2021
Table Of Contents
- Norton™ Internet Security
- Contents
- 1. Welcome to Norton
- 2. Download and install Norton
- 3. Understand and respond to threats
- 4. Manage your security
- 5. Scan your computer
- Run Norton scans to check for threats on your PC
- Create your own custom Norton scans
- Schedule Norton scans
- Customize Real Time Protection settings
- View real-time threats detected by Norton SONAR
- Exclude files and folders from Norton Auto-Protect, SONAR, and Download Intelligence scans
- Exclude files with low-risk signatures from Norton scans
- Clear file IDs excluded during scans
- Turn on or turn off automatic tasks
- Run custom tasks
- Schedule security and performance scans
- Configure Data Protector to block malicious processes affecting your PC
- Set Norton to remove scripts that can be exploited in phishing attempts
- Learn more about Norton Script Control
- 6. Keep secure on the Internet
- Turn Norton Firewall on or off
- Customize Program Rules to change access settings for programs
- Change the order of firewall rules
- Turn off a Traffic rule temporarily
- Allow Internet access for a blocked program
- Turn Firewall Block Notification off
- Turn Browser Protection on
- Learn more about Intrusion Prevention exclusion list
- Set Norton to protect you from exploits, cybercriminals, and zero-day attacks
- Set Norton to monitor applications and block malicious websites from accessing your computer
- Turn off or turn on AutoBlock
- Unblock computers that are blocked by Norton AutoBlock
- Add a device to Device Trust
- Turn off or turn on Download Intelligence
- Turn off or turn on spam filtering
- Define the Internet usage for Norton
- Turn off or turn on Network Cost Awareness
- Learn more about Wi-Fi Security
- Protect your banking information using Norton Safe Web
- 7. Secure your sensitive data
- Add or install the Norton browser extensions to your browser
- Turn off or turn on Norton Safe Web
- Securely search and browse the web using Norton Safe Search
- Scam Insight
- Antiphishing
- Access Norton Password Manager
- Turn on or turn off Norton Password Manager
- Create Norton Password Manager cloud vault
- Delete your Norton Password Manager vault
- Export your Norton Password Manager data
- Import your Norton Password Manager data
- Enable or disable the Norton Security toolbar
- 8. Keep your PC tuned up
- 9. Customize settings
- 10. Find additional solutions
■ Stack Execution Prevention, Suspicious API Invocation Detection, and Heap Payload
Detection techniques protect your computer against Return-Oriented Programming (ROP)
attacks that bypass the Address Space Layout Randomization and Data Execution
Prevention exploit mitigation techniques.
Set Norton to monitor applications and block
malicious websites from accessing your computer
A few malicious websites may attempt to gain unauthorized access to your device information
when you install and open any freeware or shareware applications. Malicious websites detect
and exploit vulnerabilities to download malware such as crypto mining malware that can
expose your device information to cybercriminals.
With App URL Monitoring turned on, Norton monitors all applications that are installed on
your computer and block the malicious websites from accessing your computer. Norton alerts
you when it blocks a malicious website and you can view the information about the attack
using the Security History window.
Note: App URL Monitoring does not monitor the browser applications. To protect your browser
application from malicious websites, you need to add Norton browser extensions.
Turn on App URL Monitoring to block malicious websites
By default, App URL Monitoring is turned on. Keep App URL Monitoring turned on to ensure
protection against malicious websites.
1
Start Norton.
If you see the My Norton window, next to Device Security, click Open.
2
In the Norton main window, click Settings.
3
In the Settings window, click Firewall or Network.
4
Click the Intrusion and Browser Protection tab.
5
Under Intrusion Prevention, in the App URL Monitoring row, move the On/Off switch
to On.
Exclude a URL or domain from monitoring
Intrusion Prevention uses an extensive list of attack signatures to detect and block suspicious
websites. In some cases, benign websites may be identified as suspicious, because it has a
similar attack signature. If you receive notifications about a possible attack, and you know that
the website or domain that triggers the notification is safe, you can exclude the signature from
monitoring.
57Keep secure on the Internet
Set Norton to monitor applications and block malicious websites from accessing your computer










