2021
Table Of Contents
- Norton™ Internet Security
- Contents
- 1. Welcome to Norton
- 2. Download and install Norton
- 3. Understand and respond to threats
- 4. Manage your security
- 5. Scan your computer
- Run Norton scans to check for threats on your PC
- Create your own custom Norton scans
- Schedule Norton scans
- Customize Real Time Protection settings
- View real-time threats detected by Norton SONAR
- Exclude files and folders from Norton Auto-Protect, SONAR, and Download Intelligence scans
- Exclude files with low-risk signatures from Norton scans
- Clear file IDs excluded during scans
- Turn on or turn off automatic tasks
- Run custom tasks
- Schedule security and performance scans
- Configure Data Protector to block malicious processes affecting your PC
- Set Norton to remove scripts that can be exploited in phishing attempts
- Learn more about Norton Script Control
- 6. Keep secure on the Internet
- Turn Norton Firewall on or off
- Customize Program Rules to change access settings for programs
- Change the order of firewall rules
- Turn off a Traffic rule temporarily
- Allow Internet access for a blocked program
- Turn Firewall Block Notification off
- Turn Browser Protection on
- Learn more about Intrusion Prevention exclusion list
- Set Norton to protect you from exploits, cybercriminals, and zero-day attacks
- Set Norton to monitor applications and block malicious websites from accessing your computer
- Turn off or turn on AutoBlock
- Unblock computers that are blocked by Norton AutoBlock
- Add a device to Device Trust
- Turn off or turn on Download Intelligence
- Turn off or turn on spam filtering
- Define the Internet usage for Norton
- Turn off or turn on Network Cost Awareness
- Learn more about Wi-Fi Security
- Protect your banking information using Norton Safe Web
- 7. Secure your sensitive data
- Add or install the Norton browser extensions to your browser
- Turn off or turn on Norton Safe Web
- Securely search and browse the web using Norton Safe Search
- Scam Insight
- Antiphishing
- Access Norton Password Manager
- Turn on or turn off Norton Password Manager
- Create Norton Password Manager cloud vault
- Delete your Norton Password Manager vault
- Export your Norton Password Manager data
- Import your Norton Password Manager data
- Enable or disable the Norton Security toolbar
- 8. Keep your PC tuned up
- 9. Customize settings
- 10. Find additional solutions
Script Control identifies potential threats based on the behavior of files. If Norton detects any
potentially dangerous activity when you open a document or program with embedded script,
it blocks the application from running the script. You can configure how you want Norton to
handle the scripts when you open documents or programs with embedded scripts.
Restore the original file
1
Start Norton.
If you see the My Norton window, in the Device Security row, click Open.
2
In the Norton main window, double-click Security, and then click History.
3
In the Security History window, from the Show drop-down list, select Script Control.
4
In the Script Control view, select the item that you want to restore.
5
On the right pane, under Details, click Restore.
6
In the Script Control Restore window, click Yes.
7
In the prompt that appears, select Yes.
8
In the Security History window, click Close.
Turn on or turn off Script Control
1
Start Norton.
If you see the My Norton window, in the Device Security row, click Open.
2
In the Norton main window, click Settings.
3
In the Settings window, click Antivirus.
4
In the Antivirus settings window, click the Script Control tab.
5
In the Remove scripts when downloading documents row, move the On/Off switch to
On or Off, and then click Apply.
If you turn off, do the following:
■ In the Security Request window, in the Select the duration drop-down list, select
the amount of time that you want to turn off the option, and click OK.
6
In the Block scripts when opening documents row, move the On/Off switch to On or
Off, and then click Apply.
If you turn off, do the following:
43Scan your computer
Set Norton to remove scripts that can be exploited in phishing attempts










