358
Norton AntiVirus TM Product Manual Care for our Environment; It's the right thing to do.Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual is made from recycled materials.

Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

NortonAntiVirus

TM

Product Manual

Care for our Environment; ‘It's the right thing to do.’Symantec has removed the cover from this manual to reduce the Environmental Footprint of ourproducts. This manual is made from recycled materials.

Page 2: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Norton AntiVirus™Product Manual

The software described in this book is furnished under a licenseagreement and may be used only in accordance with the terms ofthe agreement.

Documentation version 20.1

Copyright © 2012 Symantec Corporation. All rights reserved.

Symantec, the Symantec Logo, LiveUpdate, Norton 360, and Nortonare trademarks or registered trademarks of Symantec Corporationor its affiliates in the U.S. and other countries. Portions of thisproduct Copyright 1996-2011 Glyph & Cog, LLC. Other names maybe trademarks of their respective owners.

The product described in this document is distributed under licensesrestricting its use, copying, distribution, and decompilation/reverseengineering. No part of this document may be reproduced in anyform by any means without prior written authorization of SymantecCorporation and its licensors, if any.

THE DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESSOR IMPLIED CONDITIONS, REPRESENTATIONS ANDWARRANTIES, INCLUDING ANY IMPLIED WARRANTY OFMERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE ORNON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENTTHAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.SYMANTEC CORPORATION SHALL NOT BE LIABLE FORINCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTIONWITH THE FURNISHING, PERFORMANCE, OR USE OF THISDOCUMENTATION. THE INFORMATION CONTAINED IN THISDOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.

The Licensed Software and Documentation are deemed to becommercial computer software as defined in FAR 12.212 and subjectto restricted rights as defined in FAR Section 52.227-19 "CommercialComputer Software - Restricted Rights" and DFARS 227.7202, etseq. “Commercial Computer Software and Commercial ComputerSoftware Documentation”, as applicable, and any successorregulations. Any use, modification, reproduction release,performance, display or disclosure of the Licensed Software andDocumentation by the U.S. Government shall be solely in accordancewith the terms of this Agreement.

Symantec Corporation350 Ellis Street,Mountain View, CA 94043

http://www.symantec.com

Page 3: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Norton License AgreementNorton AntiVirus™

IMPORTANTPLEASE READ THE TERMSAND CONDITIONS OF THIS LICENSEAGREEMENT (“LICENSE AGREEMENT”)CAREFULLY BEFORE USING THESOFTWARE (AS DEFINED BELOW).SYMANTEC CORPORATION, IF YOU ARELOCATED IN THE AMERICAS; ORSYMANTEC ASIA PACIFIC PTE LTD, IF YOUARE LOCATED IN THE ASIA PACIFIC RIMOR JAPAN; OR SYMANTEC LIMITED, IF YOUARE LOCATED IN EUROPE, THE MIDDLEEAST OR AFRICA (“SYMANTEC”) ISWILLING TO LICENSE THE SOFTWARE TOYOU AS THE INDIVIDUAL, THE COMPANY,OR THE LEGAL ENTITY THAT WILL BEUTILIZING THE SOFTWARE (REFERENCEDBELOW AS “YOU” OR “YOUR”) ONLY ONTHE CONDITION THAT YOU ACCEPT ALLOF THE TERMS OF THIS LICENSEAGREEMENT. THIS IS A LEGAL ANDENFORCEABLE CONTRACT BETWEEN YOUAND SYMANTEC. BY OPENING THISPACKAGE, BREAKING THE SEAL, CLICKINGTHE “I AGREE” OR “YES” BUTTON OROTHERWISE INDICATING ASSENTELECTRONICALLY, OR LOADING THESOFTWARE, YOU AGREE TO THE TERMSAND CONDITIONS OF THIS LICENSEAGREEMENT. IF YOU DO NOT AGREE TOTHESE TERMS AND CONDITIONS, CLICKTHE “CANCEL” OR “NO” OR “CLOSEWINDOW” BUTTON OR OTHERWISEINDICATE REFUSAL, MAKE NO FURTHERUSE OF THE SOFTWARE, AND CONTACTYOUR VENDOR OR SYMANTEC CUSTOMERSERVICE, USING THE CONTACT DETAILSIN SECTION 12 OF THIS LICENSEAGREEMENT, FOR INFORMATION ON HOWTO OBTAIN A REFUND OF THE AMOUNTYOU PAID FOR THE CURRENT SERVICEPERIOD (DEFINED BELOW) (LESS SHIPPING,HANDLING, AND ANY APPLICABLE TAXESEXCEPT IN CERTAIN STATES ANDCOUNTRIES WHERE SHIPPING, HANDLING,AND TAXES ARE REFUNDABLE) AT ANYTIME DURING THE SIXTY (60) DAY PERIODFOLLOWING THE DATE OF PURCHASE OFAN ANNUAL SUBSCRIPTION OR WITHINTHIRTY (30) DAYS FOLLOWING THE DATEOF PURCHASE OF A MONTHLYSUBSCRIPTION.

1. License:The software (including all its accompanyingfeatures and services), and softwaredocumentation, (including any productpackaging) (the “Documentation”), thataccompanies this License Agreement(collectively the “Software”) is the propertyof Symantec or its licensors, and is protectedby copyright law. Although Symanteccontinues to own the Software, after Youracceptance of this License Agreement Youwill have certain rights to use the Softwareduring the Service Period. The “ServicePeriod” shall begin on either (a) the date ofYour initial installation of a copy of theSoftware on a computer, mobile or mobilecomputing device (a “Device”), or (b) if Youreceived this Software as part of a multipleproduct offering, the date of Your initialinstallation of a copy of the Software or anysoftware product or mobile applicationincluded in such offering on a Device. TheService Period shall last for the period of timeset out in the Documentation or theapplicable transaction documentation fromthe authorized distributor or reseller fromwhich You obtained the Software. TheSoftware may automatically deactivate andbecome non-operational at the end of theService Period, and You will not be entitledto receive any feature or content updates tothe Software unless the Service Period isrenewed. Subscriptions for renewals of theService Period will be available in accordancewith Symantec’s support policy posted at

http://www.symantec.com/norton/support/technical_support_policy.jsp

This License Agreement governs anyreleases, revisions, updates or enhancementsto the Software that Symantec may makeavailable to You. Except as may be modifiedby the Documentation, and subject toSymantec’s right to terminate for Yourbreach pursuant to Section 10, Your rightsand obligations under this LicenseAgreement with respect to the use of thisSoftware are as follows.

Page 4: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

During the Service Period, Youmay:A. use one copy of the Software on a singleDevice. If a greater number of copies and/ornumber of Devices is specified within theDocumentation or the applicable transactiondocumentation from the authorizeddistributor or reseller from which Youobtained the Software, You may use theSoftware in accordance with suchspecifications;

B. make one copy of the Software for back-upor archival purposes, or copy the Softwareonto the hard disk of Your Device and retainthe original for back-up or archival purposes;

C. use the Software on a network, providedthat You have a licensed copy of the Softwarefor each Device that can access the Softwareover that network;

D. permanently transfer all of Your rights inthe Software granted under this LicenseAgreement to another person or entity,provided that You retain no copies of theSoftware and the transferee agrees to theterms of this License Agreement. Partialtransfer of Your rights under this LicenseAgreement shall not be permitted. Forexample, if the applicable documentationgrants You the right to use multiple copiesof the Software, only a transfer of the rightsto use all such copies of the Software wouldbe valid; and

E. use the Software in accordance with anyadditional permitted uses which may be setforth below.

You may not, nor may You permitany other person to:A. sublicense, rent or lease any portion of theSoftware;

B. reverse engineer, decompile, disassemble,modify, translate, make any attempt todiscover the source code of the Software orcreate derivative works from the Software;

C. use the Software as part of a facilitymanagement, timesharing, service provideror service bureau arrangement; or

D. use the Software in any manner that is notpermitted pursuant to this LicenseAgreement.

2. Software and Content Updates:A. You shall have the right to receive newfeatures to and versions of the Software asSymantec, in its sole discretion, makes suchfeatures and versions available during YourService Period. Symantec continually strivesto improve the usability and performance ofits products and services. In order tooptimize the Software, and to provide Youwith the most current version of theSoftware, You agree the Software maydownload and install new updates andversions of the Software as they are madeavailable by Symantec in its sole discretion.You agree to receive and permit Symantecto deliver such new updates and versions toYour Device. Additionally, Symantec maymodify the terms and conditions that applyto Your use of the Software to reflect suchupdates and You agree to such updatedterms.

B. Certain software uses content that isupdated from time to time, including but notlimited to the following software: antivirusand crimeware software use updated virusdefinitions; antispyware software usesupdated spyware definitions; antispamsoftware uses updated antispam rules;content filtering and antiphishing softwareuse updated URL lists; some firewall softwareuse updated firewall rules; vulnerabilityassessment products use updatedvulnerability data and web siteauthentication software uses updated listsof authenticated web pages; these updatesare collectively referred to as “ContentUpdates” (or alternatively referred to as“Protection Updates” or “Security Updates”at times). You shall have the right to receiveContent Updates for the Software duringYour Service Period.

3. Product Installation; RequiredActivation:A. During the installation process, theSoftware may uninstall or disable othersecurity products, or features of suchproducts, if such products or features areincompatible with the Software or forpurposes of improving the overallfunctionality of the Software.

B. There may be technological measures inthis Software that are designed to preventunlicensed or illegal use of the Software. Youagree that Symantec may use these measures

Page 5: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

to protect Symantec against software piracy.This Software may contain enforcementtechnology that limits the ability to installand uninstall the Software on a Device to notmore than a finite number of times for afinite number of Devices. This LicenseAgreement and the Software containingenforcement technology may requireactivation as further set out in theDocumentation. If so, the Software will onlyoperate for a finite period of time prior toSoftware activation by You. Duringactivation, You may be required to provideYour unique activation code accompanyingthe Software and Device configuration in theform of an alphanumeric code over theInternet to verify the authenticity of theSoftware. If You do not complete theactivation within the finite period of time setforth in the Documentation, or as promptedby the Software, the Software will cease tofunction until activation is complete; atwhich time the Software functionality willbe restored. In the event that You are notable to activate the Software over theInternet, or through any other methodspecified during the activation process, Youmay contact Symantec Customer Supportusing the information provided by Symantecduring activation, or as set out below.

5. Technical Support:In connection with Your use of the SoftwareYou may choose to access certain technicalsupport features that may be offered fromwithin the Software, which may include livechat with a technical support agent and/orassistance from a technical support agentvia remote computer access (any suchtechnical support offered from within theSoftware shall be referred to in this LicenseAgreement as the “Technical Support”). Anysuch Technical Support shall be provided inSymantec’s sole discretion without anyguarantee or warranty of any kind other thanany guarantees applicable under consumerlaws in Your jurisdiction which cannot beexcluded or limited in any way. It is solelyYour responsibility to complete a backup ofall Your existing data, software and programsbefore receiving any Technical Support. Inthe course of providing the TechnicalSupport, Symantec may determine that thetechnical issue is beyond the scope of theTechnical Support. Symantec reserves theright to refuse, suspend or terminate any ofthe Technical Support in its sole discretion.

6. Money Back Guarantee:If You are the original licensee of this copyof the Software and are not completelysatisfied with it for any reason, please makeno further use of the Software and contactSymantec Customer Service, using thecontact details set out in Section 12 of thisLicense Agreement, for a refund of theamount You paid for the current ServicePeriod (less shipping, handling, and anyapplicable taxes except in certain states andcountries where shipping, handling and taxesare refundable) at any time during the sixty(60) day period following the date of purchaseof an annual subscription or within thirty(30) days following the date of purchase of amonthly subscription.

7. Limited Warranty:Symantec warrants that any mediamanufactured by Symantec on which theSoftware is distributed will be free fromdefects for a period of sixty (60) days fromthe date of delivery of the Software to You.Your sole remedy in the event of a breach ofthis warranty will be that Symantec will, atits option, replace any defective mediareturned to Symantec within the warrantyperiod or refund the money You paid for theSoftware. Symantec does not warrant thatthe Software will meet Your requirements orthat operation of the Software will beuninterrupted or that the Software will beerror-free. For the avoidance of doubt,references to “Software” in the foregoingsentence shall include, but not be limited to,the Online Backup Feature and TechnicalSupport.

TO THE MAXIMUM EXTENT PERMITTEDBY APPLICABLE LAW, THE ABOVEWARRANTY IS EXCLUSIVE AND IN LIEUOFALLOTHERWARRANTIES,WHETHEREXPRESS OR IMPLIED, INCLUDING THEIMPLIED WARRANTIES OFMERCHANTABILITY, FITNESS FOR APARTICULAR PURPOSE, ANDNON-INFRINGEMENTOFINTELLECTUALPROPERTY RIGHTS. THIS WARRANTYGIVESYOUSPECIFICLEGALRIGHTS.YOUMAYHAVEOTHERRIGHTS,WHICHVARYFROM STATE TO STATE AND COUNTRYTO COUNTRY.

Page 6: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

8. Disclaimer of Damages:SOME STATES AND COUNTRIES DO NOTALLOWTHELIMITATIONOREXCLUSIONOF LIABILITY FOR INCIDENTAL ORCONSEQUENTIAL DAMAGES, SO THEBELOWLIMITATIONOREXCLUSIONMAYNOT APPLY TO YOU.

TO THE MAXIMUM EXTENT PERMITTEDBYAPPLICABLELAWANDREGARDLESSOF WHETHER ANY REMEDY SET FORTHHEREIN FAILS OF ITS ESSENTIALPURPOSE,INNOEVENTWILLSYMANTECORITSLICENSORSBELIABLETOYOUFORANY SPECIAL, CONSEQUENTIAL,INDIRECT, OR SIMILAR DAMAGES,INCLUDINGANYLOSTPROFITSORLOSTDATA ARISING OUT OF THE USE ORINABILITY TO USE THE SOFTWARE(INCLUDING BUT NOT LIMITED TO USEOF THE ONLINE BACKUP FEATURE ANDTECHNICAL SUPPORT) EVEN IFSYMANTEC HAS BEEN ADVISED OF THEPOSSIBILITY OF SUCH DAMAGES.

IN NO CASE SHALL SYMANTEC’S OR ITSLICENSORS’ LIABILITY EXCEED THEPURCHASEPRICEWHICHYOUPAIDFORTHE APPLICABLE SERVICE PERIOD. Thedisclaimersand limitationsset forthabovewillapplyregardlessofwhetherYouacceptthe Software.

9. U.S. Government RestrictedRights:For U.S. Government procurements, theSoftware is deemed to be commercialcomputer software as defined in FAR 12.212and subject to restricted rights as defined inFAR Section 52.227-19 "CommercialComputer Software - Restricted Rights" andDFARS 227.7202, “Rights in CommercialComputer Software or Commercial ComputerSoftware Documentation”, as applicable, andany successor regulations. Any use,modification, reproduction release,performance, display or disclosure of theSoftware by the U.S. Government shall besolely in accordance with the terms of thisLicense Agreement.

10. Export Regulation:You acknowledge that the Software andrelated technical data and services(collectively "Controlled Technology") maybe subject to the import and export laws of

the United States, specifically the U.S. ExportAdministration Regulations (EAR), and thelaws of any country where ControlledTechnology is imported or re-exported. Youagree to comply with all relevant laws andwill not export any Controlled Technologyin contravention to U.S. law nor to anyprohibited country, entity, or person forwhich an export license or othergovernmental approval is required. AllSymantec product is prohibited for exportor re-export to Cuba, North Korea, Iran, Syriaand Sudan and to any country subject torelevant trade sanctions. USE ORFACILITATIONOFSYMANTECPRODUCTIN CONNECTION WITH ANY ACTIVITYINCLUDING, BUT NOT LIMITED TO, THEDESIGN,DEVELOPMENT,FABRICATION,TRAINING, OR TESTING OF CHEMICAL,BIOLOGICAL,ORNUCLEARMATERIALS,OR MISSILES, DRONES, OR SPACELAUNCH VEHICLES CAPABLE OFDELIVERING WEAPONS OF MASSDESTRUCTION IS PROHIBITED, INACCORDANCE WITH U.S. LAW.

11. Arbitration:If You are a U.S. customer, You and Symantecagree that any dispute, claim or controversyarising out of or relating in any way to theSoftware or this License Agreement, shall bedetermined by binding arbitration or smallclaims court, instead of in courts of generaljurisdiction. Arbitration is more informalthan a lawsuit in court. Arbitration uses aneutral arbitrator instead of a judge or jury,allows for more limited discovery than incourt, and is subject to very limited reviewby courts. Arbitrators can award the samedamages and relief that a court can award.You agree that, by agreeing to this LicenseAgreement, the U.S. Federal Arbitration Actgoverns the interpretation and enforcementof this arbitration provision, and that Youand Symantec are each waiving the right toa trial by jury or to participate in a classaction. This arbitration provision shallsurvive termination of this LicenseAgreement and/or the termination of YourSymantec product license.

If You elect to seek arbitration, You must firstsend to Symantec, by certified mail, a writtenNotice of Your claim ("Notice of Claim"). TheNotice of Claim to Symantec should beaddressed to: General Counsel, Symantec,Inc., 350 Ellis Street, Mountain View, CA94043 and should be prominently captioned

Page 7: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

“NOTICE OF CLAIM”. The Notice of Claimshould include both the mailing address andemail address You would like Symantec touse to contact You. If Symantec elects to seekarbitration, it will send, by certified mail, awritten Notice of Claim to Your billingaddress on file. A Notice of Claim, whethersent by You or by Symantec, must (a) describethe nature and basis of the claim or dispute;and (b) set forth the specific amount ofdamages or other relief sought ("Demand").

If You and Symantec do not reach anagreement to resolve the claim within thirty(30) days after the Notice of Claim is received,You or Symantec may commence anarbitration proceeding or file a claim in smallclaims court. You may download or copy aform of notice and a form to initiatearbitration at www.adr.org. If You arerequired to pay a filing fee, Symantec willpromptly reimburse You for Your paymentof the filing fee after arbitration iscommenced. The arbitration will be governedby the Commercial Arbitration Rules and theSupplementary Procedures for ConsumerRelated Disputes (collectively, "AAA Rules")of the American Arbitration Association("AAA"), as modified by this LicenseAgreement, and will be administered by theAAA. The AAA Rules and Forms are availableonline at www.adr.org or by calling the AAAat 1-800-778-7879. The arbitrator is boundby the terms of this License Agreement. Allissues are for the arbitrator to decide,including issues relating to the scope andenforceability of this arbitration provision.Unless Symantec and You agree otherwise,any arbitration hearings will take place inthe county (or parish) of either the mailingaddress You provided in Your Notice or, if noaddress was provided in Your Notice, Yourbilling address on file. If Your claim is forU.S. $10,000 or less, Symantec agrees thatYou may choose whether the arbitration willbe conducted solely on the basis ofdocuments submitted to the arbitrator,through a telephonic hearing, or by anin-person hearing as established by the AAARules. If Your claim exceeds U.S. $10,000,the right to a hearing will be determined bythe AAA Rules. Regardless of the manner inwhich the arbitration is conducted, thearbitrator shall issue a reasoned writtendecision sufficient to explain the essentialfindings and conclusions on which the awardis based. If the arbitrator issues You an awardthat is greater than the value of Symantec’slast written settlement offer made before an

arbitrator was selected (or if Symantec didnot make a settlement offer before anarbitrator was selected), then Symantec willpay You, in addition to the award, either U.S.$500 or 10% of the amount awarded,whichever is greater. Except as expressly setforth herein, the payment of all filing,administration and arbitrator fees will begoverned by the AAA Rules.

YOU AND SYMANTEC AGREE THAT EACHMAY BRING CLAIMS AGAINST THE OTHERONLY IN YOUR OR ITS INDIVIDUALCAPACITY, AND NOT AS A PLAINTIFF ORCLASS MEMBER IN ANY PURPORTED CLASSOR REPRESENTATIVE PROCEEDING.Further, unless both You and Symantec agreeotherwise, the arbitrator may not consolidatemore than one person's claims with Yourclaims, and may not otherwise preside overany form of a representative or classproceeding. If this specific provision is foundto be unenforceable, then the entirety of thisarbitration provision shall be null and void.The arbitrator may award declaratory orinjunctive relief only in favor of theindividual party seeking relief and only tothe extent necessary to provide reliefwarranted by that party's individual claim.

12. General:This License Agreement will be governed bythe laws of the State of California, UnitedStates of America. This License Agreementis the entire agreement between You andSymantec relating to the Software and: (i)supersedes all prior or contemporaneous oralor written communications, proposals, andrepresentations with respect to its subjectmatter; and (ii) prevails over any conflictingor additional terms of any quote, order,acknowledgment, or similar communicationsbetween the parties. Notwithstanding theforegoing, nothing in this License Agreementwill diminish any rights You may have underexisting consumer protection legislation orother applicable laws in Your jurisdictionthat may not be waived by contract.Symantec may terminate this LicenseAgreement if You breach any term containedin this License Agreement (other than atrivial or inconsequential breach) and, if suchtermination occurs, You must cease use ofand destroy all copies of the Software andDocumentation. The disclaimers ofwarranties and damages and limitations onliability shall survive and continue to applyafter termination. This License Agreement

Page 8: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

may only be modified by the Documentationor by a written document that has beensigned by both You and Symantec. ShouldYou have any questions concerning thisLicense Agreement, or if You desire tocontact Symantec for any reason, pleasewrite to Symantec Customer Service, 555International Way, Springfield, OR 97477,U.S.A. or visit the Support page atwww.symantec.com.

ADDITIONAL TERMS AND CONDITIONS.Your use of the Software is subject to theterms and conditions below in addition tothose stated above.

Page 9: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Chapter 1 Getting started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11Activation protects you . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11About your Norton Account . . . . . . . . . . . . . . . . . . . . . . . . 16About Norton Management . . . . . . . . . . . . . . . . . . . . . . . . 22About Norton AntiVirus main

window .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29About Norton Community Watch . . . . . . . . . . . . . . . . . 40About Norton Bootable Recovery

Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42About Norton Power Eraser . . . . . . . . . . . . . . . . . . . . . . . . 54Starting Norton AntiVirus from the

command prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56About the Norton AntiVirus icon . . . . . . . . . . . . . . . . . 56About LiveUpdate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59About Network Proxy Settings . . . . . . . . . . . . . . . . . . . . 71

Chapter 2 Monitoring your system'sperformance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

About System Insight . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

Chapter 3 Protecting your files and data . . . . . . . . . . . . . . . . 115About maintaining protection . . . . . . . . . . . . . . . . . . . 115About the Norton AntiVirus scans . . . . . . . . . . . . . . 118

Contents

Page 10: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Chapter 4 Responding to security issues . . . . . . . . . . . . . . . . 185What to do if a security risk is found . . . . . . . . . . . 185

Chapter 5 Protecting Internet activities . . . . . . . . . . . . . . . . . 197About Download Insight . . . . . . . . . . . . . . . . . . . . . . . . . . . 197About Intrusion Prevention . . . . . . . . . . . . . . . . . . . . . . 208About Vulnerability Protection . . . . . . . . . . . . . . . . . . 213About the types of security risks . . . . . . . . . . . . . . . . 215About configuring POP3 and SMTP

ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217About the Network Security Map .. . . . . . . . . . . . . . . 219About Network Cost Awareness . . . . . . . . . . . . . . . . . 237

Chapter 6 Monitoring protection features . . . . . . . . . . . . . . 241About Security History . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241

Chapter 7 Customizing protection features . . . . . . . . . . . . 271Feature summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271About turning off automatic features . . . . . . . . . . 276About customizing settings and

options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279

Chapter 8 Finding additional solutions . . . . . . . . . . . . . . . . . . 331Finding the version number of your

product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331Finding the End-User License

Agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332About upgrading your product . . . . . . . . . . . . . . . . . . . 332About Norton Autofix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335Staying informed about protection

issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337About Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339About uninstalling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349

Contents10

Page 11: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

This chapter includes the following topics:

1 Activation protects you

1 About your Norton Account

1 About Norton Management

1 About Norton AntiVirus main window

1 About Norton Community Watch

1 About Norton Bootable Recovery Tool

1 About Norton Power Eraser

1 Starting Norton AntiVirus from the commandprompt

1 About the Norton AntiVirus icon

1 About LiveUpdate

1 About Network Proxy Settings

Activation protects youProduct activation protects users from pirated orcounterfeit software. It protects you by limiting theuse of a product to those users who have acquired theproduct legitimately. Product activation requires aproduct key for each installation of a product. You must

1Getting started

Page 12: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

activate the product within a limited time period afteryou install it.

If you are connected to the Internet, product activationtakes place automatically when you start the productfor the first time after installation. After activation,the Norton Account window appears. You can createyour Norton Account and register your product.

If you are not connected to the Internet, you can clickTry Later in the Activation not complete window tostart your product. The Activation window reappearsevery time you start your product until you activateyour product. If you choose not to activate at that time,you receive an alert that reminds you to activate theproduct. You can also activate your product from theNorton AntiVirus main window.

w If you do not activate the product within the timeperiod that the alert specifies, the product stopsworking. You can activate it after the time period haselapsed, but you are not protected until you activatethe product.

Activating your productIf you did not activate your product during installation,you receive an activation-needed alert regularly untilyou activate the product.

Product activation reduces software piracy and ensuresthat you use authentic Symantec software. Activationprovides you with a specified period of subscription toyour Norton product. You can also renew yoursubscription to continue using Norton AntiVirus.

w You must activate your product within the time periodthat the alert specifies, or your product stops working.

You can activate your product directly from theactivation-needed alert or from the main window.Activation should take only a few minutes.

During activation, the Norton Account windowappears. You can create your Norton Account and

Getting startedActivation protects you

12

Page 13: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

register your product. You can also view details, suchas your product key, your registration date, and recentupdates to the product. If you skip the NortonAccountwindow, the product is activated, but the product keyis not saved in the Norton Account. You can print theproduct key to reinstall your product in the future.

To activate your product from the alert

1 In the alert, do one of the following:

1 If you purchased a subscription version of aretail product or the product came installed onyour computer, select Activate Now(Recommended).

1 If you want to renew the subscription of yourproduct, select Renew Now.

You can also activate or renew the subscription ofyour product from any non-admin user account.

2 Click OK.

3 Follow the on-screen instructions to activate orrenew your product.

4 In the window that appears, click Done.

To activate your product from the main window

1 In the Norton AntiVirus main window, do one of thefollowing:

1 If you purchased a subscription version of aretail product, click Activate Now.

1 If the product came installed on your computer,click Activate Online Now.

1 If you want to renew the subscription of yourproduct, click Renew.

You can also activate or renew the subscription ofyour product from any non-admin user account.

2 Follow the on-screen instructions to activate orsubscribe your product.

3 In the window that appears, click Done.

13Getting startedActivation protects you

Page 14: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Where to find your product keyThe product key is a unique key that helps you to installand activate the Symantec product on your computer.The product key is a 25-character alphanumeric stringthat is shown in five groups of five characters each,separated by hyphens. The location of the product keyvaries depending on how you acquired the product.

The locations of the product key are as follows:

The product key is either ona sticker on the CD sleeve oron an insert in the productpackage.

If you purchased a retail copyof the product on CD

The product key is on theDVD package.

If you purchased the producton DVD

The product key is stored onyour computer as part of thedownload process and isincluded in the confirmationemail from the SymantecStore.

If you downloaded theproduct from the SymantecStore

The product key is providedas part of the activationprocess. Be sure to save yourproduct key by creating orsigning in to your NortonAccount, or by printing thekey. You may need theproduct key if you ever wantto reinstall your product.

If your computer came withthe product already installed

Getting startedActivation protects you

14

Page 15: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

The product key is printed onthe card along withinstructions on how to use it.Be sure to save your productkey by creating or signing into your Norton Account. Youneed the product key if youever want to reinstall theproduct.

If you received a product keycard

To recover or access yourproduct key log on tohttps://account.norton.com.If you are not registered,register for Norton Account.You can find the product keyon the Products tab in theNorton Account page.

If you are still unable tolocate your product key, youcan recover it using NortonAccount

About problems during activationIf you cannot connect to the Symantec servers toactivate your product, first check your Internetconnection. You then need to see if you have parentalcontrol software, either installed or through your ISP,that might block the connection.

