Product manual
About Intrusion Prevention
Intrusion Prevention scans all the network traffic that
enters and exits your computer and compares this
information against a set of attack signatures. Attack
signatures contain the information that identifies an
attacker's attempt to exploit a known operating system
or program vulnerability. Intrusion Prevention protects
your computer against most common Internet attacks.
For more information about the attacks that Intrusion
Prevention blocks, go to the following URL:
http://www.symantec.com/business/
security_response/attacksignatures
If the information matches an attack signature,
Intrusion Prevention automatically discards the packet
and breaks the connection with the computer that sent
the data. This action protects your computer from being
affected in any way.
Intrusion Prevention scanning of every request from
all the devices that access your computer increases the
scan time which slows down the network speed of your
computer. You can reduce the scan time and improve
the network speed of your computer by excluding the
trusted devices from Intrusion Prevention scanning.
If you are sure that a device on your network is safe,
you use the Edit Device Trust Level window to change
the trust level of the device to Full Trust. You can then
select the Exclude from IPS scanning option to exclude
these trusted devices from Intrusion Prevention scan.
Intrusion Prevention relies on an extensive list of
attack signatures to detect and block suspicious
network activity. Norton 360 runs LiveUpdate
automatically to keep your list of attack signatures up
to date. If you do not use Automatic LiveUpdate, you
should manually run LiveUpdate once a week.
285Keeping secure on the Internet
About Intrusion Prevention