2012
Table Of Contents
- Norton™ Internet Security Product Manual
- Contents
- 1. Getting started
- 2. Monitoring your system's performance
- 3. Protecting your files and data
- 4. Responding to security issues
- 5. Protecting Internet activities
- 6. Securing your sensitive data
- 7. Monitoring protection features
- 8. Customizing protection features
- 9. Finding additional solutions
- Index
Enables (+) or disables
(-) scanning of stealth
items
/ST[+|-]
Uses a task file as input
to the list of items to
scan
Task file path should
follow the ':' (for
example,
TASK:C:\Documents
and Settings\All
Users\Application
Data\Symantec\Norton
Internet
Security\Tasks\Full.sca)
/TASK:[taskfile.sca]
Uses a task file as input
to the list of items to
scan
Task file path should
follow the ':' (for
example,
TASK:C:\Documents
and Settings\All
Users\Application
Data\Symantec\Norton
Internet
Security\Tasks\Full.sca)
w
Assumes the task
file as a temporary file
and deletes the task
file at the end of
processing.
/TTASK:[taskfile.sca]
Scans the files that
matches specified wild
card
[folder_path]\*[?]
133Protecting your files and data
About the Norton Internet Security scans










