Why do still receive spam Several factors make it difficult to completely eliminate spam For example different people will consider different classes of email messages to be unwelcome or intrusive Some for instance do not want to receive anything they have not specifically requested Others are glad to receive items regarding their interests or profes
119. le was repaired or deleted and which virus Trojan horse or worm was infecting the file If you have an active Internet connection selecting the virus name opens the Symantec Web page that describes the virus If Auto Protect finds a virus in a compressed file such as a zip file the alert displays the name and location of the compressed file To stop further alerts for viruses found 143 144 What to do if a virus is found If a threat is found by Worm Blocking See If Norton AntiVirus places files in Quarantine on page 146 See If a virus is found during a scan on page 140 in this compressed file select the option Don t alert me about this file again To close the alert Click OK If the file cannot be repaired you receive two alerts one telling you that Auto Protect was unable to repair the file and another telling you that access to the file was denied You can set your Auto Protect options to try to quarantine any infected files that it cannot repair If you do this you are informed if any files are quarantined To resolve problems with unrepaired files 1 Runa full system scan on your computer to ensure that no other files are infected 2 Follow the recommended actions in the Repair Wizard to protect your computer from the infected files If a threat is found by Worm Blocking See Ensure that protection settings are enabled on page 129 If a program tries to email itse
120. lf or email a copy of itself it could be a worm trying to spread via email A worm can send itself or a copy of itself in an email message without any interaction with you Worm Blocking continually scans outgoing email attachments for worms If it detects a worm you receive an alert telling you that a malicious worm was found The alert presents you with options and asks you what to do If you were not sending an email message at that time then it is probably a worm and you should quarantine the file You can click Help on the alert for additional information about how to respond What to do if a virus is found 145 If a threat is found by Worm Blocking After you have responded to the threat and deleted the file you could still have an infected system Follow these procedures Run LiveUpdate to ensure that See About protection updates on page 96 you have the latest protection updates Scan your system See Perform a full system scan on page 131 Go to the Symantec Security See the Symantec Security Response Web Response Web page for the page at securityresponse symantec com most up to date virus definitions and clean up tools If Inoculation alerts you about a change in system files db See Ensure that protection settings are enabled on page 129 Inoculation protection is available on Windows 98 98SE Me systems only System files can change for a variety of reasons You may have
121. ling program updates It locates and obtains files from an Internet site installs them and then deletes the leftover files from your computer 96 Keeping current with LiveUpdate About protection updates About protection updates Protection updates are files that are available from Symantec that keep your Symantec products up to date with the latest anti threat technology The protection updates you receive depend on which product you are using Norton AntiVirus Norton AntiVirus Professional Norton SystemWorks Norton SystemWorks Professional Symantec AntiVirus for Handhelds Annual Service Edition Norton Internet Security Norton Internet Security Professional Norton Personal Firewall Norton AntiSpam Users of Norton AntiVirus Norton SystemWorks and Symantec AntiVirus for Handhelds Annual Service Edition products receive virus protection updates which provide access to the latest virus signatures and other technology from Symantec In addition to the virus protection updates users of Norton Internet Security products also receive protection updates for Web filtering intrusion detection and Norton AntiSpam The Web filtering protection updates provide the latest lists of Web site addresses and Web site categories that are used to identify inappropriate Web content The intrusion detection updates provide the latest predefined firewall rules and updated lists of applications that access the Interne
122. ll and information on the number of communication attempts blocked permitted or not matched by firewall rules Network Information about current connections including the Connections program that is using the connection the protocol being used and the addresses or names of the connected computers Last 60 Seconds The number of network and HTTP connections and the speed of each connection type To review detailed statistics 1 Inthe main window click Statistics 2 In the Statistics window click Detailed Statistics View Norton Internet Security logs Norton Internet Security records information about Web sites that users have visited actions that the firewall has taken and any alerts that have been triggered The logs include details about some of the activity reported in the Statistics window 186 Monitoring Norton Internet Security View Norton Internet Security logs Review log information View the Norton Internet Security logs from the Statistics window To view the logs 1 Inthe main window click Statistics gt View Logs 2 Inthe Log Viewer in the left pane select the log that you want to review Your options are Content Blocking Details about ads Java applets ActiveX controls scripts Flash animations and GIF animations blocked Connections A history of all TCP IP network connections made with this computer including the date and time of the connection the address of the computer to wh
123. lling Norton Internet Security To disable the Windows XP firewall 1 On the Windows XP taskbar click Start gt Control Panel 2 Inthe Control Panel window do one of the following In the default Category View click Network and Internet Connections then click Network Connections In the Classic View double click Network Connections 3 Right click the active connection icon then click Properties 4 In the Properties window on the Advanced tab uncheck Protect my computer and network by limiting or preventing access to this computer from the Internet 5 Click OK Installing Norton Internet Security 37 Install Norton Internet Security Install Norton Internet Security You can install Norton Internet Security from a CD or from a file you download If you have not already done so close all other Windows programs To install Norton Internet Security 1 Doone of the following See If the opening If you are installing from a CD insert the CD into screen does not the CD ROM drive appear on If you downloaded your copy of Norton Internet Security double click the file you downloaded then click Install 2 In the Norton Internet Security window click Install Norton Internet Security page 42 3 In the Scan for Viruses dialog box click Yes to scan your computer before installing 4 Inthe Symantec Pre Install Scanner window review the progress of the scan If Norton AntiVirus detects a vi
124. n Internet Security After installation Norton Internet Security automatically protects any computer on which it is installed You do not have to start the program to be protected To start Norton Internet Security Do one of the following On the Windows taskbar click Start gt Programs gt Norton Internet Security gt Norton Internet Security On the Windows XP taskbar click Start gt All Programs gt Norton Internet Security gt Norton Internet Security On the Windows desktop double click Norton Internet Security 2 Norton Internet Security g IS J Norton memet Security System Status OK Status amp Settings Security On Statistics 3 Personal Firewall Subscription Status intrusion Detection On User Accounts Norton AntiVirus On ae SUPERVISOR 1 Settings for Privacy Control On Ad Blocking Norton Antispam Parental Control oton Internet Security Use the Norton Internet Security tray icon Norton Internet Security adds an icon to the Windows system tray at the end of the Windows taskbar Use this icon as a shortcut to open Norton Internet Security block all Internet traffic turn off all Norton Internet Security protection features and learn more about Norton Internet Security Basics 51 Use Web assistant from the Internet Explorer toolbar See AboutGeneral Youcan also us
125. n you run an infected program There are several things that you can do to avoid viruses and to recover quickly should a virus strike Avoid viruses and threats See Explore the Symantec service and support Web site on page 191 See Keeping current with LiveUpdate on page 95 See Manually scan disks folders and files on page 130 See Schedule scans on page 134 See Ensure that protection settings are enabled on page 129 It is important that you practice regular file maintenance and that you keep Norton AntiVirus up to date To avoid viruses Write protect removable media Stay informed about viruses by logging on to the Symantec Security Response Web site http securityresponse symantec com where there is extensive frequently updated information on viruses and automatic virus protection Keep LiveUpdate turned on at all times to continually update your virus definitions files Run LiveUpdate regularly to receive new program updates Keep Auto Protect turned on at all times to prevent viruses from infecting your computer If Auto Protect is not turned on scan removable media before you use them Schedule periodic scans to occur automatically Watch for email messages from unknown senders Do not open anonymous attachments Keep email protection turned on to avoid sending or receiving infected email attachments Keep all recommended maximum protection s
126. nchronize TCP IP Transmission Control Protocol Internet Protocol threat Trojan horse UDP User Datagram Protocol virus definition A protocol for secure online communication Messages sent using SSL are encrypted to prevent unauthorized viewing SSL is often used to protect financial information A local area network that is part of a larger intranet or the Internet A code in the form of an IP address that computers use to determine which part of an IP address identifies the subnet and which part identifies an individual computer on that subnet The process by which a handheld device and computer compare files to ensure that they contain the same data Standard protocols used for most Internet communication TCP establishes connections between computers and verifies that data is properly received IP determines how the data is routed A program with the potential to cause damage to a computer by destruction disclosure modification of data or denial of service A program containing malicious code that is disguised as or hiding in something benign such as a game or utility A protocol commonly used for streaming media Unlike TCP UDP does not establish a connection before sending data and it does not verify that the data is properly received Virus information that an antivirus program uses to identify and alert you to the presence of a specific virus Glossary 219 wildcard char
127. nformation about an at risk area On the results page next to the scan name click Show Details Identify the source of Internet traffic Visual Tracking helps you learn more about computers that attempt to connect to your computer Using Visual Tracking you can identify the location of the P address used and contact information for the owner of the address You can use this information to identify the origin of an attack and to learn more about intrusion attempts Basics 59 Stop all Internet communication You can trace connection attempts from the following locations Statistics window AutoBlock a Alerts When Visual Tracking is finished it displays a visual representation of where this communication originated and contact information for the owner of the IP address To trace a connection attempt from the Statistics window 1 Inthe main window click Statistics 2 Click Attacker Details Your browser opens the Visual Tracking Web page To trace a connection attempt from AutoBlock 1 Inthe main window double click Intrusion Detection 2 Inthe Intrusion Detection window under AutoBlock select a connection you want to trace 3 Click Attacker Details Your browser opens the Visual Tracking Web page To trace a connection attempt from the Alert Assistant 1 Ina security alert click Alert Assistant 2 Click the IP address of the attacking computer Your browser opens the Visual Tracking Web page Stop al