A connectivity problem can occur if you use parentalcontrol software. If you suspect that parental controlsmight block the connection, you can configure theparental controls so that they do not block theactivation procedure. You need to log in to yourparental control software or to the Internet throughyour ISP as an administrator to change yourconfiguration.

If you use a proxy server to connect to the Internet,you must configure the proxy settings. To use theProxyServer option, go to the Norton AntiVirus mainwindow, and then click Settings>Network>NetworkSecurity Settings > Proxy Server > Configure.

15Getting startedActivation protects you

Page 16: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

About your Norton AccountWhen you create a Norton Account, you can manageall of your Norton products in one place. You can storeyour product keys in your Norton Account and alsobuy additional product keys. You can also register yourproduct with the Norton Account. It takes only a fewmoments to create your Norton Account. You must beconnected to the Internet to create a Norton Account.

After you create a Norton Account, you can access andmanage your account information and productinformation from anywhere. It helps to reinstall yourproducts and download the latest version of theproducts. If you install your product on more than onePC, you can use the same Norton Account. To accessyour Norton Account, go to the following URL:

https://account.norton.com

You can create a Norton Account in the following ways:

1 During activation

You can create your Norton Account and registeryour product from the Norton Account windowthat appears when you activate the product. Youmust provide your account information in theNorton Account window that appears.

1 Any time after activation

If you skip the Norton Account window duringactivation, you can create a Norton Account anytime after activation. You can create your NortonAccount and register your product from theAccount link that appears at the top of the NortonAntiVirus main window.

Getting startedAbout your Norton Account

16

Page 17: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

After you log in to your Norton Account, you canmanage your product information with the followingoptions:

Saves the information for all ofthe Norton products that youown.

The Products tab provides youthe information about theNorton products that you ownand the expiration date. You canclick the arrow icon against aproduct for more informationsuch as product key and theregistration date. You can alsobuy a new product key to protectadditional computers. You canuse the Update option to checkand download the latest productversion using Norton UpdateCenter.

Products

Contains order information ofthe Norton products you boughtfrom Norton online store.

Order History

17Getting startedAbout your Norton Account

Page 18: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Saves your account informationand your billing details.

The Profile options are:1 Account Information

You can update your NortonAccount information andyour shipping address on theAccount Information tab.After you update, clickUpdate to save the changes.

1 Billing Information

You can save your credit cardinformation and your billingaddress on the BillingInformation tab. It makes iteasier for saving onlineorders. After you update,click Update to save thechanges.

1 Change Password

You can change your currentNorton Account password onthe Change Password tab.

Profile

You can use the icons at the bottom of your NortonAccount Web page to access and use the following:

Norton Online Familymonitors and manages yourchild's Internet activities andcomputer usage.

Norton Online Family

Getting startedAbout your Norton Account

18

Page 19: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Norton Online Backupprovides a secure andeasy-to-use online backupsolution that safeguards yourimportant data againstsystem crash, accidentaldeleting, virus infection, andother disasters.

Norton Online Backup

Norton Safe Web checks thesafety of a Web site and letsyou perform a safe Websearch.

Norton Safe Web

The Symantec Web siteprovides more informationabout the various products ofSymantec, the latest updateson Internet security, andvarious support options.

Norton.com

Norton Update Center checksand lets you download thelatest version of your Nortonproduct.

Norton Update Center

If you forget your Norton Account password, you canget a temporary password by clicking the Forgot yourpassword link in the Norton Account sign-in Webpage. You need to provide your email address. You needto use the same email address that you provided whenyou created your Norton Account. Symantec sends atemporary password to your email address. You canuse the temporary password for a limited time period.You must reset your password after you log in to yourNorton Account.

19Getting startedAbout your Norton Account

Page 20: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Creating a Norton AccountYour Norton Account stores the product key and thebilling information of your product. You can alsoregister your product with the Norton Account.

In addition, Norton Account helps you to do thefollowing:

1 Access the product key and other productinformation when you need it.

1 Reinstall your Norton product.

1 Buy additional product keys for your home or office.

1 Check and download the latest version of theproduct by using Norton Update Center.

1 Save online orders and update billing information.

Your computer must be connected to the Internet tocreate a Norton Account. If you use a proxy server toconnect to the Internet, you must configure the proxysettings. To configure the proxy settings of yournetwork, go to the Norton AntiVirus main window, andthen click Settings > Network > Network SecuritySettings > Proxy Server > Configure.

You can also create a Norton Account when youactivate your product. When you create your NortonAccount from the product, your product gets registeredin your account. If you have an existing NortonAccount, you can provide the same email address inthe NortonAccount window in your product. This way,you can register your current product and add it to thelist of Norton products in your existing NortonAccount. If you upgrade your registered product to thelatest available version, your product remainsregistered to the same Norton Account. In this case,you can continue using the same Norton Account logincredentials.

w Symantec products that are older than the 2006product year do not appear in your Norton Account.

Getting startedAbout your Norton Account

20

Page 21: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To create a Norton Account from the Norton AccountWeb page

1 In the Norton AntiVirus main window, clickAccount.

2 In the Norton Account Web page that appears, clickSign up now.

3 In the Norton Account Sign Up Web page, providethe details about your account information, andthen click Sign Up.

To create a Norton Account and register your productafter activation

1 In the Norton AntiVirus main window, clickAccount.

2 In the CompleteYourActivation window, type youremail address, and then click Next.

3 In the CreateyourNortonAccount window, provideyour account details, and then click Next.Your product information gets saved in your NortonAccount only after you log in to your NortonAccount.

4 In the window that appears, click Done.

To log in to your Norton Account and access yourproduct information, visit https://account.norton.com.

Accessing your Norton AccountThe product key for each Norton product isconveniently stored in your Norton Account. After youhave created your Norton Account successfully, youcan access your account from anywhere in the world.You can log in to your Norton Account any time byvisiting the following URL:

https://account.norton.com

You can easily find and update your account, product,and billing information from your Norton Account.You can also change your Norton Account password,if required. Your computer must be connected to theInternet to access your Norton Account.

21Getting startedAbout your Norton Account

Page 22: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

w Symantec products that are older than the 2006product year do not appear in your Norton Account.

To access Norton Account

1 In the Norton AntiVirus main window, clickAccount.

2 In the Web page that appears, type your emailaddress and password, and click Sign In.

About Norton ManagementNorton Management lets you manage all of your Nortonproducts and Norton product keys from one location.You can add your devices such as personal computersand laptops to Norton Management and remotelyinstall and manage your Norton products on the device.You can view the security status of each of your devicesand resolve the security issues by using the NortonManagement Web site from any location around theworld.

The Norton Management agent must be installed oneach device that you want to manage in NortonManagement. Norton Management uses the NortonManagement agent to install and uninstall Nortonproducts on your devices and to resolve the securityissues on your device remotely. After you install theNorton Management agent on a device, it can bemanaged remotely using the Web site.

You can do the following using Norton Management:

1 Add a device to Norton Management.

1 Install a Norton product on a device.

1 View Norton products that are installed on a device.

1 View the security status of a device.

1 Fix security issues on a device.

1 Purchase a new Norton product key.

1 Renew your Norton product subscription.

1 Remove a device from Norton Management.

Getting startedAbout Norton Management

22

Page 23: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

1 Activate your product using another product key.

1 Upgrade your Norton products to the latestavailable version.

w The features listed above vary for different Nortonproducts and devices.

Accessing Norton Management on WindowsYou can access Norton Management in one of thefollowing ways:

1 Using a Web browser on any computer.

1 From the main window of Norton security products.

To access Norton Management from the main windowof a Norton security product, you need to install theNorton Management agent on that device. Your devicemust be connected to the Internet to access NortonManagement.

To access Norton Management using a browser

1 Open your browser, and go to:https://.manage.norton.com

2 Click Sign In.

3 In the EmailAddress box, type your Norton Accountemail address.

4 In the Password box, type your Norton Accountpassword.

5 If you want Norton Management to remember youremail address every time when you log on, checkRemember me on this computer.

6 Click Sign In.

To access Norton Management from Norton securityproducts

1 At the bottom of the Norton security product mainwindow, click the Manage icon.

2 Click Log in.

3 Type your email address that you use for NortonAccount.

23Getting startedAbout Norton Management

Page 24: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

4 Type your password that you use for NortonAccount.

5 Click Go.

6 Click Manage Devices.

To access Norton Management from the Windowsnotification area

1 Go to the Windows device on which NortonManagement is installed.

2 In the notification area on the taskbar, click theNorton Management icon.

3 In the pop-up that appears, click Open NortonManagement.

Installing the Norton Management agent on WindowsNorton Management uses the Norton Managementagent to monitor and manage the security status of adevice. You must install Norton Management agent onevery device that you want to manage using NortonManagement.

You can download and install the Norton Managementagent in one of the following ways:

1 Log on to the Norton Management Web site anddownload the agent.

1 If your computer has Norton AntiVirus or NortonInternet Security, go to the main window of theproduct, click the Manage icon and then install theagent program.

w You must have an administrator privilege on yourdevice to install the Norton Management agent.

To install the Norton Management agent from theNorton Management Web site

1 Go to the device that you want to manage withNorton Management.

2 Open your browser, and go to:https://manage.norton.com

Getting startedAbout Norton Management

24

Page 25: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

3 Click Sign In and log on to your account using yourNorton Account email address and password.

4 On the My Devices page, click Add Device.

5 In the confirmation window, click Yes to confirmthat you are already on the device you want tomanage.

6 In the window that appears, click Save File anddownload the installer file.

7 Double-click the file that you downloaded.

8 Click Run.

9 In the Welcome to Norton Management window,click UserLicenseAgreement, read the user licenseagreement, and then click Agree & Install.

10 If you are prompted to provide your email address,in the Email Address box, type the email addressthat you use to log on to your Norton Account, andthen click Next.

11 If you are prompted to provide your password, inthe Password box, type the password that you useto log on to your Norton Account, and then clickNext.

12 In the Set up this computer window, in the Namethis computer box, type a display name for thedevice.The name that you specify must be unique and mustnot exceed 40 characters.

13 Click Finish.

14 In the Congratulations window, click ManageDevices.

To install the NortonManagement agent from a Nortonsecurity product

1 At the bottom of the Norton security product mainwindow, click the Manage icon.

2 Click Get Started.

3 In the Welcome to Norton Management window,click the User License Agreement link, read theuser license agreement, and then click Agree &Install.

25Getting startedAbout Norton Management

Page 26: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

4 If you are prompted to provide your email address,in the Email Address box, type the email addressthat you use to log on to your Norton Account, andthen click Next.

5 If you are prompted to provide your password, inthe Password box, type the password that you useto log on to your Norton Account, and then clickNext.

6 In the Set up this computer window, in the Namethis computer box, type a display name for thedevice, and then click Finish.

7 In the Congratulations window, click ManageDevices.

About managing devicesNorton Management lets you manage your device, viewthe security status of each of the devices, and resolvesecurity issues by using the Norton Management Website from any location around the world.

Using Norton Management, you can do the following:

1 Add a device to Norton Management.

1 Install a Norton product on a device.

1 View Norton products that are installed on a device.

1 View the security status of a device.

1 Fix security issues on any device.

1 Purchase a new Norton product key.

1 Renew your Norton product subscription.

1 Remove a device from Norton Management.

1 Uninstall a Norton product from a device.

1 Activate your product using another product key.

1 Upgrade your Norton products to the latestavailable version.

w The features listed above vary for different Nortonproducts and devices.

Getting startedAbout Norton Management

26

Page 27: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

About the supported devicesTo install and use Norton AntiVirus, your device mustmeet the following minimum system requirements:

Hardware requirement

Windows

1 300-MHz or faster processor

1 512 MB of RAM (256 MB minimum)

1 100 MB of available hard disk space

Operating systems

Service PackVersionPlatform

Service Pack 132-bit and 64-bitversions

1 MicrosoftWindows 7Home Basic

1 MicrosoftWindows 7HomePremium

1 MicrosoftWindows 7Professional

1 MicrosoftWindows 7Ultimate

1 MicrosoftWindows 7Starter

27Getting startedAbout Norton Management

Page 28: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Service Pack 1 and2

32-bit and 64-bitversions

1 MicrosoftWindows VistaHome Basic

1 MicrosoftWindows VistaHomePremium

1 MicrosoftWindows VistaUltimate

1 MicrosoftWindows VistaBusiness

Service Pack 2 and3

32-bit versions1 MicrosoftWindows XPHome

1 MicrosoftWindows XPPro

1 MicrosoftWindows XPMedia CenterEdition (2005and later)

Mac

1 OS X 10.7 (Lion)

1 2GB of RAM

1 1.5 GB of available hard disk space

Android

1 Android OS 2.1 (Eclair) or later

1 2 MB of available hard disk space

Supported devices

1 Windows computers (desktop and laptop)

1 Mac

1 Android smartphones

Getting startedAbout Norton Management

28

Page 29: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Supported Norton products

To use all the features of Norton AntiVirus, you mustuse the following versions of Norton security product:

If you use an older version of Norton product, ensurethat you upgrade your product to the latest version touse all the features of Norton AntiVirus.

w Currently, there are no upgrades available for NortonAnti-Theft and Norton Online Family.

Supported browsers

1 Internet Explorer 7.0 or later.

1 Mozilla Firefox 3.5 or later.

1 Google Chrome 6.0 or later.

1 Apple Safari 4.0 or later.

1 Opera 10.0 or later.

Norton AntiVirus may not work properly with the64-bit version of Web browsers.

You must enable JavaScript and cookies on yourbrowser to access Norton AntiVirus.

About Norton AntiVirus main windowThe Norton AntiVirus main window acts as a securitymanagement interface. You can access the mainfeatures and monitor the performance of yourcomputer from the main window.

You can find the following items in the main window:

Lets you access the Settingswindow.

You can view and configurevarious options to customize theNorton AntiVirus settings.

Settings

29Getting startedAbout Norton AntiVirus main window

Page 30: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Lets you access thePerformancewindow.

The Performance windowdisplays a chroniclerepresentation of all the installs,downloads, optimizations,detections, alerts, and instancesof Quick Scan. The window alsodisplays a detailed graphicalrepresentation of CPU andmemory usage by your Nortonproduct.

Performance

Lets you provide feedback on theproduct on a Symantec Webpage.

w This feature may not beavailable in some versions ofNorton AntiVirus.

Feedback

Lets you create or access yourNorton Account.

Norton Account lets you manageall of your Norton products inone place.

w This feature may not beavailable in some versions ofNorton AntiVirus.

Account

Getting startedAbout Norton AntiVirus main window

30

Page 31: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Lets you access the NortonAutofix window that providesyou various support options.

You can also access the onlineHelp from the Supportdrop-down menu. Help provideslinks to information that assistsyou with the specific tasks thatyou want to complete. The onlineHelp guides you to configure allof the product features.

You can also access theproduct’s version number.

Support

You can use the following options to perform theimportant tasks in Norton AntiVirus:

Lets you view the overallprotection status of yourcomputer.

When your system status isSecure, your computer is fullyprotected. When your systemstatus is at Attention state,ensure that you fix all the issues.When your system status is atAtRisk state, you must takeimmediate actions to fix theissues.

System Status

31Getting startedAbout Norton AntiVirus main window

Page 32: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Lets you access different typesof scans to protect yourcomputer and your sensitivedata.

By using the Scan Now option,you can run the following typesof scans:

1 Computer Scan

Lets you run differentcomputer scans includingQuick Scan, Full SystemScan, and Custom Scan.

1 Reputation Scan

Lets you run differentreputation scans includingQuick Scan, Full SystemScan, and Custom Scan.

1 Scan Facebook Wall

Lets you scan News Feeds onyour Facebook Wallperiodically to protect youfrom malicious links.

Scan Now

Lets you run LiveUpdate todownload the latest virusdefinitions and programupdates.

Norton AntiVirus uses the latestvirus definitions from Symantecservers to detect and removelatest security threats.

LiveUpdate

Getting startedAbout Norton AntiVirus main window

32

Page 33: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Lets you access the NortonAntiVirus advanced window.

By using the Norton AntiVirusadvanced window, you can dothe following:

1 Run different scans.

1 View Security History.

1 View the quarantined itemsin the Security Historywindow.

1 View Norton Insight -Application Ratings.

1 View the list of programsthat are vulnerable on yourcomputer and find howNorton protects you from theprogram vulnerabilities.

1 View and configure NetworkSecurity Map.

In addition, you can choose toturn on or turn off the protectionfeatures from this window.

Advanced

When your system status is AtRisk or Attention, thissection automatically provides you the FixNow optionto fix all the issues at once.

33Getting startedAbout Norton AntiVirus main window

Page 34: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

The options on the right side of the Norton AntiVirusmain window help you do the following:

Lets you access NortonManagement.

Norton Management lets youmanageyourNortonproductson all of your devices fromone location. Click theManage icon at the right sideof the main window to signup for or log into NortonManagement. The NortonManagement agent should beinstalled on each device thatyou want to add to NortonManagement. You can useyour existing Norton Accountlogin information to accessNorton Management.

w Norton Managementmay not be available in someversions of Norton AntiVirus.

Manage

Getting startedAbout Norton AntiVirus main window

34

Page 35: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Lets you download theNorton Mobile Security forAndroid.

You can use Norton MobileSecurity on all your devicesthat use Android operatingsystem. When you click theMobile icon, the main windowdisplays a Quick Response(QR) code for installingNorton Mobile Security. Youcan use the Android scan appon your Android device toscan the QR code and installNorton Mobile Security.

You can also click the link togo to the Web site where youcan download Norton MobileSecurity.

w Norton Mobile Securitymay not be available in someversions of Norton AntiVirus.

Mobile

35Getting startedAbout Norton AntiVirus main window

Page 36: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Lets you set up the NortonOnline Backup account oraccess your online backupstatus.

w Norton Online Backupmay not be available in someversions of Norton AntiVirus.

When you click the Backupicon, the main windowdisplays Norton OnlineBackup Log in option. NortonOnline Backup provides asecure online backup solutionthat safeguards yourimportant data againstsystem crash, accidentaldeleting, virus infection, andother disasters. You canaccess or restore the backedup data from any computerthat is connected to theInternet.

Backup

Lets you access NortonStudio.

Norton Studio is an app thatis available on your Windows8 Apps Store. Norton Studiolets you manage your Nortonproducts and Norton productkeys from one location. Youcan view the security statusof each of your devices andresolve the security issues byusing the Norton Studio fromany location around theworld. You can go to Windows8 App Store and downloadand install Norton Studio.

Studio

Getting startedAbout Norton AntiVirus main window

36

Page 37: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Your activation status or subscription status appearsat the bottom of the main window. You can use theActivate Now option to activate or subscribe yourNorton product.

You can also monitor the overall system CPU usageand the Norton-specific CPU usage in this window.

About the Norton AntiVirus advanced windowThe Norton AntiVirus advanced window acts as asecurity management interface. The options in thiswindow help you address all the important securityand performance issues of your computer. The optionsare classified in different panes. Each pane containsthe important features that you can easily access orconfigure from this window.

The panes are:

Provides you the essentialcomputer protection options.

It also contains links to scanyour computer, view thehistory of protection events,and manage quarantineditems. You can also view theNorton Insight - ApplicationRatingswindow and improvethe performance of NortonAntiVirus scans.

In addition, you can runLiveUpdate. It also displaysthe updates availability as towhen the last virusdefinitions were updated.

Computer Protection

37Getting startedAbout Norton AntiVirus main window

Page 38: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Provides you the essentialnetwork protection options.

It also contains links to thelist of vulnerable programsand Network Security Map.

Network Protection

You can view the different protection features on theright side of the window. You can move your mousepointer over each feature to view a brief summaryabout the feature. You can also choose to ignore ormonitor the protection status of a feature. You canchoose to turn on or turn off the protection featuresfrom this window.

Responding to System Status indicatorsNorton AntiVirus displays the overall protection statusof your computer under the Secure section of the mainwindow. When the system status needs attention or isat risk, you can take appropriate action to improve theSystem Status. Your computer protection is based onthe programs that are installed on your computer. Toimprove your protection status, ensure that yourinstalled programs are up to date.

The System Status indicator displays the followingstatuses:

Indicates that your computer andactivities are protected fromthreats, risks, and damage.

Secure

Indicates that your computer andactivities require attention.

Take appropriate action to improveyour protection status.

Attention

Getting startedAbout Norton AntiVirus main window

38

Page 39: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Indicates that your computer andactivities are at risk.

Take immediate action to improveyour protection status.

At Risk

You can respond to the System Status indicatorsdirectly from the main window.

To respond to System Status indicators from the mainwindow

1 In the bottom section of the Norton AntiVirus mainwindow, click Fix Now.

2 Follow the on-screen instructions.

Monitoring the protection status of a featureThe Norton AntiVirus main window acts as a securitymanagement interface. You can access the mainfeatures and monitor the performance of yourcomputer from the main window.

At times, you may want to turn off any option for aparticular purpose. But by doing so, the status of yoursystem changes to Attention or AtRisk. In such cases,you can ignore the protection status of a particularfeature to maintain a healthy overall system status.For example, you want to turn off BrowserProtectionfor a limited period, and you still want the systemstatus to be Secure. In this case, you can ignore theprotection status of BrowserProtection and then, turnoff the option. When you ignore the protection statusof a feature, it does not affect the overall SystemStatus.

You can also monitor the protection status of thefeature that has been ignored at any time.

You can ignore or monitor the protection status of onlyselected features that are available in the Advancedwindow.

The features are:

39Getting startedAbout Norton AntiVirus main window

Page 40: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

1 Antivirus

1 Antispyware

1 SONAR Protection

1 Intrusion Prevention

1 Email Protection

1 Browser Protection

To monitor the protection status of a feature

1 In the Norton AntiVirus main window, clickAdvanced.

2 In the window that appears, move your mousepointer over the feature name.

3 In the pop-up that appears, do one of the following:

1 To ignore the protection status of the featurethat affects your computer’s overall healthevaluation, click Ignore.

1 To monitor the protection status of the featurethat has been ignored, click Monitor.

About Norton Community WatchNorton Community Watch helps in identifying newsecurity risks by submitting selected security andapplication data to Symantec for analysis. Symantecassesses the data to determine the new threats andtheir sources. The collective efforts from Nortonsecurity product users help in quick identification ofsolutions for these threats and risks. NortonCommunity Watch improves user security and productfunctionality. In addition, it helps Symantec to analyzethe execution, schedule, and efficiency ofNorton-specific tasks and settings on your computer.

Norton Community Watch collects and submits thefollowing types of data:

1 Identified malicious software such as portableexecutable files and running processes

Getting startedAbout Norton Community Watch

40

Page 41: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

1 Any Web site URL that your product identifies asfraudulent

1 All the Web site URLs that you visited before thedetection of a risk

1 The applications and processes that run on yourcomputer regularly and during any security riskdetection

1 Response instances that your computer sends toany potential security risk

1 General system information and performanceattributes from the computer

1 General information about your computer such asidle time, standby, and screensaver settings

After the potential security risks are assessed from thesubmitted data, Symantec sends the information backto Norton AntiVirus. The Norton features such asNorton Insight and Insight Network use thisinformation to identify files and processes at risk.

You should participate in Norton Community Watchsubmissions to provide valuable contribution to theentire community that uses Norton security products.Symantec maintains an adequate level of protectionfor the collected information. To allow or deny thedetailed data submissions, you must configure theDetailed Error Data Collection option under NortonCommunityWatch. To access the DetailedErrorDataCollection option, go the Norton AntiVirus mainwindow, and then click Settings > General > OtherSettings>DetailedErrorDataCollection. The detaileddata may vary depending on the Norton-specific errorsand components. You can configure the option tomanage the data submissions.

w Norton Community Watch collects and submits detaileddata about the Norton-specific errors and componentsonly. It does not collect or store any personalinformation of any user.

If you chose not to join Norton Community Watch whenyou installed your Norton product, you can turn it on

41Getting startedAbout Norton Community Watch

Page 42: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

later. To access the NortonCommunityWatch option,go to the Norton AntiVirus main window, and thenclick Settings > General > Other Settings > NortonCommunity Watch. You can also review the data,which Norton Community Watch collects and submitsto Symantec, in the Security History window.

About Norton Bootable Recovery ToolNorton Bootable Recovery Tool scans and removesviruses, spyware, and other security risks from yourcomputer. Your computer might be infected with avirus if you experience any of the following symptoms:

1 You cannot install Norton AntiVirus.

1 You cannot start your computer.

1 Your computer is extremely slow.

Norton Bootable Recovery Tool is integrated withWindows Preinstallation Environment (WinPE).Therefore, you can run Norton Bootable Recovery Toolonly from a CD, DVD, or USB key. You must use NortonBootable Recovery Tool Wizard to create the NortonBootable Recovery Tool CD, DVD, or USB key.

w You cannot run Norton Bootable Recovery Tool inWinPE for more than 72 hours. If you run NortonBootable Recovery Tool for more than 72 hours, yourcomputer restarts without any notification.

You can use the Norton Bootable Recovery Tool CD,DVD, or USB key to recover a computer that is infectedwith viruses and other security threats. This securityprogram is not a replacement for continuous, real-timeprotection from viruses and latest security risks. Toprotect your computer from future infections, be sureto install or continue using Norton AntiVirus that youalready purchased.

Getting startedAbout Norton Bootable Recovery Tool

42

Page 43: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Norton Bootable Recovery Tool detects and resolvesthe following security threats:

Programs that infect anotherprogram, boot sector,partition sector, or documentby inserting themselves orattaching themselves to thatmedium. Most viruses justreplicate; many also dodamage.

Viruses

Programs containingmalicious codes that aredisguised as or hiding insomething benign, such as agame or utility.

Trojan horses

Tools that are used by ahacker to gain unauthorizedaccess to your computer. Onetype of hacking tool, akeystroke logger, tracks andrecords your individualkeystrokes and can send thisinformation back to thehacker.

Hacking tools

Programs that can scansystems or monitor activityand relay the information toother computers or locationsin cyberspace.

Spyware

Programs that facilitate thedelivery of advertisingcontent through their ownwindow, or by using anotherprogram's interface.

Adware

43Getting startedAbout Norton Bootable Recovery Tool

Page 44: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Programs that track systemactivity, gather systeminformation, or track userhabits, and relay thisinformation to third-partyorganizations. Theinformation that is gatheredby such programs is neitherpersonally identifiable norconfidential. Trackwareprograms are installed withthe user's consent, and mayalso be packaged as part ofother software that isinstalled by the user.

Trackware

Downloading the Norton Bootable Recovery ToolWizard

If your attempt to install a Norton product fails, youcan download the Norton Bootable Recovery ToolWizard. This easy-to-use wizard helps you createNorton Bootable Recovery Tool on a CD, DVD, or USBkey. You can use Norton Bootable Recovery Tool toscan your computer and remove any security threatsthat prevent successful installation.

It is recommended that you download and installNorton Bootable Recovery Tool Wizard on a computerthat does not have any security threats and createNorton Bootable Recovery Tool. If you create NortonBootable Recovery Tool on an infected computer, thereis a chance that the recovery CD, DVD, or USB keymight get infected.

w To use Norton Bootable Recovery Tool, you must usethe product key of the Norton product that youpurchased. If you use a trial version of NortonAntiVirus, you need to create a Norton Account toreceive a product key to use Norton Bootable RecoveryTool.

