Home

Symantec Norton Internet Security 2003 (10024885) for PC

image

Contents

1. Controlling access to protected computers Control how people use your computer oo eee eeeeeeeseeeeseeeeseeneeeenes Connect to a NECWOLK oo eeeeeeeeeeeeeseeseseeseseeseeesteeeseeneseeseeseseeeeseeaes Enable file and printer Sharing cocesonesonoimenororensis Organize computers into network zones Identify computers to Norton Internet Security s s s 93 Control how users access the Internet 0 eeeeeeseeseeeeseeeeseeneeeees 96 If you access the Internet via a cable or DSL router u s 96 If multiple computers share a single Internet connection 96 If your ISP USES a proxy SELVED ou eeeeesesseeeesesseeeeseeeeseeeeseeseeeneeseaes 96 Control how outside users access your NetWork sssi 98 TE YOU TUNA WED SEFVER casisss cecescesstdessacssceesgcasstsnsst asiussacueseencdteedes 98 Wyo tanan FTP SOrver sccssescscsscssstesterucreeseseosets AE n 98 If you run Symantec PCANYWNETE cirieeoro nerien 99 If you run a Virtual Private Network 0 ceseeeeeeeeeeeeseeeeeeees 99 11 12 Contents Chapter 7 Chapter 8 Guarding against intrusion attempts How Norton Internet Security protects against network attacks e hia Sattvates a eiaa aaa 102 Norton Personal Firewall monitors communications 102 Intrusion Detection analyzes communications eee 103 Visual Tracking locates attackers soseicceineinamiseneiis 104 Ensure that Norton Personal Firewall and Intrusion Detection ar enabled arcis AERE A 104 Cus
2. Norton AntiVirus Quarantine Quarantined Items 0 All Items 0 B Quarantined Items 0 Backup Items 0 E Submitted to Symantec 0 The toolbar at the top of the Quarantine window contains all of the actions that you can perform on Quarantined files Adds files to Quarantine Use this action to quarantine a file that you suspect is infected This action has no effect on files that are already in Quarantine Provides detailed information about the selected file and the virus that is infecting it Attempts to repair the selected file Use this action if you have received new virus definitions since the file was added to Quarantine Returns the selected file to its original location without repairing it Deletes the selected file from your computer 139 14 0 What to do if a virus is found If Norton AntiVirus cannot repair a file Submit Item Sends the selected file to Symantec Use this option if you suspect that a file is infected even if Norton AntiVirus did not detect it LiveUpdate Runs LiveUpdate to check for new protection and program updates Use this if you haven t updated your virus definitions for a while and then try to repair the files in Quarantine To perform an action on a file in Quarantine 1 Select the file on which you want to perform the action 2 Inthe toolbar select the action that you want to perform 3 When you are finished on the File menu cl
3. Bootp Remote Exec 4 Inthe Signatures list select the attack signature that you want to exclude Guarding against intrusion attempts 121 Customize Intrusion Detection 5 Click Exclude 6 When you are done excluding signatures click OK If you have excluded attack signatures that you want to monitor again you can include them in the list of active signatures To include attack signatures 1 Open Norton Internet Security In the Security Center double click Intrusion Detection In the Intrusion Detection window click Signatures FWN In the Excluded Signatures list select the attack signature that you want to monitor Click Include 6 When you are done including signatures click OK Enable or disable AutoBlock When Norton Internet Security detects an attack it automatically blocks the connection to ensure that your computer is safe The program can also activate AutoBlock which automatically blocks all incoming communication from the attacking computer for a set period of time even if the incoming communication does not match an attack signature AutoBlock stops all inbound communications with the attacking computer for 30 minutes To enable or disable AutoBlock 1 Open Norton Internet Security 2 Inthe Security Center double click Intrusion Detection 3 Inthe Intrusion Detection window check or uncheck Turn on AutoBlock Unblock computers In some cases Norton Internet Security
4. Your normal Internet access fees apply when you use LiveUpdate If you are using Norton Internet Security on Windows 2000 XP you must have Administrator access rights to run LiveUpdate About program updates Program updates are minor improvements to your installed product These differ from product upgrades which are newer versions of entire products Program updates that have self installers to replace existing software code are called patches Patches are usually created to extend operating system or hardware compatibility adjust a performance issue or fix bugs LiveUpdate automates the process of obtaining and installing program updates It locates and obtains files from an Internet site installs them and then deletes the leftover files from your computer 82 Keeping current with LiveUpdate About protection updates About protection updates Protection updates are files available from Symantec by subscription that keep your Symantec products up to date with the latest anti threat technology The protection updates you receive depend on which product you are using Norton AntiVirus Users of Norton AntiVirus and Norton SystemWorks Norton SystemWorks receive virus definition service updates which provide access to the latest virus signatures and other technology from Symantec Norton Internet In addition to the virus definition service users of Norton Security Internet Security also receive protection updates t
5. introducing 22 monitoring by 125 options 67 threats found by 137 worms 230 Z zombie programs 103 230 zones 91 93 adding computers to 91 92 Restricted 91 122 Trusted 91 104 Index 253 254 Index Norton Internet Security 2003 CD Replacement Form CD REPLACEMENT After your 60 Day Limited Warranty if your CD becomes unusable fill out and return 1 this form 2 your damaged CD and 3 your payment see pricing below add sales tax if applicable to the address below to receive replacement CD DURING THE 60 DAY LIMITED WARRANTY PERIOD THIS SERVICE IS FREE You must be a registered customer in order to receive CD replacements If your Symantec product was installed on your computer when you purchased it contact your hardware manufacturer for CD replacement information FOR CD REPLACEMENT Please send me _ CD Replacement Name Company Name Street Address No P O Boxes Please City State Zip Postal Code Country Daytime Phone Software Purchase Date This offer limited to U S Canada and Mexico Outside North America contact your local Symantec office or distributor Briefly describe the problem CD Replacement Price 10 00 SALES TAX TABLE AZ 5 CA 7 25 CO 3 CT 6 DC 5 75 FL 6 GA 4 Sales Tax See Table IA 5 IL 6 25 IN 5 KS 4 9 LA 4 MA 5 MD 5 ME 6 MI Shipping amp Handling 9 95 6 MN 6
6. lt Back Next gt Skip 2 Ifyou would like information from Symantec about Norton Internet Security select the method by which you want to receive that information then click Next 3 Type your name then click Next Installing Norton Internet Security 37 Register your software 4 Type your address then click Next amp Please Register Norton Internet Security Please complete a short survey To help Symantec improve products and services please take a moment to answer the survey questions Click the button below the question to select an answer 41 gt Question 1 of 7 What generated your interest in this product Web browsing Friend colleaque Symantec name Press article Advertisement To continue but skip the su Direct mail Trade show Other lt Back Skp 5 Doone ofthe following Answer the survey questions to help Symantec improve its products and services then click Next Skip the survey by clicking Next amp amp Please Register Norton Internet Security Ready to send your registration How would you like to register Settings Preview Click Security for more information Security E 38 Installing Norton Internet Security After installation 10 11 Select whether you want to register Norton Internet Security over the Internet or by mail If you want to register by mail your computer must be
7. A Web page can contain text hyperlinks and graphics A group of Web pages that is managed by a single company organization or individual A Web site may include text graphics audio and video files and hyperlinks to other Web pages The collection of hypertext documents that are stored on Web servers around the world Also called WWW or simply the Web The Web allows universal access to a vast collection of documents that are stored in HTML format as Web pages A program that makes copies of itself for example from one disk drive to another or by sending itself through email It may do damage or compromise the security of the computer A dormant program that is secretly placed on a computer and awakened to aid in a collective attack on another computer or server Zombie programs don t usually damage the computer on which they reside but are used to attack other computers Index A access Alert Tracker 50 Block Traffic 50 60 Help 50 LiveUpdate 50 54 logs 54 Norton AntiVirus 51 Norton Internet Security 49 52 Options 61 Program Scan 54 Security Check 58 Visual Tracking 58 59 accounts creating 146 150 creating with Parental Control Wizard 146 149 customizing 154 levels 145 logging on 153 Not Logged In 145 passwords 150 set startup 150 using Windows accounts 151 153 active content 226 protection from 102 See also ActiveX controls troubleshooting 205 ActiveX controls 205 226
8. Blocking all images on a particular site may make that site unusable A good compromise is to block only the directories that contain ads For example if www ajax com stores its ads in nifty_images and its navigational images in useful_images you could block www ajax com nifty_images without seriously impeding your ability to use the site You can also create permit strings that allow Web sites to display images that match the string This allows you to override the blocking effect of any string in the Defaults block list for individual sites Permit rules take precedence over Block rules on any site Add an Ad Blocking string You can add strings to the Ad Blocking list for all sites or for individual sites To add an Ad Blocking string 1 Open Norton Internet Security 2 At the top of the Security Center window click Options gt Internet Security 3 On the Web Content tab on the Ad Blocking tab do one of the following To block a string on all Web sites click Defaults To block a string on a Web site in the list select the site s name To block a string on a Web site not in the list click Add Site then in the New Site Domain dialog box type the site s address 4 On the Ad Blocking tab click Add 170 Blocking Internet advertisements Use text strings to identify ads to block or permit In the Add New HTML String dialog box select the action that you want to take Your options are Blo
9. Log Viewer Improved version helps you see all of the actions Norton Internet Security takes to protect your computer 22 About Norton Internet Security Norton Internet Security features Privacy Control Enhanced version blocks private information in email and instant messages Parental Control Enhanced version lets parents choose the Web sites newsgroups and programs children can use Norton AntiVirus 2003 contains the following new features Expanded file repair and deletion Norton AntiVirus now automatically repairs all repairable files without any interaction with you Instant messenger support and options Norton AntiVirus now scans files received by America Online Yahool and MSN instant messenger programs Worm Blocking Norton AntiVirus scans outgoing email attachments for worms and alerts you before sending any infected files Norton Internet Security features Norton Internet Security includes Norton Personal Firewall Norton AntiVirus and a suite of other security tools that help keep your computer safe You can get fast access to all Norton Internet Security tools from the new Security Monitor Security Monitor ioj xj Blocked HTTP private information bank numbers Select a Task gt gt symantec horton internet Security Internet security can be a complicated topic to understand so Norton Internet Security now includes the Alert Assistant which helps you understand security issues suggest
10. The likelihood of being attacked The Internet presents many risks What are the odds that your computer will be attacked The chance of an attacker singling out your computer from all of those on the Internet is slim However the use of port scanning and other computer discovery tools by hackers means that your computer may be scanned relatively frequently for vulnerabilities The more vulnerabilities that are found the more inviting your computer is to hackers The tools that hackers use to find targets can scan large groups of computers on the Internet The hacker simply enters a range of IP addresses to be scanned The program checks each IP address in the range to see if a computer is there If it finds a computer it performs a series of tests to identify vulnerabilities such as having Microsoft networking enabled over the Internet The hacker returns to find a list of computers and their vulnerabilities Norton Internet Security protects you from these scans by making your computer invisible Your computer won t respond to queries that these scanners send This means that your computer exhibits no vulnerabilities to the hacker making it a poor target for attack 232 Understanding Internet risks The likelihood of being attacked Service and support solutions The Service amp Support Web site at http service symantec com supports Symantec products Customer Service helps with nontechnical issues such as orders upgrades
11. and other active content Changes to these settings affect all users Your options are Information Block or allow Web sites from requesting information about your about your computer and Web browser browser Information Block or allow Web sites from requesting information about other about visited Web sites you have visited during this session online sites Animated Block or allow animated images from running images Scripts Block or allow JavaScripts Flash ads Block or allow ads made with Macromedia Flash 64 Norton Internet Security basics Customize Norton Internet Security About User Settings User Settings let you customize cookie blocking pop up window blocking and ActiveX and Java settings for individual sites Changes to these settings only affect the current user Your options are Cookies Block or allow Web sites from creating and reading cookie files on your computer Java applets Block or allow Java applets from running Activex Block or allow ActiveX controls from running controls Pop up ads Block or allow pop up ads About Ad Blocking settings Ad Blocking settings let you specify individual ad banners or groups of ad images you want to block or allow on individual sites See Use text strings to identify ads to block or permit on page 168 About Email options Email options let you control how Norton Internet Security notifies you when it is scanning email messages f
12. check the online Help Manually scan disks folders and files If Auto Protect is enabled and the Norton AntiVirus options are set at their default levels you normally would not need to scan manually However if you temporarily disabled Auto Protect for example to load or use another program that conflicts with Norton AntiVirus and you forgot to enable it again it is possible that a virus could be on your hard disk undetected You can scan your entire computer or individual floppy disks drives folders or files Protecting disks files and data from viruses 127 Manually scan disks folders and files Although the default settings for manual scanning are usually adequate you can raise the level of Bloodhound heuristics or adjust the options for manual scanning in the Options window Check online Help for more information about manual scanning options Perform a full system scan A full system scan scans all boot records and files on your computer To perform a full system scan 1 Start Norton Internet Security In the Security Center click Norton AntiVirus gt Scan for Viruses In the Scan for Viruses pane click Scan my computer FW N Under Actions click Scan When the scan is complete a scan summary appears 5 When you are done reviewing the summary click Finished Scan individual elements Occasionally you may want to scan a particular file removable drives a floppy disk any of your computer s drive
13. converts to analog and demodulates converts from analog digital data for transmission over a telephone line Also includes interface devices for digital connections to the Internet such as ISDN cable and DSL A set of computers and associated hardware connected together in a work group for the purpose of sharing information and hardware among users Glossary 241 A method of converting IP addresses used on an intranet or local area network into Internet IP addresses This lets many computers share an Internet IP address More importantly it hides the IP addresses of network computers from outsiders The portion of an IP address that is common to all computers on a particular network or subnet A program that ties the capabilities of computer hardware and software to input output devices such as disks keyboards and mouse devices An attempt by your computer to open a connection with a remote computer The connection can be used to send data to and from your computer A unit of data that is routed between an origin anda destination on the Internet In addition to the data being transmitted a packet contains information that enables computers on a network to determine whether to receive it A network of computers such as the Internet that transmits files by breaking them into packets and routing each packet along the best available route between the source and destination computers A character sequence entered b
14. replacements and rebates Technical Support helps with technical issues such as installing configuring or troubleshooting Symantec products Methods of technical support and customer service can vary by region For information on support offerings in your region check the appropriate Web site listed in the sections that follow If you received this product when you purchased your computer your computer manufacturer may be responsible for providing your support Customer service The Service amp Support Web site at http service symantec com tells you how to Subscribe to Symantec newsletters Locate resellers and consultants in your area Replace defective CD ROMs and manuals Update your product registration Find out about orders returns or a rebate status Access Customer Service FAQs Post a question to a Customer Service representative Obtain product information literature or trialware 234 Service and support solutions Technical support For upgrade orders visit the Symantec Store at http www symantecstore com Technical support Symantec offers two technical support options for help with installing configuring or troubleshooting Symantec products Online Service and Support Connect to the Symantec Service amp Support Web site at http service symantec com select your user type and then select your product and version You can access hot topics Knowledge Base articles tutoria
15. 48 C F R section 227 7202 as 8 C F R section 12 212 48 C F R section 252 227 7015 48 C F R section 227 7202 through 227 7202 4 48 C F R section 52 227 14 and other relevant sections of the Code of Federal Regulations as applicable Symantec s computer software and computer software documentation are licensed to United States Government end users with only those rights as granted to all other end users according to the terms and conditions contained in this license agreement Manufacturer is Symantec Corporation 20330 Stevens Creek Blvd Cupertino CA 95014 7 GENERAL If You are located in North America or Latin America this Agreement will be governed by the laws of the State of California United States of America Otherwise this Agreement will be governed by the laws of England This Agreement and any related License Module is the entire agreement between You and Symantec relating to the Software and i supersedes all prior or contemporaneous oral or written communications proposals and representations with respect to its subject matter and ii prevails over any conflicting or additional terms of any quote order acknowledgment or similar communications between the parties This Agreement may only be modified by a License Module or by a written document which has been signed by both You and Symantec This Agreement shall terminate upon Your breach of any term contained herein and You shall cease use o
16. 5 MO 4 225 NC 6 NJ 6 NY 4 OH 5 OK 4 5 PA TOTAL DUE 6 SC 5 TN 6 TX 6 25 VA 4 5 WA 6 5 WI 5 Please add local sales tax as well as state sales tax in AZ CA FL GA MO NY OH OK SC TN TX WA WI FORM OF PAYMENT CHECK ONE ___ Check Payable to Symantec Amount Enclosed __ Visa __ Mastercard _ AMEX Credit Card Number Expires Name on Card please print Signature U S Dollars Payment must be made in U S dollars drawn on a U S bank MAIL YOUR CD REPLACEMENT ORDER TO Symantec Corporation Attention Order Processing 555 International Way Springfield OR 97477 800 441 7234 Please allow 2 3 weeks for delivery within the U S Symantec and Norton Internet Security are trademarks of Symantec Corporation Other brands and products are trademarks of their respective holder s S y I lan ec 2002 Symantec Corporation All rights reserved Printed in the U S A
17. 98SE Me you receive an alert telling you which file was repaired or deleted To close the alert Click Finish If you have set your options so that Auto Protect asks you what to do when it finds a virus the alert asks you to choose an action The recommended action is always preselected Repair the infected file Automatically eliminates the virus Trojan horse or worm and repairs or deletes the infected file When a virus is found Repair is always the best choice Quarantine the infected Isolates the infected file but does not remove the threat file Select Quarantine if you suspect that the infection is caused by an unknown threat and you want to submit the threat to Symantec for analysis 136 What to do if a virus is found If a virus is found by Auto Protect Do not open the file but Stops the current operation to prevent you from using leave the problem alone an infected file This action does not solve the problem You will receive an alert the next time that you perform the same activity Ignore the problem and Continues the current operation Select this option only continue with the if you are sure that a virus Trojan horse or worm is not infected file at work You will receive an alert again If you are not sure what to do select Do not open the file but leave the problem alone If a file cannot be repaired you receive an alert telling you that the repair was not made and recommending
18. Ad Blocking 163 170 enabling and disabling 165 identifying ads to block 169 170 troubleshooting 205 Ad Trashcan 167 168 Adobe Acrobat Reader installing 77 advertisements blocking 163 170 205 Alert Assistant 55 Alert Tracker 56 58 accessing 50 Alerting Level adjusting 55 alerts adjusting the Alerting Level 55 Alert Assistant 55 new network connection 89 overview 55 AOL 84 applications accessing Internet See Internet enabled programs attack signatures 103 excluding 120 attacks 101 122 224 226 231 network 102 signatures 103 tracing 58 59 tracing from AutoBlock 59 tracing from Log Viewer 59 tracing from Statistics 59 AutoBlock 121 122 Automatic LiveUpdate 67 86 246 Index Automatic Program Control 110 enabling 110 Auto Protect description 72 disabling 72 enabling 72 125 failure to load on startup 210 211 functions 25 options 66 backing up file before repair 68 banner ads 163 170 205 Block Traffic 60 accessing 50 blocking advertisements 163 170 205 browser information 208 computers 121 cookies 160 205 228 email addresses 161 spam 171 177 Web sites 181 185 Bloodhound description 25 options 66 booting absent 209 Auto Protect failure to load 210 211 changing floppy disk drive settings 210 floppy disk drive fails 210 Rescue Disks fail 209 BOOTP service 109 browser information 208 privacy 161 C CD ROM starting from 17 starting Norton AntiVirus from 142 changing scan schedules 131 changin
19. Blocking setting to control how Norton Internet Security handles sites that attempt to place cookies on your computer To change the Cookie Blocking setting 1 2 3 Start Norton Internet Security Double click Privacy Control In the Privacy Control window in the Privacy Control settings for drop down list select the account that you want to change Click Custom Level Select the Cookie Blocking setting that you want You have three options High Blocks all cookies Medium Alerts you each time that a cookie is encountered None Allows cookies Click OK Protecting your privacy 161 Customize Privacy Control Enable or disable Browser Privacy Browser Privacy prevents Web sites from learning the type of browser that you are using the Web site that you last visited and other information about your browsing habits Some Web sites that depend on JavaScript may not work correctly if they cannot identify the type of browser that you are using To enable or disable Browser Privacy 1 Start Norton Internet Security 2 Double click Privacy Control 3 In the Privacy Control window in the Privacy Control settings for drop down list select the account that you want to change 4 Click Custom Level In the Customize Privacy Settings dialog box check or uncheck Enable Browser Privacy 6 Click OK Disable or enable secure Web connections When you visit a secure Web site your browser sets up an encrypted con
20. Interactive Mode 4 Click OK 86 Keeping current with LiveUpdate Run LiveUpdate automatically Run LiveUpdate automatically You can have LiveUpdate check for protection updates automatically on a set schedule by enabling Automatic LiveUpdate You must continue to run LiveUpdate manually to receive product updates Automatic LiveUpdate checks for an Internet connection every five minutes until a connection is found and then every four hours If you have an ISDN router that is set to automatically connect to your Internet service provider ISP many connections will be made with connection and phone charges possibly being incurred for each connection If this is a problem you can set your ISDN router to not automatically connect to the ISP or disable Automatic LiveUpdate in the Norton Internet Security options To enable Automatic LiveUpdate 1 Start Norton Internet Security 2 At the top of the Security Center click Options gt Internet Security O If you set a password for Options Norton Internet Security asks you for the password before you can continue 3 Inthe Norton Internet Security Options dialog box on the LiveUpdate tab check Enable Automatic LiveUpdate 4 Ifyou want to be notified when updates are available check Notify me when Norton Internet Security updates are available 5 Select the updates for which you want Automatic LiveUpdate to check For each type of update you want Automatic LiveUpdate to
21. JavaScript scripts for viruses If it Papell ba detects a virus or virus like activity in most cases you receive an alert page 125 telling you that a potential threat was found You must choose one of the options to remove the threat The recommended action is to stop the script from running You can click Help on the alert for additional information about how to respond If a threat is found by Worm Blocking See Ensure that If a program tries to email itself or email a copy of itself it could be a worm eere trying to spread via email A worm can send itself or a copy of itself in an page 125 email message without any interaction with you Worm Blocking continually scans outgoing email attachments for worms If it detects a worm you receive an alert telling you that a malicious worm was found The alert presents you with options and asks you what to do If you were not sending an email message at that time then it is probably a worm and you should quarantine the file You can click Help on the alert for additional information about how to respond After you have responded to the threat and deleted the file you could still have an infected system Run LiveUpdate scan your system and if necessary go to the Symantec security response Web page securityresponse symantec com for the most up to date virus definitions clean up tools 138 What to do if a virus is found If you have files in Quarantine If Inoculation alerts y
22. Norton AntiVirus My Rescue Disk does not work Due to the number of product specific technologies used by manufacturers to configure and initialize hard drives the Rescue program cannot always create a bootable disk automatically If your Rescue Boot Disk does not work properly do one of the following If you have a special startup disk for your computer add it to your Rescue Disk set In an emergency start from that disk Remove the disk and insert your Rescue Boot Disk At the DOS prompt type A RSHELL press Enter then follow the on screen instructions Use the Disk Manager or similarly named program that came with your computer to make your Rescue Boot Disk bootable Make sure to test your modified Rescue Boot Disk Sometimes your Rescue Boot Disk does not work properly because you have more than one operating system installed such as Windows 2000 and Windows 98 To modify your Rescue Boot Disk 1 FW N Start up from your hard drive Insert your Rescue Boot Disk into drive A At the DOS prompt type SYS A Press Enter This transfers the operating system to the Rescue Boot Disk Be sure to retest your Rescue Disks The alert tells me to use my Rescue Disks but did not create them See Create Emergency Disks on page 30 See If you are using the CD as an Emergency Disk on page 142 With your Norton Internet Security CD you can create Emergency Disks Although they are not as powerful as the Res
23. Security Temporarily disable Norton Internet Security There may be times when you want to temporarily disable Norton Internet Security or one of its features For example you might want to view online ads or see if Norton Internet Security is preventing a Web page from appearing correctly See About Norton Only Adult or Supervisor users can temporarily disable Norton Internet a Security Child and Teenager users cannot disable any portion of Norton page 145 Internet Security Disabling Norton Internet Security also disables all of the individual features To temporarily disable Norton Internet Security 1 Open Norton Internet Security 2 Inthe Security Center click Security 3 Onthe right side of the screen click Turn Off Norton Internet Security is automatically turned back on the next time you start your computer You can also disable individual security features For example you might want to see if the Personal Firewall is preventing a program from operating correctly To disable a protection feature 1 Open Norton Internet Security 2 Inthe Security Center select the feature that you want to disable 3 On the right side of the screen click Turn Off 72 Norton Internet Security basics Temporarily disable Norton Internet Security Temporarily disable Auto Protect See Customize Norton AntiViru on page 65 s If you have not changed the default option settings Auto Protect loads when you start
24. Security from Norton SystemWorks 1 Open Norton SystemWorks 2 Onthe Norton Internet Security tab click Launch Norton Internet Security 46 Installing Norton Internet Security If you need to uninstall Norton Internet Security To open Norton SystemWorks from Norton Internet Security 1 2 Open Norton Internet Security In the Security Center on the Norton SystemWorks tab click Launch Norton SystemWorks If you need to uninstall Norton Internet Security If you need to uninstall Norton Internet Security from your computer use the Uninstall Norton Internet Security option on the Windows Start menu You can also uninstall only the Norton AntiVirus component of Norton Internet Security During uninstall Windows may indicate that it is installing software This is a standard Microsoft installation message and can be disregarded To uninstall Norton Internet Security 1 Do one of the following On the Windows taskbar click Start gt Programs gt Norton Internet Security gt Uninstall Norton Internet Security On the Windows XP taskbar click Start gt More Programs gt Norton Internet Security gt Uninstall Norton Internet Security Do one of the following Click Remove NAV to uninstall the Norton AntiVirus component of Norton Internet Security Click Remove All to uninstall the entire product If you have files in Quarantine you are asked if you want to delete them Your options are
25. To reset your Norton Internet Security options password 1 5 6 7 8 Do one of the following On the Windows taskbar click Start gt Programs gt Norton Internet Security gt Uninstall Norton Internet Security On the Windows XP taskbar click Start gt More Programs gt Norton Internet Security gt Uninstall Norton Internet Security In the Remove Application window click Reset Password In the password reset dialog box in the Reset Password Key text box type the Reset Password Key that appears above the text box The Reset Password Key is case sensitive In the New Password and Confirm New Password text boxes type a new password Click OK In the Remove Application window click Cancel In the Norton Internet Security alert click Exit In the Setup Canceled alert click OK To reset your Norton AntiVirus options password 1 2 Open Norton Internet Security At the top of the Norton Internet Security window click Help gt About Norton Internet Security In the About window on the Norton AntiVirus tab click Reset Password In the password reset dialog box in the Reset Password Key text box type the Reset Password Key that appears above the text box The Reset Password Key is case sensitive In the New Password and Confirm New Password text boxes type a new password Click OK In the About window click OK Norton Internet Security basics 71 Temporarily disable Norton Internet
26. Web sites or entire domains If you create an exception for a domain all Web sites within the domain are included For example if you create an exception for the domain msn com Parental Control will allow all Web sites at that domain including www msn com and messenger msn com If you block messenger msn com only that Web site will be blocked To create exceptions for specific sites 1 Start Norton Internet Security 2 Double click Parental Control w In the Parental Control window in the Parental Control settings for drop down list select the account that you want to change Click Sites In the Specify Sites window click Specify Blocked Sites Click Exceptions In the Exceptions window click Add on Aou F In the Add Web site to Exception List window type the URL of the site that you want to add 9 Click OK 10 Repeat the previous three steps for each Web site that you want to add to your exceptions list 11 When you are done adding sites click OK 184 Protect children with Parental Control Customize Parental Control Create a list of permitted Web sites You can strictly control Web access by creating a list of Web sites that people using this computer are allowed to access Any sites that are not on the list of permitted Web sites are blocked Everyone who uses this computer can visit only approved sites regardless of their account types To create a list of permitted Web sites 1 2 3 4 This a
27. Yes Deletes the quarantined files from your computer No Leaves the quarantined files on your computer but makes them inaccessible To repair or submit the files to Symantec for analysis reinstall Norton Internet Security In the Installer Information dialog box click Yes to restart your computer Installing Norton Internet Security 47 If you need to uninstall Norton Internet Security If you have no other Symantec products on your computer you should also uninstall LiveReg and LiveUpdate To uninstall LiveReg and LiveUpdate 1 Doone of the following On the Windows taskbar click Start gt Settings gt Control Panel On the Windows XP taskbar click Start gt Control Panel 2 Inthe Control Panel double click Add Remove Programs In the list of currently installed programs click LiveReg 4 Doone of the following In Windows 2000 Me click Change Remove In Windows 98 click Add Remove In Windows XP click Remove 5 Click Yes to confirm that you want to uninstall the product 6 To uninstall LiveUpdate repeat steps 1 through 5 selecting LiveUpdate in step 3 48 Installing Norton Internet Security If you need to uninstall Norton Internet Security After installation Norton Internet Security automatically protects any computer on which it is installed You do not have to start the program to be protected Access Norton Internet Security Launch Norton Internet Security to change protection se
28. account password O To protect both Norton Internet Security and Norton AntiVirus options you must set passwords for both products Norton Internet Security basics 69 Password protect options To protect Norton Internet Security options with a password 1 2 6 Open Norton Internet Security At the top of the Norton Internet Security window click Options gt Internet Security On the General tab check Turn on Password Protection If the account currently logged on does not have a password you must select one now Click Set Password In the Password and Confirm Password text boxes type a password If you are also setting a password for Norton AntiVirus options you may want to use the same password for both Click OK To protect Norton AntiVirus options with a password 1 2 Open Norton Internet Security At the top of the Norton Internet Security window click Options gt Norton AntiVirus In the Norton AntiVirus options window under Other click Miscellaneous Under How to control access to option settings check Enable password protection for options In the Password and Confirm Password text boxes type a password If you are also setting a password for Norton Internet Security options you may want to use the same password for both Click OK 70 Norton Internet Security basics Password protect options Reset options passwords If you forget your options passwords you can reset them
29. alert 3 Torespond to the alert close the Alert Assistant Adjust the Alerting Level The Alerting Level slider lets you control the amount of information that Norton Internet Security logs and the number of alerts that it displays Supervisors and Adult users can set their own Alerting Levels Supervisors can also set the Alerting Levels for other users 56 Norton Internet Security basics Work with Norton Internet Security Your options are Alerting Information Alert Tracker Security Notifies you when Level Provided Messages Alerts Minimal Critical None Logged not Program Control rules Internet displayed are created events automatically Port scans occur Confidential information is blocked A remote access Trojan horse program is encountered Medium Important Some Logged not Same notification as Internet displayed Minimal plus events Programs access the Internet High Important Many Logged and Same notification as Internet displayed Medium plus events and Unused ports are complete blocked program ER Cookies and content are blocked To adjust the Alerting Level 1 Open Norton Internet Security 2 Inthe Security Center click Alerting Level 3 Move the slider to choose an Alerting Level Use Alert Tracker Many of the Internet events that Norton Internet Security monitors are not significant enough to trigger alerts Alert Tracker provides an easy way t
30. and times or at periodic intervals If you are using the computer when the scheduled scan begins it runs in the background so that you do not have to stop working You cannot schedule the predefined scans in the scan list but you can schedule any custom scans that you have created Schedule a custom scan You have complete flexibility in scheduling custom scans When you select how frequently you want a scan to run such as daily weekly or monthly you are presented with additional fields with which you can refine your request For example you can request a daily scan then schedule it to occur every two days or every three days instead To schedule a custom scan 1 Start Norton Internet Security 2 Inthe Security Center click Norton AntiVirus gt Scan for Viruses 3 Inthe Scan for Viruses pane select the scan that you want to schedule O If you click the button next to the scan name the scan runs 4 Under Schedule Task click Schedule In the Schedule dialog box if Show multiple schedules is checked click New to enable the scheduling fields If it is not checked the fields are already enabled 6 Set the frequency and time at which you want the scan to run Most of the frequency options include additional options that let you further refine the schedule Set the additional options as necessary 7 When you are done click OK Protecting disks files and data from viruses 131 Schedule scans You can also creat
31. check for set how you want those updates to be applied by selecting one of the following Automatically update LiveUpdate checks for and installs protection updates my protection without prompting you LiveUpdate displays an alert when a protection update has been downloaded You should still run LiveUpdate occasionally to check for program updates Notify me LiveUpdate checks for protection updates and asks if you want to install them 7 Click OK Keeping current with LiveUpdate 87 Run LiveUpdate automatically To delete the schedule for Automatic LiveUpdate disable Automatic LiveUpdate To disable Automatic LiveUpdate 1 Start Norton Internet Security 2 At the top of the Security Center click Options gt Internet Security O If you set a password for Options Norton Internet Security asks you for the password before you can continue 3 Inthe Norton Internet Security Options dialog box click the LiveUpdate tab 4 Inthe LiveUpdate pane uncheck Enable Automatic LiveUpdate Click OK 88 Keeping current with LiveUpdate Run LiveUpdate automatically You can configure Norton Internet Security to meet your needs in many different situations You can use the program to control your computer s access to both local computers and computers over the Internet You can also control how outside users access your computer Control how people use your computer Norton Internet Security monitors all conn
32. control alert banner ad boot record Material on a Web page that changes with time or in response to user action Active content is implemented through ActiveX controls Visual Basic Scripts Java scripts and Java applets in the HTML code that defines the page A program that runs within a browser using Microsoft technology to add life to a Web page by using animation streaming audio and video movies and so on When you visit a Web page that contains an ActiveX control it is dynamically downloaded and saved to your hard disk Unlike Java applets ActiveX controls don t run in a restricted environment and have the potential to take control of your computer A dialog box that appears in a graphical user interface GUI to signal that an error has occurred or to provide a warning An advertising graphic often animated that appears on a Web page and may contain a link to the advertiser s Web site A sector at the beginning of each disk that identifies the disk s architecture sector size cluster size and so on For startup disks the boot record also contains a program that loads the operating system 238 Glossary A software application that makes navigating the Internet easy by providing a graphical user interface This lets the user click menus icons or buttons rather than learn difficult computer commands Also called a Web client A file that has been compressed using a special data storage fo
