TM Norton 360 Product Manual Care for our Environment; ‘It's the right thing to do.’ Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual is made from recycled materials.
Norton 360™ Product Manual The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 20.1 Copyright © 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, LiveUpdate, Norton 360, and Norton are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Portions of this product Copyright 1996-2011 Glyph & Cog, LLC.
Contents Chapter 1 Getting Started ....................................... 7 About Norton 360 ...................................... 7 Activation protects you ............................. 18 About your Norton Account ........................ 23 About Norton Management ........................ 30 About Norton Community Watch ................. 37 About Norton Bootable Recovery Tool ............................................... 39 About Norton Power Eraser ........................
Contents Chapter 4 Scanning your computer ....................... 163 About the Norton 360 scans ...................... About Computer Scan .............................. About Insight Network scan ...................... About Reputation Scan ............................ About Scan Facebook Wall ........................ About SONAR Protection .......................... About scanning Office documents ............... About Silent Mode .................................. About boot time protection .......
Contents About Download Insight ........................... About Norton AntiSpam ........................... About configuring POP3 and SMTP ports ............................................. About Network Cost Awareness ................. Chapter 9 5 293 303 318 320 Securing your sensitive data .................. 325 About securing your sensitive data ............. 325 Chapter 10 Protecting your home network ............... 399 About the Network Security Map ................
Contents Chapter 13 Customizing settings ............................ 497 About Norton 360 Settings ........................ Customizing Norton 360 Settings ............... Turning on or turning off Quick Controls services ......................................... About Antivirus settings .......................... About Firewall settings ............................ About Norton AntiSpam settings ................ About My Network settings ....................... About backup settings .................
Getting Started 1 This chapter includes the following topics: 1 About Norton 360 1 Activation protects you 1 About your Norton Account 1 About Norton Management 1 About Norton Community Watch 1 About Norton Bootable Recovery Tool 1 About Norton Power Eraser 1 About updating Norton 360 1 About Network Proxy Settings 1 About Norton 360 status About Norton 360 Norton 360 offers proven performance and delivers today’s fast and light all-in-one solution to protect your PC and all your onlin
Getting Started About Norton 360 Norton 360 is completely automated and easy to use. It works quietly in the background to maintain your overall system integrity with minimal effect on PC performance. By offering an unmatched combination of performance and protection, Norton 360 helps you get the most out of your PC and your online experience. About Norton 360 main window The Norton 360 main window acts as a security management interface.
Getting Started About Norton 360 Tuneup 9 Includes the performance tuning features, such as cleaning up unwanted files and performing Registry Cleanup. Depending on the security status of the different components of your computer, the status areas of the four protection categories are marked as Protected, Attention, or At Risk.
Getting Started About Norton 360 Performance Lets you open the Performance window in Norton 360. The Performance window chronicles all installs, downloads, optimizations, detections, alerts, and instances of Quick Scan that occurred on your computer since installing Norton 360. The window also displays a detailed graphical representation of the CPU and memory usage by your Norton product. Feedback Lets you give feedback about the Norton product that you use.
Getting Started About Norton 360 11 When your system status is At Risk or Attention, this section automatically provides you the Fix Now option to fix all the issues at once. The right side of the Norton 360 main window helps you do the following: One Lets you access Norton One. Norton One protects all of your devices including your Windows PC, laptop, Mac, and Android smartphones. With a single Norton One membership, you get complete protection for five devices.
Getting Started About Norton 360 Manage Lets you access Norton Management. Norton Management lets you manage your Norton products installed on all of your devices from one location. To sign up or to log into Norton Management, click the Manage icon at the right side of the main window. You can use your existing Norton Account login information to access Norton Management. The Norton Management agent should be installed on each device that you want to add to Norton Management.
Getting Started About Norton 360 Mobile Lets you download the Norton Mobile Security for Android. Norton Mobile Security helps protect your mobile devices against loss, theft, viruses, and other mobile threats. You can use Norton Mobile Security on all your devices that use the Android operating system. When you click the Mobile icon, the main window displays a Quick Response (QR) code for installing Norton Mobile Security.
Getting Started About Norton 360 Online Family
Getting Started About Norton 360 Lets you monitor your child’s activities on the Internet. Norton Online Family w may not be available with some versions of Norton 360. In such case, you may not be able to access Norton Online Family options. When you click the Online Family icon, the Norton 360 main window displays Norton Online Family Log in option. Norton Online Family provides you advanced controls to monitor your child's online activities.
Getting Started About Norton 360 Details option in the Norton 360 main window to view more details on the Norton Online Family Web site.
Getting Started About Norton 360 Safe Web Lets you check the safety of a Web site. You can also perform a safe search. This option may not be w available with some versions of Norton 360. In such case, you may not be able to access this option. When you click Safe Web icon, the Norton 360 main window displays Norton Safe Web options. You can use the Check Site option to analyze the security levels of any Web site that you want to visit.
Getting Started Activation protects you Studio Lets you access Norton Studio. Norton Studio is a Windows 8 app that lets you manage your Norton products and Norton product keys from one location. You can view the security status of each of your devices and resolve the security issues by using the Norton Studio from any location around the world. You can go to Windows 8 App Store and download and install Norton Studio. This option appears w only in Windows 8.
Getting Started Activation protects you 19 If you are not connected to the Internet, you can click Try Later in the Activation not complete window to start your product. The Activation window reappears every time you start your product until you activate your product. If you choose not to activate at that time, you receive an alert that reminds you to activate the product. You can also activate your product by clicking the Trial Period Status link in the Norton 360 main window.
Getting Started Activation protects you You can activate your product directly from the activation alert. You can also activate your product from the Trial Period Status link in the main window or from the My Account window. In some cases, you might need to enter your Product Key to activate your product. You can activate or renew the subscription of your product from any non-admin user account as well. Activation should take only a few minutes.
Getting Started Activation protects you 21 To activate your product from the main window 1 In the Norton 360 main window, do one of the following: 1 If you purchased a subscription version of a retail product, click Activate Now. 1 If the product came installed on your computer, click Activate Online Now. 1 If you want to renew the subscription of your product, click Renew. 2 Follow the on-screen instructions to activate or subscribe your product.
Getting Started Activation protects you If your computer came with The product key is provided the product already installed as part of the activation process. Be sure to save your product key by creating or signing in to your Norton Account, or by printing the key. You may need the product key if you ever want to reinstall your product. If you received a product key The product key is printed on card the card along with instructions on how to use it.
Getting Started About your Norton Account 23 activation procedure. You need to log in to your parental control software or to the Internet through your ISP as an administrator to change your configuration. If you use a proxy server to connect to the Internet, you must configure the proxy settings. To configure the proxy settings, go to the Norton 360 main window, and then click Settings > Administrative Settings > Network Proxy Settings > Configure.
Getting Started About your Norton Account After you log in to your Norton Account, you can manage your product information with the following options: Products Saves the information for all of the Norton products that you own. The Products tab provides you the information about the Norton products that you own and the expiration date. You can click the arrow icon against a product for more information such as product key and the registration date.
Getting Started About your Norton Account Profile Saves your account information and your billing details. The Profile options are: 1 Account Information 1 You can update your Norton Account information and your shipping address on the Account Information tab. After you update, click Update to save the changes. Billing Information 1 You can save your credit card information and your billing address on the Billing Information tab. It makes it easier for saving online orders.
Getting Started About your Norton Account Norton Online Backup Norton Online Backup provides a secure and easy-to-use online backup solution that safeguards your important data against system crash, accidental deleting, virus infection, and other disasters. Norton Safe Web Norton Safe Web checks the safety of a Web site and lets you perform a safe Web search. Norton.
Getting Started About your Norton Account 27 Creating a Norton Account Your Norton Account stores the product key and the billing information of your product. You can also register your product with the Norton Account. In addition, Norton Account helps you to do the following: 1 Access the product key and other product information when you need it. 1 Reinstall your Norton product. 1 Buy additional product keys for your home or office.
Getting Started About your Norton Account To create a Norton Account from the Norton Account Web page 1 In the Norton 360 main window, click Account. 2 In the My Account window, click Access Norton Account. 3 In the Norton Account Web page that appears, click Sign up now. 4 In the Norton Account Sign Up Web page, provide the details about your account information, and then click Sign Up.
Getting Started About your Norton Account 29 You can also change your Norton Account password, if required. Your computer must be connected to the Internet to access your Norton Account. w Symantec products that are older than the 2006 product year do not appear in your Norton Account. To access Norton Account 1 In the Norton 360 main window, click Account. 2 In the My Account window, click Access Norton Account.
Getting Started About Norton Management About Norton Management Norton Management lets you manage all of your Norton products and Norton product keys from one location. You can add your devices such as personal computers and laptops to Norton Management and remotely install and manage your Norton products on the device. You can view the security status of each of your devices and resolve the security issues by using the Norton Management Web site from any location around the world.
Getting Started About Norton Management 31 Accessing Norton Management on Windows You can access Norton Management in one of the following ways: 1 Using a Web browser on any computer. 1 From the main window of Norton security products. To access Norton Management from the main window of a Norton security product, you need to install the Norton Management agent on that device. Your device must be connected to the Internet to access Norton Management.
Getting Started About Norton Management To access Norton Management from the Windows notification area 1 Go to the Windows device on which Norton Management is installed. 2 In the notification area on the taskbar, click the Norton Management icon. 3 In the pop-up that appears, click Open Norton Management. Installing the Norton Management agent on Windows Norton Management uses the Norton Management agent to monitor and manage the security status of a device.
Getting Started About Norton Management 33 5 In the confirmation window, click Yes to confirm that you are already on the device you want to manage. 6 In the window that appears, click Save File and download the installer file. 7 Double-click the file that you downloaded. 8 Click Run. 9 In the Welcome to Norton Management window, click User License Agreement, read the user license agreement, and then click Agree & Install.
Getting Started About Norton Management 4 If you are prompted to provide your email address, in the Email Address box, type the email address that you use to log on to your Norton Account, and then click Next. 5 If you are prompted to provide your password, in the Password box, type the password that you use to log on to your Norton Account, and then click Next. 6 In the Set up this computer window, in the Name this computer box, type a display name for the device, and then click Finish.
Getting Started About Norton Management 35 About the supported devices To install and use Norton 360, your device must meet the following minimum system requirements: Hardware requirement Windows 1 300-MHz or faster processor 1 512 MB of RAM (256 MB minimum) 1 100 MB of available hard disk space Operating systems Platform 1 1 1 1 1 Version Microsoft 32-bit and 64-bit Windows 7 versions Home Basic Microsoft Windows 7 Home Premium Microsoft Windows 7 Professional Microsoft Windows 7 Ultimate Mic
Getting Started About Norton Management 1 1 1 1 1 1 1 Microsoft 32-bit and 64-bit Windows Vista versions Home Basic Microsoft Windows Vista Home Premium Microsoft Windows Vista Ultimate Microsoft Windows Vista Business Service Pack 1 and 2 Microsoft Windows XP Home Microsoft Windows XP Pro Microsoft Windows XP Media Center Edition (2005 and later) Service Pack 2 and 3 32-bit versions Mac 1 OS X 10.7 (Lion) 1 2GB of RAM 1 1.5 GB of available hard disk space Android 1 Android OS 2.
Getting Started About Norton Community Watch 37 Supported Norton products To use all the features of Norton 360, you must use the following versions of Norton security product: If you use an older version of Norton product, ensure that you upgrade your product to the latest version to use all the features of Norton 360. w Currently, there are no upgrades available for Norton Anti-Theft and Norton Online Family. Supported browsers 1 Internet Explorer 7.0 or later. 1 Mozilla Firefox 3.5 or later.
Getting Started About Norton Community Watch 1 1 1 1 1 1 Any Web site URL that your product identifies as fraudulent All the Web site URLs that you visited before the detection of a risk The applications and processes that run on your computer regularly and during any security risk detection Response instances that your computer sends to any potential security risk General system information and performance attributes from the computer General information about your computer such as idle time, st
Getting Started About Norton Bootable Recovery Tool 39 option in the Administrative Settings window. You can also review the data, which Norton Community Watch collects and submits to Symantec, in the Security History window. Turning off or turning on Norton Community Watch You can use the Norton Community Watch option to send information about a suspicious file to Symantec for analysis. Symantec assesses the data to determine the new threats and their sources.
Getting Started About Norton Bootable Recovery Tool computer. Your computer might be infected with a virus if you experience any of the following symptoms: 1 You cannot install Norton 360. 1 You cannot start your computer. 1 Your computer is extremely slow. Norton Bootable Recovery Tool is integrated with Windows Preinstallation Environment (WinPE). Therefore, you can run Norton Bootable Recovery Tool only from a CD, DVD, or USB key.
Getting Started About Norton Bootable Recovery Tool Trojan horses Programs containing malicious codes that are disguised as or hiding in something benign, such as a game or utility. Hacking tools Tools that are used by a hacker to gain unauthorized access to your computer. One type of hacking tool, a keystroke logger, tracks and records your individual keystrokes and can send this information back to the hacker.
Getting Started About Norton Bootable Recovery Tool Trackware Programs that track system activity, gather system information, or track user habits, and relay this information to third-party organizations. The information that is gathered by such programs is neither personally identifiable nor confidential. Trackware programs are installed with the user's consent, and may also be packaged as part of other software that is installed by the user.
Getting Started About Norton Bootable Recovery Tool 43 You can download Norton Bootable Recovery Tool Wizard in one of the following ways: 1 From the Start menu. 1 From the Norton Support Web site. To download the Norton Bootable Recovery Tool Wizard from the Start menu 1 On the Windows taskbar, do one of the following: 1 In Windows XP, click Start > Programs > Norton 360 > Norton Recovery Tools. 1 In Windows Vista or Windows 7, click Start > All Programs > Norton 360 > Norton Recovery Tools.
Getting Started About Norton Bootable Recovery Tool About locating your Norton Product Key or activation PIN To use Norton Bootable Recovery Tool, you must start the computer from any of the following recovery media and then provide your Norton Product Key or the activation PIN when prompted: w 1 Norton Bootable Recovery Tool CD or DVD 1 Norton Bootable Recovery Tool USB key If you already installed and activated any one of the following Norton product on your computer, you do not have to enter t
Getting Started About Norton Bootable Recovery Tool 1 1 1 1 1 45 If you received your Norton product preinstalled by the computer manufacturer, the Product Key is available on your Norton Account. When you are prompted, you need to register for a Norton Account. After you complete registration, you can log on to your Norton Account and find your Product Key. You can also click on the Account link on the main window of your product and register and access Norton Account.
Getting Started About Norton Bootable Recovery Tool Creating Norton Bootable Recovery Tool on a CD or DVD Norton Bootable Recovery Tool is integrated with Windows Preinstallation Environment (WinPE). Therefore, you can run Norton Bootable Recovery Tool only from a CD, DVD, or USB key. To use it, you first need to burn it to a CD or DVD. w If you choose to create Norton Bootable Recovery Tool on a re-writable CD or DVD, all the data that are stored in the CD or DVD are permanently deleted.
Getting Started About Norton Bootable Recovery Tool 47 Creating Norton Bootable Recovery Tool ISO file You can create a Norton Bootable Recovery Tool ISO file on your computer. You can burn this ISO file to a CD or DVD and use it as a recovery CD or DVD on any computer. You can also use this ISO file to point to any virtual machine as a virtual CD-ROM. To create Norton Bootable Recovery Tool ISO file 1 In the Norton Bootable Recovery Tool Wizard main window, click Create ISO file.
Getting Started About Norton Bootable Recovery Tool To create Norton Bootable Recovery Tool on a USB key 1 Insert the USB key into the USB port of your computer. 2 In the Norton Bootable Recovery Tool Wizard main window, click Create on USB key. 3 In the Create on USB key window, do the following: 1 Select the USB drive from the Specify drive drop-down list. 1 If you want to add drivers, click Add next to Add drivers. 1 If you want to change the default language, click Change next to Specify language.
Getting Started About Norton Bootable Recovery Tool 49 If you have a valid Norton product key or activation PIN, you can go to your Norton Account and access the Norton Bootable Recovery Tool download link. To access your Norton Account, go to the following address: https://account.norton.com To access Norton Bootable Recovery Tool Wizard 1 Do one of the following: 1 Double-click the Norton Bootable Recovery Tool Wizard icon on your computer desktop.
Getting Started About Norton Bootable Recovery Tool Norton Bootable Recovery Tool automatically downloads the latest virus definitions from Symantec servers and uses these virus definitions to secure your computer from all types of viruses and latest security threats. If Dynamic Host Configuration Protocol (DHCP) is enabled, virus definitions are automatically updated when your computer is connected to the Internet.
Getting Started About Norton Bootable Recovery Tool 51 4 Read the Norton License Agreement, type your Product Key, and then click I Agree. If you use a non-QWERTY keyboard, use the Virtual Keyboard option to enter your Product Key. 5 In the Norton Bootable Recovery Tool window, click Norton Advanced Recovery Scan. 6 In the Scan section, click Start Scan.
Getting Started About Norton Power Eraser To update Norton Bootable Recovery Tool virus definitions on a USB key 1 Insert your Norton Bootable Recovery Tool USB key into the USB port of your computer. 2 In the Norton Bootable Recovery Tool Wizard main window, click Update USB key definitions. 3 In the Update USB key definitions window, from the Specify drive drop-down list, select the USB drive. 4 Click Next. 5 Review the results and click Done.
Getting Started About updating Norton 360 53 2 In the page that appears, click Download Norton Power Eraser. 3 Save the NPE.exe file to your Desktop. 4 Double-click the NPE.exe file on your Desktop. 5 Read the license agreement, and then click Accept. Scanning your computer with Norton Power Eraser You can scan your computer with Norton Power Eraser to remove threats even if you have a Symantec security product.
Getting Started About updating Norton 360 Automatic updates require an Internet connection. If you use a proxy server to connect to the Internet, you must configure the proxy settings in your product. If you do not normally keep your PC connected to the Internet, you can manually update Norton 360 after you connect to the Internet. Updating Norton 360 on a regular basis ensures that you have the latest definition updates and program updates.
Getting Started About updating Norton 360 w 55 LiveUpdate does not download the latest definition updates and program updates, if the Network Cost Awareness option in the Settings window is set to No Traffic. Network Cost Awareness lets you define the amount of network bandwidth that Norton 360 can use. Therefore, you must ensure that the Network Cost Awareness option is turned on and set to No Limit or Critical Updates Only for LiveUpdate to run successfully.
Getting Started About updating Norton 360 The type of definition updates that each of the Symantec products receive are as follows: Norton AntiVirus, Norton AntiVirus Online Users of these products receive the latest virus definitions from Symantec that protects your computer from all types of security threats. Norton Internet Security, Norton In addition to the virus Internet Security Online and security risk updates, users of these products receive definition updates for security protection.
Getting Started About updating Norton 360 57 Norton 360, Norton 360 Online Users of these products receive the latest virus definitions from Symantec that protects your computer from all types of security threats. In addition, users of these products receive Symantec spam definition files and definition updates against phishing.
Getting Started About updating Norton 360 Core Set Contains the most important virus definitions that are required for latest security threats as viewed by Symantec. The Core Set is a subset of the Complete Set, and it is approximately 30 percent smaller than the Complete Set. The Core Set minimizes download time, installation time, and system start time. It also occupies lesser amount of disk space as compared to the Complete Set virus definitions.
Getting Started About updating Norton 360 59 installation time, lesser boot time, and lesser memory consumption. It also occupies lesser amount of disk space as compared to the full set of virus definitions. Therefore, Smart Definitions result in faster performance of your computer. Norton 360 checks the Smart Definitions option settings during each LiveUpdate session. If the option is turned on, the Smart Definitions are downloaded and installed.
Getting Started About updating Norton 360 turn off or turn on the Automatic LiveUpdate option from Quick Controls in the Settings window. w If you are connected to the Internet, Automatic LiveUpdate downloads product updates and definition updates every hour. If you have an Integrated Services Digital Network (ISDN) router that is set to automatically connect to your Internet service provider (ISP), it may incur charges each time.
Getting Started About updating Norton 360 61 presence of a specific virus or security threat. Norton 360 shows the date on which you last updated the virus and spyware definitions. You can also check the latest virus definition date. The Definitions Update section in the PC Security Details window displays the status and date of the last virus definition updates. To check for the latest virus and spyware definition date 1 In the Norton 360 main window, click Security, and then click View Details.
Getting Started About updating Norton 360 If you purchased a product as a service, or it came installed on your computer If you do not activate your service or renew your subscription, you cannot obtain updates of any kind and the software no longer functions. If you receive this Your product status is always active as service through long as your security service is active your service with your service provider.
Getting Started About updating Norton 360 63 that require system restart are automatically applied the next time you restart your computer. To turn on or turn off Apply updates only on reboot 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click Antivirus. 3 In the Antivirus settings window, click the Antispyware and Updates tab.
Getting Started About updating Norton 360 additional and fast protection for the latest threats in between the full updates without disrupting your online experience. Even if you do not turn on Pulse Updates, LiveUpdate collects all the missed streams and, it updates your computer during full definition updates. Turning off or turning on Pulse Updates Pulse Updates provide frequent, lightweight updates every 5 minutes in between the full updates.
Getting Started About Network Proxy Settings 65 About Network Proxy Settings A proxy server regulates access to the Internet, and prevents external computers from accessing your network. If you are on a network that uses a proxy server to connect to the Internet, you can provide proxy server details to Norton 360. You can use the Network Proxy Settings window to specify the automatic configuration URL, the proxy settings, and the authentication details.
Getting Started About Network Proxy Settings Network Proxy Settings window lets you specify the following settings: Automatic Configuration Lets you specify the automatic configuration URL or script to manage Internet access. You have the following options: 1 Automatically detect settings Lets your browser detect the network settings automatically. 1 If you do not want to override your manual settings for network connections, you must disable this option.
Getting Started About Network Proxy Settings Authentication 67 Lets you connect to the Internet through a server that requires authentication. Use the Username box and Password box to type the authentication details. Configuring Network Proxy Settings When you use a proxy server to connect to the Internet, you must specify the proxy server details. The Network Proxy Settings window lets you enter automatic configuration settings, proxy settings, and proxy server authentication settings.
Getting Started About Norton 360 status 4 In the Network Proxy Settings window, do the following: 1 If you want your browser to automatically detect network connection settings, under Automatic Configuration, check Automatically detect settings. 1 If the proxy server requires an automatic configuration URL, under Automatic Configuration, check Use automatic configuration script. Type the URL of the PAC file in the URL box.
Getting Started About Norton 360 status Attention 69 Indicates that your computer requires attention. At the bottom section of the Norton 360 main window, click Fix Now to resolve the security threats on your computer. At Risk Indicates that your computer is at risk. At the bottom section of the Norton 360 main window, click Fix Now to resolve the security threats on your computer.
Getting Started About Norton 360 status When your system status or protection categories statuses are marked as At Risk or Attention, you can resolve the security issues directly from the main window. To respond to security status indicators 1 In the Norton 360 main window, click Fix Now. 2 Follow the on-screen instructions. About the Norton 360 icon When you install Norton 360, it places an icon in the notification area at the far right of the taskbar.
Getting Started About Norton 360 status 71 You can right-click the icon to see a shortcut menu for Norton 360. You can choose items on the shortcut menu to open the Norton 360 window, to fix any issues that Norton 360 detects, or to get additional help. About Norton 360 shortcut menu Norton 360 works in the background to keep your PC secure. The Norton 360 icon is available in the notification area at the far right of the taskbar. The icon reassures you that your protection is up to date.
Getting Started About Norton 360 status Run Backup Now Use this option to create a backup of your files. You can specify when and how often Norton 360 backs up your files. View Recent History Use this option to review the information about the security events for all of the categories. Get Support Use this option to resolve your problem easily using Norton Autofix. Turn on/Turn off Silent Mode Use this option to turn on or turn off Silent Mode.
Getting Started About Norton 360 status 73 To view details of a protection feature 1 In the Norton 360 main window, click on a protection feature, and then click View Details. In the window that appears, you can view the following details: 1 The current status of the protection feature. 1 1 A list of the checks that the feature performs, and the results of each check. In some cases, the results of a check can include a link that provides additional information. A list of actions that you can perform.
Getting Started About Norton 360 status
Monitoring your system's performance 2 This chapter includes the following topics: 1 About System Insight About System Insight Norton 360 continuously monitors your computer to keep it free of any problems and run at peak efficiency. Norton 360 constantly scans the vital areas of your computer including memory, registry keys, and running processes. It monitors the important activities such as general file operation, network traffic, and Internet browsing.
Monitoring your system's performance About System Insight 1 1 1 alerts, or Quick Scans. The graph displays the activities as icon or stripe, and the description for each icon or stripe is provided at the bottom of the graph. The pop-up that appears when you move the mouse pointer over an icon provides you the details about the activity. The View Details link in the pop-up lets you view additional details about the activity in the Security History window.
Monitoring your system's performance About System Insight 1 1 77 The Norton Tasks window provides the details such as the timestamp, the duration, and the status of the background jobs. The details also include the type of power the job needs to run and if a job ran during idle time. You can select different power sources for the background jobs. You can also start or stop a background job at any time. To view details about the known good files and the known bad files.
