Product manual
6
Click OK.
7
In the Intrusion Signatures window, click OK.
8
In the Settings window, click Apply.
Excluding or including attack signatures in monitoring
In some cases, benign network activity may appear
similar to an attack signature. You may receive
repeated notifications about possible attacks. If you
know that the attacks that trigger these notifications
are safe, you can create exclusion for the attack
signature that matches the benign activity.
Each exclusion that you create leaves your computer
vulnerable to attacks.
If you have excluded the attack signatures that you
want to monitor again, you can include them in the list
of active signatures.
To exclude attack signatures from being monitored
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings,
click Firewall.
3
On the Intrusion and BrowserProtection tab, under
Intrusion Prevention, in the Intrusion Signatures
row, click Configure.
4
In the Intrusion Signatures window, uncheck the
attack signatures that you want to exclude.
5
Click OK.
To include the attack signatures that were previously
excluded
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings,
click Firewall.
3
On the Intrusion and BrowserProtection tab, under
Intrusion Prevention, in the Intrusion Signatures
row, click Configure.
4
In the Intrusion Signatures window, check the
attack signatures that you want to include.
287Keeping secure on the Internet
About Intrusion Prevention