Product manual
checks for the infections that have processes running
in memory. It also checks for the infections that the
start-up files and folders refer.
If that does not work, read the information on the
Threats Detected window to identify the types of files
that cannot be repaired. You can take one of the
following actions, depending on the file type:
You can view the file type of
the detected risk. This
information helps you to
decide the action that can be
taken depending on the file
type.
For example, you can view the
infected files with the
following file name
extensions (any file can be
infected):
1 .exe
1 .doc
1 .dot
1 .xls
Use the Threats Detected
window to solve the problem.
Infected files
Replace using your operating
system disks.
Hard disk master boot record,
boot record, or system files
(such as IO.SYS or
MSDOS.SYS) and floppy disk
boot record and system files
Resolving a suspected security risk
Norton Internet Security needs to close a suspected
security risk program to resolve it.
209Responding to security issues
What to do if a security risk is found