2012
Table Of Contents
- Norton™ Internet Security Product Manual
- Contents
- 1. Getting started
- 2. Monitoring your system's performance
- 3. Protecting your files and data
- 4. Responding to security issues
- 5. Protecting Internet activities
- 6. Securing your sensitive data
- 7. Monitoring protection features
- 8. Customizing protection features
- 9. Finding additional solutions
- Index
file extensions
of infected files 188
filter
Web Query 267
filtering
email 257
identifying email senders 261,
263
SSL 255
web-based 267
firewall rules
about 194
adding 204
changing the order of 214
creating 197, 205
default 195
modifying 212
processing order 195, 214
removing 216
turning on and off 215
Full Screen Detection
about 163
Full System Scan
running Full System Scan 118
scheduling 130
G
General Rules
adding 204
changing 212
removing 216
turning on and off 215
H
high-risk security threats
excluding from scanning 159
I
Identity Safe
about 313
Identity Safe (continued)
accessing 326, 360, 364
backing up 349
changing password 355
configuring 328
information 301
logging in and out 327
logins 332
Norton toolbar 327
options 351
password 352
restoring data 350
security 352
turning off or turning on 420
Identity Safe Options
about 351
Identity Safe Password & Security
options
about 352
Identity Safe profiles
about 317
creating 318
identity theft
Internet 301
Idle Time Optimizer
about 86
turning off 87
turning on 87
Idle Time Out
setting 156
Idle Time Scans
about 153
Full System Scan 153
Quick Scan 153
turning off 155
turning on 155
import
logins 324
Insight Network
about 134
cloud computing 134
Index494










