2012
Table Of Contents
- Norton™ Internet Security Product Manual
- Contents
- 1. Getting started
- 2. Monitoring your system's performance
- 3. Protecting your files and data
- 4. Responding to security issues
- 5. Protecting Internet activities
- 6. Securing your sensitive data
- 7. Monitoring protection features
- 8. Customizing protection features
- 9. Finding additional solutions
- Index
Lets you configure how
you want Norton Internet
Security to monitor your
network activities.
You can protect your
computer against the
threats that you might
receive through email
attachments, instant
messaging program
attachments. You can
also configure the
communication port that
Norton products use to
communicate with each
other.
In addition, you can
protect your computer
against intrusion
attempts and
unauthorized traffic. You
can also configure Norton
AntiSpam options to filter
out unsolicited email
messages.
Your options are:
1 Intrusion Prevention
1 Message Protection
1 Network Security
Settings
1 Smart Firewall
Network
425Customizing protection features
About customizing settings and options