128. ng 66 can t start your computer 16 from the CD ROM drive 17 Norton AntiVirus 53 virus preventing computer from 76 startup alert about virus protection 91 startup continued Auto Protect failure to load 199 changing boot sequence 204 floppy disk drive fails 204 Rescue Disks fail 203 scanning files at 91 statistics 184 detailed 184 Norton Internet Security 183 resetting 184 viewing 183 window 183 stopping Ad Blocking 66 communications with Block Traffic 60 submitting files to Symantec 147 Web sites to Symantec 165 subnet masks 116 subscription to product updates 103 summary of product features 23 Symantec Pre Install Scanner 16 37 Symantec Security Response newsletter 82 Web page 54 Web site 81 Symantec service and support Web site 191 Symantec Web sites 80 98 connecting to 54 look up viruses 148 system requirements 31 system status checking 68 T Technical Support 80 207 threats attacks 117 avoiding 20 categories of 91 expanded detection of 29 Index 229 threats continued found by manual scan 139 protection from 105 timeout protection 130 toolbar displaying Norton AntiVirus from 54 training Norton AntiSpam 64 Trashcan See Ad Trashcan tray icon 50 Trojan horses found during a scan 140 troubleshooting 191 ActiveX and Java 193 Ad Blocking 198 browser information 195 Cookie Blocking 193 firewall rules 193 networks 194 Norton AntiSpam 196 Norton AntiVirus 199 printing 194 Rescue Disks 203 We
129. ng ads to block everything in the ads directory 8 Click Close 9 Click OK to close the Ad Blocking window Use text strings to identify ads to block or permit You can control whether Ad Blocking displays specific ads by creating a list of text strings that identify individual ad banners Ad Blocking strings are sections of HTML addresses If any part of a file s address matches the text string Ad Blocking automatically blocks the file All users share a single Ad Blocking list Supervisor and Adult users can make changes to the list Child and Teenager users cannot make any changes to Ad Blocking settings How to identify Ad Blocking strings The way that you define Ad Blocking strings affects how restrictive or unrestrictive Ad Blocking is when filtering data Blocking Internet advertisements 181 Use text strings to identify ads to block or permit For example if you add the string uninvitedads com to the Defaults block list you block everything in the uninvitedads com domain If you are more specific and add the string nifty_images image7 gif to the site specific block list maintained for www uninvitedads com you block only that particular image Add an Ad Blocking string You can add strings to the Ad Blocking list for all sites or for individual sites To add an Ad Blocking string 1 Inthe main window double click Ad Blocking 2 Inthe Ad Blocking window click Advanced 3 On the left side of the Advance
130. nging rules click OK Change the order of firewall rules See How firewall rules are processed on page 109 Each list of firewall rules is processed from the top down You can adjust how firewall rules are processed by changing their order To change the order of a firewall rule 1 In the General Rules Trojan Horse Rules or Program Rules window select the rule that you want to move If you have turned on Network Detector select the Location that should use the modified rule Do one of the following To process this rule before the rule above it click Move Up To process this rule after the rule below it click Move Down 3 When you are done moving rules click OK Guarding against intrusion attempts 115 Identify computers to Norton Internet Security Identify computers to Norton Internet Security You must identify computers to Norton Internet Security to manually configure zones and firewall rules In these cases a dialog box appears to help you identify the computer Networking Networking More Info Indicate cornputers or sites to permit access to Individually Using a range Using a network address Starting Internet address example 192 168 1 1 192 168 2 1 Ending Internet address example 192 168 1 20 192 168 2 1 01 ae There are three ways to identify computers Each uses P addresses Specify an individual computer The computer name that you type
131. ninfected disk and scan for viruses Once the virus has been repaired delete the installation files that were left behind in the temporary folder after you tried to install the first time To delete remaining installation files 1 On the Windows taskbar click Start gt Run 2 Inthe Run dialog box type TEMP 3 Click OK 4 Inthe Temp window select all of the files that can be deleted If system files are open you will not be able to delete them Just delete the ones that you can Click Delete Close the window av 7 After you delete the temporary files begin installation again and run the Symantec Pre Install Scanner to be sure that you have removed all of the viruses Responding to emergencies 17 If your computer won t start If your computer won t start If you have a virus or threat on your computer you need to start the computer from an uninfected disk to remove the virus Restart from the CD and scan your See Scan for viruses using the computer s hard disk for viruses CD on page 17 Start your computer by using your Rescue See Create and use Rescue Disks if you created them Disks on page 71 amp d Rescue Disks are available only for Windows 98 Me Scan for viruses using the CD O You might need to change your computer s BIOS Setup options to start from the CD ROM drive To do so see the documentation that came with your computer To start from the CD and scan for viruses 1 Insert the C
132. nology produced by Symantec Security Response common viruses trends in virus workings virus outbreak warnings and special virus definitions releases To subscribe to the Symantec Security Response newsletter 1 On the Internet go to securityresponse symantec com 2 On the security response Web page scroll down to the reference area of the page then click Newsletter 3 On the security response newsletter Web page select the language in which you want to receive the newsletter 4 On the subscribe Web page type the information requested then click Subscribe The default settings for this product provide complete protection for your computer However you may want to adjust them to optimize system performance or disable options that do not apply You can change the product s settings to fit your work environment If you are using Windows 2000 XP you will need administrator access to change options If you are an administrator and share your computer with others keep in mind that the changes that you make apply to everyone using the computer 84 Options Set Norton Internet Security options Set Norton Internet Security options The default settings for Norton Internet Security provide a safe automatic and efficient way of protecting your computer If you want to change or customize your protection you can access all Norton Internet Security tools from the Status amp Settings window Child users cannot make
133. not access You can also add or remove specific sites to or from the list of blocked sites in a category Use this option to restrict users from visiting specific types of Web sites but to allow everything else Create a list of Web sites that can be visited Specify the Web sites that all users can visit Use this option to strictly control users Internet activities as all Web sites not on the list are blocked regardless of users account types Block Web sites by category Parental Control includes an extensive list of categorized Web sites You can select which categories of sites are appropriate for each account on your computer See Keeping Before blocking Web sites by category run LiveUpdate to current with ensure that the list of Web sites is up to date LiveUpdate on page 95 To block Web sites by category 1 Inthe main window double click Parental Control 2 Inthe Parental Control window in the Parental Control settings for drop down list select the account that you want to change 162 Controlling individuals Internet use Customize Parental Control 3 Click Sites Sites More Info Choose the types of Web sites that you want to block or permit for this account Specify permitted sites Specify blocked sites Web site categories to block M Adult Humor Aleohol Tobacco I Anonymous Proxies M Crime Create exceptions to allow this user to view specific sites in blocked c
134. nternet Security 2 Inthe User Accounts screen click Create Account Create Account Create Account Account Name Password Confirm Password Account Type More Info Bob premem m Supervisor can modify anyone s settings v Passwords are case sensitive Make this the startup account 3 Inthe Create Account dialog box in the Account Name text box type a name for this account 4 Inthe Password and Confirm Password text boxes type a password for this account Passwords are case sensitive 5 On the Account Type menu select an account type 154 Creating accounts for multiple users Create Norton Internet Security accounts 6 Click OK Set the startup account Every time that you start your computer Norton Internet Security automatically logs on to the account that is designated as the startup account To ensure that users do not make unwanted changes to Norton Internet Security settings you should create a Restricted account and set it as the default startup account To set an account as the startup account 1 Inthe main window click User Accounts 2 Inthe User Accounts screen select the user account that you want to make the startup account 3 Click Properties 4 Inthe Account Properties dialog box check Make this the startup account 5 Click OK Set or change account passwords For maximum security you should protect each account with a password This ensures that only
135. nternet Security check the method by which you want to receive that information type the corresponding address and phone number then click Next 43 44 Installing Norton Internet Security After installation 8 Check if you would like to receive postal mail from Symantec 9 Type your name and address then click Next 10 Make sure your computer is connected to the Internet then click Next to activate 11 Click Finish 12 Select the post installation tasks that you want Norton Internet Security to perform automatically Your options are Import your email Quickly add the people in your address book email address book to your Allowed List See Identify authorized senders on page 62 Scan for Viruses Perform a full system scan See Manually scan disks folders and files on page 130 Set up Privacy Identify the information you want Control Privacy Control to protect See Identify private information to protect on page 169 Set up Parental Create accounts for individual Control users See Create Norton Internet Security accounts on page 150 Run LiveUpdate Ensure that you have the latest security updates See Keeping current with LiveUpdate on page 95 13 Click Next Installing Norton Internet Security 45 After installation 14 Review the post installation tasks and configuration settings for Norton Internet Security If you want to change any of the settings do so
136. o I need a subscription to spam definitions Though the product is self training local spam definitions are developed only by the criteria you input and from the sample of email messages you process Symantec spam definitions are developed from a much larger set of information and can prevent you from seeing many of the more common types of spam Why does so much spam include clusters of meaningless characters These and other unusual elements in spam are intended to confuse spam filters that look for keywords 198 Troubleshooting Troubleshoot Ad Blocking Troubleshoot Ad Blocking This information will help you solve the most frequently encountered problems with Ad Blocking Does Ad Blocking block all advertising on the current page Ads that are integrated with standard content for instance text statements will not be blocked Will Popup Window Blocking block all pop ups or only pop up ads Ad Blocking blocks all pop ups that are started automatically during a Web page load If a site uses pop ups for special alerts or additional information you might want to disable Popup Window Blocking while viewing that site Are there security issues associated with advertisements While clicking on an ad should only display more information or direct you to another site some advertisers will use ads to entice you into installing new functionality on your system These may range from adding new menus to installing spy
137. ol 2 Inthe lower right corner of the window click Turn Off 3 Repeat steps 1 and 2 selecting Norton AntiSpam in step 1 4 Inthe Security Center click Options gt Norton AntiVirus If you set a password for Options Norton Internet Security asks you for the password before you can continue In the Options window click Email Click OK Uncheck Scan incoming Email recommended Uncheck Scan outgoing Email recommended woanau Resend your email Before installation Before you install Norton Internet Security prepare your computer 36 Installing Norton Internet Security Before installation Prepare your computer Quit all other Windows programs before installing Norton Internet Security Other active programs may interfere with the installation and reduce your protection If you have a recent version of Norton Internet Security Professional Norton Internet Security or Norton Personal Firewall the installer can import and use your current security settings If you have an older version of these products the installer prompts you to remove the older version You must also uninstall any antivirus programs that are installed on your computer For more information see the user documentation that came with the programs If you re using Windows XP Windows XP includes a firewall that can interfere with Norton Internet Security protection features You must disable the Windows XP firewall before insta