Monitoring your system's performance About System Insight About monitoring system activities System Insight provides information about the important system activities that you performed or that occurred over a period of the last three months. System Insight displays the information in the Performance window. The Events graph at the top of the Performance window displays each activity as icon or stripe. The description for each icon or stripe appears at the bottom of the graph.
Monitoring your system's performance About System Insight Optimized Indicates the optimization activities that you performed on your system over a period of the last three months. Detections Provides the details about the threat detection activities that Norton 360 performed on your system over a period of the last three months. The details include the date on which Norton 360 detected a threat and the total number of threats that Norton 360 detected on that date.
Monitoring your system's performance About System Insight Quick Scans Provides the details about Quick Scans that Norton 360 performed on your system over a period of the last three months. The details include the date on which a Quick Scan was performed and the number of Quick Scans that were performed on that date. The View Details link provides additional details such as the scan time, total items scanned, total risk detected, total risks resolved, and recommended action.
Monitoring your system's performance About System Insight 81 2 In the Performance window, at the top of the Events graph, click the tab for a month to view the details. 3 In the Events graph, move the mouse pointer over the icon or the stripe for an activity. 4 In the pop-up that appears, view the details of the activity. 5 If the View Details option appears in the pop-up, click View Details to view additional details in the Security History window.
Monitoring your system's performance About System Insight access the Resource Threshold Profile for Alerting option, go to the Norton 360 main window, and then click Settings > Administrative Settings > Performance Monitoring > Resource Threshold Profile for Alerting. You can use the Use Low Resource Profile On Battery Power option to let Norton 360 automatically change the resource threshold profile to low when your computer runs on battery power.
Monitoring your system's performance About System Insight On Turns on performance alerts. Select this option if you want Norton 360 to notify you with performance alerts when a program or process exceeds the threshold limit of the system resource usage. By default, the Performance Alerting option is turned on. Log Only Monitors and records the system resource usage. Select this option if you want Norton 360 to only monitor the system resource usage of every program or process running on your computer.
Monitoring your system's performance About System Insight 3 Under Performance Monitoring, in the Performance Alerting row, do one of the following: 1 To turn off performance alerts, move the Performance Alerting switch to the Off position. 1 To turn on performance alerts, move the Performance Alerting switch to the On position. 1 To suppress the performance alerts, move the Performance Alerting switch to the Log Only position.
Monitoring your system's performance About System Insight 85 3 Under Performance Monitoring, in the Resource Threshold Profile for Alerting row, select one of the following options: Low Configures a low threshold limit for alerting. Symantec recommends you to select this option when your computer runs on battery power. Medium Configures a medium threshold limit for alerting. By default, the threshold limit is set to medium. High Configures a high threshold limit for alerting.
Monitoring your system's performance About System Insight the program or the process manually and free the resource. If the Use Low Resource Profile On Battery Power option is turned on, Norton 360 automatically changes the threshold profile to low when your computer runs on battery power. By default, this option is turned on. w Symantec recommends that you keep the Use Low Resource Profile On Battery Power option turned on.
Monitoring your system's performance About System Insight 87 To exclude a program from performance alerts 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click Administrative Settings. 3 Under Performance Monitoring, in the Program Exclusions row, click Configure. 4 In the Program Exclusions window, click Add. 5 In the Select a program dialog box, browse to the executable file for the program that you want to add. 6 Click Open.
Monitoring your system's performance About System Insight 6 Click OK. 7 In the Settings window, click Close. About CPU graph and memory graph Norton 360 monitors the overall system CPU usage and memory usage and the Norton-specific CPU usage and memory usage. Norton 360 displays the details in the CPU graph and the memory graph. The CPU graph and memory graph are real-time graphs of CPU utilization and memory utilization.
Monitoring your system's performance About System Insight 1 The file name, version number, digital signature, the date on which the process was installed. The date on which the process was last used and whether it is a startup file. The stability details. 1 The confidence level. 1 The resource usage details. 1 1 1 89 The actions that the process performs on your system. In addition, the File Insight window displays the CPU graph and the resource usage details for the running processes.
Monitoring your system's performance About System Insight 2 In the Performance window, do one of the following: 1 To view the CPU graph, click the CPU tab. 1 1 To view the memory graph, click the Memory tab. To magnify or shrink the graph, click 10min, 30min, 1D, 1W, or 1M next to the Zoom option. Obtaining historical data of your CPU and memory usage The Zoom options also provide you the historical data of the CPU graph and memory graph.
Monitoring your system's performance About System Insight 91 2 In the Performance window, do one of the following: 1 To view the CPU graph, click the CPU tab. 1 To view the memory graph, click the Memory tab. 3 Click at any point on the graph to obtain a list of resource-consuming processes. 4 Click the name of a process to obtain additional information about the process in the File Insight window. About optimization The data storage space on a disk is divided into discrete units.
Monitoring your system's performance About System Insight structures so that they can grow without immediately becoming fragmented again. You can optimize your boot volume manually by using the Optimize option in the Performance window. You can also configure Norton 360 to defragment your boot volume or the local disk that contains boot volume when your computer is idle. Norton 360 automatically schedules the optimization when it detects the installation of an application on your computer.
Monitoring your system's performance About System Insight 93 can view details such as timestamp, duration, and status of the background job. To optimize your boot volume from the Performance window 1 In the Norton 360 main window, click Performance. 2 In the Performance window, at the top of the security status graph, click Optimize. To optimize your boot volume from the Norton Tasks window 1 In the Norton 360 main window, click Performance. 2 In the Performance window, click Norton Tasks.
Monitoring your system's performance About System Insight to optimize the boot volume during idle time. By default, this option is turned on. Turning off or turning on Idle Time Optimizer Norton 360 automatically schedules the optimization when it detects the installation of a new application on your computer. Norton 360 runs this optimization only when your computer is idle. You can use the Idle Time Optimizer option to optimize the boot volume during idle time. By default, this option is turned on.
Monitoring your system's performance About System Insight 1 1 1 1 1 95 You can use the icon that appears before the name of a background job to start or stop a background task. You can start or stop a background task at any time. The timestamp of the Norton task You can view details such as the date on which the background job last ran and the time. These details help you decide whether to start a background task or wait for Norton 360 to run the job during idle time.
Monitoring your system's performance About System Insight The Norton Tasks window lets you monitor the following Norton-specific tasks: Automatic LiveUpdate Automatic LiveUpdate automatically checks for definition updates and program updates when your computer is connected to the Internet. By default, Automatic LiveUpdate checks for updates every hour. Backing up DefaultSet Performs a backup of the files and data that are included in your backup set.
Monitoring your system's performance About System Insight Internet Explorer History Cleaner Deletes the unnecessary Web page history that is left behind in your Internet browser's history folder. Removes the traces of any Internet searches that are performed on your PC. Internet Explorer Temporary Deletes the temporary files Files that are left behind on the hard disk after Internet browsing. Norton Community Watch Norton Community Watch protects your computer against potential risks.
Monitoring your system's performance About System Insight Norton Insight Allows the smart scanning of files on your computer. It improves the performance of Norton 360 scans by letting you scan fewer files without compromising the security of your computer. Norton Insight lets you check the details of the Files of Interest that are available on your computer. You can view details such as signature of the file and the date on which the file was installed.
Monitoring your system's performance About System Insight Quick Scan 99 Scans the important locations of your computer that the viruses and other security threats often target. Quick Scan takes less time to scan than a Full System Scan because this scan does not scan your entire computer. Windows Registry Cleaner Deletes the inaccurate entries and obsolete entries in the Windows registry that can cause errors.
Monitoring your system's performance About System Insight Licensing Maintenance Performs background maintenance tasks related to licensing. Insight Maintenance Performs background maintenance tasks related to Norton Insight. Tasks include maintaining details about the stability and trust level of files in your computer. Product Maintenance Performs background maintenance tasks related to Norton 360. Tasks include clearing install logs and rescanning consolidated firewall rule.
Monitoring your system's performance About System Insight 101 To monitor background jobs 1 In the Norton 360 main window, click Performance. 2 In the Performance window, click Norton Tasks. 3 In the Norton Tasks window, view the details of background jobs. 4 Do one of the following: 1 To run a background job, click the play icon that appears before the name of the background job. 1 To stop a running background job, click the stop icon that appears before the name of the background job. 5 Click Close.
Monitoring your system's performance About System Insight You can select one of the following options: External Allows the Norton Tasks to run only when your computer uses external power. If you choose this option, Norton 360 performs the Norton Tasks when the computer is idle and connected to external power. External and Battery Allows the Norton Tasks to run irrespective if the computer uses external power or battery power.
Monitoring your system's performance About System Insight 103 3 In the Norton Tasks window, under the Power Source column, click the Configure link for the Norton Task that you want to configure the power source. 4 In the Power Source window, select one of the following: 1 External Allows the Norton Task to run only when your computer uses external power. 1 External and Battery Allows the Norton Task to run irrespective if the computer uses external power or battery power.
Monitoring your system's performance About System Insight A Norton 360 scan can identify threats on your computer in the following ways: The Blacklist technique At regular intervals, Norton 360 obtains definition updates from Symantec. These updates contain signatures of known threats. Each time when Norton 360 obtains the definition updates, it performs a scan of all of the files that are available on your computer.
Monitoring your system's performance About System Insight The Whitelist technique Norton 360 obtains specific information about the Files of Interest and submits the information to Symantec during idle time. The information includes things such as file name, file size, and hash key. Symantec analyzes the information of each File of Interest and its unique hash value and provides a confidence level to the file. The Symantec server stores the hash value and confidence level details of the Files of Interest.
Monitoring your system's performance About System Insight Symantec assigns the following confidence levels to Files of Interest: Trusted Symantec analyzes the file as trusted based on the statistical evaluation that is done on the files that are available within the Norton Community. If the file has three green bars, Symantec rates the file as Norton Trusted. The files that have three green bars display a Norton Trusted pop-up text when you move the mouse pointer over the green bars.
Monitoring your system's performance About System Insight 107 Norton 360 also provides different profiles to configure your scan performance. When you use the Full Scan profile, Norton 360 follows the Blacklist technique to scan your computer. It scans all of the files on your computer against the signatures that it obtained during definition updates. When you use the Standard Trust or High Trust profile, Norton 360 follows the Whitelist technique to scan the files based on their confidence level.
Monitoring your system's performance About System Insight The drop-down list that is available in the Norton Insight - Application Ratings window provides you the following options: All Running Processes Lists the processes that run on your computer at that point in time when you selected this option. All Files Lists the Files of Interest. Startup Items Lists the programs that start when you start your computer.
Monitoring your system's performance About System Insight User Trusted Files 109 Lists the Files of Interest that you manually trusted in the File Insight window. This category does not list the files that do not belong to the File of Interest even if you manually trust the files. However, Norton 360 excludes all of the manually trusted files from Norton 360 scan when you configure Scan Performance Profiles to High Trust.
Monitoring your system's performance About System Insight To view the files using Norton Insight 1 In the Norton 360 main window, click Security, and then click Run Norton Insight. 2 In the Norton Insight - Application Ratings window, select an option from the Show drop-down list to view a category of files. You may need to scroll the window to view all the files that are listed in the details area. 3 Click Close.
Monitoring your system's performance About System Insight 111 window to update the trust value of a file. You can also manually trust any well-known files. You can change the trust level of any file to User Trusted other than the files that are Norton Trusted. You can determine the resource usage of a file that is available on your computer. The File Insight window displays the CPU graph and the system resource usage details for the running processes.
Monitoring your system's performance About System Insight To manually trust the file 4 In the File Insight window, in the Details tab, click Trust Now. You can manually trust the files that are poor, unproven, or not Norton trusted. To determine the resource usage of a running process 1 In the File Insight window, in the left pane, click Activity. 2 In the Show drop-down list, do one of the following: 1 Select Performance to view the performance graph of the process.
Monitoring your system's performance About System Insight 1 113 Norton 360 scans the files that have a confidence level other than Norton Trusted. Configure to High Trust to perform a scan that excludes the files that have known digital signatures or high confidence levels. Norton 360 does not scan the files that have confidence level as Norton Trusted or User Trusted. It also excludes the Good files with high confidence level from the scan.
Monitoring your system's performance About System Insight 2 In the Norton Insight - Application Ratings window, move the Scan Performance Profiles slider to one of the settings. Your options are: 1 Full Scan 1 Standard Trust 1 High Trust 3 Click Close. About Monthly Report Monthly Report lets you view a summary of what Norton 360 has done for you. Norton 360 displays the monthly report every 30 days after you install your product.
Monitoring your system's performance About System Insight 115 Norton 360 provides reports based on the following categories: PC Security Lets you view the details of the various attacks your PC is protected from. For example, you can view the total number of viruses and spyware from which you are protected. Web Lets you view the details of Antiphishing activities. For example, you can view the total number of known authenticated sites that you visited.
Monitoring your system's performance About System Insight Viewing the Monthly Report The Monthly Report lets you view how Norton 360 protected you for the past 30 days. This report includes different activities that Norton 360 performed to protect your computer. The Monthly Report provides information about the following activities: 1 1 1 1 The total number of threats that Norton 360 detected on your computer. The total number of phishing and authenticated Web sites that you visited.
Maintaining total protection 3 This chapter includes the following topics: 1 About total protection 1 About keeping your computer secure 1 About solving connection problems 1 About responding to emergencies 1 About monitoring protection features 1 About viewing details of system vulnerabilities About total protection Norton 360 offers total protection of your PC that includes Antivirus and Spyware Protection, online identity theft protection, backup, and PC tuneup capabilities.
Maintaining total protection About keeping your computer secure Norton 360 is grouped into the following four categories of protection: Security Blocks and removes viruses and spyware from email and downloaded sites, protects against emerging threats, scans, cleans email attachments, and secures connections and data transmission between your computer and the Internet. Identity Helps to guard against identity theft, verifies authenticity of Web sites.
Maintaining total protection About keeping your computer secure 1 1 1 119 Delete all unwanted messages without opening them. Do not respond to email that you suspect is spam. Delete it. Be wary of any email that requests confidential information, and confirm the authenticity of the request before you reply. To protect yourself from phishing attempts, do the following: 1 When you visit a Web site, type the address directly into your browser rather than clicking a link.
Maintaining total protection About solving connection problems About solving connection problems Norton 360 uses an Internet connection to support several of its protection features. If you use a proxy server to connect to the Internet, you must configure the proxy settings of Norton 360. You can configure Network Proxy Settings in the Administrative Settings window.
Maintaining total protection About responding to emergencies Full System Scan Checks all boot records, files, and running programs to protect your computer from viruses and spyware It also runs other tasks (such as LiveUpdate, Registry Cleanup, Disk Optimization, and Backup) to provide a high level of protection and improve the performance of your computer.
Maintaining total protection About monitoring protection features When you right-click a folder, the shortcut menu displays Norton 360 and then Scan Now option. You can use this command to scan any particular folder. When you right-click a file, the shortcut menu displays Norton 360 and then Insight Network Scan option. You can use this command to scan a file using both local definitions and definitions that are hosted in the Cloud.
Maintaining total protection About monitoring protection features 123 window. For example, the security items that are related to the Quarantine feature appear under the Quarantine category. In addition, the Security History window displays details of each item in the Details pane.
Maintaining total protection About monitoring protection features 1 Email Errors 1 Norton Community Watch 1 Registry Cleanup 1 File Cleanup 1 Disk Optimization 1 Silent Mode 1 LiveUpdate You can view the security items based on the category of events that you select and the search string that you provide. Norton 360 restricts the number of search results that appear on each page in the Security History window.
Maintaining total protection About monitoring protection features 125 History logs for that day. You can later import the file into Security History and analyze the data. Viewing items in Security History Security History provides a record of all the activities that Norton 360 performed on your computer.
Maintaining total protection About monitoring protection features 2 In the Tasks window, under General Tasks, click Check Security History.
Maintaining total protection About monitoring protection features 127 3 In Security History window, in the Show drop-down list, select the category of items that you want to view. Your options are: Recent History The Recent History view in the Security History window displays the alerts that you received during the last seven days. It lists the history of certain recent security events. Full History The Full History view in the Security History window displays the complete Security History.
Maintaining total protection About monitoring protection features Resolved Security Risks The security risks include the suspicious programs that can compromise the security of your computer. The Resolved Security Risks view in the Security History window displays a list of security risks that Norton 360 has detected and then repaired, quarantined, or removed. The quarantined items are listed in the Quarantine view. You can also view the quarantined items in the Quarantine view.
Maintaining total protection About monitoring protection features Quarantine The Security History Quarantine provides a safe location on your computer where you can isolate items while you decide an action to take on them. The Quarantine view in the Security History window displays all of the security risks that are isolated in the Security History Quarantine. SONAR Activity Symantec Online Network for Advanced Response (SONAR) identifies new threats based on the suspicious behavior of applications.
Maintaining total protection About monitoring protection features Firewall - Network and Connections The firewall monitors the communications between your computer and other computers on the Internet. The Firewall - Network and Connections category in the Security History window displays information about the networks that your computer connects to. It also displays the actions that you have taken to trust or to restrict networks and computers.
Maintaining total protection About monitoring protection features Firewall - Activities The firewall monitors the communications between your computer and other computers on the Internet. The firewall maintains rules to control Internet access to and from your computer. The Firewall - Activities view in the Security History window displays the rules that firewall creates. The rules that you create also appear in this view.
Maintaining total protection About monitoring protection features Download Insight Download Insight processes any executable file that you download for analysis of its reputation level. It then informs you about the processing results based on the Download Insight settings. The Download Insight view in the Security History window displays details of all events that Download Insight processes and notifies.
Maintaining total protection About monitoring protection features Norton Product Tamper Protection Norton Product Tamper Protection lets you protect your Norton product from any attack or modification by unknown, suspicious, or malicious applications. The Norton Product Tamper Protection view in the Security History window displays details about unauthorized attempts to modify Symantec processes. The tasks that your Symantec product blocks also appear in the list.
Maintaining total protection About monitoring protection features Network Cost Awareness Network Cost Awareness lets you set up policies and restrict the Internet usage of Norton 360. You can define the amount of network bandwidth that Norton 360 can use. The Network Cost Awareness view in the Security History window provides details about the actions that you performed to restrict the Internet usage of Norton 360.
Maintaining total protection About monitoring protection features Norton Error Reporting Norton 360 may generate errors in some cases. For example, an error can occur when you run LiveUpdate or scan a folder. Engine errors, timeout errors, and program errors are some of the types of errors. The Norton Error Reporting view in the Security History window displays any error that Norton 360 has generated.
Maintaining total protection About monitoring protection features Norton Community Watch The Norton Community Watch feature lets you submit any suspicious security or suspicious application data to Symantec for analysis. Symantec assesses the data to determine the new threats. The Norton Community Watch view in the Security History window displays a list of files that you have submitted to Symantec for analysis. Files, at various stages of submission, also appear in the list.
Maintaining total protection About monitoring protection features File Cleanup The File Cleanup feature removes unwanted temporary files including leftover Internet browser files, Internet search words, and other temporary files. The File Cleanup view in the Security History window shows the list of the File Cleanup activities that were performed on your computer. Disk Optimization Disk optimization is a process in which the physical locations of files are streamlined.
Maintaining total protection About monitoring protection features Silent Mode Silent Mode suppresses alerts and notifications and temporarily suspends most of the background activities. The Silent Mode view in the Security History window displays the summary of the Silent Mode sessions.
Maintaining total protection About monitoring protection features 139 4 Click a row to view details for that item. If you want to view additional information about an item, click the More Details option in the Details pane or double-click the particular row. You can view the advanced details about the item in the Security History-Advanced Details window and take actions as needed.
Maintaining total protection About monitoring protection features The following table lists the categories that provide the advanced details about the Security History items: Alert Summary Displays the following information about the item: 1 Severity 1 This category displays the risk level of the selected item. The various levels of security risks are High, Medium, Low, and Info. Activity 1 This category displays the activity that was performed by Norton 360.
Maintaining total protection About monitoring protection features Actions 141
Maintaining total protection About monitoring protection features Displays the actions that are available for the selected item The options in the Actions view vary depending on the options that are available in the Show drop-down list in the Security History window. The following are some of the Actions options: 1 Trust This action allows access to or from the selected computer or all of the unclassified computers on the selected network.
Maintaining total protection About monitoring protection features This action removes the restricted status from the selected computer or from all of the unclassified computers on the selected network. 1 This option is available in the Security History - Firewall Network and Connections view. View Rule This action shows the firewall rule that is used to control the Internet access attempts by the selected program in the Program Control window of Norton 360.
Maintaining total protection About monitoring protection features 1 Stop Notifying Me This action prevents Norton 360 from notifying you when it blocks the selected attack signature in the future. 1 This option is available in the Security History - Intrusion Prevention view. Notify Me This action allows Norton 360 to notify you when it blocks the selected attack signature in the future. This option is available in the Security History - Intrusion Prevention view.
Maintaining total protection About monitoring protection features 145 events that are related to Security Risks, Download Insight, and Performance. The File Insight window lets you view more details of events that belong to some of the following categories in the Security History window: Resolved Security Risks Lets you view the detailed information about the resolved security risks in an organized way.
Maintaining total protection About monitoring protection features Unresolved Security Risks Lets you view the detailed information about the unresolved security risks in an organized way. The Unresolved Security Risks category includes the infected files for which Norton 360 was not able to take any action. This category mostly includes the low-level risks that require your attention for a suitable action.
Maintaining total protection About monitoring protection features Performance Alert 147 Lets you view the performance details of any File of Interest that is available on your computer. The information includes the general details, the origin and lineage information, the resource usage, and the actions that the file has performed on your system. The File Insight window provides various details about the Security History item. These details are classified in different tabs in the File Insight window.
Maintaining total protection About monitoring protection features Origin Provides the lineage details of a file. You can view the file name and the URL of the source from where the file was downloaded. The lineage details of a file are available only if you downloaded or created the file after you installed Norton 360. If the historical details of w a file are not available, Norton 360 disables this Origin section.
Maintaining total protection About monitoring protection features Restore 149 Let you return the security risk that is quarantined to the original location on your computer. Returns the selected Quarantine item to its original location without repairing it and excludes the item from being detected in the future scans. If you do not want to exclude the item from future scans uncheck the check box available in the Quarantine Restore window.
Maintaining total protection About monitoring protection features Unresolved Security Risks This category includes the security risks or the infected files that Norton 360 was not able to repair, remove, or quarantine. Quarantine This category includes the security risk items that are isolated from the rest of your computer while they await your attention for a suitable action. The action options in the Threat Detected window for a risk vary depending on the risk type and its severity level.
Maintaining total protection About monitoring protection features Get help Takes you to the Symantec Security Response Web site Submit to Symantec Sends the security risk to Symantec 151 Searching in Security History You can search the items that are listed in Security History. You can use the Quick Search option to find items using a keyword or the name of a security risk.
Maintaining total protection About monitoring protection features option to save the list in the Security History log. You can later import the log file and analyze the data. Security History stores the information in a separate file. When the file size reaches its maximum size limit, information that is related to new events overwrites the information that is related to older events. You can export the log periodically, if you want to keep the entire Security History information.
Maintaining total protection About monitoring protection features 153 5 In the Save As dialog box that appears, navigate to a location and specify the name for the file. The category name in the Show drop-down list appears as the default file name. You can provide a file name of your choice. 6 In the Save as type box, select the format in which you want to save your log file. 7 Click Save. To import Security History information 1 In the Norton 360 main window, click Tasks.
Maintaining total protection About monitoring protection features The Security History Quarantine includes the following groups of items: Security risks Includes the items such as spyware and adware that are generally low risk and that another program requires to function properly. You can restore these items if necessary. Security threats Includes viruses and other high-risk items. Once an item has been quarantined, you have several options.
Maintaining total protection About monitoring protection features 155 3 In the Threat Detected window, select the action that you want to perform. Some of the options are: Restore Returns the security risk that is quarantined to the original location on your computer This option is available only for the detected viral threats.
Maintaining total protection About monitoring protection features Adding an item to the Quarantine Security History Quarantine provides a safe location on your computer in which you can isolate items while you decide on an action to take on each item. The Quarantine view in the Security History window displays a list of quarantined items. You can view the name and the risk status of each quarantined item. You can manually add an item to the Security History Quarantine.
Maintaining total protection About monitoring protection features 157 functionality of a program that requires the risk program to run. For example, a shareware or freeware program that you download may use adware to keep its price low. In this case, you can allow the security risk program to remain on your computer or restore it if Spyware Protection has removed it. Some quarantined items are successfully disinfected after Norton 360 rescans them. You can also restore such items.
Maintaining total protection About monitoring protection features to remove the security risk and places it in the Security History Quarantine. Some programs may rely on the security risk item that you quarantine to function. In this case, you can restore the security risk to regain the functionality of a program that requires the risk program to run. w The Restore option is only available for the security risks that are manually quarantined.