33. current with Livelgdate o often to ensure that you have the most updated list page 81 180 Protect children with Parental Control Enable or disable Parental Control Enable or disable Parental Control See View the logs on page 198 Supervisor and Adult users can enable or disable Parental Control Adult users can change Parental Control settings for their accounts Supervisor users can also make changes to any user s Parental Control settings Teenager and Child users cannot make any changes to Parental Control Norton Internet Security o xj Parental Control Tell me more Parental Control helps block inappropriate content Parental Control settings for Supervisor x M Turn on Parental Control Click the category you want to configure Sites Permit or block access to Web sites Programs Permit or block access to Internet programs _ Newsgroups Permit or block access to Internet newsgroups Defaults Reset Parental Control Settings To enable or disable Parental Control 1 Start Norton Internet Security 2 Double click Parental Control 3 Inthe Parental Control window in the Parental Control settings for drop down list select the account that you want to change 4 Check or uncheck Turn on Parental Control Norton Internet Security tracks all Parental Control activity on the Event Log s Restrictions tab Check this tab periodically to monitor the effectiveness of your Paren
34. drive you must disconnect from the network or password protect the drive to let Norton AntiVirus delete the problem Norton AntiVirus cannot repair my infected files See Keeping The most common reason that Norton AntiVirus cannot repair your infected rapids an files is that you do not have the most current virus protection on your page 81 computer Update your virus protection regularly to protect your computer from the latest viruses If after using LiveUpdate the virus still cannot be repaired the file may be corrupted or contain a new virus There are two additional options See If you have files in Quarantine on page 138 Quarantine the file and submit it to Symantec Ifa non infected copy of the file exists delete the infected file and replace it with the non infected file get an error when testing basic Rescue Disks If you get the message Non system disk replace the disk and press any key when testing your Rescue Disks the Rescue program may not have prepared the floppy boot files correctly To repair the Rescue Boot Disk without having to reformat the disk and create a new Rescue Disk set 1 Remove the Rescue Boot Disk and restart your computer 2 Insert the Rescue Boot Disk into the floppy disk drive 3 Onthe Windows taskbar click Start gt Run 4 Inthe Run dialog box type SYS A 5 Click OK Troubleshooting Norton Internet Security Troubleshoot Norton AntiVirus problems can t
35. email is SMTP Simple Mail Transfer Protocol Popular protocols for receiving email are POP3 Post Office Protocol 3 and IMAP4 Internet Message Access Protocol 4 Web based email services use HTTP Hypertext Transfer Protocol for sending and receiving email A file containing program code that can be launched Generally includes any file that is a program extension or a system file A code that is stored in each file that associates it with a program or activity A command in some operating systems that requests network user account information A security system that uses rules to block or allow connections and data transmissions between your computer and the Internet A set of parameters that specifies a type of data packet or network communication and an action to perform permit it or block it when it is found An IP packet that has been split into two or more parts or fragments When the size of an IP packet exceeds the maximum frame size of a network that it crosses the packet must be divided into smaller packets or fragments A person who attempts unauthorized access of other people s computers for the purpose of obtaining information from or doing damage to those computers A standard language for documents on the World Wide Web Codes inserted in a text file instruct the Web browser on how to display a Web page s words and images for the user and define hypertext links between documents A graphic s
36. he bi B Ds LON och llr Schedule a custom scan Edit scheduled SCAN ccccsessssscsesesssssssesssesssssssseesesesesssseseees Delete a scan schedule uo ceeeeeeseseeessssssssssssessssesscsssssesesees Chapter 9 Chapter 10 Chapter 11 Contents What to do if a virus is found If a virus is found CUriNg a SCAN ou eeeeeeeeseeeeseeeeseeseeeestenesteneeeeees 134 Review the repair details Use the Repair Wizard ccicchissctseccdutssianacaae dacs dannii If a virus is found by AUto Protect oeossiiniiriarosrosogeriiosa 135 If you are using Windows 98 98SE ME sssrin 135 If you are using Windows 2000 XP sssrin 136 If a virus is found by Script BIOCKINg ou eee eeseseeeeeeeeseeeeseeneeeeees 137 If a threat is found by Worm Blocking 0 eects eeeeeeseeneeeeseeeeees 137 If Inoculation alerts you about a change in system files 138 If you have files in QUaTANTING oo eeeseeeeseeeeseenesteseetesteneseeneeseees 138 If Norton AntiVirus cannot repair a file osses 140 If your computer does not start properly sessies 141 If you need to use Rescue Disks Windows 98 98SE Me oo eeceseeecseeeeeeeeeeesteseeeeseeeesnenenees If you need to use Emergency DISKS ounciacisiieseninrannie Look up viruses on the Symantec Web site Look up viruses in Norton AntiVirus 0 eeseeeeeeeseeeeseeseseeneeeees Create accounts for multiple users About Norton Internet Security account oc eeeeeeseneeeeeeteeneeees 145 Create Norton Internet Sec
37. installed on your computer For more information see the user documentation that came with the programs Quit all other Windows programs before installing Norton Internet Security Other active programs may interfere with the installation and reduce your protection If you re using Windows XP Windows XP includes a firewall that can interfere with Norton Internet Security protection features You must disable the Windows XP firewall before installing Norton Internet Security 30 Installing Norton Internet Security Before installation Scan for viruses See If you are using the CD as an Emergency Disk on page 142 b To disable the Windows XP firewall 1 On the Windows XP taskbar click Start gt Control Panel gt Network Connections 2 If you have created more than one modem or network connection select the active connection Click Network Tasks 4 Click Change settings of this connection On the Advanced tab in the Internet Connection Firewall section uncheck Protect my computer and network by limiting or preventing access to this computer from the Internet 6 Click OK to close the settings window 7 Click OK to close the Network Tasks window You should scan your computer for viruses before installing Norton Internet Security This ensures your computer is protected and that the installation will go smoothly If your computer can start from a CD you can restart from the Norton Internet Security CD a
38. is connected to the Internet You use Internet options to define how Norton Internet Security should scan email and instant messenger attachments enable Worm Blocking and determine how LiveUpdates should be applied Instant Messenger Determine what instant messengers to support how to configure a new IM and what happens if a virus is found during an instant messenger session 68 Norton Internet Security basics Password protect options About Other options Other options include Inoculation settings for Windows 98 98SE Me and Miscellaneous settings You can enable Inoculation cause an alert if a system file changes and set a variety of miscellaneous options Miscellaneous Back up file in Quarantine before attempting a repair This option is automatically set to On Enable Office Plug in If you upgrade to Microsoft Office 2000 or later after Norton Internet Security is installed you must enable this option to automatically scan Microsoft Office files Alert me if my virus protection is out of date Scan files at system startup Windows 98 98SE only Enable password protection for options Password protect options You can protect Norton Internet Security and Norton AntiVirus options with passwords This ensures that only the people you trust are able to make changes to your options If you have installed accounts and have not set a password for a current account the password you choose will become your
39. nonsecure Internet connections 7 Under Secure this private information in select the Internet programs in which Privacy Control should block this information a Web browsers Instant messengers Email programs 8 Click OK Modify or remove private information You can modify or remove private information at any time To modify or remove private information 1 Start Norton Internet Security In the Security Center double click Privacy Control In the Privacy Control window click Private Information Select the private information that you want to change or remove uw FSF WwW N Select one of the following Modify Remove 6 Click OK 158 Protecting your privacy Customize Privacy Control Customize Privacy Control Privacy Control protects four areas Private Information Blocks specific strings of text that you do not want sent over the Internet Cookie Blocking Stops Web sites from retrieving personal information stored in cookie files Browser Privacy Protects information about your browsing habits Secure Connections Prevents users from establishing secure connections to online stores and other Web sites Supervisor and Adult users can make changes to program settings Child and Teenager users cannot make any changes to Privacy Control There are two ways to adjust Privacy Control settings Set the Privacy Level Use the slider in the main Privacy Control pane to select pre set security l
40. numbers and other information 6 Click OK Set up Password Protection See Use the For maximum security you can require a password before allowing anyone ae oo to make a change to your Norton Internet Security settings This ensures that only the people you trust are able to disable your protection turn off your firewall and intrusion detection or make changes to Norton Internet Security options When Password Protection is on users will have to type in their passwords before making changes to Norton Internet Security settings If the current user does not have an account password you must create one To protect Norton Internet Security options with a password 1 In the Security Assistant Roadmap click Password Protection Security Assistant Password Protection Introduction For maximum security you can require that users type in a password Home Networking Al before making any changes to your Norton Internet Security settings This ensures that untrustworthy people who have access to your computer cannot disable your protection turn off your firewall and Program Scan intrusion detection or make unwanted changes to Norton Internet Security options Privacy Control Turn on password protection Password Protection Parental Control Finish 2 Inthe Password Protection pane click Turn on password protection In the Password and Confirm Password text boxes type a password 4 Click OK 44 Inst
41. of Windows don t have many remote control features so they are relatively easy to protect On computers running Windows 2000 XP hackers attempt to gain administrative rights to the computers The key to getting administrative rights is usually a password The hacker can download your password file and decode it 226 Understanding Internet risks Risks from active content Covering tracks Another tactic is to place a Trojan horse on your computer If a hacker can place a program such as Back Orifice Subseven or NetBus on your computer and run it it is possible to take control of the computer Other Trojan horses might record all of your keystrokes to capture passwords and other sensitive data Norton Internet Security and Norton AntiVirus provide two levels of protection against Trojan horses Norton AntiVirus protects you from inadvertently running these programs Norton Internet Security blocks the ports that remote access Trojan horses use to communicate over the Internet When a hacker has gained as much control of a computer as possible the task turns to concealing the evidence If you don t know that a hacker has compromised your computer you won t take steps to stop such actions On computers running Windows 2000 XP hackers try to turn off auditing and modify or clear the event logs On any computer hackers may hide files so that they are available for future visits In extreme cases hackers might format the hard d
42. of the Log Viewer window click the computer s IP address or name Your browser opens the Visual Tracking Web page To trace a connection attempt from AutoBlock 1 Open Norton Internet Security 2 Inthe Security Center double click Intrusion Detection 3 Inthe Intrusion Detection window in the AutoBlock section select a connection you want to trace 4 Click Attacker Details Your browser opens the Visual Tracking Web page When Visual Tracking is finished it displays a visual representation of where this communication originated and contact information for the owner of the IP address 60 Norton Internet Security basics Customize Norton Internet Security Stop Internet communication with Block Traffic The Security Center and the Security Monitor include a Block Traffic button that lets you immediately halt any communication between your computer and another This can be a handy way to limit any damage to your computer if it is attacked if a Trojan horse is sending personal information without your permission or if you inadvertently allow an untrusted person to access files on your computer When this option is active Norton Internet Security stops all communication to and from your computer To the outside world it appears that your computer has completely disconnected from the Internet If you want to block all traffic into and out of your computer Block Traffic is more effective than simply using your Internet softwa
43. pop under ads Macromedia Flash based ads How Ad Blocking works Norton Internet Security detects and blocks ads based on two criteria their dimensions and their locations Blocking by dimensions Most online advertisers use one or more standard sizes for their ads Norton Internet Security now includes the ability to block images Flash animations and other HTML elements that have the same dimensions as these common ad sizes 164 Blocking Internet advertisements How Ad Blocking works Blocking by location See Keeping current with LiveUpdate on page 81 Every file on the Internet has a unique address or URL When you view a Web page your computer connects to a URL and displays the file that is stored there If the page points to graphics audio files and other multimedia content your browser displays the files as part of the page When you go to a Web page that includes a banner ad the instructions used to display the page might include the following lt p gt Greetings from the Ajax company lt img src http www ajax com nifty_images image7 gif gt Your browser displays the text Greetings from the Ajax company on the screen Then it connects to www ajax com and requests a file called nifty_images image7 gif The suffix gif indicates that this is a Graphics Interchange Format file a common image file format The computer at www ajax com sends the file to the browser which displays the image When Ad
44. receive email messages See About Internet options on page 67 There are two possible solutions to this problem Temporarily disable email protection This might allow the problem email message to be downloaded so that you can once again enable email protection You are protected by Auto Protect and Script Blocking while email protection is disabled To temporarily disable incoming email protection 1 N nw F WN Start Norton Internet Security In the Security Center click Options gt Norton AntiVirus In the Options window under Internet click Email Uncheck Scan incoming Email Click OK Download your email messages Reenable incoming email protection Your email client may have timed out Make sure timeout protection is enabled If you continue to experience problems downloading email messages disable email protection To disable email protection 1 Ou FF WN Start Norton Internet Security In the Security Center click Options gt Norton AntiVirus In the Options window under Internet click Email Uncheck Scan incoming Email Uncheck Scan outgoing Email Click OK 213 214 Troubleshooting Norton Internet Security Troubleshoot Norton AntiVirus problems can t send email messages If you get the message Norton AntiVirus was unable to send your email message because the connection to your email server was disconnected your email client may be set to automatically disconnect a
45. remove Click Remove uw FF WwW N When you have finished removing computers click OK Identify computers to Norton Internet Security See About the Internet on page 215 You must identify computers to Norton Internet Security to manually configure network zones firewall rules and other protection features In these cases the Specify Computers dialog box appears i xi Specify Computers Tell me more Indicate computers or sites to permit access to Individually Using a range Using a network address Enter computers either by name www symantec com or by Internet address 192 168 1 1 To enter multiple computers use a space between each entry The Specify Computers dialog box lets you specify computers in three ways In each you can use P addresses to identify computers Find a computer s IP address There are two procedures for finding a computer s IP address On Windows 98 Me computers you can use Winipcfg to find the IP address of a computer On Windows 2000 XP computers you can use Ipconfig to find the IP address of a computer 93 94 Controlling access to protected computers Control how people use your computer To find an IP address with Winipcfg 1 On the Windows taskbar click Start gt Run 2 Inthe Run dialog box type winipcfg 3 Click OK 4 Select the appropriate network adapter 5 Record the IP address To find an IP address with Ipconfig 1 On the Windows
46. service symantec com installtutorial 8 If you re installing Norton Internet Security for the first time Finish installation Finish installation After you ve checked for viruses it s safe to install Norton Internet Security Uninstall any other antivirus programs on your computer On your desktop use the Add Remove Programs Control Panel to select the program to uninstall 2 lose all open programs on your computer including the items running in the Windows system tray 3 Install Norton Internet Security from the Norton Internet Security CD See Install Norton Internet Security on page 31 2 Did you see the message Norton Internet Security has been installed successfully a Yes See After installation on page 38 a No Write down the error message on the screen and go to http service symantec com for further assistance Contents If you re installing Norton Internet Security for the first time Chapter 1 Chapter 2 Chapter 3 Stare CM Gees cesses ck ose Seca teth ee estates tad secsteres Soars eeeeseeesss se cieetee ss eect 5 If you use a FAT file system eee ceceeeseeseeeseseeeeeesesecseeesneneseeeeeeseeeeeenes 6 If you use an NTFS file system oo ceeceesseeeseseeeseeseeeeseeesnenesesesneneseeeeees 7 Finish installation 0 cceecsessssesesssseeceeeseseecesesesesessesesecseecsnenssesseneaeseeseees 8 Responding to emergencies If you suspect that you have a virus o eecsessseeecesseceseeeees
47. startup disk that came with your computer If your computer is set up with more than one operating system such as Windows 2000 and Windows 98 you may need to modify the Rescue Boot Disk Auto Protect does not load when start my computer If the Norton AntiVirus Auto Protect icon does not appear in the lower right corner of the Windows taskbar Auto Protect is not loaded There are three likely reasons this is happening You may have started Windows in safe mode Windows restarts in safe mode if the previous shutdown did not complete successfully For example you may have turned off the power without choosing Shut Down on the Windows Start menu Troubleshooting Norton Internet Security 21 Troubleshoot Norton AntiVirus problems To restart Windows 1 On the Windows taskbar click Start gt Shut Down 2 Inthe Shut Down Windows dialog box click Restart 3 Click OK Norton Internet Security may not be configured to start Auto Protect automatically To set Auto Protect to start automatically 1 Start Norton Internet Security 2 Inthe Security Center click Options gt Norton AntiVirus 3 Inthe Options window under System click Auto Protect 4 Ensure that Start Auto Protect when Windows starts up is checked Norton AntiVirus may not be configured to show the Auto Protect icon in the tray To show the Auto Protect icon in the tray 1 Start Norton Internet Security In the Security Center click Options gt Norton Anti
48. taskbar click Start gt Run 2 Inthe Run dialog box type cmd 3 Click OK 4 Atthe command prompt type ipconfig 5 Click OK 6 Record the IP address Specify an individual computer The computer name that you type can be an IP address a URL such as service symantec com or a Microsoft Network computer name such as Mojave You can find the names of computers on your local network in Network Neighborhood or Network Places on your Windows desktop O If you don t have TCP IP bound to Client for Microsoft Networks in Windows Network Properties you must use IP addresses instead of names for the computers on your local network To specify an individual computer 1 Inthe Specify Computers dialog box click Individually 2 Type the name or IP address of a single computer 3 Click OK Specify a range of computers You can enter a range of computers by specifying the starting lowest numerically IP address and the ending highest numerically IP address All of the computers within that range of IP addresses are included In almost every case the first three of the four numbers of the IP addresses entered should be the same Controlling access to protected computers Control how people use your computer To specify a range of computers 1 2 4 In the Specify Computers dialog box click Using a range In the Starting Internet Address text box type the starting lowest numerically IP address In the Ending Internet
49. that you quarantine the file You have the same options as those listed in the table with the exception of Repair the infected file If you are using Windows 2000 XP If a threat is found and either repaired or automatically deleted by Auto Protect in Windows 2000 XP you receive an alert telling you which file was repaired or deleted and which virus Trojan horse or worm was infecting the file If you have an active Internet connection clicking the virus name opens the Symantec Web page that describes the virus To close the alert Click OK If the file cannot be repaired you receive two alerts one telling you that Auto Protect was unable to repair the file and another telling you that access to the file was denied What to do if a virus is found 137 If a virus is found by Script Blocking See If you have You can set your Auto Protect options to try to quarantine any infected files ISSN that it cannot repair If you do this you are informed if any files are Quarantine on page 138 quarantined To resolve problems with unrepaired files See Performa full 1 Runa full system scan on your computer to ensure that no other files system scan on DT are infected See If a virus is 2 Follow the recommended actions in the Repair Wizard to protect your ata UUDE computer from the infected files scan on page 134 If a virus is found by Script Blocking See Ensure that Script Blocking scans Visual Basic and
50. to a specific multicast group IGMP does not present a major security risk but Norton Internet Security allows you to block the protocol entirely This is a good idea if you do not use any programs that require IGMP If you have problems receiving multicast information such as movies or PowerPoint presentations be sure that IGMP is not blocked About the Internet 219 How Web information is located on the Internet How Web information is located on the Internet Web information is stored as pages each with a unique name called a URL Uniform Resource Locator When you type a Web address in the browser address bar or click a link in your Web browser to move to a new Web site you are giving your browser the URL of the page that you want to view For example www symantec com is a typical URL Each URL maps to the IP address of the computer that stores the Web page URLs are used because they are easier to remember and type than IP addresses Before your browser requests a page it asks a DNS Domain Name System server for the IP address of the Web site IP addresses are 32 bit numbers expressed as four decimal numbers each ranging from 0 to 255 and separated by periods 206 204 104 148 Every computer on the Internet has a unique IP address Requesting a page Once the browser has the IP address it establishes a TCP connection to the Web server and requests the page Each page that you view requires a new connection with
51. type the search words in uppercase letters To search for multiple phrases enclose each phrase in quotation marks and use commas to separate the phrases For example purchase product MAC Norton SystemWorks searches for all three phrases and finds all articles that include any of these phrases 3 Select the area of the Web site that you want to search 4 Click Search Troubleshoot Norton Internet Security problems Here are some solutions to issues that might arise with Norton Internet Security What is wrong with this Web site Norton Internet Security can block certain elements of a Web site that prevent it from displaying correctly in your Web browser In some cases the site might not display at all See Temporarily disable Norton Internet Security on page 71 Troubleshooting Norton Internet Security Troubleshoot Norton Internet Security problems In most cases Norton Internet Security is protecting you from inappropriate content Your best solution may be to go to another more appropriate Web site If you are a Supervisor user you can disable Norton Internet Security and try the Web site again Keep in mind that when you disable Norton Internet Security your computer may be vulnerable to Internet attacks If you cannot connect to a Web site with Norton Internet Security disabled there might be a problem with the Internet or your Internet service provider It could be If you have set up Pa
52. used and the addresses or names of the connected computers Last 60 The number of network and HTTP connections and the speed of Seconds each connection type To review detailed statistics 1 Open Norton Internet Security 2 Inthe Security Center main window click Statistics 3 Inthe Statistics window click Detailed Statistics Monitoring Norton Internet Security 195 Review detailed statistics Reset detailed statistics counters Reset the counters to clear all of the statistics and begin accumulating them again This helps you see if a configuration change affects the statistics To reset counters 1 Open Norton Internet Security In the Security Center main window click Statistics In the Statistics window click Detailed Statistics FW N On the View menu click Reset Values Set the statistics displayed in the Detailed Statistics window Users can view all detailed statistics at once or display only certain categories To set the statistics displayed in the Detailed Statistics window 1 Open Norton Internet Security In the Security Center main window click Statistics In the Statistics window click Detailed Statistics In the Detailed Statistics window on the View menu click Options uw FF WwW N In the Norton Internet Security Statistics Options window select one or more categories of statistics that you want to display 6 Click OK Configure Detailed Statistics window columns The Detail
53. value is reached before or during the execution of a task the task is canceled The last part of a domain name that identifies the type of entity that owns the address such as com for commercial organizations or edu for educational institutions or the geographical location of the address such as ca for Canada or uk for United Kingdom A destructive program that is often designed to cause damage to a computer while disguised as something useful or interesting A virus for which Norton AntiVirus does not contain a definition See also virus definition 244 Glossary The global address of documents and other resources on the World Wide Web and the convention that Web browsers use to locate files and other remote services A self replicating program that is written to alter the way that your computer operates without your permission or knowledge A virus attaches copies of itself to other files and when activated may damage files cause erratic computer behavior or display annoying messages Virus information that lets an antivirus program recognize and alert you to the presence of a specific virus See also unknown virus An activity or action that Norton AntiVirus perceives as the work of a possible unknown virus Virus like activity alerts do not necessarily indicate the presence of a virus but should be investigated A single document on the World Wide Web WWW that is identified by a unique URL
54. virus is found 143 Look up viruses on the Symantec Web site Look up viruses on the Symantec Web site The Symantec Web site contains a complete list of all known viruses and related malicious code along with descriptions You must be connected to the Internet to look up viruses To look up viruses 1 Start Norton Internet Security 2 Inthe Security Center click Norton AntiVirus gt Reports 3 Inthe Reports pane on the Online Virus Encyclopedia line click View Report The Symantec Web site opens in your Internet browser 4 Use the links on the Web page to access the virus information for which you are looking Look up viruses in Norton AntiVirus If you don t have an active Internet connection you can look up a virus name from within Norton AntiVirus The Virus List dialog box lists the viruses in the current virus definition service files on your local computer Because of the large number of viruses the Virus List file does not include descriptions of each virus Virus List 2 xi Display All Viruses z Wirus Name Infects Info Ern Print 1054 Programs 1097 Programs Programs Help 1391 Programs 1403 Programs Eind 1403 x Programs D 1458 4 Programs Find next 1522 Programs 1587 Programs 1689 Programs 1689 x Programs 16 Programs 172 Programs 61373 Viruses Displayed Definitions Date 6 19 02 See Keeping To ensure that you have the latest virus defin
55. your computer to guard against viruses It checks programs for viruses as they are run and monitors your computer for any activity that might indicate the presence of a virus When a virus or virus like activity is detected Auto Protect alerts you In some cases Auto Protect may warn you about a virus like activity that you know is not the work of a virus If you will be performing such an activity and want to avoid the warning you can temporarily disable Auto Protect If you have set a password for Options Norton Internet Security asks you for the password before you can view or adjust the settings To temporarily disable Auto Protect 1 Start Norton Internet Security 2 Inthe Security Center click Options gt Norton AntiVirus 3 Inthe Options window under System click Auto Protect 4 Inthe Auto Protect pane uncheck Enable Auto Protect Be sure to enable Auto Protect when you have completed your task to ensure that your computer remains protected To enable Auto Protect 1 Start Norton Internet Security 2 Inthe Security Center click Options gt Norton AntiVirus 3 Inthe Options window under System click Auto Protect 4 Inthe Auto Protect pane check Enable Auto Protect If the Norton AntiVirus icon appears in the Windows tray you can use it to enable and disable Auto Protect To enable or disable Auto Protect using the tray icon 1 Inthe Windows system tray right click the Norton AntiVirus icon 2 Doone of the
56. your email program maintains copies of sent messages in its Sent or Out folder you can reopen the email message remove the private information and send the message again Why won t a program connect to the Internet A Child or Teenager user might not be able to use a program to connect to the Internet for any of the following reasons The program might belong ina See Restrict programs that access the category of programs that is restricted Mternet on page 185 for this account There is no firewall rule that lets the See Respond to Norton Internet Security program create a connection to the alerts on page 55 Internet Norton Internet Security could be See Protect children with Parental Control blocking your account from using this Page 179 program on the Internet If a Child or Teenager user needs to use this program a Supervisor can adjust your Parental Control settings Why doesn t Norton Internet Security notify me before letting programs access the Internet See Enable Automatic Program Control on page 110 If Automatic Program Control is on Norton Internet Security creates rules for programs that it recognizes without notifying you Troubleshooting Norton Internet Security 207 Troubleshoot Norton Internet Security problems Why can t I print to a shared printer or connect to a computer on my local network Norton Internet Security blocks the use of Microsoft networkin
57. 4 Keeping current with LiveUpdate If you can t use LiveUpdate If you can t use LiveUpdate When new updates become available Symantec posts them on the Symantec Web site If you can t run LiveUpdate you can obtain new updates from the Symantec Web site Your subscription must be current to obtain new protection updates from the Symantec Web site To obtain updates from the Symantec Web site 1 Point your Web browser to securityresponse symantec com 2 Follow the links to obtain the type of update that you need Obtain updates using LiveUpdate amp LiveUpdate checks for updates to all of the Symantec products that are installed on your computer If you connect to the Internet through America Online AOL CompuServe or Prodigy connect to the Internet first and then run LiveUpdate To obtain updates using LiveUpdate 1 Open your Symantec product 2 At the top of the window click LiveUpdate You might receive a warning that says that your subscription has expired Follow the on screen instructions to complete the subscription renewal 3 Inthe LiveUpdate window click Next to locate updates 4 If updates are available click Next to download and install them 5 When the installation is complete click Finish Some program updates may require that you restart your computer after you install them Keeping current with LiveUpdate 85 Set LiveUpdate to Interactive or Express mode Set LiveUpdate to Interactive or Ex
58. 6 View the TORS sn aa NEEE AA EAS AA 198 R Eaa a a EE A A A E E E A 199 Disable lOSSin 8 onea 199 Clear the lOgs uaorai ieni Ra iA n iA iiaii 199 Change the size of the logs arinaa a 200 Adjust the width of a column oo eeeeeseceeseeeeseeseseeneeeesteneees 201 Print or save logs and Statistics oc a a 201 Appendix A Troubleshooting Norton Internet Security Troubleshoot Norton Internet Security problems eee 204 What is wrong with this Web Site oe eeeeeeeseetecteeeneeeees 204 Why can t I post information online sssri 206 Why did an email message I sent never arrive s 206 Why won t a program connect to the Internet we 206 Why doesn t Norton Internet Security notify me before letting programs access the Internet essees 206 Why can t print to a shared printer or connect to a computer on my local network ou eseeseeceseeeeeeeeeeeeenees 207 Why can t I connect to the Internet via my cable TMOGSMT 14 soe escessaca EEE ATO E EE 207 Why can t LiveUpdate get a list of updates oo eee 208 How can a Web site get my browser information 208 Troubleshoot Norton AntiVirus problems s es 209 My Rescue Disk does not Work 0 eeeeseeseetecesteeeeeeeeeeneeteeenenees 209 The alert tells me to use my Rescue Disks but I did MOU CREATE LSM 5 ccescsccaesassscaseseesscerecastncsdescoeesstersstserecanetsanteerss 209 I cannot start from Crive A oe eceeeeseseseeseeeeeeeeseeseseeneeeeneetenees 210 Aut
59. 8 Controlling access to protected computers Control how outside users access your network Control how outside users access your network Norton Internet Security can protect computers while still allowing outside users to access servers on your network To run servers on protected computers you may have to create firewall rules that let outside users connect to certain ports For maximum security only create these rules on the computers running your servers If you run a Web server To let a Web server run behind Norton Internet Security you must create a firewall rule that allows inbound TCP connections on port 80 The easiest way to create these rules is via a Norton Internet Security alert To create rules for a Web server using a Norton Internet Security alert 1 Onthe Web server view your Web site by typing the IP address in the address bar of your browser Norton Internet Security displays an alert 2 Inthe alert in the drop down menu click Automatically configure Internet access 3 Click OK If you run an FTP server To let an FTP server run behind Norton Internet Security you must create the following rules Allow inbound TCP connections on port 21 z Allow outbound TCP connections on port 22 z Allow inbound TCP connections on ports 1024 to 5000 The easiest way to create these rules is via a Norton Internet Security alert To create rules for an FTP server using a Norton Internet Security alert 1 Inth
60. 9 symantec Norton Internet Security User s Guide Norton Internet Security 2003 User s Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement Documentation version 6 0 PN 10024898 Copyright Notice Copyright 2002 Symantec Corporation All Rights Reserved Any technical documentation that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation NO WARRANTY The technical documentation is being delivered to you AS IS and Symantec Corporation makes no warranty as to its accuracy or use Any use of the technical documentation or the information contained therein is at the risk of the user Documentation may include technical or other inaccuracies or typographical errors Symantec reserves the right to make changes without prior notice No part of this publication may be copied without the express written permission of Symantec Corporation 20330 Stevens Creek Blvd Cupertino CA 95014 Standard Template Library This product utilizes the Standard Template Library a C library of container classes algorithms and iterators Copyright 1996 1999 Silicon Graphics Computer Systems Inc Permission to use copy modify distribute and sell this software and its documentation for any purpose is hereby granted without fee provided that the above copyright notic
61. Address text box type the ending highest numerically IP address Click OK Specify computers using a network address See How You can identify all of the computers on a single subnet by specifying an IP le ok ead address and a subnet mask The IP address that you specify can be any Internet on address in the subnet that you are identifying page 222 To specify computers using a network address 1 2 If you use DHCP In the Specify Computers dialog box click Using a network address In the Network Address text box type the IP address of a computer on the subnet In the Subnet Mask text box type the subnet mask The appropriate subnet mask is almost always 255 255 255 0 Click OK If your JSP uses a DHCP server to provide IP addresses to users computers you must be careful when entering IP addresses Instead of identifying a computer with a single IP address which might change at any time enter a network address using a base IP address and a subnet mask Enter values that cover the range of addresses that might be assigned to the computer 95 96 Controlling access to protected computers Control how users access the Internet Control how users access the Internet Norton Internet Security supports most Internet connection methods without needing additional configuration If you access the Internet via a cable or DSL router Norton Internet Security works behind a cable or DSL router and adds to
62. Advanced 66 new features 22 Bloodhound 66 Script Blocking 25 Exclusions 66 Norton Internet Security email accessing 52 Advanced 67 Block Traffic 60 scanning 67 checking Status amp Settings 192 Inoculation 68 creating accounts 146 150 instant messenger 67 disabling 71 Internet 67 Email options 64 LiveUpdate 61 67 emergency recovery procedures 17 Manual Scan 66 Firewall options 62 Bloodhound 66 General options 61 Exclusions 66 LiveUpdate options 61 Miscellaneous 68 logging on 153 Norton Internet Security logs and statistics 191 202 Email 64 monitoring 191 202 Firewall 62 new features 21 General 61 Security Monitor 53 54 LiveUpdate 61 Spam Alert 171 177 Web Content 63 64 troubleshooting 204 208 Other 68 Visual Tracking 58 59 protecting with password 43 69 Web Content options 63 64 resetting password 70 wireless connections 89 Script Blocking 66 Norton Personal Firewall settings categories 65 about 102 Spam Alert 176 177 customizing 108 Other options 68 enabling and disabling 104 security settings 105 119 p troubleshooting rules 205 Norton SystemWorks installing with 45 notification area icon 49 packets 101 Parental Control about 24 configuration 44 0 creating accounts 146 150 Office Plug in Wizard 146 149 enabling 68 passwords online Help 75 changing 150 online tutorials 79 options 43 online Virus Encyclopedia 79 143 setting 150 ping scans 224 250 Index Popup Window Blocking enabling and disabling 166 pop up win
63. Alert into this folder and periodically review the messages before deleting them People who send spam often include fake addresses in the From field Adding individual addresses to the Spam Alert list is unlikely to reduce the amount of spam you receive 177 178 Blocking unwanted email Spam Alert tips Norton Internet Security includes Parental Control which lets parents manage their children s Internet access Parental Control lets you control Web sites Block access to sexually explicit violent or otherwise inappropriate Web pages Programs Block categories of Internet programs that pose security risks or could be misused Newsgroups Restrict access to discussion groups related to extreme illegal or inappropriate topics O Child users cannot make any changes to Parental Control settings About Parental Control Parental Control categorizes Web sites by topic newsgroups by text string and Internet programs by type When you enable Parental Control Norton Internet Security blocks any incoming information from restricted Web sites and newsgroups It also blocks all outgoing information from restricted Internet programs Parental Control settings are linked to user accounts When users log on to their accounts Norton Internet Security uses the settings associated with the accounts until the users log off See Keeping Symantec updates the list of blocked Web sites regularly Run LiveUpdate
64. AntiVirus from the Windows Explorer LOOMDAT E A EE E E ETE E 51 Work with Norton Internet Security oo cceeccescseesesesteeseseeteseeees 52 Access Norton Internet Security protection features 52 Use the Security Monitor oo eeseceeseceseceseesneeeseeeeeneeeseesneeeenees 53 Respond to Norton Internet Security alerts wesc 55 Use Alert TOKOT a ona AANA Na AEEA NENA 56 Check your computer s vulnerability to attack wee 58 Identify the source of COMMUNICATIONS 00 eects tet eeeee 58 Stop Internet communication with Block Traffic oe 60 Customize Norton Internet Security oo ee eseceseeeeseeeeseeneeeeneetentenes 60 About General Options orris nikek ian iain i 61 About LiveUpdate Options wee eeeeeeseeeeeeseeeeseeeesteneseeseeeseeeeans 61 About Firewall Options i c 5 casiasctian cnieniaiiannianan ces 62 About Web Content Options occ eesecsesesesteseetereseseeesneeeeneeeees 63 About Email Options er aa AA EE RE E REO 64 Customize Norton AntiVirus oroarea AN 65 About system OPTIONS aiisscisceccscdsncdceredccndscsesdesessedancteteaescnnsecenss 65 About Internet options corea 67 About Other Options 1 8 aisssdasantasach aiaauiwtaniaiiaiaiiatas 68 Password protect Options ccceessecseseeeseeseseeseeeeseeneseeseeeeseeeeaneneeseaes 68 Reset Options PaSSwOTds cenomewiiei minine iA 70 Temporarily disable Norton Internet Security oe eeeeeeeeeeeeee 71 Temporarily disable Auto Protect ee eeceseeseseeseeseeeeeeeeseeeeees 72 Create R