Getting startedAbout Norton Bootable Recovery Tool

44

Page 45: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

You can download Norton Bootable Recovery ToolWizard in one of the following ways:

1 From the Start menu.

1 From the Norton Support Web site.

To download theNortonBootable Recovery ToolWizardfrom the Start menu

1 On the Windows taskbar, do one of the following:

1 In Windows XP, click Start>Programs>NortonAntiVirus > Norton Recovery Tools.

1 In Windows Vista or Windows 7, click Start >All Programs > Norton AntiVirus > NortonRecovery Tools.

1 In Windows 8, on the Start screen, click NortonRecovery Tools

2 Follow the on-screen instructions.

To download theNortonBootable Recovery ToolWizardfrom the Internet

1 Open your Web browser, and go to the followingURL:http://www.norton.com/recoverytool

2 Follow the on-screen instructions.

To download theNortonBootable Recovery ToolWizardfrom Norton AntiVirus

1 In the Norton AntiVirus main window, click ScanNow.

2 In the ComputerScan pane, do one of the following:

1 Click Quick Scan.

1 Click Full System Scan.

3 At the bottom of the scan window, next to If youthink there are still risks, click click here.

4 In the Norton Rescue Tools Web page, clickDownload Norton Bootable Recovery Tool.

5 Follow the on-screen instructions.

45Getting startedAbout Norton Bootable Recovery Tool

Page 46: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

About locating your Norton Product Key or activationPIN

To use Norton Bootable Recovery Tool, you must startthe computer from any of the following recovery mediaand then provide your Norton Product Key or theactivation PIN when prompted:

1 Norton Bootable Recovery Tool CD or DVD

1 Norton Bootable Recovery Tool USB key

w If you already installed and activated any one of thefollowing Norton product on your computer, you donot have to enter the Product Key for Norton BootableRecovery Tool:

1 Norton Internet Security 2010 or later

1 Norton AntiVirus 2010 or later

1 Norton 360 version 3.0 or later

1 Norton Business Suite 4.0 or later

1 Norton Security Suite 4.0 or later

w Norton Bootable Recovery Tool does not have aseparate Product Key or activation PIN. To use NortonBootable Recovery Tool, you must provide the ProductKey or activation PIN of the Norton product that youpurchased.

w If you purchased your Norton product from an Internetservice provider (ISP), you would have received anactivation PIN. When you use Norton BootableRecovery Tool, you must use this activation PIN.

Norton Bootable Recovery Tool does not automaticallylocate the Product Key or the activation PIN on acomputer that has multiple operating systems. If youuse a computer that has multiple operating systems,you need to write down the Product Key or theactivation PIN before you start Norton BootableRecovery Tool and provide the key when prompted.

You can locate your Norton Product Key or activationPIN in any of the following ways:

Getting startedAbout Norton Bootable Recovery Tool

46

Page 47: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

1 If you received your Norton product preinstalledby the computer manufacturer, the Product Key isavailable on your Norton Account. When you areprompted, you need to register for a NortonAccount. After you complete registration, you canlog on to your Norton Account and find yourProduct Key. You can also click on the Account linkon the main window of your product and registerand access Norton Account.

1 If you bought your product from Best Buy store, theNorton Product Key is available in the product CDbox. If you are not able to locate your Product Key,contact Best Buy.

1 If you bought a Norton product CD online or froma local store, the Norton Product Key is printed onthe back of the CD envelope. You can also log on toyour Norton Account and find your Product Key.

1 If you downloaded a Norton product from theNorton Online Store, the Product Key is in yourconfirmation email message. You can also see it inyour order details. In addition, you can log on toyour Norton Account and find your Product Key.

1 If you purchased your Norton product from an ISP,the activation PIN is in your confirmation emailmessage from your ISP. If you are not able to locateyour activation PIN, contact your ISP.

In case you use Norton Security Suite or NortonBusiness Suite, you can find your activation PIN in thefollowing way:

1 Go to the following URL:http://www.comcast.net/security

2 Under Get Norton Now, click Windows.

3 Click Get It Now.

4 Log on to your Comcast account, and then find youractivation PIN under the product name.You can use this activation PIN when you use NortonBootable Recovery Tool.

47Getting startedAbout Norton Bootable Recovery Tool

Page 48: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Creating Norton Bootable Recovery Tool on a CD orDVD

Norton Bootable Recovery Tool is integrated withWindows Preinstallation Environment (WinPE).Therefore, you can run Norton Bootable Recovery Toolonly from a CD, DVD, or USB key. To use it, you firstneed to burn it to a CD or DVD.

w If you choose to create Norton Bootable Recovery Toolon a re-writable CD or DVD, all the data that are storedin the CD or DVD are permanently deleted. Ensure thatyou back up all the data before creating NortonBootable Recovery Tool on a re-writable CD or DVD.

To create Norton Bootable Recovery Tool CD or DVD

1 Open your CD drive and insert an empty CD or DVD.

2 In the Norton Bootable Recovery Tool mainwindow, click Create on CD/DVD media.

3 In the Create on CD/DVD media window, do of thefollowing:

1 Select the CD drive from the Specify drivedrop-down list.

1 If you want to add drivers, click Add next to Adddrivers.

1 If you want to change the default language, clickChange next to Specify language. You canchange the language in the Select Languagewindow. By default, Norton Bootable RecoveryTool is created in English.

4 Click Next.

5 If you create Norton Bootable Recovery Tool on are-writable CD or DVD, click Yes to confirm.

6 Review the results and do one of the following:

1 Click Done to close Norton Bootable RecoveryTool.

1 Click Back to Main to create or update NortonBootable Recovery Tool in another media.

Getting startedAbout Norton Bootable Recovery Tool

48

Page 49: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Creating Norton Bootable Recovery Tool ISO fileYou can create a Norton Bootable Recovery Tool ISOfile on your computer. You can burn this ISO file to aCD or DVD and use it as a recovery CD or DVD on anycomputer. You can also use this ISO file to point to anyvirtual machine as a virtual CD-ROM.

To create Norton Bootable Recovery Tool ISO file

1 In the NortonBootableRecoveryToolWizard mainwindow, click Create ISO file.

2 In the Create ISO file window, do the following:

1 If you want to save the ISO file to a specificlocation, click Change next to Select location.

You can browse and select the folder location.

1 If you want to add drivers, click Add next to Adddrivers.

1 If you want to change the default language, clickChange next to Specify language.

You can change the language in the SelectLanguage window. By default, Norton BootableRecovery Tool is created in English.

3 Click Next.

4 Review the results and do one of the following:

1 Click Done to close Norton Bootable RecoveryTool.

1 Click Back to Main to create or update NortonBootable Recovery Tool in another media.

Creating Norton Bootable Recovery Tool on a USB keyYou can create Norton Bootable Recovery Tool on aUSB key and use it to run Norton Bootable RecoveryTool on your computer.

When you create Norton Bootable Recovery Tool on aUSB key, all the data that are stored in this USB keyare permanently deleted, and the USB key is formatted.Ensure that you back up all the data before creatingNorton Bootable Recovery Tool on a USB key.

49Getting startedAbout Norton Bootable Recovery Tool

Page 50: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To create Norton Bootable Recovery Tool on a USB key

1 Insert the USB key into the USB port of yourcomputer.

2 In the NortonBootableRecoveryToolWizard mainwindow, click Create on USB key.

3 In the CreateonUSBkey window, do the following:

1 Select the USB drive from the Specify drivedrop-down list.

1 If you want to add drivers, click Add next to Adddrivers.

1 If you want to change the default language, clickChange next to Specify language.

You can change the language in the SelectLanguage window. By default, Norton BootableRecovery Tool is created in English.

4 Click Next.

5 In the confirmation message, click Yes to let NortonBootable Recovery Tool format your USB key beforecreating Norton Bootable Recovery Tool.

6 Review the results and do one of the following:

1 Click Done to close Norton Bootable RecoveryTool.

1 Click Back to Main to create or update NortonBootable Recovery Tool in another media.

Accessing Norton Bootable Recovery Tool WizardNorton Bootable Recovery Tool is integrated withWindows Preinstallation Environment (WinPE).Therefore, you can run Norton Bootable Recovery Toolonly from a CD, DVD, or USB key.

Norton Bootable Recovery Tool Wizard helps you createNorton Bootable Recovery Tool. You can create NortonBootable Recovery Tool on a CD, DVD, or USB key. Youcan use this media to run Norton Bootable RecoveryTool on your computer.

Getting startedAbout Norton Bootable Recovery Tool

50

Page 51: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

If you have a valid Norton product key or activationPIN, you can go to your Norton Account and access theNorton Bootable Recovery Tool download link.

To access your Norton Account, go to the followingaddress:

https://account.norton.com

To access Norton Bootable Recovery Tool Wizard

1 Do one of the following:

1 Double-click the Norton Bootable Recovery ToolWizard icon on your computer desktop.

1 In Windows XP, Windows Vista, and Windows7, on the Windows taskbar, click Start > AllPrograms > Norton Bootable Recovery ToolWizard > Norton Bootable Recovery ToolWizard.

1 In Windows 8, on the Start screen, click NortonRecovery Tools.

2 Follow the on-screen instructions to downloadNorton Bootable Recovery Tool Wizard.

Using the Norton Bootable Recovery ToolIf the installation of your Norton product fails, you canuse the Norton Bootable Recovery Tool to scan andremove any security threats that prevent successfulinstallation. If your computer is infected and you arenot able to start your Windows operating system, youcan use Norton Bootable Recovery Tool to removethreats and recover your computer.

Norton Bootable Recovery Tool is available on theproduct CD that you purchased. You can use theproduct CD as a recovery media.

If you have purchased this product as a download, goto the following URL to download the Norton BootableRecovery Tool Wizard:

http://www.norton.com/recoverytool_n360

51Getting startedAbout Norton Bootable Recovery Tool

Page 52: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Norton Bootable Recovery Tool automaticallydownloads the latest virus definitions from Symantecservers and uses these virus definitions to secure yourcomputer from all types of viruses and latest securitythreats. If Dynamic Host Configuration Protocol (DHCP)is enabled, virus definitions are automatically updatedwhen your computer is connected to the Internet.Therefore, you must use an Ethernet connection toupdate the virus definitions in Norton BootableRecovery Tool. You cannot update the Norton BootableRecovery Tool virus definitions by using a wirelessnetwork connection.

If the virus definitions are out of date, Norton BootableRecovery Tool may not detect and remove all the latestsecurity threats from your computer.

w To use Norton Bootable Recovery Tool, you must usethe product key of the Norton product that youpurchased. If you use a trial version of NortonAntiVirus, you need to create a Norton Account toreceive a product key to use Norton Bootable RecoveryTool.

To use the Norton Bootable Recovery Tool

1 Insert the Norton Bootable Recovery Tool recoverymedia.

2 Turn on or Restart your computer and enter to theBIOS mode.You can enter the BIOS mode by pressing the keythat is displayed immediately after your system isturned on.

3 Select the recovery media on which you have createdthe Norton Bootable Recovery Tool and then pressEnter.If you are using UEFI-enabled machine, select therecovery media under the Legacy Boot optioninstead of the UEFI Boot option.The recovery media can be the Norton BootableRecovery Tool CD, DVD, or USB key.

Getting startedAbout Norton Bootable Recovery Tool

52

Page 53: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

4 Read the Norton License Agreement, type yourProduct Key, and then click I Agree.If you use a non-QWERTY keyboard, use the VirtualKeyboard option to enter your Product Key.

5 In the Norton Bootable Recovery Tool window, clickNorton Advanced Recovery Scan.

6 In the Scan section, click Start Scan.When the scan is complete, the scan results windowlists the following:

1 The total number of files scanned

1 The total number of threats detected

1 The total number of resolved threats

1 The total number of unresolved threats

1 The details of each detected threat

7 In the scan results window, do one of the following:

1 To fix all of the threats that are found on yourcomputer, select Set all action to Fix.

1 To perform appropriate actions for each of thethreats, select Fix or Ignore.

8 Click Continue.

9 If a confirmation dialog box appears, click OK.

10 In the Scan Summary window, review the scansummary and do one of the following:

1 Click Done.

1 To run another scan, click Scan Again.

Updating virus definitions on a USB keySymantec virus definitions are used in Norton BootableRecovery Tool to scan your computer for the latestsecurity risks. When you create Norton BootableRecovery Tool on a USB key, the latest virus definitionsare automatically downloaded and included in the USBkey. You can update the virus definitions in NortonBootable Recovery Tool on a USB key that you createdearlier.

53Getting startedAbout Norton Bootable Recovery Tool

Page 54: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To update Norton Bootable Recovery Tool virusdefinitions on a USB key

1 Insert your Norton Bootable Recovery Tool USB keyinto the USB port of your computer.

2 In the NortonBootableRecoveryToolWizard mainwindow, click Update USB key definitions.

3 In the Update USB key definitions window, fromthe Specify drive drop-down list, select the USBdrive.

4 Click Next.

5 Review the results and click Done.

About Norton Power EraserNorton Power Eraser is a powerful removal tool thatcan help you clean up the security risks that aredifficult to remove from your computer. If a programhijacked your computer and you have difficulty inremoving it, Norton Power Eraser helps you removethe security threat from your computer.

Norton Power Eraser includes detection and removalcapabilities for the security risks that impersonatelegitimate applications. The tool uses more aggressivetechniques than your Norton security product; hencethere is a risk that it may flag legitimate programs forremoval. You should carefully review the scan resultspage before removing any files.

Downloading and accessing Norton Power EraserYou can download Norton Power Eraser using yourWeb browser. After you download, you can scan yourcomputer with Norton Power Eraser to remove securitythreats.

To download and access Norton Power Erase

1 Open your Web browser and go the following URL:http://security.symantec.com/nbrt/npe.aspx

Getting startedAbout Norton Power Eraser

54

Page 55: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

2 In the page that appears, click Download NortonPower Eraser.

3 Save the NPE.exe file to your Desktop.

4 Double-click the NPE.exe file on your Desktop.

5 Read the license agreement, and then click Accept.

Scanning your computer with Norton Power EraserYou can scan your computer with Norton Power Eraserto remove threats even if you have a Symantec securityproduct. If you cannot start your computer in Normalmode, you can run Norton Power Eraser in Safe mode.

To scan your computer with Norton Power Eraser

1 Double-click the NPE icon on your desktop.

2 Read the End User License Agreement and clickAccept.

3 In the NortonPowerEraser window, click Scan forRisks.

4 In the window that appears, click Restart.Norton Power Eraser restarts your computer andstarts the system scan after you log back in to yourcomputer. By default, Norton Power Eraser performsa Rootkit scan and requires a system restart.

w If Norton Power Eraser finds some issues or risks, youmay need to follow the on-screen instructions toresolve the issues

w Scanning your computer may take several minutes.The scan progress screen displays the items beingscanned. After the scan is complete, you candouble-click a file name in the list and get moreinformation about the item.

55Getting startedAbout Norton Power Eraser

Page 56: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Starting Norton AntiVirus from thecommand prompt

If you work from the command line (for example,writing a script or code), you can start Norton AntiViruswhile you are still in DOS.

To start Norton AntiVirus from the command prompt

1 At the command-line prompt, type the directorywhere Norton AntiVirus is located, and theexecutable.

1 In 32-bit version of Windows, Norton AntiVirusand the executable are located at the followingpath:

\Program Files\NortonAntiVirus\Engine\version\Uistub.exe

Where version represents the version numberof installed Norton AntiVirus.

1 In 64-bit version of Windows, Norton AntiVirusand the executable are located at the followingpath:

\Program Files (x86)\NortonAntiVirus\Engine\version\Uistub.exe

Where version represents the version numberof installed Norton AntiVirus.

2 Press Enter.

About the Norton AntiVirus iconAfter you install Norton AntiVirus, it displays an iconin the notification area at the far right of the Windowstaskbar. This icon indicates the current status of yourcomputer.

Norton AntiVirus displays alerts and notifications toinform you how viruses and other security threats aredetected and resolved. These alerts and notificationsappear over the notification area of your computer. In

Getting startedStarting Norton AntiVirus from the command prompt

56

Page 57: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

most cases, you can click the link available in the alertto view the details and fix the problems.

The Norton AntiVirus icon represents the current stateof your computer. The icon changes its color when itactively fixes any issues or wants to inform you aboutany warning or urgent issues.

You can see the following representations of NortonAntiVirus icon in the notification area:

Represents that your computeris completely secure

Icon with a green badge

Represents that there are someissues against your computerprotection that require yourattention

Icon with an orange badge

Represents that there are someurgent issues against yourcomputer protection that requireimmediate resolution

Icon with a red badge

Represents that your product isdisabled

Icon with a gray badge

Represents that NortonAntiVirus is fixing issues

Icon with a yellow badge

Represents that the Silent Modefeature is turned on

This icon also displays thecurrent protection status badge.

Icon with acrescent-pattern

You can right-click the Norton AntiVirus icon to openthe shortcut menu to quickly access a few importanttasks of Norton AntiVirus.

57Getting startedAbout the Norton AntiVirus icon

Page 58: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

About Norton AntiVirus shortcut menuNorton AntiVirus performs background activities tokeep your computer secure. The icon in the notificationarea reassures you that your protection is up to date.The icon changes its color if any change in statusoccurs.

The messages that appear in the notification area mightrequire a response from you, such as opening a window,and taking an action. More often, messages inform youabout current activities, and they disappear after a fewseconds. You can check the Security History windowfor any further details.

You can right-click the Norton AntiVirus icon to accessspecific Norton AntiVirus activities. Depending on thecurrent activities, your options include the following:

Lets you launch the NortonAntiVirus main window tocomplete tasks, view currentstatus, or access other features.

Open Norton AntiVirus

Lets you run a Quick Scan toprotect possible virus-infectedareas of your computer.

Run Quick Scan

Lets you run LiveUpdate to checkfor definition and programupdates.

Run LiveUpdate

Lets you review the informationabout the security events for allof the categories.

View Recent History

Lets you resolve your problemeasily using Norton Autofix.

Get Support

Getting startedAbout the Norton AntiVirus icon

58

Page 59: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Lets you turn on or turn offSilent Mode.

Turn on/Turn off SilentMode

Lets you turn off or turn onAntivirus Auto-Protect.

Disable/Enable AntivirusAuto-Protect

Lets you check if new version ofyour product is available or not.

This option is available only ifyou have activated your productand you have an activesubscription.

Check for New Version

About LiveUpdateSymantec products download the latest definitionupdates and program updates regularly from Symantecservers. The definition updates protect your computerfrom the latest viruses and unknown security threats.Using the LiveUpdate technology, Symantec productshelp you to obtain and install these updates.

LiveUpdate takes little time to download and processthe definition updates and program updates. You canchoose Smart Definitions to minimize download time,installation time, and memory consumption as SmartDefinitions are a subset of virus definitions. To accessthe Smart Definitions option, go to the NortonAntiVirus main window, and then click Settings >Updates > Smart Definitions. You can cancel theLiveUpdate session at any time.

LiveUpdate obtains these updates for your computerby using your Internet connection. If your networkuses proxy servers to connect to the Internet,LiveUpdate uses the proxy settings in your product todownload the latest updates. To configure the proxysettings of your network, go to the Norton AntiVirus

59Getting startedAbout LiveUpdate

Page 60: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

main window, and then click Settings > Network >NetworkSecuritySettings>ProxyServer>Configure.

w LiveUpdate does not download the latest definitionupdates and program updates, if the Network CostAwareness option in the Settings window is set to NoTraffic. Network Cost Awareness lets you define theamount of network bandwidth that Norton AntiViruscan use. Therefore, you must ensure that the NetworkCostAwareness option is turned on and set to NoLimitor Critical Updates Only for LiveUpdate to runsuccessfully.

About Program and Definition UpdatesLiveUpdate obtains program updates and definitionupdates for your computer by using your Internetconnection.

Program updates are minor improvements to yourinstalled product. These differ from product upgrades,which are newer versions of the entire product.Program updates are usually created to extend theoperating system or hardware compatibility, adjust aperformance issue, or fix program errors. Programupdates are released on an as-needed basis.

w Some program updates may require that you restartyour computer after you install them.

LiveUpdate automates the process of downloading andinstalling program updates. It locates and obtains filesfrom an Internet site, installs them, and then deletesthe older files and downloaded definitions from thetemporary folder after processing the updates.

Definition updates are the files that keep yourSymantec products up to date with the latest antithreattechnology. The definition updates that you receivedepend on which product you use.

Getting startedAbout LiveUpdate

60

Page 61: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

The type of definition updates that each of theSymantec products receive are as follows:

Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.

Norton AntiVirus, NortonAntiVirus Online

In addition to the virusand security risk updates,users of these productsreceive definition updatesfor security protection.For the products thatcontain protectionagainst phishing, usersreceive definition updatesagainst phishing.

The security definitionupdates provide the latestpredefined firewall rules,the updated lists ofapplications that accessthe Internet, IntrusionPrevention signatures,and Symantec spamdefinition files. Theselists are used to identifyunauthorized accessattempts to yourcomputer.

Norton Internet Security, NortonInternet Security Online

61Getting startedAbout LiveUpdate

Page 62: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.

In addition, users of theseproducts receiveSymantec spamdefinitionfiles and definitionupdates against phishing.

Norton 360, Norton 360 Online

Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.

In addition, users of theseproducts receiveSymantec spamdefinitionfiles and definitionupdates against phishing.

Norton Security Suite, NortonBusiness Suite

About Smart DefinitionsNorton AntiVirus downloads and installs virusdefinitions regularly to protect your computer fromthe latest security threats. For faster downloads andinstallation purpose, Norton AntiVirus classifies thesevirus definitions into two sets.

The virus definitions are classified into the followingtwo sets:

Contains all the virus definitionsfor each threat that is known toSymantec.

Complete Set

Getting startedAbout LiveUpdate

62

Page 63: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Contains the most importantvirus definitions that arerequired for latest securitythreats as viewed by Symantec.

The Core Set is a subset of theComplete Set, and it isapproximately 30 percentsmaller than the Complete Set.The Core Set minimizesdownload time, installation time,and system start time. It alsooccupies lesser amount of diskspace as compared to theComplete Set virus definitions.Therefore, the Core Set resultsin faster performance of yourcomputer.

Core Set

The Core Set virus definitions are called as SmartDefinitions. Norton AntiVirus provides the SmartDefinitions option to choose between Core Set virusdefinitions and Complete Set virus definitions forLiveUpdate sessions. To access the SmartDefinitionsoption, go to the Norton AntiVirus main window, andthen click Settings > Updates > Smart Definitions.

During Automatic LiveUpdate or each time that yourun LiveUpdate manually, Norton AntiVirus checks ifthe Smart Definitions option is turned on or off. Itthen downloads and installs the desired set of virusdefinitions based on the option settings. By default,the SmartDefinitions option is turned on, which meansthat the Core Set virus definitions are downloaded andinstalled.

Turning off or turning on Smart Definitions

Smart Definitions are a subset of virus definitions thatcontains most important definitions for the latestsecurity threats.

63Getting startedAbout LiveUpdate

Page 64: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

As the Smart Definitions are of considerably smallersize, it results in lesser download time, lesserinstallation time, lesser boot time, and lesser memoryconsumption. It also occupies lesser amount of diskspace as compared to the full set of virus definitions.Therefore, Smart Definitions result in fasterperformance of your computer.

Norton AntiVirus checks the SmartDefinitions optionsettings during each LiveUpdate session. If the optionis turned on, the Smart Definitions are downloadedand installed. If the option is turned off, all of the virusdefinitions are downloaded and installed.

To turn off or turn on Smart Definitions

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, in the left pane, clickUpdates.

3 In the Smart Definitions row, do one of thefollowing:

1 To turn off Smart Definitions, move the On/Offswitch to the right to the Off position.

1 To turn on Smart Definitions, move the On/Offswitch to the left to the On position.

4 In the Settings window, click Apply.

5 Click OK.

About running LiveUpdateYou should run LiveUpdate as soon as you installNorton AntiVirus. Some Symantec products runLiveUpdate automatically to keep your protection upto date. If you do not use the Automatic LiveUpdateoption, you should manually run LiveUpdate once aweek.

In addition to the definition updates that AutomaticLiveUpdate downloads, the product uses streamingtechnology to download the latest virus definitions.These downloads are called Pulse Updates. The Pulse

Getting startedAbout LiveUpdate

64

Page 65: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Updates are lighter and faster than AutomaticLiveUpdate. It keeps your computer secure from theongoing threats on the World Wide Web.

When Pulse Updates are enabled, LiveUpdate checksfor definition updates every few minutes anddownloads the streamed virus definitions. The PulseUpdates protect your computer from the latest securitythreats without compromising your systemperformance. Even if you turn off Pulse Updates,LiveUpdate picks all the missed streams and it updatesyour computer during the full definition updates.

Each LiveUpdate session checks if the SmartDefinitions option is turned on or off, and downloadsand installs the updates based on the option settings.To access the Smart Definitions option, go to theNorton AntiVirus main window, and then click Settings> Updates > Smart Definitions. By default, the SmartDefinitions option is turned on. As Smart Definitionsare only a subset of all the virus definitions, you canminimize download time, installation time, andmemory consumption. However, if you want all of thevirus definitions to be downloaded and installed, youcan turn off the Smart Definitions option.

Checking for updates manuallyLiveUpdate checks for updates to the product that isinstalled on your computer.

These updates protect your computer from newlydiscovered threats. LiveUpdate uses the Internetconnection to connect to the Symantec server, checksfor updates, and then downloads and installs themautomatically.

You should have the Automatic LiveUpdate optionturned on to ensure that you have the latest definitionupdates and program updates. Definition updatescontain the information that allows the product torecognize and alert you to the presence of a specificvirus or security threat. Symantec issues programupdates periodically, which are enhancements to the

65Getting startedAbout LiveUpdate

Page 66: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

product. Program updates are usually created to fixprogram errors, improve the performance of theprogram, or, to extend the operating system orhardware compatibility. After you install programupdates, you might not necessarily see a difference inthe way that the product works.

If you are not connected to the Internet, connect to theInternet first, and then run LiveUpdate. Or, if you usea proxy server to connect to the Internet, configure theproxy settings, and then run LiveUpdate. To configurethe proxy settings of your network, go to the NortonAntiVirus main window, and then click Settings >Network>NetworkSecuritySettings>ProxyServer> Configure.

When the LiveUpdate session is complete, you can usethe View Summary link to view the summary of theupdates that are installed on your computer.

To check for updates manually

1 In the Norton AntiVirus main window, clickLiveUpdate.LiveUpdate connects to the Symantec server, checksfor available updates, and then downloads andinstalls them automatically.

2 In the Norton LiveUpdate window, when theinstallation is complete, click OK.Some program updates may require you to restartyour computer after you install them.

About keeping your protection up to dateDefinition updates are available to you as long as youmaintain an active product status. The ways in which

Getting startedAbout LiveUpdate

66

Page 67: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

you can acquire the product and maintain your statusare as follows:

The product includes a limited-timesubscription to definition updates. Whenthe subscription is due to expire, you areprompted to renew. Follow the on-screeninstructions to complete yoursubscription renewal.

After your product expires, you cannotobtain updates of any kind and all thesecurity features are turned off. If youdo not renew your product, you are nolonger protected against security threats.Though LiveUpdate continues to checkfor updates after expiration, you mustrenew your product to enable all thesecurity features.

If you purchaseda subscriptionversion of a retailproduct

If you do not activate your service orrenew your subscription, you cannotobtain updates of any kind and thesoftware no longer functions.

If you purchaseda product as aservice, or it cameinstalled on yourcomputer

Your product status is always active aslong as your security service is activewith your service provider.

If your security service is not active, youcannot obtain updates of any kind andthe software no longer functions.

If you receive thisservice throughyour serviceprovider

Turning off or turning on Automatic LiveUpdateYou can have LiveUpdate check for definition updatesand product updates automatically on a set schedule,by turning on the Automatic LiveUpdate option. Youcan also run LiveUpdate manually when the AutomaticLiveUpdate option is turned on. However, you must

67Getting startedAbout LiveUpdate

Page 68: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

run LiveUpdate manually to obtain updates if you haveturned off the Automatic LiveUpdate option.

w If you are connected to the Internet, AutomaticLiveUpdate downloads product updates and definitionupdates every hour. If you have an Integrated ServicesDigital Network (ISDN) router that is set toautomatically connect to your Internet service provider(ISP), it may incur charges each time. If you do not wantthis setup, you can turn off the automatic connectionon your ISDN router, or turn off the AutomaticLiveUpdate option.

To turn off Automatic LiveUpdate

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, in the left pane, clickUpdates.

3 In the AutomaticLiveUpdate row, move the On/Offswitch to the right to the Off position.

4 In the Settings window, click Apply.

5 In the Security Request dialog box, in the Selectthe duration drop-down list, select how long youwant to turn off Automatic LiveUpdate, and thenclick OK.

6 In the Settings window, click OK.

To turn on Automatic LiveUpdate

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, in the left pane, clickUpdates.