Maintaining total protection About viewing details of system vulnerabilities 159 volume. These items appear as Not Submitted in Security History. To manually submit an item to Symantec 1 In the Security History window, in the Quarantine view, select the item that you want to submit to Symantec. 2 In the Details pane, click Restore & Options. 3 In the Threat Detected window, click Submit to Symantec. 4 In the dialog box that appears, click OK.
Maintaining total protection About viewing details of system vulnerabilities attacks. It also provides information about the known attacks that they are protected from. Vulnerabilities are flaws in your programs or your operating system that can create weaknesses in overall security of your system. Improper computer configurations or security configurations also create vulnerabilities. External attackers exploit these vulnerabilities and perform malicious actions on your computer.
Maintaining total protection About viewing details of system vulnerabilities 161 For each program, you can view details such as the name of the program, its vendor, and the number of vulnerabilities that the program contains. You can also view more details about the vulnerabilities by clicking on the program name. To view the list of vulnerable programs 1 In the Norton 360 main window, click Tasks. 2 In the Tasks window, under General Tasks, click Check Vulnerability Protection.
Maintaining total protection About viewing details of system vulnerabilities To view details about a vulnerable application 1 In the Norton 360 main window, click Tasks. 2 In the Tasks window, under General Tasks, click Check Vulnerability Protection. 3 In the Vulnerability Protection window, in the Program column, click the program name for which you want to view the details. 4 In the Program Vulnerability Details window, view the signature details of the program.
Scanning your computer 4 This chapter includes the following topics: 1 About the Norton 360 scans 1 About Computer Scan 1 About Insight Network scan 1 About Reputation Scan 1 About Scan Facebook Wall 1 About SONAR Protection 1 About scanning Office documents 1 About Silent Mode 1 About boot time protection 1 About Early Launch Anti-Malware Protection 1 Running a scan at the command prompt About the Norton 360 scans Norton 360 scans secure your computer from all types of viruses and u
Scanning your computer About the Norton 360 scans Norton 360 automatically performs different types of scans to secure your computer from latest threats. It also lets you run different types of scans manually to secure your computer. By using Norton 360, you can run the following types of scans: Computer Scan Computer Scan uses the latest virus definitions that are available locally in the computer.
Scanning your computer About the Norton 360 scans Reputation Scan Reputation Scan displays the reputation information of the files on your computer. It displays the reputation information such as trust level, prevalence, stability rating, and resource usage. Reputation Scan displays the detailed reputation information of the good files and the number of bad files that have been detected or removed. Reputation Scan also internally performs Computer Scan and Insight Network Scan to detect the threats.
Scanning your computer About Computer Scan Scan Facebook Wall Scan Facebook Wall lets you scan the links and URLs that are available on your Facebook profile. When you click the Scan Facebook Wall option, Norton 360 takes you to the Facebook login Web page. After you log in to your Facebook profile, Norton Safe Web asks you to grant permission to access your Facebook wall.
Scanning your computer About Computer Scan 167 of the Computer Scan displays the threat as Trojan.Foo. You can click the Run Scans option available in the Tasks window to access the different types of computer scans. If you suspect that your computer is infected, you can run three types of computer scans manually to prevent virus infections on your computer.
Scanning your computer About Computer Scan Custom Task Runs LiveUpdate, backup, and disk optimization tasks. Runs LiveUpdate, backs up your data, frees disk space, and optimizes your disk volume. Computer Scan provides details about the scanned items. You can view the details such as total number of files scanned, security risks detected, security risks resolved, and the total items that require attention.
Scanning your computer About Computer Scan 169 3 Click Go. You can use the following options: Pause Suspends the scan temporarily. Click Resume to continue the scan. Skip Skips the current scan. Cancel Terminates a Quick Scan. 4 On the Results Summary window, do one of the following: 1 If no items require attention, click Finish. 1 If there are items require attention, review the risks in the Threats Detected window.
Scanning your computer About Computer Scan 3 Click Go. 4 After the scan is complete, in the Scans window, click Close. Scanning selected drives, folders, or files Occasionally, you might want to scan a particular file, removable drives, any of your computer's drives, or any folders or files on your computer. For example, when you work with removable media and suspect a virus, you can scan that particular disk.
Scanning your computer About Computer Scan 171 4 In the Scans window, do one of the following: 1 To scan specific drives, click Run next to Drive Scan, select the drives that you want to scan, and then click Scan. 1 To scan specific folders, click Run next to Folder Scan, select the folders that you want to scan, and then click Scan. 1 To scan specific files, click Run next to File Scan, select the files that you want to scan, and then click Add. You can also press Ctrl, and select multiple files to scan.
Scanning your computer About Computer Scan computer. Viruses, spyware, and other risks often target these areas. If your most recent scan was a Full System Scan, this window shows the results of a comprehensive scan of your entire computer.
Scanning your computer About Computer Scan 173 About custom scans You can create a custom scan if you regularly scan a particular segment of your computer. This custom scan lets you scan the segment frequently without having to specify it every time. You can also schedule the custom scan to run automatically on specific dates and times or at periodic intervals. You can schedule a scan according to your preferences.
Scanning your computer About Computer Scan 5 In the New Scan window, in the Scan Name box, type a name for the scan. You cannot specify a scan name that is already in use. 6 On the Scan Items tab, add the items that you want to scan. See “Selecting the scan items” on page 174. 7 On the Scan Schedule tab, set the frequency and time at which you want to perform the scan. See “Scheduling a scan” on page 178. 8 On the Scan Options tab, configure the scan options as required.
Scanning your computer About Computer Scan 175 5 In the window that appears, on the Scan Items tab, do the following: 1 To add drives, click Add Drives, in the Scan Drives dialog box, select the drives to be scanned, and click Add. 1 To add folders, click Add Folders, in the Scan Folders dialog box, select the folders to be scanned, and click Add. 1 To add files, click Add Files, in the Files to Scan dialog box, select the files to be scanned, and then click Add.
Scanning your computer About Computer Scan 5 In the Edit Scan window, on the Scan Options tab, configure the scan options as required. 6 Click Save. Editing a custom scan You can edit a custom scan that you created. You can include additional files or folders to the scan or remove the files and folders that you do not want to scan. You can also change the name of the scan. You can edit a custom scan in the Scans window.
Scanning your computer About Computer Scan 177 To run a custom scan 1 In the Norton 360 main window, click Security, and then click Run Scans. 2 In the Scans window, under Computer Scans, click Custom Scan. 3 Click Go. 4 In the Scans window, click Run next to the custom scan that you want to run. You can use the following options to suspend a custom scan: Pause Suspends a custom scan temporarily. Click Resume to continue the scan. Stop Terminates a custom scan. Click Yes to confirm.
Scanning your computer About Computer Scan 4 In the Scans window, in the Delete column, click the delete icon next to the custom scan that you want to delete. 5 Click Yes to confirm that you want to delete the scan. About scheduling scans Norton 360 automatically detects the idle state of your computer and runs a Full System Scan. However, you can schedule a Full System Scan according to your preferences. You can also set up a schedule for a Quick Scan and custom virus scans that you create.
Scanning your computer About Computer Scan w 179 Norton 360 lets you select multiple dates if you schedule a monthly scan. To schedule a custom scan 1 In the Norton 360 main window, click Security, and then click Run Scans. 2 In the Scans window, under Computer Scans, click Custom Scan. 3 Click Go. 4 In the Scans window, in the Edit Scan column, click the edit icon next to the custom scan that you want to schedule.
Scanning your computer About Computer Scan 7 Under After scan completion:, select the state at which your computer should be after the scan is complete. Your options are: 1 Stay On 1 1 1 Turn Off Sleep This option works only if you have configured the power options in your computer using the Windows Control Panel. Hibernate This option works only if you have configured the power options in your computer using the Windows Control Panel. 8 Click Next. 9 In the Scan Options tab, click Save.
Scanning your computer About Computer Scan 181 5 In the Edit Scan window, under When do you want the scan to run?, set the frequency and time at which you want the scan to run. Most of the frequency options include the additional options that you can use to refine the schedule. Set the additional options as required. 6 Click Next. 7 In the Scan Options tab, click Save.
Scanning your computer About Insight Network scan Editing a scheduled scan You can change the schedule of any scheduled custom scan, Quick Scan, or Full System Scan from the Scans window. To edit a scheduled scan from Norton 360 Scans dialog box 1 In the Norton 360 main window, click Security, and then click Run Scans. 2 In the Scans window, under Computer Scans, click Custom Scan. 3 Click Go. 4 In the Scans window, in the Edit Scan column, click the edit icon next to the scan that you want to edit.
Scanning your computer About Insight Network scan 183 When the Insight Protection option is turned on, Norton 360 performs a traditional scan and an Insight Network scan simultaneously. The traditional scan uses the definitions from the local system, and the Insight Network scan uses the definitions that are hosted in the Cloud. Threat detection based on the Cloud definitions is identical to the threat detection that is based on the local definitions.
Scanning your computer About Insight Network scan When you right-click a file, the shortcut menu displays Norton 360 and then Insight Network Scan. You can use this command to scan a file using both local definitions and definitions that are hosted in the Cloud. w This Insight Network Scan command is available only for single file.
Scanning your computer About Reputation Scan 185 4 In the Insight Protection row, do one of the following: 1 To turn off Insight Protection, move the On/Off switch to the right to the Off position. 1 To turn on Insight Protection, move the On/Off switch to the left to the On position. 5 In the Settings window, click Apply. About Reputation Scan Reputation Scan provides information on the trust-worthiness of all programs and processes running on your computer.
Scanning your computer About Reputation Scan Computer Scan. Norton 360 uses the Computer Scan to perform the signature-based threat detection. It compares the signature of the filtered reputation files against the known threat signatures to identify threats on your computer. If a security threat is detected, Norton 360 automatically removes the threat from your computer.
Scanning your computer About Reputation Scan System files This category includes Windows System files (.sys), dynamic link library files (.dll), and device driver files (.drv). Developer files This category includes ActiveX control files (.ocx). Miscellaneous files This category includes Windows Installer Package files (.msi) and resource-only DLL files (.loc). Norton 360 lets you scan specific areas of your computer based on the type of Reputation Scan that you select.
Scanning your computer About Reputation Scan Full System Scan Scans all the Files of Interest that are available on your computer. When you perform a Full System Scan, Norton 360 searches for Files of Interest on all the locations on your computer. The locations include all drives, running processes, loaded programs, and startup files. Custom Scan Scans a specific file, folder, drive, or removable drive. When you perform a custom scan, Norton 360 considers only the filtered reputation files.
Scanning your computer About Reputation Scan Poor 189 Symantec has a few indications that the file is not trusted. This file is suspicious and can harm your computer. Bad Symantec has a high indication that the file is not trusted. This file is suspicious and can harm your computer. When the Reputation Scan is complete, you can view the summary of the scan results in the Norton Reputation Scan window.
Scanning your computer About Reputation Scan 4 If there is a file with Poor or Bad trust level, under the Trust Level column, click the red cross (x) icon. 5 In the Quarantine File window, click Quarantine this file. 6 In the Manual Quarantine window, click Add. 7 Click Close. 8 In the Norton Reputation Scan window, click Close. Running a Reputation Quick Scan When you perform a Quick Scan, Norton 360 scans only the running processes and the loaded programs.
Scanning your computer About Reputation Scan 191 check the trust level of a specific file, you can scan the particular file. To run a Reputation custom scan 1 In the Norton 360 main window, click Security, and then click Run Scans. 2 In the Scans window, under Reputation Scan, click Custom Scan. 3 Click Go. 4 In the Reputation Custom Scan window, do one of the following: 1 Click Drive Scan, select the drive that you want to scan, and then click Scan.
Scanning your computer About Reputation Scan When you run a Reputation Quick Scan, Norton 360 considers the Files of Interest which include running processes and loaded programs. When you run a Reputation Full System Scan, Norton 360 considers all the Files of Interest that are available on your computer. When you run a Reputation custom scan, Norton 360 lets you select the drive, folder, or file that you want to scan.
Scanning your computer About Reputation Scan 193 You can view the number of trusted files that are on your computer. You can also view the total number of files that Symantec analyzes within the Norton Community. w Your computer must be connected to the Internet to view these details. Norton 360 connects to the Symantec servers to collect the reputation information. The bottom of the Norton Reputation Scan window displays the reputation information of each scanned item.
Scanning your computer About Reputation Scan Trust Level Indicates the trust level that is assigned to a file. Symantec analyzes specific information about a file such as the digital signature and the hash value to determine the trust level of a file. Symantec rates a file based on the statistical evaluation that is done on the file using the Norton Community Watch data and Symantec’s analysis.
Scanning your computer About Reputation Scan Community Usage Indicates the community usage level of the file. The search results are grouped in to the following categories: 1 1 1 Very Few Users: Shows the files that have very low community usage. Few Users: Shows the files that have average community usage. Many Users: Shows the files that have very high community usage. You can also use the community usage of a file to determine the legitimacy of the file.
Scanning your computer About Reputation Scan Resource Usage Indicates the system resource usage level of the file. The usage levels are as follows: 1 1 1 1 Low: Indicates that the file consumes minimum system resources. Moderate: Indicates that the file consumes moderate system resources. High: Indicates that the file consumes maximum system resources. Unknown: Indicates that the file has performed no action in your computer.
Scanning your computer About Scan Facebook Wall Stability 197 Indicates the stability rating of the file. The stability rating depends on how frequently the program crashes. The different stability ratings are as follows: 1 1 1 1 1 1 Reliable: Indicates that the program is reliable. Stable: Indicates that the program is comparatively stable. However, it crashes sometimes. Slightly Unstable: Indicates that the program is slightly unstable. Unstable: Indicates that the program is unstable.
Scanning your computer About Scan Facebook Wall you are not only protected from unsafe sites but you can also let other Facebook users know the security status of any Web site. However, Norton Safe Web requires your permission to scan the URLs that are available on your Facebook Wall. When you install the Norton Safe Web Facebook App, Norton Safe Web App asks for your permission to access your Facebook Wall. You can choose to allow or deny permission to let Norton Safe Web access your Facebook Wall.
Scanning your computer About Scan Facebook Wall 199 The following are the safety states that Norton Safe Web provides after it scans the links on your Facebook Wall: Safe Indicates that the site is safe to visit and Norton Trusted. The sites with this rating do not harm your computer and so you can visit this site. Warning Indicates that the site has security risks. The sites with this rating may install malicious software on your computer. Symantec recommends that you do not visit this site.
Scanning your computer About SONAR Protection To enable your Facebook Wall 1 In the Norton 360 main window, click Security, and then click Run Scans. 2 In the Scans window, under Scan Facebook Wall, click Scan Facebook Wall. 3 Click Go. 4 In the Facebook login Web page, log in to your Facebook profile. 5 In the Request for permission page, click Allow. 6 In the Web page that appears, click Please grant us permission to access your News Feed and Wall.
Scanning your computer About SONAR Protection 201 suppress the SONAR notifications by disabling the Show SONAR Block Notifications option. The View Details link in the notification alert lets you view the summary of the resolved high-certainty threats. You can also view the details under Resolved Security Risks category in the Security History window. Turning off or turning on SONAR Protection SONAR protects you against malicious code even before virus definitions are available through LiveUpdate.
Scanning your computer About SONAR Protection and proactively detects unknown security risks on your computer. SONAR identifies emerging threats based on the behavior of applications. SONAR identifies threats quickly compared to the traditional signature-based threat detection techniques. SONAR detects and protects you from malicious programs even before virus definitions are available through LiveUpdate. SONAR monitors your computer for malicious activities using heuristic detections.
Scanning your computer About SONAR Protection 203 To exclude high-risk security threats from scanning 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click Antivirus. 3 In the Antivirus settings window, click the Scans and Risks tab. 4 Under Exclusions / Low Risks, do one of the following: 1 In the Items to Exclude from Scans row, click Configure. 1 In the Items to Exclude from Auto-Protect, SONAR and Download Intelligence Detection row, click Configure.
Scanning your computer About SONAR Protection window. The Signature Exclusions window contains the list of all security risks that can be excluded from Norton 360 scans. For each security risk, you can view the risk details and the effect of the risk on your computer. To add security risks to the Signature Exclusions window, go to the Norton 360 main window, and then click Settings > Antivirus > Scans and Risks > Exclusions / Low Risks > Signatures to Exclude from All Detections > Configure.
Scanning your computer About SONAR Protection 205 About clearing file IDs that are excluded during scans When you run a Reputation Scan, Norton 360 provides information on the trust-worthiness of all programs and processes running on your computer. Reputation Scan helps you detect the files that are suspicious or vulnerable on your computer using the reputation-based threat detection.
Scanning your computer About scanning Office documents again. This can improve the scan performance of Norton 360 on your computer. However, if you want Norton 360 to scan all the files in your computer, you must clear the reputation information of the excluded files. w When you clear IDs of files that are excluded during scans, it might take a longer time to complete scan. Norton 360 excludes the Trusted and Good files from being scanned.
Scanning your computer About scanning Office documents excel.exe Microsoft Excel powerpnt.exe Microsoft PowerPoint visio.exe Microsoft Visio msaccess.exe Microsoft Access winproj.exe Microsoft Project 207 Norton 360 scans the Office documents and protect against threats, including virus macros and infected embedded objects. By default, Microsoft Office Automatic Scan option, under Computer Scans, in the Antivirus settings window is turned off.
Scanning your computer About Silent Mode 4 In the Microsoft Office Automatic Scan row, do one of the following: 1 To turn on Microsoft Office Automatic Scan, move the On/Off switch to the left to the On position. 1 To turn off Microsoft Office Automatic Scan, move the On/Off switch to the right to the Off position. 5 In the Settings window, click Apply, and then click Close. About Silent Mode Norton 360 provides many solutions and features to handle viruses and other security threats.
Scanning your computer About Silent Mode Quiet Mode 209 Norton 360 turns on this option automatically when it detects a disk burning task or a Media Center TV recording task. Norton 360 also turns on Quiet Mode automatically when you run a program that you included in the Quiet Mode Programs list. Norton 360 turns off Quiet Mode when the disk burning session or TV program recording session is complete.
Scanning your computer About Silent Mode About the Silent Mode that you turn on manually Norton 360 lets you manually turn on Silent Mode for a specified duration. When Silent Mode is turned on, Norton 360 suppresses alerts and suspends background activities for the duration that you specify. You can verify the turn-on status of Silent Mode in the notification area, at the far right of the taskbar.
Scanning your computer About Silent Mode 211 To turn on Silent Mode from the Administrative Settings window 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click Administrative Settings. 3 Under Silent Mode Settings, in the Silent Mode row, move the On/Off switch to the left to the On position. 4 In the Settings window, click Apply.
Scanning your computer About Silent Mode 2 In the Performance window, click Norton Tasks. 3 In the Norton Tasks window, under Silent Mode, move the On/Off switch to the right to the Off position. 4 Click Close in the Norton Tasks window. To turn on Silent Mode from the notification area 1 In the notification area on the Windows taskbar, right-click the Norton 360 icon, and then click Turn on Silent Mode.
Scanning your computer About Silent Mode 213 ensure high performance of your computer. The activities that are suspended run after you finish using the application in the full-screen mode. Silent Mode also helps you maintain an uninterrupted Media Center Extender session. A Media Center Extender session is an extended session of Media Center to an entertainment device, such as a television.
Scanning your computer About Silent Mode 3 In the Full Screen Detection row, move the On/Off switch to the left to the On position. 4 In the Settings window, click Apply. 5 Click Close. About Quiet Mode Norton 360 automatically enables Quiet Mode when you perform tasks that require higher utilization of your system resources. When Quiet Mode is turned on, Norton 360 suspends the background activities and lets the task use the maximum resources for better performance.
Scanning your computer About Silent Mode 215 The following table explains about the various options: IMAPI 2.0 Disk Burn When you use a Media Center application to burn a CD or a DVD, Norton 360 automatically enables Quiet Mode, if the IMAPI 2.0 Disk Burn option is turned on. By default, the IMAPI 2.0 Disk Burn option is turned on. When Quiet Mode is enabled, Norton 360 suspends background activities to improve the performance of your disk-burning session.
Scanning your computer About Silent Mode Media Center TV Recording When you use a Media Center application to record a TV program, Norton 360 automatically enables Quiet Mode, if the Media Center TV Recording option is turned on. By default, the Media Center TV Recording option is turned on. When Quiet Mode is enabled, Norton 360 suspends background activities to improve the performance of your TV program recording session.
Scanning your computer About Silent Mode 217 User-Specified Programs Norton 360 automatically turns on Quiet Mode when it detects a TV program recording session or a disk-burning session. In addition, you can manually add the programs for which you want Norton 360 to turn on Quiet Mode to the Quiet Mode Programs list. When Norton 360 detects a running instance of a program that you added in the list, it automatically turns on Quiet Mode.
Scanning your computer About Silent Mode To turn off or turn on IMAPI 2.0 Disk Burn 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click Administrative Settings. 3 In the Silent Mode Settings, under Quiet Mode on Detection of, do one of the following: 1 To turn off detection of a disk burning session, in the IMAPI 2.0 Disk Burn row, move the On/Off switch to the right to the Off position.
Scanning your computer About Silent Mode 219 turn on Quiet Mode to the Quiet Mode Programs list. When Norton 360 detects a running instance of a program that you added in the list, it automatically turns on Quiet Mode. When Quiet Mode is turned on, Norton 360 suspends the background activities but does not suppress alerts and notifications. You can also add a running program to the Quiet Mode Programs list.
Scanning your computer About Silent Mode To add a program 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click Administrative Settings. 3 In the Silent Mode Settings, under Quiet Mode on Detection of, in the User-Specified Programs row, click Configure. 4 In the Quiet Mode Programs window, click Add. 5 In the Add Program dialog box, navigate to the location of the file that you want to add to the Quiet Mode Programs list.
Scanning your computer About boot time protection 221 5 In the confirmation dialog box, click Yes. 6 In the Quiet Mode Programs window, click Apply and then click OK. About boot time protection The boot time protection feature provides enhanced security level from the time you start your computer. It ensures better security by running all the necessary components that are required for computer protection as soon as you start your computer.
Scanning your computer About Early Launch Anti-Malware Protection Configuring boot time protection The boot time protection feature provides enhanced security level from the time you start your computer. As soon as you start your computer, Norton 360 starts Auto-Protect and all required drivers and plug-ins start functioning. This feature ensures higher level of security from the moment you turn on your computer. To configure boot time protection 1 In the Norton 360 main window, click Settings.
Scanning your computer Running a scan at the command prompt 223 Turning on or turning off Early Launch Anti-Malware Protection The Early Launch Anti-Malware Protection feature provides enhanced security level during the boot time when you start your computer. It ensures better protection by running all the necessary components of Norton 360 that are required to block any malware from functioning when you start your computer. w This option is available only on Windows 8.
Scanning your computer Running a scan at the command prompt to scan or customize the scan by adding a specific command. The following commands are available: /? NAVW32 launches help and terminates.
Scanning your computer Running a scan at the command prompt [drive|folder|file] Scans the specified drive, folder, or file /SESCAN Performs Quick Scan in the background. 225 Norton 360 w displays the scans window only when a threat is detected. To run a scan from the command prompt 1 At the command prompt, type the path in which Norton 360 is located and the executable's file name.
Scanning your computer Running a scan at the command prompt
Responding to security issues 5 This chapter includes the following topics: 1 What to do if a security risk is found What to do if a security risk is found Your product provides many solutions and features for handling viruses and other security threats that it detects. When Norton 360 detects a security risk on your computer, you must take appropriate action on the risk. Norton 360 notifies you when it detects a security risk.
Responding to security issues What to do if a security risk is found In some cases, Norton 360 might not identify an item as a security threat, but you might suspect that the item is infected. In such cases, you can submit the item to Symantec for further analysis. In addition, your product provides solutions for security risks, such as spyware and adware. About detecting viruses, spyware, and other risks Viruses and other security threats can be detected during a manual or customized scan.
Responding to security issues What to do if a security risk is found 229 Security History also includes information about spyware, adware, and other security risks. Reviewing Auto-Protect notifications Auto-Protect scans files for viruses, worms, and Trojan horses when you perform an action with them, such as moving them, copying them, or opening them. It also scans for spyware, adware, and other security risks.
Responding to security issues What to do if a security risk is found 3 In the Show drop-down list, select the category for which you want to review Auto-Protect alerts. Your options are: Recent History Review Auto-Protect notifications that you received in the last seven days. Full History Review all of the Auto-Protect notifications that you have received. Resolved Security Risks Review all of the resolved security threats.
Responding to security issues What to do if a security risk is found 231 4 In the right pane, click the Options link. The option name appears as Restore & Options for few items. If one or more security risks such as spyware are found, you can take action on these items, if required.
Responding to security issues What to do if a security risk is found 5 In the Threat Detected window, select the appropriate action on the risk. The following are some of the options that are available in the Threat Detected window: Restore & Exclude this file Returns the selected Quarantine item to its original location and excludes the item from being detected in the future scans. This option is available for the detected viral and non-viral threats.
Responding to security issues What to do if a security risk is found Remove this file (may cause browser to close) Removes the selected security risk from the computer and quarantines it. This option is available for the security risks that require your attention for manual removal. This option is also available for the security risks that are manually quarantined. Remove from history Removes the selected security risk item from the Security History log.