65. Auto Protect found the threat 134 What to do if a virus is found If a virus is found during a scan If a virus is found during a scan If Norton AntiVirus finds a virus Trojan horse or worm during a scan or from an instant messenger session you either receive a summary of the automatic repair or deletion results or you have to use the Repair Wizard to resolve the problem Review the repair details If you have set your manual scan options so that Norton AntiVirus repairs files automatically and all infected files could be repaired the scan summary lists the number of files infected and repaired This information is presented for status purposes only you don t need to take further action to protect your computer If you want to know more you can check the repair details to see which files were infected and with what viruses To review the repair details 1 In the scanner window in the Summary pane click More Details 2 When you are done reviewing the results click Finished Use the Repair Wizard If there are files that could not be fixed or if you have set your manual scan options so that Norton AntiVirus asks you what to do when a virus is found the Repair Wizard opens If Norton AntiVirus did not attempt a repair the Repair Wizard opens in the Repair pane Otherwise it opens in the Quarantine pane To use the Repair Wizard 1 If the Repair Wizard opens in the Repair pane uncheck any files that you don t wan
66. Blocking is enabled and you connect to a Web site Norton Internet Security scans Web pages and compares their contents to two lists A default list of ads that Norton Internet Security blocks automatically Use LiveUpdate to keep the list of blocked ads current A list that you create as you block specific ads You can add to and change this list If the page includes files from a blocked domain Norton Internet Security removes the link and downloads the rest of the page You can set individual Ad Blocking settings for each Norton Internet Security user Supervisor and Adult users can make changes to program settings Child and Teenager users cannot make any changes to Ad Blocking Blocking Internet advertisements 165 Enable or disable Ad Blocking Enable or disable Ad Blocking Norton Internet Security searches for the addresses of the ads that are being blocked as the Web page is downloaded by your browser If it finds an address that matches the list of ads to block it removes the ad so that it does not appear in your browser It leaves the rest of the Web page intact so that you can view the page without the advertisements To enable or disable Ad Blocking 1 Open Norton Internet Security 2 Double click Ad Blocking Ad Blocking Tell me more Ad Blocking helps eliminate unwanted ad banners and pop up ads on Web pages Ad Blocking Settings for Supervisor z M Turn on Ad Blocking M Turn on Popup Window Bloc
67. CLAIMER OF DAMAGES SOME STATES AND COUNTRIES INCLUDING MEMBER COUNTRIES OF THE EUROPEAN ECONOMIC AREA DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES SO THE BELOW LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH HEREIN FAILS OF ITS ESSENTIAL PURPOSE IN NO EVENT WILL SYMANTEC OR ITS LICENSORS BE LIABLE TO YOU FOR ANY SPECIAL CONSEQUENTIAL INDIRECT OR SIMILAR DAMAGES INCLUDING ANY LOST PROFITS OR LOST DATA ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE EVEN IF SYMANTEC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES IN NO CASE SHALL SYMANTEC S OR ITS LICENSORS LIABILITY EXCEED THE PURCHASE PRICE FOR THE SOFTWARE The disclaimers and limitations set forth above will apply regardless of whether you accept the Software 6 U S GOVERNMENT RESTRICTED RIGHTS RESTRICTED RIGHTS LEGEND All Symantec products and documentation are commercial in nature The software and software documentation are Commercial Items as that term is defined in 48 C F R section 2 101 consisting of Commercial Computer Software and Commercial Computer Software Documentation as such terms are defined in 48 C F R section 252 227 7014 a 5 and 48 C F R section 252 227 7014 section 12 212 and 48 C F R applicable Consistent with 4 a 1 and used in
68. ITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT THIS IS A LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU AND SYMANTEC BY OPENING THIS PACKAGE BREAKING THE SEAL CLICKING ON THE xl accept the license agreement do not accept the license agreement Cancel Read the Licence Agreement then click I accept the license agreement If you decline you cannot continue with the installation Click Next iS Norton Internet Security Setup 15 x Install Horton AntiVirus Protect your computer from viruses Antivirus software is an integral part of computer security Norton Antivirus automatically protects your computer from fast spreading viruses Trojan horses and malicious Activex controls and Java applets IV Install Norton AntiVirus on your computer If you already have the most recent version of Norton AntiVirus or if you do not wish to install antivirus protection uncheck the box D Program Files Norton Antivirus Browse Te cars Destination Folder To install Norton AntiVirus check Install Norton AntiVirus on your computer then click Browse to specify the location in which you want it installed Installing Norton Internet Security 33 Install Norton Internet Security If an updated version of Norton AntiVirus is already on your computer this window does not appear Click Next Pe Norton Internet Security Setup Install Accounts and Parental Control Customiz
69. Rescue Disks or if you need to restore system files you must reinstall Windows If you need to use Rescue Disks Windows 98 98SE Me Sometimes a virus infection prevents your computer from starting normally Some viruses can only be removed if the computer is started from a clean disk not the infected hard disk Often a Norton AntiVirus alert tells you when to use your Rescue Disks You first need to determine if your Rescue Disks are current This means that you have created or updated your Rescue Disks since you did any of the following Added modified or removed internal hardware Added modified or removed hard disk partitions Upgraded your operating system Updated virus definitions If your Rescue Disks are not current you can still use them to remove viruses from your computer When the Rescue Disk window appears use only the Norton AntiVirus task To use your Rescue Disks 1 Insert the Basic Rescue Boot floppy disk into drive A and restart your computer The Rescue program runs in DOS 2 Use the arrow keys to select the program that you want to run A description of the selected program appears in the right pane of the Rescue program Your choices are Norton AntiVirus Scans your computer for viruses and repairs any infected files Rescue Recovery Checks and restores boot and partition information 3 Press Enter to run the selected program 142 What to do if a virus is found If your comput
70. Run Program See Scan for Internet enabled programs on page 111 Scan Setup Home See Organize computers into network zones on page 91 Network Norton Internet Security basics 55 Work with Norton Internet Security Respond to Norton Internet Security alerts Norton Internet Security monitors communication activities to and from your computer and lets you know when an activity that may compromise your security is taking place When an alert appears read it before you make a decision Identify what type of alert it is and the threat level Once you understand the risks you can make a choice O Take as much time as you need to make your choice Your computer is safe from attack while the alert is active Norton Internet Security helps you decide on an appropriate action by preselecting the recommended action if one exists Norton Internet Security cannot suggest recommended actions for all alerts Learn more with the Alert Assistant Each Norton Internet Security alert includes a link to the Alert Assistant The Alert Assistant includes customized information about each alert including The type of alert The threat level The communication that triggered this alert What these types of alerts indicate How to reduce the number of these alerts you receive To use the Alert Assistant 1 Inany alert window click the Alert Assistant button 2 Inthe Alert Assistant window review the information about this
71. SYMANTEC LICENSE AND WARRANTY IMPORTANT PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE USING THE SOFTWARE SYMANTEC CORPORATION AND OR ITS SUBSIDIARIES SYMANTEC IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THE INDIVIDUAL THE COMPANY OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE REFERENCED BELOW AS YOU OR YOUR ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT THIS IS A LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU AND SYMANTEC BY OPENING THIS PACKAGE BREAKING THE SEAL CLICKING ON THE AGREE OR YES BUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY OR LOADING THE SOFTWARE YOU AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS CLICK ON THE I DO NOT AGREE OR NO BUTTON OR OTHERWISE INDICATE REFUSAL MAKE NO FURTHER USE OF THE SOFTWARE AND RETURN THE FULL PRODUCT WITH PROOF OF PURCHASE TO THE DEALER FROM WHOM IT WAS ACQUIRED WITHIN SIXTY 60 DAYS OF PURCHASE AND YOUR MONEY WILL BE REFUNDED 1 LICENSE The software which accompanies this license collectively he Software is the property of Symantec or its licensors and is protected by copyright law While Symantec continues to own the Software you will have certain rights o use the Software after your acceptance of this license his license governs any rele
72. To delete a scan schedule 1 2 3 amp oo N oU F Start Norton Internet Security In the Security Center click Norton AntiVirus gt Scan for Viruses In the Scan for Viruses pane select the scan you want to schedule If you click the button next to the scan name the scan runs Under Schedule Task click Schedule In the Schedule dialog box check Show multiple schedules Select the schedule that you want to delete if more than one Click Delete Click OK See If you have files in Quarantine on page 138 If Norton AntiVirus finds a virus on your computer there are three possible resolutions to the problem Fix the file Removes the virus from the file or if the threat is a worm or Trojan horse deletes the file Quarantine the file Makes the file inaccessible by any programs other than Norton AntiVirus You cannot accidentally open the file and spread the virus but you can still evaluate it for possible submission to Symantec Delete the file Removes the virus from your computer by deleting the file that contains the virus worm or Trojan horse It should be used only if the file cannot be repaired or quarantined Malicious threats can be found during a manual or scheduled scan or by Auto Protect when you perform an action with an infected file Threats can also appear during an instant messenger session or when sending an email The way that you handle a threat differs depending on whether a scan or
73. Virus In the Options window under System click Auto Protect FUN Ensure that Show the Auto Protect icon in the tray is checked have scanned and removed a virus but it keeps infecting my files There are four possible reasons a virus could be reappearing The virus might be in a program file with an unusual extension for which Norton AntiVirus is not configured to look To reset Norton AntiVirus scanning options 1 Start Norton Internet Security In the Security Center click Options gt Norton AntiVirus In the Options window under System click Manual Scan FWN Under Which file types to scan for viruses click Comprehensive file scanning 5 Click Manual Scan gt Bloodhound 212 Troubleshooting Norton Internet Security Troubleshoot Norton AntiVirus problems 6 Ensure that Enable Bloodhound heuristics is checked and click Highest level of protection 7 Click OK 8 Scan all of the disks that you use and repair all infected files The source of the infection could also be a floppy disk Scan all of the floppy disks that you use to ensure that they are free of viruses See Ifyou needto Another reason could be that the virus is remaining in memory after you use Rescue Disks Windows 98 ogse TeMove it from the boot record It then reinfects your boot record Use your Me on page 141 Rescue Disks to remove the virus If the problem is a Trojan horse or worm that was transmitted over a shared network
74. a complete number where someone might find it Second it lets Norton Internet Security block your private information on sites that use multiple fields for phone or credit card numbers Privacy Control and SSL Some Web sites and email servers use SSL Secure Sockets Layer connections to encrypt connections between your computer and the server Privacy Control cannot block private information sent via SSL connections However since the information is encrypted only the recipient of the email will be able to read the message Add private information You must add information that you want to protect to the Norton Internet Security Private Information list All users on a single computer share a single Private Information list Protecting your privacy 157 Identify private information to protect To add private information 1 Start Norton Internet Security 2 Doone of the following In the Security Center double click Privacy Control then click Private Information n the Security Monitor on the Select a Task menu click Edit Private Information In the Private Information dialog box click Add 4 Inthe Add Private Information dialog box under Type Of Information To Protect select a category 5 Inthe Descriptive Name text box type a description to help you remember why you are protecting this information 6 Inthe Information To Protect text box type the information that you want to block from being sent over
75. acks Intrusion Detection analyzes communications Intrusion Detection scans each packet that enters and exits your computer for attack signatures arrangements of information that identify an attacker s attempt to exploit a known operating system or program vulnerability Norton Internet Security protects your computer against most common Internet attacks including the following Bonk An attack on the Microsoft TCP IP stack that can crash the attacked computer RDS_Shell A method of exploiting the Remote Data Services component of the Microsoft Data Access Components that lets a remote attacker run commands with system privileges WinNuke An exploit that can use NetBIOS to crash older Windows computers Because attacks may span packets Intrusion Detection examines packets in two different ways It scans each packet individually looking for patterns that are typical of an attack It also monitors the packets as a stream of information which lets it identify attacks spread across multiple packets If the information matches a known attack Intrusion Detection automatically discards the packet and severs the connection with the computer that sent the data This protects your computer from being affected in any way You can modify how Intrusion Detection responds to attacks by excluding attack signatures from being monitored and by enabling or disabling AutoBlock which automatically blocks all communication with an atta
76. ain frequently refers to a single company or organization that might have multiple Web sites on the Internet www symantec com The host This is the particular Web site with which the browser communicates It is also the name for which DNS provides an IP address securitycheck The folder or directory that contains the file to be accessed index html The file name of the file to be accessed There is one particular URL that identifies your computer to itself and that is localhost If your computer has Web server software installed you can type http localhost and see your Web page The IP address that corresponds to localhost is 127 0 0 1 How ports identify programs on servers Ports also called sockets provide the locations of particular programs or servers on the remote computer with which you are trying to establish communication This makes it possible to run multiple Internet programs simultaneously on a single computer For example many computers on the Internet run both Web and FTP servers The Web server uses port 80 while the FTP server uses port 21 About the Internet 221 How ports identify programs on servers Ports are numbered 1 through 65535 Ports 1 through 1023 are known as well known ports and are the default ports for many common Internet programs Ports are part of URLs but they are rarely seen The port number follows the host name and a colon For example http www symantec com 80 securityche
77. alling Norton Internet Security After installation Set up Parental Control Parental Control lets you control family members access to the Internet You can block access to Web sites and newsgroups that you find inappropriate and you can block access to programs such as chat that you don t want children or other family members to access Parental Control is disabled by default To enable Parental Control 1 2 In the Security Assistant Roadmap click Parental Control a Security Assistant ia Parental Control Introduction Parental Control lets parents choose the Web sites and newsgroups Home Networking children can view and the Internet programs children can use Parents can create group restrictions or customize Internet access for each child Program Scan Create user accounts Privacy Control Password Protection Parental Control Finish In the Parental Control pane click Create user accounts a Parental Control Wizard xj Supervisor The first account that needs to be configured is the supervisor account This account is used to manage the settings of all accounts Provide the account name and password below Account Name Supervisor Password Confirm Password lt Back Next gt Close Installing Norton Internet Security 45 If you have Norton SystemWorks installed 3 In the Supervisor window choose a name and password for the Supervisor account The Supe
78. any time You can start the Rescue Disk Wizard from the Security Center See Temporarily You should temporarily disable Auto Protect while you are creating the cebe gaa Rescue Disk set If you do not restart your computer after creating Rescue page 72 Disks remember to enable Auto Protect again O You will need several formatted 1 44 MB disks To create Rescue Disks 1 Start Norton Internet Security In the Security Center click Rescue Select drive A to create the Rescue Disk set Click Create FEWN 74 Norton Internet Security basics Create Rescue Disks 5 Label the disks as specified in the Basic Rescue Disk List window then click OK 6 Insert the disks as requested Test your Rescue Disks At the end of the Create Rescue Disks process you are prompted to test your disks This requires that you restart your computer using the Rescue Disks To test your Rescue Disks 1 Close all open Windows programs See My Rescue 2 Insert the disk labeled Basic Rescue Boot Floppy Disk into drive A te not then click Restart page 209 If the Rescue Disk screen appears on your monitor the Rescue Disk works properly If the Rescue Disk screen does not appear you have several options for correcting the problem Press Escape to exit to DOS 4 Remove the disk from drive A then slide open the plastic tab on the back of the disk to write protect it 5 Restart your computer Update your Rescue Disks You can up
79. ases revisions or enhancements to the Software that Symantec may furnish o you Except as may be modified by a Symantec license certificate license coupon or license key each a License Module which accompanies precedes or follows this icense your rights and obligations with respect to the use of this Software are as follows YOU MAY A use one copy of the Software on a single computer If a License Module accompanies precedes or follows this license you may make that number of copies of the Software licensed to you by Symantec as provided in your License Module Your License Module shall constitute proof of your right to make such copies B make one copy of the Software for archival purposes or copy the Software onto the hard disk of your computer and retain the original for archival purposes C use the Software on a network provided that you have a licensed copy of the Software for each computer that can access the Software over that network and D after written notice to Symantec transfer the Software on a permanent basis to another person or entity provided that you retain no copies of the Software and the transferee agrees to the terms of this license YOU MAY NOT A copy the printed documentation which accompanies the Software B sublicense rent or lease any portion of the Software reverse engineer decompile disassemble modify ranslate make any attempt to discover the source code of he So
80. ation from the Norton Internet Security CD 1 On your desktop double click My Computer 2 Inthe My Computer window double click the icon for your CD ROM drive 3 Inthe list of files double click Cdstart exe 36 Installing Norton Internet Security Register your software Register your software Use the Registration Wizard to register your software online If you skip online registration you can register your software later using the Product Registration option on the Help menu To register your software 1 Inthe first Registration window select the country from which you are registering and the country in which you live if different then click Next amp Please Register Norton Internet Security 2 x We respect your privacy Please take a moment to decide how you would like us to communicate with you IV would like to receive e mail from Symantec about product upgrades the latest security threats and new information important to me or my business IV would like to receive postal mail from Symantec about new Pe information important to me or my business IV would like Symantec to telephone me about new information important to me or my business I IV would like to receive postal mail from Symantec partners about information important to me or my business Click the link below for more information on Symantec s commitment to respect your privacy http www symantec ivacy html
81. b in the list of programs click the program that you want to change 4 Click Modify In the Internet Access Control alert select the access level you want this program to have Your options are Automatically Use the default Norton Internet Security settings for this configure program Internet access Permit this Allow all access attempts by this program program access to the Internet 114 Guarding against intrusion attempts Customize firewall rules 6 Block this Deny all access attempts by this program program from accessing the Internet Customize Create rules controlling how this program accesses the Internet access Internet for this program Click OK Manually add a firewall rule While Norton Internet Security automatically creates most of the firewall rules that you need you may want to add specific rules Only experienced Internet users should create their own firewall rules There are three sets of firewall rules you can customize General Rules Trojan Horse Rules Program Rules To add a General Rule Open Norton Internet Security In the Security Center double click Personal Firewall In the Personal Firewall window on the Advanced tab click General Rules Follow the on screen instructions See Write a firewall rule on page 115 To add a Trojan Horse Rule 1 2 3 Open Norton Internet Security In the Security Center double click Personal Firewall In
82. be Acrobat Reader 1 Insert the Norton Internet Security CD into the CD ROM drive Click Browse CD Double click the Manual folder Double click the Acrobat folder Double click ar500enu exe Ou FF WN Follow the on screen instructions to select a folder for Adobe Acrobat Reader and complete the installation 78 Norton Internet Security basics For more information Once you have installed Adobe Acrobat Reader you can read the PDFs from the CD To read the User s Guide PDFs from the CD 1 Insert the Norton Internet Security CD into the CD ROM drive Click Browse CD Double click the Manual folder FW N Double click the PDF that you want to view Your options are NIS2003 pdf This User s Guide NAV2003 pdf Norton AntiVirus User s Guide You can also copy the User s Guides to your hard disk and read them from there The PDFs need approximately 5 5 MB of disk space To read the User s Guides from your hard disk 1 Open the location into which you copied the PDF 2 Double click the PDF that you want to view Your options are NIS2003 pdf This User s Guide NAV2003 pdf Norton AntiVirus User s Guide About Norton Internet Security on the Web The Symantec Web site provides extensive information about Norton Internet Security There are several ways to access the Symantec Web site To access the Symantec Web site from the Norton Internet Security main window 1 Click Help 2 Selec
83. bols Don t use the same password in multiple places Don t run software if you don t trust the publisher and the source from which you received the software Don t open email attachments unless you are expecting an attachment and you trust the sender Be sensible about providing personal information Many sites ask for more information than they need Review the privacy policies of the sites to which you are considering sending information Tell children never to reveal details about themselves to people they meet via instant messenger programs Back up files regularly and keep copies of the last few backups on hand Norton Internet Security is a security suite that protects computers from Internet attacks and viruses guards your privacy speeds Web surfing by eliminating ads and blocks inappropriate Internet content What s new in Norton Internet Security 2003 Norton Internet Security 2003 now includes Security Monitor Gives you fast access to the most used Norton Internet Security tools Spam Alert Helps identify and block unwanted email Visual Tracking Identifies the source of attacks and other Internet communication Password protection Provides increased security for Norton Internet Security and Norton AntiVirus options Block Traffic Lets you immediately stop other computers ability to communicate with your computer Alert Assistant Helps you understand alerts and potential security issues
84. can if you regularly scan a particular segment of your computer and don t want to have to specify the segment to be scanned every time You can also schedule the custom scan to run automatically You can delete the scan when it is no longer necessary For example if you are working on a project for which you need to frequently swap files with others you might want to create a folder into which you copy and scan those files before using them When the project is done you can delete the custom scan for that folder To create a custom scan 1 Start Norton Internet Security In the Security Center click Norton AntiVirus gt Scan for Viruses In the Scan for Viruses pane under Actions click New FWN In the opening window of the Norton AntiVirus Scan Wizard click Next 5 Doone or both of the following a lo select individual files to be scanned click Add files To select folders and drives to be scanned click Add folders You can use both options to select the combination of items that you want 6 Inthe resulting dialog box select the items that you want to scan If you select a folder all files in that folder are included If you select a drive all folders and files on that drive are included 7 Add the selected items to the list of items to scan by doing one of the following n the Scan Files dialog box click Open n the Scan Folders dialog box click Add 8 To remove an item from the list select i
85. ccount Click OK 8 When you are done specifying sites click OK Block additional sites Parental Control lets you restrict access to specific Web sites or domains that are not included in one of the categories of blocked sites If you block a domain all Web sites within the domain are included For example if you block the domain msn com Parental Control will block all Web sites at that domain including www msn com and messenger msn com If you block messenger msn com only that Web site will be blocked To block or unblock specific sites 1 Start Norton Internet Security 2 Double click Parental Control 3 Inthe Parental Control window in the Parental Control settings for drop down list select the account that you want to change Protect children with Parental Control 183 Customize Parental Control 4 Click Sites 5 Inthe Specify Sites window click Specify Blocked Sites 6 Click Add 7 Inthe Add Web site to Blocked List window type the URL of the site that you want to add 8 Click OK 9 Repeat the previous three steps for each Web site that you want to add 10 When you are done adding sites click OK Create exceptions for specific sites If a site you need to view belongs to a blocked category you can create an exception for this site This allows you to permit access to specific Web sites that belong to blocked categories while still blocking other sites of this type You can create exceptions for individual
86. ccount can visit only the sites listed in the Sites to Permit pane Add Web sites to the list 6 7 Start Norton Internet Security Double click Parental Control In the Parental Control window in the Parental Control settings for drop down list select the account that you want to change Click Sites In the Specify Sites window click Specify permitted sites Sites Tell me more Norton Internet Security lets parents choose the Web sites that children can visit Choose the Web site categories you want to block or permit for this user Click Add to block specific sites for all users Specify permitted sites Specify blocked sites Sites to Permit symantec com Click Add to create a new entry in the list In the Add Web site to Permitted List window type the complete URL Web address of the site that you want to add For example to permit access to www ajax com you would type ajax com Protect children with Parental Control 185 Customize Parental Control 8 Repeat the previous two steps for each Web site that you want to add 9 Click OK Submit Web sites to Symantec Symantec regularly updates the list of Web sites blocked by Norton Internet Security You can help ensure that the list is comprehensive by suggesting new sites new categories for sites and sites that should be removed from the list To submit suggested changes to Symantec visit http www symantec com avcenter cgi bin nisur
87. ck Web based chat that appears in your browser 186 Protect children with Parental Control Customize Parental Control Conferencing amp Collaboration Email Education amp Family File Transfer Instant Messaging Newsreaders Networked Games Web Browsers User Categories Programs that let two or more users communicate directly with one another This category includes programs that let users collaborate through the use of a program such as whiteboard programs and Web browsers Examples include NetMeeting ICQ Microsoft Instant Messenger Yahoo Messenger and Internet Phone Programs that access email servers known as email clients Examples include Microsoft Outlook Express and Eudora Restricting this category of programs does not block Web based email that appears in your browser such as Hotmail Educational programs that access the Internet Programs that let users transfer files to and from their computers Examples include CuteFTP and BulletFTP Programs that let users instantly send messages and files to other users currently running the same instant messenger program Examples include ICQ Yahoo Messenger Microsoft Instant Messenger and AOL Instant Messenger Programs that access newsgroups Examples include Xnews and Agent Games that access a network or the Internet to let users play with or against one another Programs that provide users with access to the Worl
88. ck Block ads matching this string Permit Allow ads matching this string Type an HTML string to block or permit Click OK Modify or remove an Ad Blocking string If you later decide that an Ad Blocking string is too restrictive not broad enough or not appropriate you can change or remove it To modify or remove an Ad Blocking string 1 2 Open Norton Internet Security At the top of the Security Center window click Options gt Internet Security On the Web Content tab on the Ad Blocking tab do one of the following To modify or remove a string in the Defaults list click Defaults To modify or remove a site specific string click the site s name In the HTML string list select the string that you want to change Do one of the following To modify a string click Modify then type your changes To remove a string click Remove Click OK How Spam Alert works As email becomes more popular many users are receiving an increasing amount of the unsolicited commercial mail known as spam Not only does spam make it difficult to identify valid email some spam contains offensive messages and images Spam Alert helps reduce the amount of spam you receive by intelligently filtering incoming messages and clearly marking potential spam Spam Alert uses a pattern matching engine that automatically compares the contents of every incoming email message to a list of known spam characte
89. ck index html Because the most used ports are standardized you rarely see port numbers For example Web browsers almost always use port 80 so they don t require that you type it unless you need to use a different port The terms server and service are used somewhat interchangeably For example a Web server provides the HTTP service while it is usually said that a computer has the finger service running Well known ports Following are some of the most common well known ports 21 ftp FTP File Transfer Protocol control 25 smtp SMTP Simple Mail Transfer Protocol 79 finger Finger 110 pop3 POP3 Post Office Protocol 3 119 nntp NNTP Network News Transfer Protocol 138 nbdatagram NetBIOS datagram Microsoft Networking 143 imap IMAP Internet Message Access Protocol 222 About the Internet How computers are identified on the Internet IRC Internet Relay Chat 389 LDAP Lightweight Directory Access Protocol 443 HTTPS Secure HTTP How computers are identified on the Internet Millions of computers are connected to the Internet When you are trying to identify computers it is easier to work with groups of computers rather than having to identify each one individually Subnet masks provide a way to identify a group of related computers such as those on your local network A typical subnet mask looks like this 255 255 255 0 The 255s indicate parts of the IP address that are the
90. cking computer By excluding certain network behavior from blocking you can continue to be productive even while your computer is under attack Along with protecting your computer against attacks Norton Internet Security also monitors all of the information that your computer sends to other computers This ensures that your computer cannot be used to attack other users or be exploited by zombies If Norton Internet Security detects that your computer is sending information that is typical of an attack it immediately blocks the connection and warns you about the possible problem 104 Guarding against intrusion attempts Ensure that Norton Personal Firewall and Intrusion Detection are enabled See Keeping current with LiveUpdate on page 81 To reduce the number of warnings that you receive Norton Internet Security only monitors attacks that are targeted at ports that your computer uses If an attacker attempts to connect to your computer via an inactive port or a port that has been blocked by the firewall Norton Internet Security will not notify you because there is no risk of an intrusion Norton Internet Security does not scan for intrusions by computers in your Trusted Zone However Intrusion Detection does monitor the information that you send to Trusted computers for signs of zombies and other remote control attacks Intrusion Detection relies on an extensive list of attack signatures to detect and block suspicious netwo
91. connected to a printer that the Registration Wizard can use to print the registration form If you want to register using the Internet you must be connected to the Internet Click Next To get a copy of your registration information for future reference do one of the following Write down the serial number Click Print Click Next Select whether you want to use your existing profile the next time that you register a Symantec product or type the information as part of registration Click Finish After installation After Norton Internet Security is installed a prompt appears giving you the option to restart your computer immediately After restarting the Security Assistant appears to guide you through the configuration of Norton Internet Security Restart your computer After installation a prompt appears telling you that you must restart your computer for the updates to take effect To restart your computer Ko In the Installer Information dialog box click Yes Configuration of Norton Internet Security is not complete until you restart your computer Installing Norton Internet Security 39 After installation Use the Security Assistant The Security Assistant helps you quickly configure your Norton Internet Security protection The Security Assistant is divided into five categories Home Networking Program Control Privacy Control Password Protection Parental Control Set up Home Networkin
92. content and can block all active content or warn you whenever active content is encountered Risks from inappropriate content and activities There is a wealth of information on the Internet that is easily accessible to everyone However some topics are not suitable for all people For example most people consider pornographic and violent sites to be inappropriate for viewing by children You may feel that other topics should also be off limits Blocking site and newsgroup categories Norton Internet Security lets you choose Web sites and newsgroups that you want to be accessible to people using this computer Because different people need different levels of access you can configure Norton Internet Security to block specific content for each user Restricting access to programs Some Internet enabled programs might be inappropriate for use on your computer For example you may not want children using realtime chat programs You may also want to restrict the use of file transfer programs This reduces the risk of introducing viruses worms zombies Trojan horses or other malicious code onto your computer or network Norton Internet Security lets you choose categories of programs that can access the Internet It keeps the list of programs up to date so your protection stays current as new programs are released You can also add custom programs and control their uses as well 228 Understanding Internet risks Risks to your privac
93. ct installation 4 Insert the Norton Internet Security CD into your CD ROM drive and restart your computer If you do not have a Norton Internet Security CD or cannot start your computer from a CD create Emergency Disks on another uninfected computer See Create Emergency Disks on page 30 2 Runa full system scan Was a virus found a Yes Run a virus scan again using the Delete switch a No See Finish installation on page 8 O For detailed instructions and an animated Web tutorial that walks you through each step of the process go to www service symantec com installtutorial If you re installing Norton Internet Security for the first time 7 If you use an NTFS file system If you use an NTFS file system Check for viruses that affect installation 2 Can you establish a connection to the Internet a Yes Go to http security symantec com and follow the on screen instructions to scan for threats a No For Windows XP Go to service symantec com For Windows 2000 Go to service symantec com See Finish installation on page 8 Was a virus found a Yes Write down the name of the virus and go to http securityresponse symantec com to locate specific removal instructions a No If you have not already done so install Norton Internet Security See Finish installation on page 8 O For detailed instructions and an animated Web tutorial that walks you through each step of the process go to www
94. ction most updated protection See Keeping current with LiveUpdate on page 81 Set a virus Norton AntiVirus can scan your computer regularly to ensure protection that it is protected schedule See Schedule scans on page 130 Configure your The default installation of Norton Internet Security should firewall provide sufficient protection for most users but you can customize protection by adjusting firewall settings See Customize firewall protection on page 105 Periodically Norton Internet Security maintains extensive logs of all of the review program actions that it takes to protect your computer Check these logs logs and occasionally to identify potential problems statistics See Monitoring Norton Internet Security on page 191 20 Responding to emergencies Prevent future problems Prevent future problems See Understanding Internet risks on page 223 Norton Internet Security can protect your computer against most Internet attacks and virus emergencies To prepare your computer for emergencies Stay informed about viruses and security risks by visiting the Symantec Security Response Web site securityresponse symantec com Keep your browser up to date Software publishers release new versions to fix vulnerabilities in their browsers Use passwords intelligently For important information use complex passwords that include uppercase and lowercase letters numbers and sym
95. cue Disks you create you can use the Emergency Disks to recover from most common emergencies You can use the CD that contains Norton AntiVirus as an Emergency Disk if your computer can start from the CD ROM drive Once you have created the Emergency Disks use them to solve the problem 209 210 Troubleshooting Norton Internet Security Troubleshoot Norton AntiVirus problems cannot start from drive A See My Rescue Disk does not work on page 209 If your computer does not check drive A first on startup use your computer s Setup program to change settings Be careful when making changes using your computer s Setup program If you have never used it before you may want to refer to your computer manufacturer s documentation To change your computer s settings 1 Restart your computer A message appears telling you the key or keys to press to run SETUP such as Press lt DEL gt if you want to run SETUP 2 Press the key or keys to launch the Setup program 3 Set the Boot Sequence to boot drive A first and drive C second Setup programs vary from one manufacturer to the next If you cannot find the Boot Sequence option use the Setup program s Help system refer to the documentation that came with your system or contact your system s manufacturer 4 Save the changes then exit the Setup program You may need to use a special boot disk rather than the Rescue Boot Disk In this case use the boot disk or