138. on AntiSpam detects spam on page 61 158 Creating accounts for multiple users Customize Norton Internet Security accounts Parental Control lets parents manage their children s Internet access by controlling the following Web sites Programs Newsgroups Block access to sexually explicit violent or otherwise inappropriate Web pages Block categories of Internet programs that are not safe for children to use unsupervised Restrict access to discussion groups related to extreme illegal or inappropriate topics amp Child users cannot make any changes to Parental Control settings About Parental Control When you enable Parental Control it blocks any incoming information from restricted Web sites and newsgroups It also blocks all outgoing information from restricted Internet programs Parental Control settings are linked to user accounts When users log on to their accounts Parental Control uses the settings associated with the accounts until the users log off 160 Controlling individuals Internet use Enable or disable Parental Control Enable or disable Parental Control Supervisor and Adult users can enable or disable Parental Control Adult users can change Parental Control settings for their accounts Supervisor users can also make changes to any user s Parental Control settings Teenager and Child users cannot make any changes to Parental Control See Review log info
139. on AutoBlack AutoBlock attacking computer for 30 minutes 7 Exceptions Cornputers currently blocked by AutoBlock Address 2 In the Intrusion Detection window check or uncheck Notify me when Intrusion Detection blocks connections Guarding against intrusion attempts 119 Customize Intrusion Detection 3 Click OK Exclude specific network activity from being monitored In some cases benign network activity may appear similar to an attack signature If you receive repeated warnings about possible attacks and you know that these warnings are being triggered by safe behavior you can create an exclusion for the attack signature that matches the benign activity db Each exclusion that you create leaves your computer vulnerable to attacks Be very selective when excluding attacks Only exclude behavior that is always benign To exclude attack signatures from being monitored 1 Inthe main window double click Intrusion Detection 2 Inthe Intrusion Detection window click Advanced Intrusion Detection Signature Exclusions Signature Exclusions Exclude signatures that Intrusion Detection should not monitor Signatures Excluded Signatures joe Invalid ICMP Type Invalid ICMP Code oe Invalid IP Checksum Invalid Source IP Addre Invalid TCP Destinatior Invalid TCP Source Port Tnwalin TMP Neerinatinr lt m l gt
140. on Internet Security 17 Do one of the following To restart your computer now click Restart Now recommended To restart your computer later click Restart Later Your computer is not protected until you restart 18 Click Finish Customize your installation See Install Norton Internet Security on page 37 During installation if you select the Custom installation type you can select the component programs that you want to install To customize your installation 1 Start the Norton Internet Security installation procedure Norton Internet Security Setup Install Norton AntiVirus Protect your computer from viruses Antivirus software is an integral part of computer security Norton AntiVirus automatically protects your computer from fast spreading viruses Trojan horses and malicious ActiveX controls and Java applets Install Norton AntiVirus on your computer If you already have the most recent version of Norton AntiVirus or if you do not wish to install antivirus protection uncheck the box Next gt Cancel 2 To install Norton AntiVirus check Install Norton AntiVirus on your computer then click Browse to specify the location in which you want it installed If an updated version of Norton AntiVirus is already on your computer this window does not appear 42 Installing Norton Internet Security Install Norton Internet Security 3 Click Next See Install N
141. or if you re not sure that everything is being scanned for viruses check the status on the main window In the System Status pane of the Norton AntiVirus main window a check mark indicates that the system status is OK and a triangle indicates that your system needs attention If you see a triangle review the features to see which area needs attention If you see an exclamation point it indicates that your subscription is either expired or your virus definitions are more than two weeks old If your subscription is expired renew it to maintain your protection If your subscription is current then you need to update your virus definitions If you need to adjust any settings use Options To check system status 1 Inthe main window under Norton AntiVirus click Status 2 Inthe System Status pane review the status to the right of each feature 3 For information about a particular feature select the feature The right pane displays a description and a link to more information about the feature Basics 69 Check Norton AntiVirus configuration status Check Office Plug in status Office Plug in protects Microsoft Office documents from viruses worms and virus like activities It scans documents whenever you open them in a Microsoft Office program Office Plug in is enabled in Options If you have set a password for Options Norton AntiVirus asks you for the password before you can view or adjust the settings To check
142. orton 5 Internet Security on page 37 Norton Internet Security Setup Install Accounts and Parental Control Customize protection for multiple users Accounts and Parental Control let you customize Norton Intemet Security protection for individual users You can use Parental Control to choose the Web sites newsgroups and Internet programs each user can access Each account can have personalized settings for Parental Control Privacy Control Ad Blocking Norton AntiSpam Would you like to install Accounts and Parental Control Yes ONo NOTE If you choose not to install Accounts and Parental Control you will have to reinstall Norton Internet Security to create accounts or use Parental Control lt Back Next gt Cancel In the Install Accounts and Parental Control window select whether you want to install Accounts and Parental Control If you do not install these features you will have to reinstall Norton Internet Security to create accounts or use Parental Control Click Next to continue the installation at the confirm the installation location step If the opening screen does not appear Sometimes a computer s CD ROM drive does not automatically run a CD To start the installation from the Norton Internet Security CD 1 2 On your desktop double click My Computer In the My Computer window double click the icon for your CD ROM drive In the list of files double click Cdstart exe
143. otection 7 Click Next 8 Installing Norton Internet Security 47 If you need to uninstall Norton Internet Security If you have files in Quarantine you are asked if you want to delete them Your options are Yes Deletes the quarantined files from your computer No Leaves the quarantined files on your computer but makes them inaccessible 9 Click Next 10 In the Norton Internet Security has been successfully 11 removed window do one of the following To restart your computer now click Restart Now recommended To restart your computer later click Restart Later Norton Internet Security is not fully uninstalled until you restart your computer Click Finish 48 Installing Norton Internet Security If you need to uninstall Norton Internet Security Basics include general information about how to Work with your Symantec product Keep your computer protected Customize options Monitor protection activities Access more information Check the version number You can check the version number of your product on your computer Use the version number to help you find more information about your product on the Symantec Web site To check the version number 1 Start your product 2 Click Help and Support 3 On the Help menu click About lt your product name gt 4 Inthe About dialog box select your product name 50 Basics Start Norton Internet Security Start Norto
144. otection You are protected by Auto Protect while email protection is disabled To temporarily disable incoming email protection 1 At the top of the main window click Options If a menu appears click Norton AntiVirus In the Options window under Internet click Email Uncheck Scan incoming Email Click OK Download your email messages Au FWN Reenable incoming email protection See About System Your email client may have timed out Make sure that options on timeout protection is enabled page 89 202 Troubleshooting Troubleshoot Norton AntiVirus If you continue to experience problems downloading email messages disable email protection To disable email protection 1 At the top of the main window click Options If a menu appears click Norton AntiVirus 2 Inthe Options window under Internet click Email 3 Uncheck Scan incoming Email 4 Uncheck Scan outgoing Email 5 Click OK can t send email messages If you get the message Norton AntiVirus was unable to send your email message because the connection to your email server was disconnected your email client may be set to automatically disconnect after sending and receiving mail If you are using a firewall it may block access to the Internet features of Norton AntiVirus For Norton AntiVirus to scan outgoing email messages for viruses it intercepts and scans the messages before they are sent to your email provider To resolve this issue turn
145. otection current you should use LiveUpdate once a week or whenever new viruses are discovered Program updates are released on an as needed basis 98 Keeping current with LiveUpdate If you can t use LiveUpdate If you can t use LiveUpdate When new updates become available Symantec posts them on the Symantec Web site If you can t run LiveUpdate you can obtain new updates from the Symantec Web site To obtain updates from the Symantec Web site 1 On the Internet go to securityresponse symantec com 2 Follow the links to obtain the type of update that you need Set LiveUpdate to Interactive or Express mode LiveUpdate runs in either Interactive or Express mode In Interactive mode the default LiveUpdate downloads a list of updates that are available for your Symantec products that are supported by LiveUpdate technology You can then choose which updates you want to install In Express mode LiveUpdate automatically installs all available updates for your Symantec products To set LiveUpdate to Interactive or Express mode 1 At the top of the main window click LiveUpdate 2 Inthe LiveUpdate welcome screen click Configure 3 In the LiveUpdate Configuration dialog box on the General tab select the mode that you want Your options are Interactive Mode Gives you the option of choosing which updates you want to install Express Mode Automatically installs all available updates Keeping current with LiveUpda
146. ou will receive an Activation eeded alert every day until you activate the product You can activate your product from the Activation eeded alert or from the Activation option on the Help menu Activation should take just a few minutes To activate your product from the Activation Needed alert 1 Inthe alert click Activate Now 2 Click OK 3 Onthe Activation screen click Next 4 On the Activation Successful screen click Finish To activate your product from the Help menu 1 At the top of the main window click Help and Support gt Activation n the Activation screen click Next 2 0 3 On the Activation Successful screen click Finish 56 Basics Respond to Norton Internet Security alerts Respond to Norton Internet Security alerts When a Norton Internet Security alert appears read it before you make a decision Identify what type of alert it is and the threat level Once you understand the risks you can make a choice db Take as much time as you need to make your choice Your computer is safe from attack while the alert is active Norton Internet Security helps you decide on an appropriate action by preselecting the recommended action if one exists Norton Internet Security cannot suggest recommended actions for all alerts See Customizing The first alert most people will receive is a New Location protection for Alert This alert appears every time your computer joins different locations twor
147. ould not connect See Customize firewall protection on page 106 It could be Ad Sometimes blocking advertisements on the Internet Blocking prevents an entire Web site from appearing in your browser See Blocking Internet advertisements on page 179 It could be ActiveX Some Web sites display only ActiveX controls or Java or Java blocking applets If you are blocking them nothing appears on these sites See Change individual security settings on page 106 194 Troubleshooting Troubleshoot Norton Internet Security Why can t I post information online See Modify or If you are unable to post information to a Web site it may remove private be because Privacy Control is blocking the information ail al on Check the Private Information list to see if the pag i information that you are trying to enter is being blocked Why did an email message sent never arrive If you choose to block an email message containing private information Norton Internet Security immediately deletes the email message Your email program will indicate that the message was sent but the recipient will not receive it If your email program maintains copies of sent messages in its Sent or Out folder you can reopen the email message remove the private information and send the message again Why doesn t Norton Internet Security notify me before letting programs access the Internet See Enable If Automatic Program Contro