Responding to security issues What to do if a security risk is found Submit to Symantec Sends the security risk to Symantec. In some cases, Norton 360 might not identify an item as a security threat, but you might suspect that the item is infected. In such cases, you can use this option to submit the item to Symantec for further analysis. About responding to risks detected during a scan At the end of a scan, the Results Summary window provides the summary of the scan results.
Responding to security issues What to do if a security risk is found 235 checks for the infections that have processes running in memory. It also checks for the infections that the start-up files and folders refer. If that does not work, read the information on the Security History - Advanced Details window to identify the types of files that cannot be repaired. You can take one of the following actions, depending on the file type: Infected files You can view the file type of the detected risk.
Responding to security issues What to do if a security risk is found
Understanding alerts and messages 6 This chapter includes the following topics: 1 About Norton 360 alerts and messages 1 About managing messages and alerts 1 Types of risks 1 Types of threats 1 Types of viruses About Norton 360 alerts and messages Most of the time, Norton 360 quietly protects your computer from viruses and other risks and threats so that you can use your PC with confidence.
Understanding alerts and messages About managing messages and alerts You might see messages in the following locations: Notification area on your Windows desktop Several types of Norton 360 messages appear in the notification area, at the far right of the taskbar. For example, your PC was turned off, or it has not been connected to the Internet for a while. In this case, you see a message that your protection may not be up to date. A different alert appears if a security setting was turned off.
Understanding alerts and messages Types of risks Norton 360 protection categories and details 239 Norton 360 displays individual status areas for each protection feature, such as Security, Identity, Backup, and Tuneup. The status areas show how many issues need to be resolved for each feature. You can use View Details under each status area for more information about those issues. You can use the Fix Now option to fix all the issues that need to be resolved to secure your computer.
Understanding alerts and messages Types of threats Vulnerabilities These risks consist of flaws in legitimate software that can be exploited, either to cause damage, block data, or steal information. Vulnerabilities are usually exploited through network connections. Types of threats Threats consist of the software that has been deliberately designed to destroy, modify, disclose, or block your data.
Understanding alerts and messages Types of viruses 241 Types of viruses A virus is a small program that is designed to alter the way your PC operates, without your knowledge or permission. To be a virus, a program must do the following: 1 Run on its own, without you having to take any action 1 Make copies of itself so that it can spread to other PCs Although not all viruses are intended to cause damage, even harmless viruses can affect the performance and stability of your PC.
Understanding alerts and messages Types of viruses Multipartite viruses These viruses use the techniques of both boot and file infector viruses. Norton 360 scans for such viruses and eliminates them. Macro viruses These viruses attach themselves to the data files that contain executable components, such as some spreadsheet, presentation, and word-processing files. These viruses that are spread when a program runs the executable portion of a data file.
Doing routine tasks 7 This chapter includes the following topics: 1 Turning on or turning off automatic tasks 1 About custom task 1 About scheduling automatic tasks 1 About scheduling backups 1 Specifying Idle Time Out duration Turning on or turning off automatic tasks Norton 360 runs automatic tasks as it quietly works to protect your PC. These automatic tasks include scanning for viruses, monitoring your Internet connection, updating backups, and downloading protection updates.
Doing routine tasks About custom task see the results of the latest Norton 360 activities the next time you open the Norton 360 main window. To see a current report of Norton 360 activities, you can view the summary in the Monthly Report window. To turn on or turn off automatic tasks 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click Tasks Scheduling.
Doing routine tasks About custom task 245 Internet Explorer Temporary Deletes the temporary files Files that are left behind on your PC's hard disk after Internet browsing. Windows Temporary Files Deletes the unnecessary files that are left in Windows Temporary folders after a program has been installed or updated. Internet Explorer History Deletes the unnecessary Web page history that is left behind in your Internet browser's history folder.
Doing routine tasks About scheduling automatic tasks Norton 360 lets you choose your own combination of tasks for a one-time scan. You can run LiveUpdate, back up your data, free disk space by cleaning up disk clutter, and optimize your disks. To run custom tasks 1 In the Norton 360 main window, click Security, and then click Run Scans. 2 In the Scans window, under Computer Scan, click Custom Task, and then click Go. 3 In the Custom Tasks window, check the tasks that you want to run.
Doing routine tasks About scheduling automatic tasks Weekly 247 Examine your PC one or more times each week for security and performance issues. You can pick the days of the week and the time of day on which the scan performs. Monthly Examine your PC once each month for security and performance issues. You can pick the day of the month and the time of day on which the scan performs. Manual Schedule Do not perform a scheduled security or performance scan of your PC.
Doing routine tasks About scheduling backups 3 On the Scheduling tab, under Schedule, select an option. When you click Weekly or Monthly, you must select the time and day to run the automatic tasks. You also have the option of specifying that the automatic tasks must run only when the PC is idle. 4 Click Apply. 5 Click Close. About scheduling backups You can configure backup scheduling on the When tab in the Manage Backup Sets window to specify when and how often should Norton 360 back up your files.
Doing routine tasks Specifying Idle Time Out duration Manual Schedule 249 Does not perform any scheduled backups of changed files If you choose this option, you should manually back up your changed files regularly. Your computer's performance is maximized if you schedule your critical operations to occur when your computer is idle. When you schedule backup weekly or monthly and check Run only at idle time, Norton 360 backs up your files when your computer is idle.
Doing routine tasks Specifying Idle Time Out duration
8 Keeping secure on the Internet This chapter includes the following topics: 1 About the Smart Firewall 1 About Intrusion Prevention 1 About Download Insight 1 About Norton AntiSpam 1 About configuring POP3 and SMTP ports 1 About Network Cost Awareness About the Smart Firewall The Smart Firewall monitors the communications between your computer and other computers on the Internet.
Keeping secure on the Internet About the Smart Firewall Port scans Cloaks the inactive ports on your computer thereby providing protection against attacks through hacking techniques such as port scanning Intrusions Monitors the network traffic to or from your computer for suspicious behavior and stops any attack before they threaten your system A firewall blocks hackers and other unauthorized traffic, while it allows authorized traffic to pass.
Keeping secure on the Internet About the Smart Firewall 253 3 On the General Settings tab, in the Smart Firewall row, move the On/Off switch to the right to the Off position. 4 Click Apply. 5 In the Security Request window, in the Select the duration drop-down list, select the duration for which you want to turn off Smart Firewall. 6 Click OK. 7 Click Close. To turn on Smart Firewall 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click Firewall.
Keeping secure on the Internet About the Smart Firewall To turn on Smart Firewall from the notification area 4 In the notification area on the taskbar, right-click the Norton 360 icon, and then click Enable Smart Firewall. About firewall rules A firewall is a security system that uses rules to block or allow connections and data transmission between your computer and the Internet. Firewall rules control how the Smart Firewall protects your computer from malicious programs and unauthorized access.
Keeping secure on the Internet About the Smart Firewall pcAnywhere with that specific computer. It then processes the original rule and prevents its use with any other computer. About Traffic rules Norton 360 includes a number of predefined Traffic rules. These rules provide network functionality and protection from known Internet risks.
Keeping secure on the Internet About the Smart Firewall Default Allow Inbound NetBIOS Permit the use of the Name (Shared Networks) NetBIOS name service and the NetBIOS Default Allow Inbound NetBIOS datagram service that the (Shared Networks) Microsoft Network uses in file and printer sharing. NetBIOS is an acronym for Network Basic Input/Output System. NetBIOS provides name service, session service, and datagram service.
Keeping secure on the Internet About the Smart Firewall 257 You can add a new Traffic rule on this tab. You can also do the following activities: Modify a Traffic rule You can change the settings of a Traffic rule that does not function the way you want. However, you cannot modify some of the default rules that are read-only. See “Modifying Traffic rules and Program rules” on page 273. Turn off a Traffic rule You can disable a Traffic rule.
Keeping secure on the Internet About the Smart Firewall 1 Rename a program. 1 Modify the rules for a program. 1 Add a rule for a program. 1 Modify the access settings of a program rule. 1 Modify the priority of rules for a program by changing the sequence of rules in the list. Remove a program rule. 1 Remove a program. 1 View the trust level of a program.
Keeping secure on the Internet About the Smart Firewall Respond to alerts 259 Lets the firewall notify you when a program attempts to access the Internet. You can then allow or block Internet access for the program. In some instances, such as when you watch a movie, you might prefer not to be alerted with any messages. In such cases, you can turn on Automatic Program Control. Norton 360 does not prompt you with any firewall alerts in this state.
Keeping secure on the Internet About the Smart Firewall To add a program to Firewall settings 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click Firewall. 3 On the Program Rules tab, click Add. 4 In the Select a program dialog box, browse to the executable file for the program that you want to add. 5 Click Open. 6 In the Security Alert window, analyze the reputation information of the program.
Keeping secure on the Internet About the Smart Firewall 261 7 In the Options drop-down list, select the access level that you want this program to have. Your options are: Allow Always Allow all access attempts by this program. Block Always Deny all access attempts by this program. Manually configure Create the rules that control how this program accesses the Internet.
Keeping secure on the Internet About the Smart Firewall 3 On the Program Rules tab, in the Program column, select the program that you want to change. 4 In the drop-down list next to the program that you want to change, select the access level that you want this program to have. Your options are: Allow Allow all access attempts by this program. Block Deny all access attempts by this program. Custom Create the rules that control how this program accesses the Internet. 5 Click Apply.
Keeping secure on the Internet About the Smart Firewall 263 6 Click Apply. Adding Traffic rules and Program rules Firewall settings automatically create most of the firewall rules that you need. You can add custom rules if necessary. w Only experienced users should create their own firewall rules. You can add the following types of firewall rules: 1 Traffic rules 1 Program rules To add a Traffic rule 1 In the Norton 360 main window, click Settings.
Keeping secure on the Internet About the Smart Firewall To use the Add Rule Wizard 1 Open the Add Rule Wizard by creating a Traffic rule or a Program rule.
Keeping secure on the Internet About the Smart Firewall 265 2 In the first panel of the Add Rule Wizard, select the action that you want for this rule. Your options are: Allow Allow communication of this type. For example, consider a Traffic rule with the following criteria: all inbound connections from Internet address 192.168.1.1 through port 8080. When you select Allow, Smart Firewall allows all connections that satisfy the criteria of this Traffic rule. Block Prevent communication of this type.
Keeping secure on the Internet About the Smart Firewall Monitor
Keeping secure on the Internet About the Smart Firewall Update the Firewall – Activities category in the event log each time that communication of this type takes place. This option lets you monitor how often this firewall rule is used. Norton 360 notifies you every time that the traffic matching the monitor rule criteria passes through your computer. You can use the links in these notifications to view the logs.
Keeping secure on the Internet About the Smart Firewall Security History log entry option in the Add Rule Wizard or the Modify Rule Wizard. 3 Click Next. 4 Select the type of connection for the rule. Your options are: Connections to other computers The rule applies to outbound connections from your computer to another computer. Connections from other computers The rule applies to inbound connections from another computer to your computer.
Keeping secure on the Internet About the Smart Firewall 269 5 Click Next, and then select the computers that apply to the rule. Your options are: Any computer The rule applies to all computers. Any computer in the local subnet This rule applies only to computers in the local subnet. An organization’s network is divided into subnets to facilitate efficient Internet communications. A subnet represents all of the computers in the same LAN.
Keeping secure on the Internet About the Smart Firewall Only the computers and sites listed below The rule applies only to the computers, sites, or domains that you specify. You can specify the names and addresses of computers that apply to the rule. The details of the specified computers appear in the list. You can also remove computers from the list. When you select this option, the Add option becomes available.
Keeping secure on the Internet About the Smart Firewall 6 Click Next, and then select the protocols for the rule. Your options are: TCP The rule applies to TCP (Transmission Control Protocol) communications. UDP The rule applies to UDP (User Datagram Protocol) communications. TCP and UDP The rule applies to TCP and to UDP communications. ICMP The rule applies to ICMP (Internet Control Message Protocol) communications.
Keeping secure on the Internet About the Smart Firewall All The rule applies to all supported protocols. When you select this option, you cannot specify the types of communications or ports that apply to the rule. 7 Select the ports for the rule. Your options are: All types of communication (all The rule applies to ports, local and remote) communications that use any port. Only communications that The rule applies to the match all types and ports listed ports that you specify.
Keeping secure on the Internet About the Smart Firewall 273 8 Click Next. 9 Check Create a Security History log entry if you want Norton 360 to create an entry in the firewall event log. Norton 360 creates an entry when a network communication event matches this rule. You can view the event log in the Security History window under Firewall – Activities. If you selected the Monitor option in the Action window, then the Create a Security History log entry option is automatically checked.
Keeping secure on the Internet About the Smart Firewall 5 In the Modify Rule window, make the necessary changes to modify any aspect of the rule. 6 When you have finished changing the rule, click OK. To modify a Program rule 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click Firewall. 3 On the Program Rules tab, select the program that you want to change. 4 Click Modify.
Keeping secure on the Internet About the Smart Firewall 275 3 On the Traffic Rules tab, select the rule that you want to move. 4 Do one of the following: 1 To move this rule before the rule above it, click Move Up. 1 To move this rule after the rule below it, click Move Down. 5 When you are done moving the rules, click Apply. To change the order of Program rules 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click Firewall.
Keeping secure on the Internet About the Smart Firewall To turn off a Traffic rule temporarily 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click Firewall. 3 On the Traffic Rules tab, uncheck the box next to the rule that you want to turn off. 4 Click Apply. Allowing a blocked program Sometimes the Norton 360 firewall blocks certain programs from accessing the Internet.
Keeping secure on the Internet About the Smart Firewall 277 6 In the Security History - Advanced Details window, under Actions, click Allow. Removing a firewall rule You can remove some of the firewall rules if necessary. However, you cannot modify some of the default Traffic rules that appear in the list. You can view the settings of these rules by using the View option. w Do not remove a default firewall rule unless you are an advanced user.
Keeping secure on the Internet About the Smart Firewall About Norton Firewall Diagnosis There may be times when firewall may block the network traffic that you want to allow based on its configuration settings. In such cases, you may have issues in accessing the Internet, the Network, or another computer to perform tasks such as sharing resources. When you experience network connection problems, Norton Firewall acts quickly in identifying the cause of failure and provides its diagnosis.
Keeping secure on the Internet About the Smart Firewall 279 For each case of network block, the Wizard contains the firewall’s analysis of the cause and the possible solutions to fix the block. Norton 360 recommends that you use the Firewall Diagnostics Wizard to remove any type of block. The solutions in the Wizard let you analyze the issue and take a suitable action to resolve the problem.
Keeping secure on the Internet About the Smart Firewall w Automatic Program Control configures network access only for the versions of programs that Symantec recognizes as safe. Norton 360 blocks any infected program or process that attempts to connect to the Internet. However, if you have turned off Automatic Program Control, Norton 360 displays firewall alerts each time a program or process attempts to access the network.
Keeping secure on the Internet About the Smart Firewall 281 suspicious or vulnerable, Norton 360 assigns Poor or Bad trust level. w Your computer must be connected to the Internet to access the latest reputation information that Symantec collects. If your computer is not connected to the Internet, Norton 360 uses the reputation information that is available locally.
Keeping secure on the Internet About the Smart Firewall In the left pane of the firewall alerts, you can find the following reputation information: Stability Shows the stability rating of the file on your computer. The stability rating depends on how frequently the program crashes. The different stability ratings are as follows: 1 Reliable 1 Indicates that the program is reliable. Stable 1 Indicates that the program is comparatively stable. However, it crashes sometimes.
Keeping secure on the Internet About the Smart Firewall Prevalence Shows the user prevalence of the file. This data is based on the information that millions of Norton Community Watch customers shared and Symantec's research analysis. The different categories are: 1 Very Few Users 1 Indicates that the file has very low user prevalence. Few Users 1 Indicates that the file has average user prevalence. Many Users Indicates that the file has high user prevalence.
Keeping secure on the Internet About the Smart Firewall Trust Level Shows the trust level of the file. Symantec assigns the following trust levels: 1 1 1 1 1 Norton Trusted Indicates the file that is Norton Trusted. Good - Symantec has high indications that the file is trusted. Unproven - Symantec does not have enough information about the file to assign a trust level to the file. The file is neither safe nor unsafe. Poor - Symantec has only a few indications that the file is not trusted.
Keeping secure on the Internet About Intrusion Prevention 285 About Intrusion Prevention Intrusion Prevention scans all the network traffic that enters and exits your computer and compares this information against a set of attack signatures. Attack signatures contain the information that identifies an attacker's attempt to exploit a known operating system or program vulnerability. Intrusion Prevention protects your computer against most common Internet attacks.
Keeping secure on the Internet About Intrusion Prevention Turning off or turning on Intrusion Prevention notifications You can choose whether you want to receive notifications when Intrusion Prevention blocks suspected attacks. Whether or not you receive notifications, Intrusion Prevention activities are recorded in Security History. The Security History entries include information about the attacking computer and information about the attack.
Keeping secure on the Internet About Intrusion Prevention 287 6 Click OK. 7 In the Intrusion Signatures window, click OK. 8 In the Settings window, click Apply. Excluding or including attack signatures in monitoring In some cases, benign network activity may appear similar to an attack signature. You may receive repeated notifications about possible attacks.
Keeping secure on the Internet About Intrusion Prevention 5 Click OK. Turning off or turning on AutoBlock When an attack is detected from a computer, the attack is automatically blocked to ensure that your computer is safe. If a different attack signature is detected from the same computer, Norton 360 activates AutoBlock. The AutoBlock feature blocks all traffic between your computer and the attacking computer for a specific time period.
Keeping secure on the Internet About Intrusion Prevention 289 Unblocking AutoBlocked computers In some cases, benign network activity can appear to be similar to an attack and AutoBlock blocks the network activity automatically to ensure that your computer is safe. The list of computers that AutoBlock has currently blocked may include the computer that you should be able to communicate with. If a computer that you need to access appears on the list of blocked computers, you can unblock it.
Keeping secure on the Internet About Intrusion Prevention To permanently block a computer that has been blocked by AutoBlock 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click Firewall. 3 On the IntrusionandBrowserProtection tab, under Intrusion Prevention, in the Intrusion AutoBlock row, click Configure. 4 In the Intrusion AutoBlock window, under Computers currently blocked by AutoBlock, click the computer that you want to block permanently.
Keeping secure on the Internet About Intrusion Prevention 291 3 On the Intrusion and Browser Protection tab, in the Browser Protection row, do one of the following: 1 To turn off Browser Protection, move the On/Off switch to the right to the Off position. 1 To turn on Browser Protection, move the On/Off switch to the left to the On position. 4 Click Apply.
Keeping secure on the Internet About Intrusion Prevention When a device on your network attempts to infect your computer, AutoBlock stops all access requests from this device. If you add this device to the Intrusion Prevention exclusion list, Norton 360 removes the device from the exclusion list. w Ensure that the IP address of the devices that are added to Intrusion Prevention exclusion list never changes.
Keeping secure on the Internet About Download Insight 1 293 Your home network is infected. When a device on your network attempts to infect your computer, AutoBlock stops all the access requests from this device. If you add this device to the Intrusion Prevention exclusion list, Norton 360 removes the device from the exclusion list. When you remove all the devices from the saved exclusion list, Intrusion Prevention scans every request from all the devices that access your computer.
Keeping secure on the Internet About Download Insight 1 Yahoo (Browser) 1 MSN Explorer (Browser, E-mail & Chat) 1 QQ (Chat) 1 ICQ (Chat) 1 Skype (Chat) 1 MSN Messenger (Chat) 1 Yahoo Messenger (Chat) 1 Limewire (P2P) 1 BitTorrent (P2P) 1 Thunder (P2P) 1 Vuze (P2P) 1 Bitcomet (P2P) 1 uTorrent (P2P) 1 Outlook (E-mail) 1 Thunderbird (E-mail) 1 Windows Mail (E-mail) 1 Outlook Express (E-mail) 1 FileZilla (File Manager) 1 UseNext (Download Manager) 1 FDM (Download Man
Keeping secure on the Internet About Download Insight 295 and poor. Based on the reputation levels, the files can be broadly classified as follows: Safe Includes the files that are either Norton trusted or User trusted. Safe files have good reputation levels. These files do not harm your computer. By default, Auto-Protect allows the execution of the safe files. Unsafe Includes the files that Norton 360 identifies as a security risk or a threat.
Keeping secure on the Internet About Download Insight By default, Download Insight lets you install safe files. For files of unknown reputation levels, Download Insight prompts you to select an action that you want to perform on the file. In case of an unsafe file, Download Insight informs you that Norton 360 has detected the file as a threat and has removed the file.
Keeping secure on the Internet About Download Insight 297 Turning off or turning on Download Intelligence Download Insight protects your computer against any unsafe file that you may run or execute after you download it using a supported Web browser. By default, the Download Intelligence option is turned on. In this case, Download Insight notifies you about the reputation levels of any executable file that you download.
Keeping secure on the Internet About Download Insight 3 On the Intrusion and Browser Protection tab, in the Download Intelligence row, move the On/Off switch to the left to the On position. 4 In the Settings window, click Apply, and then click Close. Configuring the Download Insight Notifications option You can use the Download Insight Notifications option to choose when you want Download Insight to display notifications. By default, the Download Insight Notifications option is set to On.
Keeping secure on the Internet About Download Insight 299 3 On the IntrusionandBrowserProtection tab, under Download Intelligence, in the Download Insight Notifications row, do one of the following: 1 To receive Download Insight notifications only for the infected or the suspicious executable files that you download, move the Download Insight Notifications switch to the right to the Risks Only position.
Keeping secure on the Internet About Download Insight You can use the following options to configure Download Insight Full Report: Always When you set the Download Insight Full Report option to Always, Download Insight prompts you for a suitable action in case of safe and unknown files. In this case, the Download Insight window appears whenever you try to launch any downloaded file that has a safe or an unknown reputation score.
Keeping secure on the Internet About Download Insight Unproven Only When you set the Download Insight Full Report option to Unproven Only, Download Insight prompts you to select a suitable action for unknown files only. In this case, the Download Insight window appears whenever you try to launch any downloaded file that has an unknown reputation score. In this window, you can view details about the file and the options that let you select a suitable action for the file.
Keeping secure on the Internet About Download Insight Never When you set the Download Insight Full Report option to Never, Download Insight does not prompt you to select a suitable action for any type of file that you download. In this case, the Download Insight window does not appear whenever you try to launch any downloaded file. In case of unsafe files, Norton 360 identifies them as threat and removes them.
Keeping secure on the Internet About Norton AntiSpam 303 4 In the Settings window, click Apply, and then click Close. Turning on or turning off Alert on Poor Stability When you turn on the Alert on Poor Stability option, Download Insight prompts you to select a suitable action when you try to download an unstable file.
Keeping secure on the Internet About Norton AntiSpam email into the Inbox folder and spam email into the Junk folder or the Norton AntiSpam folder. Norton AntiSpam uses Symantec enterprise-class, spam-filtering technology to classify the spam email messages from legitimate email messages. Norton AntiSpam uses a real-time filter delivery mechanism and filters email messages using various local filters at different levels. The local filters classify the email messages as spam or legitimate.
Keeping secure on the Internet About Norton AntiSpam 305 the addresses from your Outlook address book or Windows address book, it also imports the addresses that are available in the Safe Sender and the Blocked Sender lists. w Turning off Norton AntiSpam increases your exposure to receive unsolicited email messages. Always ensure that Norton AntiSpam is turned on. It secures your email client from unwanted online content.
Keeping secure on the Internet About Norton AntiSpam Allowed and Blocked Lists 1 1 1 1 Uses a user-defined address list to expedite the scanning of email. Accepts all email messages from senders in the Allowed List. Treats all email messages from senders in the Blocked List as spam. Allows and blocks email messages from entire domains as well as individual email addresses. See “About Norton AntiSpam settings” on page 539.
Keeping secure on the Internet About Norton AntiSpam 307 the Norton AntiSpam drop-down list or the options to classify the email messages as spam or legitimate. You can also use these options to empty the spam folder and to open the Settings window to configure the Norton AntiSpam settings. If your email program does not have a Junk folder, it also adds a Norton AntiSpam folder in the folders area. You can use the Norton AntiSpam folder to sort and store spam messages.
Keeping secure on the Internet About Norton AntiSpam the initial client integration. It helps you keep your list of allowed and blocked email senders in sync with your current address books. When Norton AntiSpam imports the addresses from your Outlook address book or Windows address book, it also imports the addresses that are available in the Safe Sender and the Blocked Sender lists.
Keeping secure on the Internet About Norton AntiSpam You can use the following options: This is Spam Marks the selected email as spam and moves the email message into the Junk folder or the Norton AntiSpam folder. When you reclassify an email message as spam, Norton 360 provides you the option to send the misclassified email message as feedback to Symantec. This option appears only if the Feedback option on the Client Integration tab, in the AntiSpam settings window, is set as Ask Me.