96. d Wide Web Examples include Microsoft Internet Explorer and Netscape Navigator Additional categories in which you can create additional classifications of programs To block and permit categories of Internet programs 1 Start Norton Internet Security 2 Double click Parental Control 3 Inthe Parental Control window on the Settings For menu select the account that you want to change Protect children with Parental Control 187 Customize Parental Control 4 Click Programs Programs xj Programs Tell me more Norton Internet Security lets parents choose the types of programs that children can use to access the Internet Choose the program categories you want this child to use This person can use Program Categories the programs marked with a check to access the Internet E mail Education amp Family File Transfer Instant Messaging Newsreaders Networked Games Web Browsers Internet Advertising zi WI000009 5 Inthe Programs dialog box under Program Categories select the categories of programs that this account is allowed to use 6 Click OK O Blocking a program from accessing the Internet does not prevent users from running the program A program may stop responding when Norton Internet Security prevents it from connecting to the Internet Before making changes to program settings ensure that users understand that their computers may stop responding if they use blocked progra
97. d or permitted newsgroups For example to block comp security pgp discuss discussion about the computer security tool Pretty Good Privacy while still allowing users access to comp security general computer security issues you can enter comp security pgp This blocks newsgroups with comp security pgp in their names while still allowing access to other comp security newsgroups You can also block or permit newsgroups using partial group names For example you could block all newsgroups with the word sex in their names by entering sex in the blocked newsgroup list Be careful when entering short text strings The newsgroup filter blocks or permits all newsgroups with names that match text strings so you may inadvertently block newsgroups that you want users to be able to access For example blocking sex also blocks newsgroups with names containing words like sextant and sexagenarian When entering text strings do not use wildcard characters such as asterisks Enter text strings to block or permit Norton Internet Security includes a list of text strings that block newsgroups that many people would find objectionable You can add strings to customize Parental Control for your family Each computer can have only one list of permitted or blocked newsgroups To enter text strings to block or permit 1 Start Norton Internet Security 2 Double click Parental Control Protect children with Parental Control 189 Customize Parental Con
98. date your Rescue Disks as often as you like The Rescue Disk Wizard helps you to update your basic Rescue Disks without having to recreate them If you are updating a floppy disk set make sure your disks are not write protected before you begin Norton Internet Security basics 75 For more information To update your Rescue Disks 1 Start Norton Internet Security In the Security Center click Rescue Under Select Destination Drive select drive A Click Update Insert the disk labeled Basic Rescue Boot Floppy Disk into drive A If the disk is write protected slide the plastic tab closed to make it writeable 6 Click OK uw F amp F WwW N 7 Insert the remaining disks in your set as requested See Test your Make sure to test your newly updated Rescue Disk set when prompted Rescue Disks on page 74 For more information Norton Internet Security provides glossary terms online Help this User s Guide in PDF format tutorials on the Web and links to the Knowledge Base on the Symantec Web site Look up glossary terms Technical terms that are italicized in the User s Guide are defined in the glossary which is available in both the User s Guide PDF and Help In both locations clicking a glossary term takes you to its definition Use online Help Help is always available throughout Norton Internet Security Help buttons or links to more information provide information specific to the task you are completi
99. determine which images should be blocked when displaying Web pages When Ad Blocking is enabled all Web pages are scanned for the HTML strings specified in the Defaults list Norton Internet Security looks for the blocked strings within HTML tags that are used to present advertising The HTML structures that contain matching strings are removed from the page by Norton Internet Security before the page appears in the Web browser Make sure that what you place in the Defaults block list isn t too general For example www by itself is not a good string to block because almost every URL includes www A string like www slowads is more effective because it only blocks graphics from the slowads domain without affecting other sites All users share a single Ad Blocking list Supervisor and Adult users can make changes to the list Child and Teenager users cannot make any changes to Ad Blocking settings Blocking Internet advertisements 169 Use text strings to identify ads to block or permit How to identify Ad Blocking strings The way that you define Ad Blocking strings affects how restrictive or unrestrictive Norton Internet Security is when filtering data For example if you add the string ajax com to the Defaults block list you block everything in the ajax com domain If you are more specific and add the string nifty_images image7 gif to the site specific block list maintained for www ajax com you block only that particular image
100. dows blocking 163 170 205 pornography 227 ports 220 222 scans 225 well known 221 ports scanning 102 printers sharing 90 Privacy Control 155 161 and SSL 156 configuration 42 in instant messengers 157 privacy risks 228 229 Private Information options 159 Prodigy Internet connection 84 product serial number 38 Program Control Automatic 110 configuring 40 manually adding programs 112 scanning for programs 111 settings 113 Program Scan accessing 54 configuring 111 running 111 programs configuring with Program Scan 111 creating firewall rules 114 manually adding to Program Control 112 manually configuring Internet access 114 programs accessing the Internet See Internet enabled programs protection updates described 82 downloading from Symantec Web site 84 protection updating 86 proxy servers 96 Q Quarantine files in 138 infected files in 135 options 139 options during uninstall 46 responding to virus threats 18 R Readme file 76 registering your software 38 removable drive scans 127 removing Norton AntiVirus 46 Norton Internet Security 46 other antivirus programs 29 previous copies of Norton Internet Security 29 Repair Wizard 134 repairing infected files in Windows 2000 XP 136 in Windows 98 98SE Me 135 required computer configuration 27 Rescue Disks 73 75 absent 209 creating 73 defined 73 failure to start from 209 testing 74 updating 74 using 141 restoring boot record and system files 141 risks from ac
101. dvanced In the Advanced Spam Alert window click New 6 Inthe New Spam Entry window in the Search for text box type an address or a text string 7 On the Search in menu select where Norton Internet Security should search for the text There are five options From sender s name To recipient s name Subject of message Body of message Anywhere in message 8 Under Classify message as choose whether messages that include this text are spam or not spam 9 Click OK 10 Click OK You can modify or delete a Spam Alert entry if it is causing messages to be incorrectly classified Blocking unwanted email Spam Alert tips To modify or delete a Spam Alert entry 1 2 3 Open Norton Internet Security Double click Spam Alert In the Spam Alert window in the Spam Alert settings for drop down list select the account that you want to change In the Spam Alert window click Advanced In the Advanced Spam Alert window select the Spam Alert entry with which you want to work Select the action that you want to take Your options are Modify Change the entry Remove Delete the entry Click OK Click OK Spam Alert tips When using Spam Alert remember Periodically review incoming email messages to ensure that Spam Alert is not erroneously marking valid email as spam To avoid losing legitimate email use your email program to create a spam folder You can then filter all messages marked with Spam
102. e What to do if a virus is found on page 133 Auto Protect Loads into memory when Windows starts providing constant protection while you work Checks for viruses every time that you use software programs on your computer insert floppy disks or other removable media access the Internet or use document files that you receive or create Monitors your computer for any unusual symptoms that may indicate an active virus See If a virus is found by Auto Protect on page 135 26 About Norton Internet Security Norton Internet Security features Before installing Norton Internet Security take a moment to review the system requirements listed in this chapter Windows 98 and Windows Me users should have several blank 1 44 MB disks available to make Rescue Disks System requirements To use Norton Internet Security your computer must have one of the following Windows operating systems installed Windows 98 98SE Windows Me Windows 2000 Professional Windows XP Professional or Windows XP Home Edition Windows 95 and NT the server editions of Windows 2000 XP and the Windows XP 64 bit edition are not supported 28 Installing Norton Internet Security System requirements Your computer must also meet the following minimum requirements Windows 2000 Professional Intel Pentium processor or compatible at 150 MHz or higher 64 MB of RAM 96 MB recommended 90 MB of available hard di
103. e Statistics window click View Logs FW nN In the Log Viewer right click the log that you want to print then click Print Category To print statistics information 1 Open Norton Internet Security In the Security Center main window click Statistics In the Statistics window click Detailed Statistics In the Detailed Statistics window on the File menu click Print uw FF WwW N In the Print window click Print 202 Monitoring Norton Internet Security Print or save logs and statistics To save log information in a text file 1 FW N Open Norton Internet Security In the Security Center main window click Statistics In the Statistics window click View Logs In the Log Viewer right click the log that you want to save then click Export Category As Specify a location and name for the text file Click Save To save statistics to a text file nou F WwW N Open Norton Internet Security In the Security Center main window click Statistics In the Statistics window click Detailed Statistics In the Detailed Statistics window on the File menu click Save Specify a location and name for the text file Click Save The information in this chapter will help you solve the most frequently encountered problems If you can t find the solution to your problem here there is a wealth of information on the Symantec Web site You can find updates patches online tutorials Knowledge Base articles a
104. e address bar of your browser type FTP followed by the IP address of your FTP server Norton Internet Security displays an alert 2 Inthe alert in the drop down menu click Automatically configure Internet access 3 Click OK Controlling access to protected computers 99 Control how outside users access your network If you run Symantec pcAnywhere See Change an You should have no problems using Symantec pcAnywhere as either a rob elec client or host with Norton Internet Security For maximum protection if you run a Symantec pcAnywhere host edit the rule to limit its use to only the computers with which you use it This and Symantec pcAnywhere passwords provide maximum security If you run a Virtual Private Network Norton Internet Security works with the following Virtual Private Networks VPNs Nortel VPNRemote PGP a SecureRemote With most VPNs when the VPN client is active you cannot see the Internet or other computers on your local network You can only see what is available through the VPN server to which you are connected 100 Controlling access to protected computers Control how outside users access your network Internet attacks take advantage of the way that computers transfer information Norton Internet Security can protect your computer by monitoring the information that comes into and out of your computer and blocking any attack attempts Information travels across the Internet i
105. e appears in all copies and that both that copyright notice and this permission notice appear in supporting documentation Silicon Graphics makes no representations about the suitability of this software for any purpose It is provided as is without express or implied warranty Copyright 1994 Hewlett Packard Company Permission to use copy modify distribute and sell this software and its documentation for any purpose is hereby granted without fee provided that the above copyright notice appears in all copies and that both that copyright notice and this permission notice appear in supporting documentation Hewlett Packard Company makes no representations about the suitability of this software for any purpose It is provided as is without express or implied warranty Trademarks Symantec the Symantec logo Norton Internet Security Norton Personal Firewall LiveUpdate and Norton AntiVirus are U S registered trademarks of Symantec Corporation Rescue Disk is a trademark of Symantec Corporation Microsoft MS DOS MSN Windows and the Windows logo are registered trademarks of Microsoft Corporation AOL and CompuServe are registered trademarks of America Online nc Pentium is a registered trademark of Intel Corporation Other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged Printed in the United States of America 10 9 8 765 4 3 2 1
106. e applies to UDP User Datagram Protocol communications The rule applies to both TCP and UDP communications The rule applies to ICMP Internet Control Message Protocol communications This option is only available when adding or modifying a General Rule 9 10 11 12 13 14 15 16 17 Guarding against intrusion attempts Customize firewall rules Select the ports the rule should monitor Your options are All types of communications all ports Only the types of communications or ports listed below The rule applies to communications using any port The rule applies to the ports listed You can add ports to or remove ports from the list Click Next Choose if and how you want Norton Internet Security to track this rule Your options are Do not track this rule Create an Event No record of the actions of this rule is made An entry is created in the firewall Event Log when a Log entry network communication event matches this rule Notify me with an An Alert Tracker message appears when a network Alert Tracker communication event matches this rule message Display Security A Security Alert dialog box appears when a network Alert communication event matches this rule Click Next In the What do you want to call this rule text box type a name for this rule In the In which category does this rule belong text box select a category Click Next Revi
107. e information about hundreds of connections This can make it difficult to identify specific activity or assess the impact of any changes that you make to Norton Internet Security settings Clear the logs to remove information about past connections This lets you see how settings changes affect your protection You can clear a single log or clear all logs at once 200 Monitoring Norton Internet Security View Norton Internet Security Logs To clear a single log 1 Open Norton Internet Security 2 Inthe Security Center main window click Statistics 3 In the Statistics window click View Logs 4 In the Log Viewer right click the log that you want to clear then click Clear Category To clear all logs at once Open Norton Internet Security 2 Inthe Security Center main window click Statistics 3 Inthe Statistics window click View Logs 4 In the Log Viewer select one of the following Norton Internet Security Norton AntiVirus 5 Click Refresh all Categories Change the size of the logs Norton Internet Security stores the information for each log in a separate file You can change the size of log files to manage the amount of hard disk space that they occupy When the files reach their maximum sizes new events overwrite the oldest events By default log files are between 64 KB and 512 KB If you want to see information spanning a longer period increase the size of the log If you need to recover hard di
108. e multiple schedules for a scan For example you could run the same scan at the beginning of your work day and at the end To create multiple schedules for a single scan 1 Start Norton Internet Security 2 Inthe Security Center click Norton AntiVirus gt Scan for Viruses 3 Inthe Scan for Viruses pane select the scan that you want to schedule O If you click the button next to the scan name the scan runs 4 Under Schedule Task click Schedule 5 Inthe Schedule dialog box check Show multiple schedules 6 Toset an additional schedule click New 7 Set the frequency and time at which you want the scan to run Most of the frequency options include additional options that let you further refine the schedule Set the additional options as necessary 8 When you are done click OK Edit scheduled scans You can change the schedule of any scheduled scan including the weekly full system scan To edit a scheduled scan 1 Start Norton Internet Security 2 Inthe Security Center click Norton AntiVirus gt Scan for Viruses 3 Inthe Scan for Viruses pane select the scan that you want to schedule O If you click the button next to the scan name the scan runs 4 Under Schedule Task click Schedule Change the schedule as desired 6 Click OK 132 Protecting disks files and data from viruses Schedule scans Delete a scan schedule You can delete any scan schedule Deleting the schedule does not delete the scan
109. e protection for multiple users 4 Accounts and Parental Control let you customize Norton Internet Security protection for individual users You can use Parental Control to choose the Web sites newsgroups and Internet programs each user can access Each account can have personalized settings for Parental Control Privacy Control Ad Blocking Spam Alert Would you like to install Accounts and Parental Control C No NOTE If you choose not to install Accounts and Parental Control you will have to reinstall Norton Internet Security to create accounts or use Parental Control lt Back Cancel In the Install Accounts and Parental Control window select whether you want to install Accounts and Parental Control If you do not install these features you will have to reinstall Norton Internet Security to create accounts or use Parental Control Click Next nternet Security Setup Run LiveUpdate after installation Keep Norton Internet Security up to date LiveUpdate helps keep your computer safe from new threats by updating your Norton Internet Security protection You can ensure that your computer is fully protected from newly discovered Internet threats by running LiveUpdate after you set up Norton Internet Security Would you like to run LiveUpdate after you set up Norton Internet Security Yes 9 No Cancel 34 Installing Norton Internet Security Install Norton Inte
110. e that Enable Ad Blocking is checked 5 Click Open the Ad Trashcan The Ad Trashcan window appears 6 With the windows arranged so that you can see both the advertisement and the Ad Trashcan window do one of the following If you are using Microsoft Internet Explorer drag the unwanted ad from the Web site to the Ad Blocking dialog box If you are using Netscape right click the advertisement then click Copy Image Location In the Ad Trashcan click Paste The address for the advertisement appears in the Ad Details line of the Ad Trashcan dialog box 168 Blocking Internet advertisements Use text strings to identify ads to block or permit 7 Select one of the following a Add Block this address Modify Change the entry before adding it to the Ad Blocking list For example if the advertisement address is http www advertise org annoying ads numberone gif you could change it to http www advertise org annoying ads to block everything in the ads directory 8 Click OK Use text strings to identify ads to block or permit You can control whether Norton Internet Security displays specific ads by creating a list of text strings that identify individual ad banners Ad Blocking strings are sections of HTML addresses If any part of a file s address matches the text string Norton Internet Security automatically blocks the file Norton Internet Security provides a predefined Defaults Ad Blocking list that is used to
111. ecifically allow it Identify private information to protect Many Web sites ask for your name email address and other personal information While it is generally safe to provide this information to large reputable sites malicious sites can use this information to invade your privacy It is also possible for people to intercept information sent via the Web email and instant messenger programs 156 Protecting your privacy Identify private information to protect Privacy Control lets you create a list of information that you want to remain private If users attempt to send protected information over the Internet Norton Internet Security can warn them about the security risk or block the connection All users on a protected computer share a single Private Information list Tips on entering private information Because Norton Internet Security blocks personal information exactly the way that you enter it into the program it is better to enter only partial numbers For example a phone number could be typed as 888 555 1234 but it could also be typed without dashes 8885551234 or with spaces 888 555 1234 or even in two or more separate fields One common aspect of these formats is that the last four digits 1234 are always together Therefore you can have better protection by protecting the last four digits than you have by protecting the entire number Entering partial information has two advantages First you are not entering
112. ection by using the Security Level slider to select preset security levels or by changing individual security settings Change the Security Level slider The Security Level slider lets you select Minimal Medium or High security settings When you change the slider position the protection level changes Changing the Security Level slider does not affect the protection provided by Intrusion Detection See About Norton You can set individual Security settings for each Norton Internet Security Internet Security user accounts on pageda To change the Security Level slider 1 Open Norton Internet Security 2 Inthe Security Center double click Personal Firewall Norton Internet Security xi Prograrn Control Home Networking Advanced Personal Firewall Tell me more Personal Firewall protects your computer from attacks and malicious programs M Turn on Personal Firewall Choose a security level for Supervisor z Move the slider to set the Firewall level Medium recommended Alerts you when programs attempt to access the Internet ActiveX controls and Java applets run without warning il Stealths unused ports making them invisible to remote computers Custom Level Default Level 105 106 Guarding against intrusion attempts Customize firewall protection In the Personal Firewall window in the Choose a security level for drop down list select the account that you wan
113. ections including those made among computers in your home After installation you may need to adjust some settings to share files printers and other resources with other computers Connect to a network Every time that you use Windows file sharing to exchange files with someone print to a shared printer or connect to the Internet using a modem or broadband connection your computer joins a network of other computers When you are part of a network your computer is vulnerable to attacks Norton Internet Security automatically monitors all new network connections to ensure that your computer is safe Normally your computer connects to a network because of an action that you take Unexpected connections can be a sign that a malicious program is attempting to send information over the Internet Some wireless access cards automatically scan for and connect to any network in range If you travel with a laptop that is equipped with a wireless access card you may discover that your computer joins wireless networks in airports and other public places 90 Controlling access to protected computers Control how people use your computer See Monitoring Norton Internet Security on page 191 Whenever you join a network Norton Internet Security automatically begins monitoring the connection You do not need to make any changes in order to be protected Norton Internet Security notifies you of the new connection and records it in the Connect
114. ed Statistics window can display information in one or two columns Both window layouts contain the same statistics To configure Detailed Statistics window columns 1 Open Norton Internet Security 2 Inthe Security Center main window click Statistics 3 Inthe Statistics window click Detailed Statistics 196 Monitoring Norton Internet Security View Norton Internet Security Logs In the Detailed Statistics window do one of the following To automatically adjust between a one and two column display based on the current window width on the View menu click Columns gt Automatic To always display a single column on the View menu click Columns gt One To always display two columns on the View menu click Columns gt Two Keep the Detailed Statistics window visible at all times You can keep the Detailed Statistics window visible even when a program runs in a full screen window This can be useful for spotting unusual network activity that may indicate a security problem To keep the Detailed Statistics window visible at all times 1 FW N Open Norton Internet Security In the Security Center main window click Statistics In the Statistics window click Detailed Statistics In the Detailed Statistics window on the View menu click Always On Top View Norton Internet Security Logs Norton Internet Security records information about Web sites that users have visited actions that the firewall has ta
115. egularly to ensure that your list is up to date Guarding against intrusion attempts 111 Customize firewall rules To enable Automatic Program Control 1 Open Norton Internet Security 2 Inthe Security Center double click Personal Firewall Norton Internet Security xj Personal Firewall Program Control Home Networking l Advanced Program Control Tellme more Automatic Program Control Automatically configure Internet access for Internet programs when you start them the first time This reduces the number of alerts that you receive M Turn on Automatic Program Control NOTE Automatic Program Control only configures access for versions of Internet programs that Symantec has identified as safe Manual Program Control Manually configure Internet access for individual programs Click Program Scan to quickly configure all Internet programs or click Add or Modify to manually configure settings for individual programs Internet Access Category Program E Microsoft Direct Play Server w Automatic w Networked Games E Microsoft HTML Application Host v Permit All v General ervice Process v Automatic x General Add Modify zemo Program Scan 3 Inthe Personal Firewall window on the Program Control tab check Turn on Automatic Program Control 4 Click OK Scan for Internet enabled programs Scanning for Internet enabled programs is the quickest way to configure the Per
116. elease Notes contain technical tips and information about product changes that occurred after this guide went to press They are installed on your hard disk in the same location as the Norton Internet Security product files Norton Internet Security basics 77 For more information To read the Readme file 1 Do one of the following On the Windows taskbar click Start gt Programs gt Norton Internet Security gt Product Support gt Readme txt On the Windows XP taskbar click Start gt More Programs gt Norton Internet Security gt Product Support gt Readme txt The file opens in Notepad 2 Close the word processing program when you are done reading the file The Release Notes can be accessed from the Start menu To read the Release Notes 1 Do one of the following On the Windows taskbar click Start gt Programs gt Norton Internet Security gt Product Support gt Norton Internet Security Release Notes On the Windows XP taskbar click Start gt More Programs gt Norton Internet Security gt Product Support gt Norton Internet Security Release Notes The file opens in Notepad 2 Close the word processing program when you are done reading the file Use the User s Guide PDFs This User s Guide and the Norton AntiVirus User s Guide are provided on the Norton Internet Security CD in PDF format You must have Adobe Acrobat Reader installed on your computer to read the PDFs To install Ado
117. encounter It can be bothersome to respond every time that you encounter a Java applet or ActiveX control but it lets you decide which ones to run None Lets Java applets and ActiveX controls run whenever you encounter them 108 Guarding against intrusion attempts Customize firewall rules To be notified whenever unknown programs access the Internet check Enable Access Control Alerts To be notified whenever a remote computer attempts to connect to a port no program is using check Alert when unused ports are accessed 6 Click OK Reset security settings to defaults See Change the Security Level slider on page 105 Setting a custom security level disables the Security Level slider The slider indicates the security level on which your custom level is based but you cannot use the slider to make changes to your settings To use the slider to choose a preset security level you must reset the security level To reset security settings to defaults 1 Open Norton Internet Security 2 Inthe Security Center double click Personal Firewall 3 Inthe Personal Firewall window in the Choose a security level for drop down list select the account that you want to change 4 Click Default Level This resets your security level to medium Use the Security Level slider to choose one of the other preset security levels Customize firewall rules Firewall rules control how Norton Personal Firewall protects your com
118. eptions to blocked newsgroups 1 2 3 10 Start Norton Internet Security Double click Parental Control In the Parental Control window on the Settings For menu select the account that you want to change Click Newsgroups In the Specify Newsgroups window click Specify Blocked Newsgroups Click Exceptions Click Add In the Add Newsgroup to Exceptions List window type the complete name of the newsgroup that you want to unblock Click OK When you are done adding exceptions click OK Norton Internet Security maintains records of every ingoing and outgoing Internet connection and any actions that the program takes to protect your computer You should periodically review this information to spot potential problems There are four sources of Norton Internet Security information Status amp Settings window Statistics window Detailed statistics window Event Log Basic information about which protection features are active Recent information about firewall and content blocking activities Detailed information about network activity and actions that orton Internet Security has taken Internet activities and any actions Norton Internet Security has aken When reviewing logged information check for Recent attacks in the Status amp Settings window Many denied accesses especially from a single P address Sequences of port numbers from the same IP address possibly indicati
119. er does not start properly 4 Follow the on screen instructions for inserting and removing the Rescue Disks 5 When the Rescue program is done remove the Rescue Disk from drive A and restart your computer If you need to use Emergency Disks See Create If you have not created Rescue Disks you can use Emergency Disks to Emergency Disks A on page 30 restart your computer and scan for viruses To use Emergency Disks 1 Insert Emergency Disk 1 into drive A and restart your computer The Emergency program runs in DOS 2 Ensure that Antivirus is selected then press Enter to begin the orton AntiVirus Emergency program 3 Follow the on screen instructions for inserting and removing the Emergency Disks The Emergency program automatically scans your computer and removes viruses 4 When the Emergency program is done remove the Emergency Disk from drive A and restart your computer If you are using the CD as an Emergency Disk See I cannot start If you are using the Norton Internet Security CD as an Emergency Disk you ce Ai mon can ignore all of the instructions to change disks as all necessary information is on the CD O You may need to change your computer s BIOS Setup options to start from the CD ROM drive To use the CD as an Emergency Disk 1 Insert the Norton Internet Security CD into the CD ROM drive 2 Restart your computer The Emergency program scans your computer and removes viruses What to do if a
120. er you have selected in the Explorer pane To access additional Norton AntiVirus tools click the arrow to the right of the button When you first open Windows Explorer after installing Norton Internet Security you may not see the Norton AntiVirus button and menu To display the Norton AntiVirus button and menu 1 In Windows Explorer on the View menu click Toolbars 2 Click Norton AntiVirus O You may not be able to access the Norton AntiVirus Windows Explorer menu depending on your computer s configuration 52 Norton Internet Security basics Work with Norton Internet Security Work with Norton Internet Security Norton Internet Security works in the background so you may only interact with the program when it alerts you of new network connections and possible problems You can choose to view the new Security Monitor or the standard Security Center window respond to security problems and control the number of alerts you receive and how the program resolves potential security problems Access Norton Internet Security protection features The default settings for Norton Internet Security provide a safe automatic and efficient way of protecting your computer If you want to change or customize your protection you can access all Norton Internet Security tools from the Status amp Settings window Child users cannot make changes to Norton Internet Security settings All users regardless of their access levels can make cha
121. erforms To explore the online tutorials 1 Point your browser to www symantec com techsupp tutorials html 2 On the tutorials Web page select the product and version for which you want a tutorial Click continue 4 Inthe list of available tutorials for your product select the one that you want to review 80 Norton Internet Security basics For more information Subscribe to the Symantec Security Response newsletter Each month Symantec publishes a free electronic newsletter that is focused on the needs of Internet security customers It discusses the latest antivirus technology produced by Symantec Security Response common viruses trends in virus workings virus outbreak warnings and special virus definition releases To subscribe to the Symantec Security Response newsletter 1 2 Point your browser to securityresponse symantec com On the security response Web page scroll down to the reference area of the page then click Newsletter On the security response newsletter Web page choose the language in which you want to receive the newsletter On the subscribe Web page type the information requested then click Subscribe amp Symantec products depend on current information to protect your computer from newly discovered threats Symantec makes this information available to you through LiveUpdate Using your Internet connection LiveUpdate obtains program updates and protection updates for your computer
122. ernet Security These rules provide basic network functionality as well as protect you from known Internet risks The default firewall rules appear in the general settings and in Trojan horse settings Examples of default firewall rules include Default Inbound Permits the use of the BOOTP service BOOTP is short for Bootp Bootstrap Protocol which enables a computer to discover Default Outbound its own IP address Bootp Default Inbound Permits inbound and outbound loopback connections to the Loopback localhost address of 127 0 0 1 It is usually safe to permit Default Outbound loopback or local connections because the connection Loopback originator is typically a trusted program on your own computer Even with this firewall rule enabled remote computers are never allowed access to the localhost address by the underlying network 110 Guarding against intrusion attempts Customize firewall rules Default Inbound ICMP Default Outbound ICMP Default Block Back Orifice 2000 Trojan Default Block NetBus Trojan Permits all types of outbound and safe types of inbound ICMP messaging ICMP messages provide status and control information Protects you from known remote access Trojan horse programs Create new firewall rules See About Norton Internet Security accounts on page 145 Enable Automatic Program Control See Keeping current with LiveUpdate on page 81 Norton Internet Secur
123. escue DISKS ninie a E NA 73 About Rescue DISKS e scdsasiedeaiiaeraiadianeciaaumiaciaien 73 Create a Rescue Disk Set oe ecseeseescceesesesseseeseseeeenseneseeneesentenenes 73 Test your Rescue Disks csccsscccscteavatcenescengede eiae e aN E 74 Update your Rescue Disks 0 seseeseeseeeeeeeeseeneeneneeeenteneeees 74 Chapter 5 Chapter 6 Contents Eor mor informatio sranna ded nti e a ae EGERN 75 LOOK Up SlOSSATY TEINS eseeceseeseeseeseseeseeseseeeeseeneeeeseeseseeneaneneeseans 75 Use onime HE Pecannoten a a A NE EAN 75 Readme file and Release Notes cccccccscsssseseesesescsescscsesesneneees 76 Use the User s Guide PDFS 0 eececescccccesssseseeesesseeeeeeseseeesneseseeeans 77 About Norton Internet Security on the Web eee 78 Explore online tutorials oo a aaa a 79 Subscribe to the Symantec Security Response newsletter 80 Keeping current with LiveUpdate About program Updates serasi n E Aa Ao t protecion updates iriennene nan About your subscription s s sssssssssssssssisstessstsseesstesstsstrsrtssstesstessesneens When you Should update aiaee are A EE A AAA Request an update alert If you run LiveUpdate on an internal network sses 83 If you can t use LiveUpdate srania eeeeeeeseeesseseseeseeesneeeseeaeeeseeeeseaes Obtain updates using LiveUpdate Set LiveUpdate to Interactive or Express mode TUED OE Express mode raen E Run LiveUpdate automatically oo ceseseseeeeeeesseeeeseeeeseeseeeeseeneseaes
124. espond to scans of unused ports giving them a stealth appearance Initial access The easiest way for a hacker to access a Windows computer is to use Microsoft networking On many computers Microsoft networking is enabled so that anyone on the network can connect to it Microsoft NetBIOS networking uses three of the well known ports These ports are used to establish connections among computers on a Microsoft network In fact they normally advertise the name of your computer over the local network This is what you want on your own network but it is not what you want on the Internet Norton Internet Security is preset to block these ports and prevent someone on the Internet from connecting to your computer using Microsoft networking If your computer is connected to a local network as well as to the Internet you must change some settings to allow communication with the other computers on your network Norton Internet Security still protects you from Internet risks while allowing you to use your local network Privilege escalation Once a hacker has connected to your computer the next step is to gain as much control as possible The steps involved and the results obtained vary depending on the version of Windows that is running on the target computer On computers running Windows 95 98 Me once hackers have gained access to the computers there is no need for escalation They have full control of the computers Luckily these versions
125. ess of the attacking computer Online The number of cookies Web ads and spam email messages that Content have been blocked and the number of times private information Blocking has been blocked Parental Web sites and programs that have been blocked Control Monitoring Norton Internet Security 193 View the Statistics window To view the Statistics window 1 Open Norton Internet Security 2 Inthe Security Center main window click Statistics Reset information in the Statistics window Norton Internet Security automatically clears all of the statistics in the Statistics window when you restart Windows You can also clear the statistics manually This helps you see if a configuration change affects the Statistics To reset information in the Statistics window 1 Open Norton Internet Security 2 Inthe Security Center click Statistics Norton Internet Security Norton Internet Security Statistics Status amp Settings Tell me more Personal Firewall Alerting Level You were last attacked on None since reboot EPE aN Recent intrusion attempts 0 Statistics 4 Most frequent attacker None Sia aoa Attacker Details Subscription Services Recent Online Content Blocking Blocked Permitted Cookies 19 49 User Accounts Private Information 4 0 Web ads 21 Norton Antivirus Spam emails 0 Parental Control Web sites blocked recently 3 Applications blocked recently 0 Detailed Statistics Clea
126. esteseseeeenenees 17 Respond to virus threats ssessssiessrseessrressrreesrreesreessrseessrreserree 18 If you think your computer is under attack cceeceeeeeeeeeeeeee 18 Recover from an emergency Prevent future Probleme 2 c dnciasdvinuenimanvaaenmnnnarcannades About Norton Internet Security What s new in Norton Internet Security 2003 oo cece 21 Norton Internet Security features About Norton Personal Firewall About Norton AntiVirts on cccecccescsessssesesseseeesesseseeeeteseeeeeseseess Installing Norton Internet Security SySteM PEQuIPEMENtS sennie R NENANA Supported email clients Supported instant messenger clients s s s 29 Before INStallAatiON serena Prepare your computer Create Emergency DiSKS oe eeessesssesseseeeeseeeeseeneeeeseeeeseesesneneeseaes 30 10 Contents Chapter 4 Install Norton Internet SeCUrity ecaskar a 31 If the opening screen does Not appeal ssrsemorresiesaniis 35 Register your SOftWALE aaia aioa a ie ia A ANEA 36 After Installation aaner E E ENS 38 Restart your COMPUTED essesssseisiisstesssieeseesrrrsressrressreesressresrresrreens 38 Use the Security Assistant oaeiae a ERE 39 If you have Norton SystemWorks installed 45 If you need to uninstall Norton Internet Security ee 46 Norton Internet Security basics Access Norton Internet SeCurity ssssirsrscrrosisrsistisseiisssrinsrinsssin 49 Access Norton Internet Security from the system tray 50 Access Norton
127. et enabled programs that were found are listed Program Scan Norton Internet Security can configure Internet access for the programs below Click the checkbox next to each program that you want Norton Internet Security to configure If you want to change a program s suggested Internet access settings click its Internet Access entry and choose a different option TIP If you are uncertain about how you want to handle a specific program select it and click Remove The next time the program runs Norton Internet Security will alert you Internet enabled programs Program iv Microsoft Direct Play ve v Automatic v Networked Games E Microsoft HTML Application Host v Permit All General Vv Microsoft NetMeeting Remote Desktop Block All v General m 42 Installing Norton Internet Security After installation 6 To allow Internet access for a program check the check box to the left of the program s name To change the Internet access rule or category of a program in the Internet Access or Category drop down lists select the setting that you want Click Finish when you are done Set up Privacy Control See Identify Using Privacy Control you can identify private information that should private information have extra protection Privacy Control can then prevent users from sending to protect on page 155 this information to Web sites in email messages and attached Microsoft O