3 In the AutomaticLiveUpdate row, move the On/Offswitch to the left to the On position.

4 In the Settings window, click Apply.

5 Click OK.

Getting startedAbout LiveUpdate

68

Page 69: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Turning on or turning off Apply updates only on rebootLiveUpdate obtains latest definition updates and theprogram updates that keep your computer secure fromthe latest security threats. Definition updates containthe information that allows Norton AntiVirus torecognize and alert you to the presence of a specificvirus or a security threat. Certain program updatesrequire system restart for the update to complete. TheApply updates only on reboot option lets you choosehow the program updates needs to be applied.

w The Apply updates only on reboot option is availableonly on Windows 7 and Windows 8.

When you turn on the Apply updates only on rebootoption, the RestartNow and the RestartLater optionsappear in the Norton LiveUpdate window. When youclick RestartNow, your computer is restarted and theprogram updates are applied. When you click RestartLater, the program updates are applied when yourestart your computer.

When you turn off the Apply updates only on rebootoption, the Apply Now option appears in the NortonLiveUpdate window. When you click Apply Now, theprogram updates that do not require system restartare applied instantly. However, the program updatesthat require system restart are automatically appliedthe next time you restart your computer.

To turn on or turn off Apply updates only on reboot

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, in the left pane, clickUpdates.

3 In the Apply updates only on reboot row, do oneof the following:

1 To turn off Applyupdatesonlyonreboot, movethe On/Off switch to the right to the Off position.

1 To turn on Applyupdatesonlyonreboot, movethe On/Off switch to the left to the On position.

69Getting startedAbout LiveUpdate

Page 70: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

4 In the Settings window, click Apply.

5 Click OK.

About Pulse UpdatesIn addition to the definition updates that AutomaticLiveUpdate downloads, Norton AntiVirus usesstreaming technology to download the latest virusdefinitions. These downloads are called Pulse Updates.The Pulse Updates are lighter and faster thanAutomatic LiveUpdate. They keep your computersecure from the ongoing threats that exist on theInternet. Pulse Updates protect you against therapidly-changing environment of security threatswithout compromising your computer's performance.Pulse Updates should always be turned on to get thelatest updates.

Pulse Updates checks for definition updates every 5minutes. If definition updates are available, LiveUpdatedownloads the streamed virus definitions. PulseUpdates provide the updates in between the fullupdates, which Automatic LiveUpdate downloadsautomatically every hour. Norton AntiVirus mergesthe new stream that is downloaded with the lastupdates that are installed. The Pulse Updatesdownloads provide additional and fast protection forthe latest threats in between the full updates withoutdisrupting your online experience.

Even if you do not turn on Pulse Updates, LiveUpdatecollects all the missed streams and, it updates yourcomputer during full definition updates.

Turning off or turning on Pulse Updates

Pulse Updates provide frequent, lightweight updatesevery 5 minutes in between the full updates. Alwaysensure that the Pulse Updates option is turned on. Itprotects you from the latest threats withoutcompromising your system performance or disruptingyour online experience.

Getting startedAbout LiveUpdate

70

Page 71: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

You must be connected to the Internet to obtain latestdefinition updates by using Pulse Updates. You canturn on or turn off Pulse Updates only if AutomaticLiveUpdate is turned on.

To turn off or turn on Pulse Updates

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, in the left pane, clickUpdates.

3 Under AutomaticLiveUpdate, in the PulseUpdatesrow, do one of the following:

1 To turn off Pulse Updates, move the On/Offswitch to the right to the Off position.

1 To turn on Pulse Updates, move the On/Offswitch to the left to the On position.

4 In the Settings window, click Apply.

5 Click OK.

About Network Proxy SettingsA proxy server regulates access to the Internet, andprevents external computers from accessing yournetwork. If you are on a network that uses a proxyserver to connect to the Internet, you can provide proxyserver details to Norton AntiVirus. You can use theNetwork Proxy Settings window to specify theautomatic configuration URL, the proxy settings, andthe authentication details. Norton AntiVirus uses theproxy settings and authentication details to connectto the Internet automatically, whenever required. Forexample, LiveUpdate uses the specified proxy serversettings to retrieve updates. You must ensure that youspecify the proxy server details for LiveUpdate to runsuccessfully.

In some cases, your network uses an automaticconfiguration URL or script for managing Internetaccess. In this case, you must provide the URL of therequired Proxy Automatic Configuration (PAC) file. A

71Getting startedAbout Network Proxy Settings

Page 72: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

PAC file contains the code that lets your browser knowabout the proxy settings for different Web sites overthe Internet. It also contains the words which you wantto filter and block while you access the Internet. Youcan also choose the option that lets your browser toautomatically detect the proxy settings. If you wantyour manual settings in the network, ensure that youdisable the Automatic Configuration options.

Network Proxy Settings window lets you specify thefollowing settings:

Lets you specify the automaticconfiguration URL or script tomanage Internet access.

You have the following options:1 Automatically detect

settings

Lets your browser detect thenetwork settingsautomatically.

If you do not want to overrideyour manual settings fornetwork connections, youmust disable this option.

1 Useautomatic configurationscript

Lets your browser use theautomatic configuration URLor script to manage Internetaccess.

Use the URL box to providethe HTTP URL or the HTTPSURL.

Automatic Configuration

Getting startedAbout Network Proxy Settings

72

Page 73: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Lets you provide the details ofyour Proxy Settings.

UnderProxySettings, checkUsea proxy server for your HTTPconnections, and do thefollowing:

1 In the Address box, type theURL or IP address of yourproxy server.

1 In the Port box, type the portnumber of your proxy server.

You can specify a value from1 to 65535.

Proxy Settings

Lets you connect to the Internetthrough a server that requiresauthentication.

Use the Username box andPassword box to type theauthentication details.

Authentication

Configuring Network Proxy SettingsWhen you use a proxy server to connect to the Internet,you must specify the proxy server details. The NetworkProxy Settings window lets you enter automaticconfiguration settings, proxy settings, and proxy serverauthentication settings. The Network Proxy settingslet you connect to the Internet while you perform taskssuch as activating the product or accessing the supportoptions.

To configure Network Proxy Settings

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the Network tab.

3 In the left pane, click Network Security Settings.

4 In the Proxy Server row, click Configure.

73Getting startedAbout Network Proxy Settings

Page 74: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

5 In the Network Proxy Settings window, do thefollowing:

1 If you want your browser to automatically detectnetwork connection settings, under AutomaticConfiguration, check Automatically detectsettings.

1 If the proxy server requires an automaticconfiguration URL, under AutomaticConfiguration, check Use automaticconfiguration script. Type the URL of the PACfile in the URL box.

1 If your network uses a proxy server, under ProxySettings, check Use a proxy server for yourHTTPconnections. In the Address box, type theURL or IP address of your proxy server, and inthe Port box, type the port number of your proxyserver. You can specify a value from 1 to 65535.

1 If your proxy server requires a user name andpassword, under Authentication, check I needauthenticationtoconnect throughmyfirewallor proxy server. Type the user name in theUsername box and password in the Passwordbox.

6 In the NetworkProxySettings window, click Apply.

Getting startedAbout Network Proxy Settings

74

Page 75: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

This chapter includes the following topics:

1 About System Insight

About System InsightNorton AntiVirus continuously monitors yourcomputer to keep it free of any problems and run atpeak efficiency. Norton AntiVirus constantly scans thevital areas of your computer including memory,registry keys, and running processes. It monitors theimportant activities such as general file operation,network traffic, and Internet browsing. In addition,Norton AntiVirus ensures that the activities that itperforms on your computer do not degrade the overallperformance of your computer.

System Insight provides you a centralized locationwhere you can view and monitor the activities that youperform on your system. System Insight displays suchinformation in the Performance window.

You can use the Performance window for the following:

1 To view monthly history of the important systemactivities that you performed or that occurred overa period of the last three months.

The Events graph that appears at the top of thewindow provides a pictorial representation ofimportant system activities. The activities includeapplication installations, application downloads,

2Monitoring yoursystem'sperformance

Page 76: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

disk optimizations, threat detections, performancealerts, or Quick Scans. The graph displays theactivities as icon or stripe, and the description foreach icon or stripe is provided at the bottom of thegraph. The pop-up that appears when you move themouse pointer over an icon provides you the detailsabout the activity. The View Details link in thepop-up lets you view additional details about theactivity in the Security History window. You canuse the tabs at the top of the graph to obtain detailsfor the current month and details for the last twomonths.

1 To rearrange the organization of files on yourcomputer.

Optimizing your system helps you maximize theusable free space on a disk by grouping files basedon how they are accessed. The Optimize option atthe top of the Events graph lets you defragmentyour system.

1 To view and analyze the effect of Norton AntiViruson the performance of your computer.

The Performance graph that appears at the bottomof the window provides a graphical representationof your CPU usage and memory usage. The CPU tabdisplays a graph that represents the overall systemCPU usage and Norton-specific CPU usage. Whenyou click at any point on the CPU graph andmemory graph, Norton AntiVirus displays a list ofthe processes that consume maximum resources atthat point. It also displays the percentage of usagefor each process. You can click a process that isavailable in the list to get more information aboutthe process in the File Insight window. TheMemory tab displays a graph that representsoverall memory usage and Norton-specific memoryusage. You can select any of the Zoom options toobtain magnified view or historical data of thegraphs.

1 To view the details of Norton-specific jobs that arecurrently running in the background.

Monitoring your system's performanceAbout System Insight

76

Page 77: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

The NortonTasks window provides the details suchas the timestamp, the duration, and the status ofthe background jobs. The details also include thetype of power the job needs to run and if a job randuring idle time. You can select different powersources for the background jobs. You can also startor stop a background job at any time.

1 To view the details of the Files of Interest.

The Norton Insight -ApplicationRatings windowprovides details on the trust level, prevalence,resource usage, and stability ratings for the Filesof Interest.

You can use the Performance Monitoring option tomonitor the performance of your computer. To accessthe PerformanceMonitoring option, go to the NortonAntiVirus main window, click Settings > General >PerformanceMonitoring>PerformanceMonitoring.

Accessing the Performance windowSystem Insight provides you a centralized locationwhere you can view and monitor your system activities.System Insight displays such information in thePerformance window. You can access the Performancewindow to view details about the important systemactivities, CPU usage and memory usage, andNorton-specific background jobs. You can also viewNorton Insight details and defragment your bootvolume.

To access the Performance window

4 In the Norton AntiVirus main window, clickPerformance.

About monitoring system activitiesSystem Insight provides information about theimportant system activities that you performed or thatoccurred over a period of the last three months. SystemInsight displays the information in the Performance

77Monitoring your system's performanceAbout System Insight

Page 78: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

window. The Events graph at the top of thePerformance window displays each activity as icon orstripe. The description for each icon or stripe appearsat the bottom of the graph. You can use the tabs at thetop of the graph to obtain details for the current monthand for the last two months. The activities include:

Provides the details about theinstallation activities that youperformed on your system overa period of the last threemonths.

The details include theapplication that you installed,the date on which you installedthe application, and the totalnumber of installations on thatdate.

Installs

Provides the details about theapplication-download activitiesthat you performed on yoursystem over a period of the lastthree months.

The details include the date onwhich you downloaded a file andthe total number of downloadson that date. You can click thefile name link to view additionaldetails about the downloadedfile such as the Download Insightreport, file name, reputationlevel, and recommended action.

Downloads

Indicates the optimizationactivities that you performed onyour system over a period of thelast three months.

Optimized

Monitoring your system's performanceAbout System Insight

78

Page 79: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Provides the details about thethreat detection activities thatNorton AntiVirus performed onyour system over a period of thelast three months.

The details include the date onwhich Norton AntiVirus detecteda threat and the total number ofthreats that Norton AntiVirusdetected on that date. The ViewDetails link provides additionaldetails about the risk such as therisk impact and the origin of therisk. The details also include theaction that a threat hasperformed on your system andthe action that Symantecrecommends you to resolve thethreat.

Detections

Provides the details about theperformance alerts that NortonAntiVirus displayed over a periodof the last three months.

The details include themonitored date and the numberof performance alerts generated.The View Details link providesadditional details aboutperformance-related activities,program name, programlocation, and system resourcesutilization.

Alerts

79Monitoring your system's performanceAbout System Insight

Page 80: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Provides the details about QuickScans that Norton AntiVirusperformed on your system overa period of the last threemonths.

The details include the date onwhich a Quick Scan wasperformed and the number ofQuick Scans that wereperformed on that date. TheView Details link providesadditional details such as thescan time, total items scanned,total risk detected, total risksresolved, and recommendedaction.

Quick Scans

Viewing details of your system activities

System Insight lets you view details of the systemactivities that you performed or that occurred over thelast three months in the Performance window. Theactivities include application installations, applicationdownloads, disk optimizations, threat detections,performance alerts, or Quick Scans. You can use thetabs at the top of the Events graph to obtain details forthe current month and for the last two months. TheEvents graph at the top of the Performance windowdisplays each activity as icon or stripe. The descriptionfor each icon or stripe appears at the bottom of thegraph. The pop-up that appears when you move themouse pointer over an icon provides you the detailsabout the activity. The details include the date on whichan activity was performed and the number of suchactivities that you performed on that date. The ViewDetails link provides additional details of the activityin the Security History window.

Monitoring your system's performanceAbout System Insight

80

Page 81: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To view details of your system activities

1 In the Norton AntiVirus main window, clickPerformance.

2 In the Performance window, at the top of the Eventsgraph, click the tab for a month to view the details.

3 In the Events graph, move the mouse pointer overthe icon or the stripe for an activity.

4 In the pop-up that appears, view the details of theactivity.

5 If the View Details option appears in the pop-up,click View Details to view additional details in theSecurity History window.

About performance alertingNorton AntiVirus monitors your system performance.If it detects an increased usage of system resources byany program or process, it notifies you withperformance alerts. Performance alerting works onlywhen the Performance Monitoring option andPerformance Alerting option are turned on.

Performance alerting notifies you with informationabout the program name and resources that theprogram uses excessively. The Details & Settings linkin the performance notification alert lets you viewadditional details about the resource consumption bythe program. The File Insight window opens anddisplays the details of the file, the origin of the file, theprocess ID, and the complete resource usage list of theprogram. From the FileInsight window, you can chooseto exclude the program from being monitored. You canuse the Settings option in the File Insight window toturn off the Performance Alerting option.

w Performance alerts are not displayed when yourcomputer is idle or in Silent Mode.

For each system resource, such as CPU, memory, andhard disk, there is a resource consumption thresholddefined. When the resource consumption of a program

81Monitoring your system's performanceAbout System Insight

Page 82: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

exceeds the defined threshold limit, Norton AntiVirusalerts you with a performance alert.

You can use the Resource Threshold Profile forAlerting option to configure the threshold limit. Toaccess the Resource Threshold Profile for Alertingoption, go to the Norton AntiVirus main window, andthen click Settings > General > PerformanceMonitoring>ResourceThresholdProfileforAlerting.

You can use the UseLowResourceProfileOnBatteryPower option to let Norton AntiVirus automaticallychange the resource threshold profile to low when yourcomputer runs on battery power.

You can use AlertforHighusage of option to configureNorton AntiVirus to alert for high usage of CPU,memory, disk, and handles.

In addition, you can add programs to the ProgramExclusions list using the Program Exclusions option.When you add a program to the Program Exclusionslist, Norton AntiVirus does not alert you when theprogram exceeds the defined resource consumptionthreshold limit.

You can view all the performance-related logs underthe Performance Alert category in the SecurityHistory window.

Configuring performance alerts

You can use the Performance Alerting option toreceive performance alerts when there is an increasedusage of system resources by any program or process.

You can use the following options to configureperformance alerts:

Turns off performance alerts.

Select this option if you donot want Norton AntiVirus tonotify you with performancealerts.

Off

Monitoring your system's performanceAbout System Insight

82

Page 83: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Turns on performance alerts.

Select this option if you wantNorton AntiVirus to notify youwithperformancealertswhena program or process exceedsthe threshold limit of thesystem resource usage.

By default, the PerformanceAlerting option is turned on.

On

Monitors and records thesystem resource usage.

Select this option if you wantNorton AntiVirus to onlymonitor the system resourceusage of every program orprocess running on yourcomputer.

When a program or processexceeds the threshold limitof the system resource usage,Norton AntiVirus recordsthese details in the SecurityHistorywindow. You can viewthe details that are related toperformance alerts underPerformance Alert categoryin the Security Historywindow.

Log Only

To configure performance alerts

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Performance Monitoring.

83Monitoring your system's performanceAbout System Insight

Page 84: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

4 Under Performance Monitoring, in thePerformanceAlerting row, do one of the following:

1 To turn off performance alerts, move thePerformanceAlerting switch to the Off position.

1 To turn on performance alerts, move thePerformanceAlerting switch to the On position.

1 To suppress the performance alerts, move thePerformance Alerting switch to the Log Onlyposition.

5 Under Alert for High Usage of, do one of thefollowing:

1 If you want Norton AntiVirus to monitor theCPU usage, move the CPU switch to the left tothe On position.

1 If you want Norton AntiVirus to monitor thememory usage, move the Memory switch to theleft to the On position.

1 If you want Norton AntiVirus to monitor the diskusage, move the Disk switch to the left to the Onposition.

1 If you want Norton AntiVirus to monitor thehandle count, move the Handles switch to theleft to the On position. By default, this option isturned off.

6 Click Apply, and then click OK.

Configuring the resource threshold profile

The threshold limit for the system resourcesdetermines at which point Norton AntiVirus shouldnotify you with performance alerts. When a specificprogram exceeds the threshold limit of using yoursystem resource, Norton AntiVirus notifies you with aperformance alert.

To configure the resource threshold profile

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

Monitoring your system's performanceAbout System Insight

84

Page 85: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

3 In the left pane, click Performance Monitoring.

4 Under Performance Monitoring, in the ResourceThreshold Profile for Alerting row, select one ofthe following options:

Configures a low thresholdlimit for alerting.

Symantec recommends youto select this option whenyour computer runs onbattery power.

Low

Configures a mediumthreshold limit for alerting.

By default, the threshold limitis set to medium.

Medium

Configures a high thresholdlimit for alerting.

Symantec recommends youto select this option whenyour computer runs tasksthat require high resource.

High

5 Click Apply and then click OK.

Turning off or turning on the Use Low Resource Profile OnBattery Power option

When your computer runs on battery power, it isimportant that all active software programs consumeminimum resource usage. By reducing resource usage,your computer gains longer battery life and becomesmore energy efficient.

You can configure a low threshold profile and ensurethat all programs consume minimum resource usage.When the resource usage of a program or a processexceeds the low threshold limit, Norton AntiVirus

85Monitoring your system's performanceAbout System Insight

Page 86: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

notifies you with a performance alert. You can chooseto close the program or the process manually and freethe resource.

If the Use Low Resource Profile On Battery Poweroption is turned on, Norton AntiVirus automaticallychanges the threshold profile to low when yourcomputer runs on battery power. By default, this optionis turned on.

w Symantec recommends that you keep the Use LowResourceProfileOnBatteryPower option turned on.

To turn off the Use Low Resource Profile On BatteryPower option

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Performance Monitoring.

4 Under Performance Monitoring, in the Use LowResource Profile On Battery Power row, move theOn/Off switch to the right to the Off position.

5 Click Apply, and then click OK.

To turn on the Use Low Resource Profile On BatteryPower option

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Performance Monitoring.

4 Under Performance Monitoring, in the Use LowResource Profile On Battery Power row, move theOn/Off switch to the left to the On position.

5 Click Apply, and then click OK.

Excluding programs from performance alerts

Norton AntiVirus lets you exclude programs fromperformance alerts. You can add the programs thatconsume high CPU, memory, or disk usage to theProgram Exclusions list. When you add a program to

Monitoring your system's performanceAbout System Insight

86

Page 87: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

the Program Exclusions list, Norton AntiVirus doesnot alert you when the program exceeds the resourceconsumption threshold limit.

To exclude a program from performance alerts

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Performance Monitoring.

4 Under Performance Monitoring, in the ProgramExclusions row, click Configure.

5 In the Program Exclusions window, click Add.

6 In the Select a program dialog box, browse to theexecutable file for the program that you want toadd.

7 Click Open.

8 In the Program Exclusions window, click Apply.

9 Click OK.

10 In the Settings window, click Apply.

11 Click OK.

Removing programs from Program Exclusions

The ProgramExclusions window lists all the programsthat are excluded from performance alerts. If you want,you can remove any of the programs that you alreadyadded to the Program Exclusions window. When youremove a program, the program appears in theperformance alert the next time it crosses the definedthreshold limit for resource consumption.

To remove a program from Program Exclusions

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Performance Monitoring.

4 Under Performance Monitoring, in the ProgramExclusions row, click Configure.

87Monitoring your system's performanceAbout System Insight

Page 88: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

5 In the Program Exclusions window, select theprogram that you want to delete, and then clickRemove.To remove all the programs available in theProgram Exclusions window, click Remove All.

6 In the Program Exclusions window, click Apply7 Click OK.

8 In the Settings window, click OK.

About CPU graph and memory graphNorton AntiVirus monitors the overall system CPUusage and memory usage and the Norton-specific CPUusage and memory usage. Norton AntiVirus displaysthe details in the CPU graph and the memory graph.The CPU graph and memory graph are real-time graphsof CPU utilization and memory utilization.

The graphs display a performance time for the last 90minutes or for the duration since you started yourcomputer. The graphs update the information at aninterval of every 15 seconds. The graphs progress fromright to left, and the most recent data appear on thefar right of the graph. The blue pattern in the graphsdepicts the overall system usage, and the yellow patterndepicts the Norton-specific usage. The gray blocks thatare labeled as Idle indicate the idle period of yourcomputer. The gray blocks include the period whenyour computer is in shutdown, sleep, or log out state.

The graphs show a default performance time of 90minutes. However, you can use the Zoom options todefine a region of the graph that you are interested toview. You can select a Zoom option to obtain magnifiedview or historical data of the graphs. For example, ifyou select the 10min option, Norton AntiVirus displaysthe magnified view of CPU graph or memory graph forthe last 10 minutes. If you select the 1D option, NortonAntiVirus displays a historical data of the last one day.

When you click at any point on the CPU graph ormemory graph, Norton AntiVirus displays a list of the

Monitoring your system's performanceAbout System Insight

88

Page 89: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

processes that consume maximum resources at thatpoint. It also displays the percentage of usage for eachprocess. You can click a process that is available in thelist to get more information in the FileInsight window.

The File Insight window provides information aboutthe process such as:

1 The file name, version number, digital signature,the date on which the process was installed.

1 The date on which the process was last used andwhether it is a startup file.

1 The stability details.

1 The confidence level.

1 The resource usage details.

1 The actions that the process performs on yoursystem.

In addition, the File Insight window displays the CPUgraph and the resource usage details for the runningprocesses. The graph shows the breakdown of overallsystem CPU usage and the CPU usage by the process.

Viewing the CPU graph and memory graph

Norton AntiVirus monitors the overall system CPUusage and memory usage and the Norton-specific CPUusage and memory usage. The CPU tab and theMemory tab at the top of the Performance graphdisplay the CPU graph and the memory graphrespectively.

The Zoom options provide you the magnified view ofthe CPU graph and memory graph. For example, if youselect the 10min option, Norton AntiVirus displays themagnified view of CPU graph or memory graph for thelast 10 minutes. If you select the 1W option, NortonAntiVirus displays the CPU graph and memory graphfor the last one week.

w By default, the graphs display performance time forthe last 90 minutes.

89Monitoring your system's performanceAbout System Insight

Page 90: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To view CPU graph and memory graph

1 In the Norton AntiVirus main window, clickPerformance.

2 In the Performance window, do one of the following:

1 To view the CPU graph, click the CPU tab.

1 To view the memory graph, click the Memorytab.

1 To magnify or shrink the graph, click 10min,30min, 1D, 1W, or 1M next to the Zoom option.

Obtaining historical data of your CPU and memory usage

The Zoom options also provide you the historical dataof the CPU graph and memory graph. For example, ifyou select the 1D option, Norton AntiVirus displaysthe data of CPU graph or memory graph for the lastone day.

To view historical data of your CPU or memory usage

1 In the Norton AntiVirus main window, clickPerformance.

2 In the Performance window, do one of the following:

1 To view the CPU graph, click the CPU tab.

1 To view the memory graph, click the Memorytab.

3 Do one of the following:

1 To obtain historical data for the last one day,click 1D.

1 To obtain historical data for the last one week,click 1W.

1 To obtain historical data for the last one month,click 1M.

Identifying resource-consuming processes

You can click at any point on the CPU graph or memorygraph to obtain a list of top three processes thatconsume maximum resources of your computer at that

Monitoring your system's performanceAbout System Insight

90

Page 91: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

point. You can click a process that is available in thelist to get more information about the process in theFile Insight window.

To identify resource-consuming processes

1 In the Norton AntiVirus main window, clickPerformance.

2 In the Performance window, do one of the following:

1 To view the CPU graph, click the CPU tab.

1 To view the memory graph, click the Memorytab.

3 Click at any point on the graph to obtain a list ofresource-consuming processes.

4 Click the name of a process to obtain additionalinformation about the process in the File Insightwindow.

About optimizationThe data storage space on a disk is divided into discreteunits. These units are called clusters. When files arewritten to the disk, they are broken up intocluster-sized pieces. When all of the file pieces arelocated in adjacent or contiguous clusters, the file canbe accessed quickly.

Your computer’s hard disk stores all of your files,applications, and the Windows operating system. Thebits of information that make up your files graduallyspread over the disk. This process is known asfragmentation. The more that you use your computer,the more fragmented the hard disk gets.

When a fragmented file is accessed, the diskperformance is slower. The performance is slowerbecause the drive head locates, loads, saves, and keepstrack of all of the fragments of the file. If free space isalso fragmented, the drive head might have to trackadequate free space to store temporary files or newlyadded files.

91Monitoring your system's performanceAbout System Insight

Page 92: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Optimization rearranges file fragments into adjacentor contiguous clusters. When the drive head accessesall of the file data in one location, the file is read intothe memory faster. Optimization also maximizes theusable free space on a disk by grouping most frequentlyused files and infrequently used files. Optimizationconsolidates free space to avoid fragmenting newlyadded files. It adds extra space after major datastructures so that they can grow without immediatelybecoming fragmented again.

You can optimize your boot volume manually by usingthe Optimize option in the Performance window.

You can also configure Norton AntiVirus to defragmentyour boot volume or the local disk that contains bootvolume when your computer is idle. Norton AntiVirusautomatically schedules the optimization when itdetects the installation of an application on yourcomputer. The optimization process starts next timewhen your computer is idle.

You can use the IdleTimeOptimizer option to optimizethe boot volume during the idle time. To access theIdleTimeOptimizer option, go to the Norton AntiVirusmain window, and then click Settings > General >Norton Tasks > Idle Time Optimizer.

Optimizing your boot volume

The Optimize option lets you optimize your bootvolume to improve the boot time of your computer.Optimization of your boot volume maximizes the usablefree space by rearranging file fragments into adjacentand contiguous clusters. When the drive head of yourhard disk accesses all of the file data in one location,the file is read into the memory faster.

When you use the Optimize option in Windows XP,Norton AntiVirus optimizes only the boot volume (forexample, C:\Windows). Therefore, it requires less timeto complete optimization. However, when you use theOptimize option in Windows Vista, Windows 7, orWindows 8, Norton AntiVirus optimizes the drive that

Monitoring your system's performanceAbout System Insight

92

Page 93: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

contains the boot volume. Therefore, it requires moretime to complete optimization.

You can access the Optimize option at the top of thesecurity status graph in the Performance window. Youcan also optimize your boot volume using the InsightOptimizer option in the Norton Tasks window. TheInsightOptimizer row in the background jobs list thatis available in the Norton Tasks window displays thedetails of the boot volume optimization process. Youcan view details such as timestamp, duration, andstatus of the background job.