Keeping secure on the Internet About Norton AntiSpam Open Displays the Norton AntiSpam settings section Norton of the Norton 360 Settings window AntiSpam Setting Address Book Exclusions When you add an email address to the Address Book Exclusions list, Norton AntiSpam does not import the address into the Allowed List and Blocked List. If you delete an email address from the Allowed List or Blocked List, Norton AntiSpam automatically adds the address to the Address Book Exclusions list.
Keeping secure on the Internet About Norton AntiSpam 311 7 Click OK to save and close the Address Book Exclusions window. To edit or delete entries in the Address Book Exclusions list 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click AntiSpam. 3 On the Filter tab, in the Address Book Exclusions row, click Configure. 4 In the Address Book Exclusions window, select the item with which you want to work.
Keeping secure on the Internet About Norton AntiSpam 2 In the Settings window, under Detailed Settings, click AntiSpam. 3 On the Filter tab, in the Allowed List row, click Configure. 4 In the Allowed List window, click Import. 5 In the Allowed List window, click Apply. 6 Click OK. To add entries to your Allowed List 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click AntiSpam. 3 On the Filter tab, in the Allowed List row, click Configure.
Keeping secure on the Internet About Norton AntiSpam 313 3 On the Filter tab, in the Allowed List row, click Configure. 4 In the Allowed List window, select the item that you want to edit or delete. 5 Do one of the following: 1 To edit an entry, click Edit to open the Edit Email Address dialog box, edit the details, and click OK. 1 To delete an entry, click Remove. When you delete an entry that was imported, Norton AntiSpam automatically adds it to the Address Book Exclusions list.
Keeping secure on the Internet About Norton AntiSpam 4 In the Allowed List window, click Import. 5 In the Allowed List window, click Apply. 6 Click OK. To add entries to the Blocked List 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click AntiSpam. 3 On the Filter tab, in the Blocked List row, click Configure. 4 In the Blocked List window, click Add. 5 In the Add Email Address dialog box, in the Address Type drop-down list, select the address type.
Keeping secure on the Internet About Norton AntiSpam 315 5 Do one of the following: 1 To edit an entry, click Edit to open the Edit Email Address dialog box, edit the details, and then click OK. 1 To delete an entry, click Remove. When you delete an entry that was imported, Norton AntiSpam automatically adds it to the Address Book Exclusions list. 6 In the Blocked List window, click Apply. 7 Click OK.
Keeping secure on the Internet About Norton AntiSpam 3 On the Client Integration tab, in the Feedback row, select any one from the following three options: On Automatically sends the misclassified email message to Symantec when you classify an email message as spam or legitimate Ask Me Prompts you before Norton AntiSpam sends the misclassified email message to Symantec when you classify an email message as spam or legitimate Off Does not send the misclassified email message to Symantec 4 Click A
Keeping secure on the Internet About Norton AntiSpam 317 approach to filter spam email messages from legitimate email messages. The email messages that you receive in your email program undergo scanning through different local filters of Norton AntiSpam. The local filters use Whitelist technique, Blacklist technique, and patented filtering technology to classify email messages as legitimate or spam.
Keeping secure on the Internet About configuring POP3 and SMTP ports Norton AntiSpam then sends the email message to your email program. Based on predefined email rules, the email program then moves the email message to the Junk folder or the Norton AntiSpam folder. w Symantec recommends you to keep the Web Query option turned on. Turning off the Web Query option increases your exposure to the spam email messages that contain phishing or spam URLs.
Keeping secure on the Internet About configuring POP3 and SMTP ports 319 numbers for your email program. If the SMTP and POP3 port numbers for your email program are different from the default port numbers, you must configure Norton 360. To ensure email protection, Symantec recommends that you check the POP3 and SMTP port numbers for your email program. If they are not the default ports, add them to the Protected Ports window.
Keeping secure on the Internet About Network Cost Awareness 5 In the Add Port to protect window, in the Port Type drop-down list, do one of the following: 1 To add the incoming email port, click POP3. 1 To add the outgoing email port, click SMTP. 6 In the Port box, type the port number. The port number must be between 1 and 65535. 7 Click OK. 8 In the Protected Ports window, click Apply, and then click OK. 9 In the Settings window, click Close.
Keeping secure on the Internet About Network Cost Awareness 321 plan, you can set up No Limit policy so that Norton 360 connects to Symantec servers to ensure complete protection. However, if you think that Norton 360 uses too much of your Internet connection, you can restrict the Internet usage of Norton 360. Network Cost Awareness helps you manage the Internet usage of Norton 360. To connect to the Internet, Norton 360 accesses the gateway through a network connection.
Keeping secure on the Internet About Network Cost Awareness Turning off or turning on Network Cost Awareness You can set up policies to restrict the Internet usage of Norton 360. If you do not want to restrict the Internet usage of Norton 360, you can turn off Network Cost Awareness. If you feel that Norton 360 uses too much network bandwidth, you can turn on Network Cost Awareness. Then, you can set up policies to restrict the Internet usage of Norton 360.
Keeping secure on the Internet About Network Cost Awareness 323 The Network Cost Awareness Settings window lists all the network connections that your computer uses to connect to the Internet. You can view the status of the network connections that are currently in use. The network policy that you set up defines the amount of network bandwidth that Norton 360 can use. To define the Internet usage of Norton 360 1 In the Norton 360 main window, click Settings.
Keeping secure on the Internet About Network Cost Awareness 6 Select one of the following: 1 Auto Allows Norton 360 to receive all product and virus definition updates based on the Windows 8 cost awareness policy. By default, the Auto policy has unlimited Internet connection on LAN and Wi-Fi. w The Auto option is available only in Windows 8. 1 1 1 No Limit Allows Norton 360 use the network bandwidth that is required to receive all product and virus definition updates.
Securing your sensitive data 9 This chapter includes the following topics: 1 About securing your sensitive data About securing your sensitive data The Internet provides the fastest and the easiest way to exchange information. In spite of the many advantages that the Internet provides, you are vulnerable to information theft and identity theft. Information can be stolen and misused in several ways.
Securing your sensitive data About securing your sensitive data window. The Norton Safe Web feature provides you a safe search environment in the Web by displaying the site rating icons next to every search result. When you install Norton 360, it adds the Norton Toolbar to the Internet Explorer, Firefox, or Chrome browsers.
Securing your sensitive data About securing your sensitive data 327 In addition, the Norton Site Safety pop-up window includes information about Symantec Authenticated Web sites. Web site hackers often mimic company Web sites to create fraudulent Web sites. Norton 360 identifies the fraudulent Web sites. Symantec analyzes the pages of these sites and verifies if they belong to the company that it represents.
Securing your sensitive data About securing your sensitive data the security level of all the Web sites that you visit and displays the results in the Norton Site Safety pop-up window. Antiphishing also blocks navigation to the Web sites that are confirmed to be fraudulent. The Norton Site Safety pop-up window helps you understand if the Web site that you visit is safe or unsafe. You can turn off or turn on Antiphishing in the Safe Surfing section of the Identity Protection settings window.
Securing your sensitive data About securing your sensitive data 329 To report an incorrect evaluation of a suspicious Web site 1 Open your browser and go to the Web site that you think is suspicious. 2 On the Norton Toolbar, in the Norton menu, click Report site. 3 In the dialog box that appears, verify that the Web site address and click Submit. 4 In the confirmation dialog box, click Close.
Securing your sensitive data About securing your sensitive data w The Community Buzz option is available only in English-language versions of Windows. For each Web site that you want to know the site safety status, Norton Safe Web lets you do the following: 1 View the Norton rating. 1 View the community rating. 1 Add your reviews. 1 View the user reviews. 1 1 View a list of keywords that are tagged to the Web site. View the threat information and the general information about the Web site.
Securing your sensitive data About securing your sensitive data 331 Norton Safe Web provides the following Web site safety states when you browse through the Internet: Norton Secured You can see Norton Secured icon next to the search results. Symantec has analyzed this page and determined that the Web site is VeriSign trusted and is safe to visit. Site is Safe You can see a green OK icon next to the search results.
Securing your sensitive data About securing your sensitive data Site is Unsafe You can see a red cross (x) icon next to the search results. When you visit a Web site with this status, you can see a similar status icon on the Norton Toolbar. Norton Safe Web has analyzed this Web site and determined that the Web site is unsafe to visit. This Web site may attempt to install malicious software on your computer. Caution You can see a yellow exclamation mark icon next to the search results.
Securing your sensitive data About securing your sensitive data Untested Norton Safe Web does not have sufficient information about this Web site to provide a shopping safety rating. Risky Norton Safe Web has analyzed this Web site and determined that the site has shopping risks. 333 Symantec recommends that you do not visit this page. The Web site may sell counterfeit items without proper indication.
Securing your sensitive data About securing your sensitive data let other Facebook users know about the security status of any Web site. To scan your Facebook Wall using Norton Safe Web, use the Scan Facebook Wall option. The option appears when you click the Run Scans option in the Tasks window. Turning off or turning on Norton Safe Web Norton Safe Web protects your computer while you browse the Internet using Internet Explorer, Firefox, or Chrome Web browsers.
Securing your sensitive data About securing your sensitive data 335 Searching the Web using Norton Safe Search Norton Safe Search enhances your Web search experience. When you search the Internet using Norton Safe Search, it uses Ask.com to generate the search results. Norton Safe Search provides the site safety status and Norton rating for each of the search results generated. By default, the Norton Safe Search box is enabled.
Securing your sensitive data About securing your sensitive data Erase Search History Norton Safe Search enables you to erase all the data that are related to your search activities from the Ask.com server. The Privacy Safeguard feature of Norton Safe Search removes the search data, such as your IP address, user identifier, and session identifier from the Ask.com server.
Securing your sensitive data About securing your sensitive data 337 Turning off or turning on Scam Insight Scam Insight prevents you from divulging your sensitive information such as Social Security Numbers or credit card information, to fraudulent Web sites. It helps you detect the Web sites that are suspicious or vulnerable using reputation-based threat detection. It mainly focuses the Web sites that require you to enter your personal information.
Securing your sensitive data About securing your sensitive data The following features in Identity Safe provide secure storage of your sensitive information: Edit Logins Stores login information, such as your login credentials for your online bank account, email user ID, and password. Edit Cards Stores your personal information, such as addresses, date of birth, and credit card information. Edit Notes Stores the details, such as passport numbers and social security numbers.
Securing your sensitive data About securing your sensitive data 339 Norton 360 adds the Norton Toolbar to the Internet Explorer, Firefox, or Chrome Web browsers. The Norton Toolbar has the following components: 1 Norton menu 1 Norton Safe Search 1 Share 1 Safe Web indicator 1 Vault Open/Vault Closed menu 1 Login Assistant When you have cards or logins in Identity Safe, the Vault Open menu displays the list of cards and logins. w Norton 360 supports latest versions of Google Chrome and Firefox.
Securing your sensitive data About securing your sensitive data 1 1 w Personal information such as your address, date of birth, passport number, and social security number. Credit card details including card number and card expiry date. You can view all the options that are available in Identity Safe only after you set up Identity Safe. Identity Safe lets you create an online vault and save your Identity Safe data. You can create one online vault for each Norton Account.
Securing your sensitive data About securing your sensitive data 341 Identity Safe to manage your personal data such as addresses, date of birth and credit card information. The logins, cards, and notes help you store and use your personal information in a secure way. You can turn off or turn on the Identity Safe from the Quick Controls in the Settings window or from the Settings window for Identity Protection.
Securing your sensitive data About securing your sensitive data save in one Windows user account from another Windows user account. This way Identity Safe protects your sensitive data from misuse by multiple users of your computer. Symantec recommends that you create separate password-protected Windows user accounts if you want to share your computer with multiple users. In addition to the local vault that you create on a Windows user account, you can save your Identity Safe data in online vault.
Securing your sensitive data About securing your sensitive data 1 343 Reset your Identity Safe. About creating Identity Safe vaults Identity Safe helps you manage your sensitive information and provide additional security while you perform online transactions. The various features in Identity Safe provide a secure storage for your personal information such as your address, login information, passwords, and credit card details.
Securing your sensitive data About securing your sensitive data In addition to the local vault on your Windows user account, you can save your Identity Safe data in online vault. The Identity Safe data is stored online vault using your Norton Account. You can access the Identity Safe data that you stored online from any computer that meets the following criteria: w 1 The latest version of Norton 360 must be installed. 1 The computer must be connected to the Internet.
Securing your sensitive data About securing your sensitive data 345 Signing in to Norton Account Identity Safe lets you create a local vault and an online vault to save your Identity Safe data. You must log in to your Norton Account to create an online vault. The Identity Safe data is stored online using your Norton Account. You can access the Identity Safe data that you stored online from any computer that meets the following criteria: w 1 The latest version of Norton 360 must be installed.
Securing your sensitive data About securing your sensitive data The following are the benefits of moving your Identity Safe data online: 1 w Your computer must have the latest version Norton 360 installed and must be connected to the Internet. 1 1 w Lets you access your Identity Safe data from any computer. Lets you access your Identity Safe data from online vault without depending on any external drive.
Securing your sensitive data About securing your sensitive data 347 passwords, and credit card details. You can sync your identity safe data in the local vault into the online vault. When you save your data in online vault, you can access your Identity Safe data from any computer that has Norton 360 installed. You can merge the Identity Safe data from your local profile into your online vault.
Securing your sensitive data About securing your sensitive data 10 In the Merge Identity Safe Data Online window, click Merge. Deleting local vault and online vault Identity Safe lets you create a local vault and an online vault to save your Identity Safe data. If you no longer require your Identity Safe data that is stored in your local vault and online vault, you can delete the vaults. When you delete the local vault and online vault, all the Identity Safe data is permanently removed.
Securing your sensitive data About securing your sensitive data 349 To merge the Identity Safe data from portable profile to local vault or online vault 1 On the Norton Toolbar, in the Identity Safe menu, click Merge Portable Data (Drive:\). This option appears only if you connect an external drive with portable profile. 2 In the dialog box that appears, click Yes. 3 In the Import Identity Safe Data window, under Import my data from, click Portable Profile (Drive:\).
Securing your sensitive data About securing your sensitive data 3 Set up Identity Safe. 4 In the Identity Safe Setup Successful window, do one of the following: 1 Check Import my logins from Internet Explorer to import all the logins that you saved in your Web browser. 1 Uncheck Import my logins from Internet Explorer, if you do not want to import all the logins that you saved in your Web browser. 5 In the Identity Safe Setup Successful window, click Done.
Securing your sensitive data About securing your sensitive data 351 4 In the Enter the Password box, type your Identity Safe password. If you forget your password, Identity Safe lets you enter wrong password three times. If your attempts are unsuccessful, the Trouble Logging In? window appears. 5 In the Trouble Logging In? window, click Reset Identity Safe. If you forget the Identity Safe password of your online vault, you need to provide your Norton Account credentials to reset your Identity Safe.
Securing your sensitive data About securing your sensitive data w You must be logged in to Identity Safe to access the Identity Safe features. The Identity Safe features are supported only in the Internet Explorer, Firefox, or Chrome Web browsers. To access Identity Safe settings from the main window 1 In the Norton 360 main window, click Identity, and then click Manage Identity Protection. 2 Under Identity Safe, for the Identity Safe feature that you want to open, click Configure.
Securing your sensitive data About securing your sensitive data 353 Identity Safe automatically logs you out of the current vault, when you are logged in to your local vault or online vault and click Identity Safe Setup to create a new vault. To view or edit your confidential data, you must be logged in to Identity Safe. To log in to Identity Safe 1 In the Norton 360 main window, click Identity, and then click Log in to Identity Safe.
Securing your sensitive data About securing your sensitive data To configure Identity Safe settings 1 In the Norton 360 main window, click Identity, and then click Manage Identity Protection.
Securing your sensitive data About securing your sensitive data 355 2 Under Identity Safe, identify the feature that you want to use, and click Configure. Your options are: Identity Safe Setup Lets you set up Identity Safe vault. You can create a local vault or an online vault and store your Identity Safe data. You must log in to your w Norton Account to create an online vault.
Securing your sensitive data About securing your sensitive data Browsing Options Lets you configure the way you want Identity Safe to collect, store, and display the login information for the Web pages you visit. You can configure Identity Safe to display your cards that you created for the Web sites that have forms. You can also configure the autofill settings for the Web sites that contain security threats.
Securing your sensitive data About securing your sensitive data Edit Cards Lets you manage your personal information such as name, date of birth, email address, and credit card information in one place. You can use the information that you store to automatically fill forms. This feature lets you provide sensitive information without typing it when you are online. In this way, Identity Safe protects you from keyloggers that steal and misuse your identity.
Securing your sensitive data About securing your sensitive data Edit Notes Lets you store and manage sensitive information. You can save social security number, driver's license number, insurance policy number, and passport number. You can also save private accounts, lock combinations, documents, notes, frequent flier numbers, bank account number, security challenge questions, and legal and financial information. Export Data Lets you back up the Identity Safe data in .DAT or .CSV file formats.
Securing your sensitive data About securing your sensitive data Sync Data Online 359 Lets you move your Identity Safe data that you stored in your local vault to online vault. When you sync your w Identity Safe data from local vault to online vault, the data in the local vault is permanently removed. Delete Data Lets you permanently remove the Identity Safe vault. About Edit logins The Edit Logins feature in Identity Safe lets you view all the logins that you want Identity Safe to manage.
Securing your sensitive data About securing your sensitive data 1 Lets you quickly launch the Web site login page 1 Fills in your login automatically when you revisit Web pages Lets you manually add logins 1 Lets you change the URL of your saved logins 1 1 1 Lets you view the last time you made changes to the settings of your saved logins Lets you access the login features that you saved for a Web site even after Norton 360 expires.
Securing your sensitive data About securing your sensitive data 361 appears on the top left corner of the Login Assistant window. Identity Safe automatically detects login fields which are not auto filled or filled incorrect by Identity safe in the Web pages and displays the Need Assistance menu bar in your browser. The Need Assistance menu bar will let you use the saved login credentials.
Securing your sensitive data About securing your sensitive data To save a login 1 Go to the Web site for which you want to save your login. 2 Type your login details, and then click the option or link that logs you in. Norton 360 automatically saves your login details when you enter them for the first time. To save additional logins for a Web site 1 Go to the Web page for which you want to save another login. Your login credentials automatically appear on the Web page.
Securing your sensitive data About securing your sensitive data 1 1 1 1 1 Lets you change the URL of your saved logins. 1 w Displays the login ID and lets you show or hide the password. Displays the strength of the password for each of the logins. Lets you quickly launch the Web site login page. Fills in your login automatically when you revisit Web pages. Lets you manually add logins. 1 363 Lets you view the last time you made changes to the settings of your saved logins.
Securing your sensitive data About securing your sensitive data 6 In the Username dialog box, in the Enter new username box, type the user name of the login, and then, click OK. 7 In the Information dialog box, click OK. The Information dialog box prompts you to set a password for the login that you created. 8 In the Edit logins window, in the Password box, type the password of your login. 9 Click Close. 10 In the Save dialog box, click Yes to save the changes.
Securing your sensitive data About securing your sensitive data 365 To delete a login or a folder 1 In the Norton 360 main window, click Identity, and then click Manage Identity Protection. 2 Under Identity Safe, in the Edit Logins row, click Configure. 3 In the Edit Logins window, under Logins, select the Web site name or the folder that you want to delete. You can only delete the folders that you manually create; You cannot delete the folders created through auto categorization. 4 Click Delete.
Securing your sensitive data About securing your sensitive data 1 Ensure that the URL you change belongs to the same domain as the current URL. View the details of the date and time when you last made to the Edit Logins settings To quick-launch a login Web page 1 In the Norton 360 main window, click Identity, and then click Manage Identity Protection. 2 Under Identity Safe, in the Edit Logins row, click Configure.
Securing your sensitive data About securing your sensitive data 367 Changing the user name and password Identity Safe lets you change the user name and password for the logins that you have saved in the Edit Logins window. The updated information is automatically filled the next time you visit that Web page. To change the user name 1 In the Norton 360 main window, click Identity, and then click Manage Identity Protection. 2 Under Identity Safe, in the Edit Logins row, click Configure.
Securing your sensitive data About securing your sensitive data 5 In the Validate Password for Identity Safe window do the following: 1 In the Enter the Password box, type your Identity Safe password. 1 Click Validate. 6 In the Edit Logins window, in the Password box, type the new password. 7 Click Close. 8 In the confirmation dialog box, click Yes to save the changes. Updating the password for a login Good security practice requires that you regularly change the password for a login.
Securing your sensitive data About securing your sensitive data 369 You can use the information that you store in the cards to do the following: 1 Automatically fill forms 1 Provide sensitive information without having to type it while you are online In this way, Identity Safe protects you from keyloggers that steal and misuse your identity. w Some Web sites have forms with fields for credit cards or other personal information.
Securing your sensitive data About securing your sensitive data You can also copy and edit the required fields from the selected card in the Login Assistant window. By default, the important data such as Passwords, Credit Card number, and birth date are hidden; you need to select Show option to view and copy the data. w Symantec recommends you to clear your data copied from the cards by selecting Clear Clipboard option.
Securing your sensitive data About securing your sensitive data 371 4 Use the following tabs to type your card details: General Provide details such as card name, name, gender, and date of birth. You can set a password and provide additional security for your card. Online form filling is language-specific. In the Country/Region box, the country United States is selected by default. You should change your region and create a new card before you fill online forms for any other language.
Securing your sensitive data About securing your sensitive data You can view a summary of the card that you created. You can select any of the cards that are present in the list of cards at the left pane of the Edit Identity Cards window. When you select a card, you can view a summary of the card. w When you lock your card with a password, Identity Safe provides additional security to your card. You cannot view the summary of the locked card.
Securing your sensitive data About securing your sensitive data 373 3 In the Edit Identity Cards window, select the card that you want to delete. 4 Click Delete Card. 5 In the Warning dialog box, click Yes. 6 Click Close. To duplicate a card 1 In the Norton 360 main window, click Identity, and then click Manage Identity Protection. 2 Under Identity Safe, in the Edit Cards row, click Configure. 3 In the Edit Identity Cards window, select the card that you want to duplicate. 4 Click Duplicate Card.
Securing your sensitive data About securing your sensitive data identity numbers that you use when you browse the Web. The Edit Notes option in Identity Safe stores all your sensitive IDs in a very secure way and lets you use them easily when you are online. You can use Edit Notes to save information such as social security number, driver's license number, insurance policy number, and legal and financial information.
Securing your sensitive data About securing your sensitive data 375 4 Click Edit Notes, and modify the information under Details. You can change the category, modify the title, and edit the additional information that you have provided. 5 Click Save. 6 In the Edit Notes window, click OK. To delete Notes 1 In the Norton 360 main window, click Identity, and then click Manage Identity Protection. 2 Under Identity Safe, in the Edit Notes row, click Configure.
Securing your sensitive data About securing your sensitive data 1 1 w Merge the imported data in to the vault that you are currently logged in. Replace the existing Identity Safe data that you stored in your vault that you are logged in with the imported data. You can also delete the data once the import is complete. Exporting your Identity Safe data You can export your Identity Safe data for security purposes, data recovery, or when you transfer your Identity Safe data to a new computer.
Securing your sensitive data About securing your sensitive data 377 Importing your Identity Safe data You can import your Identity Safe data from the file that you previously backed up. You can also import the Identity Safe data from the portable profile that you saved in the older version of Norton 360. You can merge the imported data in to the vault that you are currently logged in or replace the existing Identity Safe data that you stored in your vault that you are logged in with the imported data.
Securing your sensitive data About securing your sensitive data 3 In the Import Identity Safe Data window, under Import my data from, select one of the following options: 1 Portable Profile (Drive: Drive:\) This option appears only if you connect an external drive with a portable profile. 1 Local Profile Select this option if you want to import the Identity Safe data from your local vault to online vault. This option appears only if you are logged in to your online vault.
Securing your sensitive data About securing your sensitive data 379 You can configure the following options in the Browsing Options window: Display my Logins each time Configures Identity Safe to I visit a page with multiple display your logins each time Logins you visit a Web site that has multiple logins. Autofill my logins when I visit websites Automatically fills your login details when you visit a Web site.
Securing your sensitive data About securing your sensitive data About Password & Security You can use Password & Security to change your Identity Safe password. You can also use this option to set the level of security that you want for Identity Safe password usage. The following sections let you change the Identity Safe password and set security levels for your password: Identity Safe Password Change your Identity Safe password and set a new password hint using the Change Password option.
Securing your sensitive data About securing your sensitive data Password Security 381
Securing your sensitive data About securing your sensitive data Specify the Identity Safe password security level. Identity Safe provides four levels of security to protect your Identity Safe password. Choose one of the following options: 1 Ask for my password at the beginning of each login session Prompts for your Identity Safe password the first time you access Identity Safe. If you are logged in to Windows, you do not need to provide the password again.
Securing your sensitive data About securing your sensitive data 383 period. You can specify the idle time-out period as 15, 30, or 45 minutes. 1 Use this option if other people have access to your computer. Ask for my password after sleep or hibernation Prompts you for your Identity Safe password when your system restores from suspended state. This option prevents misuse of your Identity Safe data by validating your Identity Safe password each time your system restores from suspended state.
