2012
Table Of Contents
- Norton™ Internet Security Product Manual
- Contents
- 1. Getting started
- 2. Monitoring your system's performance
- 3. Protecting your files and data
- 4. Responding to security issues
- 5. Protecting Internet activities
- 6. Securing your sensitive data
- 7. Monitoring protection features
- 8. Customizing protection features
- 9. Finding additional solutions
- Index
6
Click Apply and then click OK.
7
In the Settings window, click OK.
About the Network Security Map
A home network typically consists of the computers
and other devices that share your Internet connection.
The Network Security Map helps you view and manage
your network.
After you configure Network Security Map, Norton
Internet Security automatically detects the devices
that are connected to your network and lists them in
the Network Security Map. You can view devices and
customize the Network Security Map to remotely
monitor the computers on which a Norton product is
installed.
w
Ensure that the computers that you want to remotely
monitor have a version of a Norton product that
supports Remote Monitoring.
You can monitor the following items in the Network
Security Map:
1 Security status of the computers that are connected
to the network
1 Status of the protection features of the computers
that are connected to the network
1 Subscription status and Norton product version of
the computers that are connected to your network
1 Status of your wireless network connection
1 Connection status of the devices that are on the
network
1 The known, unknown, or intruder devices that are
on your network
You can grant or deny permission to the networked
devices to access your computer.
You can also modify details about a computer or device
that is connected to your network.
Protecting Internet activities
About the Network Security Map
272