148. ount that you want to change 3 Click Sites Sites More Info Choose the types of Web sites that you want to block or permit for this account Specify permitted sites C Specify blocked sites Sites to Permit microsoft com symantec com In the Sites window click Specify permitted sites wu F Click Add to create a new entry in the list 6 Inthe Add Web site to Permitted List window type the URL Web address of the site that you want to add Controlling individuals Internet use 165 Customize Parental Control 7 Repeat the previous two steps for each Web site that you want to add 8 Click OK Restrict programs that access the Internet Programs access the Internet for many reasons Your Web browser accesses the Internet to display Web pages LiveUpdate accesses the Internet to retrieve program and protection updates for Symantec products Microsoft NetMeeting accesses the Internet to let users conduct meetings over the Internet While most programs Internet access attempts are benign some Trojan horses and other programs may download malicious programming or upload personal information Parental Control lets you control how programs access the Internet Parental Control can block categories of Internet programs and limit how certain groups of Internet programs can be used db Program limitations are intended for use with Child and Teenager accounts Users with Adult accounts
149. ounters a message containing one of these addresses or text strings it immediately categorizes the message based on your settings This helps ensure that messages from trusted senders do not get marked as spam 176 Blocking unwanted email messages Customize Norton AntiSpam Everyone using this computer shares a single customized Norton AntiSpam list Supervisor and Adult users can make changes to this list Child and Teenager users cannot make any changes to Norton AntiSpam settings To add a new Norton AntiSpam entry 1 In the main window double click AntiSpam 2 Inthe Norton AntiSpam window in the Norton AntiSpam settings for drop down list select the account that you want to change 3 In the Norton AntiSpam window click Spam Rules 4 Inthe Spam Rules window click New 5 In the Search for text box type an address or a text string 6 Click Next 7 Select where in incoming email messages Norton AntiSpam should search for the text Your options are Entire email From sender s name Recipient Subject line Body text Click Next 9 Under Classify matching messages as choose whether messages that include this text are spam or not spam 10 Click Next 11 Click Finish 12 Click OK to close the Spam Rules window Modify or delete a Norton AntiSpam entry if it is causing messages to be incorrectly classified To modify or delete a Norton AntiSpam entry 1 In the main window double click AntiSpam 2
150. ow click Options If a menu appears click Norton AntiVirus 2 Inthe Options window in the left pane select an option in the list Options with an arrow to the left have sub options As you select an option the corresponding settings for the selected option appear in the right pane 3 Select any settings that you want to change 4 Click OK These settings now take precedence over the preset options The changes take effect immediately If you need to restore default Norton AntiVirus settings You can change any or all of the options listed If you have made a number of changes that have unwanted results you can restore all options to the default settings If you set a password for Options Norton AntiVirus asks you for the password before you can view or adjust the settings To restore default settings on an Options page On the page for which you want to restore default settings click Page Defaults To restore default settings for all options On any page in the Options window click Default All Options Password protect Norton AntiVirus options Password protect Norton AntiVirus options To protect your Norton AntiVirus options from being changed without your permission you can choose to protect or remove protection from your option settings with a password If you specify a password you are asked to enter a password every time that you view the Options window or temporarily enable or disable Auto Prot
151. packets include the port number to help recipient computers decide which program should handle the data A protocol for communication between two computers using a dial up connection PPP provides error checking features A set of rules governing the communication and transfer of data between computers Examples of protocols include HTTP and FTP A computer or program that redirects incoming and outgoing traffic between computers or networks Proxies are often used to protect computers and networks from outside threats A category of data stored in the Windows registry that describes user preferences hardware settings and other configuration information Registry data is accessed using registry keys Disks that can be removed as opposed to those that cannot Some examples of removable media are floppy disks CDs DVDs and Zip disks A device that forwards information between computers and networks Routers are used to manage the paths that data takes over a network Many cable and DSL modems include routers A program written in a scripting language such as VBScript or JavaScript that consists of a set of instructions that can run without user interaction General term for the process of offering information access to other computers Common services include Web service and FTP service Computers offering services are called servers 217 218 Glossary SSL Secure Sockets Layer subnet subnet mask sy
152. perly because you have more than one operating system installed such as Windows 2000 and Windows 98 To modify your Rescue Boot Disk 1 Start up from your hard drive 2 Insert your Rescue Boot Disk into drive A 3 Atthe DOS prompt type SYS A 4 Press Enter This transfers the operating system to the Rescue Boot Disk Be sure to retest your Rescue Disks 204 Troubleshooting Troubleshoot Rescue Disks cannot start from drive A See Create and use Rescue Disks on page 71 See My Rescue Disk does not work on page 203 If your computer does not check drive A first on startup use your computer s Setup program to change settings Be careful when making changes using your computer s Setup program If you have never used it before you may want to refer to your computer manufacturer s documentation To change your computer s settings 1 Restart your computer A message appears telling you the key or keys to press to run SETUP such as Press lt DEL gt if you want to run SETUP 2 Press the key or keys to launch the Setup program 3 Set the Boot Sequence to boot drive A first and drive C second Setup programs vary from one manufacturer to the next If you cannot find the Boot Sequence option use the Setup program s Help system refer to the documentation that came with your system or contact your system s manufacturer 4 Save the changes then exit the Setup program You may need to use a speci
153. program uses one of the supported communications protocols both options are selected by default Protect against timeouts when scanning Email To prevent connection timeouts while receiving large attachments enable timeout protection Instant messengers that you want to protect Enable Worm Blocking Alert me when scanning email attachments Inoculate Boot Records Manually scan disks folders and files If Auto Protect is enabled and the Norton AntiVirus options are set at their default levels you normally would not need to scan manually However if you temporarily disabled Auto Protect for example to load or use another program that conflicts with Norton AntiVirus and you forgot to enable it again it is possible that a virus could be on your hard disk undetected You can scan your entire computer or individual floppy disks drives folders or files Protecting disks files and data from viruses Perform a full system scan Although the default settings for manual scanning are usually adequate you can raise the level of Bloodhound heuristics or adjust the options for manual scanning in the Options window For more information about manual scanning options see the online Help Perform a full system scan A full system scan scans all boot records and files on your computer To perform a full system scan 1 On the left side of the main window under Norton AntiVirus click Scan for Viruses
154. r etwork Detector lets you customize Program Control and Trusted Zone settings for different locations A ocation is a group of security settings that can contain one or more networks Whenever your computer connects o a network in one of these locations Norton Internet Security automatically switches to the security settings hat are associated with that location For example if you use your laptop to connect to the Internet from home from work and from a neighborhood coffeehouse you are actually connecting to at least three different networks If you want the same level of security in both your home and office you could place both networks in a single location If you want more security in the coffeehouse you can create a high security location for that network 124 Customizing protection for different locations About Network Detector Norton Internet Security includes four preconfigured locations Office Home Away Default Low security Primarily for use on networks containing a hardware firewall Medium security Good for general use High security Primarily for use on public networks Security level is based on your current settings Create a new location You can also create new locations with customized settings and names For example you could create a low security Hotels location you use while traveling and a high security Coffeehouse location for wireless networks provided by many coffee
155. r Accounts window do one of the following If you are creating accounts for the first time click Yes to run the Parental Control Wizard If you have existing accounts click Parental Control Wizard 3 Inthe Choose account manager screen click Use existing Windows accounts 156 Creating accounts for multiple users Log on to Norton Internet Security 4 Click Next In the Choose account level screen all of your currently defined Windows accounts are listed Parental Control Wizard Choose account level There are 2 Windows accounts on this computer Choose an account type for each account Administrator Supervisor v ASPNET Teenager v There are four account types Child Limited access to Internet programs and content Cannot change settings Access to more Internet programs and content than Child users Cannot change settings Adult Can change settings for their own account Supervisor Can change settings for any user Teenager lt Back Next gt 5 For each account select an account type 6 Click Next 7 Click Finish to close the Parental Control Wizard Log on to Norton Internet Security See About Norton Internet Security accounts on page 149 When you start Norton Internet Security it uses the settings from the account that you designated as the startup account To use a different account you must log off of the current account and log on to ano
156. r Express mode Turn off Express mode os eeseescesseesecteeeeseeees If you run LiveUpdate on an internal network Run LiveUpdate automatically 0 eseeeseeseserees About your subscription oo sees eessseeseeeeeeneees Guarding against intrusion attempts About the Personal Firewall 0 esseesesseseeeeeeees 105 Customize firewall protection 0 0 106 Change the Security Level c ccecssecsseesseeenes 106 Change individual security settings 106 Allow or block access to your computer s s s 108 Customize firewall rules How firewall rules are processed essee 109 Create new firewall rules 0 essessesseesseeseeeees 110 Manually add a firewall rule eeceeeeesteeeeeee 113 Change an existing firewall rule ou 114 Identify computers to Norton Internet Security 115 Specify an individual computer Specify a range of COMPULETS 0 eeeseecseeseeeee Specify computers using a network address hiii nRa 116 About Intrusion Detection wn ccecesceseeseeeeteeeeeee 117 Customize Intrusion Detection 0 0 cece eeecteeteeeeee 118 Turn Intrusion Detection alerts on and off 118 Exclude specific network activity from being monitored oon eee eeseesesseeseeeseeeeseeee Enable or disable AUtOBIOCK eeseeeseeseerees Unblock AutoBlocked computers s s s Exclude computers from AutoBlock Restrict a blocked Computer cecsseesteeeeees Contents 11 Chapter 8 Customizing p
157. rds Parental Control 150 Repair 140 Worm Blocking monitoring by 129 Norton AntiVirus 30 options 90 hreats found by 144 worms ound by Worm Blocking 144 ound during a scan 140 in email messages 90 144 in Microsoft Office documents 69 Z zones 108 109 Restricted 108 122 Trusted 108 117