Securing your sensitive data About securing your sensitive data the password by using the Password & Security option in Settings window. If you want to change the Identity Safe password of your online vault, the password you provide must have the following characteristics: 1 At least eight characters 1 At least one capital letter 1 At least two numerals (0 through 9) 1 At least one symbol (for example, * > & $ %) 1 w The password must not match with your Norton Account user name or password.
Securing your sensitive data About securing your sensitive data 385 You have the following options in the Norton Toolbar: Norton menu Lets you access Identity Protection and other settings. The following options are available in the Norton menu: 1 Report Site 1 Settings 1 Go to Norton Safe Web website 1 Enable Norton Safe Web 1 Enable Norton Safe Search/Disable Norton Safe Search 1 My Norton Account 1 Help The Minimize Toolbar w option appears only in the Internet Explorer browser.
Securing your sensitive data About securing your sensitive data Navigate to the Identity Safe Home Page icon Lets you access the Identity Safe data stored in your online vault. You can add, edit or delete your Logins, Cards, and Notes under this section. You can use the Norton Safe Search option to enhance your Web search experience. The Norton Safe Search uses Ask.com to generate the search results.
Securing your sensitive data About securing your sensitive data Vault Open/Vault Closed Lets you view the logins and menu cards that you have saved in Identity Safe. Some Web sites have forms to fill or require login information. You can use the Vault Open/Vault Closed menu to fill the details in those Web sites. The Vault Open/Vault Closed menu displays the list of all logins and cards that you saved. You can select a login from the list and a use it to log in to the Web site.
Securing your sensitive data About securing your sensitive data In Google Chrome Web browser, the Norton Toolbar can be accessed as a Chrome Extension. In the Extensions page of the Chrome browser, you can enable or disable the Norton Toolbar, and uninstall the Norton Toolbar from your Chrome browser.
Securing your sensitive data About securing your sensitive data 389 When you hide the toolbar, Norton 360 does not display the Norton Site Safety pop-up window. However, Norton 360 notifies you about suspicious and fraudulent Web sites or if an error needs your attention. To hide or show the Norton Toolbar in the Internet Explorer and Firefox Web browsers 1 At the top of your browser window, click View. 2 On the Toolbars submenu, do one of the following: 1 Uncheck Norton Toolbar to hide the toolbar.
Securing your sensitive data About securing your sensitive data 2 In the main menu that appears, click Tools > Extensions. 3 Under Extensions page, click Show button option. Accessing Identity Safe settings from the Norton Toolbar When you install Norton 360, it adds the Norton Toolbar to the Internet Explorer, Firefox, and Chrome Web browsers. The Vault Open menu on the Norton Toolbar provides quick links to access the options under Identity Safe.
Securing your sensitive data About securing your sensitive data 391 2 On the Norton Toolbar, in the Norton menu, select one of the following: Report Site Lets you report to Symantec about the current Antiphishing evaluation. Minimize Toolbar Lets you minimize the Norton Toolbar. When you check this option, the Identity Safe phrase and the Safe Web phrase disappear and only the Identity Safe and Safe Web indicators remain. In addition, the size of the Norton Safe Search box is reduced.
Securing your sensitive data About securing your sensitive data Enable Norton Safe Web Lets you turn on the Norton Safe Web feature which provides a safe online browsing experience. The following are the unique features of Norton Safe Web: 1 1 Enable Norton Safe Search/ Disable Norton Safe Search Displays the site safety rating icons next to the search results Displays the site safety rating icons when you are on a Web site Lets you view the Norton Safe Search box.
Securing your sensitive data About securing your sensitive data 393 Accessing the Vault Open/Vault Closed menu The Vault Open/Vault Closed menu on the Norton Toolbar lets you view and manage the logins, Identity cards, and notes that you saved. You can also access the Identity Protection of the Settings window using the Vault Open/Vault Closed menu In addition, you can do the following: 1 1 1 1 1 Navigate to any Web site for which you have saved the login credentials.
Securing your sensitive data About securing your sensitive data 2 On the Norton Toolbar, in the Vault Open/Vault Closed menu, select one of the following: Merge Portable Data (Drive:\) Lets you merge the Identity Safe data from your portable profile that you have created from the previous versions of Norton 360. This option appears in w the Vault Open/Vault Closed menu only if you have connected an external drive with portable profile.
Securing your sensitive data About securing your sensitive data Settings 395
Securing your sensitive data About securing your sensitive data Lets you view the various options that are available in Identity Safe. The options are: 1 Edit Logins 1 Lets you open the Edit Logins window. Edit Identity Cards 1 Lets you open the Edit Identity Cards window. Edit Notes 1 Lets you open the Edit Notes window. Export 1 Lets you open the Export Identity Safe Data window. Import 1 Lets you open the Import Identity Safe Data window.
Securing your sensitive data About securing your sensitive data autofill the login information in the current Web page. Report Issue Lets you open the Norton Feedback Web site. You can submit feedback on your experience with Identity Safe. You can also submit the problems that you encountered with Identity Safe. You can select from the list of problems or you can describe your problem. Close Vault Lets you log out of or log in to Identity Safe.
Securing your sensitive data About securing your sensitive data
Protecting your home network 10 This chapter includes the following topics: 1 About the Network Security Map About the Network Security Map A home network typically consists of the computers and other devices that share your Internet connection. The Network Security Map helps you view and manage your network. After you configure Network Security Map, Norton 360 automatically detects the devices that are connected to your network and lists them in the Network Security Map.
Protecting your home network About the Network Security Map 1 1 1 1 Subscription status and Norton product version of the computers that are connected to your network Status of your wireless network connection Connection status of the devices that are on the network The known, unknown, or intruder devices that are on your network You can grant or deny permission to the networked devices to access your computer.
Protecting your home network About the Network Security Map w 401 Norton 360 requires you to configure the Symantec Security Driver to open the Network Security Map. You cannot install the Symantec Security Driver when you run LiveUpdate. You can either allow the Norton LiveUpdate to complete or close the Norton LiveUpdate session before you install the Symantec Security Driver. To view devices on the Network Security Map 1 In the Norton 360 main window, click Settings.
Protecting your home network About the Network Security Map To view the details of a device on the Network Security Map
Protecting your home network About the Network Security Map 4 403 In the Network Security Map window, click a device icon. You can use the scroll arrows to view the devices that are listed in the network map. The device details section that is located below the network map displays the following details: Device Name Shows the name of the device For a computer, the Network Security Map displays the NetBIOS name by default.
Protecting your home network About the Network Security Map Category Shows the category to which the device belongs The device category icon provides details on the connection status and security status. Norton 360 labels all unknown devices as NEW and sets the category as GENERIC DEVICE. This category may include computer-related devices, such as printers, media devices, and game consoles. You can change the device category in the Edit Device Details window.
Protecting your home network About the Network Security Map Trust Level 405 Shows the access level that is granted to a remote device to connect to your computer The initial trust level is set based on the configuration of your computer. You can set trust level for all devices other than MY PC.
Protecting your home network About the Network Security Map You can click each of the features and read the summary to learn more about using Network Security Map to manage your home network. By default, the NetworkSecurityOverview window appears each time you open Network Security Map. If you do not want to view the Network Security Overview window, you can turn it off. Turning off the Network Security Overview window does not affect the performance or security of your computer.
Protecting your home network About the Network Security Map w 407 Ensure that the computers that you want to remotely monitor have a version of a Norton product that supports Remote Monitoring. Norton 360 requires a Passkey to set up Remote Monitoring. You must type the same Passkey for all the computers that you want to remotely monitor. After you set up Remote Monitoring, you can connect any computer to your network and enter the same Passkey.
Protecting your home network About the Network Security Map Turning off Remote Monitoring When you turn off Remote Monitoring, you stop remote monitoring of the computers that are connected to your network. You can turn off Remote Monitoring for the following: w 1 All of the computers that you remotely monitor 1 An individual computer that you remotely monitor You can turn off Remote Monitoring only after you complete the Remote Monitoring Setup process.
Protecting your home network About the Network Security Map 409 You can add the following details when you add a device: 1 The name or description 1 The IP address or physical address The Network Security Map finds any computers that are connected to your network. However, you can add the computers and the devices that are currently not connected. Norton 360 adds to the Trust Control network all the devices that you manually add to Network Security Map.
Protecting your home network About the Network Security Map 6 In the IP or Physical Address box, type the IP address or physical address of the device that you want to add to the Network Security Map. You can use the following formats in the IP or Physical Address box: IPv4 address 172.16.0.0 IPv6 address fe80::12ac:fe44:192a:14cc Physical address 11-22-c3-5a-fe-a4 Resolvable host ftp.myfiles.com The address that you provide is not verified until the device is physically found on the network.
Protecting your home network About the Network Security Map 411 To find the IP address by using ipconfig on Windows Vista 1 On the computer you want to identify, on the Windows taskbar, click Start. 2 In the Start Search text box, type cmd, and then press Enter on your keyboard. 3 At the command prompt, type ipconfig, and then press Enter. 4 Write down the IP address. To find the IP address by using ipconfig on Windows 7 1 On the computer you want to identify, on the Windows taskbar, click Start.
Protecting your home network About the Network Security Map help you identify the devices that are listed in the network map. To edit the details of the device that is on your network 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click My Network. 3 In the Network Security Map row, click Configure. 4 In the Network Security Map window, in the network map, click a device icon. 5 In the device details section, next to Device Name, click Edit.
Protecting your home network About the Network Security Map 413 To edit the name of the device that you added manually 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click My Network. 3 In the Network Security Map row, click Configure. 4 In the Network Security Map window, in the NetworkDetails drop-down list, click TrustControl. 5 In the network map, select a device that you added. 6 In the device details area, next to Device Name, click Edit.
Protecting your home network About the Network Security Map network. The initial network trust level is set based on the configuration of your computer. w Ensure that you change the trust level of a device to Full Trust, if it is a known device, and is connected to your network. The following conditions are necessary for the trust level of a device to be Shared: 1 The computer should not have a public IP address.
Protecting your home network About the Network Security Map 415 To change the trust level of your network 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click My Network. 3 In the Network Security Map row, click Configure. 4 In the Network Security Map window, on the right side of Network Details, click Edit. 5 In the Edit Network Details window, next to Trust Level, click Edit.
Protecting your home network About the Network Security Map 6 To select a trust level for a network, in the Edit Network Trust Level window, click one of the following: FULL TRUST Adds the network to the Trusted list All the network traffic that your computer receives from a Trusted network is filtered and allowed through firewall. However, known attacks and infections are still monitored. You should select this setting only when you are sure that the network is completely safe.
Protecting your home network About the Network Security Map RESTRICTED 417 Adds the network to the Restricted list The devices that are on Restricted network cannot communicate with your computer. However, you can still use the network to browse Web sites, send email messages, or transmit other communications. 7 Click OK. To change the trust level of a device 1 In the Norton 360 main window, click Settings. 2 In the Settings window, click My Network.
Protecting your home network About the Network Security Map 6 To select a trust level for a device, in the Edit Device Trust Level window, click one of the following: FULL TRUST Adds a device to the Full Trust list Full Trust devices are monitored only for known attacks and infections. You should select this setting only when you are sure that the device is completely safe. RESTRICTED Adds a device to the Restricted list Restricted devices do not have access to your computer.
Protecting your home network About the Network Security Map 419 computer increases the scan time which slows down the network speed of your computer. If you know that a specific device on your network is safe, you can apply Full Trust level to this device. In addition, you can exclude this specific device from Intrusion Prevention scan. When you exclude a device from Intrusion Prevention scan, Norton 360 trusts this device and does not scan any information that is received from this device.
Protecting your home network About the Network Security Map 5 In the Network Security Map window, do one of the following: 1 To edit the trust level of a device that is on your network, in the network map, click the device. 1 To edit the trust level of a device that you manually added, in the Network Details drop-down list, click Trust Control, and then click the device. 6 In the device details section, in the Trust Level row, click Edit. 7 In the Edit Device Trust Level window, click FULL TRUST.
Protecting your home network About the Network Security Map 421 When you remove an individual device, the online devices appear again the next time you open the Network Security Map. However, Norton 360 permanently removes the offline devices. To remove an individual device 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click My Network. 3 In the Network Security Map row, click Configure.
Protecting your home network About the Network Security Map For more information on how to secure your wireless network, on the left side of the Network Security Map window, click the Why is it not secure link. Follow the instructions. w You should only trust a wireless connection that is secure. Trusting a wireless connection that is not secure puts all of the devices on your network at risk. To view the status of your wireless network 1 In the Norton 360 main window, click Settings.
Protecting your home network About the Network Security Map 423 To view the device details 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click My Network. 3 In the Network Security Map row, click Configure. 4 In the Network Security Map window, in the network map, click the device for which you want to see the details. You can view the details of only the computers that you remotely monitor.
Protecting your home network About the Network Security Map 2 In the Settings window, under Detailed Settings, click My Network. 3 In the Communication Port box, type a new communication port number. You must use the same port number for each of the device that is connected to your Network Security Map. 4 Click Apply. 5 Click Close.
Keeping your PC tuned up 11 This chapter includes the following topics: 1 About Tuneup 1 About disk and file fragmentation 1 Optimizing your permanent disks manually 1 About using optimization efficiently 1 About cleaning up disk clutter 1 Running a scan to clean up disk clutter 1 Running Registry Cleanup 1 Running Diagnostic Report 1 About Startup Manager About Tuneup Norton 360 offers total protection of your PC that includes Tuneup capability, which increases your PC performance.
Keeping your PC tuned up About disk and file fragmentation Tuneup detects and fixes common computer problems, cleans up unwanted cookies and files, and defragments the hard disk to optimize PC performance. About disk and file fragmentation Your PC's hard disk stores all of your files, applications, and the Windows operating system. Over time, the bits of information that make up your files gradually spread over the disk. This process is known as fragmentation.
Keeping your PC tuned up About using optimization efficiently w 427 You can run Disk optimization only when disk has more than 15 percent of free space. Some programs, such as movie-editing programs or programs that require large amounts of disk space, can work more efficiently if your disks are optimized. If you prefer not to wait until Norton 360 performs automatic optimization, you can optimize your disks manually. w Disk optimization does not run on PC with solid state hard drive.
Keeping your PC tuned up About cleaning up disk clutter Set a schedule for optimization Norton 360 automatically optimizes the hard disk as needed. You can also set a schedule for optimization. Remove the large files that you no longer need Large files are often more fragmented than the smaller files. These fragmented files affect the performance of your computer. About cleaning up disk clutter Over time, the permanent disk in your PC can accumulate many temporary and unneeded files.
Keeping your PC tuned up Running a scan to clean up disk clutter Web browsing When you browse a Web page, your browser downloads the text and graphics that comprise the contents of the page. When you finish viewing the page, the browser can leave the downloaded contents on your PC. The downloaded contents help to display the Web page more quickly if you view the page again. These browser files accumulate over time.
Keeping your PC tuned up Running Registry Cleanup 2 When the activity is complete, in the Tuneup window, click Close. Running Registry Cleanup The Windows registry can contain the entries that refer to files that do not exist. Such broken registry items can slow down your computer. Registry Cleanup scans your computer and cleans any broken registry entries that it finds. To run Registry Cleanup 1 In the Norton 360 main window, click Tasks.
Keeping your PC tuned up About Startup Manager 431 About Startup Manager Some programs are configured to launch during startup of your computer. The number of startup items increases as you install new applications, and the time that is required to start your computer increases as a result. Startup Manager helps to manage the startup items on your computer. For any startup program that the Startup Manager lists, you can view the detailed information such as Community Usage and Resource Usage.
Keeping your PC tuned up About Startup Manager program and measure the performance of your computer the next time you start your computer. Norton 360 delays the start of the delayed programs by five minutes. The first delayed program in the Startup Manager window, starts five minutes after you start your computer. Every subsequent delayed program starts with a further delay of 10 seconds.
Keeping your PC tuned up About Startup Manager 433 To disable startup items 1 In the Norton 360 main window, click Tuneup, and then click Run Startup Manager. 2 In the On/Off column, uncheck a program that you do not want to automatically start when you turn on your computer. 3 Click Apply to save the changes. 4 Click Close. To enable startup items 1 In the Norton 360 main window, click Tuneup, and then click Run Startup Manager.
Keeping your PC tuned up About Startup Manager To run delayed startup items manually 1 In the Norton 360 main window, click Tuneup, and then click Run Startup Manager. 2 In the Startup Manager window, click Run Delayed Items Now. 3 Wait for the program to start, and then in the Startup Manager window, click Close.
Protecting your media and data 12 This chapter includes the following topics: 1 About Norton Backup and Restore 1 About backups 1 About backup preparation 1 About backup set 1 Backing up your files 1 Restoring files 1 About Norton Backup Drive 1 About solutions to the backup problems 1 About online backup considerations 1 Turning off or turning on backup 1 Turning off or turning on backup setting options About Norton Backup and Restore The Norton Backup and Restore feature protects y
Protecting your media and data About backups About backups One of the most important ways to protect the valuable information on your PC is to back up your files regularly. In case you lose your data, Norton 360 lets you restore them later. For example, you accidentally erase an important file or your PC has a hardware malfunction that destroys some files. In this case, you can restore your lost files from your backup.
Protecting your media and data About backup preparation 437 No matter which backup method you choose, you can always add or remove items from the set of files that you select to back up. You can add or remove an individual file from the backup sets by using the shortcut menu that appears when you right-click a file. About backup preparation After you install Norton 360, you must configure Norton 360 to back up your important files on your computer.
Protecting your media and data About backup preparation What You can choose from a variety of file types, such as photos, documents, and music. You can also specify individual files. You have the following options: 1 Sources Lets you select a source from which you want to back up your files. 1 Norton Backup is comprehensive or short depending on the locations that you select. File Types Lets you include or exclude a backup file category.
Protecting your media and data About backup preparation Where 439
Protecting your media and data About backup preparation You can choose any storage location that Norton 360 offers for your backup location, depending on your PC and the connected devices. You can choose to store your backups on external media, such as CD, DVD, Blu-ray disc, or iPod. You can also store your backups on a network drive, removable flash memory drive, or permanent disk in your PC. Backing up your files to w a location where your source files are available is not safe.
Protecting your media and data About backup set 441 available in the Settings window. When You can have Norton 360 back up your files when your computer is idle. You can also set a regular backup schedule or manually back up your files. When you use the Secure Online Storage option for the first time, Norton 360 needs to be activated. To activate the Secure Online Storage, click the Click here to activate your Secure Online Storage link.
Protecting your media and data About backup set you can create a backup set to back up your picture files and music files to a CD. You can also create another backup set to back up your Microsoft Office documents and your financial files to your Secure Online Storage. w To use Secure Online Storage option, you must set the Network Cost Awareness option in the My Network window to No Limit. The My Network option is available in the Settings window.
Protecting your media and data About backup set 443 set to back up your pictures to your local fixed disk. You can create another backup set to back up your videos to a CD. You can also configure different schedules for each backup set. When you create a new backup set, Norton 360 applies the default configuration for the backup set. You can change the configuration if the default configuration does not meet your needs. You can identify each backup set with a backup set name.
Protecting your media and data About backup set name does not describe the backup set after you modify the configuration. w The maximum character length of a backup set name is 32 alphanumeric characters. To modify a backup set 1 In the Norton 360 main window, click Backup, and then click Manage Backup Sets. 2 On the Summary tab, in the Backup set name drop-down list, select the backup set that you want to modify.
Protecting your media and data About backup set 445 sorts them into various categories. It then backs up the files that fall into these categories. Norton 360 uses the following file categories: Pictures This category includes, but is not limited to: Photographic JPEG and JIFF images (.jpg, .jpeg, .jpe, .jP2, .j2k, .j2c, .jpf); Graphic Interchange Format image files (.gif); Bitmap Graphics files (.bmp, .pct); Tagged Image Format files (.tif, .tiff); Adobe PhotoDeluxe images (.pdd); Windows Metafile (.
Protecting your media and data About backup set Music This category includes, but is not limited to: MPEG Audio Stream, Layer III files (.mp3); MPEG-4 Video files (.mp4); MPEG-4 Audio Layer files (.m4a); Apple Protected AAC files (.m4p); Real Networks RealMedia Streaming Media files (.ra); RealMedia Streaming Media files (.rm); RealMedia Metafile files (.ram); MIDI files (.rmi); MS Windows Media Audio files (.wma); MPEG-2 Advanced Audio Coding files (.
Protecting your media and data About backup set Financial Files This category includes, but is not limited to: Microsoft Money files (.mny, .mn1, .mn2, .mn3, .mn4, .mn5, .mn6, .mn7, .mn8, .mn9, .mn10, .mn11, .mn12, .mn13, .mn14, .mn15, .mbf); TurboTax Tax Return files (.tax); H&R Tax Return files (.t01, .t02, .t03, .t04, .t05, .t06); TaxACT files (.ta0, .ta1, .ta2, .ta3, .ta4, .ta5, .ta8, .ta9); QuickBooks files (.qba, .qbb, .qbi, .qbw, .qbx, .qph, .qdf, .qdb, .qif, .qsd, .qel, .qph, q00, q01, .q02, .
Protecting your media and data About backup set Video This category includes, but is not limited to: Microsoft Windows Media files (.wmv); Apple QuickTime Video Clip files (.mov); MPEG 1 System Stream files (.mpg, .mpeg); Macromedia Flash Format files (.swf); Audio Video Interleave files (.avi); MS Advanced Streaming Format files (.asf); Beijer E-Designer files (.mpa); MPEG Movie Clip files (.mpe); MPEG-4 Video files (.m4v); Digital Video File (.dv); Ogg Vorbis Compressed Video File (.
Protecting your media and data About backup set Office Documents This category includes, but is not limited to: Microsoft Word documents and templates (doc, .dot); Microsoft Excel Worksheet and templates (.xls, .xlt, .xlam); Microsoft PowerPoint Presentation and Slideshow files (.ppt, .pps); Microsoft Project files (.mpp); Adobe Acrobat files (.pdf); Text files (.txt); PostScript files (.ps); HyperText Markup Language files (.htm, .html); Microsoft HTML documents (.mht); WildTangent Branded .PNG files (.
Protecting your media and data About backup set Contacts This category includes, but is not limited to: Microsoft Outlook Address Book files (.wab); Microsoft Personal Address Book files (.pab); Palm Address Book files (.aba); Beijer E-Designer files (.mpa); Palm Date Book files (.tda); vCard files (.vcf); Microsoft Outlook Address Book (.oab); Microsoft Phonebook (.pbk); Palm DateBook File (.dba); and Sharp Organizer Telephone Bank (.ozp).
Protecting your media and data About backup set 451 .fm file extension in the Office Documents category, you can add the .fm file extension to the category. The Edit File Type option on the What tab of the Manage Backup Sets window lets you add, edit, or remove file extensions in each backup category. When you check Edit File Type, the Configure option that appears next to each backup category lets you edit file extensions in that category.
Protecting your media and data About backup set with the file extension that you added and backs them up to that file category. For example, if you want to back up the documents with a .fm file extension in the Office Documents category, you can add the .fm file extension to that category. You can also edit an existing file extension or a file extension that you added. The maximum character length of a file extension is 10 characters.
Protecting your media and data About backup set 453 Removing a file extension from a backup category Each backup file category contains a list of file extensions. However, you can remove a default file extension or a file extension that you added to a backup file category. Norton 360 identifies the files with the file extension that you removed and does not back them up the next time that you run backup. For example, you do not want to back up the documents with a .
Protecting your media and data About backup set 4 In the window that appears, click Reset Defaults. 5 Click Save. Deleting previously backed up files You can delete the files that you backed up previously from your backup location. You can also delete the files if the files are no longer useful for you and you have a limited space on your backup location. You can also delete backed up files if you changed the file category for a backup set.
Protecting your media and data About backup set 455 2 On the Summary tab, in the Backup set name drop-down list, select the backup set that you want to delete. 3 Under Things you can do, click Delete backup set. 4 In the Delete Backup Set window, select one of the following: Delete backup set Lets you remove the backup set. Delete backup set and files Lets you remove the backup set and the files that are available in the backup set. 5 Click Yes to confirm.
Protecting your media and data About backup set Adding files and folders to a backup set You are not limited to backing up the files that Norton 360 automatically detects and places into its file categories. You can add files to the set of files to be backed up, and you can exclude files from being backed up as well. Norton 360 lets you select a file or folder from your computer that you want to include in your backup.
Protecting your media and data About backup set 457 4 In the file selection window that appears, navigate to file that you want to add, click to select it, and then click Open. 5 Click OK. 6 In the Manage Backup Sets window, click Save Settings to save the settings. To add a folder to a backup set 1 In the Norton 360 main window, click Backup, and then click Manage Backup Sets. 2 On the What tab, click Add or exclude files and folders. 3 In the window that appears, click Include Folder.
Protecting your media and data About backup set You can exclude a file or folder from the backup set from Windows Explorer by using the shortcut menu. The shortcut menu is available after you configure your backup and when the Manage Backup Sets window and the Restore Files window are closed. When you exclude a file from the backup set, Norton 360 lists the information in the window that appears when you click Add or exclude files and folders option.