To optimize your boot volume from the Performancewindow

1 In the Norton AntiVirus main window, clickPerformance.

2 In the Performance window, at the top of thesecurity status graph, click Optimize.

To optimize your boot volume from the Norton Taskswindow

1 In the Norton AntiVirus main window, clickPerformance.

2 In the Performance window, click Norton Tasks.

3 In the Norton Tasks window, under the NortonTasks column, click the play icon that appearsbefore Insight Optimizer.

About the Idle Time Optimizer

Idle Time Optimizer lets you configure NortonAntiVirus to defragment your boot volume or the localdisk that contains boot volume when your computeris idle. Norton AntiVirus automatically schedules theoptimization when it detects the installation of anapplication on your computer and your computer isidle. If you start using your computer again, NortonAntiVirus stops the optimization task, and startsoptimizing the next time that your computer is idle.This way, the background job of optimization does notaffect the performance of your computer.

93Monitoring your system's performanceAbout System Insight

Page 94: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Optimization rearranges file fragments into adjacentor contiguous clusters in the hard disk. It improves thecomputer performance by reading the files into thememory faster. Optimization also maximizes the usablefree space on a disk by grouping most frequently usedfiles and infrequently used files. In addition, itconsolidates free space to avoid fragmenting newlyadded files.

You can use the IdleTimeOptimizer option to optimizethe boot volume during the idle time. To access theIdleTimeOptimizer option, go to the Norton AntiVirusmain window, and then click Settings > General >Norton Tasks > Idle Time Optimizer.

Turning off or turning on Idle Time Optimizer

Norton AntiVirus automatically schedules theoptimization when it detects the installation of a newapplication on your computer. Norton AntiVirus runsthis optimization only when your computer is idle.

You can use the IdleTimeOptimizer option to optimizethe boot volume during idle time. By default, this optionis turned on.

To turn off Idle Time Optimizer

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Norton Tasks.

4 In the Idle Time Optimizer row, move the On/Offswitch to the right to the Off position.

5 Click Apply, and then click OK.

To turn on Idle Time Optimizer

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Norton Tasks.

Monitoring your system's performanceAbout System Insight

94

Page 95: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

4 In the Idle Time Optimizer row, move the On/Offswitch to the left to the On position.

5 Click Apply, and then click OK.

About the Norton TasksThe NortonTasks window provides an interface whereyou can view and monitor all Norton-specificbackground tasks. Norton AntiVirus runs most of thebackground tasks when your computer is idle. TheNorton Tasks window provides the details of thebackground tasks that Norton AntiVirus performs.

The details include:

1 The name of the Norton task

You can use the icon that appears before the nameof a background job to start or stop a backgroundtask. You can start or stop a background task at anytime.

1 The timestamp of the Norton task

You can view details such as the date on which thebackground job last ran and the time. These detailshelp you decide whether to start a background taskor wait for Norton AntiVirus to run the job duringidle time.

1 The duration of the Norton task

You can view the length of time that a Norton taskran the last time. The details also help youdetermine the length of time a background tasktakes to complete if you start it.

1 The background task has run during idle time ornot

This detail helps you determine if a task has alreadyrun during idle time or you should run it.

1 The status of the Norton task

You can view details about the completion of thetask.

1 The power source that the Norton Task uses.

95Monitoring your system's performanceAbout System Insight

Page 96: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

You can specify the type of power source that eachof the Norton Tasks uses. Use the Configure linkthat is available next to the power source icon toconfigure the power source for the Norton Tasks.

The Norton Tasks window lets you monitor thefollowing Norton-specific tasks:

Automatic LiveUpdateautomatically checks fordefinition updates andprogram updates when yourcomputer is connected to theInternet.

By default, AutomaticLiveUpdate checks forupdates every hour.

Automatic LiveUpdate

Scans your entire computerfor viruses, spyware, anddifferent securityvulnerabilities.

Full System Scan

Optimizes the boot volume ofyour computer.

Insight Optimizer

Norton Community Watchprotects your computeragainst potential risks. Itcollects the informationabout new security threatsfrom your computer andsubmits the information toSymantec for analysis.Symantec assesses the datato identify the new threatsand resolves it.

Norton Community Watch

Monitoring your system's performanceAbout System Insight

96

Page 97: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Allows the smart scanning offiles on your computer. Itimproves the performance ofNorton AntiVirus scans byletting you scan fewer fileswithout compromising thesecurity of your computer.

Norton Insight lets you checkthe details of the Files ofInterest that are available onyour computer. You can viewdetails such as signature ofthe file and the date on whichthe file was installed. You canalso view details such as thetrust level, community usage,resource usage, and thesource of the file.

Norton Insight

Pulse Updates check fordefinition updates every fiveminutes and downloads thestreamed virus definitions.Pulse Updates provide theupdates during the fullupdates, which LiveUpdatedownloads automaticallyevery few hours. Alwaysensure that the PulseUpdates option is turned on.It protects you from the latestthreats withoutcompromising your systemperformance or disruptingyour online experience.

Pulse Updates

97Monitoring your system's performanceAbout System Insight

Page 98: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Scans the important locationsof your computer that theviruses and other securitythreats often target.

Quick Scan takes less time toscan than a Full System Scanbecause this scan does notscan your entire computer.

Quick Scan

The following grayed out categories of jobs run in thebackground to improve your system performance andprotection. You can only view the last run details forthe following activities.

Performs backgroundmaintenance tasks related tolicensing.

Licensing Maintenance

Performs backgroundmaintenance tasks related toNorton Insight. Tasks includemaintaining details about thestability and trust level offiles in your computer.

Insight Maintenance

Performs backgroundmaintenance tasks related toNorton AntiVirus. Tasksinclude clearing install logsand rescanning consolidatedfirewall rule.

Product Maintenance

You can also manually turn on Silent Mode for aspecified duration.

Monitoring background jobs of Norton AntiVirus

The Norton Tasks window provides the details of thebackground tasks that Norton AntiVirus performs and

Monitoring your system's performanceAbout System Insight

98

Page 99: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

lets you view and monitor the background tasks. NortonAntiVirus runs most of the background tasks whenyour computer is idle. Performing all background taskswhen your computer is idle helps your computer to runat peak efficiency when you use your computer.However, you can manually start or stop a task at anytime. You can also specify the IdleTimeOut duration.After the Idle Time Out duration is reached, NortonAntiVirus identifies the computer as idle and run thebackground tasks. You can use the Idle Countdownbar to confirm the idle state of your computer. You canalso view the CPU graph and memory graph to obtainthe performance data of your computer.

To monitor background jobs

1 In the Norton AntiVirus main window, clickPerformance.

2 In the Performance window, click Norton Tasks.

3 In the Norton Tasks window, view the details ofbackground jobs.

4 Do one of the following:

1 To run a background job, click the play icon thatappears before the name of the background job.

1 To stop a running background job, click the stopicon that appears before the name of thebackground job.

5 Click Close.

About Power Source

You can choose the power source for Norton AntiVirusto perform the Norton Tasks when the computer is idle.Norton Tasks are background tasks that NortonAntiVirus performs when your computer is idle. NortonTasks include Quick Scan, Automatic LiveUpdate,Norton Community Watch, Norton Insight, Full SystemScan, Insight Optimizer, and Pulse Updates. NortonAntiVirus consumes more power when it runs NortonTasks.

99Monitoring your system's performanceAbout System Insight

Page 100: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

By default, Norton AntiVirus performs these tasks onlywhen your computer is connected to the externalpower. For example, if you are in an airport, and yourcomputer is running on battery power, NortonAntiVirus does not perform the Norton Tasks. In thisway, you can extend the battery power of yourcomputer. However, you can choose the power sourcefor Norton AntiVirus to perform the Norton Tasks.

You can select one of the following options:

Allows the Norton Tasks torun only when your computeruses external power.

If you choose this option,Norton AntiVirus performsthe Norton Tasks when thecomputer is idle andconnected to external power.

External

Allows the Norton Tasks torun irrespective if thecomputer uses externalpower or battery power.

If you choose this option,Norton AntiVirus performsthe Norton Tasks when thecomputer is idle. It does notconsider the type of powersource the computer uses.

External and Battery

You can configure the power source for each of theNorton Tasks.

Configuring the Power Source

You can choose the power source for Norton AntiVirusto perform the Norton Tasks when the computer is idle.Norton Tasks are background tasks that NortonAntiVirus performs when your computer is idle.

Monitoring your system's performanceAbout System Insight

100

Page 101: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

By default, Norton AntiVirus performs these tasks onlywhen your computer is connected to the externalpower. You can configure the power source for each ofthe Norton Tasks.

To configure the power source

1 In the Norton AntiVirus main window, clickPerformance.

2 In the Performance window, in the left pane, clickNorton Tasks.

3 In the Norton Tasks window, under the PowerSource column, click the Configure link for theNorton Task that you want to configure the powersource.

4 In the Power Source window, select one of thefollowing:

1 ExternalAllows the Norton Task to run only when yourcomputer uses external power.

1 External and BatteryAllows the Norton Task to run irrespective if thecomputer uses external power or battery power.

If you choose this option, Norton AntiVirusperforms the Norton Task when the computeris idle. It does not consider the type of powersource the computer uses.

5 Click OK.

6 In the Norton Tasks window, click Close.

About Norton InsightNorton Insight allows the smart scanning of files onyour computer. It improves the performance of NortonAntiVirus scans by letting you scan fewer files withoutcompromising the security of your computer.

101Monitoring your system's performanceAbout System Insight

Page 102: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

A Norton AntiVirus scan can identify threats on yourcomputer in the following ways:

At regular intervals, NortonAntiVirus obtains definitionupdates from Symantec. Theseupdates contain signatures ofknown threats. Each time whenNorton AntiVirus obtains thedefinition updates, it performsa scan of all of the files that areavailable on your computer. Itcompares the signature of thefiles against the known threatsignatures to identify threats onyour computer.

The Blacklist technique

Monitoring your system's performanceAbout System Insight

102

Page 103: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Norton AntiVirus obtains specificinformation about the Files ofInterest and submits theinformation to Symantec duringidle time. The informationincludes things such as filename, file size, and hash key.Symantec analyzes theinformation of each File ofInterest and its unique hashvalue and provides a confidencelevel to the file. The Symantecserver stores the hash value andconfidence level details of theFiles of Interest. The serverprovides the details immediatelyafter you open the NortonInsight - Application Ratingswindow. Even the slightestmodification of the file causes achange in the hash value and theconfidence level of the file.Typically, most Files of Interestbelong to the operating systemor known applications, and theynever change. These files do notrequire repeated scanning ormonitoring. For example,Excel.exe is a file that neverchanges but you always scan itduring a normal security scan.

The Whitelist technique

103Monitoring your system's performanceAbout System Insight

Page 104: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Symantec assigns the following confidence levels toFiles of Interest:

Symantec analyzes the file astrusted based on the statisticalevaluation that is done on thefiles that are available within theNorton Community.

If the file has three green bars,Symantec rates the file asNorton Trusted.

The files that have three greenbars display a Norton Trustedpop-up text when you move themouse pointer over the greenbars.

Trusted

Symantec analyzes the file asgood based on the statisticalevaluation that is done on thefiles that are available within theNorton Community.

Symantec rates the trusted filesas follows:

1 If the file has two green bars,Symantec rates the file asGood.

1 If the file has one green bar,Symantec rates the file asFavorable.

Good

Symantec does not have enoughinformation about the file toassign a trust level to the file.

Unproven

Symantec has only a fewindications that the file is nottrusted.

Poor

Monitoring your system's performanceAbout System Insight

104

Page 105: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Norton AntiVirus also provides different profiles toconfigure your scan performance. When you use theFullScan profile, Norton AntiVirus follows the Blacklisttechnique to scan your computer. It scans all of thefiles on your computer against the signatures that itobtained during definition updates. When you use theStandardTrust or HighTrust profile, Norton AntiVirusfollows the Whitelist technique to scan the files basedon their confidence level. This way, Norton AntiVirussignificantly reduces the time that is required to scanyour computer completely for security threats.

The Whitelist technique that Norton Insight uses alsohelps in heuristic detection of suspicious applications.Normally, the execution behavior of well-knownapplications appears identical to the execution behaviorof unknown applications. Such behavior results in falseidentification of good applications as suspicious, andtherefore, necessitates security applications tomaintain a low heuristic detection threshold. However,keeping a low detection threshold does not provide acomplete heuristic protection against maliciousapplications. Norton AntiVirus uses the Whitelisttechnique that helps maintain a high heuristicdetection threshold. It excludes well-knownapplications from heuristic detection to prevent falsedetection of well-known applications and to ensure ahigh detection rate of malicious applications.

Viewing the files using Norton Insight

Norton Insight provides information about the Files ofInterest that are available on your computer. NortonAntiVirus lets you view specific categories of files basedon the option that you select in the Norton Insight -Application Ratings window.

105Monitoring your system's performanceAbout System Insight

Page 106: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

The drop-down list that is available in the NortonInsight - Application Ratings window provides youthe following options:

Lists the processes that runon your computer at thatpoint in time when youselected this option.

All Running Processes

Lists the Files of Interest.All Files

Lists the programs that startwhen you start yourcomputer.

Startup Items

Lists all the files andprograms that are currentlyloaded on to the programmemory space.

All Loaded Modules

Lists the programs thatconsumemaximumresourcesof your computer.

Norton AntiVirus displays alist of top 10 resources thathighly affect the performanceof your computer.

Highest Performance Impact

Lists the files that have themaximum community usage.

Highest Community Usage

Monitoring your system's performanceAbout System Insight

106

Page 107: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Lists the Files of Interest thatyou manually trusted in theFile Insight window.

This category does not listthe files that do not belongto the File of Interest even ifyou manually trust the files.However, Norton AntiVirusexcludes all of the manuallytrusted files from NortonAntiVirus scan when youconfigureScanPerformanceProfiles to High Trust.

You can also remove the usertrust from all of the Files ofInterest that you manuallytrusted. You can use theClear All User Trust optionnext to the drop-down list toremove the user trust.

User Trusted Files

Lists the files that are notNorton Trusted.

You can manually trust all thefiles that are not trusted byclicking the Trust All Filesoption next to the drop-downlist.

Untrusted Files

You can view file details such as file name, trust level,community usage, resource usage, and the stabilityrating. There may be instances when the trust level ofa file has changed or a process running might havestopped running. You can refresh the Norton Insight- Application Ratings window to update the file listand file details. The coverage meter provides agraphical representation of the percentage of theNorton Trusted Files and the total Files of Interest. Thehigher the percentage, the lesser time the scan takes.

107Monitoring your system's performanceAbout System Insight

Page 108: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To view the files using Norton Insight

1 In the Norton AntiVirus main window, clickAdvanced.

2 In the ComputerProtection pane, click ApplicationRatings.

3 In the Norton Insight - Application Ratingswindow, select an option from the Show drop-downlist to view a category of files.You may need to scroll the window to view all thefiles that are listed in the details area.

4 Click Close.

To refresh the list of files

4 In the Norton Insight - Application Ratingswindow, at the top of the file icon, click the refreshicon.

Checking the trust level of a file

Norton Insight lets you check the details of the Filesof Interest that are available on your computer. Youcan view details such as signature of the file and thedate on which the file was installed. You can also viewdetails such as the trust level, stability details,community usage, resource usage, and the source ofthe file. You can use the Locate option to find thelocation of the file on your computer. When youright-click a file that is available on your computer, theshortcut menu displays NortonAntiVirus option andthen Norton File Insight option. You can use theoptions to check the details of a File of Interest.

w Norton AntiVirus displays the Norton File Insightoption only when you right-click a File of Interest. InWindows Safe mode, you cannot access this option forany file. Norton AntiVirus also categorizes any file forwhich you open the FileInsight window to view detailsas a File of Interest.

The Symantec server stores the hash value and trustlevel details of the File of Interest. The server providesthe file details immediately after you open the Norton

Monitoring your system's performanceAbout System Insight

108

Page 109: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Insight - Application Ratings window. However, youcan use theCheckTrustNow option in the FileInsightwindow to update the trust value of a file. You can alsomanually trust any well-known files. You can changethe trust level of any file to User Trusted other thanthe files that are Norton Trusted.

You can determine the resource usage of a file that isavailable on your computer. The File Insight windowdisplays the CPU graph and the system resource usagedetails for the running processes. The graph shows thebreakdown of overall system CPU usage and the CPUusage or memory usage by the process.

To check the trust level of a file

1 In the Norton AntiVirus main window, clickAdvanced.

2 In the window that appears, in the ComputerProtection pane, click Application Ratings.

3 In the Norton Insight - Application Ratingswindow, click a file for which you want to check thedetails.

4 In the File Insight window, view the details of thefile.

5 In the File Insight window, click Close.

To check the trust level of a specific file

1 In the Norton AntiVirus main window, clickAdvanced.

2 In the window that appears, in the ComputerProtection pane, click Application Ratings.

3 In the Norton Insight - Application Ratingswindow, click Check a Specific File.

4 Browse to the location of the file for which you wantto check the details.

5 Select the file, and then click Open.

6 In the File Insight window, view the details of thefile.

7 In the File Insight window, click Close.

109Monitoring your system's performanceAbout System Insight

Page 110: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To find the location of the file

4 In the File Insight window, click Locate.

To refresh the trust level of the file

4 In the File Insight window, click CheckTrustNow.

To manually trust the file

4 In the File Insight window, in the Details tab, clickTrust Now.You can manually trust the files that are poor,unproven, or not Norton trusted.

To determine the resource usage of a running process

1 In the File Insight window, in the left pane, clickActivity.

2 In the Show drop-down list, do one of the following:

1 Select Performance to view the performancegraph of the process.

1 Select Performance Alert to view theperformance alert-related details of the process.

1 Select Network to view the network activitiesof the process.

1 Select Run Key change to include registrychanges.

Configuring the Scan Performance Profiles

The Scan Performance Profiles settings let youconfigure how Norton AntiVirus should scan yourcomputer based on the digital signature and confidencelevel of the files. To make Norton AntiVirus scanslighter, faster, and more effective, you can excludefrom scans the files that have known digital signaturesor high confidence levels.

You can configure the Scan Performance Profilessettings to do the following:

1 Configure to Full Scan to perform a complete scanof your computer.

Monitoring your system's performanceAbout System Insight

110

Page 111: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

The complete scan includes a scan of all files onyour computer irrespective of the confidence levelor digital signature of the files.

1 Configure to StandardTrust to perform a scan thatexcludes the files that are Norton Trusted.

Norton AntiVirus scans the files that have aconfidence level other than Norton Trusted.

1 Configure to High Trust to perform a scan thatexcludes the files that have known digital signaturesor high confidence levels.

Norton AntiVirus does not scan the files that haveconfidence level as Norton Trusted or User Trusted.It also excludes the Good files with high confidencelevel from the scan. It scans the files withconfidence levels as Poor Trust, Unproven Trust,Bad Trust, and the files without a class 3 digitalsignature.

You must configure the Scan Performance Profilessettings before you run a scan or before a scan isscheduled to run. Norton AntiVirus scans yourcomputer according to the configuration you specifiedin the Scan Performance Profiles settings.

To configure Scan Performance Profiles from theSettings window

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, in the left pane, clickComputer Scan.

3 In the ScanPerformanceProfiles row, click on oneof the settings. Your options are:

1 Full Scan

1 Standard Trust

1 High Trust

4 Click Apply, and then click OK.

111Monitoring your system's performanceAbout System Insight

Page 112: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To configure ScanPerformanceProfiles from theNortonInsight - Application Ratings window

1 In the Norton AntiVirus main window, clickAdvanced.

2 In the window that appears, in the ComputerProtection pane, click Application Ratings.

3 In the Norton Insight - Application Ratingswindow, move the ScanPerformanceProfiles sliderto one of the settings. Your options are:

1 Full Scan

1 Standard Trust

1 High Trust

4 Click Close.

About Monthly ReportMonthly Report lets you view a summary of whatNorton AntiVirus has done for you. Norton AntiVirusdisplays the monthly report every 30 days after youinstall your product. After 30 days of installation,Norton AntiVirus displays the Monthly Reportautomatically. If you do not want Norton AntiVirus todisplay the Monthly Report automatically, you canselect the Do not display monthly reportsautomatically option in the Norton Monthly Reportwindow.

To turn on the Monthly Report option, go to theNorton AntiVirus main window, and then click Settings> General > Other Settings > Monthly Report > On.The NortonMonthlyReport window displays the Tipof the month to recommend some of the product'sfeatures and services.

When your product expires after the trial period,Monthly Report displays the activation status of yourproduct. However, when your product expires after thesubscription period, Monthly Report displays thesubscription status of your product.

Monitoring your system's performanceAbout System Insight

112

Page 113: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Norton AntiVirus provides reports based on thefollowing categories:

Lets you view the details of thevarious attacks your computeris protected from.

For example, you can view thetotal number of viruses andspyware from which you areprotected.

Computer

Lets you view the various typesof Internet attacks from whichyou are protected.

For example, you can view thetotal number of intrusionattempts that are blocked.

Network

Monthly Report lets you view the latest news onInternet security and also provides information on howto stay safe while you are online. You can click ReadMore in the Norton Monthly Report window to viewmore information on how to stay safe online.

Viewing the Monthly Report

The Monthly Report provides you with the statisticsthat are up to date. At a glance, you can see whatNorton AntiVirus has done for you since installation.

To view the Monthly Report

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Other Settings.

4 In the Monthly Report row, click View Report.

5 View the report and close the window.

113Monitoring your system's performanceAbout System Insight

Page 114: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Monitoring your system's performanceAbout System Insight

114

Page 115: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

This chapter includes the following topics:

1 About maintaining protection

1 About the Norton AntiVirus scans

About maintaining protectionAfter you have installed your product and runLiveUpdate, you have complete protection from virusesand other security risks. However, new security risksare a constant threat. Security risks can spread whenyou start your computer from an infected disk or whenyou run an infected program. You can do several thingsto avoid security risks.

Practicing regular file maintenance and keeping yoursecurity protection up to date helps in protecting yourcomputer.

To avoid security risks:

1 Stay informed about the latest viruses and othersecurity risks by logging in to the SymantecSecurity Response Web site at the following URL:

http://securityresponse.symantec.com

The Web site includes extensive, frequently updatedinformation on viruses and automatic virusprotection.

1 Keep AutomaticLiveUpdate turned on at all timesto continually receive definition updates.

3Protecting yourfiles and data

Page 116: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

1 Run LiveUpdate regularly to receive new programupdates.

1 Keep Auto-Protect turned on at all times to preventviruses from infecting your computer.

1 Watch for email messages from unknown senders.Do not open attachments from these senders.

1 Keep Email Protection turned on to avoid sendingor receiving infected email attachments.

1 Keep all recommended maximum protectionsettings turned on.

1 Keep the default options turned on at all times.

You should be always prepared in case a virus infectsyour computer.

Ensuring that protection settings are turned onNorton AntiVirus is configured to provide yourcomputer with complete protection against viruses.

In addition, Norton AntiVirus protects your computeragainst spyware, adware, and other security risks.

The default settings provide complete protection foryour computer. However, you should ensure that yourprotection features are turned on for maximumprotection.

To ensure that protection settings are turned on

1 In the Norton AntiVirus main window, clickSettings.

Protecting your files and dataAbout maintaining protection

116

Page 117: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

2 In the Settings window, in the Computer tab, movethe On/Off switch to the left to the On position forthe following settings:

Computer Scan providesthe following options:

Computer Scan

1 Compressed FilesScan

1 Microsoft OfficeAutomatic Scan

1 Rootkits and StealthItems Scan

1 Network Drives Scan

Real Time Protectionprovides the followingoptions:

Real Time Protection

1 Antispyware

1 Auto-Protect

1 Caching

1 Removable MediaScan

1 SONAR Protection

Updates provides thefollowing options:

Updates

1 AutomaticLiveUpdate

1 Pulse Updates

1 Smart Definitions

1 Apply update onreboot

3 In the Settings window, click the Network tab.

4 In the Intrusion Prevention section, in theIntrusionPrevention row, move the On/Off switchto the left to the On position.

117Protecting your files and dataAbout maintaining protection

Page 118: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

5 In the MessageProtection section, move the On/Offswitch to the left to the On position, click Configure,and check all options for the following features:

Email Antivirus Scan providesthe following options:

Email Antivirus Scan

1 Scan incoming emailmessages

1 Scan outgoing emailmessages

1 Scan outgoingmessages forsuspected worms

1 Protect against timeouts

1 Display progress indicator

You should configure any newinstant messenger programsthat you installed after youinstalled Norton AntiVirus.

Instant Messenger Scan

1 Select the instant messengerclients that you want toprotect.

6 In the Settings window, click the General tab.

7 In the left pane, click Other Settings.

8 In the Insight Protection row, move the On/Offswitch to the left to the On position.

9 Click Apply, and then click OK.

About the Norton AntiVirus scansNorton AntiVirus scans secure your computer from alltypes of viruses and unknown threats using the latestvirus definitions. It also scans all the Internet activitiesthat are performed on your computer to protect yourcomputer from the Internet-based threats that exploitsoftware vulnerabilities.

Protecting your files and dataAbout the Norton AntiVirus scans

118

Page 119: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Norton AntiVirus automatically performs differenttypes of scans to secure your computer from latestthreats. It also lets you run different types of scansmanually to secure your computer.

By using Norton AntiVirus, you can run the followingtypes of scans:

Computer Scan uses the latestvirus definitions that areavailable locally in the computer.

If you suspect that yourcomputer is infected, you canrun three types of computerscans manually to prevent virusinfections on your computer. Thethree types of scans that areavailable under Computer Scanare Quick Scan, Full SystemScan, and Custom Scan.

Computer Scan

Insight Network Scan uses thevirus definitions that areavailable locally and hosted inthe Cloud. InsightNetwork Scandetects the files that aresuspicious or vulnerable on yourcomputer using thereputation-based threatdetection. Norton AntiVirusperforms an Insight NetworkScan only when the InsightProtection option is turned on.By default, the InsightProtection option is turned on.

To turn on the InsightProtection option, go to theNorton AntiVirus main window,and then click Settings >General > Other Settings >Insight Protection > On.

Insight Network Scan

119Protecting your files and dataAbout the Norton AntiVirus scans

Page 120: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Reputation Scan displays thereputation information of thefiles on your computer. Itdisplays the reputationinformation such as trust level,prevalence, stability rating, andresource usage. ReputationScan displays the detailedreputation information of thegood files and the number of badfiles that have been detected orremoved.

Reputation Scan also internallyperforms Computer Scan andInsight Network Scan to detectthe threats. The different typesof scans that are available underReputation Scan areQuick Scan,Full System Scan, and CustomScan.

w Norton AntiVirusReputation Scan is applicableonly for the executable files andthe installer files.

Reputation Scan

Protecting your files and dataAbout the Norton AntiVirus scans

120

Page 121: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Scan Facebook Wall lets youscan the links and URLs that areavailable on your Facebookprofile.

When you click the ScanFacebook Wall option, NortonAntiVirus takes you to theFacebook login Web page. Afteryou log in to your Facebookprofile, Norton Safe Web asksyou to grant permission toaccess your Facebook wall. Todo so, use the grant uspermission to access yourstream option available on theFacebook Web page, and thenfollow the on-screeninstructions. After you grantpermission, Norton safe Webscans all the available links onyour Facebook wall each timeyou use Scan Facebook Walloption. It then displays thesecurity status of the scannedURLs.

Scan Facebook Wall

Norton AntiVirus keeps your computer secure fromlatest threats by automatically running Full SystemScan when your computer is in the idle state.

Norton AntiVirus provides options to configure NortonAntiVirus scans. The computer settings and some ofthe options in the network settings let you configurehow you want Norton AntiVirus to scan your computerfor viruses and other security threats. You can clickthe Settings link available in the Norton AntiVirusmain window and view the options that are availableunder the Computer tab and Network tab.

121Protecting your files and dataAbout the Norton AntiVirus scans

Page 122: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Accessing Norton AntiVirus scansYou can use Norton AntiVirus scans to secure yourcomputer from all types of viruses and unknownthreats.

You can access Full System Scan and custom scansfrom the Norton AntiVirus main window. You canaccess Quick Scan from the Norton AntiVirus mainwindow or the Norton AntiVirus icon on the taskbar.

You can also scan any particular folder using thecontext scan feature. The context menu scan isavailable when you right-click the folder that you wantto scan.

