User manual
Table Of Contents
- Norton Security Product Manual
- Contents
- 1. Getting started
- 2. Activating your product
- 3. Managing Norton products
- 4. Identifying fraudulent websites
- 5. Guarding files
- 6. Scanning your Mac manually
- 7. Keeping secure on the Internet
- 8. Customizing settings
- About Automatic Scans settings
- Turning off or turning on Automatic Scans
- Including files for Automatic Scans
- Excluding files from Automatic Scans
- Removing files from the Automatic Scans exclusion list
- Removing files from Automatic Scans list
- About Scheduled Scans
- Turning on or turning off Scheduled Scans
- Customizing Scheduled Scans settings
- About Idle Scans
- Turning off or turning on Idle Scans
- Customizing Idle Scans settings
- About Firewall settings
- About Connection Blocking settings
- Configuring Connection Blocking settings
- About access settings for an application
- Configuring the access settings for an application
- Customizing the specific access settings for an application
- Editing the access settings of an application
- Removing access settings for an application
- About access settings for a service
- Configuring the access settings for services
- Customizing the specific access settings for a service
- Editing the access settings for a service
- Removing the access settings for a service
- About firewall rule for IP addresses
- Configuring firewall rules for an IP address
- Modifying firewall rules for an IP address
- Removing firewall rule for an IP address
- About configuring firewall for an application
- Setting up firewall rules for an application
- Customizing the firewall rule for an application
- Removing the firewall rule for an application
- About Location Awareness settings
- Disabling or enabling Location Awareness
- Viewing Location Awareness settings
- Exporting the connection blocking settings for a network location
- About advanced protection
- Disabling or enabling advanced protection features
- Configuring Norton DeepSight Community Download
- Configuring Norton DeepSight Community Submission
- Configuring AutoBlock settings
- Managing Excluded IP addresses
- Configuring Signatures settings
- 9. Managing items in Quarantine
- 10. Protecting against new threats
- 11. Finding additional solutions
- 12. Service and support solutions
6
Select one of the following tabs:
Lets you specify the access
settings for the incoming
connections that use the
service.
Incoming
Lets you specify the access
settings for the outgoing
connections that use the
service.
Outgoing
7
In the View pane, select the row that contains the
specific access settings for a service and do one of
the following:
1 Click Remove.
1 Click the - sign next to the service name.
8
In the confirmation window, click Remove.
About firewall rule for IP addresses
You can use the Connection Blocking window to
configure the firewall for zones in the network to which
your Mac is connected. You can configure the zone
access settings to specify IP addresses to which you
want to allow or block connections.
The Trust Zone in the View pane shows the IP
addresses to or from which you allowed access attempts
for a network location. The Block Zone in the View
pane shows the IP address to or from which you blocked
access attempts of a network location.
You can perform the following activities for a zone from
the Connection Blocking window:
1 Configure the access settings for an IP address
1 Edit the access settings for an IP address
1 Remove the access settings for an IP address
105Customizing settings
About firewall rule for IP addresses










