2021
Table Of Contents
- Norton™ Internet Security
- Contents
- 1. Welcome to Norton
- 2. Download and install Norton
- 3. Understand and respond to threats
- 4. Manage your security
- 5. Scan your computer
- Run Norton scans to check for threats on your PC
- Create your own custom Norton scans
- Schedule Norton scans
- Customize Real Time Protection settings
- View real-time threats detected by Norton SONAR
- Exclude files and folders from Norton Auto-Protect, SONAR, and Download Intelligence scans
- Exclude files with low-risk signatures from Norton scans
- Clear file IDs excluded during scans
- Turn on or turn off automatic tasks
- Run custom tasks
- Schedule security and performance scans
- Configure Data Protector to block malicious processes affecting your PC
- Set Norton to remove scripts that can be exploited in phishing attempts
- Learn more about Norton Script Control
- 6. Keep secure on the Internet
- Turn Norton Firewall on or off
- Customize Program Rules to change access settings for programs
- Change the order of firewall rules
- Turn off a Traffic rule temporarily
- Allow Internet access for a blocked program
- Turn Firewall Block Notification off
- Turn Browser Protection on
- Learn more about Intrusion Prevention exclusion list
- Set Norton to protect you from exploits, cybercriminals, and zero-day attacks
- Set Norton to monitor applications and block malicious websites from accessing your computer
- Turn off or turn on AutoBlock
- Unblock computers that are blocked by Norton AutoBlock
- Add a device to Device Trust
- Turn off or turn on Download Intelligence
- Turn off or turn on spam filtering
- Define the Internet usage for Norton
- Turn off or turn on Network Cost Awareness
- Learn more about Wi-Fi Security
- Protect your banking information using Norton Safe Web
- 7. Secure your sensitive data
- Add or install the Norton browser extensions to your browser
- Turn off or turn on Norton Safe Web
- Securely search and browse the web using Norton Safe Search
- Scam Insight
- Antiphishing
- Access Norton Password Manager
- Turn on or turn off Norton Password Manager
- Create Norton Password Manager cloud vault
- Delete your Norton Password Manager vault
- Export your Norton Password Manager data
- Import your Norton Password Manager data
- Enable or disable the Norton Security toolbar
- 8. Keep your PC tuned up
- 9. Customize settings
- 10. Find additional solutions
Exploit Prevention Techniques
Norton uses proactive exploit prevention techniques to protect your computer from the latest
zero-day attacks. You can turn individual techniques on or off from the Settings window. By
default, all techniques are turned on.
Note: Norton recommends that you keep all individual Exploit Prevention techniques turned
on to protect against the widest range of exploits.
Exploit Prevention techniques include:
■ Java Process Protection
Prevents remote cybercriminals from using malicious code through java processes and
allows only trusted java processes to run.
■ Structured Exception Handler Overwrite Protection
Protects against structured exception handling exploits, which compromise an application
by overwriting the pointer of an exception handler with an attacker controlled address.
■ Stack Pivot Detection
Block exploit attacks that changes the stack pointer with attacker’s controlled memory to
execute its Return Oriented Programming (ROP) crafted attack code.
■ Data Execution Prevention Enforcement
Blocks attackers from executing malicious code from stack or heap memory of your
computer.
■ Memory Layout Randomization Enforcement
Enforces dynamically loaded application DLLs or modules to be always loaded in random
locations to protect them from attackers.
■ Heap Spray Protection
Protects commonly targeted memory locations where exploits or attackers allocate their
shellcode using heap spray attack techniques.
■ Memory Layout Randomization Enhancement
Improves the ASLR (Address Space Layout Randomization) behavior of the operating
system when allocating critical memory locations of the application. This makes those
memory locations less predictable from attackers.
■ Null Page Protection
Pre-allocates the null memory location which will help in preventing attacks on null pointer
dereference vulnerabilities.
■ Remote DLL Injection Detection
Prevents remote cybercriminals from inserting malicious executable code over external
networks such as public IP addresses or domains.
56Keep secure on the Internet
Set Norton to protect you from exploits, cybercriminals, and zero-day attacks