Protecting your media and data About backup set 459 6 In the Manage Backup Sets window, click Save Settings to save the settings. To exclude a file or folder from a backup set in Windows Explorer 1 In Windows Explorer, right-click the file, click Norton 360 > Exclude from Backup. The Exclude from Backup option in the shortcut menu is enabled only after you configure your backup and when the Manage Backup Sets and the Restore Files windows are closed.
Protecting your media and data About backup set following table to choose a location that best meets your needs for safety, speed, and storage capacity: Secure Online Storage Your subscription to Norton 360 comes with an allocation of storage space on a secure server that is located on the Internet. This location is the safest, most secure backup choice available because it stores your information in a remote location.
Protecting your media and data About backup set C: (Local Fixed Disk) This choice backs your files up to a special folder on drive C of your PC. Backing up to drive C is very quick and convenient, and is only limited to the amount of free space available on your drive. You can run automatic backups with this choice. Backing up to drive C is a convenient but an unsafe backup method. Any mechanical problem that the drive might experience can damage both your original files and your backups.
Protecting your media and data About backup set CD, DVD, or Blu-ray discs
Protecting your media and data About backup set This choice requires that you have recordable CDs, DVDs, or Blu-ray discs and an optical drive in your PC to record on those discs. You must be present to insert and remove discs when requested. Therefore, you cannot select automatic scheduling of backups when you back up to CDs, DVDs, or Blu-ray discs. Backing up to CDs, DVDs, or Blu-ray discs is slower than backing up to other media.
Protecting your media and data About backup set location for the first time, Norton 360 prompts you to configure the optical backup drive on your computer. Norton 360 lets you install the optical driver. Network drive You can use this choice if your PC is connected to a local network that offers a storage location to which you have access. Depending on the speed of your network, this choice can be almost as fast as backing up to an internal drive or external drive.
Protecting your media and data About backup set Flash drive and removable storage devices, including iPod 465 Flash drives and the other data storage devices that are attached to your PC can also serve as backup locations. Norton 360 displays such devices as external disk drives. If such a device is always attached to your PC, you can use it for automatic backups. The amount of storage space that is available on these devices can be less than on hard disks.
Protecting your media and data About backup set 3 On the Where tab, select the location and device where you want your backups to be stored. If the device or location does not appear on the list, click Refresh List. 4 Click Save Settings. Installing optical backup driver Norton 360 offers several storage location options for backups. You can choose a different location if your backup needs change or if you want to store your backups in several locations for added security.
Protecting your media and data About backup set 467 Viewing or changing a backup schedule Norton 360 lets you schedule backups when it is convenient for you. You can schedule your backups to run late at night or whenever you know that your computer is not needed for any other activity. You have the following backup schedule choices: Automatic (Recommended) Choose this option to back up your computer when it is turned on but not otherwise in use. This choice is the recommended choice for most users.
Protecting your media and data About backup set Manual Schedule Choose this option to have Norton 360 backup your files only when you start the backup yourself. Your computer's performance is maximized if you schedule to perform your critical operations when your computer is idle. When you schedule backup weekly or monthly and check the Run only at idle time option, Norton 360 backs up your files when your computer is idle.
Protecting your media and data Backing up your files 469 To delete a backup set 1 In the Norton 360 main window, click Backup, and then click Manage Backup Sets. 2 On the Summary tab, in the Backup set name drop-down list, select the backup set that you want to delete. 3 Under Things you can do, click Delete backup set. 4 In the Delete Backup Set window, select Delete backup set option. 5 In the confirmation dialog box, click Yes.
Protecting your media and data Restoring files Whether you have set Norton 360 to back up your PC automatically or not, you can always run a backup. For example, you have added or modified important files and you want to be sure they are safe. In this case, you can run a backup manually. You can also run a backup at the end of the day if you do not want to wait for an automatic backup to occur. You can view the details of your backup activity under the backup category in the Security History window.
Protecting your media and data Restoring files When you restore files, you can change any of the following settings: Restore From You can choose any of the backup sets to restore the files. If you backed up your data in an external media, you must connect it to your computer to restore those files. Norton 360 lists all the backup sets that you ran backup for and that your PC can currently detect. Files You can restore the backed up files in a backup set that you selected.
Protecting your media and data Restoring files Restore To You can restore to the original locations of the files, or navigate to a new location where you can restore your files. Norton 360 displays the total number of files and the total size of the files that you have selected for restoration. If files with the same name are present at the original location, the files that you restore replace those files.
Protecting your media and data Restoring files 473 Choosing where to restore files from When Norton 360 restores files, it displays the backup location of the most recent backup set you ran. You can change the location to restore files from a different backup location. For example, you have backed up files to drive C and then later backed up files to CDs. You can then choose to restore files from either drive C or from the CDs.
Protecting your media and data Restoring files Selecting files to restore When you restore backed-up files with Norton 360, you might not need to restore all the files from a backup. You can restore the files that may have been damaged, accidentally erased, or modified incorrectly. Norton 360 provides several ways for you to select only the files that you need to restore. When you click the Browse for Files and Folders option, you can view a list of all the backed-up files.
Protecting your media and data Restoring files 475 You can use any of the following methods, and you can combine methods, to select files to restore: Restore all files and categories You can restore all the backed-up files without excluding any file within a backup set. Restore files by searching You can search by file name, or by part of a file name from the list of backed up files and restore them.
Protecting your media and data Restoring files 2 Under Files, in the Search text box, type all or part of a file name, or the extension of the file. 3 Click Search. The window that appears displays the file names that contain the text that you typed. 4 Check the files that you want to restore, and then click OK. 5 Repeat steps 2 through 4 to add more files to the list of those that Norton 360 restores.
Protecting your media and data Restoring files w 477 Restoring files to their original locations deletes newer versions of the same files that are stored in those locations. If you do not want to replace those files with the restored files, you must move the newer versions somewhere else before you restore. You can also restore them to a different location. You can change the restore destination from any computer at any time.
Protecting your media and data Restoring files When you insert an optical disc that contains the backed-up files, the Autorun Restore feature automatically opens the Portable Restore window. w If you disable Windows auto-run option, you must manually launch the Autorun Restore feature.
Protecting your media and data About Norton Backup Drive 479 To restore files using Norton 360 Autorun Restore 1 Insert an optical disc that contains the backed-up files. 2 Click the ARestore icon to launch the Autorun Restore feature. If the Windows AutoPlay option is disabled, navigate to the optical disk that has your backup, and double click the ARestore icon to launch the Autorun Restore feature. 3 In the Portable Restore window, click Select Files to Restore option.
Protecting your media and data About Norton Backup Drive destinations where your files are backed up. Each backup destination contains the backup sets to which the backup destination is configured. Norton Backup Drive displays the files that you backed up to a media device. You must connect and turn on the media device before you view your files. You can also view the files that you backed up to Secure Online Storage. You must be connected to the Internet and logged in to Norton Account.
Protecting your media and data About Norton Backup Drive 481 Viewing backup files on the Norton Backup Drive You can use the Norton Backup Drive to view the files that are backed up. You can view the Norton Backup Drive after you configure backup. If you backed up your files to a media device, ensure that the device is connected to your PC and turned on. You can then view the files on the Norton Backup Drive. If you backed up your files to Secure Online Storage, you must be connected to the Internet.
Protecting your media and data About Norton Backup Drive 2 Select the backup destination, and navigate to the backup set destination that contains the file that you backed up. 3 Do one of the following: 1 Right-click to select the files to restore in Norton Backup Drive, and then click Restore. The files are restored to the original location by overwriting the existing files. 1 Right-click to select the files to restore in the Norton Backup Drive, and then click Restore to.
Protecting your media and data About solutions to the backup problems About solutions to the backup problems The following table provides some tips to help you avoid backup problems. All backups The following tips apply to all backups: 1 Perform backups regularly. The more often you back up, the less chance there is that you can lose important information. An automatic backup schedule is recommended, since that tends to back up those files that have most recently changed.
Protecting your media and data About solutions to the backup problems Backing up to CDs or DVDs The following tips apply to backups to CDs or DVDs: 1 Have extra discs on hand when you back up. This tip helps you to avoid occasional disc flaws or situations where the amount of backed up data is more than you anticipated. 1 Label your backup discs with the complete details, so that you can find the right disc when you need to restore files. 1 Do not copy files directly from the backup discs to your PC.
Protecting your media and data About solutions to the backup problems Backing up to external drives, The following tips apply to including flash drives backups to external drives: 1 Some drives use older Windows file systems, such as FAT-16 or FAT-32 that cannot store files larger than 4 GB. For such large files to back up, ensure that your backup drive is formatted with a file system that supports large files, such as NTFS.
Protecting your media and data About solutions to the backup problems Backing up to your Secure Online Storage The following tips apply to backups to online storage: 1 Make sure that your PC does not automatically disconnect from the Internet when it is not in use. 1 Regularly check the amount of space that you have left in your Secure Online Storage, and consider purchasing more storage space before you need it. 1 Online backups work best with a fast Internet connection.
Protecting your media and data About online backup considerations 487 and search the Symantec Knowledge Base for solutions to your problem. To get additional help with backup problems 1 In the Norton 360 main window, click Support, and then click Get Support. 2 In the Norton Autofix window, click Open Support Web Site to launch the support Web site.
Protecting your media and data About online backup considerations Although online backup is convenient and safe, before choosing it for your backup method, consider the following limitations: Speed limitations
Protecting your media and data About online backup considerations The amount of time that it takes to transfer your backup to the Secure Online Storage depends on the speed of your Internet connection. If you have many files to back up, the first backup can take hours or days, depending on the speed of your Internet connection. You can configure the Internet bandwidth that backup uses to back up your files using the Bandwidth Throttle option.
Protecting your media and data About online backup considerations up your smaller files, such as your financial documents and word-processing documents. If a backup is in progress, you should leave your computer turned on, so that the backup can finish. However, if a backup is interrupted, then the next time it starts, it resumes where it left off and continues until it finishes.
Protecting your media and data About online backup considerations 1 491 The amount of online storage space that is available to you Your product needs to be activated to use the online backup feature. The first time you configure online backup, Norton 360 connects to your Norton Account and requests that you sign in to the account. You may have established a Norton Account when you installed Norton 360 or when you installed another Norton product.
Protecting your media and data Turning off or turning on backup storage does not contain sufficient space for the backup, Norton 360 notifies you and provides you an option to buy more space. You do not have to wait until Norton 360 tells you that you need more online storage space. You can purchase additional space at any time. You must be connected to the Internet to purchase more online storage space.
Protecting your media and data Turning off or turning on backup 493 all automatic backup of files. You can use the Run Backup Now option in the main window if you want to back up your files from all the backup sets. You can turn off or turn on backup from the Settings window, Backup Settings window, or from the Backup Details window. To turn off or turn on backup from the Settings window 1 In the Norton 360 main window, click Settings.
Protecting your media and data Turning off or turning on backup setting options Turning off or turning on backup setting options Norton 360 provides you various options to manage your backup settings. Norton 360 backup settings let you access the backup details of a particular file by status icon overlays without opening the product. You can use the icon overlays to view the backup status of a file or folder. You can also use the Properties page of a file to know the backup status of your backup sets.
Protecting your media and data Turning off or turning on backup setting options Gray icon with a slash mark 495 Indicates that the file has been excluded from backup Norton 360 displays a disabled backup status on a file when you exclude the file from any of the backup sets. Norton 360 Backup provides the Norton Backup Drive in your Windows Explorer after you configure your backup. Norton Backup Drive contains a list of backup destinations where your files are backed up.
Protecting your media and data Turning off or turning on backup setting options 3 In the Backup Settings window, do one of the following: 1 To turn off icon overlays, in the Backup Status Overlays row, move the On/Off switch to the right to the Off position. 1 To turn off Norton Backup Drive, in the Norton Backup Drive row, move the On/Off switch to the right to the Off position. 1 To turn off right-click backup menu, in the Context Menu row, move the On/Off switch to the right to the Off position.
Customizing settings 13 This chapter includes the following topics: 1 About Norton 360 Settings 1 Customizing Norton 360 Settings 1 Turning on or turning off Quick Controls services 1 About Antivirus settings 1 About Firewall settings 1 About Norton AntiSpam settings 1 About My Network settings 1 About backup settings 1 About Identity Protection settings 1 About Task Scheduling settings 1 About Administrative Settings About Norton 360 Settings The Detailed Settings in the Settings wi
Customizing settings About Norton 360 Settings You can configure the following Detailed Settings in the Settings window: Antivirus Specify how certain types of viruses and spyware, as well as other threats, are handled in Norton 360. You can specify whether incoming emails are checked and instant messenger is scanned. You can also specify which files and signatures are excluded from scans, and how low-risk threats are handled.
Customizing settings About Norton 360 Settings My Network View all the devices available in your network and specify the trust level of the devices that are connected to your network. You can hide or show the Network Security Overview window at startup and configure the communication port that Norton products use to communicate with each other. You can also purge the Network Security Map. Parental Controls Lets you download and install Norton Safety Minder and configure Norton Online Family.
Customizing settings About Norton 360 Settings Identity Protection Configure Identity Safe to secure your online identities and transaction data. You can also configure Safe Surfing options. Tasks Scheduling Specify when and how often Norton 360 examines your computer for viruses and other risks. Administrative Settings Use the options in this window to configure the security of your product. You can specify your proxy settings in Norton 360.
Customizing settings About Norton 360 Settings The Quick Controls in the Settings window let you turn on or turn off the following services: Silent Mode Turns on or turns off Silent Mode You can turn on Silent Mode for a period of one hour, two hours, four hours, six hours, or one day. Safe Surfing Turns on or turns off Antiphishing and Norton Safe Web features When you turn on Safe Surfing, it protects your computer while you browse with Internet Explorer or Firefox.
Customizing settings Customizing Norton 360 Settings Smart Firewall Turns on or turns off Smart Firewall When you turn on Smart Firewall, it monitors communications between your computer and the other computers on the Internet. It also protects your computer from common security problems.
Customizing settings Turning on or turning off Quick Controls services 1 1 1 503 provides the slider setting for you to decide whether to resolve security threats automatically or ask you before it takes an action. You can configure a protection feature by either selecting the options that are provided for the configuration or by providing the required information. Most of these options are available as check boxes for you to check or uncheck.
Customizing settings About Antivirus settings 1 Safe Surfing 1 Identity Safe 1 Backup 1 Backup Status Overlays 1 Automatic LiveUpdate 1 Smart Firewall 1 Norton Tamper Protection You should leave all of the services turned on except Silent Mode. To turn on or turn off Quick Controls services 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Quick Controls, do one of the following: 1 To turn on a service, check its check box.
Customizing settings About Antivirus settings You can use the following Antivirus settings: Automatic Protection The Automatic Protection settings let you control the scanning and monitoring of your computer. It protects your computer by continuously checking for viruses and other security risks. Your options are: 1 Boot Time Protection 1 You can use the Boot Time Protection option to provide an enhanced security level from the time you start your computer.
Customizing settings About Antivirus settings Scans and Risks
Customizing settings About Antivirus settings Scans and Risks settings let you customize the scans that Norton 360 performs on your computer. You can use the following Scans and Risks options: 1 Computer Scans Norton 360 lets you run different types of scans to detect and prevent any virus infection on your computer. 1 You can use the various Computer Scans options to customize the scans that Norton 360 performs on your computer.
Customizing settings About Antivirus settings 1 Norton 360 to protect the ports. Email Antivirus Scan Email Antivirus Scan protects you from the threats that are sent or received in email attachments. 1 This option lets you define how Norton 360 should behave when it scans email messages. Based on the options you choose, Norton 360 automatically scans the email messages that you send or receive.
Customizing settings About Antivirus settings 1 Exclusions / Low Risks Exclusions options specify the items such as folders, files, and drives that you exclude from Norton 360 scans. Scans, signatures, and low-risk items are some items that you can exclude from scanning Exclusions options let you choose which categories of risks you want Norton 360 to detect. Exclusions reduce your w level of protection and should be used only if you have a specific need.
Customizing settings About Antivirus settings Antispyware and Updates Antispyware protects your computer against the security risks that can compromise your personal information and privacy. Norton 360 protects your computer from vulnerabilities through the latest definition and protection updates.
Customizing settings About Antivirus settings 511 About Automatic Protection settings The Boot Time Protection option on the Automatic Protection tab provides an enhanced security level from the time you start your computer. This option ensures better security by running all the necessary components that are required for computer protection as soon as you start your computer. The Real Time Protection settings on the Automatic Protection tab let you control the scanning and monitoring of your computer.
Customizing settings About Antivirus settings You can use the following Real Time Protection options: Auto-Protect
Customizing settings About Antivirus settings Auto-Protect loads into memory and provides constant protection while you work. It checks for viruses and other security risks every time that you run programs on your computer. Auto-Protect checks for viruses when you insert any removable media, access the Internet, or use the document files that you receive or create. It also monitors your computer for any unusual symptoms that might indicate an active threat.
Customizing settings About Antivirus settings boot virus infects your removable media, ensure that Auto-Protect is turned on to rescan the removable media. You then insert the removable media and open it from My Computer for Auto-Protect to rescan it. You can also scan it manually to verify that it is not infected.
Customizing settings About Antivirus settings SONAR Protection 515
Customizing settings About Antivirus settings Symantec Online Network for Advanced Response (SONAR) provides the real-time protection against threats and proactively detects unknown security risks on your computer. SONAR identifies the emerging threats that are based on the behavior of applications. SONAR is quicker than the traditional signature-based threat detection techniques.
Customizing settings About Antivirus settings 1 517 360 to automatically remove low-certainty threats if it does not get any response from you when SONAR Advanced Mode option is enabled. Show SONAR Block Notifications This option lets you enable or disable SONAR Block notifications. Norton 360 suppresses the SONAR Block notifications when you set the Show SONAR Block Notifications option to Log Only.
Customizing settings About Antivirus settings You can use the following Scans and Risks settings: Computer Scans
Customizing settings About Antivirus settings Norton 360 lets you run different types of scans to detect and prevent any virus infection on your computer. The scans are Quick Scan, Full System Scan, and Customized Scan. You can use the various Computer Scans options to customize the scans that Norton 360 performs on your computer. You can also specify scanning of compressed files and Microsoft Office documents.
Customizing settings About Antivirus settings 1 Scans for rootkits and other security risks that might be hidden on your computer. Network Drives Scan Scans the network drives that are connected to your computer. 1 Norton 360 performs a Network Drives Scan during Full System Scan and Custom Scan. By default, the Network Drives Scan option is turned on. If you turn off this option, Norton 360 does not scan network drives.
Customizing settings About Antivirus settings 1 Full System Scan Scans your computer when it is idle. 1 When your computer is idle, Norton 360 runs a Full System Scan. After the scan is complete, you can view the summary of the scan results and take appropriate action when you start using your computer again. You can use the Configure option to schedule the Full System Scan.
Customizing settings About Antivirus settings Scan Performance Profiles The Scan Performance Profiles settings let you configure how Norton 360 should scan your computer based on the digital signature and trust level of the files. You must configure the w Scan Performance Profiles settings before you run a scan or before a scan is scheduled to run. Norton 360 scans your computer according to the configuration you specified in the Scan Performance Profiles settings.
Customizing settings About Antivirus settings Protected Ports Protected Ports settings protect the POP3 and SMTP ports of your email program. You can use this option to manually configure your POP3 and SMTP email ports for email protection. If the SMTP and POP3 port numbers that your Internet service provider (ISP) has provided for your email program is different from the default SMTP and POP3 port numbers, you must configure Norton 360 to protect the ports.
Customizing settings About Antivirus settings Exclusion / Low Risks
Customizing settings About Antivirus settings Exclusions options specify the items such as folders, files, and drives that you exclude from Norton 360 scans. Scans, signatures, and low-risk items are some items that you can exclude from scanning. Exclusions options also let you choose which categories of risks you want Norton 360 to detect. Your options are: 1 Low Risks Lets you manage the low-risk items that are found in your computer.
Customizing settings About Antivirus settings 1 also remove items from the excluded-items list. Signatures to Exclude from All Detections Lets you select known risks by name and remove a risk name from the excluded-items list 1 You can also view the risk impact that is based on the performance, privacy, removal, and stealth impact. Clear file IDs excluded during scans Lets you remove the reputation information of the files that are excluded from scanning.
Customizing settings About Antivirus settings Insight Protection 527 The Insight Network scan uses the Cloud technology wherein a remote server on the Web contains the latest virus definitions. Norton 360 scans your computer for the latest security threats. When Norton 360 performs the Insight Network scan, it uses the virus definitions that are available locally and in the Cloud.
Customizing settings About Antivirus settings Updates
Customizing settings About Antivirus settings Norton 360 protects your computer from vulnerabilities through the latest program and definition updates. Definition updates contain the information that lets Norton 360 recognize and alert you to the presence of a specific virus or security threat. You can use the Updates options to obtain the latest virus definitions through definition updates and keep your computer secure from the latest security threats.
Customizing settings About Firewall settings 1 Definitions are a subset of virus definitions. Apply updates only on reboot Lets you choose how the program updates obtained by Automatic LiveUpdate need to be applied to your computer. Certain program updates may require you to restart your computer for the updates to complete. When you turn on this option, program updates that require system restart are automatically applied the next time you restart your system.
Customizing settings About Firewall settings 531 The following tabs are available in the Firewall settings window: General Settings Lets you activate the general firewall features and customize the ports that your computer uses to access Web pages The general settings let you control how firewall handles the uncommon protocols and the network traffic to and from your computer.
Customizing settings About Firewall settings Intrusion and Browser Protection Prevents intrusion attempts and protects your Web browser from attacks by malicious Web sites You can use the Download Intelligence option that is available on this tab to protect your computer against any unsafe file that you download. This feature supports only downloads using the HTTP protocol and Internet Explorer, Chrome, and Firefox browsers.
Customizing settings About Firewall settings Advanced Settings Lets you activate the advanced protection features of Smart Firewall The advanced settings let you turn on or turn off the Automatic Program Control feature. Automatic Program Control automatically configures Internet access settings for the Web-enabled programs that you run for the first time. To turn on Automatic Program Control, you must set it to Aggressive or Automatic.
Customizing settings About Firewall settings About Firewall General settings Smart Firewall General settings let you activate the general firewall features and customize the ports that your computer uses to access Web pages. Your options are: Uncommon Protocols Determines how the Smart Firewall handles uncommon protocols. Firewall Reset Returns the Smart Firewall to its default state. You can use the Reset option to ensure that all recommended firewall rules and settings are configured.
Customizing settings About Firewall settings Stateful Protocol Filter 535 Automatically allows the Internet traffic that matches the connections that an application opens. Check this option to do the following: 1 Analyze the network traffic that enters your computer. 1 Block the suspicious applications that try to connect to your computer. Automatic File/Printer Sharing Control Allows the computers on the network to share resources such as files, folders, and printers (that are locally attached).
Customizing settings About Firewall settings to date. If you do not use Automatic LiveUpdate, you should run LiveUpdate once a week. Norton 360 also provides the Web Browser Protection feature to protect your Web browser from malicious programs. w The Browser Protection feature is available for Internet Explorer 7.0 or later, Chrome 17.0 or later, and Firefox 10.0 or later. With increasing Internet use, your Web browser is prone to attack by malicious Web sites.
Customizing settings About Firewall settings 537 when Automatic Program Control is set to Aggressive or Automatic. You can use this option to specify how Norton 360 must control any network traffic that uses Teredo to communicate with your computer. You can configure the Automatic Program Control option to the following settings: 1 1 1 Aggressive - Allows Norton 360 to alert you when it detects a program with Unproven or Poor trust level receiving inbound traffic.
Customizing settings About Firewall settings triggers the allowed event is added to the trusted list of its corresponding category in Advanced Events Monitoring. You can remove the application from the list. In this case, firewall alert appears when the application triggers the event next time.
Customizing settings About Norton AntiSpam settings Direct Network Access 539 Monitors the Trojan horses and other malicious programs that bypass network traffic. These programs penetrate the Windows TCP/IP layer to send and receive data without triggering firewall alerts.
Customizing settings About Norton AntiSpam settings Norton AntiSpam settings help you configure the following: 1 The email client with which Norton AntiSpam should integrate 1 The list of allowed email senders 1 1 1 1 The list of blocked email senders The email addresses and domains that Norton AntiSpam should not import into the list of allowed and blocked email senders The option to send feedback to Symantec about misclassified email The option to filter email messages through Web Query to mainta
Customizing settings About Norton AntiSpam settings Client Integration The options on the Client Integration tab let you integrate Norton AntiSpam with your email clients to keep you free from unsolicited email messages. You can also specify whether or not to display a brief introduction of Norton AntiSpam each time you start your email program. In addition, you can specify which address book you want Norton AntiSpam to integrate with.
Customizing settings About Norton AntiSpam settings Web Query Lets you check the Symantec Web servers to filter the spam email messages which the local filters classify as legitimate. Protected Ports Lets you configure your POP3 and SMTP email ports for email protection. About Client Integration settings The Client Integration tab in the AntiSpam settings window lists the supported email programs, or clients, that are installed on your computer and their associated address books.