158. reate and use Rescue Disks Create and use Rescue Disks db Rescue Disks are available only for Windows 98 Me Rescue Disks are images on floppy disks that let you restart your computer when your hard disk is damaged or infected with a virus About Rescue Disks Rescue Disks record a duplicate set of system startup files and disk partition information and store rescue utilities configuration files and a DOS based Norton AntiVirus scanner across multiple floppy disks or on a network drive You can customize your Rescue Disk set It can consist of one bootable floppy disk one Norton AntiVirus Program floppy disk and at least six Virus Definition floppy disks If you have Norton Utilities installed you can also have two Norton Utilities floppy disks in your Rescue Disk set With a Rescue Disk set you can start your computer in DOS mode and use Norton AntiVirus to fix virus related problems db Rescue Disks contain information specific to the computer on which they were made If you are using Rescue Disks for recovery you must use the disks made for your computer If you are using Rescue Disks to scan for viruses you can use disks made for a different computer See If youneedto You should update Rescue Disks whenever you update use Rescue Disks to your virus protection install new software or make restore your system on changes to your hardware page 76 Create a Rescue Disk set You can create Rescue Disks
159. rmation on page 186 To enable or disable Parental Control 1 Inthe main window double click Parental Control Norton Internet Security Parental Control More Info Parental Control helps block inappropriate content Parental Control settings for Chris x Turn on Parental Control Click the category you want to configure Sites Programs Newsgroups Defaults Permit or block access to Web sites Permit or block access to Internet programs Permit or block access to Internet newsgroups Reset Parental Control Settings 2 Inthe Parental Control window in the Parental Control settings for drop down list select the account that you want to change 3 Check or uncheck Turn on Parental Control Parental Control tracks its activity on the Event Log s Restrictions tab Check this tab periodically to monitor the effectiveness of your Parental Control settings Controlling individuals Internet use 161 Customize Parental Control Customize Parental Control You can add or remove categories to or from the list of blocked Web sites newsgroups and Internet programs You can also exclude specific sites and newsgroups from blocking and create a list of permitted Web sites and newsgroups Restrict Web site access There are two ways to restrict Web site access Block Web sites by category Specify which categories of sites users can and can
160. rmation and spam Password protect Norton Internet Security options You can protect Norton Internet Security options with a password This lets you control who can make changes to your protection Each copy of Norton Internet Security can have only one options password If you have created accounts for multiple users each user will share a single options password To protect security options with a password 1 4 At the top of the main window click Options If a menu appears click Norton Internet Security On the General tab check Turn on Password Protection In the Password and Confirm Password text boxes type a password Click OK Reset options password If you forget your options password you can reset it To reset your security options password 1 Do one of the following On the Windows taskbar click Start gt Settings gt Control Panel a On the Windows XP taskbar click Start gt Control Panel In the Control Panel double click Add Remove Programs In the list of currently installed programs click Norton Internet Security Options 87 Password protect Norton Internet Security options 4 Do one of the following In Windows 2000 Me click Change Remove In Windows 98 click Add Remove In Windows XP click Change 5 Inthe Remove Application window click Reset Password 6 In the password reset dialog box in the Reset Password Key text box type the Reset Password Key that app
161. rotection for different locations About Network Detector 0 c ccccccccccsssessesestesceseeeseeee Create a new location Add new networks to locations rs Learn more about networks ou eects Customize a location s settings ceeeeee Remove networks from a location ee Delete a location 0 ececsescsceessesesscseessesseseeseesees Chapter 9 Protecting disks files and data from viruses Ensure that protection settings are enabled 29 Manually scan disks folders and files 0 0 Perform a full system scan o eeeeecseessesseeseesesseeeeesee 1 Scan individual elements ccececetesteeeeeeeeees If problems are found during a scan y Create and use CUSTOM SCANS oo eeceesecsessestesteseeeeseeseee RUM CUSTOM SCAM oeceeeccecsessesssessecstessessessesseeseese 1 Delete a CUSTOM SCAN uu eeescssssstessecsssessessessesseseetessese Schedule sanS seien annann aa 1 Schedule a custom scan Edit scheduled scans oe Delete a scan schedule o ceceecescessestestesteeeeeeee Chapter 10 What to do if a virus is found fa virus is found during a SCAN u 40 Review the repair details Use the Repair Wizard f a virus is found by Auto Protect 0 eee 142 If you are using Windows 98 98SE Me 42 If you are using Windows 2000 XP ee 43 fa threat is found by Worm Blocking 144 If Inoculation alerts you about a change in Syster fil s sscscercesssvsad
162. rus it prompts you to delete each file individually 5 Click Delete for each file 6 After the scan completes view the results in the scanresults Notepad window 38 Installing Norton Internet Security Install Norton Internet Security 7 After you review the results close the scanresults Notepad window then click Next to continue with the installation Norton Internet Security Setup License Agreement You must accept the license below before you install Norton Internet Security SYMANTEC SOFTWARE LICENSE AGREEMENT NORTON INTERNET SECURITY IMPORTANT PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE USING THE SOFTWARE SYMANTEC CORPORATION AND OR ITS SUBSIDIARIES SYMANTEC IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THE INDIVIDUAL THE COMPANY OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE REFERENCED BELOW AS YOU OR YOUR ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT THIS IS A LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU AND SYMANTEC BY OPENING THIS PACKAGE BREAKING THE SEAL CLICKING THE ACCEPT OR YES BUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY OR LOADING THE SOFTWARE YOU AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS IOTICK THR INA NAT amp CCEPT AP NAO RIITTAN AP ATHRRUTSE INDICA TR I accept the License Agreement Ol do not acc
163. s text box type the IP address of a computer on the subnet 3 In the Subnet Mask text box type the subnet mask The appropriate subnet mask is almost always 255 255 255 0 4 Click OK Guarding against intrusion attempts About Intrusion Detection About Intrusion Detection Bonk RDS_ Shell WinNuke Intrusion Detection scans all the network traffic that enters and exits your computer and compares this information against a set of attack signatures arrangements of information that identify an attacker s attempt to exploit a known operating system or program vulnerability If the information matches an attack signature Intrusion Detection automatically discards the packet and severs the connection with the computer that sent the data This protects your computer from being affected in any way Intrusion Detection protects your computer against most common Internet attacks including the following An attack on the Microsoft TCP IP stack that can crash the attacked computer A method of exploiting the Remote Data Services component of the Microsoft Data Access Components that lets a remote attacker run commands with system privileges An exploit that can use NetBIOS to crash older Windows computers See Keeping current with LiveUpdate on page 95 Intrusion Detection does not scan for intrusions by computers in your Trusted Zone However Intrusion Detection does monitor the information that you send to
164. se each phrase in quotation marks and use commas to separate the phrases For example purchase product MAC Norton SystemWorks searches for all three phrases and finds all articles that include any of these phrases Select the area of the Web site that you want to search 4 Click Search Troubleshooting 193 Troubleshoot Norton Internet Security Troubleshoot Norton Internet Security Check here for possible solutions to issues that might arise with Norton Internet Security What is wrong with this Web site If you cannot connect to a Web site with Norton Internet Security disabled there might be a problem with the Internet or your Internet service provider If your connection is working it s possible a Norton Internet Security feature is preventing you from viewing the site It could be Cookie Many Web sites require that cookies be enabled on your Blocking computer to display correctly See Change the Cookie Blocking setting on page 172 It could be If you have set up Parental Control to block certain Parental Control categories of Web sites it may be blocking the site that you are attempting to view When Parental Control blocks a site it always displays a message telling you that the site is blocked See Restrict Web site access on page 161 It could be a A firewall rule might be blocking the Web site When this firewall rule happens you will usually see a message saying that you c
165. sion even if they have not specifically requested them How will email messages from addresses on my Blocked list be handled Norton AntiSpam moves email messages from these addresses to the Norton AntiSpam folder and marks them in the subject line as spam What if mistakenly put an address on the Blocked list The only result will be that you will not see any email messages from this address in your main list But if you periodically review the contents of your spam folder you will be able to retrieve any email messages from that address and then correct the entry in your list Why did an email message someone sent me never arrive Some legitimate email messages may contain elements that are characteristic of spam messages This may have caused Norton AntiSpam to incorrectly identify the message as spam Depending upon the filters you have created in your email program the message may be in your spam or trash folder Troubleshooting 197 Troubleshoot Norton AntiSpam See Identify To avoid losing email messages from this person add authorized them to your Allowed list senders on page 62 How do I keep my protection updated To some degree Norton AntiSpam updates itself by learning from your outgoing email messages and other data However to receive up to date copies of Symantec spam definitions you must subscribe to this service You can then choose to have these definitions updated automatically Why d
166. some use it to open pop up ads and reset visitors homepages A simple software program that can be started by a specific keystroke or a series of keystrokes Macros can be used to automate repetitive tasks A method of mapping private IP addresses to a single public IP address NAT allows multiple computers to share a single public IP address Most DSL and cable routers support NAT The portion of an IP address that is shared by all computers on a network or subnet For example 10 0 1 1 and 10 0 1 8 are part of the network address 10 0 1 0 A system table used primarily by Windows 2000 XP that organizes the exact location of all the files on the hard drive The basic unit of data on the Internet Along with the data each packet includes a header that describes the packet s destination and how the data should be processed A portion of a disk that is prepared and set aside by a special disk utility to function as a separate disk One of the two most popular protocols for receiving email POP3 requires that you download messages to read them A connection between two computers TCP IP and UDP use ports to indicate the type of server program that should handle a connection Each port is identified by a number port number PPP Point to Point Protocol protocol proxy registry removable media router script service Glossary A number used to identify a particular Internet service Internet
167. t To transfer a copy of a file or program from the nternet a server or computer system to another server or computer Software instructions for interpreting commands for ransfer to and from peripheral devices and a computer Encoding data in such a way that only a person with the correct password or cryptographic key can read it This prevents unauthorized users from viewing or ampering with the data A common method of networking computers ina LAN local area network Ethernet cables which look like oversized phone cables carry data at 10M bps or 100M bps A file containing program code that can be run Generally includes any file that is a program extension or system files whose names end with bat exe Or com 213 214 Glossary extension FAT file allocation table file type Finder firewall rule fragmented fragmented IP packet FTP File Transfer Protocol hidden attribute host name The three letter ending on a file name that associates the file with an activity or program Examples include txt text and exe executable program A system table used primarily by DOS and Windows 9x Me that organizes the exact location of the files on the hard drive A code that associates the file with a program or activity often appearing as the file name extension such as txt or jpeg The program that manages your Macintosh disk and file activity and display Par
