Product manual
Computer Scan. Norton 360 uses the Computer Scan
to perform the signature-based threat detection. It
compares the signature of the filtered reputation files
against the known threat signatures to identify threats
on your computer. If a security threat is detected,
Norton 360 automatically removes the threat from
your computer.
Norton 360 uses the Insight Network Scan to detect
suspicious or vulnerable files on your computer using
the reputation-based threat detection. The Insight
Network Scan uses the Cloud technology wherein a
remote Symantec server on the Web stores the latest
reputation information. It checks the Cloud for the
reputation information on the filtered files.
Norton 360 obtains specific information such as file
name and hash key about the filtered reputation files
and sends this information to the Cloud. The Cloud
analyzes the file information and provides a trust level
for each file. The Symantec server sends back the
reputation information to your computer. If any of the
filtered files is suspicious or vulnerable, Norton 360
assigns Bad or Poor trust level. Apart from reputation
information, Norton 360 also checks for the latest virus
definitions on the Cloud.
w
Your computer must be connected to the Internet to
access the latest reputation information and virus
definitions from the Cloud. If your computer is not
connected to the Internet, Norton 360 uses the
reputation information that is available locally.
When you perform a Reputation Scan, Norton 360
considers only the following categories of files:
This category includes
Windows executable files
(.exe) and script files (.scr).
Executable files
Scanning your computer
About Reputation Scan
186