128. evels Adjust individual Privacy Control settings Customize your protection by manually adjusting individual settings You can set individual Privacy Control settings for each Norton Internet Security user Set the Privacy Level Norton Internet Security offers pre set security levels that help you set several Privacy Control options at one time The Privacy Level slider lets you select minimal medium or high protection To set the Privacy Level 1 Start Norton Internet Security 2 Double click Privacy Control 3 Inthe Privacy Control window in the Privacy Control settings for drop down list select the account that you want to change Protecting your privacy 159 Customize Privacy Control 4 Move the slider to the Privacy Level that you want Your options are High All personal information is blocked and an alert appears each time that a cookie is encountered Medium An alert appears if private information is typed into a Web recommended form or instant messenger program Conceals your browsing from Web sites Cookies are not blocked Minimal Confidential information is not blocked Cookies are not blocked Conceals your browsing from Web sites 5 Click OK Adjust individual Privacy Control settings You can change the settings for Private Information Cookie Blocking Browser Privacy and Secure Connections if the Privacy Level settings do not meet your needs For example you can choose to block all at
129. ew the new rule settings then click Finish When you have finished adding rules click OK 117 n8 Guarding against intrusion attempts Customize firewall rules Change an existing firewall rule See Write a firewall rule on page 115 You can change firewall rules if they are not functioning the way that you want To change an existing firewall rule 1 Inthe General Rules Trojan Horse Rules or Program Rules window click Add Select the rule that you want to change Click Modify Follow the on screen instructions to change any aspect of the rule uw FW N When you have finished changing rules click OK Change the order of firewall rules See How firewall rules are processed on page 108 Norton Internet Security processes each list of firewall rules from the top down You can determine how Norton Internet Security processes firewall rules by changing their order To change the order of a firewall rule 1 Inthe General Rules Trojan Horse Rules or Program Rules window select the rule that you want to move 2 Doone of the following To have Norton Internet Security process this rule before the rule above it click Move Up To have Norton Internet Security process this rule after the rule below it click Move Down 3 When you are done moving rules click OK Temporarily disable a firewall rule You can temporarily disable a firewall rule if you need to allow specific access to a comp
130. f IP filtering if the logged program started as a Windows service and information about programs that are using too many resources or otherwise operating under less than optimum conditions URLs visited by the computer providing a history of Web activity Any security alerts triggered by possible attacks on your computer Details about emails identified as spam by Spam Alert 198 Monitoring Norton Internet Security View Norton Internet Security Logs View the logs View the Norton Internet Security logs from the Statistics window To view the logs 1 2 3 Open Norton Internet Security Do one of the following In the Security Center click Statistics gt View Logs n the Security Monitor on the Select a Task menu click View Log Viewer E Log Viewer o x File Log Edit Help xd H GED Norton Antivirus Virus alerts W Application activitie W Errors Ef Internet Security W Content Blocking W Connections Firewall W Intrusion Detectior W Privacy W Private Informatior W Restrictions E System W Web History W Alerts E Spam D 7 16 2002 4 44 31 PM_ An instance of D Program Files D 7 16 2002 4 44 22PM__An instance of D WINNT syste 7 16 2002 4 44 00 PM An instance of D WINNTisyste 7 16 2002 4 44 00 PM An instance of D Program Files An instance of D Program Files Common Files Symantec Shared ccApp exe is preparing to access
131. f and destroy all copies of the Software The disclaimers of warranties and damages and limitations on liability shall survive termination Should You have any questions concerning this Agreement or if You desire to contact Symantec for any reason please write i Symantec Customer Service 555 International Way Springfield OR 97477 USA or ii Symantec Customer Service Center PO BOX 5689 Dublin 15 Ireland This product utilizes the Standard Template Library a C library of container classes algorithms and iterators Copyright 1996 1999 Silicon Graphics Computer Systems Inc Copyright e 1994 Hewlett Packard Company If you re installing Norton Internet Security for the first time 5 Start here If you re installing Norton Internet Security for the first time Start here gt Determine which file system your computer uses 4 On your desktop double click My Computer right click drive C then click Properties 2 Which file system are you using FAT Windows 98 Me 2000 XP See If you use a FAT file system on page 6 NTFS Windows 2000 XP only See If you use an NTFS file system on page 7 O For detailed instructions and an animated Web tutorial that walks you through each step of the process go to www service symantec com installtutorial 6 If you re installing Norton Internet Security for the first time If you use a FAT file system If you use a FAT file system Check for viruses that affe
132. ffice files and through supported instant messenger programs To set up Privacy Control 1 In the Security Assistant Roadmap click Privacy Control B Security Assistont Privacy Control Introduction Malicious users can intercept passwords credit card numbers and Home Networking other private information you send to Web pages in email or via instant messaging programs Program Scan Norton Internet Security protects your privacy by letting you specify information you want to keep private If a program attempts to send this information over the Internet Norton Internet Security can alert you or Privacy Control automatically block the atternpt Password Protection Add private information to protect Parental Control Finish In the Privacy Control pane click Add private information to protect In the Add Private Information dialog box under Type of information to protect select a category In the Descriptive name text box type a description to help you remember why you are protecting the data Installing Norton Internet Security 43 After installation See Tips on 5 Inthe Information to protect text box type the last five or six sole a characters of the information that you want to block from being sent page 156 over nonsecure Internet connections By entering only partial information you ensure that untrustworthy people with physical access to your computer cannot steal entire credit card
133. fies personal email messages as spam 6 Click OK Create spam filters Once Spam Alert is active Norton Internet Security appends the phrase Spam Alert to the beginning of messages that it identifies as spam This makes it easy for you to filter these messages with your email program Symantec provides configuration instructions for Microsoft Outlook Express Microsoft Outlook Netscape Communicator and Eudora but Spam Alert will work with most email programs that use POPS To create spam filters for Microsoft Outlook Express 1 Open Microsoft Outlook Express 2 On the Tools menu click Message Rules gt Mail 3 Inthe New Mail Rule window under Select the Conditions for your rule check Where the Subject line contains specific words 4 Under Select the Actions for your rule check Move it to the specified folder 5 Under Rule Description click contains specified words 6 Inthe Type Specific Words dialog box type Spam Alert then click Add Click OK 8 Under Rule Description click specified 9 Inthe Move dialog box click the plus sign next to Local Folders to display your email folders 10 Inthe list of mailboxes choose your spam mailbox then click OK 174 Blocking unwanted email Create spam filters 11 In the New Mail Rule Window in the Name of the Rule text box type a name for this rule 12 Click OK 13 In the Message Rules window click OK To create spam filters for Microsoft Out
134. following f Auto Protect is disabled click Enable Auto Protect a If Auto Protect is enabled click Disable Auto Protect Norton Internet Security basics 73 Create Rescue Disks Create Rescue Disks Depending upon which operating system you are using you may want to keep a set of Rescue Disks available and keep them up to date About Rescue Disks Rescue Disks record a duplicate set of system startup files and disk partition information and store rescue items and a virus scanner across multiple floppy disks or on a network drive Rescue Disks can be made for the Windows 98 Me operating systems A Rescue Disk set consists of one bootable floppy disk one Norton AntiVirus Program floppy disk and several Virus Definition floppy disks If you have Norton Utilities installed you will also have two Norton Utilities floppy disks in your Rescue Disk set With a Rescue Disk set you can start your computer in DOS mode and use Norton AntiVirus to fix virus related problems O Rescue Disks contain information specific to the computer on which they were made If you are using Rescue Disks for recovery you must use the disks made for your computer If you are using Rescue Disks to scan for viruses you can use disks made for a different computer Disks can and should be updated whenever you update your virus protection install new software or make changes to your hardware Create a Rescue Disk set Rescue Disks can be created at
135. fter sending and receiving mail For Norton AntiVirus to scan outgoing email messages for viruses it intercepts and scans the messages before they are sent to your email provider To resolve this issue turn off this option within your email client Consult your email client manual for instructions on how to do this or disable Norton AntiVirus outgoing email scanning To disable outgoing email scanning 1 Start Norton Internet Security 2 Inthe Security Center click Options gt Norton AntiVirus 3 Inthe Options window under Internet click Email 4 Uncheck Scan outgoing Email 5 Click OK The Internet is the interconnection of millions of computers throughout the world It is comprised of the computers and the connections that make it possible for any computer on the Internet to communicate with any other computer on the Internet The Internet is analogous to a system of roads and highways The superhighways of the Internet called the Internet backbone carry large amounts of information over long distances There are interchanges on the backbone called network access points NAPs and metropolitan area 216 About the Internet exchanges MAEs There are regional highways provided by large ISPs and local streets provided by local ISPs NAP eoeeeeeeeeeeee MAE re Regio 1 Local IS Local D 3 i Small office Single user s network computer Like a system of roads and highways the Internet provides m
136. ftware or create derivative works from the Software C use a previous version or copy of the Software after you have received a disk replacement set or an upgraded version Upon upgrading the Software all copies of the prior version must be destroyed D use a later version of the Software than is provided herewith unless you have purchased upgrade insurance or have otherwise separately acquired the right to use such ater version E use if you received the software distributed on media containing multiple Symantec products any Symantec software on the media for which you have not received a permission in a License Module or F use the Software in any manner not authorized by this license 2 CONTENT UPDATES Certain Symantec software products utilize content that is updated from time to time antivirus products utilize updated virus definitions content filtering products utilize updated URL lists firewall products utilize updated firewall rules vulnerability assessment products utilize updated vulnerability data etc collectively these are referred to as Content Updates You may obtain Content Updates for any period for which you have purchased a subscription for Content Updates for the Software including any subscription included with your original purchase of the Software purchased upgrade insurance for the Software entered into a maintenance agreement that includes Content Updates or otherwise separately acqui
137. g See Connect to a Use Home Networking to identify computers to which you want to grant eet ci access to your computer and those to which you want to deny access The Home Network Wizard can automatically configure your network and add computers to your Trusted Zone To set up Home Networking 1 Inthe Security Assistant Roadmap click Home Networking i Security Assistant x E n Home Networking Introduction By default Norton Internet Security prevents other computers from Home Networking connecting to your computer If you need to share files and printers with other computers in your home you will need to configure your local network Norton Internet Security makes this easy by letting you Program Scan organize computers into two zones Trusted Zone Privacy Control Computers in this zone have full access to your computer If you need to share files and printers with other computers in your home place them in the Trusted Zone Password Protection Restricted Zone Computers in this zone cannot communicate with your computer at all Parental Control The Restricted Zone provides the highest level of protection beyond the g normal protection provided by Norton Internet Security Finish Set up Home Networking 2 Inthe Home Networking pane click Set up Home Networking 3 Inthe Home Networking Wizard click Next 4 Follow the on screen instructions to configure your network 40 Installing Norton Inter
138. g settings 65 chat applications 185 CompuServe 84 computer blocking 121 emergency procedures 17 names 94 requirements 27 specifying 93 95 conferencing applications 186 connecting to the Internet automatically 86 context sensitive Help 76 Cookie Blocking 228 options 160 troubleshooting 205 cookies 160 205 228 creating Emergency Disks 30 Rescue Disks 73 credit card numbers 157 custom scans changing schedule 131 deleting 129 deleting schedule 132 running 129 scheduling 130 D definitions of technical terms 75 237 deleting custom scans 129 infected files 136 scan schedule 132 desktop icon 49 detailed statistics configuring 195 196 exporting information from 201 202 printing 201 202 resetting 195 viewing 194 dialog box Help 76 disabling Automatic LiveUpdate 87 Auto Protect 72 Norton Internet Security 50 71 Windows XP firewall 29 displaying the Norton AntiVirus toolbar 51 DNS Domain Name System 219 firewall rules 109 E educational applications 186 electronic newsletter 80 email 186 spam 171 177 supported clients 28 Emergency Disks creating 30 using 142 using the CD 142 emergency recovery procedures 17 20 Norton Internet Security 17 viruses 17 enabling Ad Blocking 165 Automatic LiveUpdate 67 Auto Protect 72 Flash blocking 166 Office Plug in 68 Popup Window Blocking 166 encryption 161 Eudora creating spam filters 175 Event Log See Log Viewer F file sharing 90 transfer applicati
139. g to prevent someone from connecting to your computer over the Internet See Organize To allow the use of your local network including file and printer sharing eee place the computers on your local network in the Trusted Zone network zones on page 91 Why can t connect to the Internet via my cable modem If your network accesses the Internet via a cable connection you may need to make your computer s NetBIOS name visible While the NetBIOS name is visible the files and folders on your computer remain hidden To make your NetBIOS name visible 1 Open Norton Internet Security 2 Inthe Security Center double click Personal Firewall 3 Inthe Personal Firewall window on the Advanced tab click General Rules 4 Inthe General rules dialog box click Default Inbound NetBIOS Name 5 Click Modify 6 Inthe Modify Rule dialog box on the Action tab click Permit Internet access 7 Click OK 8 Inthe General Rules dialog box click OK 9 Inthe Personal Firewall window click OK Some Internet service providers scan the ports on users computers to ensure that they are keeping to their service agreements Norton Internet Security might interpret this as a malicious port scan and stop communications with your cable system If this occurs you need to let your cable provider run port scans 208 Troubleshooting Norton Internet Security Troubleshoot Norton Internet Security problems To allow ISP port scans 1 Open Norto
140. ge of IP addresses containing the computer that you want to exclude 5 When you are done excluding IP addresses click OK Restrict a blocked computer You can add a blocked computer to your Restricted Zone to permanently prevent that computer from accessing your computer Computers added to the Restricted Zone do not appear on the blocked list because Norton Internet Security automatically rejects any connection attempts by restricted computers Guarding against intrusion attempts 123 Customize Intrusion Detection To restrict a blocked computer 1 Open Norton Internet Security 2 Inthe Security Center double click Intrusion Detection 3 Inthe list of computers that are currently blocked by AutoBlock select the computer to add to the Restricted Zone 4 Click Restrict When you are done restricting computers click OK 124 Guarding against intrusion attempts Customize Intrusion Detection Keeping your computer protected requires regular monitoring by Auto Protect Script Blocking and Worm Blocking scanning of your email attachments and files transferred by instant messenger and frequent system scans All of these tasks can be set to occur automatically For added protection in Norton AntiVirus on Windows 98 98SE Me enable Inoculation to alert you if a system file changes Ensure that protection settings are enabled Norton AntiVirus is configured to provide you with complete protection against viruses It is un
141. h and manipulate safe programs without your knowledge When Program Launch Monitoring is active you will be alerted whenever an unrecognized program launches another program You can then choose to allow or block Internet access for the unrecognized program Change the ports that your Web browser uses to download Web pages The default port for HTTP is port 80 but the HTTP port list contains several other commonly used ports Enable or disable your computer s ability to use IGMP Internet Group Membership Protocol IGMP is commonly used to send multimedia files to multicast groups Norton Internet Security basics 63 Customize Norton Internet Security Stealth ports Blocked and inactive ports do not respond to connection attempts Active ports do not respond to connection attempts with incorrect source or destination information Fragmented IP Choose whether Norton Internet Security blocks all IP packets packet that are broken into fragments or only the packets that appear to handling be part of an attack About Web Content options Web Content options let you control how Norton Internet Security handles interactive online content ads and possible privacy intrusions Web Content options are arranged on three tabs About Global Settings Global Settings let you control the default actions Norton Internet Security takes when Web sites attempt to get information about your browser or use animated images JavaScripts
142. he background or alerts you that there are updates available Your options are Norton Internet Security Personal Firewall Intrusion Detection Parental Control Web site list Spam Alert Improvements to operating system or hardware compatibility and fixes that address performance issues New firewall rules that increase and extend the Personal Firewall s ability to protect your computer Attack signatures that protect your computer from newly discovered Internet attacks Categorized lists of Web sites that have been visited since you installed Norton Internet Security Updated spam definitions that identify new types of unwanted email Norton AntiVirus includes a separate set of LiveUpdate options See About Internet options on page 67 About Firewall options Firewall options let you activate advanced protection features and customize the ports your computer uses to view Web pages Most people will not need to make any changes to these settings Your options are Turn on Program Component Monitoring Turn on Program Launch Monitoring HTTP ports Block IGMP When a program uses an external software component to connect to the Internet check firewall rules for each component This ensures that Trojan horses and other malicious programs cannot attach to safe programs and evade detection Program Launch Monitoring helps ensure that Trojan horses and other malicious programs cannot launc
143. ht of the first message click the arrow if it appears See Review 3 Double click an entry to open the Log Viewer detailed statistics on page 194 To move Alert Tracker Drag the half globe to the side of the screen on which you want it to appear 58 Norton Internet Security basics Work with Norton Internet Security To hide Alert Tracker from the system tray menu Inthe Windows system tray right click the Norton Internet Security icon then click Hide Alert Tracker If you hide Alert Tracker you will not be notified when your computer joins a network Information about the connection will still appear in the logs Check your computer s vulnerability to attack Use Security Check to test your computer s vulnerability to security intrusions The Security Check link in Norton Internet Security connects you to the Symantec Web site where you can scan for vulnerabilities and get detailed information about Security Check scans You must be connected to the Internet to check your computer s vulnerability To check your computer s vulnerability to attack 1 Open Norton Internet Security 2 Doone of the following In the Security Center click Security then click Check Security n the Security Monitor window on the Select a Task menu click Test Security On the Security Check Web page click Scan for Security Risks 4 To learn more about the Security Check tests click About Scan for Security Risks Whe
144. ick Exit If Norton AntiVirus cannot repair a file See Keeping current with LiveUpdate on page 81 One of the most common reasons that Norton AntiVirus cannot automatically repair or delete an infected file is that you do not have the most up to date virus protection Update your virus protection with LiveUpdate and scan again If that does not work read the information in the report window to identify the types of items that cannot be repaired and then take the appropriate action Infected files with exe doc dot or xls file name extensions any file can be infected Hard disk master boot record boot record or system files such as 10 SYS or MSDOS SYS and floppy disk boot record and system files Use the Repair Wizard to solve the problem See Use the Repair Wizard on page 134 Replace using the Rescue Disks or your operating system disks See About Rescue Disks on page 73 What to do if a virus is found 141 If your computer does not start properly If your computer does not start properly See About Rescue If you have a virus on your computer and need to start the computer from sige te te B an uninfected disk to remove the virus or if you need to restore a boot Emergency Disks record use your Rescue Disks If you do not have Rescue Disks you can use on page 30 your Emergency Disks to start the computer and remove the virus If you need to restore boot records and do not have
145. ide of the United States contact one of the service and support offices listed below or connect to http service symantec com and select your region under Global Service and Support Service and support offices North America Symantec Corporation http www symantec com 555 International Way Springfield OR 97477 U S A Australia and New Zealand Symantec Australia http www symantec com region reg_ap Level 2 1 Julius Avenue 61 2 8879 1000 North Ryde NSW 2113 Fax 61 2 8879 1001 Sydney Australia Europe Middle East and Africa Symantec Customer Service Center http www symantec com region reg_eu P O Box 5689 353 1 811 8032 Dublin 15 Ireland Latin America Symantec Brasil Portuguese Market Place Tower http www service symantec com br Av Dr Chucri Zaidan 920 Spanish 12 andar http www service symantec com mx Sao Paulo SP Brazil 55 11 5189 6300 CEP 04583 904 Mexico 52 55 5322 3681 Mexico DF Brasil SA 01 800 711 8443 Interior Argentina 54 11 5382 3802 Every effort has been made to ensure the accuracy of this information However the information contained herein is subject to change without notice Symantec Corporation reserves the right for such change without prior notice July 25 2002 236 Service and support solutions Worldwide service and support Glossary This glossary provides definitions of some common Internet terms active content ActiveX
146. ions log Enable file and printer sharing Microsoft networking provides file and printer sharing By default Norton Internet Security prevents any computers from accessing these services on a protected computer To share files and give access to printers on your local network you can enable file and printer sharing If you enable these features on your local network they are still protected from malicious users on the Internet Before enabling file and printer sharing on your local network ensure that each shared resource is protected by a secure password To learn more about securing shared resources consult the Help file on your Start menu To enable file and printer sharing 1 Open Norton Internet Security 2 Inthe Security Center double click Personal Firewall 3 Inthe Personal Firewall window on the Advanced tab click General Rules 4 Inthe General Rules window select the entry for Windows file sharing or printer sharing 5 Click Modify 6 Inthe Modify Rule dialog box on the Action tab click Permit Internet access Click OK 8 Inthe General Rules dialog box click OK 9 Inthe Advanced Firewall window click OK Controlling access to protected computers 91 Control how people use your computer Organize computers into network zones Norton Internet Security lets you organize computers on your home network and the Internet into Trusted and Restricted Zones Computers that you place in the Trusted Zone are no
147. itions run LiveUpdate current with LiveUpdate on page 81 144 What to do if a virus is found Look up viruses in Norton AntiVirus To look up virus names and definitions 1 2 3 Start Norton Internet Security In the Security Center click Norton AntiVirus gt Reports In the Reports pane on the Virus List line click View Report To get more information about a specific virus 1 In the Virus List dialog box select the virus about which you want more information Click Info When you are done viewing the list in the Virus List dialog box click Close If you have chosen to install the Accounts feature of Norton Internet Security you can create customized security settings for individual users This lets you customize Parental Control Spam Alert Ad Blocking and Privacy Control for each person who uses the computer About Norton Internet Security accounts See Set or change account Passwords on page 150 Your computer can host several accounts but all accounts fall within one of four access levels Child Cannot make any changes to Norton Internet Security protection Has limited access to Internet programs and Web site categories Teenager Cannot make any changes to Norton Internet Security protection Has access to more Internet programs and Web site categories than Child users Adult Can customize all Norton Internet Security options for own account Supervisor Can change all Nor
148. ity includes Program Control which helps you create firewall rules as you use the Internet Supervisor and Adult users can create and modify firewall rules Child and Teenager users cannot make any changes to firewall rules There are four ways to create firewall rules with Program Control Enable Automatic Program Control Use Program Scan Manually add programs Respond to alerts Automatically configures access for well known programs the first time that users run them This is the easiest way to set up firewall rules Finds and configures access for all Internet enabled programs on a computer at once Closely manage the list of programs that can access the Internet Norton Internet Security warns users when a program attempts to access the Internet for the first time Users can then allow or block Internet access for the program When Automatic Program Control is active Norton Internet Security can automatically configure Internet access settings for programs the first time that they run Automatic Program Control only configures Internet access for the versions of programs that Symantec has identified as safe If an unknown program or an unknown version of a known program attempts to access the Internet Norton Internet Security warns the user The user can then choose to allow or block Internet access for the program Symantec regularly updates the list of recognized programs You should run LiveUpdate r
149. ivate information eonna 228 Understanding cookies oo eeeeeesessseseeseceeesseseeseesesneseessnenesneneess 228 BIOCKING COOKIES nassau aisduanauntaniannunninuauntanven 229 Tracking Internet USE aaan eaaa aAa 229 Risks from Trojan horses and viruses seseris 230 The likelihood of being attacked oes eeeeseseseceeseseseesneeeeeeeenees 231 Service and support solutions Glossary Index CD Replacement Form If you have an emergency these procedures can help you find the solution to your problem Common problems include virus threats and intrusion attempts If you suspect that you have a virus If you have a virus on your computer and need to start the computer from an uninfected disk to remove the virus you can use the Norton Internet Security CD as an Emergency Disk to start the computer and remove the virus The DOS based Norton AntiVirus uses the virus definitions from the Norton Internet Security CD and is not as up to date as virus definitions obtained using LiveUpdate See I cannot start You might need to change your computer s BIOS Setup options to start from drive A on from the CD ROM drive page 210 To start from the Norton Internet Security CD and scan for viruses 1 Insert the Norton Internet Security CD into the CD ROM drive 2 Restart your computer The Emergency program scans your computer and removes viruses 18 Responding to emergencies If you think your compute r is under attack Respond to vi
150. ken and any alerts that have been triggered The logs include details about some of the activity reported in the Statistics window Monitoring Norton Internet Security 197 View Norton Internet Security Logs The logs are organized onto 14 tabs Details about any viruses or Trojan horses detected on your computer A history of all actions Norton AntiVirus has taken to protect your computer Information about any problems Norton AntiVirus encountered when scanning your computer for viruses Details about banner ads images Java applets and Activex controls blocked by Norton Internet Security A history of all TCP IP network connections made with this computer including the date and time of the connection the address of the computer to which you connected the service or port number used the amount of information transferred and the total time the connection was active Communication intercepted by the firewall including rules that were processed alerts displayed unused ports blocked and AutoBlock events Whether Intrusion Detection is active attack signatures being monitored and the number of intrusions blocked The cookies that have been blocked including the name of the cookie and the Web site that requested the cookie A history of all protected private information sent over the Internet The Internet programs newsgroups and Web sites blocked by Norton Internet Security Severe system errors the current status o
151. kies identify you so that options that you have chosen in the past are used for your current visit to the site If you frequent a site that remembers the stocks that you want to track for example it probably uses this kind of cookie Understanding Internet risks 229 Risks to your privacy Bad cookies In one of their malevolent forms cookies from one Web site might track your visits to a different Web site For example most of the ads that you see on Web sites do not come from the site that you are viewing but from sites that provide ads to many sites When the advertising site displays the ad it can access cookies on your computer This lets the advertising company track your Web usage over a range of sites and profile your browsing habits Blocking cookies Norton Internet Security can block all cookies or it can notify you of each cookie request If you block all cookies you lose functionality at many Web sites For example you might be blocked from making purchases at some Internet stores If you choose to be prompted each time that a Web site tries to create a cookie you can evaluate each request and block those that are not from the site that you are viewing Norton Internet Security can block or allow cookies from particular domains or Web sites Tracking Internet use Most browsers pass on information that you might want to keep confidential One item that your browser normally passes to Web sites is the URL of the page fr
152. king The Ad Trashcan lets you remove ads from Web pages and create new Ad Blocking rules 3 Inthe Ad Blocking window in the Ad Blocking settings for drop down list select the account that you want to change 4 Check or uncheck Turn on Ad Blocking Click OK 166 Blocking Internet advertisements Enable or disable Popup Window Blocking Enable or disable Popup Window Blocking Pop up and pop under ads are secondary windows that Web sites open when you visit or leave the sites Pop ups appear on top of the current window while pop unders appear behind the current window When Popup Window Blocking is active Norton Internet Security automatically blocks the programming code Web sites use to open secondary windows without your knowledge Sites that open secondary windows when you click a link or perform other actions are not affected To enable or disable Popup Window Blocking 1 Open Norton Internet Security 2 Double click Ad Blocking 3 Inthe Ad Blocking window in the Ad Blocking settings for drop down list select the account that you want to change 4 Check or uncheck Turn on Popup Window Blocking Click OK Enable or disable Flash blocking When Ad Blocking is active Norton Internet Security automatically blocks all Flash animations that have the same dimensions as common ads Norton Internet Security can also block all Flash content This is useful if you have a slow connection or are not interested in viewing Fla
153. l cgi Restrict programs that access the Internet Programs access the Internet for many reasons Your Web browser accesses the Internet to display Web pages LiveUpdate accesses the Internet to retrieve program and protection updates for Symantec products Microsoft NetMeeting accesses the Internet to let users conduct meetings over the Internet While most programs Internet access attempts are benign some Trojan horses and other programs may download malicious programming or upload personal information Parental Control lets you control how programs access the Internet Parental Control can block categories of Internet programs and limit how certain groups of Internet programs can be used O Program limitations are intended for use with Child and Teenager accounts Users with Adult accounts will be able to override program restrictions on a per program basis Block and permit categories of Internet programs Parental Control organizes Internet programs into categories By default Child users can access the Internet only with programs in the General Email Web Browsers and User categories The categories include General Programs that do not fall under any other category Chat Programs that let you engage in conversations with other users or communities online using text voice or video Examples include mIRC Pirch ICQ NetMeeting Internet Phone Net2Phone and CU SeeMe Restricting this category of programs does not blo
154. l the programs ability to access the Internet This overrides any settings made by Automatic Program Control To add a program to Program Control 1 Open Norton Internet Security 2 Inthe Security Center double click Personal Firewall 3 Inthe Personal Firewall window on the Program Control tab click Add 4 Select the program s executable file Executable file names typically end in exe Guarding against intrusion attempts 113 Customize firewall rules 5 Click Open 6 Inthe Internet Access Control alert select the access level you want this program to have Your options are Automatically Use the default Norton Internet Security settings for this configure program Internet access Recommended Permit Allow all access attempts by this program Block Deny all access attempts by this program Manually Create rules controlling how this program accesses the configure Internet Internet Access 7 Ifyou want to see any risks that this program could pose to your computer click Details 8 Click OK Change Program Control settings After using Norton Internet Security for a while you may find that you need to change access settings for certain programs Any changes override settings made by Automatic Program Control To change Program Control settings 1 Open Norton Internet Security 2 Inthe Security Center double click Personal Firewall 3 Inthe Personal Firewall window on the Program Control ta
155. lert HAYE BETTER SEX 8 1 2002 3 BAPE Offers Spam Alert You TOO Can Lose Weight 8 1 2002 3 BA Stacy webxhost co Spam Alert ADV ADLT Extreme Stuff Adults only please 8 1 2002 3 If you have installed the Accounts feature you can create custom Spam Alert settings for each user Supervisor and Adult users can customize Spam Alert settings Child and Teenager users cannot change any Spam Alert settings Privacy Control and SSL Some email servers use SSL Secure Sockets Layer connections to encrypt connections between your computer and the server Spam Alert cannot scan email received via SSL connections Enable or disable Spam Alert Enable or disable Spam Alert from the Security Center To enable or disable Spam Alert 1 Open Norton Internet Security 2 Double click Spam Alert 3 Inthe Spam Alert window in the Spam Alert settings for drop down list select the account that you want to change 4 Check or uncheck Turn On Spam Alert Blocking unwanted email 173 Create spam filters 5 Use the Spam Alert slider to control how aggressively Norton Internet Security filters spam Your options are High Maximum filtering Most spam is correctly identified More likely to identify personal email messages as spam Medium Moderate filtering More spam is correctly identified Likely recommended to identify some personal email messages as spam Low Light filtering Some spam is correctly identified Rarely identi
156. likely that you need to change any settings However for maximum protection you should ensure that your protection features are enabled Feature Where to set Maximum protection setting Auto Protect Security Center gt Auto Protect is set to On Norton AntiVirus gt Enable See About System options on page 65 Email scanning Options gt Norton Scan incoming Email and AntiVirus gt Email Scan outgoing Email are checked See About Internet options on page 67 If your email program uses one of the supported communications protocols both options are selected by default 126 Protecting disks files and data from viruses Manually scan disks folders and files Timeout protection Options gt Norton Protect against timeouts AntiVirus gt Email when scanning Email is See About Internet checked options on page 67 To prevent connection timeouts while receiving large attachments enable timeout protection Worm Blocking Options gt Norton AntiVirus gt Email See About Internet options on page 67 Enable Worm Blocking and Alert me when scanning email attachments are checked Inoculation Inoculate Boot Records is checked Options gt Norton AntiVirus gt Inoculation See About Other options on page 68 This table summarizes the maximum protection settings and where you can find them For specific information about an option
157. locking Internet access to chat software or other applications See Protect children with Parental Control on page 179 About Norton AntiVirus Norton AntiVirus provides comprehensive virus prevention detection and elimination software for your computer It finds and repairs infected files to keep your data safe and secure Easy updating of the virus definition service over the Internet keeps Norton AntiVirus prepared for the latest threats About Norton Internet Security 25 Norton Internet Security features See Use the User s The Norton AntiVirus User s Guide PDF Nav2003 pdf includes extensive heal on information about viruses and how they spread Norton AntiVirus consists of a memory resident program Auto Protect and a scanning feature that you can schedule or run manually Norton AntiVirus features include Virus definition Automatically updates your virus definitions service See Keeping current with LiveUpdate on page 81 Bloodhound Detects new and unknown viruses by analyzing an executable technology file s structure behavior and other attributes such as programming logic computer instructions and any data contained in the file See What to do if a virus is found on page 133 Script Blocking Detects Visual Basic and JavaScript based viruses without the need for specific virus definitions It monitors the scripts for virus like behavior and alerts you if it is found Se
158. look Open Microsoft Outlook 2 On the Tools menu click Message Rules gt Mail 3 Click New 4 Under Which type of rule do you want to create click Check messages when they arrive 5 Click Next 6 Under Which condition s do you want to check click with specific words in the subject Under Rule Description click specific words los In the Search Text dialog box type Spam Alert then click OK 9 Click Next 10 Under What do you want to do with the message check move it to the specified folder 11 Under Rule Description click specified 12 Inthe Move dialog box click the plus sign next to Local Folders to display your email folders 13 In the list of mailboxes choose your spam mailbox then click OK 14 Click Next 15 Under Please specify a name for this rule type a name for this rule 16 Make sure that Turn on this rule is checked If you already have messages marked with Spam Alert in your inbox check Run this rule now on messages already in Inbox to filter them 17 Click Finish Blocking unwanted email 175 Create spam filters To create spam filters for Netscape Messenger Open Netscape Messenger 2 Onthe Edit menu click Message Filters 3 Click New 4 Type a name for the filter 5 Inthe Contains text box type Spam Alert 6 On the then menu do one of the following To immediately delete spam messages click Delete To transfer emails marked spam into a special f
159. ls contact options and more You can also post a question to an online Technical Support representative PriorityCare telephone support This fee based in most areas telephone support is available to all registered customers Find the phone number for your product at the Service amp Support Web site You ll be led through the online options first and then to the telephone contact options Support for old and discontinued versions When Symantec announces that a product will no longer be marketed or sold telephone support is discontinued 60 days later Technical information may still be available through the Service amp Support Web site at http service symantec com Subscription policy If your Symantec product includes virus firewall or Web content protection you may be entitled to receive updates via LiveUpdate Subscription length varies by Symantec product After your initial subscription ends you must renew it before you can update your virus firewall or Web content protection Without these updates you will be vulnerable to attacks When you run LiveUpdate near the end of your subscription period you are prompted to subscribe for a nominal charge Simply follow the instructions on the screen Service and support solutions 235 Worldwide service and support Worldwide service and support Technical support and customer service solutions vary by country For Symantec and International Partner locations outs