168. t These lists are used to identify unauthorized access attempts to your computer Norton AntiSpam updates provide the latest spam definitions and updated lists of spam email characteristics These lists are used to identify unsolicited email Users of Norton Personal Firewall receive intrusion detection updates for the latest predefined firewall rules and updated lists of applications that access the Internet Users of Norton AntiSpam receive the latest spam definitions and updated lists of spam email characteristics Keeping current with LiveUpdate 97 Obtain updates using LiveUpdate Obtain updates using LiveUpdate LiveUpdate checks for updates to all of the Symantec products that are installed on your computer db If your nternet service provider does not automatically connect you to the Internet connect to the Internet first and then run LiveUpdate To obtain updates using LiveUpdate 1 At the top of the main window click LiveUpdate 2 In the LiveUpdate window click Next to locate updates 3 Ifupdates are available click Next to download and install them 4 When the installation is complete click Finish db Some program updates may require that you restart your computer after you install them When you should update Run LiveUpdate as soon as you have installed your product Once you know that your files are up to date run LiveUpdate regularly to obtain updates For example to keep your virus pr
169. t Floppy Disk into drive A and restart your computer The Rescue program runs in DOS 2 Use the arrow keys to select the program that you want to run A description of the selected program appears in the right pane of the Rescue program Your options are Norton Scans your computer for viruses and AntiVirus repairs any infected files Rescue Checks and restores boot and partition Recovery information 3 Press Enter to run the selected program Basics 77 If you need to use Rescue Disks to restore your system 4 Follow the on screen instructions for inserting and removing the Rescue Disks 5 When the Rescue program is done remove the Rescue Disk from drive A and restart your computer 78 Basics For more information For more information The product documentation provides glossary terms online Help a Readme file the User s Guide in PDF format and links to the Knowledge Base on the Symantec Web site Look up glossary terms Technical terms that are italicized in the User s Guide are defined in the glossary which is available in both the User s Guide PDF and Help In both locations clicking a glossary term takes you to its definition Use online Help Help is available throughout your Symantec product Help buttons or links to more information provide information that is specific to the task that you are completing The Help menu provides a comprehensive guide to all of the product features and tasks
170. t Start Auto Protect when Windows starts up is checked Norton AntiVirus may not be configured to show the Auto Protect icon in the tray 200 Troubleshooting Troubleshoot Norton AntiVirus To show the Auto Protect icon in the tray 1 At the top of the main window click Options If a menu appears click Norton AntiVirus 2 Inthe Options window under System click Auto Protect 3 Ensure that Show the Auto Protect icon in the tray is checked have scanned and removed a virus but it keeps infecting my files See If you need to use Rescue Disks to restore your system on page 76 There are four possible reasons a virus could be reappearing The virus might be in a program file with an unusual extension for which Norton AntiVirus is not configured to look To reset Norton AntiVirus scanning options 1 At the top of the main window click Options If a menu appears click Norton AntiVirus 2 Inthe Options window under System click Manual Scan 3 Under Which file types to scan for viruses click Comprehensive file scanning 4 Click Manual Scan gt Bloodhound 5 Ensure that Enable Bloodhound heuristics is checked then click Highest level of protection 6 Click OK 7 Scan all of the disks that you use and repair all infected files The source of the infection could also be a floppy disk Scan all of the floppy disks that you use to ensure that they are free of viruses Another reason could be that
171. te 99 Set LiveUpdate to Interactive or Express mode 4 Ifyou selected Express Mode select how you want to start checking for updates Your options are want to press the Gives you the option of start button to run cancelling the update LiveUpdate want LiveUpdate to Installs updates automatically start automatically whenever you start LiveUpdate 5 To have access to a Symantec self help Web site in the event that an error occurs while using LiveUpdate check Enable Enhanced Error Support 6 Click OK Turn off Express mode Once you have set LiveUpdate to run in Express mode you can no longer access the LiveUpdate Configuration dialog box directly from LiveUpdate You must use the Symantec LiveUpdate control panel To turn off Express mode 1 On the Windows taskbar click Start gt Settings gt Control Panel 2 In the Control Panel window double click Symantec LiveUpdate 3 In the LiveUpdate Configuration dialog box on the General tab click Interactive Mode 4 Click OK 100 Keeping current with LiveUpdate If you run LiveUpdate on an internal network If you run LiveUpdate on an internal network If you run LiveUpdate on a computer that is connected to a network that is behind a company firewall your network administrator might set up an internal LiveUpdate server on the network LiveUpdate should find this location automatically If you have trouble connecting to an internal LiveUpdate server
172. ted States of America 10 9 8 765 43 2 1 Symantec License and Warranty Norton Internet Security MPORTANT PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE USING THE SOFTWARE SYMANTEC CORPORATION AND OR ITS SUBSIDIARIES SYMANTEC IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THE NDIVIDUAL THE COMPANY OR THE LEGAL TITY THAT WILL BE UTILIZING THE FTWARE REFERENCED BELOW AS YOU YOUR ONLY ON THE CONDITION THAT U ACCEPT ALL OF THE TERMS OF THIS ENSE AGREEMENT THIS IS A LEGAL AND FORCEABLE CONTRACT BETWEEN YOU SYMANTEC BY OPENING THIS KAGE BREAKING THE SEAL CLICKING ACCEPT OR YES BUTTON OR ERWISE INDICATING ASSE CTRONICALLY OR LOADING THE FTWARE YOU AGREE TO THE TERMS AND DITIONS OF THIS AGREEMENT IF YOU OT AGREE TO THESE TERMS AND DITIONS CLICK THE I DO NOT ACCEPT NO BUTTON OR OTHERWISE INDICATE FUSAL MAKE NO FURTHER USE OF THE FTWARE AND CONTACT SYMANTEC STOMER SERVICE FOR INFORMATION ON W TO OBTAIN A REFUND OF THE MONEY PAID FOR THE SOFTWARE LESS PPING HANDLING AND ANY LICABLE TAXES AT ANY TIME DURING SIXTY 60 DAY PERIOD FOLLOWING THE E OF PURCHASE aovo i Qnw gt mre Loum JT LEO E lez OGOHMDOOOO ay FE MKTaARwDAOCAVAaLE SmylS is Shu 1 License The software and documentation that accompanies this license
173. ter performance If you notice a difference in your computer s performance after installation you may want to set protection to a lower level or disable those options that you do not need The System options that you can set are as follows Option Description Auto Protect Manual Scan Determine if Auto Protect starts when you start your computer what it looks for while monitoring your computer and what to do when a virus is found Auto Protect options also include Bloodhound Advanced and Exclusions subcategories Bloodhound is the scanning technology that protects against unknown viruses Use these options to set its level of sensitivity in Auto Protect Advanced options determine the activities to be monitored when scanning for virus like activities and when scanning floppy disks Exclusions specify the files that should not be scanned by file name extension or by specific file name Be careful not to exclude the types of files that are more likely to be infected by viruses such as files with macros or executable files Determine what gets scanned and what happens if a virus or threat is found during a scan that you request Manual Scan options also include Bloodhound and Exclusions subcategories 90 Options Customize Norton AntiVirus About Internet options Internet options define what happens when your computer is connected to the Internet You use Internet options to define how Norton An
174. that you can complete To use online Help 1 At the top of the main window click Help amp Support gt Norton Internet Security 2 Inthe Help window in the left pane select a tab Your options are Contents Displays the Help by topic Index Lists Help topics in alphabetical order by key word Search Opens a search field in which you can enter a word or phrase Basics 79 For more information Window and dialog box Help Window and dialog box Help provides information about the program This type of Help is context sensitive meaning that it provides help for the dialog box or window that you are currently using To access window or dialog box Help Do one of the following In the window click any available Help link In the dialog box click Help Readme file The Readme file contains information about installation and compatibility issues It also contains technical tips and information about product changes that occurred after this guide went to press It is installed on your hard disk in the same location as the product files To read the Readme file 1 In Windows Explorer double click My Computer 2 Double click the hard disk on which you installed Norton Internet Security In most cases this will be drive C 3 Click Program Files gt Norton Internet Security 4 Double click Readme txt The file opens in Notepad or your default word processing program 5 Close the word processing program
175. the basic Internet Protocol IP that provides feedback about network problems An extension to the basic Internet Protocol IP that is used to broadcast multimedia over the Internet One of the two most popular protocols for receiving email IMAP makes messages available to read and manage without downloading them to your computer A communication port on a handheld device for interfacing with an infrared capable device Infrared ports do not use cables The protocol that underlies most Internet traffic IP determines how data flows from one computer to another Computers on the Internet have IP addresses that uniquely identify them A numeric identifier that uniquely identifies a computer on the Internet IP addresses are usually shown as four groups of numbers separated by periods For example 206 204 52 71 A company that supplies Internet access to individuals and companies Most ISPs offer additional Internet connectivity services such as Web site hosting A programming language used to create small programs called applets Java applets can be used to create interactive content on Web pages 215 216 Glossary JavaScript macro NAT network address translation network address NTFS NTFS file system packet partition POP3 Post Office Protocol version 3 port A scripting language used to enhance Web pages Most sites use JavaScript to add simple interactivity to pages but
176. the virus is remaining in memory after you remove it from the boot record It then reinfects your boot record Use your Rescue Disks to remove the virus If the problem is a Trojan horse or worm that was transmitted over a shared network drive you must Troubleshooting 201 Troubleshoot Norton AntiVirus disconnect from the network or password protect the drive to let Norton AntiVirus delete the problem Norton AntiVirus cannot repair my infected files See Keeping The most common reason that Norton AntiVirus cannot current maith repair your infected files is that you do not have the most os ig on current virus protection on your computer Update your i virus definitions regularly to protect your computer from the latest viruses If after using LiveUpdate the virus still cannot be repaired the file may be corrupted or contain a new virus There are two additional options See If Norton Quarantine the file and submit it to Symantec lena places If you don t need the file or a non infected copy of the Quarantine on file exists delete the infected file and replace it with page 146 the non infected file can t receive email messages There are several possible solutions to this problem If you are using a firewall it may block access to the Internet features of Norton AntiVirus Temporarily disable email protection This might allow the problem email messages to download so that you can once again enable email pr
177. ther account If you are not sure which account is active you can check the active account To find out which account is active Open Norton Internet Security The active account is listed in the middle of the main window If you want to use a different account than the one that is currently active you must log off of the current account then log on with the account that you want to use Creating accounts for multiple users 157 Customize Norton Internet Security accounts To log on to another account 1 In the Windows system tray right click the Norton Internet Security icon then click Log Off 2 Click Yes to confirm that you want to log off In the Windows system tray right click the Norton Internet Security icon then click Account Login 4 Inthe Log On dialog box select the account that you want to use 5 Type the password if required 6 Click OK As soon as you change an account Norton Internet Security begins using the settings associated with that account The Accounts window shows the account that is currently active Customize Norton Internet Security accounts Each Norton Internet Security account can have personalized settings for the following features Parental Control See Controlling individuals Internet use on page 159 Privacy Control See Protecting your privacy on page 169 Ad Blocking See Blocking Internet advertisements on page 179 Norton Antispam See Manage how Nort