If the InsightProtection option is turned on, when youright-click a file, the shortcut menu displays NortonAntiVirus and then InsightNetworkScan. You can usethis command to scan a file using both the localdefinitions and the definitions that are hosted in theCloud.

You can also run the Reputation Scan to view thereputation information of the files.

To access the scan from the Norton AntiVirus mainwindow

1 In the Norton AntiVirus main window, clickAdvanced.

2 In Computer Protection pane, click Scan Now.

3 In the window that appears, do one of the following:

1 In the Computer Scan pane, click the scan thatyou want to run.

1 Click Reputation Scan, and then click the scanthat you want to run.

1 Click ScanFacebookWall to scan the links thatare available on your Facebook wall.

Protecting your files and dataAbout the Norton AntiVirus scans

122

Page 123: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To access the scan from the notification area

4 In the notification area on the taskbar, right-clickthe Norton AntiVirus icon, and then click RunQuickScan.By default, Insight Protection option is turned on.In this case, Norton AntiVirus performs an InsightNetwork Quick Scan simultaneously with atraditional Quick Scan.

To scan a particular folder

4 Right-click the folder, and click Norton AntiVirus> Scan Now.

To scan a particular file

4 Right-click the file, and click Norton AntiVirus >Insight Network Scan.The Insight Network Scan option is available onlyif the Insight Protection option is turned on. Toaccess the Insight Protection option, go to theNorton AntiVirus main window, and then clickSettings > General > Other Settings > InsightProtection.

About Computer ScanNorton AntiVirus automatically downloads latest virusdefinition regularly and secures your computer fromall types of viruses and unknown threats. When NortonAntiVirus performs a Computer Scan, it uses the latestvirus definitions that Symantec provides.

The threat detections that are based on the localdefinition are specified with a specific name. Forexample, if a Trojan horse is detected, the scan resultsof the Computer Scan displays the threat as Trojan.Foo.You can click the Scan Now option available in theNorton AntiVirus main window to access the differenttypes of computer scans.

If you suspect that your computer is infected, you canrun three types of computer scans manually to preventvirus infections on your computer.

123Protecting your files and dataAbout the Norton AntiVirus scans

Page 124: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

You can run the following types of computer scans:

Scans the important locations ofyour computer that the virusesand other security threats oftentarget.

Quick Scan takes less time toscan than a Full System Scanbecause this scan does not scanyour entire computer.

Quick Scan

Scans your computer for alltypes of viruses and securitythreats.

Full System Scan performs adeep scan of your computer toremove viruses and othersecurity threats. It checks allboot records, files, and runningprocesses to which the user hasaccess. Consequently, when yourun a Full System Scan withadministrator privileges, it scansmore files than when you run itwithout administrator privileges.

Norton AntiVirus automaticallyruns a Full System Scan whenyour computer is in idle state.

w Full System Scan scans allthe local drives, mapped networkdrives, and removable drivesexcept floppy drives. You canalso minimize and run a FullSystem Scan in the background.

Full System Scan

Scans a specific file, folder,drive, or removable drive thatyou choose.

Custom Scan

Protecting your files and dataAbout the Norton AntiVirus scans

124

Page 125: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Computer Scan provides details about the scanneditems. You can view the details such as total numberof files scanned, security risks detected, security risksresolved, and the total items that require attention. Italso provides you the different ways to resolve anyitems that were not automatically resolved during thescan. You can also view the severity of the risk, thename of the risk, and the status of the risk about theresolved items.

Running a Full System Scan

Full System Scan performs a deep scan of the systemto remove viruses and other security threats. It checksall boot records, files, and running processes to whichthe user has access. Consequently, when you run a FullSystem Scan with administrator privileges, it scansmore files than when you run it without administratorprivileges.

w You can also minimize and run a Full System Scan inthe background.

To run a Full System Scan

1 In the Norton AntiVirus main window, click ScanNow.

2 In the ComputerScan pane, click FullSystemScan.You can use the following options to suspend a FullSystem Scan:

Suspends a Full System Scantemporarily.

Click Resume to continue thescan.

Pause

Terminates a Full System Scan.

Click Yes to confirm.

Stop

125Protecting your files and dataAbout the Norton AntiVirus scans

Page 126: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

3 On the Results Summary window, do one of thefollowing:

1 If no items require attention, click Finish.

1 If any items require attention, review the riskson the Threats Detected window.

Running a Quick Scan

QuickScan is a fast scan of the areas of your computerthat the viruses and other security risks often target.Because this scan does not scan your entire computer,it takes less time to run than a Full System Scan.

When the Insight Protection option is turned on,Norton AntiVirus simultaneously performs atraditional Quick Scan and an Insight Network QuickScan. By default, the Insight Protection option isturned on.

To run a Quick Scan

1 In the Norton AntiVirus main window, click ScanNow.

2 In the Computer Scan pane, click Quick Scan.You can use the following options to suspend aQuick Scan:

Suspends a Quick Scantemporarily.

Click Resume to continue thescan.

Pause

Terminates a Quick Scan.

Click Yes to confirm.

Stop

3 On the Results Summary window, do one of thefollowing:

1 If no items require attention, click Finish.

1 If any items require attention, review the riskson the Threats Detected window.

Protecting your files and dataAbout the Norton AntiVirus scans

126

Page 127: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Scanning selected drives, folders, or files

Occasionally, you might want to scan a particular file,removable drives, any of your computer's drives, orany folders or files on your computer. For example,when you work with removable media and suspect avirus, you can scan that particular disk. Also, if youhave received a compressed file in an email messageand you suspect a virus, you can scan that individualelement.

To scan individual elements

1 In the Norton AntiVirus main window, click ScanNow.

2 In the Computer Scan pane, click Custom Scan.

3 In the Scans window, do one of the following:

1 To scan specific drives, click Run next to DriveScan, select the drives that you want to scan,and then click Scan.

1 To scan specific folders, click Run next to FolderScan, select the folders that you want to scan,and then click Scan.

1 To scan specific files, click Run next to FileScan,select the files that you want to scan, and thenclick Add.

You can also press Ctrl, and select multiple filesto scan.

You can use the following options to suspend ascan:

Suspends a custom scantemporarily.

Click Resume to continue thescan.

Pause

Terminates the scan.

Click Yes to confirm.

Stop

127Protecting your files and dataAbout the Norton AntiVirus scans

Page 128: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

4 In the Results Summary window, do one of thefollowing:

1 If no items require attention, click Finish.

1 If any items require attention, review them onthe Threats Detected window.

About the Results Summary window

Norton AntiVirus displays the Result Summarywindow when you run a manual scan. At the end of ascan, the Results Summary window provides thesummary of the scan results.

If your most recent scan was a Quick Scan, this windowshows the results of a fast scan of the areas of yourcomputer. Viruses, spyware, and other risks oftentarget these areas.

If your most recent scan was a Full System Scan, thiswindow shows the results of a comprehensive scan ofyour entire computer.

The Result Summary window displays the followinginformation:

1 Total items scanned

1 Total security risks detected

1 Total security risks resolved

1 Total items that require your attention

About the Threats Detected window

Norton AntiVirus displays the Threats Detectedwindow when it detects threats. At the end of a scan,the Threats Detected window provides you differentways to resolve any items that were not automaticallyresolved during the scan.

The ThreatsDetected window provides the informationsuch as the severity of the risk, the name of the risk,and the status of the risk. It also provides the actionthat you can take to resolve the item. The ThreatsDetected window provides you the different options

Protecting your files and dataAbout the Norton AntiVirus scans

128

Page 129: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

such as Fix, Manual Fix, Exclude, Get Help, andRescan to resolve the item.

It also provides the Ignore option only once during thefirst-time detection of low-risk items.

Ignore option is available once until you do not changethe default settings for the Low Risks option underComputer Scan.

The options in the ThreatsDetected window vary basedon the types of files that Norton AntiVirus identifiedas infected during the scan.

About custom scans

You can create a custom scan if you regularly scan aparticular segment of your computer. This custom scanlets you scan the segment frequently without havingto specify it every time. You can also schedule thecustom scan to run automatically on specific dates andtimes or at periodic intervals. You can schedule a scanaccording to your preferences. If the scheduled scanbegins when you use your computer, you can run thescan in the background instead of stopping your work.

You can delete the scan when it is no longer necessary.For example, if you work on a project for which youneed to swap files frequently with others. In this case,you might want to create a folder into which you copyand scan those files before using them. When theproject is done, you can delete the custom scan for thatfolder.

Creating a custom scan

Instead of running the default scans that are listed inthe Scans pane, you can create your own scans thatmeet your specific requirements. For example, you cancreate a scan that checks a folder in which you storeall the downloaded files.

You can create a custom scan in the Scans window.

129Protecting your files and dataAbout the Norton AntiVirus scans

Page 130: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

When you create custom scans, you can also schedulethem to run automatically on specific dates and timesor at periodic intervals.

To create a custom scan

1 In the Norton AntiVirus main window, click ScanNow.

2 In the Computer Scan pane, click Custom Scan.

3 In the Scans window, click Create Scan.

4 In the New Scan window, in the Scan Name box,type a name for the scan.You cannot specify a scan name that is already inuse.

5 On the Scan Items tab, add the items that you wantto scan. See “Selecting the scan items” on page 130.

6 On the Scan Schedule tab, set the frequency andtime at which you want to perform the scan. See“Scheduling a scan” on page 134.

7 On the ScanOptions tab, configure the scan optionsas required. See “Configuring the scan options”on page 131.

8 Click Save.

Selecting the scan items

When you configure a custom scan, you must selectthe items that you want to include in the scan. You caninclude individual files, folders, or drives. You caninclude multiple drives, folders, and files to add to thescan. You can also exclude items from the scan.

w When you select a drive, all the items in the driveincluding the files and folders are automatically addedto the scan. When you select a folder, all of the files infolder are added to the scan.

To select the scan items

1 In the Norton AntiVirus main window, click ScanNow.

2 In the Computer Scan pane, click Custom Scan.

Protecting your files and dataAbout the Norton AntiVirus scans

130

Page 131: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

3 In the Scans window, do one of the following:

1 To add items for a new scan, click Create Scan.

You must provide a name for the scan in theScan Name box.

1 To add items for an existing scan, in the EditScan column, click the edit icon for the scan thatyou want to modify.

4 In the window that appears, on the Scan Items tab,do the following:

1 To add drives, click Add Drives, in the ScanDrives dialog box, select the drives to bescanned, and click Add.

1 To add folders, click Add Folders, in the ScanFolders dialog box, select the folders to bescanned, and click Add.

1 To add files, click AddFiles, in the Files toScandialog box, select the files to be scanned, andthen click Add.

If you need to remove an item from the list, selectthe item, and then click Remove.

5 Click Next.

6 In the Scan Schedule tab, select the scan scheduleas required, and then click Next.

7 In the Scan Options tab, click Save.

Configuring the scan options

Norton AntiVirus lets you configure scan options foreach scan that you create. By default, the scan optionsreflect the current Computer Scan settings in theSettings window. The changes that you make areapplicable to the current scan only. Any change thatis made to the ComputerScan settings in the Settingswindow does not affect the scan options settings forthe current scan.

In addition to the custom scans that you create, youcan configure the scan options for the default scans.

131Protecting your files and dataAbout the Norton AntiVirus scans

Page 132: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

You can configure scan options for Full System Scan,Quick Scan, Drive Scan, Folder Scan, and File Scan.

To configure the scan options

1 In the Norton AntiVirus main window, click ScanNow.

2 In the Computer Scan pane, click Custom Scan.

3 In the Scans window, in the EditScan column, clickthe edit icon next to the scan that you want toschedule.

4 In the Edit Scan window, on the Scan Options tab,configure the scan options as required.

5 Click Save.

Editing a custom scan

You can edit a custom scan that you created. You caninclude additional files or folders to the scan or removethe files and folders that you do not want to scan. Youcan also change the name of the scan.

You can edit a custom scan in the Scans window.

To edit a custom scan

1 In the Norton AntiVirus main window, click ScanNow.

2 In the Computer Scan pane, click Custom Scan.

3 In the Scans window, in the EditScan column, clickthe edit icon next to the custom scan that you wantto modify.

4 In the Edit Scan window, on the Scan Items tab,select the items that you want to scan. See“Selecting the scan items” on page 130.

5 On the Scan Schedule tab, set the frequency andtime at which you want to perform the scan. See“Scheduling a scan” on page 134.

6 On the ScanOptions tab, configure the scan optionsas required. See “Configuring the scan options”on page 131.

7 Click Save.

Protecting your files and dataAbout the Norton AntiVirus scans

132

Page 133: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Running a custom scan

When you run a custom scan, you do not have toredefine what you want to scan.

You can run a custom scan from the Scans window.

To run a custom scan

1 In the Norton AntiVirus main window, click ScanNow.

2 In the Computer Scan pane, click Custom Scan.

3 In the Scans window, click Run next to the customscan that you want to run.You can use the following options to suspend acustom scan:

Suspends a custom scantemporarily.

Click Resume to continue thescan.

Pause

Terminates a custom scan.

Click Yes to confirm.

Stop

4 In the Results Summary window, do one of thefollowing:

1 If no items require attention, click Finish.

1 If any items require attention, review the riskson the Threats Detected window.

Deleting a custom scan

You can delete custom scans if they are no longerneeded.

You can delete a custom scan in the Scans window.

To delete a custom scan

1 In the Norton AntiVirus main window, click ScanNow.

133Protecting your files and dataAbout the Norton AntiVirus scans

Page 134: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

2 In the Computer Scan pane, click Custom Scan.

3 In the Scans window, in the Delete column, clickthe delete icon next to the custom scan that youwant to delete.

4 Click Yes to confirm that you want to delete thescan.

About scheduling scans

Norton AntiVirus automatically detects the idle stateof your computer and runs a Full System Scan.However, you can schedule a Full System Scanaccording to your preferences. You can also set up aschedule for a Quick Scan and custom virus scans thatyou create.

You can schedule scans to run automatically on specificdates and times or at periodic intervals. If the scheduledscan begins when you use your computer, you can runthe scan in the background instead of stopping yourwork. Norton AntiVirus lets you schedule the FullSystem Scan, Quick Scan, and custom virus scans.However, you cannot schedule the Drive Scan, FolderScan, and File Scan.

You can also set up Norton AntiVirus to turn off yourcomputer or move it to sleep mode or hibernate modeautomatically when the scheduled scan is complete.

Scheduling a scan

You have complete flexibility in scheduling customscans. When you select how frequently you want a scanto run (daily, weekly, or monthly), you are presentedwith additional options. For example, you can requesta monthly scan, and then schedule it to occur onmultiple days instead.

In addition to the custom scans that you create, NortonAntiVirus lets you schedule the Full System Scan andQuick Scan.

Protecting your files and dataAbout the Norton AntiVirus scans

134

Page 135: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

You can also schedule the scan to run in specific timeintervals (hours or days). You can schedule a customscan in the Scans window.

w Norton AntiVirus lets you select multiple dates if youschedule a monthly scan.

To schedule a custom scan

1 In the Norton AntiVirus main window, click ScanNow.

2 In the Computer Scan pane, click Custom Scan.

3 In the Scans window, in the EditScan column, clickthe edit icon next to the custom scan that you wantto schedule.

4 In the EditScan window, on the ScanSchedule tab,do one of the following:

1 If you do not want to run the scan at anyparticular time, but want to keep the scanoptions and scan items saved, select Do notschedule this scan.

1 To run the scan at specific time intervals, selectRun at a specific time interval.

1 To run the scan at specific time every day, selectDaily.

1 To run the scan on a specific day on a week,select Weekly.

1 To run the scan on a specific day on a month,select Monthly.

These frequency options include the additionaloptions that you can use to refine the schedule. Setthe additional options as required.

5 Under Run the scan, do the following:

1 To run the scan only at idle time, check Only atidle time.

1 To run the scan only when your computer isconnected with external power source, checkOnly on AC power.

1 To prevent your computer from going to a Sleepor Standby mode, check Prevent standby.

135Protecting your files and dataAbout the Norton AntiVirus scans

Page 136: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

6 Under After scan completion:, select the state atwhich your computer should be after the scan iscomplete. Your options are:

1 Stay On

1 Turn Off

1 SleepThis option works only if you have configuredthe power options in your computer using theWindows Control Panel.

1 HibernateThis option works only if you have configuredthe power options in your computer using theWindows Control Panel.

7 Click Next.

8 In the Scan Options tab, click Save.

Scheduling a Full System Scan

Norton AntiVirus automatically detects the idle stateof your computer and runs a Full System Scan. FullSystem Scan protects your computer against infectionwithout compromising the performance of yourcomputer. You can schedule a Full System Scan onspecific dates and times or at periodic intervals.

You can schedule a Full System Scan in the Scanswindow.

To schedule a Full System Scan

1 In the Norton AntiVirus main window, click ScanNow.

2 In the Computer Scan pane, click Custom Scan.

3 In the Scans window, in the EditScan column, clickthe edit icon next to Full System Scan.

4 In the Edit Scan window, under Whendoyouwantthe scan to run?, set the frequency and time atwhich you want the scan to run.Most of the frequency options include the additionaloptions that you can use to refine the schedule. Setthe additional options as required.

Protecting your files and dataAbout the Norton AntiVirus scans

136

Page 137: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

5 Click Next.

6 In the Scan Options tab, click Save.

Scheduling a Quick Scan

Quick Scan scans the important locations of yourcomputer that the viruses and other security threatsoften target. When you perform a Quick Scan, NortonAntiVirus scans only the running processes and theloaded programs. Quick Scan takes less time to scanthan a Full System Scan because this scan does notscan your entire computer.

Norton AntiVirus lets you schedule a Quick Scan. Youcan schedule a Quick Scan in the Scans window.

To schedule a Quick Scan

1 In the Norton AntiVirus main window, click ScanNow.

2 In the Computer Scan pane, click Custom Scan.

3 In the Scans window, in the EditScan column, clickthe edit icon next to Quick Scan.

4 In the Edit Scan window, under Whendoyouwantthe scan to run?, set the frequency and time atwhich you want the scan to run.Most of the frequency options include the additionaloptions that you can use to refine the schedule. Setthe additional options as required.

5 Click Next.

6 In the Scan Options tab, click Save.

Editing a scheduled scan

You can change the schedule of any scheduled customscan, QuickScan, or Full SystemScan from the Scanswindow.

To edit a scheduled scan from Norton AntiVirus Scansdialog box

1 In the Norton AntiVirus main window, click ScanNow.

137Protecting your files and dataAbout the Norton AntiVirus scans

Page 138: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

2 In the Computer Scan pane, click Custom Scan.

3 In the Scans window, in the EditScan column, clickthe edit icon next to the scan that you want to edit.

4 In the EditScan window, on the ScanSchedule tab,change the schedule as required.Most of the frequency options include the additionaloptions that you can use to refine the schedule. Setthe additional options as required.

5 Click Next.

6 In the Scan Options tab, click Save.

Running a scan at the command prompt

You can scan with Norton AntiVirus from the commandprompt without opening the Norton AntiVirus mainwindow. You type the path and name of the file thatyou want to scan or customize the scan by adding aspecific command. The following commands areavailable:

NAVW32 launches helpand terminates.

/?

Scans all drives/A

Scans the local drives/L

Enables (+) or disables(-) subfolders scanning

/S[+|-]

Enables (+) or disables(-) boot recordscanning and masterboot record scanning(for example, NAVW32C: /B+ or NAVW32 C:/B-)

/B[+|-]

Protecting your files and dataAbout the Norton AntiVirus scans

138

Page 139: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Scans only the bootrecords

/BOOT

Runs a Quick Scan/QUICK

Enables (+) or disables(-) a Quick Scan

/SE[+|-]

Enables (+) or disables(-) scanning of stealthitems

/ST[+|-]

Scans the files thatmatches specified wildcard

[folder_path]\*[?]

Scans the specifieddrive, folder, or file

[drive|folder|file]

Performs Quick Scan inthe background.

w Norton AntiVirusdisplays the scanswindow only when athreat is detected.

/SESCAN

139Protecting your files and dataAbout the Norton AntiVirus scans

Page 140: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To run a scan from the command prompt

1 At the command prompt, type the path in whichNorton AntiVirus is located and the executable'sfile name.The following examples show the syntax of a scancommand:

1 "\Program Files\NortonAntiVirus\Engine\version\NAVW32"/command_name

Where version represents the version numberof Norton AntiVirus and command_namerepresents the command.

1 "\Program Files\NortonAntiVirus\Engine\version\NAVW32"[path]file_name

Where version represents the version numberof Norton AntiVirus and [path] file_namerepresents the location, name, and extension ofthe file.

2 Press Enter.

About Insight Network scanThe Insight Network scan uses the Cloud technologywherein a remote server on the Web contains the latestvirus definitions. Norton AntiVirus scans yourcomputer for the latest security threats. When NortonAntiVirus performs the Insight Network scan, it usesthe virus definitions that are available locally and inthe Cloud. Norton AntiVirus provides additionalprotection by using the most recent definitions in theCloud, apart from the definitions that are availablelocally on your computer.

Norton AntiVirus performs an Insight Network scanonly when the InsightProtection option is turned on.To turn on the Insight Protection option, go to theNorton AntiVirus main window, and then click Settings>General >OtherSettings> InsightProtection>On.By default, the InsightProtection option is turned on.

Protecting your files and dataAbout the Norton AntiVirus scans

140

Page 141: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

When the Insight Protection option is turned on,Norton AntiVirus performs a traditional scan and anInsight Network scan simultaneously. The traditionalscan uses the definitions from the local system, andthe Insight Network scan uses the definitions that arehosted in the Cloud.

Threat detection based on the Cloud definitions isidentical to the threat detection that is based on thelocal definitions. However, the Cloud definitions arespecified with additional data about the threats that itdetects which indicates that it has been obtained fromthe Internet. Definitions in the Cloud provide a genericname for the risk detected, but the local definitionsprovide the specific name for the risk detected. Forexample, if a Trojan horse is detected, the scan resultsof the Insight Network might display Cloud.Trojan.However, the scan results of the local definition mightdisplay Trojan.Foo.

If the traditional scan completes while the InsightNetwork scan is still running, you can view the InsightNetwork Scan progress status.

If the Insight Protection option is turned on, you canmanually run the following types of Insight Networkscans:

1 Insight Network Quick Scan

Norton AntiVirus simultaneously performs atraditional Quick Scan and an Insight NetworkQuick Scan to scan the areas of your computer thatthe viruses often target. Norton AntiVirus alsoperforms an Insight Network Quick Scansimultaneously with an Idle Quick Scan.

1 Insight Network Single File Scan

Norton AntiVirus simultaneously performs atraditional Single File Scan and an Insight NetworkSingle File Scan to scan a file on your computer. Italso scans the files that are received through instantmessenger programs. You can perform this scan byrunning an Insight Network scan on single file usingthe Custom Scan option on the Scans window.

141Protecting your files and dataAbout the Norton AntiVirus scans

Page 142: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

1 Insight Network context-menu scan

When you right-click a file, the shortcut menudisplays Norton AntiVirus and then InsightNetwork Scan. You can use this command to scana file using both local definitions and definitionsthat are hosted in the Cloud.

w This Insight Network Scan command is availableonly for single file.

Turning off or turning on Insight Protection

Insight Protection option lets Norton AntiVirusperform an Insight Network scan on your computer

When the Insight Protection option is turned on,Norton AntiVirus performs a traditional scan and anInsight Network scan simultaneously. The traditionalscan uses the definitions from the local system, andthe Insight Network scan uses the definitions that arehosted in the Cloud. Norton AntiVirus performs onlya traditional scan if the Insight Protection option isturned off.

Norton AntiVirus performs an Insight Network scanonly when the InsightProtection option is turned on.By default, the InsightProtection option is turned on.

To turn off or turn on the Insight Protection

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Other Settings.

4 In the Insight Protection row, do one of thefollowing:

1 To turn off Insight Protection, move the On/Offswitch to the right to the Off position.

1 To turn on Insight Protection, move the On/Offswitch to the left to the On position.

5 In the Settings window, click Apply.

Protecting your files and dataAbout the Norton AntiVirus scans

142

Page 143: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

About Reputation ScanReputation Scan provides information on thetrust-worthiness of all programs and processes runningon your computer. It helps you detect the files that aresuspicious or vulnerable on your computer using thereputation-based threat detection. Reputation-basedthreat detection maintains information of every filesubmitted by millions of other Norton users. Theinformation include trust level, community usage,stability, etc. During reputation scan, reputation-basedthreat detection uses this information to detectsuspicious or vulnerable files on your computer. NortonAntiVirus lets you run different types of ReputationScan and detect suspicious programs on your computer.

Reputation Scan filters the files on the basis of certainfiltering criteria and performs an Insight NetworkScan on the filtered files. Reputation Scan filters thefiles as reputation files. It filters running processesand the loaded DLLs, startup files (services, drivers,and auto run apps), portable executable files mentionedin the Windows prefetch cache, and executable filesthat are listed in the Run registry keys and RunOnceregistry keys.

When you perform a Reputation Quick Scan or FullSystem Scan, Norton AntiVirus considers the Files ofInterest that are available on your computer.

After it has filtered the reputation files, NortonAntiVirus performs an Insight Network Scan. WhenNorton AntiVirus performs an InsightNetworkScan,it also performs a Computer Scan. Norton AntiVirususes the Computer Scan to perform thesignature-based threat detection. It compares thesignature of the filtered reputation files against theknown threat signatures to identify threats on yourcomputer. If a security threat is detected, NortonAntiVirus automatically removes the threat from yourcomputer.

Norton AntiVirus uses the Insight Network Scan todetect suspicious or vulnerable files on your computer

143Protecting your files and dataAbout the Norton AntiVirus scans

Page 144: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

using the reputation-based threat detection. TheInsight Network Scan uses the Cloud technologywherein a remote Symantec server on the Web storesthe latest reputation information. It checks the Cloudfor the reputation information on the filtered files.

Norton AntiVirus obtains specific information such asfile name and hash key about the filtered reputationfiles and sends this information to the Cloud. The Cloudanalyzes the file information and provides a trust levelfor each file. The Symantec server sends back thereputation information to your computer. If any of thefiltered files is suspicious or vulnerable, NortonAntiVirus assigns Bad or Poor trust level. Apart fromreputation information, Norton AntiVirus also checksfor the latest virus definitions on the Cloud.

w Your computer must be connected to the Internet toaccess the latest reputation information and virusdefinitions from the Cloud. If your computer is notconnected to the Internet, Norton AntiVirus uses thereputation information that is available locally.

When you perform a Reputation Scan, NortonAntiVirus considers only the following categories offiles:

This category includesWindows executable files(.exe) and script files (.scr).

Executable files

This category includesWindows System files (.sys),dynamic link library files(.dll), and device driver files(.drv).

System files

This category includesActiveX control files (.ocx).

Developer files

Protecting your files and dataAbout the Norton AntiVirus scans

144

Page 145: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

This category includesWindows Installer Packagefiles (.msi) and resource-onlyDLL files (.loc).

Miscellaneous files

Norton AntiVirus lets you scan specific areas of yourcomputer based on the type of Reputation Scan thatyou select. You can manually run the following typesof Reputation Scan:

Scans the important locationsof your computer that theviruses and other securitythreats often target.

When you perform a QuickScan, Norton AntiVirusconsiders the Files of Interestthat related to loadedprograms and the runningprocesses.

Quick Scan

Scans all the Files of Interestthat are available on yourcomputer.

When you perform a FullSystem Scan, NortonAntiVirus searches for Filesof Interest on all the locationson your computer. Thelocations include all drives,running processes, loadedprograms, and startup files.

Full System Scan

Scans a specific file, folder,drive, or removable drive.

When you perform a customscan, Norton AntiVirusconsiders only the filteredreputation files.

Custom Scan

145Protecting your files and dataAbout the Norton AntiVirus scans

Page 146: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Symantec rates a file based on the statistical evaluationthat is done on the file using the Norton CommunityWatch data and Symantec’s analysis. Symantec assignsthe following confidence levels to reputation files:

Symantec has a highindication that the file istrusted.

Trusted

Symantec has a highindication that the file istrusted.

Good

Symantec does not haveenough information aboutthe file to assign a trust levelto the file.