160. mance after you install Norton Internet Security you may want to set protection to a lower level or disable those options that you do not need Option Description Auto Protect Script Blocking Manual Scan Determine if Auto Protect starts when you start your computer what it looks for while monitoring your computer and what to do when a virus is found Bloodhound is the scanning technology that protects against unknown viruses Use these options to set its level of sensitivity in Auto Protect Advanced options determine the activities to be monitored when scanning for virus like activities and when scanning floppy disks Exclusions specify the files that should not be scanned by file name extension or by specific file name Be careful not to exclude the types of files that are more likely to be infected by viruses such as files with macros or executable files Enable Script Blocking and set what Norton AntiVirus should do if it finds a malicious script If you are developing or debugging scripts disable Script Blocking Otherwise this feature might block the script you are developing Determine what gets scanned and what happens if a virus is found during a scan that you request Manual Scan options also include Bloodhound and Exclusions subcategories Norton Internet Security basics 67 Customize Norton AntiVirus About Internet options Internet options define what happens when your computer
161. may recognize normal activity as an attack If you can t communicate with computers that you should be able to communicate with they may be on the list of computers currently blocked by AutoBlock 122 Guarding against intrusion attempts Customize Intrusion Detection If a computer that you need to access appears on the list of computers currently blocked by AutoBlock unblock it If you have changed your protection settings and want to reset your AutoBlock list you can unblock all of the computers on the AutoBlock list at once To unblock computers currently blocked by AutoBlock 1 Open Norton Internet Security 2 Inthe Security Center double click Intrusion Detection 3 Inthe Intrusion Detection window do one of the following To unblock one computer select its IP address then click Unblock To unblock all computers on the AutoBlock list click Unblock All Exclude computers from AutoBlock If a computer you need to access is repeatedly placed in the AutoBlock list you can exclude it from being blocked by AutoBlock To exclude specific computers from AutoBlock 1 Open Norton Internet Security In the Security Center double click Intrusion Detection In the Intrusion Detection window click IP Address FW N Do one of the following n the Currently blocked list select a blocked IP address then click Exclude Click Add then type the computer s name IP address network identification or a ran
162. move an Ad Blocking string Blocking unwanted email How Spam Alert Works eeecsesssesssseeeeseesessenceeeneeeesseeeasenceseneeseneenes Privacy Control and SSL Enable or disable Spam Alert Create spar filters icccssscaaietiatsediasdaatcasiddiindiaisianttaeda ncaa CUSTOMIZE Spam ARTE eresi eriiic a AA Spam Alert Ups aenaran a E E E ENARA Protect children with Parental Control About Parental Gontrol teeseen e o a aa ee Enable or disable Parental Control Customize Parental Control e sesesseesseseressessesssresrssrerssrsreerseeresesresesses Restrict Web site ACCESS esseeseeseseesessesseseeresessierssrsrrsrserseseesesee Restrict programs that access the Internet Restrict NEWSgroup ACCESS ssisseeesseeesseessesstessteerteerresrressresseees Monitoring Norton Internet Security View the Status amp Settings WINdOW sssssssssssessssesssseessreessreeesreeesseses 192 View the Statistics WINGOW oio ecccseccccscsesssssssesesssessssesesesssssssseseseess 192 Reset information in the Statistics Window uu eee 193 Review detailed statistics o cccccccccsesesseseseessssesesessssssesesessseeseee Reset detailed statistics counters Set the statistics displayed in the Detailed Statistics WINGOW Tece ar a E den tbats stata bntv aa drancacnnealeatatents 195 Keep the Detailed Statistics window visible at all times 196 Contents 15 View Norton Internet Security Logs oo seeseeeeeeeeteeteeeneeeeeeeenees 19
163. ms Restrict newsgroup access Norton Internet Security blocks newsgroups based on text strings which are groups of letters found in the names of the newsgroups When users access newsgroups Parental Control compares the names of the newsgroups that they attempt to view with a list of text strings you create Parental Control then blocks or permits access to newsgroups containing those text strings When newsgroups are blocked newsreader programs will not include their names in the master list of available newsgroups that users can view If a user attempts to post a message in the newsgroup Norton Internet Security automatically blocks the post 188 Protect children with Parental Control Customize Parental Control See To block and permit categories of Internet programs on page 186 By default Child users cannot use newsreader programs To allow Child users to view newsgroups you must unblock the newsreaders programs category About newsgroup names amp Newsgroup names become more specific as you read from left to right For example the newsgroup alt history is a general discussion about historical events and people Within that group are more specific discussions For example alt history ocean liners is a more specific discussion about the history of ocean liners and alt history ocean liners titanic is an even more specific discussion about the Titanic You can use this structure to precisely identify blocke
164. n Internet Security In the Security Center double click Intrusion Detection In the Intrusion Detection window click IP Address FW N In the Exclusions dialog box select the IP address your ISP uses for port scans Your ISP can provide this information Click Exclude Click OK vi Why can t LiveUpdate get a list of updates The first time that you run LiveUpdate after installing Norton Internet Security an alert appears to help you create a rule that lets LiveUpdate access the Internet Child or Teenager users cannot create these rules Log on to an Adult or Supervisor account and run LiveUpdate This creates rules that let anyone run LiveUpdate How can a Web site get my browser information The Browser Privacy settings prevent your browser from sending browser information However some diagnostic sites on the Internet might report browser information even though the Browser Privacy settings are blocking it If you are blocking Java ActiveX or scripts the site might be using one of these methods to retrieve the information Sometimes when Web servers do not get the information from the browser they use the last piece of browser information that they received instead You might see the information from the last person who viewed the site Troubleshooting Norton Internet Security Troubleshoot Norton AntiVirus problems Troubleshoot Norton AntiVirus problems Here are some solutions to issues that might arise with
165. n horse is a program that does not replicate but damages or compromises the security of the computer Typically it relies on someone emailing it to you it does not email itself A Trojan horse may arrive disguised as useful software Some Trojan horses perform malicious actions on the computer on which they are run while others such as Back Orifice provide remote control capabilities for hackers A worm is a program that makes copies of itself for example from one disk drive to another or by sending itself through email It may do damage or compromise the security of the computer A worm can arrive as an attachment to an email that has a subject that tempts you to open it A zombie program is a dormant program secretly installed on a computer It can later be run remotely to aid in a collective attack on another computer Zombie programs don t normally damage the computer on which they reside but are used to attack other computers A zombie program can arrive as an email attachment Norton AntiVirus protects you from receiving and executing viruses Trojan horses worms and zombies Norton AntiVirus scans email as you receive it and also checks files when you open them providing two levels of protection Norton Internet Security ensures that Trojan horses do not communicate over the Internet This means that you are protected from hackers who use Trojan horses Understanding Internet risks 231 The likelihood of being attacked
166. n the form of packets Along with the data each packet includes a header that contains information about the sending computer the intended recipient how the data in the packet should be processed and the port that should receive the packet Ports are channels that divide the stream of information coming from the Internet into separate paths that are handled by individual programs When Internet programs run on a computer they listen to one or more ports and accept information sent to these ports Network attacks are designed to take advantage of weaknesses in specific Internet programs Attackers use tools that send packets containing malicious programming code to a particular port Ifa program that is vulnerable to this attack is listening to that port the code can let the attacker gain access to disable or even take control of the computer The programming code that is used to generate the attacks may be contained inside of a single packet or span several packets 102 Guarding against intrusion attempts How Norton Internet Security protects against network attacks How Norton Internet Security protects against network attacks Norton Internet Security includes three tools that protect your computer from intrusion attempts malicious Web content and Trojan horses Norton Personal Firewall Monitors all Internet communication and creates a shield that blocks or limits attempts to view information on your computer Intrusion De
167. n the scan is complete the results page lists all of the areas that were checked and your level of vulnerability in each one For any area marked as at risk you can get more details about the problem and how to fix it To get more information about an at risk area On the results page next to the scan name click Show Details o Identify the source of communications Visual Tracking helps you learn more about computers that attempt to connect to your computer Using Visual Tracking you can identify the location of the P address used and contact information for the owner of the address You can use this information to identify the origin of an attack and to learn more about intrusion attempts Norton Internet Security basics 59 Work with Norton Internet Security You can trace connection attempts from three places in Norton Internet Security Statistics Log Viewer AutoBlock To trace a connection attempt from Statistics 1 Open Norton Internet Security 2 Inthe Security Center click Statistics 3 Click Attacker Details Your browser opens the Visual Tracking Web page To trace a connection attempt from the Log Viewer 1 Open Norton Internet Security In the Security Center click Statistics Click View Logs FW N In the left column of the Log Viewer window under Internet Security click Connections 5 Inthe right column of the Log Viewer window select a connection you want to trace 6 At the bottom
168. nd scan your computer s hard disk for viruses If your computer cannot start from a CD you can create Emergency Disks The Norton AntiVirus emergency program uses the virus definitions from the Norton Internet Security CD and is not as up to date as virus definitions obtained using LiveUpdate After installing you should scan for viruses again Create Emergency Disks See If you need to use Emergency Disks on page 142 amp Emergency Disks are used to start your computer and scan for viruses in case of a problem If your computer can start from a CD you can use the orton Internet Security CD in place of Emergency Disks and do not need to create them If you cannot start your computer from a CD you can use these instructions to create Emergency Disks on another computer or go to http www symantec com techsupp ebd html and download the Emergency Disk program Follow the instructions included in the download to create the Emergency Disks You will need several formatted 1 44 MB disks Installing Norton Internet Security 31 Install Norton Internet Security To create Emergency Disks from the CD 1 Insert the Norton Internet Security CD into the CD ROM drive 2 Inthe Norton Internet Security CD window click Browse the CD 3 In Windows Explorer double click the Support folder 4 Double click the Edisk folder 5 Double click Ned exe 6 Inthe welcome window click OK 7 Label the first disk as instructed and in
169. nd virus removal tools To explore the Symantec service and support Web site 1 Point your browser to www symantec com techsupp 2 On the service and support Web page click Iam a home small business user 3 Onthe introduction Web page click the link for the information that you want If you cannot find what you are looking for using the links on the introduction page try searching the Web site 204 Troubleshooting Norton Internet Security Troubleshoot Norton Internet Security problems To search the Symantec service and support Web site 1 On the left side of any Web page in the Symantec Web site click search 2 Type a word or phrase that best represents the information for which you are looking Use the following guidelines when searching the Symantec Web site Type a single word in lowercase letters to find all occurrences of the word including partial matches For example type install to find articles that include the word install installation installing etc Type multiple words to find all occurrences of any of the words For example type virus definitions to find articles that include virus or definitions or both Type a phrase enclosed in quotation marks to find articles that include this exact phrase Use a plus sign in front of all of the search terms to retrieve documents containing all of the words For example Internet Security finds articles containing both words For an exact match
170. nection you must create both a monitor and a permit rule The monitor rule must precede the permit rule 3 Click Next 16 Guarding against intrusion attempts Customize firewall rules 4 Select the type of connection the rule should monitor Your options are Connections to other computers Connections from other computers Connections to and from other computers The rule applies to outbound connections from your computer to another computer The rule applies to inbound connections from another computer to your computer The rule applies to both inbound and outbound connections 5 Click Next 6 Select the computers the rule should monitor Your options are Any computer Only computers specified below Adapters The rule applies to all computers The rule applies only to the computers sites and domains listed The rule applies to a specific network adapter in your computer This allows you to customize firewall rules for each of your computer s IP addresses For example if your computer is connected to a home network and to the Internet you might want to set up a rule that permits file sharing on the home network while another rule blocks file sharing over the Internet 7 Click Next 8 Select the protocols the rule should monitor Your options are TCP UDP TCP and UDP ICMP The rule applies to TCP Transmission Control Protocol communications The rul
171. nection with the Web site By default Norton Internet Security lets any account use secure connections If you want to ensure that users are not sending private information to secure Web sites you can disable secure Web connections O If you disable secure Web connections your browser will not encrypt any information that it sends You should only disable secure Web connections if you are protecting your personal data in the Private Information list To disable or enable secure Web connections 1 Start Norton Internet Security 2 Double click Privacy Control 3 Inthe Privacy Control window in the Privacy Control settings for drop down list select the account that you want to change 4 Click Custom Level In the Customize Privacy Settings dialog box check or uncheck Enable Secure Connections https 6 Click OK 162 Protecting your privacy Customize Privacy Control Many Web sites are using more aggressive techniques to draw attention to the ads on their pages Some have begun using larger more prominent ads while others rely on ad windows that appear when you enter or leave the site Along with increasing the amount of time that it takes to display Web pages some ads contain offensive content cause software conflicts or use HTML tricks to open additional browser windows Ad Blocking helps avoid these problems When Ad Blocking is active Norton Internet Security transparently removes Ad banners Pop up and
172. net Security After installation Set up Program Control See Scan for Internet enabled programs on page 111 Norton Internet Security can scan your computer for Internet enabled programs and create access rules for them When the scan is complete you can use the results to determine which programs should have access to the Internet and if desired adjust their access rules To set up Program Control 1 Inthe Security Assistant Roadmap click Program Scan Security Assistant Program Scan Introduction Norton Internet Security can automatically configure itself to allow Home Networking y Internet access for common Internet programs Scanning for Internet programs now ensures that the programs you use regularly are protected and will reduce the number of alert messages you receive Program Scan Automatically scan programs Privacy Control Password Protection Parental Control Finish Installing Norton Internet Security 41 After installation 2 Inthe Program Scan pane click Automatically scan programs Wi Program Scan B Program Scan Program Scan identifies Internet enabled programs on your computer You can then quickly configure which programs Norton Internet Security will allow to access the Internet Choose the drives you want to scan Click Next to scan for Internet enabled programs 3 Inthe Program Scan window click Next to begin the scan When the scan is complete all Intern
173. ng The Help menu provides a comprehensive guide to all product features and tasks you can complete 76 Norton Internet Security basics For more information To access Help 1 At the top of the Security Center click Help Online Help table of 23 contents and index L Norton Antivirus Help Norton Internet Security Help Product Registration Symantec Help and Support Symantec Response Center Version system and More Symantec Solutions Norton AntiVirus Password reset information About Norton Internet Security Link to Symantec Web sites for more information 2 Onthe main Help menu click Norton Internet Security Help 3 Inthe left pane of the Help window select one of the following tabs Contents Displays the Help by topic Index Lists Help topics in alphabetical order by key word Search Opens a search field where you can enter a word or phrase Window and dialog box Help Window and dialog box Help provides information about the Norton Internet Security program This type of Help is context sensitive meaning that it provides help for the dialog box or window that you are currently using To access window or dialog box Help Do one of the following a Click the Tell Me More link if one is available In the dialog box click Help Readme file and Release Notes The Readme file contains information about installation and compatibility issues The R
174. ng a port scan Excessive network activity by unknown programs Recent virus alerts 192 Monitoring Norton Internet Security View the Status amp Settings window It is normal to see some denied access attempts on a random basis not all from the same IP address and not to a sequence of port numbers You may also see logged access attempts made due to activity on your own computer such as connecting to an FTP server and sending email messages If you see any of the above patterns it could be evidence of an attack or virus infection View the Status amp Settings window The Status amp Settings window provides a snapshot of your current protection You can quickly see which protection features are active identify any holes in your protection and customize Norton Internet Security To view the Status amp Settings window 1 Open Norton Internet Security 2 Inthe Security Center click Status amp Settings 3 Tochange any settings double click a protection feature View the Statistics window The Statistics window provides a snapshot of your computer s network activity since the last time you started Windows Use this information to identify ongoing attack attempts and review how your Privacy Control and Parental Control settings affect your protection The Statistics window includes information on Personal Any recent attacks on this computer including the time of the Firewall most recent attack and the addr
175. nges to Norton AntiVirus settings To protect your settings from unwanted changes set a password for Norton Internet Security and Norton AntiVirus options See Password protect options on page 68 To change settings for individual features 1 Open Norton Internet Security 2 Inthe Security Center do one of the following a Double click a feature you want to customize Select a feature then in the lower right corner of the window click Customize 3 Configure the feature 4 When you are done making changes click OK If you have installed accounts you can create customized settings for Privacy Control Ad Blocking Spam Alert Parental Control and the Personal Firewall security level Other settings apply to all accounts Norton Internet Security basics 53 Work with Norton Internet Security To change settings for individual accounts 1 Open Norton Internet Security 2 Inthe Security Center do one of the following Double click a feature you want to customize Select a feature then in the lower right corner of the window click Customize 3 Inthe features window in the Settings for drop down list select the account you want to configure 4 Configure the feature When you are done making changes click OK Use the Security Monitor The Security Monitor collects the most used Norton Internet Security tools into a compact window When you re online place the Security Monitor window in an unused part of
176. ntifies a potential attack Intrusion Detection alerts you and automatically blocks the connection that contained the attack See Guarding against intrusion attempts on page 101 Privacy Control gives you several levels of control over the kind of information that users can send via the Web email and instant messenger programs You can also control how Privacy Control reacts when Web sites attempt to set and use cookies or learn about your browser See Protecting your privacy on page 155 Ad Blocking speeds up your Web surfing by eliminating banner ads and other slow loading or intrusive content Norton Internet Security now also blocks ads made with Macromedia Flash and prevents sites from opening pop up or pop under ad windows See Blocking Internet advertisements on page 163 Spam unwanted sometimes offensive email is an increasing problem Spam Alert helps reduce the amount of unwanted email messages that you receive by intelligently filtering incoming messages and clearly marking potential spam This makes it easy to create filters for your email program that automatically remove spam before you see it See Blocking unwanted email on page 171 Parental Control helps keep inappropriate Internet content out of the home by letting parents control which Web sites and newsgroups that their children can visit Parents can also choose the types of Internet applications that children can access effectively b
177. o monitor these less important security events Alert Tracker displays the same information that appears in the Security Event field on the Security Monitor This allows you to monitor your computer s security without having to keep the Security Monitor visible at Norton Internet Security basics 57 Work with Norton Internet Security all times Alert Tracker also provides a quick way to remove ads from Web pages on Alert Tracker rests on the side of your screen BIAS 10 28AM If you choose to display Alert Tracker it attaches to either side of the screen on your primary monitor When a security event occurs Alert Tracker displays a message for a few seconds and then returns to the side of the screen If you miss an Alert Tracker message you can review a list of recent messages C LUCOMSERVER EXE is ACCESSING a Alert Tracker opens for a few the Internet seconds to display messages See Use the Ad Alert Tracker also contains the Ad Trashcan which is part of the Norton kena on Internet Security Ad Blocking feature To view or hide Alert Tracker 1 Open Norton Internet Security 2 Inthe Security Center click Options gt Internet Security 3 On the General tab do one of the following Check Show the Alert Tracker to view Alert Tracker Uncheck Show the Alert Tracker to hide Alert Tracker 4 Click OK To review recent Alert Tracker messages 1 On the Windows desktop double click the Alert Tracker 2 To the rig
178. o Protect does not load when I start my computer 210 I have scanned and removed a virus but it keeps INLE CUM MY MES aeiio nine a ea E 211 Norton AntiVirus cannot repair my infected files 0 212 I get an error when testing basic Rescue Disks e 212 I can t receive email MeSSAZES oes eeeeeseeneeeeeeeeeetestenenees 213 I can t send email messages linnon 214 Appendix B About the Internet How information is transmitted over the Internet 00 217 ADOUUW DP 4 asa eerdis A E E EEO EEEE About ICMP About IGMP 16 Contents Appendix C How Web information is located on the Internet 0 eee 219 REQUESUNE apate nsec cater tein seen Gna AEE 219 Understanding URLS 24 0 Saat sae eai tee 220 How ports identify programs on Servers eesseeeeeeeeeeteeeeeetenes 220 Well KNOWN ports oo eeceeeeeseceeseeeeseeseeeesesncsneneescstesesneneeeneesesneneees 221 How computers are identified on the Internet eee 222 Understanding Internet risks Risks from hacke esssvepstesenassanssoraat donate haa eanaiaiia daedaatialen 223 The process of a hacker attack oenina ASES 224 Risks from active CONtENt oinen raaa AA A NAA 226 Risks from inappropriate content and activities oe 227 Blocking site and newsgroup categories ssec 227 Restricting access to programs s ssessessssssessesresressessrssressesresre 227 Risks tO your privacy o eeeeeecesesccsesessesesesesseseeceseseseeeeseseeeeessesnsneeseseeeeees 228 Sending pr
179. o the Web filtering service the intrusion detection service and Spam Alert The Web filtering service updates provide the latest lists of Web site addresses and Web site categories that are used to identify inappropriate Web content The intrusion detection service updates provide the latest predefined firewall rules and updated lists of applications that access the Internet These lists are used to identify unauthorized access attempts to your computer Spam Alert updates provide the latest spam definitions and updated lists of spam email characteristics These lists are used to identify unsolicited email Norton Personal Users of Norton Personal Firewall receive intrusion Firewall detection service updates for the latest predefined firewall rules and updated lists of applications that access the Internet About your subscription See Subscription policy on page 234 Your Symantec product includes a complimentary limited time subscription to protection updates for the subscription services that are used by your product When the subscription is due to expire you are prompted to renew your subscription If you do not renew your subscription you can still use LiveUpdate to obtain program updates However you cannot obtain protection updates and will not be protected against newly discovered threats Keeping current with LiveUpdate 83 When you should update When you should update Run LiveUpdate as soon as
180. ock Traffic en Norton Internet Security ck Block Traffic This immediately stops all incoming and outgoing communication on page 60 with other computers If you are using the Security Monitor click Security Center 4 Inthe Security Center click Statistics Cli ck Attacker Details Your browser opens the Visual Tracking Web page Responding to emergencies 19 Recover from an emergency See Identify the 6 Use Visual Tracking to identify the IP address of the computer that the uo o attacker used communications on page 58 You can use this information to report the attack to the ISP that owns the IP address See Restrict a 7 Toblock all future connections from this IP address add this computer blocked computer h page ge to your Restricted Zone If you suspect that the attacker has already compromised your computer install Norton Internet Security then visit http security symantec com for tools to repair damage and eradicate any threats that the attacker may have placed on your computer Recover from an emergency Once you ve dealt with the problem you can install Norton Internet Security and perform the following activities Install Norton Norton Internet Security can keep your computer safe from Internet future attacks and virus emergencies Security See Installing Norton Internet Security on page 27 Update your After installing run LiveUpdate to ensure that you have the prote
181. older click Inbox then select the folder name 7 Click OK To create spam filters for Eudora Open Eudora On the Tools menu click Filters Click New Under Match check the following Incoming FWN Manual On the Header menu click Subject In the contains text box type Spam Alert Click the In button 5 6 7 Onthe Action menu click the first item then select Transfer to 8 9 On the Transfer menu click Trash 10 On the File menu click Save 176 Blocking unwanted email Customize Spam Alert Customize Spam Alert You can customize your protection by identifying email addresses and particular text strings that should and should not be filtered When Spam Alert encounters a message containing one of these addresses or text strings it will bypass its pattern matching engine and immediately categorize the message based on your settings This is an easy way to ensure that bulk newsletters and other messages from trusted senders do not get marked as spam Everyone using this computer shares a single customized Spam Alert list Supervisor and Adult users can make changes to this list Child and Teenager users cannot make any changes to Spam Alert settings To add a new Spam Alert entry 1 Open Norton Internet Security 2 Double click Spam Alert 3 Inthe Spam Alert window in the Spam Alert settings for drop down list select the account that you want to change 4 Inthe Spam Alert window click A
182. om which you came This information is used by some Web sites to help you navigate through the Web site but it can also be used to track your Web usage Norton Internet Security blocks this information Your browser also sends information about itself and the operating system that you are using While Norton Internet Security can block this information it is usually used by Web sites to provide Web pages that are appropriate for your browser A more sinister invasion of your privacy is found in programs that you install on your computer that without your knowledge report information back to Web sites Several programs that help you download and install files report your activities over the Internet Norton Internet Security protects your privacy by alerting you to these communications 230 Understanding Internet risks Risks from Trojan horses and viruses Risks from Trojan horses and viruses With so many computers connected by networks and the Internet viruses can spread more rapidly than they could in the days when files were transferred from computer to computer on disks Additionally the risk has broadened from viruses to Trojan horses worms and zombies A virus is a program or code that replicates by attaching itself to another program a boot sector a partition sector or a document that supports macros Many viruses just replicate but others do damage A virus can arrive in a document that you receive by email A Troja
183. ons 186 file extensions unusual 211 file scans 127 files reinfected after virus removal 211 firewall rules default 109 110 for FTP servers 98 processing order 108 109 removing 119 for Web servers 98 firewall See Norton Personal Firewall firewalls using LiveUpdate 83 firewalls Windows XP 29 Flash blocking enabling and disabling 166 Index floppy disk scans 127 floppy drives unable to boot from 210 folder scans 127 FTP applications 186 servers 98 full system scans 127 G games 186 glossary 75 237 H hackers 223 226 hard drive scans 127 Help 75 76 accessing 50 context sensitive 76 dialog box 76 menu 75 Home Networking 91 93 accessing from Security Monitor 54 configuration 39 zones 91 93 ICMP Internet Control Message Protocol 110 218 icon in notification area 49 IGMP Internet Group Membership Protocol 218 infected files cannot repair 212 emergency recovery procedures 17 reinfected 211 Inoculation alerts 138 options 68 responding to alerts 138 247 248 Index instant messenger 186 and Privacy Control 157 options 67 protecting private information 157 scanning transferred files 125 support and options 22 supported clients 29 Internet overview 215 222 risks 223 231 Internet Access Statistics contents 194 resetting 193 Internet Control Message Protocol ICMP 110 218 Internet Group Membership Protocol IGMP 218 Internet options 67 Internet enabled applications 112 Intrusion De
184. or private information and spam Your options are Tray icon Change the Norton Internet Security icon in the system tray to indicate email messages are being scanned Progress Display the amount of email messages scanned and an estimate indicator of the time remaining in this scan Norton Internet Security basics 65 Customize Norton AntiVirus Customize Norton AntiVirus The default settings for Norton AntiVirus provide complete virus protection for your computer However you may want to adjust them to optimize system performance or disable options that do not apply All the settings for Options are organized into three main categories The options contained under each category are as follows Internet Email Advanced Instant Messenger LiveUpdate This section does not describe how to change the individual options but gives a general description of what they do and how you can find them For specific information about a particular option check the online Help About System options The System options control scanning and monitoring of your computer You use System options to determine what gets scanned what the scan is looking for and what happens when a virus or virus like activity is encountered 66 Norton Internet Security basics Customize Norton AntiVirus With higher levels of protection there can be a slight trade off in computer performance If you notice a difference in your computer s perfor
185. ou about a change in system files amp See Ensure that protection settings are enabled on page 125 Inoculation protection is available on Windows 98 98SE Me systems only System files can change for a variety of reasons You may have updated your operating system or repartitioned your hard disk or you could have a virus Norton AntiVirus alerts you when a change occurs in your system files If you get an alert about a change in your system files you have two options You can update your Inoculation snapshot or repair the file Before you repair the file be sure your virus definitions are up to date and run a scan To respond to Inoculation changes Inthe Alert window select the action that you want to take Your options are Update the saved copy of Use if the alert appears after a legitimate change my Master Boot Record in system files Restore my Master Boot Use if you are certain the system did not change Record for legitimate reasons If you have files in Quarantine Once a file has been placed in Quarantine you have several options All actions that you take on files in Quarantine must be performed in the Quarantine window To open the Quarantine window 1 Start Norton Internet Security 2 Inthe Security Center click Norton AntiVirus gt Reports 3 What to do if a virus is found If you have files in Quarantine In the Reports pane on the Quarantined items line click View Report
186. ow on the File menu click Exit Controlling access to protected computers 97 Control how users access the Internet If the Bytes Processed counter stays at 0 then Norton Internet Security is probably not monitoring the port used by your proxy server You will have to determine which ports your proxy server is using for HTTP communications then configure Norton Internet Security to monitor those ports To determine which port to monitor for HTTP communication 1 Open Norton Internet Security Use your browser to connect to a Web site In the Security Center click Statistics In the Statistics window click View Logs uw FF WwW N On the Connections tab in the Remote column look at the information There should be a port number following the IP address of the site that you viewed with your browser This number is the port number that is used to access your proxy server for your Web connection 6 Record the port number To specify which ports to monitor for HTTP communication 1 Open Norton Internet Security 2 At the top of the Security Center window click Options gt Internet Security 3 On the Firewall tab under HTTP Port List do one of the following To add a port to the HTTP Port List click Add then type the number of the port that you want to monitor for HTTP communication To remove a port from the HTTP Port List select the port number in the HTTP Port List then click Remove 4 Click OK 9
187. own list select the account that you want to change Guarding against intrusion attempts 107 Customize firewall protection Click Custom Level Customize Security Settings xj Customize Security Settings Tell me more Personal Firewall High Block everything until you allow it bd Java Applet Security Medium Prompt me each time v ActiveX Control Security High Block ActiveX Controls fial M Enable Access Control Alerts M Alert when unused ports are accessed Do one or more of the following On the Personal Firewall menu select a level Your options are High Blocks all communication that you do not specifically allow You must create firewall rules for every program that requests Internet access Medium Blocks many ports that are used by harmful programs However it can also block useful programs when they use the same ports None Disables Norton Personal Firewall and allows all Internet communications On the Java Applet Security or ActiveX Control Security menu select a level Your options are High Blocks your browser from running any Java applets or ActiveX controls over the Internet This is the safest but most inconvenient option Some Web sites might not operate properly using this setting Medium Prompts you when Java applets and ActiveX controls are encountered This lets you temporarily or permanently allow or block each Java applet or ActiveX control that you
188. plimentary form You might also hear other terms for hackers including script kiddies wannabes and packet monkeys These are all terms for hackers in training who use programs written by more advanced hackers to attack computers on the Internet 224 Understanding Internet risks Risks from hackers The process of a hacker attack Most hacker attacks use the following process Information gathering The hacker gathers as much information about your computer as possible The hacker attempts to find vulnerabilities without letting you know that your computer is under attack Initial access The hacker exploits a vulnerability found during information gathering and establishes an entry point into your computer Privilege escalation The hacker gains access to more programs and services on your computer Covering tracks The hacker hides or removes evidence of the intrusion sometimes leaving an entry point open for return Information gathering The first step in information gathering is acquiring a target A hacker can choose a person or company to attack or search the Internet for an unprotected target that will be easy to hack The amount of information available about you on the Internet is directly related to your level of Web presence If you have a domain name and a Web site more information is publicly available than would be if you only had an email address If a hacker has chosen a specific target such as a compan
189. press mode LiveUpdate runs in either Interactive or Express mode In Interactive mode the default LiveUpdate downloads a list of updates available for your Symantec products that are supported by LiveUpdate technology You can then choose which product updates you want to install In Express mode LiveUpdate automatically installs all available updates for your Symantec products To set LiveUpdate to Interactive or Express mode 1 Open your Symantec product At the top of the window click LiveUpdate On the LiveUpdate welcome screen click Configure FWN On the General tab of the LiveUpdate Configuration dialog box select Interactive Mode or Express Mode 5 Ifyou selected Express Mode select how you want to start checking for updates To have the option of cancelling the update select I want to press the start button to run LiveUpdate To have any updates installed automatically whenever you start LiveUpdate select I want LiveUpdate to start automatically 6 Click OK Turn off Express mode Once you have set LiveUpdate to run in Express mode you can no longer access the LiveUpdate Configuration dialog box directly from LiveUpdate You must use the Symantec LiveUpdate control panel To turn off Express mode 1 On the Windows taskbar click Start gt Settings gt Control Panel 2 Inthe Control Panel window double click Symantec LiveUpdate 3 On the General tab of the LiveUpdate Configuration dialog box select
190. puter from malicious incoming traffic programs and Trojan horses The firewall automatically checks all data coming in or out of your computer against these rules How firewall rules are processed When a computer attempts to connect to your computer or when your computer attempts to connect to a computer on the Internet Norton Personal Firewall compares the type of connection with its list of firewall rules Firewall rules are processed in a set order based on their types System rules are processed first followed by program rules and then Trojan horse rules Guarding against intrusion attempts 109 Customize firewall rules Once a rule that blocks or permits communications is matched all remaining rules are ignored In other words additional rules that match this type of communication are ignored if they appear below the first rule that matches For example you may have a rule that blocks the use of Symantec pcAnywhere on your computer If you add a rule that permits the use of Symantec pcAnywhere with a specific computer and move the new rule higher in the list the new rule lets you use Symantec pcAnywhere with that specific computer but the older rule prevents its use with any other computer If no matching rule is found the communication is blocked Depending on the Reporting level an alert may appear About the default firewall rules A number of firewall rules are predefined and enabled when you install Norton Int