178. tiVirus should scan email and instant messenger attachments enable Worm Blocking and determine how updates should be applied with LiveUpdate The Internet options you can set are as follows Email Instant Messenger LiveUpdate Enable email scanning and Worm Blocking and define how Norton AntiVirus should behave while scanning email messages Scanning incoming email messages protects your computer against viruses sent by others Scanning outgoing email messages prevents you from inadvertently transmitting viruses or worms to others You can choose to scan incoming or outgoing email messages or both and to display an icon or progress indicator while scanning You can set options to automatically repair quarantine or delete infected email messages with or without interaction with you Advanced options determine what to do when scanning email messages Determine what instant messengers to support how to configure a new instant messenger and what happens if a virus is found during an instant messenger session Enable Automatic LiveUpdate and define how updates should be applied Automatic LiveUpdate checks for updated virus definitions automatically when you are connected to the Internet About Other options Other options include Inoculation settings for Windows 98 98SE Me and Miscellaneous settings You can enable Inoculation cause an alert if a system file changes set a variety of miscellaneous options and c
179. to take Your options are Specify permitted Identify text strings to permit newsgroups Specify blocked Identify text strings to block newsgroups 5 Click Add 6 Type a text string to block or permit 7 Click OK Create exceptions to blocked newsgroups If you create a list of blocked sites you may find that a newsgroup that your users need to access is also blocked Parental Control lets you create exceptions that give access to specific blocked newsgroups For example you can block access to all comp security newsgroups while still allowing access to comp security firewalls 168 Controlling individuals Internet use Customize Parental Control To create exceptions to blocked newsgroups 1 2 In the main window double click Parental Control In the Parental Control window on the Settings For menu select the account that you want to change Click Newsgroups In the Specify Newsgroups window click Specify Blocked Newsgroups Click Exceptions 6 Click Add In the Add Newsgroup to Exceptions List window type the complete name of the newsgroup that you want to unblock 8 Click OK 9 When you are done adding exceptions click OK Protecting your privacy Every time that you browse the Internet computers and Web sites collect information about you Some of this information comes from forms that you fill out and choices that you make Other information comes from your browser which automatic
180. tup account Norton Internet Security automatically logs on to the startup account every time you restart For maximum protection the startup account should be a Child account This ensures that everyone uses the most protected settings unless they know how to change to a different account Click an account below to mal the default Not me On a Bill cheese2 Chris Mom and Dad Cheese lt Back Next gt See Set the 10 In the Set startup account screen select the account startup account that Norton Internet Security automatically logs on to OM RABE 15i when you restart the computer 11 Click Next 12 Click Finish Creating accounts for multiple users 153 Create Norton Internet Security accounts To create Norton Internet Security accounts with the User Accounts screen 1 Inthe main window click User Accounts Norton Internet Security Norton Internet Security Status amp Settings Statistics Subscription Status User Accounts q Norton AntiVirus User Accounts Parental Control Wizard More Info Customize Internet access for each individual in your household You are logged on as SUPERVISOR Log Off Change Password User Accounts Name Not Logged On Afterschool Type Child Child Startup Account Bill Teenager Mom and Dad Adult SUPERVISOR Supervisor Norton I
181. tware piracy This Software may contain enforcement technology that limits the ability to install and uninstall the Software on a machine to not more than a finite number of times for a finite number of machines This License and the Software containing enforcement technology require activation as further set forth during installation and in the Documentation The Software will only operate for a finite period of time prior to Software activation by You During activation You will provide Your unique product key accompanying the Software and PC configuration in the form of an alphanumeric code over the Internet to verify the authenticity of the Software If You do not complete the activation within the finite period of time set forth in the Documentation or as prompted by the Software the Software will cease to function until activation is complete which will restore Software functionality In the event You are not able to activate the Software You may contact Symantec Customer Support at the URL or and telephone number provided by Symantec during activation or as may be set forth in the Documentation 4 Sixty 60 Day Money Back Guarantee If You are the original licensee of this copy of the Software and are not completely satisfied with it for any reason please contact Symantec Customer Service for a refund of the money You paid for the Software less shipping handling and any applicable taxes at any time during the sixty 6
182. ty lt Back It Next gt Cancel 40 Installing Norton Internet Security Install Norton Internet Security 12 Select an installation type Your options are Install Now Install using the most common settings This is the best choice for most users Custom View a list of the components and programs that will be installed and add or remove components from the list See Customize your installation on page 41 13 Click Browse to select a folder into which you want to install Norton Internet Security if it is other than the default location 14 Click Next 2 Norton Internet Security Setup Ready to install configure the application To begin the installation click Next To change the installation information click Back To exit the installation click Cancel Norton Internet Security files will be installed to D Program Files Norton Internet Security Shared Symantec files will be installed to D Program Files Symantec D Program Files Common Files Symantec Shared lt Back Next gt Cancel 15 Confirm the installation location then click Next to install Norton Internet Security The Norton Internet Security Setup window displays installation progress Depending on your computer system speed this can take a few minutes 16 After Norton Internet Security is installed read the readme text then click Next Installing Norton Internet Security 41 Install Nort
183. u know that you do not want to receive any email messages from a specific address you can add it to the Blocked List Norton AntiSpam will mark all email messages from this address as spam 64 Basics Manage how Norton AntiSpam detects spam To add names to the Blocked List 1 Inthe main window double click Blocked List Norton AntiSpam General Allowed List Blocked List i Spam Rules Blocked List More info Norton AntiSpam will block all email from these addresses ABCDEFGHIJKLMNOP RSTUVWXYZ Sort by Name Email Email address unvantedads unwantedads com Some Spammer anyone unvantedads com Spam Sender sender unwantedads com Delete 2 Inthe Blocked List window click Add 3 Inthe Add Address to Blocked List dialog box type the email address you want to block and optionally the first and last name of the sender 4 Click OK to close the Add Address to Blocked List dialog box 5 Click OK to close the Blocked List window Teach Norton AntiSpam your email preferences Norton AntiSpam s filtering engine attempts to identify spam automatically by using your outgoing email to determine your usual email correspondents Over time you can train Norton AntiSpam to reflect your personal preferences for receiving email more precisely Basics 65 Manage how Norton AntiSpam detects spam To train the filtering engine 1 2 Start your email program Select
184. um security you should create a password for this account Norton Internet Security accounts and Windows accounts See Assign Norton Internet Security account types to Windows accounts on page 155 You can choose to create Norton Internet Security accounts or Windows accounts The primary difference between the two types of accounts is that the Windows accounts are tied to the operating system If you log in to Windows using a Windows account you will also be logged in to Norton Internet Security with that account Create Norton Internet Security accounts Supervisor and Adult users can create new accounts and customize settings for other users They can also create new user accounts with the Security Assistant Adult users can customize their own accounts but cannot change other users accounts Teenager and Child users can change their passwords only You can create several accounts at once with the Parental Control Wizard or one by one using the User Accounts screen To create Norton Internet Security accounts with the Parental Control Wizard 1 Inthe main window click User Accounts 2 Inthe User Accounts window do one of the following Ifyou are creating accounts for the first time click Yes to run the Parental Control Wizard If you have existing accounts click Parental Control Wizard See Set or change account Passwords on page 154 Creating accounts for multiple users Create Norton Internet Se
185. und on page 139 Virus protection Updates your virus definitions automatically updates See About protection updates on page 96 Compressed file Detects and repairs viruses inside of compressed files protection See What to do if a virus is found on page 139 30 Feature summary Virus and threat protection features Email protection Protects incoming and outgoing email messages preventing your computer and other computers from infection See What to do if a virus is found on page 139 Bloodhound technology Detects new and unknown viruses by analyzing an executable file s structure behavior and other attributes such as programming logic computer instructions and any data that is contained in the file See What to do if a virus is found on page 139 Before installing Norton Internet Security take a moment to review the system requirements Windows 98 Me users should have several blank 1 44 MB disks available to make Rescue Disks System requirements To use Norton Internet Security your computer must have one of the following Windows operating systems installed Windows 98 98SE Windows Me Windows 2000 Professional Windows XP Professional Home Edition Windows 95 and NT the server editions of Windows 2000 XP and the Windows XP 64 bit edition are not supported 32 Installing Norton Internet Security System requirements Your computer must also
186. upport offices North America Symantec Corporation 555 International Way Springfield OR 97477 U S A Australia and New Zealand Symantec Australia Level 2 1 Julius Avenue North Ryde NSW 2113 Sydney Australia Europe Middle East and Africa Symantec Authorized Service Center Postbus 1029 3600 BA Maarssen The Netherlands Latin America Symantec Brasil Market Place Tower Av Dr Chucri Zaidan 920 12 andar S o Paulo SP CEP 04583 904 Brasil SA June 3 2003 http www symantec com http www symantec com region reg_ap 61 2 8879 1000 Fax 61 2 8879 1001 http www symantec com region reg_eu 353 1 811 8032 Portuguese http www service symantec com br Spanish http www service symantec com mx Brazil 55 11 5189 6300 Mexico 52 55 5322 3681 Mexico DF 01 800 711 8443 Interior Argentina 54 11 5382 3802 Glossary access privileges ActiveSync ActiveX alert alias AppleTalk attack signature beam The types of operations that a user can perform on a system resource For example a user can have the ability to access a certain directory and open modify or delete its contents The synchronization software for Microsoft Windows based Pocket PCs A method of embedding interactive programs into Web pages The programs which are called controls run when you view the page A message that appears to signal that an error has occurred or t
187. ures Security protection features Norton Internet Security includes a suite of security tools that help keep your computer safe from viruses security threats unwanted email and privacy intrusions Security protection features include Personal Firewall The Personal Firewall protects your computer from Internet attacks dangerous Web content port scans and other suspicious behavior See About the Personal Firewall on page 105 Intrusion Intrusion Detection scans each piece of information that Detection enters and exits your computer and automatically blocks any Internet attacks See About Intrusion Detection on page 117 Network Detector Network Detector lets you customize security settings for different networks This makes it easy for mobile users who connect to the Internet from the road to stay protected at all times See Customizing protection for different locations on page 123 Web assistant Web assistant lets you customize security settings for individual Web sites without leaving your browser See Use Web assistant on page 57 Privacy Control Privacy Control gives you several levels of control over the kind of information that users can send via the Web email and instant messenger programs See Protecting your privacy on page 169 Ad Blocking Ad Blocking speeds up your Web surfing by eliminating banner ads Flash presentations pop up and pop under ad windows and other slo
