2012

Chapter 4 Responding to security issues ... . . ........... 179
What to do if a security risk is found ...... . . . .. 179
Chapter 5 Protecting Internet activities ........... . . .... 193
About the Smart Firewall . . . . ................ . . ... 193
About Download Insight .... . . . ................ . . .. 233
About Intrusion Prevention ............ . . . ....... 244
About Vulnerability Protection ............... . . . 251
About the types of security risks ... . . . .......... 254
About Norton AntiSpam . . . . ................ . . ..... 255
About configuring POP3 and SMTP
ports ................. . . ................ . . . ....... 269
About the Network Security Map . . . . ............ 272
About Metered Broadband Mode ............ . . .. 297
Chapter 6 Securing your sensitive data ....... . . . ........ 301
About securing your sensitive data .. . . . ........ 301
Chapter 7 Monitoring protection features .............. 371
About Security History . . ................ . . . ....... 371
Chapter 8 Customizing protection features . ........... 407
Feature summary .......... . . . ................ . . . ... 407
About turning off automatic features .......... 416
About customizing settings and
options .. . . . ................ . . ................ . . . 422
Chapter 9 Finding additional solutions ........ . . . ....... 473
Finding the version number of your
product ... . . . ............... . . . ................ . . 473
Finding the End-User License
Agreement ...... . . . ............... . . . .......... 474
About upgrading your product . . . ................ 474
About Norton Autofix . . . . ............... . . . ........ 477
Staying informed about protection
issues . . ............... . . . ................ . . . ..... 479
About Support . ............... . . . ................ . . . . 481
About uninstalling .. . . . ................ . . . .......... 486
Contents10