Product manual
Scan, it also performs a Computer Scan. Norton
Internet Security uses the Computer Scan to perform
the signature-based threat detection. It compares the
signature of the filtered reputation files against the
known threat signatures to identify threats on your
computer. If a security threat is detected, Norton
Internet Security automatically removes the threat
from your computer.
Norton Internet Security uses the Insight Network
Scan to detect suspicious or vulnerable files on your
computer using the reputation-based threat detection.
The Insight Network Scan uses the Cloud technology
wherein a remote Symantec server on the Web stores
the latest reputation information. It checks the Cloud
for the reputation information on the filtered files.
Norton Internet Security obtains specific information
such as file name and hash key about the filtered
reputation files and sends this information to the
Cloud. The Cloud analyzes the file information and
provides a trust level for each file. The Symantec server
sends back the reputation information to your
computer. If any of the filtered files is suspicious or
vulnerable, Norton Internet Security assigns Bad or
Poor trust level. Apart from reputation information,
Norton Internet Security also checks for the latest virus
definitions on the Cloud.
w
Your computer must be connected to the Internet to
access the latest reputation information and virus
definitions from the Cloud. If your computer is not
connected to the Internet, Norton Internet Security
uses the reputation information that is available locally.
When you perform a Reputation Scan, Norton Internet
Security considers only the following categories of files:
This category includes
Windows executable files
(.exe) and script files (.scr).
Executable files
Protecting your files and data
About the Norton Internet Security scans
156