2012
Table Of Contents
- Norton™ Internet Security Product Manual
- Contents
- 1. Getting started
- 2. Monitoring your system's performance
- 3. Protecting your files and data
- 4. Responding to security issues
- 5. Protecting Internet activities
- 6. Securing your sensitive data
- 7. Monitoring protection features
- 8. Customizing protection features
- 9. Finding additional solutions
- Index
suspicious file.
Indicates the community
usage level of the file.
The search results are
grouped in to the following
categories:
1 Very Few Users: Shows
the files that have very
low user prevalence.
1 Few Users: Shows the
files that have average
user prevalence.
1 Many Users: Shows the
files that have very high
user prevalence.
You can also use the
community usage of a file to
determine the legitimacy of
the file. Symantec uses a
stringent statistical method
to evaluate the
trustworthiness of a file and
to classify the file as a Good
file.
Prevalence
Protecting your files and data
About the Norton Internet Security scans
148