Customizing settings About My Network settings Address Books 543 Norton 360 supports Norton AntiSpam integration with the address books of email clients from which you want Norton AntiSpam to import email addresses. You can also import into the Allowed List the list of addresses that are present in an email program. You do not have to integrate Norton AntiSpam with your email clients to import the addresses into the Allowed List.
Customizing settings About My Network settings You can use the Configure option in the Network Security Map row to access Network Security Map window. The Network Security Map window provides a pictorial representation of the devices on the network to which your computer is connected. You can view the details of each device before you set up Remote Monitoring. The Product Configuration panel appears when you click the Configure option for the first time.
Customizing settings About My Network settings Network Map Removes all of the devices that are listed in Network Map. You can purge Network Map if you want to create a new list of devices. For example, you can purge all of the devices that were present on your previous network before you connect to a new network. Ensure that you disable Remote Monitoring before you purge the Network Map. Norton 360 cannot purge the Network Map when the Remote Monitoring is turned on.
Customizing settings About backup settings Communications Port Shows the communication port that Norton products use to communicate with each other over the network. If you change the communication port number on your computer, you must change it on each computer that is connected to your Network Security Map. In addition, when you find more computers that use the Remote Monitoring Setup process, ensure that the same port number is used on every computer.
Customizing settings About backup settings 1 Select the files that are required to be backed up. 1 Choose the location to store the backed up files. 1 Assign a schedule to run a backup. In addition to the backup tasks, Norton 360 backup settings let you easily access the backup status of a particular file without opening the product. The Backup Settings window provides you the option to turn off or turn on the Backup.
Customizing settings About backup settings Backup Status Overlays Lets you view the backup status of a file by adding the status overlay to the file’s icon The status overlays that appears are: 1 Green icon with a check mark Indicates that the file has been backed up 1 This icon changes to blue icon with arrows if you modify the file. Blue icon with arrows Indicates that the file has not been backed up 1 This icon changes to green when Norton 360 automatically backs up the file during idle time.
Customizing settings About backup settings Context Menu Lets you add or exclude a file or a folder to a backup set by using the right-click shortcut menu You can use this option after you configure Backup in the Manage Backup Sets window. It lists down all the available backup sets for easy backups.
Customizing settings About Identity Protection settings Reserved Free Disk Space Lets you specify the amount of During Online Backup (in local disk space that you want to MB) reserve. When you perform an online backup, Norton 360 creates a temporary file in your local disk for file transfer. At times, this file becomes large and consumes a large amount of free space available on your local drive.
Customizing settings About Identity Protection settings 551 Antiphishing tells you the following things about the Web pages that you visit: 1 If it is safe to enter confidential information 1 If the Web page is known to be fraudulent 1 If the Web page is approved by Symantec 1 1 If the Web page is known to belong to a suspicious site If the Web page is known to give annoying results Norton Safe Web lets you know that a Web site is malicious before you visit it.
Customizing settings About Identity Protection settings log in to Identity Safe. The password protects you by restricting unauthorized access to your data in Identity Safe. The Identity Safe feature provides you the ease of using your Identity Safe data when you are on the move. You can create an online vault and save your data in the online vault. You access your sensitive Identity Safe data from any computer that is connected to the Internet.
Customizing settings About Identity Protection settings Feature Description Advice Edit Cards Lets you manage your personal information in one place You can use the information that you store in the cards to do the following: 1 Automatically fill forms 1 Provide sensitive information without having to type it while you are online In this way, Identity Safe protects you from keyloggers that steal and misuse your identity.
Customizing settings About Task Scheduling settings Feature Description Advice Edit Notes Lets you store and manage sensitive information It becomes difficult to manage various identity numbers. Edit Notes stores all In Edit of your sensitive Notes, you IDs in a very can include secure way and information lets you easily such as use them while Social you are online. Security number, driver license number, insurance policy number, and legal and financial information.
Customizing settings About Task Scheduling settings Task Scheduling includes the following settings: Automatic Tasks Lets you specify the tasks that should run in the background automatically when your computer is idle These automatic tasks include activities that are related to PC Security and PC Tuneup.
Customizing settings About Task Scheduling settings Scheduling
Customizing settings About Task Scheduling settings Lets you schedule PC Security and PC Tuneup related activities You can specify how often Norton 360 should scan your system for security and performance issues and when it should perform backups. You have the following options for scheduling custom PC Security and PC Tuneup activities: 1 Automatic (Recommended) 1 This option is the recommended option. Norton 360 detects the time your PC is idle and then automatically runs the tasks.
Customizing settings About Administrative Settings idle when there is no detectable mouse or keyboard activity for a period that you specify as idle timeout duration. When you schedule your scans weekly or monthly and check the Run only at idle time option, Norton 360 scans your computer when it is idle. Symantec recommends you to check the Run only at idle time option to experience better performance of your computer.
Customizing settings About Administrative Settings Monthly Report Lets you view how Norton 360 has protected you for the past 30 days. This report includes the activities that Norton 360 performed to protect your computer. You can turn on the Monthly Report option to let Norton 360 automatically display the Monthly Report once in every 30 days. Automatic Download of New Version Lets you automatically download the latest version of the Norton 360.
Customizing settings About Administrative Settings Network Proxy Settings Lets you specify the automatic configuration details, proxy settings, and the authentication details to connect to the Internet. Programs such as LiveUpdate and Norton Insight use the specified proxy server settings to connect to the Symantec server over the Internet. LiveUpdate uses proxy settings to retrieve updates.
Customizing settings About Administrative Settings Norton Community Watch Lets you submit selected security and application data to Symantec for analysis. Norton Community Watch protects you against new potential risks. It collects the information about new security threats from your computer and submits the information to Symantec for analysis. Symantec assesses the data to identify the new threats and resolves it.
Customizing settings About Administrative Settings Remote Management Lets you remotely view your device’s security status and fix some security issues by using Norton Management, Norton One, and Norton Studio. Norton Studio is an app that works on Windows 8. When you turn on Remote Management, Norton 360 publishes details such as your subscription status, security status of your device, and other details to the Norton Management, Norton One, and Norton Studio app.
Customizing settings About Administrative Settings Performance Monitoring 563
Customizing settings About Administrative Settings Lets you monitor the performance of your computer. When the Performance Monitoring option is turned on, Norton 360 monitors the CPU usage and memory usage of your computer. It also records the important system activities that you performed over the period of the last three months. In addition, Norton 360 notifies you with performance alerts when there is a high usage of your system resource by a program or process.
Customizing settings About Administrative Settings 1 Norton 360 saves the event in the Security History log but does not alert you with the notifications. You can also turn off this option if you do not want to view performance alerts. By default, this option is turned on. Resource Threshold Profile for Alerting Lets you configure the resource threshold profile for displaying performance alerts.
Customizing settings About Administrative Settings 1 Use Low Resource Profile On Battery Power Lets you configure Norton 360 to change the resource threshold to low profile when your computer runs on battery power. It ensures better performance of your computer on battery power. When this option is turned off, Norton 360 uses the threshold level that you set in the Resource Threshold Profile For Alerting option. By default, this option is turned on.
Customizing settings About Administrative Settings 1 High-Usage Alert for: 2 CPU 2 When this option is turned on, Norton 360 detects and notifies you about the increased usage of the CPU resource by any program or process. By default, this option is turned on. Memory 2 When this option is turned on, Norton 360 detects and notifies you about the increased usage of memory by any program or process. By default, this option is turned on.
Customizing settings About Administrative Settings 1 Program Exclusions Lets you select specific programs to exclude from appearing in performance alerts. You can use the Configure option to list the programs for which you do not want to get performance alerts. Power Saving Mode Lets you save your battery power by suspending a list of background jobs when your computer is on battery power. By default, this option is turned on.
Customizing settings About Administrative Settings Product Security Lets you secure the product and protect it from unauthorized changes. You have the following options: 1 Non-Admins Access to Settings Lets you access and configure all the options in the Settings window from a non-admin user account as well 1 1 1 By default, this option is turned off. You need to log in to your computer as an administrator to turn on this option.
Customizing settings About Administrative Settings Silent Mode Settings
Customizing settings About Administrative Settings Lets you turn on or turn off Silent Mode. You have the following options: 1 Silent Mode 1 1 When you turn on the Silent Mode option, you enable Silent Mode for a specified duration. Norton 360 suppresses all alerts and suspends the background activities for the duration that you specify.
Customizing settings About Administrative Settings 2 When you use a Media Center application to record a TV program, Norton 360 detects the activity, and automatically turns on Quiet Mode. When Quiet Mode is turned on, Norton 360 suppresses the background activities but continues to display alerts and notifications. User-Specified Programs When you run an application that is listed in the User-Specified Programs list, Norton 360 detects the activity, and automatically turns on Quiet Mode.
Customizing settings About Administrative Settings Automatic Resume Delay Lets you delay the automatic From Sleep or running of Norton-specific Hibernation background tasks when you resume your computer from hibernate mode or standby mode. Automatic Tasks Delay Lets you specify duration for running Norton-specific programs on your computer that run automatically when you turn on your computer. It does not delay Norton 360 protection.
Customizing settings About Administrative Settings Firefox Cleanup Lets your PC run smoothly and efficiently by deleting the unused temporary files and browsing history if you use Firefox Web browser. Norton 360 automatically cleans up Internet Explorer temporary files, history, and bookmarks as a background activity. You have the following options: 1 Firefox Temporary File Cleanup 1 Lets you clean up the temporary files that get accumulated when you visit Web pages in the Firefox Web browser.
Customizing settings About Administrative Settings 575 If you want to temporarily turn off Norton Product Tamper Protection, you can turn it off for a specified duration. w You cannot run System Restore on your computer when Norton Product Tamper Protection is turned on. You must temporarily turn off Norton Product Tamper Protection to run a successful System Restore.
Customizing settings About Administrative Settings To turn on Norton Product Tamper Protection 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click Administrative Settings. 3 Under Product Security, in the Norton Product Tamper Protection row, move the On/Off switch to the left to the On position. 4 Click Apply, and then click Close.
Customizing settings About Administrative Settings 577 You can turn off the Settings Password Protection option if you no longer require password protection for your Norton 360 Settings. Securing your Norton 360 Settings using a password You can secure your Norton 360 Settings from unauthorized access by setting up a password for your product settings. The Settings Password Protection option in the Administrative Settings window lets you secure your Norton 360 Settings using a password.
Customizing settings About Administrative Settings Turning off Norton 360 Settings password You can protect your Norton 360 Settings with a password using the Settings Password Protection option. If the Settings Password Protection option is turned on, you need to enter the Settings password each time to view or configure your Norton 360 settings. You cannot access the product settings without providing your Settings password.
Customizing settings About Administrative Settings w 579 The reset settings password option appears in the Select Uninstall Preference window only if the Settings Password Protection option is turned on. To use the Settings Password Protection option, go to the Norton 360 main window, and then click Settings >General >Product Security. To reset your Norton 360 Settings password 1 On the Windows taskbar, do one of the following: 1 In Windows XP, Windows Vista, or Windows 7, click Start > Control Panel.
Customizing settings About Administrative Settings About Remote Management The Remote Management feature lets you remotely manage Norton 360 using Norton Studio app, Norton Management, and Norton One. It allows Norton 360 to send the product-related details to Norton Management, Norton One, and Norton Studio app. The details that Remote Management publishes help you view and fix some security issues of the device.
Customizing settings About Administrative Settings 581 By default, the Remote Management option is turned off. You can turn on this option if you want to remotely manage Norton 360 on your device.
Customizing settings About Administrative Settings 1 2 Auto-Protect 2 Scan incoming emails 2 Scan outgoing emails 2 Antispyware 2 Intrusion Prevention 2 SONAR 2 Antiphishing 2 Browser Protection Perform the following tasks: 2 Resolve issues 2 Re-key Norton 360 2 Re-sync license 2 Run LiveUpdate Turning on or turning off Remote Management Remote management lets you remotely manage Norton 360 using Norton Management, Norton One, and Norton Studio app.
Customizing settings About Administrative Settings 583 To turn on Remote Management 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click Administrative Settings. 3 In the Remote Management row, move the On/Off switch to the left to the On position. 4 Click Apply, and then click Close. To turn off Remote Management 1 In the Norton 360 main window, click Settings. 2 In the Settings window, under Detailed Settings, click Administrative Settings.
Customizing settings About Administrative Settings
Finding additional solutions 14 This chapter includes the following topics: 1 Finding the version number of your product 1 Finding the End-User License Agreement 1 About upgrading your product 1 About Norton Autofix 1 Staying informed about protection issues 1 About Support 1 Uninstalling Norton 360 Finding the version number of your product If you want to upgrade your Norton product or want to reach the customer support for assistance, you must know your product version number.
Finding additional solutions Finding the End-User License Agreement Finding the End-User License Agreement End-User License Agreement (EULA) is a legal document that you agree to while installing the product. EULA contains information such as the restriction on sharing or usage of the software, the user rights on the software, and the support information. You can read the EULA to learn more about the following information: 1 The usage policies of Norton 360.
Finding additional solutions About upgrading your product 587 turn on the Automatic Download of New Version option. To turn on the Automatic Download of New Version option, go the Norton 360 main window, and then click Settings > Administrative Settings > Automatic Download of New Version > On. If you choose to install the latest version of the product, Norton 360 downloads and seamlessly installs the latest version.
Finding additional solutions About upgrading your product updates. You can use LiveUpdate to obtain the latest updates. The upgrade process might not work if your Web browser is incompatible to communicate with the Symantec servers. w Your product must be activated and you need an Internet connection to check and install new product version. Checking for a new version of the product You can upgrade your product to the latest version if you have an active subscription.
Finding additional solutions About Norton Autofix 589 To check for a new version of the product 1 In the Norton 360 main window, click Support. 2 In the Support drop-down menu, click Check for New Version. This option is available only if your product is activated. The Web page that appears displays whether a new version of the product is available or not. 3 Follow the on-screen instructions to download the new product.
Finding additional solutions About Norton Autofix configure the proxy settings of Norton 360. See “Configuring Network Proxy Settings” on page 67. If you do not know your proxy settings, contact your Internet service provider or network administrator for assistance. Solving a problem using Norton Autofix Norton Autofix performs a Quick Scan of your computer and repairs problems without your intervention.
Finding additional solutions Staying informed about protection issues 591 4 In the Checking Your Connection window, click Retry. 5 If you use a proxy server to connect to the Internet, you may be prompted to authenticate. If you are prompted, then in the Proxy Settings Detected window, do the following: 1 In the Username box, type the user name that you provided when you configured your Network Proxy settings.
Finding additional solutions About Support To stay informed about protection issues 1 Open your Web browser, and go to the following URL: http://www.symantec.com 2 In the Symantec Web site, click Norton. 3 In the menu bar that appears, do the following: 1 Click the Viruses & Risks tab, and then click any item on the left pane to find out more details about it. 1 Click the Community tab, and then use one of the following: Norton Forums Register as a user and participate in discussions.
Finding additional solutions About Support w 593 Support offerings may vary based on the language or product. About Norton Support Web site The Norton Support Web site provides a full range of self-help options. By using Norton Support Web site, you can do the following: 1 1 1 1 1 w Find help with your product download, product subscription, product activation, product installation, and other issues. Find and download the latest product manual.
Finding additional solutions About Support contact the technical support team in the following ways: Live Chat Chat in real time with a support representative. For more complex technical issues, chat offers the option to allow a support representative to connect remotely to your computer and resolve your problem. Email Submit your question on our Web site and receive a response by email. Email support has a slower response time than chat or phone.
Finding additional solutions About Support 595 also use the Search Support box to find solution using a keyword. Norton Support Web site also contains useful links to the product manual, the Norton Account, the Norton Forum, and the spyware help under Additional Resources. To use the Norton Support Web site In the Norton 360 main window, click Support. In the Support drop-down menu, click Get Support. Follow the on-screen instructions. In the Norton Autofix window, click Open Support Web Site.
Finding additional solutions About Support Getting support by phone When you click the Get Support option in the Support drop-down menu, Norton Autofix performs a Quick Scan and should repair your computer problems. However, if the problem persists, you can use the Open Support Web Site option to go to the Norton Support Web site for help by telephone, email, chat, or forum. If you have a problem connecting to the Internet, you get the click here option in the Norton Autofix window.
Finding additional solutions About Support 597 Support policy Symantec recommends that you have the latest version of the product, as it contains new and enhanced features for better protection against security threats. Current help and support for your Norton product can be found at the following URL: www.norton.com/support Symantec reserves the right to change its support policies at any time without notice. You can view the latest version of the support policy at the following URL: www.symantec.
Finding additional solutions About Support If you are a Norton One Premium Member, go to the following Norton One support Web site for information on this topic: https://one.norton.com/support ClubNorton ClubNorton is your one-stop resource center for Internet security. As a Norton customer, Symantec wants to make your experience with your computer safe, enjoyable, and productive.
Finding additional solutions Uninstalling Norton 360 599 Uninstalling Norton 360 You can remove Norton 360 from your computer in the following ways: 1 From Windows Control Panel 1 w From the Start menu You should print out the Uninstalling Norton 360 Help topic before continuing with the uninstallation. You cannot access online Help during uninstallation. If you want to reinstall Norton 360 on your computer, you must uninstall Norton 360 from your computer.
Finding additional solutions Uninstalling Norton 360 To uninstall Norton 360 from Windows Control Panel 1 Do one of the following: 1 On the Windows Taskbar, click Start > Control Panel. 1 In Windows 8, go to Apps, and under Windows System, Click Control Panel 2 In Windows Control Panel, do one of the following: 1 In Windows XP, click Add or Remove Programs. 1 1 In Windows Vista, click Programs and Features. In Windows 7 or Windows 8, click Programs > Programs and Features.
Finding additional solutions Uninstalling Norton 360 601 5 To uninstall Norton 360, click Next. 6 If Norton 360 offers to install the Norton Toolbar after uninstall, do one of the following: 1 To keep the Norton Toolbar after uninstall, click Agree & Install. 1 To uninstall Norton 360 without keeping the Norton Toolbar, click Skip. 7 Do one of the following: 1 Click Restart Now (recommended) to restart your computer. 1 Click Restart Later to restart your computer later.
Finding additional solutions Uninstalling Norton 360 3 To uninstall Norton 360, click Next. 4 If Norton 360 offers to install the Norton Toolbar after uninstall, do one of the following: 1 To keep the Norton Toolbar after uninstall, click Agree & Install. 1 To uninstall Norton 360 without keeping the Norton Toolbar, click Skip. 5 Do one of the following: 1 Click Restart Now (recommended) to restart your computer. 1 Click Restart Later to restart your computer later.
Index A about customer support 593 Actions window deleting security risks 139 performing actions 139 restoring security risks 139 submission, items to Symantec 139 activation 19 about 18 Norton Account 23 online backups 490 problems 22 troubleshooting 22 Add Rule Wizard opening 263 using 263 Address Book Exclusions setting 310 addresses adding allowed 311 adding blocked 313 importing allowed 311 settings 541 Administrative Settings about 558 Advanced Mode allow an event 200 adware found by Auto-Protect 229
Index attention infected files 234 infected items 172 resolve any items 172 Attention Required about 172 resolving the risk 172 Auto-Protect notifications 229 Automatic LiveUpdate turning off or turning on 59 Automatic Program Control about 257 automatic tasks 243 automatic updates 53 Autorun Restore about 477 restoring 478 B background jobs about 94 monitoring 100 backup 245, 435 additional help 486 backup file categories 444 Backup Set 441 categories 117 file extensions 450 file selection 456 file
Index Browser Protection turning on and turning off 290 Browsing options 378 Browsing Options about 378 C cache files 428 Cards about 368 adding 370 deleting 371 duplicating 371 update image 370 updating 371 categories in Norton 360 viewing details 72 CDs for backups 483 changing scan schedules 182 cleaning up disks 425, 429 cleanups in Tuneup 425 Client Integration configuring 306 cloud technology Cloud 182 ClubNorton security tips 598 communication port modifying 423 Computer protecting 120 computers bl
Index detecting security risks 228 device adding 408 editing details 411 excluding from Intrusion Prevention scan 418 purging from exclusion list 292 remotely monitoring 400 removing from the Network Security Map 420 viewing 400 devices changing trust level 413 Diagnostic Report running 430 dialers protection settings 504 disk optimization 245, 426 disks cleaning up 428 fragmentation 426 optimizing 426 domains adding allowed 311 adding blocked 313 Download Insight about 293 configuring alerts 299 turn
Index firewall rules (continued) removing 277 turning on and off 275 Firewall settings adding programs 259 folders scanning 245 fragmentation 426 Full Screen Detection about 208 Full System Scan 169 scheduling 180 G General Rules adding 263 removing 277 H hack tools protection settings 504 high-risk security threats excluding from scanning 202 home network settings 543 I icons in Norton 360 70 Identity Protection categories 117 Settings 550 Identity Safe about 337 accessing 351, 390 backing up 376 chang
Index Internet (continued) temporary files 245, 428 Intrusion AutoBlock blocking computers permanently 289 turning on and off 288 unblocking computers 289 Intrusion Prevention 530, 535 about 285 exclusion list 291 turning individual notifications on and off 286 turning notifications on and off 286 Intrusion Prevention scan excluding a device 418 exclusion list 291 purging devices 292 remove devices 292 IP addresses 410 finding 410 items submitting from Quarantine 158 J joke programs protection settin
Index multipartite viruses 241 N Network changing trust level 413 discovering devices 406 editing details 413 forming 406 joining 406 managing 399 Network Cost Awareness about 320 defining bandwidth 322 turning off 322 turning on 322 network locations 530 Network Proxy Settings about 65 configuring 67 Network Security Map about 399 adding devices 408 modifying communication port 423 purging 420 removing devices 420 turning off 408 turning off Network Security Overview 405 turning on Network Security Overv
Index Norton AntiSpam (continued) Feedback 315 settings 539 SSL 303 Web Query 316 Norton Autofix support assistants 589 Norton Backup and Restore 435 Norton Backup Drive about 479 deleting files 482 restoring files from a Backup Set 481 Norton Bootable Recovery Tool about 39 using 49 Norton Bootable Recovery Tool Wizard downloading 42 Norton Community Watch about 37 joining 37 turning off or turning on 39 Norton Firewall Diagnosis about 278 Norton Insight about 103 Files of Interest 107 refreshing tru
Index P password changing 383 editing 362 Norton Account 29 saving 361 updating 368 PC security categories 117 PC Tuneup categories 117 disk cleanup 429 disk optimization 426 optimization 426 Startup Manager 431 PC tuneup 428 Performance accessing 77 alerts 81 monitoring 89 performance alerts about 81 configure 82 configure threshold 84 excluding programs 86 removing programs from exclusion list 87 turning off 82 turning off low resource profile 85 turning on 82 turning on low resource profile 85 performan
Index Quarantine (continued) managing items 153 opening 153 removing items 157 restoring items 156 Quarantined Items view adding items 125 Quick Controls turning on or turning off 503 Quick Scan running quick scan 168 scheduling 181 Quiet Mode about 208, 214 disk burning 214 options 217 turning off 217 turning on 217 TV recording 214 User-Specified Programs 218 R Real Time Exclusions about 201 Registry Cleanup 245, 430 Remote Management about 580 turning off 582 Remote management turning on 582 Remot
Index Safe Web turning off 334 turning on 334 scan at the command prompt command line scanning 223 Scan Complete appearing after a scan 234 Scan Complete window appearing after a scan 170 Scan Facebook Wall about 197 enabling 199 scanned total items scanned 171 scanning automatically 178 individual elements 170 problems found during 234 Scans command line 223 Computer Scan 166 create a custom scan 173 Custom Scan 166 custom scan 245 deleting custom scans 177 file 170 floppy disk 170 folder 170 Full System
Index Settings 497 Administrative Settings 558 antivirus 504 customizing 502 firewall 276, 530, 534 home network 543 Identity Protection 550 Quick Controls 503 settings Task Scheduling 554 settings password resetting 578 turning off 578 Settings Password Protection about 576 configuring 577 resetting 578 turning off 578 shortcut menu 71 Signature Exclusions about 203 Signature Ezclusions excluding items 204 signatures including and excluding 287 Silent Mode about 208 Full Screen Detection 212 Media Ce
Index Symantec Web site blogs and forums 591 System Insight about 75 Events graph 75 monitoring activities 78 Performance graph 75 system status graph activity details 80 updates (continued) summary 55 upgrading new version 586 User-Specified Programs about 218 adding programs 219 Quiet Mode 218 removing programs 220 T V Task Scheduling settings 554 tasks automatic 243 technical support about 593 using 594 threats newly discovered 61 protection from 251 Trojan horses 240 viruses 240 worms 240 trackware
Index Web Query (continued) turning off 317 turning on 317 Web sites cache files 428 Windows temporary files 245 wireless network viewing status 421 worms 240
foo Norton from Symantec products protect consumers from traditional threats with antivirus, phishing protection, and spyware protection. They also protect against bots, drive-by downloads, and identity theft, and are light on system resources. In addition, Symantec provides services such as online backup and PC Tuneup, and is a trusted source for family online safety.