191. r on the Select a Task menu click Create User Accounts Parental Control Wizard Choose account manager Norton Internet Security lets parents create accounts containing personalized Internet security settings You can create accounts for individual users or group accounts containing settings for several users If you have multiple Windows accounts on this computer you can use the existing Windows accounts If you do not have multiple accounts you can create Norton Internet Security accounts for each user What would you like to do Use existing Windows accounts Recommended Create Norton Internet Security accounts Create accounts for multiple users 147 Create Norton Internet Security accounts In the Choose account manager screen click Create Norton Internet Security accounts Click Next a Create accounts Choose a name and an account type for each Norton Internet Security account you would like to create Ater school Teenager Z Kaes ite H Mom Supervisor Dad fAdut a O o There are four account types Child Limited access to Internet programs and content Cannot change settings T Access to more Internet programs and content than Child users Cannot eenager A change settings In the Create accounts screen type one or more account names On the account level menus select an appropriate account level for each account 148 Create accounts for multiple users Create Nor
192. r Statistics view Logs Norton Internet Security gt symantec 3 Inthe Statistics window click Clear Statistics 194 Monitoring Norton Internet Security Review detailed statistics Review detailed statistics Along with the overall statistics in the Statistics window Norton Internet Security maintains realtime network counters that track users Internet usage and any actions that Norton Internet Security takes The detailed statistics include the following information Network TCP and UDP bytes sent and received the number of open network connections and the highest number of simultaneous open network connections since the program started Web Graphics cookies and requests for browser information that have been blocked the number of bytes and packets that have been processed and the number of HTTP connections Web Graphics Estimated sizes of graphics that have been blocked and the time Banner Ads saved by not loading blocked graphics Blocked Firewall TCP The number of blocked and permitted TCP connections Connections Firewall UDP The number of blocked and permitted UDP connections Datagrams Firewall Rules All of the rules defined for your firewall and information on the number of communication attempts blocked permitted or not matched by firewall rules Network Information about current connections including the program Connections that is using the connection the protocol being
193. r new password If the account did not previously have a password the Old Password field is unavailable 6 Click OK Adult users can change passwords for Teenager and Child accounts Supervisors can change any other accounts passwords If you change an account password be sure to inform everyone who uses that account To set or change passwords for other users 1 Open Norton Internet Security 2 Inthe Security Center click Accounts 3 Inthe User Accounts screen select the account that you want to change 4 Click Properties In the Account Properties dialog box in the Password and Confirm Password text boxes type a new password 6 Click OK Assign Norton Internet Security account types to Windows accounts If you have created Windows accounts for multiple users you can use these accounts instead of creating new Norton Internet Security accounts If you use Windows accounts your Norton Internet Security account will use the same name as your Windows account To assign Norton Internet Security account types to Windows accounts 1 Open Norton Internet Security 2 Inthe Security Center click Accounts 152 Create accounts for multiple users Assign Norton Internet Security account types to Windows accounts 3 Inthe Accounts window click Parental Control Wizard Choose account manager Norton Internet Security lets parents create accounts containing personalized Internet security settings You can create accoun
194. rder and it may have to reassemble fragmented packets TCP requests retransmission of missing packets 217 218 About the Internet How information i About UDP About ICMP About IGMP s transmitted over the Internet TCP IP is often used to refer to a group of protocols used on the Internet including UDP User Datagram Protocol ICMP Internet Control Message Protocol and IGMP Internet Group Membership Protocol UDP User Datagram Protocol is used for functions in which the reliability of TCP is not necessary such as broadcasting video to multiple computers at once UDP doesn t provide error correction or retransmission of lost packets UDP is secondary in importance to TCP when you browse the Internet ICMP Internet Control Message Protocol packets contain error and control information They are used to announce network errors network congestion timeouts and to assist in troubleshooting Norton Internet Security normally allows inbound ICMP packets that provide you with information and are a minimal security risk You can create rules to block some or all ICMP packets IGMP Internet Group Membership Protocol is used to establish memberships in multicast groups collections of computers that receive simultaneous messages from a single computer Typically IGMP is used to broadcast video and other multimedia over the Internet Your computer reports to a nearby router that it wants to receive messages addressed
195. re to disconnect Most Internet programs can automatically connect without any input from the user so a malicious program could reconnect when you are away from the computer Block Traffic is meant to be used as a temporary measure while you address a security problem If you restart your computer Norton Internet Security automatically allows all incoming and outgoing communication To continue blocking traffic click the Block Traffic button in the Security Center or Security Monitor To avoid attack while fixing security problems 1 Open Norton Internet Security 2 Inthe Security Center or the Security Monitor window click Block Traffic Use Norton Internet Security tools to address the security problem 4 When you have fixed the problem click Allow Traffic Customize Norton Internet Security The default Norton Internet Security settings should provide adequate protection for most users If you need to make changes Supervisors and Adult users can use the Options menu to access Norton Internet Security and Norton AntiVirus options The options let you control more advanced settings If you are using Windows 2000 XP and you do not have Local Administrator access you cannot change Norton Internet Security options Norton Internet Security basics 61 Customize Norton Internet Security To customize Norton Internet Security 1 Open Norton Internet Security 2 At the top of the Security Center click Options gt Internet Securit
196. red the right to obtain Content Updates This license does not otherwise permit you to obtain and use Content Updates 3 SIXTY DAY MONEY BACK GUARANTEE If you are the original licensee of this copy of the Software and are dissatisfied with it for any reason you may return the complete product together with your receipt to Symantec or an authorized dealer postage prepaid for a full refund at any time during the sixty 60 day period following the delivery to you of the Software 4 LIMITED WARRANTY Symantec warrants that the media on which the Software is distributed will be free from defects for a period of sixty 60 days from the date of delivery of the Software to you Your sole remedy in the event of a breach of this warranty will be that Symantec will at its option replace any defective media returned to Symantec within the warranty period or refund the money you paid for the Software Symantec does not warrant that the Software will meet your requirements or that operation of the Software will be uninterrupted or that the Software will be error free THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL OTHER WARRANTIES WHETHER EXPRESS OR IMPLIED INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS YOU MAY HAVE OTHER RIGHTS WHICH VARY FROM STATE TO STATE AND COUNTRY TO COUNTRY 5 DIS
197. rental Control to block certain categories of Parental Web sites it may be blocking the site that you are attempting to Control view When Parental Control blocks a site it always displays a message telling you that the site is blocked See Restrict Web site access on page 181 It could be Ad Blocking Sometimes blocking advertisements on the Internet prevents an entire Web site from appearing in your browser See Blocking Internet advertisements on page 163 Some Web sites use Macromedia Flash to create interactive front pages If you are blocking Flash nothing appears on these sites It could be Flash blocking See Enable or disable Flash blocking on page 166 205 206 Troubleshooting Norton Internet Security Troubleshoot Norton Internet Security problems Why can t post information online See Identify private information to protect on page 155 If you are unable to post information to a Web site it may be because Privacy Control is blocking the information Check the Private Information list in the Privacy window to see if the information that you are trying to enter is being blocked Why did an email message sent never arrive If you choose to block an email message containing private information Norton Internet Security immediately deletes the email message Your email program will indicate that the message was sent but the recipient will not receive it If
198. ristics If the message contains many characteristics of spam it is more likely to be spam than a message that contains few spam characteristics Based on this analysis Spam Alert estimates the likelihood that the message is spam After this initial scan Norton Internet Security uses the settings you ve chosen in the Spam Alert page to determine which messages are marked as spam If Spam Alert is set to Low messages must contain many spam characteristics before they are flagged as spam If Spam Alert is set to High messages that contain only a few spam characteristics will be flagged 172 Blocking unwanted email Enable or disable Spam Alert Legitimate messages Spam messages When a message is identified as spam Norton Internet Security appends Spam Alert to the beginning of the message s subject You can then use your email program to create filters for all email containing this text 1 From Subject Received A OpinionJournal wsj OpinionJournal com Newsletter 5 13 2002 5 14 2002 LBA SETI Web SETI home news 6 17 2002 A PrizeDomain Spam Alert FREE Digital Cell Phone Limited Time Only 8 1 2002 3 BA Save Money Spam Alert Save Money and Lower Your Payments 8 1 2002 3 M1 Christina A Spam Alert What a man wants 8 1 2002 3 A Urgent Spam Alert 33584 Unclaimed Funds Notification 8 1 2002 3 MPassionUp com Spam Alert Printer Cartridges Save up to 80 Inkje 8 1 2002 3 M4 Julie Spam A
199. rive of a compromised computer to avoid identification Risks from active content ActiveX controls and Java applets are called active content because they can do more than display text or graphics Most active content is safe Common uses of active content are popup menus and up to date stock quotes Both ActiveX and Java are supposed to be safe to run in your browser ActiveX uses a system of digital certificates that lets you decide if you want an ActiveX control to run Digital certificates appear as dialog boxes that ask if you want to install and run a control that appears when you are browsing the Web There are several problems with using digital certificates Some controls do not have certificates and some certificates provide very little information about what the control does Understanding Internet risks 227 Risks from inappropriate content and activities The Java sandbox was designed to prevent Java applets from accessing information outside of the browser and doing anything that might harm your computer However hackers continually find ways to get around Java safeguards and use Java features in ways not conceived of by its developers Norton Internet Security monitors active content and can block all active content or warn you whenever active content is encountered Norton AntiVirus Auto Protect detects malicious ActiveX controls and Java applets and prevents them from running Norton Personal Firewall monitors active
200. rk activity Run LiveUpdate regularly to ensure that your list of attack signatures is up to date Visual Tracking locates attackers See Identify the source of communications on page 58 Norton Internet Security now includes Visual Tracking which lets you get information about the IP address used for a particular connection This can help you identify the source of an attack Ensure that Norton Personal Firewall and Intrusion Detection are enabled Norton Personal Firewall and Intrusion Detection are automatically enabled when you install Norton Internet Security It is unlikely that you need to change any settings However you can ensure that the firewall and Intrusion Detection are working by following these steps To ensure that Norton Personal Firewall is enabled 1 Open Norton Internet Security 2 Inthe Security Center double click Personal Firewall 3 Check Turn on Personal Firewall to activate Norton Personal Firewall To ensure that Intrusion Detection is enabled 1 Open Norton Internet Security 2 Inthe Security Center double click Intrusion Detection 3 Check Turn on Intrusion Detection to activate Intrusion Detection Guarding against intrusion attempts Customize firewall protection Customize firewall protection The default Norton Personal Firewall settings should provide adequate protection for most users If the default protection is not appropriate you can customize Norton Personal Firewall prot
201. rmat in order to save space on your disk A method of data exchange that allows a reliable transfer of data between two computers The data transfer that requests the opening of a connection A small data file that some Web sites place on your hard disk while you re viewing a Web page Web servers can use cookies to store your personal information and preferences so that you don t need to reenter them each time that you visit A person who cracks code not necessarily for malicious reasons Sometimes used to refer to a malicious hacker A TCP IP protocol that automatically assigns a temporary IP address to each device on a network A hierarchical naming system that translates domain names such as www symantec com into IP addresses such as 206 204 212 71 A computer that keeps a database of domain names and their corresponding IP addresses When a computer sends a domain name toa DNS server the server returns the IP address for that domain The common address for a single company or organization such as symantec com on the Internet which might have multiple hosts To transfer data from one computer to another usually over a modem or network Usually refers to the act of transferring a file from the Internet a bulletin board system or an online service to one s own computer Glossary 239 A method of exchanging messages and files with other people via computer networks A popular protocol for sending
202. rnet Security 10 Inthe Run LiveUpdate after installation window select whether you want to run LiveUpdate after the installation is done 11 Click Next jie Norton Internet Security Setup Set the destination folder Choose where you want to install Norton Internet Security 12 Click Browse to select a folder into which you want to install Norton Internet Security if it is other than the default location 13 Click Next Installing Norton Internet Security 35 Install Norton Internet Security See Register your 14 Click Next to begin installing Norton Internet Security a an After Norton Internet Security is installed the Registration Wizard appears orton Internet Security Setup Readme Information about Norton Internet Security features Installation Notes Read Me August 7 2002 Pre Release PLEASE READ THIS DOCUMENT CAREFULLY it contains important installation information about Norton Internet Security Note that the release notes may refer to features that are not in the product you have installed as it covers three products with different features Additional notes may be found in the Start Menu Programs Norton Internet Security Product Support Release Notes 15 Read the readme text then click Next 16 Click Finish to complete the installation If the opening screen does not appear Sometimes a computer s CD ROM drive does not automatically run a CD To start the install
203. rton Internet Security accounts Each Norton Internet Security account can have personalized settings for Parental Control See Protect children with Parental Control on page 179 Privacy Control See Protecting your privacy on page 155 Ad Blocking See Blocking Internet advertisements on page 163 Spam Alert See Blocking unwanted email on page 171 Every time that you browse the Internet computers and Web sites collect information about you Some of this information comes from forms that you fill out and choices that you make Other information comes from your browser which automatically provides information about the Web page you last visited and the type of computer that you re using Malicious users can also collect personal information without your knowledge Any time that you send information over the Internet the data must pass through a number of computers before it reaches its destination During transmission it s possible for third parties to intercept this information Computers include some basic security features but they might not be enough to protect your personal information Privacy Control helps protect your privacy by giving you several levels of control over cookies and other information that your browser sends to Web sites Privacy Control can ensure that users don t send private information such as credit card numbers over the Internet unless they are encrypted or you sp
204. rus threats See What to do if If you h a virus is found on page 133 ave already installed Norton Internet Security and Norton AntiVirus finds a virus on your computer there are three possible resolutions a Repair the file This action removes the virus from the file See If you have a Quarantine the file eanta This action makes the file inaccessible by any programs other than Quarantine on page 138 No v De m rton AntiVirus You cannot accidentally open the file and spread the rus but you can still evaluate it for possible submission to Symantec ete the file Thi s action removes the virus from your computer by deleting the file that contains the virus Use this action only if the file cannot be repaired or quarantined If you think your computer is under attack If your computer is behaving unpredictably and you have determined that the behavior is not due to a virus or a corrupted file you may be the victim of an In ternet attack If you suspect that someone is attacking your computer immediately disconnect your computer from the Internet If you have not yet installed Norton Internet Security install it now If you have installed Norton Internet Security you can use its security tools to block the attack investigate the attacker and prevent this type of attack in the future To block and investigate an attack 1 Op See Stop Internet 2 Cli communication with Bl
205. rvisor can make changes to any other account You should choose a password that is difficult to guess 4 Click Next LI xi Choose account manager Norton Internet Security lets parents create accounts containing personalized Internet security settings You can create accounts for individual users or group accounts containing settings for several users If you have multiple Windows accounts on this computer you can use the existing Windows accounts If you do not have multiple accounts you can create Norton Internet Security accounts for each user What would you like to do C Use existing Windows accounts Recommended Create Norton Internet Security accounts lt Back Next gt I Close See Create 5 Inthe Choose account manager window do one of the following accounts for AR i ae multiple users on To use existing Windows accounts click Use existing Windows page 145 accounts Recommended To create new Norton Internet Security accounts click Create Norton Internet Security accounts 6 Click Next 7 Follow the on screen instructions to set up new accounts If you have Norton SystemWorks installed If you have Norton SystemWorks installed on your computer when you install Norton Internet Security the installer adds a Norton Internet Security tab to the Norton SystemWorks main window and a Norton SystemWorks tab to the Security Center To open Norton Internet
206. s or any folders or files on your computer You may have been working with floppy disks or have received a compressed file in an email message and suspect a virus You can scan just a particular disk or individual element that you want to check To scan individual elements 1 Start Norton Internet Security In the Security Center click Norton AntiVirus gt Scan for Viruses In the Scan for Viruses pane select the scan that you want to run FWN Under Actions click Scan If you choose to scan all removable drives or a floppy disk the scan starts automatically If you choose to scan drives folders or files a dialog box appears in which you choose which drives folders or files to scan 5 Inthe dialog box click Scan after making your selection When the scan is complete a scan summary appears 6 When you are done reviewing the summary click Finished 128 Protecting disks files and data from viruses Create and use custom scans If problems are found during a scan See If a virus is found during a scan on page 134 At the end of a scan a summary report appears to tell you what Norton AntiVirus found during the scan If a virus was found and you have requested that Norton AntiVirus repair the file automatically it is listed as repaired If the file cannot be repaired it can be quarantined or deleted Create and use custom scans See Schedule a custom scan on page 130 You can create a custom s
207. s by category run LiveUpdate to ensure that the current with i f Web si i LiveUpdate list of Web sites is up to date page 81 b sites by category ge 81 To block Web si i 1 Start Norton Internet Security 2 Double click Parental Control 3 Inthe Parental Control window in the Parental Control settings for drop down list select the account that you want to change 4 Click Sites 182 Protect children with Parental Control Customize Parental Control 5 Inthe Specify Sites window click Specify blocked sites Sites xi Sites This account can visit Tellme more categories of sites that Norton Internet Security lets parents choose the Web sites that children are not checked in the can visit Choose the Web site categories you want to block or permit for Web site categories to this user Click Add to block specific sites for all users block list Specify permitted sites Specify blocked sites Web site categories to block Select the Web site T Adult Humor categories to block IE icohol Tob V Anonymous Proxies M Crime xi Create an exception to Exceptions 23 exceptions to allow this user to view specific sites in Exceptions ed categories permit access to a site without disabling the Additional sites to block for all users entire category Add additional Web sites that you want to block 6 Under Web site categories to block check the categories that you want to block for this a
208. s how you can resolve problems and advises you on avoiding future security problems About Norton Internet Security 23 Norton Internet Security features About Norton Personal Firewall Norton Internet Security includes Norton Personal Firewall which provides a barrier between your computer and the Internet A firewall prevents unauthorized users from accessing private computers and networks connected to the Internet Attackers can t see your computer behind the firewall Internet Norton Personal Firewall allows communications that you initiate Norton Personal Firewall blocks access attempts from the Internet Firewall Home computer The Norton Personal Firewall component of Norton Internet Security includes features that prevent unauthorized access to your computer when you are on the Internet detect possible Internet attacks protect your personal information block Internet advertisements to speed your Internet browsing help eliminate unwanted email messages in your inbox and protect family members from inappropriate online content 24 About Norton Internet Security Norton Internet Security features Norton Internet Security features include Intrusion Detection Privacy Control Ad Blocking Spam Alert Parental Control Intrusion Detection helps keep your computer safe from Internet attacks by scanning each piece of information that enters and exits your computer If it ide
209. s on the Internet A disk location established by Norton AntiVirus to isolate files suspected to contain a virus so that the files can t be opened or executed A device on a network that links computers or interconnected networks A router receives packets and forwards them to their destination via the best available route The control computer on a local area network that controls software access to workstations printers and other parts of the network Glossary 243 Protocols that let one computer access a type of data stored on another computer Many host computers that are connected to the Internet offer services For example HTTP servers use the Hypertext Transfer Protocol to provide World Wide Web service and FTP servers offer File Transfer Protocol services See also port An identifier for a particular service on a particular computer A socket consists of the IP address of the computer followed by a colon and the port number Giving the impression of not existing by not responding to requests for information A local area network that is part of a larger intranet or the Internet The standard family of protocols for communicating with Internet devices A circumstance event or person with the potential to cause harm to a system in the form of destruction disclosure modification of data and or denial of service A predetermined period of time during which a given task must be completed If the timeout
210. same for all computers within the subnet while the 0 indicates a part of the IP address that is different Subnet masks are always used in conjunction with base IP addresses The base IP address is an IP address that when processed using the subnet mask can indicate all of the IP addresses in a subnet A typical base IP address subnet pair looks like this Base IP address 10 0 0 1 Subnet mask 255 255 255 0 In this example the range of IP addresses that the base IP address and subnet mask identify range from 10 0 0 1 to 10 0 0 255 The most common subnet mask used is 255 255 255 0 because it identifies a relatively small group of IP addresses up to 254 computers It is commonly used for very small groups of computers including groups as small as two computers Norton Internet Security protects you from major risks that are associated with the Internet These risks include the threat of network attack malicious code in active content exposure to inappropriate content exposure of private information and getting viruses from infected files Risks from hackers Originally hackers were people who could solve computer problems and write complex computer programs quickly However the meaning of the term has changed to mean those who use their computer knowledge for illicit purposes Since hacker started out as a complimentary term some people use the word cracker for the derogatory form In this text hacker is used in its noncom
211. sert it into drive A 8 Click Yes 9 Repeat steps 7 and 8 for the subsequent disks 10 When the procedure is complete click OK 11 Remove the final disk from drive A and store the Emergency Disk set in a safe place Install Norton Internet Security Install Norton Internet Security from the Norton Internet Security CD Install a copy of Norton Internet Security on each computer that you want to protect To install Norton Internet Security 1 Insert the Norton Internet Security CD into the CD ROM drive See Iftheopening 2 Inthe Norton Internet Security CD window click Install Norton screen does not apei on Internet Security l page 35 If your computer is not set to automatically run a CD you must manually open it The first installation window reminds you to close all other Windows programs 32 Installing Norton Internet Security Install Norton Internet Security 3 6 Click Next ie Norton Internet Security Setup License Agreement You must accept the license below before you install Norton Internet Security SYMANTEC SOFTWARE LICENSE AGREEMENT IMPORTANT PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE USING THE SOFTWARE SYMANTEC CORPORATION AND OR ITS SUBSIDIARIES SYMANTEC IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THE INDIVIDUAL THE COMPANY OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE REFERENCED BELOW AS YOU OR YOUR ONLY ON THE COND
212. sh animations You can choose to have Norton Internet Security block all Flash animations or only block them on certain Web sites Changing the Flash blocking settings affects all users on this computer To enable or disable Flash blocking 1 Open Norton Internet Security 2 Inthe Security Center click Options gt Internet Security 3 Onthe Web Content tab click the Global Settings tab Blocking Internet advertisements 167 Use the Ad Trashcan 4 Inthe list of Web sites do one of the following To change Flash settings for all sites click Defaults To change Flash settings for a site in the list click the site s name To change Flash settings for a site not in the list click Add Site then in the New Site Domain dialog box type the site s address 5 Inthe Flash animation section select one of the following a Block Permit 6 Click OK O Some Web sites use Flash to create navigation toolbars Blocking Flash may make these sites unusable Use the Ad Trashcan As you use the Internet you may find ads that are not included on the default Norton Internet Security Ad Blocking list You can use the Ad Trashcan to add these to your personal list of blocked ads To use the Ad Trashcan 1 Open your Web browser and view the page containing the advertisement that you want to block 2 Open Norton Internet Security In the Security Center double click Ad Blocking 4 Inthe Ad Blocking window ensur
213. sk menu select Setup Home Networking Network Wizard E Home Network Wizard Norton Internet Security can automatically customize your protection so that you can share files and printers with other computers on your network To configure your network settings Home Network Wizard examines how you have configured your network adapters Network adapters include Ethernet cards modems and other connectivity devices Click Next to begin To organize computers into zones with the Home Network Wizard 1 2 3 4 In the Home Network Wizard click Next In the resulting list check the network adapters that you want Norton Internet Security to configure automatically and add to your Trusted Zone Click Next Click Finish to close the wizard To manually add computers to zones 1 2 3 Open Norton Internet Security In the Security Center double click Personal Firewall In the Personal Firewall window on the Home Networking tab select the zone to which you want to add a computer Click Add See Identify computers to Norton Internet Security on page 93 Controlling access to protected computers Control how people use your computer 5 Inthe Specify Computers window identify the computer 6 When you have finished adding computers click OK To remove computers from zones 1 Open Norton Internet Security In the Security Center double click Personal Firewall Select the computer that you want to
214. sk space 60 MB if you do not install Parental Control Internet Explorer 5 01 or later 5 5 recommended CD ROM or DVD ROM drive Supported email clients Norton Internet Security can scan email messages for private information spam and viruses in any POP3 compatible email client including Microsoft Outlook Express 4 0 5 X Microsoft Outlook 97 98 2000 XP Netscape Messenger 4 X Netscape Mail 6 0 Eudora Light 3 0 Eudora Pro 4 0 Eudora 5 0 Installing Norton Internet Security 29 Before installation Email scanning does not support the following email clients MAP clients AOL clients POP3s that use SSL Secure Sockets Layer Web based email such as Hotmail and Yahoo Lotus Notes mail Supported instant messenger clients AOL Instant Messenger version 4 3 or later MSN Instant Messenger version 3 6 or later Windows Messenger version 4 0 or later Before installation Before you install Norton Internet Security prepare your computer If your computer cannot start from a CD create Emergency Disks Prepare your computer See Ifyou needto If you have an older version of Norton Internet Security or Norton ihn erage AntiVirus the new version prompts you to remove the older version If you on page 46 have a recent version of Norton Internet Security you can transfer your existing settings to the new version of the program You must also uninstall any antivirus programs that are
215. sk space reduce the size Changing the size of a log file clears all of the information in that log To change the size of a log 1 Open Norton Internet Security 2 Inthe Security Center main window click Statistics 3 Inthe Statistics window click View Logs 4 Inthe Log Viewer right click a log then click Change Log File Size The Log File Size dialog box displays the Log s current file size 5 Inthe Log File Size dialog box select a new file size 6 Click OK Monitoring Norton Internet Security 201 Print or save logs and statistics Adjust the width of a column You can change the width of the columns in the Log Viewer To adjust the width of a column 1 Open Norton Internet Security In the Security Center main window click Statistics In the Statistics window click View Logs FWN In the Log Viewer on the tab that you want to view point to the boundary line on the right side of the column heading The cursor changes from a pointer to a resize tool 5 Drag the boundary line to the desired width Print or save logs and statistics As you access the Internet older information in the logs and statistics is overwritten with newer data To preserve older Internet usage information or to include this information in word processing or other documents print or export the logs and statistics To print log information 1 Open Norton Internet Security In the Security Center main window click Statistics In th
216. sonal Firewall Norton Internet Security scans the computer for programs that it recognizes and suggests appropriate settings for each program You can scan for Internet enabled programs from the Security Center or the Security Monitor n2 Guarding against intrusion attempts Customize firewall rules Manually adda See Customize firewall protection on page 105 To scan for Internet enabled programs from the Security Center 1 Open Norton Internet Security 2 Inthe Security Center double click Personal Firewall 3 Inthe Personal Firewall window on the Program Control tab click Program Scan 4 Select the disk or disks on your computer that you want to scan Click OK 6 Inthe Program Scan window do one of the following Check programs that you want to add to the Program Control list To add all Internet enabled programs at once click Check All 7 Click Finish 8 Click OK To scan for Internet enabled programs from the Security Monitor 1 Open Norton Internet Security 2 Inthe Security Monitor on the Select a Task menu click Program Scan Select the disk or disks on your computer that you want to scan 4 Click OK In the Program Scan window do one of the following Check programs that you want to add to the Program Control list To add all Internet enabled programs at once click Check All 6 Click Finish program to Program Control Users can add programs to Program Control to strictly contro
217. t SSL Secure Sockets Layer and Privacy Control 156 and Spam Alert 172 starting Norton AntiVirus from the CD ROM drive 142 your computer from a floppy disk 141 startup Auto Protect failure to load 211 changing floppy disk drive settings 210 floppy disk drive fails 210 Rescue Disks absent 209 Rescue Disks fail 209 scanning files at 68 statistics 194 196 detailed 194 exporting information from 201 202 Norton Internet Security 191 202 printing 201 202 resetting 193 resetting detailed statistics counters 195 viewing 192 statistics window 192 Status amp Settings checking 192 stealth ports 225 submitting files to Symantec 140 Web sites to Symantec 185 subnet masks 95 222 252 Index subscriptions 82 Symantec Security Response newsletter 80 Symantec service and support Web site 203 Symantec Web site 78 143 downloading product updates 84 system requirements 27 tray icon 49 T TCP IP 217 218 Technical Support 233 Technical Support Web site 78 testing Rescue Disks 74 threats security 18 viruses 18 Trashcan See Ad Trashcan Trojan horse programs 102 110 230 troubleshooting 203 214 ActiveX and Java 205 Ad Blocking 205 browser information 208 cable modem connections 207 Cookie Blocking 205 firewall rules 205 Internet applications 206 Internet connections 206 LiveUpdate 208 networks 207 Norton Internet Security 204 208 printing 207 Web sites 204 205 tutorials 79 U UDP User Datagram Pro
218. t then click Remove When you are done creating the list of items to be scanned click Next Protecting disks files and data from viruses 129 Create and use custom scans 10 Type a name for the scan by which you can identify it in the list of scans 11 Click Finish Run a custom scan When you run a custom scan you do not have to redefine what you want to scan To run a custom scan 1 Start Norton Internet Security In the Security Center click Norton AntiVirus gt Scan for Viruses In the Scan for Viruses pane select the custom scan FWN Under Actions click Scan When the scan is complete a scan summary appears 5 When you are done reviewing the summary click Finished Delete a custom scan You can delete custom scans if they are no longer needed To delete a custom scan 1 Start Norton Internet Security 2 Inthe Security Center click Norton AntiVirus gt Scan for Viruses 3 Inthe Scan for Viruses pane select the scan that you want to delete O If you click the button next to the scan name the scan runs 4 Under Actions click Delete Click Yes to verify that you want to delete the scan 130 Protecting disks files and data from viruses Schedule scans Schedule scans amp After installation Norton AntiVirus automatically runs a weekly full system scan You can also set up a custom virus scan schedule You can schedule customized virus scans that run unattended on specific dates
219. t Norton AntiVirus to fix All files are checked by default This is the recommended action 2 Click Fix If any files cannot be fixed or deleted the Quarantine window opens All files are checked to be added to the Quarantine by default This is the recommended action 3 Inthe Quarantine window uncheck any files that you do not want to quarantine 4 Click Quarantine If any files could not be quarantined the Delete pane opens What to do if a virus is found 135 If a virus is found by Auto Protect If you do not delete the infected files the virus remains on your computer and can cause damage or be transmitted to others 5 Uncheck any files that you do not want to delete 6 Click Delete Once all of the files have been repaired quarantined or deleted the Summary pane of the scanner window opens 7 When you are done reviewing the summary click Finished O After repairing a boot virus on your hard drive restart your computer If a virus is found by Auto Protect Auto Protect scans files for viruses and other malicious threats when you perform an action with them such as moving them copying them or opening them If it detects a virus or virus like activity in most cases you receive an alert telling you that a virus was found and repaired How you proceed depends on the operating system that you are using If you are using Windows 98 98SE Me If a virus or threat is found and repaired by Auto Protect in Windows 98
220. t one of the following a Technical Support Web site Takes you to the Technical Support page of the Symantec Web site from which you can search for solutions to specific problems update your virus protection and read the latest information about antivirus technology Visit the Symantec Web site Takes you to the home page of the Symantec Web site from which you can get product information on every Symantec product Norton Internet Security basics 79 For more information The Reports page of Norton AntiVirus contains a link to the Symantec online virus encyclopedia as does the Windows Explorer toolbar To access the Symantec Web site from the Reports page 1 Inthe Security Center click Norton AntiVirus 2 Click Reports 3 On the Reports page next to the Online Virus Encyclopedia heading click View Report To access the Symantec Web site from Windows Explorer 1 Open Windows Explorer 2 On the toolbar on the Norton Internet Security menu click View Virus Encyclopedia This option connects you to the Symantec Security Response Web page from which you can search for information on all types of viruses You can always access the Symantec Web site through your Internet browser To access the Symantec Web site in your browser Type the Symantec Web site address www symantec com Explore online tutorials Symantec provides online tutorials that you can use to review many common tasks that Norton Internet Security p
221. t regulated by Norton Internet Security They have as much access to your computer as they would have if Norton Internet Security was not installed Only use the Trusted Zone for computers on your home network with which you need to share files and printers If a computer in your Trusted Zone is attacked and an attacker takes control of it it poses a risk to your computer and all other computers in your Trusted Zone Computers that you place in the Restricted Zone are prevented from accessing your computer at all If a computer is in the Restricted Zone all communication from it is automatically blocked If you have more than one computer in your home you will likely want to add all of these computers to your Trusted Zone Only add external computers to your Trusted Zone if you know that their users can be trusted and they have firewall software installed The Home Network Wizard is the fastest way to organize computers into zones You can also manually add individual computers to zones To open the Home Network Wizard from the Security Center 1 Open Norton Internet Security 2 Inthe Security Center double click Personal Firewall 3 Inthe Personal Firewall window on the Home Networking tab click Wizard 92 Controlling access to protected computers Control how people use your computer To open the Home Network Wizard from the Security Monitor 1 2 Open Norton Internet Security In the Security Monitor on the Select a Ta
222. t to change Move the slider to the Security Level that you want Your options are High Medium recommended Minimal The firewall blocks everything until you allow it If you have run a Program Scan you should not be interrupted frequently with Program Control alerts See Enable Automatic Program Control on page 110 You are alerted each time that an ActiveX control or Java applet is encountered Unused ports do not respond to connection attempts giving them a stealth appearance The firewall blocks everything until you allow it If you have run a Program Scan you should not be interrupted frequently with Program Control alerts ActiveX controls and Java applets run without warning Unused ports do not respond to connection attempts giving them a stealth appearance Firewall blocks connection attempts by Trojan horse programs ActiveX controls and Java applets run without warning Change individual security settings If the Security Level options do not meet your needs you can change the settings for Norton Personal Firewall Java and ActiveX protection levels Changing an individual setting overrides the Security Level but it does not change the other security settings in that level To change individual security settings 1 2 3 Open Norton Internet Security In the Security Center double click Personal Firewall In the Personal Firewall window in the Choose a security level for drop d