The file is neither safe norunsafe.

Unknown

Symantec has a fewindications that the file is nottrusted.

This file is suspicious and canharm your computer.

Poor

Symantec has a highindication that the file is nottrusted.

This file is suspicious and canharm your computer.

Bad

When the Reputation Scan is complete, you can viewthe summary of the scan results in the NortonReputationScan window. You can view the reputationinformation such as the file name, trust level, age ofthe file, stability rating, and community usage for eachfile. The trust level determines whether a file is safe

Protecting your files and dataAbout the Norton AntiVirus scans

146

Page 147: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

or unsafe. If a file has Poor or Bad trust level, NortonAntiVirus lets you quarantine the file.

Running a Reputation Full System Scan

When you perform a Full System Scan, NortonAntiVirus scans all the Files of Interest that areavailable on your computer. This fileset includes thefiles that relate to the running processes, startup files,and loaded programs.

To run a Reputation Full System Scan

1 In the Norton AntiVirus main window, click ScanNow.

2 In the window that appears, click ReputationScan.

3 In the Reputation Scan pane, click Full SystemScan.In the Norton Reputation Scan window, you cananalyze the trust level, community usage, resourceusage, and stability of the scanned items.

4 If there is a file with Poor or Bad trust level, underthe TrustLevel column, click the red cross (x) icon.

5 In the Quarantine File window, click Quarantinethis file.

6 In the Manual Quarantine window, click Add.

7 Click Close.

8 In the NortonReputationScan window, click Close.

Running a Reputation Quick Scan

When you perform a Quick Scan, Norton AntiVirusscans only the running processes and the loadedprograms. Reputation Quick Scan does not scan yourentire computer and it takes lesser time to run than aReputation Full System Scan.

To run a Reputation Quick Scan

1 In the Norton AntiVirus main window, click ScanNow.

2 In the window that appears, click ReputationScan.

147Protecting your files and dataAbout the Norton AntiVirus scans

Page 148: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

3 In the Reputation Scan pane, click Quick Scan.In the Norton Reputation Scan window, you cananalyze the trust level, community usage, resourceusage, and stability of the scanned items.

4 If there is a file with Poor or Bad trust level, underthe TrustLevel column, click the red cross (x) icon.

5 In the Quarantine File window, click Quarantinethis file.

6 In the Manual Quarantine window, click Add.

7 Click Close.

8 In the NortonReputationScan window, click Close.

Running a Reputation custom scan

Norton AntiVirus lets you scan specific areas on yourcomputer by using the Reputation custom scan. Youcan scan any of your computer's drives, removabledrives, folders or files. For example, if you want tocheck the trust level of a specific file, you can scan theparticular file.

To run a Reputation custom scan

1 In the Norton AntiVirus main window, click ScanNow.

2 In the window that appears, click ReputationScan.

3 In the Reputation Scan pane, click Custom Scan.

4 In the Reputation Custom Scan window, do one ofthe following:

1 Click Drive Scan, select the drive that you wantto scan, and then click Scan.

1 Click FolderScan, select the folder that you wantto scan, and then click OK.

1 Click File Scan, select the file that you want toscan, and then click Open.

In the Norton Reputation Scan window, you cananalyze the trust level, community usage, resourceusage, and stability of the scanned items.

5 If there is a file with Poor or Bad trust level, underthe TrustLevel column, click the red cross (x) icon.

Protecting your files and dataAbout the Norton AntiVirus scans

148

Page 149: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

6 In the Quarantine File window, click Quarantinethis file.

7 In the Manual Quarantine window, click Add.

8 Click Close.

9 In the NortonReputationScan window, click Close.

About the Reputation Scan results

Norton AntiVirus lets you run different ReputationScans to detect any suspicious programs or vulnerableprograms on your computer. Norton AntiVirus lets youmanually run the following types of Reputation Scan:

1 Reputation Quick Scan

1 Reputation Full System Scan

1 Reputation Custom Scan

When you run a Reputation Quick Scan, NortonAntiVirus considers the Files of Interest which includerunning processes and loaded programs. When yourun a Reputation Full System Scan, Norton AntiVirusconsiders all the Files of Interest that are available onyour computer. When you run a Reputation customscan, Norton AntiVirus lets you select the drive, folder,or file that you want to scan.

Reputation Scan filters the files on the basis of certainfiltering criteria and performs an Insight NetworkScan on the filtered files. Reputation Scan filters .exefiles, .scr files, .sys files, .dll files, .drv files, .ocx files,and .msi files and analyzes these files.

Norton AntiVirus displays the reputation informationof the scanned files in the Norton Reputation Scanwindow.

Norton AntiVirus consolidates the reputationinformation of your most recent scan and presents thereputation information using different graphicalformats.

The top of the Norton Reputation Scan windowdisplays the following statistics:

149Protecting your files and dataAbout the Norton AntiVirus scans

Page 150: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

1 The Trust Level graph displays the average trustlevel of files on your computer. It also displays theaverage trust level of the files that Symantecanalyzes within the Norton Community.

1 The CommunityUsage graph displays the averagecommunity usage of files on your computer. It alsodisplays the average community usage of the filesthat Symantec analyzes within the NortonCommunity.

1 The Stability graph displays the average reliablefiles on your computer. It also displays the averagereliable files that Symantec analyzes within theNorton Community.

w Stability ratings vary depending upon youroperating system.

1 The Norton Network graph displays the detailsabout the known good files and bad files.

You can view the number of trusted files that areon your computer. You can also view the totalnumber of files that Symantec analyzes within theNorton Community.

w Your computer must be connected to the Internet toview these details. Norton AntiVirus connects to theSymantec servers to collect the reputation information.

The bottom of the Norton Reputation Scan windowdisplays the reputation information of each scanneditem. For each scanned item, you can view the followingdetails:

Indicates the file name andfile type.

You can click a file name toview additional details aboutthe file in the File Insightwindow.

File Name

Protecting your files and dataAbout the Norton AntiVirus scans

150

Page 151: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Trust Level

151Protecting your files and dataAbout the Norton AntiVirus scans

Page 152: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Indicates the trust level thatis assigned to a file.

Symantec analyzes specificinformation about a file suchas the digital signature andthe hash value to determinethe trust level of a file.Symantec rates a file basedon the statistical evaluationthat is done on the file usingtheNortonCommunityWatchdata and Symantec’sanalysis.

Symantec assigns thefollowing trust levels toreputation files:

1 Trusted: Symantec has ahigh indication that thefile is trusted.

1 Good: Symantec has ahigh indication that thefile is trusted.

1 Unknown: Symantec doesnot have enoughinformation about the fileto assign a trust level tothe file.

1 Poor: Symantec has a fewindications that the file isnot trusted.

1 Bad: Symantec has a highindication that the file isnot trusted.

If you have a file that hasPoor or Bad trust level,Norton AntiVirus displays ared cross (x) icon next to thetrust level. You can click onthe red cross (x) icon andquarantine the suspicious

Protecting your files and dataAbout the Norton AntiVirus scans

152

Page 153: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

file.

Indicates the communityusage level of the file.

The search results aregrouped in to the followingcategories:

1 Very Few Users: Showsthe files that have verylow community usage.

1 Few Users: Shows thefiles that have averagecommunity usage.

1 Many Users: Shows thefiles that have very highcommunity usage.

You can also use thecommunity usage of a file todetermine the legitimacy ofthe file. Symantec uses astringent statistical methodto evaluate thetrustworthiness of a file andto classify the file as a Goodfile.

Community Usage

153Protecting your files and dataAbout the Norton AntiVirus scans

Page 154: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Indicates the system resourceusage level of the file.

The usage levels are asfollows:

1 Low: Indicates that thefile consumes minimumsystem resources.

1 Moderate: Indicates thatthe file consumesmoderate systemresources.

1 High: Indicates that thefile consumes maximumsystem resources.

1 Unknown: Indicates thatthe file has performed noaction in your computer.

Resource Usage

Protecting your files and dataAbout the Norton AntiVirus scans

154

Page 155: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Indicates the stability ratingof the file.

The stability rating dependson how frequently theprogram crashes. Thedifferent stability ratings areas follows:

1 Reliable: Indicates thatthe program is reliable.

1 Stable: Indicates that theprogram is comparativelystable. However, itcrashes sometimes.

1 Slightly Unstable:Indicates that theprogram is slightlyunstable.

1 Unstable: Indicates thatthe program is unstable.

1 Very Unstable: Indicatesthat the programfrequently crashes.

1 Unknown: Indicates thatthe crash history of theprogram is not known.

w Stability ratings varydepending upon youroperating system.

Stability

About Scan Facebook WallNorton Safe Web protects your computer frommalicious URLs when you use Facebook. It scans eachURL that is available on your Facebook Wall anddisplays the Norton rating icons for the scanned URLs.

You can also check if a URL is safe or unsafe. NortonSafe Web scans your Facebook News feed and providesyou the safety status for each of the URL. This way,you are not only protected from unsafe sites but you

155Protecting your files and dataAbout the Norton AntiVirus scans

Page 156: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

can also let other Facebook users know the securitystatus of any Web site.

However, Norton Safe Web requires your permissionto scan the URLs that are available on your FacebookWall. When you install the Norton Safe Web FacebookApp, Norton Safe Web App asks for your permissionto access your Facebook Wall. You can choose to allowor deny permission to let Norton Safe Web access yourFacebook Wall.

The auto-scan feature in Norton Safe Web applicationpage helps you protect your Facebook Wall offline.Norton Safe Web scans the News Feed on yourFacebook Wall every day and protects you frommalicious links. When Norton Safe Web detects amalicious link, it notifies you with a post on yourFacebook Wall. To activate Norton Auto-Scan, go toyour NortonSafeWebScanResults page on Facebookand click EnableAuto-Scan. The Norton Safe Web appwill ask for additional permission to post in your wallwhen malicious links are identified while enabling thisfeature.

To remove the malicious link from your Facebook Wall,go to your profile and remove the malicious link. Youcan also click See Norton Safe Web Report to viewNorton ratings and other details about this maliciouslink. When no malicious activity is detected on yourFacebook Wall, Norton Safe Web posts a messagenotifying that your Facebook Wall is safe. Norton SafeWeb posts this message on your Facebook Wall oncein every 30 days.

If you later decide to remove Norton Safe Web fromyour Facebook profile, you can use the ApplicationSettings option of Facebook.

Protecting your files and dataAbout the Norton AntiVirus scans

156

Page 157: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

The following are the safety states that Norton SafeWeb provides after it scans the links on your FacebookWall:

Indicates that the site is safe tovisit and Norton Trusted.

The sites with this rating do notharm your computer and so youcan visit this site.

Safe

Indicates that the site hassecurity risks.

The sites with this rating mayinstall malicious software onyour computer. Symantecrecommends that you do notvisit this site.

Warning

Indicates that Norton Safe Webhas not yet tested this site andit does not have sufficientinformation about this site.

Untested

Indicates that the site may havesecurity threats. Symantecrecommends you to be cautiouswhile you visit such Web sites.

Caution

Enabling your Facebook Wall Scan

The Norton Safe Web feature scans your Facebook Walland analyzes the security levels of all the availablelinks on your Facebook Wall. It then displays thesecurity status of the scanned URLs. However, NortonSafe Web requires your permission to scan yourFacebook Wall.

157Protecting your files and dataAbout the Norton AntiVirus scans

Page 158: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To enable your Facebook Wall

1 In the Norton AntiVirus main window, click ScanNow.

2 In the window that appears, click Scan FacebookWall.

3 In the Scan Facebook Wall pane, click Scan MyFacebook Wall.

4 In the Facebook login Web page, log in to yourFacebook profile.

5 In the Request for permission page, click Allow.

6 In the Web page that appears, click Pleasegrantuspermission to access your News Feed and Wall.

7 Follow the on-screen instructions to let Norton SafeWeb access your Facebook Wall.

About Idle Time ScansNorton AntiVirus keeps your computer secure fromongoing threats by automatically running scans onyour computer by using the Idle Time Scans feature.Idle Time Scans detect the time when you do not useyour computer and intelligently run scans dependingon the scan history of your computer.

The IdleTimeScans option is automatically turned onwhen you install Norton AntiVirus. Even though IdleTime Scans automatically run the scans, you can stillcustomize the settings of Idle Time Scans. NortonAntiVirus decides when to run Idle Time Scans,depending on your settings and a few other predefinedparameters.

Protecting your files and dataAbout the Norton AntiVirus scans

158

Page 159: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

The following list provides details on the settings thatyou can make and the predefined parameters:

You can set the duration afterwhich Norton AntiVirus shouldidentify your computer as idle.You can select a value (inminutes) between 1 minute and30 minutes. When you do notuse your computer for theduration that you specify, NortonAntiVirus checks for the otherpredefined parameters and runsIdle Time Scans.

Idle Time Out duration

Some of the predefinedparameters that NortonAntiVirus checks are CPU idletime, disk usage, and type ofelectric current you use tooperate your computer.

For example, you set the IdleTime Out duration as 10 minutesand watch an online video for 11minutes without anyintervention. In this case, IdleTime Scans do not run becauseof the CPU-intensive task.

Predefined parameter

w You must run your computer on alternating current(AC) power for Norton AntiVirus to run Idle TimeScans.

You can view the results of the scans in any of thefollowing locations:

1 The Scan Results category in the SecurityHistorywindow

1 The Norton Tasks category in the Norton Taskswindow

159Protecting your files and dataAbout the Norton AntiVirus scans

Page 160: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Norton AntiVirus discontinues any Idle Time Scansthat it started during idle time if you begin to use yourcomputer again. However, it resumes the scan whenyour computer is idle again.

w You must turn off Idle Time Scans to schedule a FullSystem Scan. However, you should always keep IdleTime Scans turned on to allow Norton AntiVirus toscan your computer when it becomes idle.

Turning off or turning on Idle Time Scans

The IdleTimeScans option is automatically turned onwhen you install Norton AntiVirus. When the IdleTimeScans option is turned on, Norton AntiVirus detectsthe time when you do not use your computer. NortonAntiVirus then intelligently runs a scan, depending onthe scan history of your computer. However, there maybe times when you want to turn off Idle Time Scans.

To turn off Idle Time Scans

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, in the left pane, clickComputer Scan.

3 In the Idle Time Scans row, in the drop-down list,select Off.

4 Click Apply.

To turn on Idle Time Scans

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, in the left pane, clickComputer Scan.

3 In the Idle Time Scans row, in the drop-down list,select the option that you want to set. Your optionsare:

1 Weekly

1 Monthly

1 Quarterly

Protecting your files and dataAbout the Norton AntiVirus scans

160

Page 161: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

4 Click Apply.

Specifying Idle Time Out duration

You can set the duration after which Norton AntiVirusshould identify your computer as idle. You can selecta value (in minutes) between 1 minute and 30 minutes.When you do not use your computer for the durationthat you specify, Norton AntiVirus checks for otherpredefined parameters and runs a Full System Scan.

To specify Idle Time Out duration from the Settingswindow

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the Idle Time Out row, in the drop-down list,select the duration that you want to specify.You might need to scroll the window to view theoption.

4 In the Settings window, click Apply.

About SONAR ProtectionSymantec Online Network for Advanced Response(SONAR) provides real-time protection against threatsand proactively detects unknown security risks on yourcomputer. SONAR identifies emerging threats basedon the behavior of applications. SONAR identifiesthreats quicker than the traditional signature-basedthreat detection techniques. SONAR detects andprotects you against malicious code even before virusdefinitions are available through LiveUpdate.

w Symantec recommends that your computer remainsconnected to Internet to get the real-time protectionagainst threats and proactively detects unknownsecurity risks on your computer.

SONAR monitors your computer for malicious activitiesthrough heuristic detections.

161Protecting your files and dataAbout the Norton AntiVirus scans

Page 162: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

SONAR automatically blocks and removeshigh-certainty threats. Norton AntiVirus notifies youwhen high-certainty threats are detected and removed.SONAR provides you the greatest control whenlow-certainty threats are detected. You can alsosuppress the SONAR notifications by disabling theShow SONAR Block Notifications option.

The ViewDetails link in the notification alert lets youview the summary of the resolved high-certaintythreats. You can also view the details under ResolvedSecurity Risks category in the Security Historywindow.

Turning off or turning on SONAR Protection

SONAR protects you against malicious code even beforevirus definitions are available through LiveUpdate. Bydefault, SONAR Protection is turned on to proactivelydetect unknown security risks on your computer.

When you turn off SONAR Protection, you areprompted with a protection alert. This protection alertlets you specify the amount of time for which you wantSONAR Protection to be turned off.

w When Auto-Protect is turned off, SONAR Protection isalso disabled. In this case, your computer is notprotected against emerging threats.

To turn off or turn on SONAR Protection

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, in the left pane, click RealTime Protection.

3 In the SONAR Protection row, do one of thefollowing:

1 To turn off SONAR Protection, move the On/Offswitch to the right to the Off position.

1 To turn on SONAR Protection, move the On/Offswitch to the left to the On position.

4 In the Settings window, click Apply.

Protecting your files and dataAbout the Norton AntiVirus scans

162

Page 163: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

About Real Time Exclusions

Symantec Online Network for Advanced Response(SONAR) provides real-time protection against threatsand proactively detects unknown security risks on yourcomputer. SONAR identifies emerging threats basedon the behavior of applications. SONAR identifiesthreats quickly compared to the traditionalsignature-based threat detection techniques. SONARdetects and protects you from malicious programs evenbefore virus definitions are available throughLiveUpdate.

SONAR monitors your computer for malicious activitiesusing heuristic detections. It automatically blocks andremoves high-certainty threats. Norton AntiVirusnotifies you when high-certainty threats are detectedand removed.

However, you can configure Norton AntiVirus toexclude certain programs from the Norton AntiVirusAuto-Protect scans and SONAR scans. You shouldexclude programs only if you are confident that theyare not infected. You can exclude the programs fromthe Auto-Protect scans and SONAR scans by addingthem to the Real Time Exclusions window. When youadd a program to the Real Time Exclusions window,Norton AntiVirus ignores the file when it performsAuto-Protect scan and SONAR scan. This option alsoexcludes subfolders within a folder.

w Exclude a program from Norton AntiVirus scans onlyif you are confident that the program is safe. Forexample, if another program relies on a security riskprogram to function, you might decide to keep theprogram on your computer.

To add programs to the RealTimeExclusions window,go to the Norton AntiVirus main window, and thenclick Settings > Computer > AntiVirus and SONARExclusions > Items to Exclude from Auto-Protect,SONAR and Download Intelligence Detection >Configure.

163Protecting your files and dataAbout the Norton AntiVirus scans

Page 164: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Excluding security threats from scanning

You can use Scan Exclusions window and Real TimeExclusions window to exclude viruses and otherhigh-risk security threats from scanning.

To exclude high-risk security threats from scanning

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, in the left pane, clickAntiVirus and SONAR Exclusions.

3 Do one of the following:

1 In the Items to Exclude from Scans row, clickConfigure.

1 In the Items to Exclude from Auto-Protect,SONAR and Download Intelligence Detectionrow, click Configure.

4 In the window that appears, click Add.

5 In the Add Item dialog box, click the browse icon.

6 In the dialog box that appears, select the item thatyou want to exclude from the scan.

7 Click OK.

8 In the Add Item dialog box, click OK.

9 In the window that appears, click Apply, and thenclick OK.

About Signature Exclusions

Norton AntiVirus lets you select specific knownsecurity risks and exclude them from Norton AntiVirusscans. Exclude a risk from Norton AntiVirus scans onlyif you have a specific need. For example, if anotherprogram relies on a security risk program to function,you might decide to keep the program on yourcomputer. You might also decide not to be notifiedabout the program in future scans.

Protecting your files and dataAbout the Norton AntiVirus scans

164

Page 165: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

w When you exclude a known security risk from NortonAntiVirus scans, the protection level of your computerreduces. You should exclude items only if you areconfident that they are not infected.

To exclude a security risk from scans, you need to addthe specific security risk to the Signature Exclusionswindow. The Signature Exclusions window containsthe list of all security risks that can be excluded fromNorton AntiVirus scans. For each security risk, you canview the risk details and the effect of the risk on yourcomputer.

To add security risks to the Signature Exclusionswindow, go to the Norton AntiVirus main window, andthen click Settings > Computer > AntiVirus andSONAR Exclusions > Signatures to Exclude from AllDetections > Configure.

Adding items to the Signature Exclusions

To exclude a security risk from scans, you must addthe specific security risk to the Signature Exclusionswindow. You can select a known risk by name and addit to the list.

w When you exclude a known security risk from NortonAntiVirus scans, the protection level of your computerreduces. You should exclude items only if you areconfident that they are not infected.

To add a signature to the Signature Exclusions

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, in the left pane, clickAntiVirus and SONAR Exclusions.

3 In the Signatures to Exclude from All Detectionsrow, click Configure.

4 In the Signature Exclusions window, click Add.

5 In the Security Risks window, click on a securityrisk that you want to exclude and then click Add.

165Protecting your files and dataAbout the Norton AntiVirus scans

Page 166: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

6 In the Signature Exclusions window, click Apply,and then click OK.

7 In the Settings window, click OK.

About clearing file IDs that are excluded during scans

When you run a Reputation Scan, Norton AntiVirusprovides information on the trust-worthiness of allprograms and processes running on your computer.Reputation Scan helps you detect the files that aresuspicious or vulnerable on your computer using thereputation-based threat detection. Norton AntiVirusprovides reputation information such as trust level,user prevalence, and stability for each program andprocess that is scanned. Norton AntiVirus stores thereputation information of all scanned files.

All trusted and favorable files are provided withTrusted and Good trust levels. If any of the scannedfiles is suspicious or vulnerable, Norton AntiVirusassigns Bad or Poor trust level.

During each successive scan that you run, NortonAntiVirus excludes the Trusted and Good files frombeing scanned. However, if you want Norton AntiVirusto scan all the files in your computer, you must clearthe reputation information of the excluded files.

w When you exclude a reputation-based threat, NortonAntiVirus does not add the signature of the excludedthreat to the Signature Exclusions window. This isbecause the reputation-based threats are excluded byhash value. You can use the Clearing IDs of files thatareexcludedduringscans option to clear the excludedreputation-based threats.

To clear the reputation information of files that areexcluded from scans. In the Norton AntiVirus mainwindow, click Settings > Computer > AntiVirus andSONAR Exclusions > Clear file IDs excluded duringscans > Clear All.

Protecting your files and dataAbout the Norton AntiVirus scans

166

Page 167: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Clearing IDs of files that are excluded duringscans

Norton AntiVirus tags all trusted and favorable fileswith Trusted and Good trust levels. When a file istagged as Trusted or Good, Norton AntiVirus does notscan this file again. This can improve the scanperformance of Norton AntiVirus on your computer.

However, if you want Norton AntiVirus to scan all thefiles in your computer, you must clear the reputationinformation of the excluded files.

w When you clear IDs of files that are excluded duringscans, it might take a longer time to complete scan.

Norton AntiVirus excludes the Trusted and Good filesfrom being scanned. However, if you want NortonAntiVirus to scan all the files in your computer, youmust clear the reputation information of the excludedfiles.

To clear IDs of files that are excluded during scans

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, in the left pane, clickAntiVirus and SONAR Exclusions.

3 In the Clear file IDs excluded during scans row,click Clear All.

4 In the Warning window, click Yes.

5 In the Settings window, click Apply, and then clickOK.

About scanning Office documentsNorton AntiVirus protects all Office documents thatyou receive through email messages, through Internetdownload, and through inserted floppy disks or otherremovable media. By automatically scanning all Officefiles, Norton AntiVirus maintains a higher level ofsecurity. Norton AntiVirus scans the Office documentwhen you open them.

167Protecting your files and dataAbout the Norton AntiVirus scans

Page 168: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

You can use the Microsoft Office Automatic Scanoption in the Settings window to scan documents ofthe following Microsoft Office applications:

Microsoft Wordwinword.exe

Microsoft Excelexcel.exe

Microsoft PowerPointpowerpnt.exe

Microsoft Visiovisio.exe

Microsoft Accessmsaccess.exe

Microsoft Projectwinproj.exe

Norton AntiVirus scans the Office documents andprotect against threats, including virus macros andinfected embedded objects.

By default, the MicrosoftOfficeAutomaticScan optionin the Settings window is turned off. Turn on thisoption to scan Microsoft Office files automatically.

Turning on or turning off Microsoft Office Automatic Scan

Norton AntiVirus maintains a higher level of securityby automatically scanning all Office files. You can turnon the Microsoft Office Automatic Scan option toprotect your computer against the virus macros andembedded objects.

To Turn on or turn off Microsoft Office Automatic Scan

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, in the left pane, clickComputer Scan.

Protecting your files and dataAbout the Norton AntiVirus scans

168

Page 169: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

3 In the MicrosoftOfficeAutomaticScan row, do oneof the following:

1 To turn on Microsoft Office Automatic Scan,move the On/Off switch to the left to the Onposition.

1 To turn off Microsoft Office Automatic Scan,move the On/Off switch to the right to the Offposition.

4 In the Settings window, click Apply, and then clickOK.

About Silent ModeNorton AntiVirus provides many solutions and featuresto handle viruses and other security threats. NortonAntiVirus displays alerts and notifications to informyou how viruses and other security threats are detectedand resolved. When you perform important tasks onyour computer, you likely prefer not to receive anyalert messages. Norton AntiVirus suppresses alertsand notifications and temporarily suspends most ofthe background activities based on the Silent ModeSettings that are turned on.

Norton AntiVirus provides the following options underSilent Mode Settings:

Norton AntiVirus allows you tomanually turn on for a specifiedduration using Silent Modeoption.

Silent Mode

Norton AntiVirus turns on thisoption automatically when itdetects a full-screen applicationand turns off when you stopusing the full-screen application.

Full Screen Detection

169Protecting your files and dataAbout the Norton AntiVirus scans

Page 170: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Norton AntiVirus turns on thisoption automatically when itdetects a disk burning task or aMedia Center TV recording task.Norton AntiVirus also turns onQuiet Mode automatically whenyou run a program that youincluded in the Quiet ModePrograms list. Norton AntiVirusturns off Quiet Mode when thedisk burning session or TVprogram recording session iscomplete. Norton AntiVirus alsoturns off Quiet Mode when itstops detecting runninginstances of the programs thatyou included in the Quiet ModePrograms list.

Quiet Mode

The Norton AntiVirus icon displays the turn-on statusof Silent Mode in the notification area, at the far rightof the taskbar. The icon changes to acrescent-patterned icon when Silent Mode is turnedon. Norton AntiVirus also notifies you after Silent Modeis turned off.

You can view the summary of the Silent Mode sessionsunder the Recent History, Full History, and SilentMode categories in the drop-down list of the Showoption in the Security History window.

The summary includes the following information:

1 The turn-on or turn-off status of Silent Mode

1 Usage of Silent Mode Settings, such as Silent Modeor Quiet Mode

1 The type of program that turns on Silent Mode,such as disk burning or TV recording

1 The name of a user-specified program that turnson Silent Mode

1 The time and date when Silent Mode is turned onor turned off

Protecting your files and dataAbout the Norton AntiVirus scans

170

Page 171: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

1 The severity displays the risk level of the selecteditem

About the Silent Mode that you turn on manually

Norton AntiVirus lets you manually turn on SilentMode for a specified duration. When Silent Mode isturned on, Norton AntiVirus suppresses alerts andsuspends background activities for the duration thatyou specify. You can verify the turn-on status of SilentMode in the notification area, at the far right of thetaskbar. The Norton AntiVirus icon in the notificationarea changes to a crescent-patterned icon to displaythe turn-on status of Silent Mode. Turning on SilentMode manually before you perform your tasks helpsyou prevent alerts, notifications, or backgroundactivities interrupting you for the specified duration.

You can turn on Silent Mode for a period of one hour,two hours, four hours, six hours, or one day. After thespecified duration, Norton AntiVirus turns off SilentMode. You can also manually turn off Silent Mode atany time. Norton AntiVirus notifies you after SilentMode is turned off. The activities that are suspendedwhen Silent Mode is turned on run after Silent Modeis turned off.