188. using Options 15 Click Finish If you selected any post installation tasks they start automatically 46 Installing Norton Internet Security If you need to uninstall Norton Internet Security If you need to uninstall Norton Internet Security If you need to remove Norton Internet Security from your computer use the Add Remove Programs option from the Windows Control Panel You can also uninstall only the Norton AntiVirus component of Norton Internet Security During uninstallation Windows may indicate that it is installing software This is a standard Microsoft installation message and can be disregarded To uninstall Norton Internet Security 1 Doone of the following On the Windows taskbar click Start gt Settings gt Control Panel On the Windows XP taskbar click Start gt Control Panel 2 In the Control Panel double click Add Remove Programs 3 In the list of currently installed programs click Norton Internet Security 4 Do one of the following In Windows 2000 Me click Change Remove In Windows 98 click Add Remove In Windows XP click Change 5 Doone of the following Click Remove NAV to uninstall the Norton AntiVirus component of Norton Internet Security Click Remove All to uninstall the entire product 6 Ifyou plan to reinstall Norton Internet Security check Save my settings This saves a copy of your current security settings You can then import these settings to restore your pr
189. ustomize behavior for the Norton Protected Recycle Bin Options Customize Norton AntiVirus The Other options that you can set are as follows Option Description Threat Categories Determine the threats that you want Norton AntiVirus to detect Advanced options include how to respond when a threat is found and what to do when deleting threats Exclusions options specify the files that should not be scanned by file name extension or by specific file name Inoculation Enable Inoculation and if a system file changes choose to update the Inoculation snapshot or repair the file by restoring it to its original values Inoculation options are available only on Windows 98 98SE Me Miscellaneous Back up file in Quarantine before attempting a repair This option is automatically set to On Enable Office Plug in If you upgrade to Microsoft Office 2000 or later after Norton AntiVirus is installed you must enable this option to automatically scan Microsoft Office files Alert me if my virus protection is out of date Scan files at system startup Windows 98 98SE only Enable password protection for options 92 Options Set Norton AntiVirus options Set Norton AntiVirus options You change the settings for Norton AntiVirus options in the Options window If you set a password for Options Norton AntiVirus asks you for the password before you can continue To change settings 1 At the top of the main wind
190. ve A then click Update A message prompts you to insert the disk labeled Basic Rescue Boot Floppy Disk into drive A 3 Insert the Basic Rescue Boot Floppy Disk into drive A then click OK 4 Insert the remaining disks in your set as requested Make sure to test your newly updated Rescue Disk set when prompted Rescue Disk options Rescue Disk has the following options Add Files Remove File Click to specify additional files that you want Rescue Disk to store on the Rescue Disk set 0 Do not use this as a backup utility Add files only if they are needed to restore your system after a crash Click to remove the selected file under User selected Files The files will no longer be included on the Rescue Disk set Rescue items list Basic Rescue Boot Floppy Files Rescue DOS Utility Programs Norton AntiVirus Program Definitions Disks User selected Files Basics 75 Create and use Rescue Disks The list is categorized and presented in a hierarchical view similar to a Windows Explorer view Click the plus sign next to a category to expand the list and see what the category contains Click the plus sign next to a specific file for more information about the file The list of rescue items is different depending on the Programs you have installed and the type of Rescue Disk set you are using Files that Rescue Disk stores on the floppy disk that you use to start your system DOS based em
191. w loading or intrusive content See Blocking Internet advertisements on page 179 26 Feature summary Security protection features Alert Assistant The Alert Assistant helps you understand security issues suggests how you can resolve problems and advises you on avoiding future security problems See Learn more with the Alert Assistant on page 56 Norton AntiSpam Norton AntiSpam helps reduce the amount of unwanted email messages that you receive by intelligently filtering incoming messages and clearly marking potential spam See Blocking unwanted email messages on page 175 Parental Control Parental Control lets parents choose the Web sites and newsgroups that their children can visit and the types of Internet programs that children can use See Controlling individuals Internet use on page 159 Feature summary 27 Norton AntiSpam features Norton AntiSpam features As email becomes more popular many users are receiving an increasing amount of the unsolicited commercial email messages known as spam Not only does spam make it difficult to identify valid email messages Some spam contains offensive messages and images Also many Web sites are using more aggressive techniques to draw attention to the ads on their pages Some have begun using larger more prominent ads while others rely on ad windows that appear when you enter or leave the site Along with increasing the amount of time
192. ware You should be especially wary of ads that invite you to install novelty cursors or other entertaining add ons These frequently include user agreements that require you to allow companies to track your browsing or to provide them with personal information among other things Such clauses are typically hidden deep in the text where many users will not bother to read them Troubleshooting 199 Troubleshoot Norton AntiVirus Troubleshoot Norton AntiVirus Check here for possible solutions to issues that might arise with Norton AntiVirus Auto Protect does not load when start my computer If the Norton AntiVirus Auto Protect icon does not appear in the lower right corner of the Windows taskbar Auto Protect is not loaded There are three likely reasons that this is happening You may have started Windows in safe mode Windows restarts in safe mode if the previous shutdown did not complete successfully For example you may have turned off the power without choosing Shut Down on the Windows Start menu To restart Windows 1 On the Windows taskbar click Start gt Shut Down 2 Inthe Shut Down Windows dialog box click Restart 3 Click OK Norton AntiVirus may not be configured to start Auto Protect automatically To set Auto Protect to start automatically 1 At the top of the main window click Options If a menu appears click Norton AntiVirus 2 Inthe Options window under System click Auto Protect 3 Ensure tha
193. when you are done reading the file Access the User s Guide PDF The Norton Internet Security User s Guide is provided on the CD in PDF format You must have Adobe Acrobat Reader installed on your computer to read the PDF O If you purchased this product as an electronic download Adobe Acrobat Reader was not included You must download it from the Adobe Web site 80 Basics For more information To install Adobe Acrobat Reader 1 2 3 4 5 Insert the CD into the CD ROM drive Click Browse CD In the CD window double click the Manual folder Double click the program file Follow the on screen instructions to select a folder for Adobe Acrobat Reader and complete the installation Once you have installed Adobe Acrobat Reader you can read the PDF from the CD db If you do not have a CD you can download the PDF from the Symantec Service amp Support Web site To read the User s Guide PDF from the CD 1 2 3 4 Insert the CD into the CD ROM drive Click Browse CD Double click the Manual folder Double click NIS pdf You can also copy a User s Guide to your hard disk and read it from there To read a User s Guide from your hard disk 1 2 Open the location into which you copied the PDF Double click the PDF Symantec products on the Web The Symantec Web site provides extensive information about all Symantec products There are several ways to access the Symantec Web site Basics
194. y removes Ad banners Pop up and pop under ads Macromedia Flash based ads Trashcan As you use the Internet you may find ads that are not included on the default Ad Blocking list You can use the Ad Trashcan to add these to your personal list of blocked ads To use the Ad Trashcan Open your Web browser and view the page containing he advertisement that you want to block 2 Open Norton Internet Security 3 In the main window double click Ad Blocking 4 Inthe Ad Blocking window ensure that Enable Ad Blocking is checked 5 Click Ad Trashcan The Ad Trashcan window appears 6 With the windows arranged so that you can see both the advertisement and the Ad Trashcan window do one of the following 180 Blocking Internet advertisements Use text strings to identify ads to block or permit If you are using Microsoft Internet Explorer drag the unwanted ad from the Web site to the Ad Blocking dialog box If you are using Netscape right click the advertisement then click Copy Image Location In the Ad Trashcan click Paste The address for the advertisement appears in the Ad Details line of the Ad Trashcan dialog box Select one of the following Add Block this address Modify Change the entry before adding it to the Ad Blocking list For example if the advertisement address is http www uninvutedads org annoying ads numberone gif you could change it to http www uninvitedads org annoyi
195. ymantec spam definition files spam definitions automatically subscription required See Keeping current with LiveUpdate on page 95 Feature summary 29 Virus and threat protection features Virus and threat protection features Norton AntiVirus provides comprehensive virus prevention threat detection and repair software for your computer It automatically detects and repairs known viruses Norton AntiVirus detects viruses and other potential risks in instant messenger attachments as well as in email messages Internet downloads and other files Easy updating of the virus definitions over the Internet keeps Norton AntiVirus prepared for the latest threats Norton AntiVirus now includes expanded threat detection of both known and emerging threats such as spyware and other files that could put your computer at risk Norton AntiVirus also scans files inside of compressed files As always Norton AntiVirus features continually monitor your computer and protect it from known and unknown threats Auto Protect a Loads into memory when Windows starts providing constant protection while you work Checks for viruses every time that you use software programs on your computer insert floppy disks or other removable media access the Internet or use document files that you receive or create Monitors your computer for any unusual symptoms that may indicate an active threat See What to do if a virus is fo
196. you can customize a General Rules Trojan Horse Rules a Program Rules To add a General Rule 1 Inthe main window double click Personal Firewall 2 Inthe Personal Firewall window on the Advanced ab click General 3 Follow the on screen instructions To add a Trojan Horse Rule 1 Inthe main window double click Personal Firewall 2 In the Personal Firewall window on the Advanced ab click Trojan Horse 3 Follow the on screen instructions To add a Program Rule 1 Inthe main window double click Personal Firewall 2 Inthe Personal Firewall window on the Programs tab in the list of programs click Add 3 In the Select a program window select a program s executable file Executable file names typically end in exe 4 Inthe Program Control alert on the What do you want o do menu click Manually configure Internet access 5 Follow the on screen instructions nu Guarding against intrusion attempts Customize firewall rules Change an existing firewall rule You can change firewall rules if they are not functioning the way that you want To change an existing firewall rule 1 In the General Rules Trojan Horse Rules or Program Rules window select the rule that you want to change If you have turned on Network Detector select the Location that should use the modified rule Click Modify Follow the on screen instructions to change any aspect of the rule 4 When you have finished cha
Download Pdf Manuals
Related Search
Related Contents
Bedienungsanleitung Rabia - Instituto de Medicina Tropical Kid Kart® Xpress Owner`s Manual Panasonic KX-TCD715ALM Telephone User Manual Copyright © All rights reserved.
Failed to retrieve file