223. tal Control settings Protect children with Parental Control 181 Customize Parental Control Customize Parental Control The default settings for Parental Control should provide complete protection for most users If you need to adjust Parental Control settings you can add or remove categories to or from the Norton Internet Security list of blocked Web sites newsgroups and Internet programs You can also exclude specific sites and newsgroups from blocking and create a list of permitted Web sites and newsgroups There are separate procedures for blocking Web sites programs and newsgroups Restrict Web site access There are two ways to restrict Web site access Block Web sites by category Specify which categories of sites users can and cannot access You can also add or remove specific sites to or from the list of blocked sites ina category Use this option to restrict users from visiting specific types of Web sites but to allow everything else Create a list of Web sites that can be visited Specify the Web sites that all users can visit Use this option to strictly control users Internet activities as all Web sites not on the list are blocked regardless of users account types Block Web sites by category Norton Internet Security includes an extensive list of categorized Web sites You can select which categories of sites are appropriate for each account on your computer See Keeping Before blocking Web site
224. tection Analyzes all incoming and outgoing information for data patterns typical of an attack Visual Tracking Identifies the computer responsible for the attack Norton Personal Firewall monitors communications See Customize firewall protection on page 105 When Norton Personal Firewall is active it monitors communications among your computer and other computers on the Internet It also protects your computer from such common security problems as Improper connection attempts Trojan horses Security and privacy incursions by malicious Web content Port scans Intrusions Warns you of any connection attempts from other computers and attempts by programs on your computer to connect to other computers Notifies you when your computer encounters destructive programs that are disguised as something useful Monitors all Java applets and ActiveX controls and lets you choose whether to run or block the program Cloaks inactive ports on your computer and detects port scans Detects and blocks malicious traffic and attempts by outside users to attack your computer You can control the level of protection that Norton Personal Firewall provides by using the Security Level slider You can also control how Norton Personal Firewall reacts to improper connection attempts Trojan horses and malicious Web content Guarding against intrusion attempts 103 How Norton Internet Security protects against network att
225. tection 101 122 about 24 103 104 configuring 120 enabling and disabling 104 Intrusion Detection service 82 IP addresses 93 219 and subnet mask pair 222 finding 93 J Java applets 205 226 JavaScripts 25 L LiveUpdate accessing 50 accessing from Security Monitor 54 options 61 troubleshooting 208 LiveUpdate options 67 localhost 109 220 Log Viewer changing log sizes 200 clearing events 199 200 contents 196 198 disabling 199 exporting information from 201 202 printing 201 202 refreshing 199 using 198 logs accessing from Security Monitor 54 adjusting the Alerting Level 55 changing size 200 clearing events 199 200 contents 196 198 disabling 199 exporting information from 201 202 Norton Internet Security 191 202 printing 201 202 refreshing 199 viewing 198 oopback connections 109 M Microsoft Outlook Express creating spam filters 173 Microsoft Outlook creating spam filters 174 Miscellaneous options 68 multiple schedules fora scan 131 NetBIOS 109 making name visible 207 Netscape Messenger creating spam filters 175 network troubleshooting 207 networks using LiveUpdate 83 new features Norton AntiVirus 22 Norton Internet Security 21 newsgroups exceptions 190 names 188 189 readers 186 Index 249 newsletters 80 operating systems 27 Norton AntiVirus multiple 209 about 24 Options accessing from Windows Explorer 51 accessing 61 Auto Protect 25 Auto Protect 66 Bloodhound technology 25
226. tempts to send private information while allowing Web sites to customize their pages using your browser information Change the Private Information setting Change the Private Information setting to control how Norton Internet Security handles attempts to send information on the Private Information list over the Internet To change the Private Information setting 1 Start Norton Internet Security 2 Double click Privacy Control 3 In the Privacy Control window in the Privacy Control settings for drop down list select the account that you want to change 4 Click Custom Level Select the Private Information setting that you want Your options are High Blocks all private information Medium Alerts you each time that you attempt to send private information to a nonsecure Web site or through an instant messenger program None Does not block private information 6 Click OK 160 Protecting your privacy Customize Privacy Control Change the Cookie Blocking setting Many Web sites store information they collect in cookies placed on your hard disk When you return to a site that has set a cookie on your computer the Web server opens and reads the cookie Most cookies are harmless Sites use them to personalize Web pages remember choices that you have made on the site and deliver optimized pages for your computer However sites can also use cookies to track your Internet usage and browsing habits Change the Cookie
227. ternet Security 120 Guarding against intrusion attempts Customize Intrusion Detection Customize Intrusion Detection The default Intrusion Detection settings should provide adequate protection for most users You can customize Intrusion Detection by excluding specific network activity from monitoring enabling or disabling AutoBlock and restricting blocked computers Exclude specific network activity from being monitored In some cases benign network activity may appear similar to a Norton Internet Security attack signature If you receive repeated warnings about possible attacks and you know that these attacks are being triggered by safe behavior you can create an exclusion for the attack signature that matches the benign activity Each exclusion that you create leaves your computer vulnerable to attacks Be very selective when excluding attacks Only exclude behavior that is always benign To exclude attack signatures from being monitored 1 Open Norton Internet Security 2 Inthe Security Center double click Intrusion Detection 3 Inthe Intrusion Detection window click Signatures Intrusion Detection Signature Exclusions i xj Signature Exclusions Tell me more Exclude signatures that Intrusion Detection should not monitor Signatures Excluded Signatures JaIz FTPD Buffer Overflca jAltaVista Traversal JAscend Reboot Sequence Exile BAT Execution Via HTTP Bonk Boink lt lt clnclude
228. the protection provided by the router In some cases you might want to reduce the protection provided by the router so that you can use programs like NetMeeting or Microsoft Messenger Norton Internet Security also provides features that might not be available with cable and DSL routers such as privacy protection If multiple computers share a single Internet connection Norton Internet Security works with most Internet connection sharing programs To protect your network from many outside attacks install Norton Internet Security on the gateway computer For maximum protection against Trojan horses or other problem programs that initiate outbound connections install Norton Internet Security on all computers that share the connection If your ISP uses a proxy server Norton Internet Security works with most proxy servers However you might have to change some settings to maintain full protection To determine whether Norton Internet Security works with your proxy server 1 Open Norton Internet Security 2 Inthe Security Center click Statistics 3 Inthe Statistics window click Detailed Statistics 4 Under Web look at the Bytes Processed counter 5 Use your browser to connect to a Web site The Bytes Processed counter in the Detailed Statistics window should increase as you access Web pages This indicates that Norton Internet Security is correctly configured to work with your proxy server 6 Toclose the Detailed Statistics wind
229. the Internet for the first time Personal Firewall actions alerts rule activity In the Log Viewer select the log that you want to review 4 When you are done click another log or click OK to close the Log Viewer Monitoring Norton Internet Security 199 View Norton Internet Security Logs Refresh the logs The logs automatically refresh when you move from log to log To view network events occurring since you began viewing the Log Viewer you can manually refresh all the logs or an individual log To refresh all logs at once 1 Inthe Log Viewer select one of the following Norton Internet Security Norton AntiVirus 2 Click Refresh all Categories To refresh an individual log In the Log Viewer right click the log that you want to refresh then click Refresh Category Disable logging You can choose the types of information Norton Internet Security tracks in the logs By default Norton Internet Security tracks events in every category You can disable individual logs if you do not need the information they contain To disable logging 1 Open Norton Internet Security In the Security Center main window click Statistics In the Statistics window click View Logs FUN In the Log Viewer right click the log that you want to disable then click Disable Logging Clear the logs If you actively use the Internet or if other computers frequently connect to your computer your log files may includ
230. the Personal Firewall window on the Advanced tab click Trojan Horse Rules Follow the on screen instructions See Write a firewall rule on page 115 Guarding against intrusion attempts 115 Customize firewall rules To add a Program Rule 1 Open Norton Internet Security 2 Inthe Security Center double click Personal Firewall 3 Inthe Personal Firewall window on the Program Control tab in the list of programs click Add 4 Inthe Select a program window select a program s executable file Executable file names typically end in exe 5 Inthe Internet Access Control alert on the What do you want to do menu select Create a firewall rule 6 Follow the on screen instructions See Write a firewall rule on page 115 Write a firewall rule Norton Internet Security leads you through the process of writing your own firewall rules To write a firewall rule 1 Inthe General Rules Trojan Horse Rules or Program Rules window click Add 2 Inthe Add Rule window select the action that you want for this rule Your options are Permit Internet Allows communication of this type to take place Access Block Internet Prevents communication of this type from taking place Access Monitor Internet Updates the Firewall tab in the Event Log or shows a Access message each time that communication of this type takes place This lets you monitor how often this firewall rule is used amp d To monitor a permitted con
231. the Web server In fact most pages require multiple connections since each graphic as well as many other page elements requires its own connection Once a page is loaded all of the connections are dropped The process starts over for each page on the site though your browser does remember the site s IP address Some newer Web sites use HTTP 1 1 Hypertext Transfer Protocol version 1 1 to establish a single connection that can pass multiple files and stay open for multiple pages 220 About the Internet How ports identify programs on servers Understanding URLs A typical URL looks like this http www symantec com securitycheck index html Because you might want to block some parts of a domain while allowing other parts of the same domain you should understand the parts that comprise a URL http The program protocol used to make the connection The most common protocol for browsing the Web is HTTP Hypertext Transfer Protocol Your browser assumes that this is the program protocol if you don t enter one Other commonly used protocols include FTP File Transfer Protocol and gopher com The root or top level domain There are several familiar root domains including com net edu org mil and gov There are also two letter root domains for most countries such as ca for Canada and uk for the United Kingdom symantec com The domain This is the domain with which the browser establishes a connection A dom
232. tive content 226 from Trojan horses 230 from viruses 230 from zombie programs 103 from hackers 223 226 from inappropriate content 227 to privacy 228 229 running custom scans 129 S safe mode 210 scan summary 134 scanning automatic 130 entire computer 127 files at startup 68 for Internet enabled applications 110 from a boot disk 141 individual elements 127 port 102 225 scheduling custom scans 130 virus scans 130 Script Blocking 25 monitoring by 125 options 66 virus found by 137 secure Web connections disabling and enabling 161 security attacks 101 122 224 226 231 levels 105 119 Security Assistant 39 45 Home Networking pane 39 Parental Control pane 44 Password Protection pane 43 Privacy Control pane 42 Program Control pane 40 using after installation 38 Security Check 58 Security Level changing 105 changing individual settings 106 resetting 108 Security Monitor 53 54 Security Response Web page 79 serial number 38 Service and Support 233 setting options 65 settings Norton Internet Security 60 Norton Personal Firewall 105 119 Program Control 113 settings categories 65 Index setup program changing boot drive sequence 210 sockets 220 Spam Alert 171 177 about 171 add new entry 176 and SSL 172 creating filters 173 175 Eudora 175 Microsoft Outlook 174 Microsoft Outlook Express 173 Netscape Messenger 175 customize 176 177 enable and disable 172 modify entry 177 tips 177 spam See Spam Aler
233. tocol 218 Uniform Resource Locator URL 94 220 222 uninstalling Norton AntiVirus 46 Norton Internet Security 46 other antivirus programs 29 previous copies of Norton Internet Security 29 with files in Quarantine 46 updating from Symantec Web site 84 Rescue Disks 74 virus protection 84 URL Uniform Resource Locator 94 220 222 User Datagram Protocol UDP 218 User s Guide PDF 77 opening 78 V virtual private network VPN 99 virus definitions 25 service 25 descriptions 25 emergency recovery procedures 17 responding to threats 18 risks 230 virus alert options 135 virus definitions alternate sources 84 virus encyclopedia 79 Virus List 143 virus protection alerts 68 system scans 127 virus repair in Windows 2000 XP 136 in Windows 98 98SE Me 135 viruses ound by Auto Protect 135 ound during a scan 134 ooking up in Norton AntiVirus Professonal Edition 143 submitting to Symantec 140 viewing descriptions 143 Visual Basic scripts 25 Visual Tracking 58 59 trace attack from AutoBlock 59 from Log Viewer 59 from Statistics 59 VPN virtual private network 99 wW Web servers 98 sites blocking 181 185 submitting to Symantec 185 Web filtering service 82 Web sites Symantec 84 troubleshooting 204 205 Windows Explorer menu 51 operating systems 27 safe mode 210 tray icon 72 wireless connections protecting 89 Wizard Home Networking 39 Parental Control 146 149 Registration 36 38 Worm Blocking
234. tomize firewall Protection souscricioun 105 Change the Security Level Slider oo eceeseeeseeseeeeseeeeseeneees 105 Change individual security settings 0 eeeseesseseetereeeeenees 106 Reset security settings to defaults oe eeeseeeeeeseeeeseeneees 108 Customize firewall rules ariera ei E How firewall rules are processed About the default firewall rules wee ceeeceseseeeeeeseeeeseenesteneees Create new firewall tules sanancorinciacre ninii ein Manually add a firewall rule oo ee eeeeeeeseeeeseeseeeeseeeseesesneneees Change an existing firewall rule Reset firewall rules to the default settings ose 119 Customize Intrusion Detection oo ceeeeseseesseeeeeeeeeeeeeseeeeseeneeeeees 120 Exclude specific network activity from being monitored 120 Enable or disable AUtOBIOCK occ ceeeesesseeeeseeeeseeeeseeeesneneeseees Unblock COMpPUtETS aesan ai aT A E RR Exclude computers from AutoBlock Restrict a blocked compute aenean oiio ias Protecting disks files and data from viruses Ensure that protection settings are enabled s es 125 Manually scan disks folders and files eceeecseeeeeeeteeeeteteees Perform a full system scan wee eeseseeseseseseeesteseeeseeseseeceeseseeeees Scan individual elements oo eeccssssesesesessssescseseeseeeeees If problems are found during a scan Create and use custom scans Run a custom scan Delete a CUSTOM scan o eeeccccecscscseesesssscssesesssssscseesssesssseeseseees SGHEAUIE SCANS taint scythe T olka te deceive
235. ton Internet Security account to access the Internet You can configure accounts to control each person s Internet usage When you start Norton Internet Security it uses the settings from the account that you designated as the startup account To use a different account you must log off of the current account and log on to another account If you are not sure which account is active you can check the active account To find out which account is active Open Norton Internet Security The active account is listed in the middle of the Security Center If you want to use a different account than the one that is currently active you must log off of the current account then log on with the account that you want to use To log on to another account 1 Inthe Windows system tray click the Norton Internet Security icon On the system tray menu click Log Off Click Yes to confirm that you want to log off In the Windows system tray click the Norton Internet Security icon On the Windows system tray menu click Account Login In the Log On dialog box select the account that you want to use Type the password if required Click OK on nw F WN As soon as you change an account Norton Internet Security begins using the settings associated with that account The Accounts window shows the account that is currently active 153 154 Create accounts for multiple users Customize Norton Internet Security accounts Customize No
236. ton Internet Security automatically logs on to the account that is designated as the startup account The startup account should be the account with the most restrictions This ensures that everyone uses the most protected settings unless they know how to change to a different account When you install Norton Internet Security it creates a Supervisor account and designates it as the startup account To ensure that users do not make unwanted changes to Norton Internet Security settings you should create a Restricted account and set it as the default startup account To set an account as the startup account 1 Open Norton Internet Security 2 Inthe Security Center click User Accounts 3 Inthe User Accounts screen select the user account that you want to make the startup account 4 Click Properties In the Account Properties dialog box check Make this the startup account 6 Click OK Set or change account passwords For maximum security you should protect each account with a password This ensures that only approved users can access the Internet and your network To set or change your own password 1 Open Norton Internet Security 2 Inthe Security Center click Accounts Create accounts for multiple users 151 Assign Norton Internet Security account types to Windows accounts In the User Accounts screen select your account 4 Click Change Password In the Change Password dialog box type your old password then type you
237. ton Internet Security accounts See Set or change account passwords on page 150 7 8 Click Next Choose passwords Setting password for account 1 of 4 new accounts Name School Type Child Password p Confirm Password p Tip Do not use common words or easily guessed terms as passwords In the Choose passwords screen in the Password and Confirm Password text boxes type a password for this user Click Next If you have created more than one account repeat the previous two steps with each account Set startup account Norton Internet Security automatically logs on to the startup account every time you restart x For maximum protection the startup account should be a Child account This ensures that everyone uses the most protected settings unless they know how to change to a different account Click an account below to make it the default Supervisor zi See Set the 10 startup account on page 150 11 12 Create accounts for multiple users Create Norton Internet Security accounts In the Set startup account screen choose the account that Norton Internet Security automatically logs on to when you restart the computer Click Next Click Finish To create Norton Internet Security accounts with the User Accounts screen 1 Open Norton Internet Security 2 Inthe Security Center click User Accounts Norton Internet Sec
238. ton Internet Security options for all users There is also a default account Not Logged In that blocks all Internet access When a user logs off the settings for Not Logged In become active and stay active until another user logs on When you install Norton Internet Security the program creates a default account with Supervisor privileges This account is not password protected For maximum security you should create a password for this account 146 Create accounts for multiple users Create Norton Internet Security accounts If more than one person uses a computer you can create separate accounts for each user or you can establish group accounts that all users requiring the same level of access or restriction can use Create Norton Internet Security accounts Supervisor and Adult users can create new accounts and customize settings for other users They can also create new user accounts with the Security Assistant Adult users can customize their own accounts but cannot change other users accounts Teenager and Child users can only change their passwords You can create several accounts at once with the Parental Control Wizard or one by one using the User Accounts screen To create Norton Internet Security accounts with the Parental Control Wizard 1 Open Norton Internet Security 2 Doone of the following n the Security Center click User Accounts then click Parental Control Wizard n the Security Monito
239. trol 3 Inthe Parental Control window on the Settings For menu select the account that you want to change 4 Click Newsgroups In the Specify Newsgroups window select the action that you want to take Your options are Specify Identify text strings to permit permitted newsgroups Specify blocked Identify text strings to block newsgroups Newsgroups Newsgroups Tell me more Norton Internet Security lets parents choose the newsgroups that children can view To block or permit categories of newsgroups for all users click Add and type a word that appears in the newsgroups names Specify permitted newsgroups Specify blocked newsgroups Newsgroups to block for all users These text strings are blocked or permitted COMp news warez drugs fetish Create an exception to permit Add additional access toa text strings that specific you want to newsgroup block or permit 6 Click Add 7 Type a text string to block or permit 8 Click OK 190 Protect children with Parental Control Customize Parental Control Create exceptions to blocked newsgroups If you create a list of blocked sites you may find that a newsgroup that your users need to access is also blocked Parental Control lets you create exceptions that give access to specific blocked newsgroups For example you can block access to all comp security newsgroups while still allowing access to comp security firewalls To create exc
240. ts for individual users or group accounts containing settings for several users If you have multiple Windows accounts on this computer you can use the existing Windows accounts If you do not have multiple accounts you can create Norton Internet Security accounts for each user What would you like to do Use existing Windows accounts Recommended Create Norton Internet Security accounts 4 Inthe Choose account manager screen click Use existing Windows accounts Recommended 5 Click Next In the Choose account level screen all of your currently defined Windows accounts are listed Choose account level There are 2 Windows accounts on this computer Choose an account type for each account Administrator Supervisor x After School Supervisor There are four account types Child Limited access to Internet programs and content Cannot change settings Access to more Internet programs and content than Child users Cannot Teenager change settings Adult Can change settings for their own account Supervisor Can change settings for any user Create accounts for multiple users Log on to Norton Internet Security 6 For each account select an account type 7 Click Next 8 Click Finish to close the Parental Control Wizard Log on to Norton Internet Security See About Norton Internet Security accounts on page 145 If you chose to install the Accounts feature users must log on to a Nor
241. ttings or monitor its activities To access Norton Internet Security Do one of the following On the Windows taskbar click Start gt Programs gt Norton Internet Security gt Norton Internet Security On the Windows XP taskbar click Start gt More Programs gt Norton Internet Security gt Norton Internet Security 50 Norton Internet Security basics Access Norton Internet Security On the Windows desktop double click Norton Internet Security Norton Internet Security Norton Internet Security Status amp Settings 4 Alerting Level Statistics Subscription Services User Accounts Norton Antivirus System Status OK s On tem Details Personal Firewall On The pps merged in red need your Intrusion Detection On a Please select an item Norton Antivirus On by clicking on the item at left in order to z E 7 get more information Settings for Supervisor a and take the Privacy Control On neceasery action Ad Blocking On Spam Alert On Parental Control On SS symantec Norton internet Security Access Norton Internet Security from the system tray Norton Internet Security adds an icon to the Windows system tray On most computers the system tray is at the far right of the Windows taskbar at the bottom of your screen Click this icon to open a menu containing frequently used Norton Internet Security tools To
242. ultiple routes from one point to another If one part of the Internet has too much traffic or is damaged information is rerouted About the Internet How information is transmitted over the Internet How information is transmitted over the Internet Sending computer All information sent over the Internet is communicated using a protocol called TCP IP Because all of the computers on the Internet understand this protocol each one can communicate with every other computer on the Internet TCP and IP are separate parts of this protocol The Internet is a packet switching network Every communication is broken into packets by TCP Transmission Control Protocol Each packet contains the addresses of the sending and receiving computers along with the information to be communicated IP Internet Protocol is responsible for routing the packets to their destinations Each packet may take a different route across the Internet and packets may be broken up into fragments Packets travel across the Internet moving from one router to another Routers look at the destination address and forward the packet to the next router IP does not guarantee the delivery of every packet Receiving a d gt computer fe oe B i Gg Qe gt be Routes that a packet or fragments of a packet may take On the destination computer TCP joins the packets into the complete communication TCP may have to reorder the packets if they are received out of o
243. urity User Accounts Status amp Settings Parental Control Wizard Tell me more Customize Internet access for each individual in your Alerting Level household Shows which STS You are logged on as Supervisor account is 7 logged on Subscription Services Log Off Change Password User Accounts User Accounts 4 Name Teenager d dull Shows the ena Child Startup Account accounts that you have set up Give the account a name that describes how it will be used Protect the account with a password that helps prevent others from using the account Supervisor L is Supervisor Create Account Delete Account JI Properties Nortoninternet Security 9 symantec In the User Accounts screen click Create Account Create Account x Create Account Tell me more Account Name c Password fe ee Confirm Password Account Type Child cannot modify own settings Passwords are case sensitive I Make this the startup account 149 150 Create accounts for multiple users Create Norton Internet Security accounts 4 Inthe Create Account dialog box in the Account Name text box type a name for this account 5 Inthe Password and Confirm Password text boxes type a password for this account Passwords are case sensitive 6 On the Account Type menu select an account type 7 Click OK Set the startup account Every time that you restart your computer Nor
244. urity account o eeeseeeeeeeeeseeeeeeeees 146 Set the startup ACCOUNE ete a Set or change account passwords Assign Norton Internet Security account types to Windows ACCOUNTS ashe hie Gi ait AE R R ART Log on to Norton Internet Security s sssseesseseessseessreessrreessrressereesses Customize Norton Internet Security accounts Protecting your privacy Identify private information to protect 0 eseseeeeeeeseeeseeneeeeees 155 Tips on entering private information s sseseeeessseeesreeessseeesese 156 Privacy Control and SSL eian EOE 156 Add private information Modify or remove private information seen 157 Customize Privacy Control ccccidiiaicaseachaiaudanrdaceiiasackeas 158 Set the Privacy Level Adjust individual Privacy Control settings sses 159 13 14 Contents Chapter 12 Chapter 13 Chapter 14 Chapter 15 Blocking Internet advertisements How Ad Blocking Works ooo eeeeesseeeeseeeeseeeeseeseeeseesesneneeseseeeseeeesnenes Blocking by dimensions Blocking by locatione des5ccsuecahitantascncik tu ditastes Enable or disable Ad BIOCKiNg oc eeseeteseeeeteeeeeeeeeeseeeeneeeentenenees 165 Enable or disable Popup Window Blocking eee 166 Enable or disable Flash blocking Use the Ad Trashcan sisine ireren anena AEN A A Use text strings to identify ads to block or permit How to identify Ad Blocking strings Add an Ad Blocking String oo ceeceeeeceeescseseeeeseseeeeeseeeeteesneneees Modify or re
245. use the Norton Internet Security system tray menu 1 Inthe system tray right click the Norton Internet Security icon 2 Inthe menu that appears select an item Items in the menu include Norton Internet Security Hide View Alert Tracker Block Traffic Opens a Norton Internet Security window Displays or hides the Alert Tracker See Use Alert Tracker on page 56 Immediately stops all incoming and outgoing information See Stop Internet communication with Block Traffic on page 60 Norton Internet Security basics 51 Access Norton Internet Security Log On Off Lets you change the account that is logged on to Norton Internet Security See Log on to Norton Internet Security on page 153 About Norton Displays detailed information about Norton Internet Internet Security Security components LiveUpdate Updates your protection See Keeping current with LiveUpdate on page 81 Help Displays the Norton Internet Security online Help See Use online Help on page 75 Disable Turns off all Norton Internet Security protection features See Temporarily disable Norton Internet Security on page 71 See About Global Use the Norton Internet Security Options to add additional tools to the Settings on page 63 menu Access Norton AntiVirus from the Windows Explorer toolbar Norton AntiVirus adds a button and menu to Windows Explorer The button launches a scan of whatev
246. uter or program To temporarily disable a firewall rule In the General Rules Trojan Horse Rules or Program Rules window uncheck the box next to the rule you want to disable Remember to re enable the rule when you are done working with the program or computer that required the change Guarding against intrusion attempts 119 Customize firewall rules Remove a firewall rule Remove firewall rules when they are no longer necessary To remove a firewall rule 1 Inthe General Rules Trojan Horse Rules or Program Rules window click Add 2 Select the rule that you want to remove Click Remove 4 When you are done removing rules click OK Reset firewall rules to the default settings Resetting the firewall rules returns all users firewall protection to the default settings and deletes any changes you have made to firewall rules O You should only use this procedure in an emergency Before resetting your firewall rules try removing recently changed firewall rules To reset the firewall rules to the default settings 1 Close all Norton Internet Security windows 2 In Windows Explorer double click My Computer 3 Double click the hard disk on which you installed Norton Internet Security In most cases this will be drive C 4 Open Program Files gt Common Files gt Symantec Shared 5 Drag firewall rul to the Recycle Bin The firewall will return to its default settings the next time you run Norton In
247. y 3 Select the tab on which you want to change options About General options General options let you control when Norton Internet Security runs protect program settings with a password and choose visual elements you want to display Your options are Start Norton Select whether you want to run Norton Internet Security Internet manually or automatically whenever Windows starts Security Protect Norton Set a password to protect your security settings from Internet untrustworthy people who have physical access to your Security Tools computer See Password protect options on page 68 Alert Tracker Toggle the Alert Tracker on and off Tray Icon Display a Norton Internet Security icon on the Windows taskbar Settings that gives you access to program settings You can also choose to include links to the following Norton Internet Security tools Options Log Viewer Statistics About LiveUpdate options See Keeping LiveUpdate options let you enable and disable Automatic LiveUpdate a a which automatically checks for Norton Internet Security updates when you page 81 are connected to the Internet For maximum security you should leave this option checked You can choose the Norton Internet Security components you want Automatic LiveUpdate to monitor You can also choose whether Automatic Norton Internet Security basics Customize Norton Internet Security LiveUpdate updates the components in t
248. y Risks to your privacy The Internet presents several risks to your privacy Some sites collect and save personal information such as credit card numbers Some sites track your Internet usage Some programs send information about your computer usage to Web sites without your permission Sending private information You probably don t want private information such as credit card numbers or your home phone number to be sent unencrypted over the Internet Privacy Control prevents private information from being entered on Web sites that do not use secure encrypted communications and from being sent on instant messenger programs You may want to prevent some users from sending private information over the Internet Norton Internet Security can block users from accessing secure sites where they might be asked for personal information Understanding cookies Good cookies Cookies are messages sent to your browser by Web sites that are stored as small files on your computer They are often used by Web sites to track your visits In most cases cookies do not contain personal information but instead carry information that identifies you to Web sites In their most benign form cookies last only until you close your browser This type of cookie is mainly used to remember choices that you make as you navigate through a Web site Many sites leave cookies on your computer so that they recognize you when you return to their sites These coo
249. y or organization many resources on the Internet assist in gathering information Using the Internet a hacker can learn a lot about a potential target Given a domain name it s easy to find out the name and address of the owner as well as the name and phone number of the administrative and technical contacts While this information usually can t be used directly to attack a network or computer it can be used to gather more information Ifa hacker doesn t have a specific target in mind many tools are available for scanning the Internet and finding possible targets The simplest scan is a ping scan which can quickly scan thousands of computers The hacker uses a program to ping computers at a series of IP addresses A response tells the hacker that a computer exists at an IP address When Norton Internet Security is running your computer is hidden from ping scans because your computer does not respond The hacker does not learn that there is a computer at your IP address by pinging it Understanding Internet risks 225 Risks from hackers Port scans are more comprehensive and are usually performed on single computers A port scan can tell a hacker which services are running such as HTTP and FTP Each service that is running provides a potential entry point for the hacker On unprotected computers unused ports respond that they are closed telling the hacker that a computer exists at that IP address Norton Internet Security does not r
250. y users to verify their identities to a network or program The most secure passwords are difficult to guess or find in a dictionary and contain a combination of capital letters lowercase letters numbers and symbols An email protocol used to retrieve email from a remote server over an Internet connection 242 Glossary A transport user identification used by a client program to specify a particular server program on a computer Also called service Some applications have ports with preassigned numbers Others are assigned port numbers dynamically for each connection When a service server program is started it binds to its designated port number When a client program wants to use that server it also must request to bind to the designated port number A logical communications channel to be used by a particular TCP IP application Each application has unique port numbers associated with it By convention some protocols use a well known port number for example HTTP uses port 80 although this is configurable An attempt to gain access to a computer by searching for open ports Usually done by an automated program that sends a request to each port at an IP address listening for responses that could reveal a vulnerability A mechanism that lets one system act on behalf of another system when responding to protocol requests Security programs in firewalls use proxy services to screen the secured network from user
251. ymbol used to represent a file folder disk or other entity 240 Glossary An attempt by an external computer to open a connection to your computer The connection can be used to send data to and from your computer A file that contains a virus Trojan horse or worm The essential protocol by which data is sent from one computer to another on the Internet IP routes packets to the appropriate destinations A 32 bit numeric identifier that uniquely identifies a computer on the Internet IP addresses are usually expressed as four groups of numbers each ranging from 0 to 255 separated by periods For example 206 204 52 71 A company that supplies Internet access to individuals and companies Most ISPs offer additional Internet connectivity services such as Web site hosting A small program that runs in a restricted environment sometimes referred to as a sandbox that is managed by your browser Most Java applets are used to add multimedia effects interactivity or other functionality to a Web page but they can also be used for malicious purposes such as password theft A scripting language that is similar to but less capable than Java JavaScript code can be included in Web pages to add interactivity and other functionality A term that refers to your computer as opposed to a remote computer A record of actions and events that take place on a computer or handheld device A device that modulates
252. you have installed your product Once you know that your files are up to date run LiveUpdate regularly to obtain updates For example to keep your virus protection current you should use LiveUpdate once a week or whenever new viruses are discovered Program updates are released on an as needed basis Request an update alert If you run To ensure your protection updates are current you can request to receive an email alert whenever there is a high level virus outbreak or other Internet security threat The email alert describes the threat provides detection and removal instructions and includes advice on keeping your computer safe You should always run LiveUpdate after you receive one of these alerts To request an update alert 1 From your Web browser navigate to http securityresponse symantec com avcenter 2 On the Security Response Web page scroll to the bottom of the page then click Symantec security response Free subscription 3 Onthe security alert subscription Web page fill in the subscription form 4 Click Send me FREE Security Alerts LiveUpdate on an internal network If you run LiveUpdate on a computer that is connected to a network that is behind a company firewall your network administrator might set up an internal LiveUpdate server on the network LiveUpdate should find this location automatically If you have trouble connecting to an internal LiveUpdate server contact your network administrator 8
253. your screen This lets you monitor your connection view information about security events and personalize your protection without requiring a lot of space on your screen When you start Norton Internet Security it launches the Security Center You can then switch to the Security Monitor 3Security Monitor a Lo 2 Select a Task gt Blocked HTTP private information bank numbers symantec norton internet Security To view the Security Monitor In the Security Center in the upper left corner click Security Monitor To view the Security Center In the Security Monitor in the upper left corner click Security Center You can display the Security Monitor on top of all other windows This ensures that it will be visible at all times 54 Norton Internet Security basics Work with Norton Internet Security To keep the Security Monitor on top of all other windows 1 Open Norton Internet Security 2 Inthe Security Center click Options gt Internet Security 3 On the General tab check Keep Security Monitor on top of all other programs 4 Click OK Select a task with the Security Monitor Use the Select a Task menu in the Security Monitor to quickly perform common Norton Internet Security tasks The Select a Task menu includes Test security See Check your computer s vulnerability to attack on page 58 View Log See View Norton Internet Security Logs on page 196 Viewer

Download Pdf Manuals

image

Related Search

Related Contents

Cables Direct URT-601.5 networking cable  Altronix R615DC416UL uninterruptible power supply (UPS)  "user manual"  Soporte motor ventilador - Portal do Eletrodomestico  Timex W-52 User's Manual  MANUAL DE USUARIO SIEE SISTEMA DE INFORMACIÓN  

Copyright © All rights reserved.
Failed to retrieve file