Turning on or turning off Silent Mode manually

You can manually turn on Silent Mode for a specifiedduration before you perform any important task onyour computer. You can turn on Silent Mode for aperiod of one hour, two hours, four hours, six hours,or one day. The Norton AntiVirus icon displays theturn-on status of Silent Mode in the notification area,at the far right of the taskbar. Norton AntiVirus notifiesyou after Silent Mode is turned off. After Silent Modeis turned off, Norton AntiVirus also displays alerts ifit detected any security activities that occurred duringthe Silent Mode session.

You can turn on or turn off Silent Mode from the SilentMode Settings section of the Settings window. You

171Protecting your files and dataAbout the Norton AntiVirus scans

Page 172: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

can also turn on or turn off Silent Mode by using theNorton AntiVirus icon in the notification area.

To turn on Silent Mode from the Settings window

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Silent Mode Settings.

4 In the Silent Mode row, move the On/Off switch tothe left to the On position.

5 In the Settings window, click Apply.

6 In the TurnonSilentMode dialog box, in the Selectthe duration drop-down list, select how long youwant to turn on Silent Mode, and then click OK.

7 In the Settings window, click OK.

To turn off Silent Mode from the Settings window

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Silent Mode Settings.

4 In the Silent Mode row, move the On/Off switch tothe right to the Off position.

5 In the Settings window, click Apply.

6 Click OK.

To turn on Silent Mode from the notification area

1 In the notification area on the Windows taskbar,right-click the Norton AntiVirus icon, and then clickTurn on Silent Mode.

2 In the TurnonSilentMode dialog box, in the Selectthe duration drop-down list, select how long youwant to turn on Silent Mode, and then click OK.

To turn off Silent Mode from the notification area

4 In the notification area on the Windows taskbar,right-click the Norton AntiVirus icon, and then clickTurn off Silent Mode.

Protecting your files and dataAbout the Norton AntiVirus scans

172

Page 173: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

About the Silent Mode that turns on automatically

When you watch a movie, play games, or make apresentation, you run the application in the full-screenmode. Norton AntiVirus detects the application thatyou run in the full-screen mode and automaticallyenables Silent Mode. When Silent Mode is enabled,Norton AntiVirus suppresses most of the alerts andsuspends background activities. Only those activitiesrun that are involved in protecting your computer fromviruses and other security threats. Minimumbackground activities also ensure high performanceof your computer. The activities that are suspendedrun after you finish using the application in thefull-screen mode.

Silent Mode also helps you maintain an uninterruptedMedia Center Extender session. A Media CenterExtender session is an extended session of Media Centerto an entertainment device, such as a television. Thealerts and notifications that appear during a MediaCenter Extender session disconnect the session betweenthe host computer and the entertainment device.Norton AntiVirus identifies a Media Center Extendersession as an active full-screen application and turnson Silent Mode. When Silent Mode is enabled, NortonAntiVirus suppresses alerts and notifications andsuspends background activities to provideuninterrupted sessions for Silent Mode options suchas Full Screen Detection or Media Center applications.

Turning off or turning on Full Screen Detection

You can use the Full Screen Detection option in theSettings window to turn on or turn off Silent Modeautomatically when Norton AntiVirus detects afull-screen application. By default, the Full ScreenDetection option remains turned on after you installNorton AntiVirus.

173Protecting your files and dataAbout the Norton AntiVirus scans

Page 174: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To turn off Full Screen Detection

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Silent Mode Settings.

4 In the Full ScreenDetection row, move the On/Offswitch to the right to the Off position.

5 In the Settings window, click Apply.

To turn on Full Screen Detection

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Silent Mode Settings.

4 In the Full ScreenDetection row, move the On/Offswitch to the left to the On position.

5 In the Settings window, click Apply.

About Quiet Mode

Norton AntiVirus automatically enables Quiet Modewhen you perform tasks that require higher utilizationof your system resources. When Quiet Mode is turnedon, Norton AntiVirus suspends the backgroundactivities and lets the task use the maximum resourcesfor better performance.

You can choose to set Norton AntiVirus toautomatically enable Quiet Mode when you do thefollowing tasks:

1 IMAPI 2.0 Disk Burn

1 Media Center TV Recording

1 User-Specified Programs

Protecting your files and dataAbout the Norton AntiVirus scans

174

Page 175: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

The following table explains about the various options:

When you use a Media Centerapplication to burn a CD or aDVD, Norton AntiVirusautomatically enables QuietMode, if the IMAPI 2.0 Disk Burnoption is turned on. By default,the IMAPI 2.0 Disk Burn optionis turned on. When Quiet Modeis enabled, Norton AntiVirussuspends background activitiesto improve the performance ofyour disk-burning session.However, Norton AntiViruscontinues to display alerts andnotifications during the session.

Norton AntiVirus supports thefollowing Media Centerdisk-burner applications to turnon Quiet Mode:1 IMAPI 2.0

1 J. River MEDIA CENTER(version 13.0.125 and later)

Norton AntiVirus turns on QuietMode as soon as you startburning a CD or a DVD using aMedia Center application.Norton AntiVirus turns off QuietMode after the disk-burningsession is complete. You cannotturn off Quiet Mode during thedisk-burning session by turningoff the IMAPI 2.0 Disk Burnoption in the Settings window.

IMAPI 2.0 Disk Burn

175Protecting your files and dataAbout the Norton AntiVirus scans

Page 176: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

When you use a Media Centerapplication to record a TVprogram, Norton AntiVirusautomatically enables QuietMode, if the Media Center TVRecording option is turned on.By default, theMedia Center TVRecording option is turned on.When Quiet Mode is enabled,Norton AntiVirus suspendsbackground activities to improvethe performance of your TVprogram recording session.However, Norton AntiViruscontinues to display alerts andnotifications during the session.

Norton AntiVirus supports thefollowing Media Centerapplications to turn on QuietMode:1 Windows Media Center

For Windows Media Centerto enable Quiet Mode duringTV program session, youmight need to restart yourcomputer after you installNorton AntiVirus.

1 J. River MEDIA CENTER(version 13.0.125 and later)

Norton AntiVirus turns on QuietMode as soon as you startrecording a TV program. AfterQuiet Mode is turned on, it turnsoff after the recording session iscomplete. You cannot turn offQuiet Mode during the TVprogram recording session byturning off theMedia Center TVRecording option in theSettingswindow.

Media Center TVRecording

Protecting your files and dataAbout the Norton AntiVirus scans

176

Page 177: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Norton AntiVirus automaticallyturns on Quiet Mode when itdetects a TV program recordingsession or a disk-burningsession. In addition, you canmanually add the programs forwhich you want Norton AntiVirusto turn on Quiet Mode to theQuietModePrograms list. WhenNorton AntiVirus detects arunning instance of a programthat you added in the list, itautomatically turns on QuietMode. When Quiet Mode isturned on, Norton AntiVirussuspends the backgroundactivities but does not suppressalerts and notifications.

You can also add or remove arunning program to the QuietMode Programs list.

User-Specified Programs

Turning off or turning on the Quiet Mode options

You can turn off or turn on the Quiet Mode options,such as IMAPI 2.0 Disk Burn and Media Center TVRecording in the Settings window. By default, the QuietMode options are turned on. If you perform a task foran option that you turned on, Norton AntiVirus detectsthe task and automatically turns on Silent Mode. Forexample, you turn on the IMAPI2.0DiskBurn optionand start burning a disk using a Media Centerapplication. In this case, Norton AntiVirus detects thedisk-burning session and turns on Quiet Mode.

Norton AntiVirus turns on Quiet Mode as soon as youstart recording a TV program or burning a CD or a DVD.Once Quiet Mode is turned on, it turns off only afterthe TV program recording session or disk-burningsession is complete. You cannot turn off Quiet Mode

177Protecting your files and dataAbout the Norton AntiVirus scans

Page 178: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

during the sessions by using the options in the Settingswindow.

To turn off or turn on IMAPI 2.0 Disk Burn

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Silent Mode Settings.

4 In the Silent Mode Settings, under Quiet Mode onDetection of, do one of the following:

1 To turn off detection of a disk burning session,in the IMAPI 2.0 Disk Burn row, move theOn/Off switch to the right to the Off position.

1 To turn on detection of a disk burning session,in the IMAPI 2.0 Disk Burn row, move theOn/Off switch to the left to the On position.

5 In the Settings window, click Apply.

6 Click OK.

To turn off or turn on Media Center TV Recording

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Silent Mode Settings.

4 In the Silent Mode Settings, under Quiet Mode onDetection of, do one of the following:

1 To turn off detection of a TV program recordingsession, in the MediaCenterTVRecording row,move the On/Off switch to the right to the Offposition.

1 To turn on detection of a TV program recordingsession, in the MediaCenterTVRecording row,move the On/Off switch to the left to the Onposition.

5 In the Settings window, click Apply.

6 Click OK.

Protecting your files and dataAbout the Norton AntiVirus scans

178

Page 179: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

About User-Specified Programs

Norton AntiVirus automatically turns on Quiet Modewhen it detects a TV program recording session or adisk-burning session. In addition, you can manuallyadd the programs for which you want Norton AntiVirusto turn on Quiet Mode to the Quiet Mode Programs list.When Norton AntiVirus detects a running instance ofa program that you added in the list, it automaticallyturns on Quiet Mode. When Quiet Mode is turned on,Norton AntiVirus suspends the background activitiesbut does not suppress alerts and notifications.

You can also add a running program to the Quiet ModePrograms list. However, when you add a runningprogram, Norton AntiVirus does not detect the currentrunning instance of the program to turn on Quiet Mode.Norton AntiVirus turns on Quiet Mode the next timewhen you execute the program.

You can also remove a running program from the QuietMode Programs list. However, if Quiet Mode is turnedon, it turns off only after the running instances of allthe programs in the list are complete. You cannot turnoff Quiet Mode by removing a program from the listwhen it runs.

You can view the details of the programs that you addto the Quiet Mode Programs list or remove from thelist in the Security History window.

Adding programs to User-Specified Programs

You can manually add the programs for which you wantNorton AntiVirus to turn on Quiet Mode to the QuietMode Programs list. When you execute the programthat you added to the list, Norton AntiVirus detects theprogram and turns on Quiet Mode.

You can also add a running program to the QuietModePrograms list. However, when you add a runningprogram, Norton AntiVirus does not detect the currentrunning instance of the program to turn on Quiet Mode.

179Protecting your files and dataAbout the Norton AntiVirus scans

Page 180: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Norton AntiVirus turns on Quiet Mode the next timewhen you execute the program.

You can only add the programs that have .exe fileextension to the Quiet Mode Programs list.

To add a program

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Silent Mode Settings.

4 In the Silent Mode Settings, under Quiet Mode onDetectionof, in the User-SpecifiedPrograms row,click Configure.

5 In the Quiet Mode Programs window, click Add.

6 In the Add Program dialog box, navigate to thelocation of the file that you want to add to the QuietMode Programs list.

7 Select the file, and then click Open.

8 Click Apply.

9 In the Quiet Mode Programs window, click OK.

Removing programs from User-Specified Programs

You can remove a program from the Quiet ModePrograms list. After you remove a program, NortonAntiVirus does not turn on Quiet Mode the next timewhen it detects a running instance of the program.

You can also remove a running program from the QuietModePrograms list. However, if Quiet Mode is turnedon, it turns off only after the running instances of allthe programs in the list are complete. You cannot turnoff Quiet Mode by removing a program from the listwhen it runs.

To remove a program

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Silent Mode Settings.

Protecting your files and dataAbout the Norton AntiVirus scans

180

Page 181: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

4 Under Quiet Mode on Detection of, in theUser-Specified Programs row, click Configure.

5 In the Quiet Mode Programs window, select theprogram that you want to delete, and then clickRemove.

6 In the confirmation dialog box, click Yes.

7 In the Quiet Mode Programs window, click Applyand then click OK.

About boot time protectionThe boot time protection feature provides enhancedsecurity level from the time you start your computer.It ensures better security by running all the necessarycomponents that are required for computer protectionas soon as you start your computer.

To protect your computer during boot time, you mustconfigure the EnableBootTimeProtection option. Toaccess the Enable Boot Time Protection option, go tothe Norton AntiVirus main window, and then clickSettings > Computer > Real Time Protection.

You can use the following options to configure EnableBoot Time Protection:

1 AggressiveProvides maximum protection during yourcomputer start time.

This option ensures complete protection during theboot time as Auto-Protect starts functioning as soonas you start your computer.

1 NormalProvides enhanced protection during your computerstart time without compromising your computer'sboot performance.

When you select this option, the drivers andplug-ins start functioning during the computer starttime before their specified time delay. This optionensures better boot performance along with goodsecurity levels.

181Protecting your files and dataAbout the Norton AntiVirus scans

Page 182: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

1 OffTurns off boot time protection.

If you turn off the Enable Boot Time Protectionoption, the protection level of your computerreduces.

Configuring boot time protection

The boot time protection feature provides enhancedsecurity level from the time you start your computer.As soon as you start your computer, Norton AntiVirusstarts Auto-Protect and all required drivers andplug-ins start functioning. This feature ensures higherlevel of security from the moment you turn on yourcomputer.

To configure boot time protection

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, in the left pane, click RealTime Protection.

3 In the Enable Boot Time Protection row, click onone of the settings. Your options are:

1 Aggressive

1 Normal

1 Off

4 Click Apply, and then click OK.

About Early Launch Anti-Malware ProtectionThe early launch anti-malware protection featureprovides enhanced security level when you start yourcomputer. It ensures better security by running all thenecessary components of Norton AntiVirus that arerequired to block any malware from functioning whenyou start your computer.

To enable early launch anti-malware protection, go tothe Norton AntiVirus main window, and then click

Protecting your files and dataAbout the Norton AntiVirus scans

182

Page 183: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Settings > Computer > Real Time Protection > EarlyLaunch Anti-Malware Protection > On.

By default this option is turned off.

w This option is available only on Windows 8.

Turning on or turning off Early Launch Anti-Malware Protection

The Early Launch Anti-Malware Protection featureprovides enhanced security level during the boot timewhen you start your computer. It ensures betterprotection by running all the necessary componentsof Norton AntiVirus that are required to block anymalware from functioning when you start yourcomputer.

w This option is available only on Windows 8.

To turn on or turn off early launch anti-malwareprotection

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, in the left pane, clickComputer Scan.

3 In the EarlyLaunchAnti-MalwareProtection row,do one of the following:

1 To turn on Early Launch Anti-MalwareProtection, move the On/Off switch to the leftto the On position.

1 To turn off Early Launch Anti-MalwareProtection, move the On/Off switch to the rightto the Off position.

4 In the Settings window, click Apply, and then clickOK.

183Protecting your files and dataAbout the Norton AntiVirus scans

Page 184: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Protecting your files and dataAbout the Norton AntiVirus scans

184

Page 185: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

This chapter includes the following topics:

1 What to do if a security risk is found

What to do if a security risk is foundYour product provides many solutions and features forhandling viruses and other security threats that itdetects.

When Norton AntiVirus detects a security risk on yourcomputer, you must take appropriate action on therisk. Norton AntiVirus notifies you when it detects asecurity risk. You can view details about the risk in thewindow that appears and select an action that you wantNorton AntiVirus to perform on the risk.

By default, Norton AntiVirus removes the security riskfrom your computer and quarantines it. However, youcan restore the file from the Quarantine to its originallocation and exclude it from future scans.

w Exclude a program from Norton AntiVirus scans onlyif you are confident that the program is safe. Forexample, if another program relies on a security riskprogram to function, you might decide to keep theprogram on your computer.

In some cases, Norton AntiVirus requires yourattention to manually resolve the detected securityrisk. You can access the Symantec Security ResponseWeb site and refer the manual removal instructions.

4Responding tosecurity issues

Page 186: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

In some cases, Norton AntiVirus might not identify anitem as a security threat, but you might suspect thatthe item is infected. In such cases, you can submit theitem to Symantec for further analysis.

In addition, your product provides solutions forsecurity risks, such as spyware and adware.

About detecting viruses, spyware, and other risksViruses and other security threats can be detectedduring a manual or scheduled scan. Auto-Protectdetects these threats when you perform an action withan infected file. Threats can also appear during aninstant messenger session, when you send an emailmessage, or during a manual or scheduled scan.

Security risks, such as spyware and adware, can alsobe detected when these activities are performed.

The files that can potentially infect your system whenyour computer first starts up are scanned first.

These files include the following:

1 Files that are associated with the processes that arecurrently running in memory

1 Files with startup folder entries

1 Files with system start INI file entries

1 Files with system start batch file entries

1 Files that the system start registry keys refers

If an infected file is detected during this portion of themanual scan, it is repaired or removed. Anyunnecessary references are also removed from yourcomputer. Before attempting to repair, quarantine, ordelete any infected file that has a process running inmemory, your product attempts to terminate theprocess. You are alerted and prompted to close allunnecessary programs before the process is terminated.

You can view information about detected viruses andother security threats in Security History.

Responding to security issuesWhat to do if a security risk is found

186

Page 187: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Security History also includes information aboutspyware, adware, and other security risks.

Reviewing Auto-Protect notificationsAuto-Protect scans files for viruses, worms, and Trojanhorses when you perform an action with them, suchas moving them, copying them, or opening them.

It also scans for spyware, adware, and other securityrisks.

If Auto-Protect detects suspicious activity, it logs anotification in Security History that tells you that arisk was found and resolved.

If Auto-Protect detect one or more viruses it eitherrepairs or deletes the viruses and notifies you. Thenotification provides information on which file wasrepaired or deleted and which virus, Trojan horse, orworm infected the file. No further action is necessary.

To review Auto-Protect notifications

1 In the Norton AntiVirus main window, clickAdvanced.

2 In the Computer Protection pane, click History.

187Responding to security issuesWhat to do if a security risk is found

Page 188: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

3 In the Show drop-down list, select the category forwhich you want to review Auto-Protect alerts.Your options are:

Review Auto-Protectnotifications that youreceived in the last sevendays.

Recent History

Review all of theAuto-Protect notificationsthat you have received.

Full History

Review all of the resolvedsecurity threats.

The Resolved SecurityRisks category includesthe infected files thatNorton AntiVirus repairs,removes, or quarantines.

Resolved Security Risks

Review the list ofunresolved security risks.

The Unresolved SecurityRisks category includesthe infected files forwhich Norton AntiViruswas not able to take anyaction. This categorymostly includes thelow-level risks thatrequire your attention fora suitable action.

Unresolved Security Risks

Responding to security issuesWhat to do if a security risk is found

188

Page 189: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

4 In the right pane, click the Options link.The option name appears as Restore & Options forfew items.If one or more security risks such as spyware arefound, you can take action on these items, ifrequired.

189Responding to security issuesWhat to do if a security risk is found

Page 190: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

5 In the Threat Detected window, select theappropriate action on the risk.The following are some of the options that areavailable in the Threat Detected window:

Returns the selectedQuarantine item to its

Restore & Exclude this file

original location andexcludes the item frombeing detected in thefuture scans.

This option is availablefor the detected viral andnon-viral threats.

Excludes the security riskfrom future scan.

Exclude this program

Norton AntiVirus adds thesecurity risk to theappropriate exclusionslist.

Lets you resolve the riskusing a manual fix tool.

Manual Fix (recommended)

If you resolve a threatmanually, you mustremove the threatinformation from theSecurity Historywindow.

Removes the security riskfrom your computer andquarantines it.

Remove this file (may causebrowser to close)(recommended)

This option is availablefor the security risks thatrequire your attention.

Responding to security issuesWhat to do if a security risk is found

190

Page 191: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Removes the selectedsecurity risk from thecomputer andquarantines it.

This option is availablefor the security risks thatrequire your attention formanual removal.

This option is alsoavailable for the securityrisks that are manuallyquarantined.

Remove this file (may causebrowser to close)

Removes the selectedsecurity risk item fromthe Security History log.

Remove from history

Takes you to theSymantec SecurityResponse Web site.

This option is availablefor the security risks thatrequire your attention formanual removal. You canrefer the SymantecSecurity Response Website for manual removalinstructions or otherinformation about therisk.

Get help (recommended)

191Responding to security issuesWhat to do if a security risk is found

Page 192: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Sends the security risk toSymantec.

In some cases, NortonAntiVirus might notidentify an item as asecurity threat, but youmight suspect that theitem is infected. In suchcases, you can use thisoption to submit the itemto Symantec for furtheranalysis.

Submit to Symantec

Responding to Worm Blocking alertsIf a program tries to email itself or a copy of itself, itcould be a worm trying to spread through email. Aworm can send itself or send a copy of itself in an emailmessage without any interaction with you.

Worm Blocking continually scans outgoing emailattachments for worms. If it detects a worm, youreceive an alert notifying you that a malicious wormwas found.

Worm Blocking alert appears only when you enablethe Ask me what to do option under How to respondwhen an outbound threat is found in the EmailAntivirus Scan window. If the Ask me what to dooption is disabled Norton AntiVirus automaticallyquarantines the detected worm and notifies you.

The alert presents you with options and asks you whatto do. If you do not send an email message at that time,then it is probably a worm and you should quarantinethe file.

Responding to security issuesWhat to do if a security risk is found

192

Page 193: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To respond to Worm Blocking alerts

4 In the alert window, select the action that you wantto take. Your options are:

Permanently stops theworm by putting it inSecurity History. While inSecurity History, theworm is unable to spread.This Quarantine is thesafest action.

Quarantine

Sends the email messagefor which you havereceived the wormblocking alert. If youallow the email message,it could infect therecipient's computer.Select this option if youare sure that the email isnot infected with a worm.

Allow

Ignores this risk.Ignore

If a malicious worm is found, it should be quarantined.

To quarantine a worm-infected file

1 In the alert, in the drop-down list, click Quarantine.

193Responding to security issuesWhat to do if a security risk is found

Page 194: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

2 After the worm has been quarantined, perform thefollowing tasks:

1 Run LiveUpdate to ensure that you have thelatest definition updates.

See “About Program and Definition Updates”on page 60.

1 Scan your computer.

See “Running a Full System Scan” on page 125.

If nothing is detected, submit the infected file toSymantec Security Response. Also, indicate that thefile was detected and that you have scanned it withthe latest definition updates. Symantec SecurityResponse replies to you within 48 hours.

About responding to risks detected during a scanAt the end of a scan, the Results Summary windowprovides the summary of the scan results. You can usethe ThreatsDetected window to resolve any items thatwere not automatically resolved during the scan.

You can use the Show drop-down list that is availablein the Security History window to resolve any itemsthat were not automatically resolved during the scan.The Recommended Action section in the SecurityHistory window displays the action that you shouldtake to resolve the security threat.

About actions when Norton AntiVirus cannot repaira file

One of the common reasons that Norton AntiViruscannot automatically repair or delete an infected fileis that you do not have the current definition updates.Run LiveUpdate, and then scan again.

Before running LiveUpdate to receive protectionupdates, ensure that Quick Scan is turned on (it isturned on by default). After LiveUpdate retrieves thelatest definition updates, Quick Scan automaticallychecks for the infections that have processes running

Responding to security issuesWhat to do if a security risk is found

194

Page 195: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

in memory. It also checks for the infections that thestart-up files and folders refer.

If that does not work, read the information on theThreatsDetected window to identify the types of filesthat cannot be repaired. You can take one of thefollowing actions, depending on the file type:

You can view the file type ofthe detected risk. Thisinformation helps you todecide the action that can betaken depending on the filetype.

For example, you can view theinfected files with thefollowing file nameextensions (any file can beinfected):1 .exe

1 .doc

1 .dot

1 .xls

Use the Threats Detectedwindow to solve the problem.

Infected files

Replace using your operatingsystem disks.

Hard disk master boot record,boot record, or system files(such as IO.SYS orMSDOS.SYS) and floppy diskboot record and system files

Resolving a suspected security riskNorton AntiVirus needs to close a suspected securityrisk program to resolve it.

195Responding to security issuesWhat to do if a security risk is found

Page 196: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To resolve the suspected security risk

4 Save all open files, and then click Go.If you do not respond to this dialog box, it closesautomatically without resolving and closing thesuspected security risk.

Responding to security issuesWhat to do if a security risk is found

196

Page 197: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

This chapter includes the following topics:

1 About Download Insight

1 About Intrusion Prevention

1 About Vulnerability Protection

1 About the types of security risks

1 About configuring POP3 and SMTP ports

1 About the Network Security Map

1 About Network Cost Awareness

About Download InsightDownload Insight provides information about thereputation of any executable file that you downloadfrom the supported portals. The reputation detailsindicate whether the downloaded file is safe to install.You can use these details to decide the action that youwant to take on the file.

Some of the supported portals are:

1 Internet Explorer (Browser)

1 Opera (Browser)

1 Firefox (Browser)

1 Chrome (Browser)

5Protecting Internetactivities

Page 198: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

1 AOL (Browser)

1 Safari (Browser)

1 Yahoo (Browser)

1 MSN Explorer (Browser, E-mail & Chat)

1 QQ (Chat)

1 ICQ (Chat)

1 Skype (Chat)

1 MSN Messenger (Chat)

1 Yahoo Messenger (Chat)

1 Limewire (P2P)

1 BitTorrent (P2P)

1 Thunder (P2P)

1 Vuze (P2P)

1 Bitcomet (P2P)

1 uTorrent (P2P)

1 Outlook (E-mail)

1 Thunderbird (E-mail)

1 Windows Mail (E-mail)

1 Outlook Express (E-mail)

1 FileZilla (File Manager)

1 UseNext (Download Manager)

1 FDM (Download Manager)

1 Adobe Acrobat Reader (PDF viewer)

Based on the type of portal you use to download yourfile, Norton AntiVirus does one of the following:

1 Analyzes the file based on its reputation detailswhen the download is complete.

1 Analyzes the file based on its reputation detailswhen the file is accessed.

Download Insight uses the file analysis results toprovide you the reputation details of the file. The basicreputation levels of the files are good, bad, unproven,

Protecting Internet activitiesAbout Download Insight

198

Page 199: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

and poor. Based on the reputation levels, the files canbe broadly classified as follows:

Includes the files that are eitherNorton trusted or User trusted.

Safe files have good reputationlevels. These files do not harmyour computer. By default,Auto-Protect allows theexecution of the safe files.

Safe

Includes the files that NortonAntiVirus identifies as a securityrisk or a threat.

Unsafe files are characterized bybad or poor reputation levelsand Norton AntiVirus removesthem from your computer.

Unsafe

Includes the files that areneither safe nor unsafe.

Unknown files have unprovenreputation. These files mightharm your computer. In the caseof an unknown file, DownloadInsight notifies you that it isunsure of the reputation level ofthe file. You can use the ViewDetails link in the notificationsto view more details of the file.

For unknown files, NortonAntiVirus lets you decide theaction that you want to performon the file. For example, you canrun a file, stop the file fromrunning, or remove the file fromyour computer.

Unknown

199Protecting Internet activitiesAbout Download Insight

Page 200: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

By default, Download Insight lets you install safe files.For files of unknown reputation levels, DownloadInsight prompts you to select an action that you wantto perform on the file. In case of an unsafe file,Download Insight informs you that Norton AntiVirushas detected the file as a threat and has removed thefile.

Based on the reputation details that the DownloadInsight notifications provide for the files that needattention, you can take an action on the file. TheDownloadInsight window provides the various optionsthat let you select an action. The options that appearin the window vary depending on the reputation levelof the downloaded file. The following are some of theoptions that are available in this window:

Lets you install the executableprogram.

Run this program

Lets you cancel the installationof the executable program.

Cancel run

Lets you remove the file fromyour computer.

Remove this file frommysystem

Security History logs details of all events thatDownload Insight processes and notifies. It alsocontains information about the safety level of the fileand the action that you take on the file, if any. You canview these details in the Download Insight categoryin Security History.

When you turn off Auto-Protect, Norton AntiVirusautomatically turns off Download Insight. In this case,your computer is not adequately protected fromInternet threats and security risks. Therefore, ensurethat you always keep Auto-Protect turned on to protectyour computer from security risks.

Protecting Internet activitiesAbout Download Insight

200

Page 201: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

When Silent Mode is turned on, Norton AntiVirussuppresses the Download Insight notifications.

Turning off or turning on Download IntelligenceDownload Insight protects your computer against anyunsafe file that you may run or execute after youdownload it using a supported Web browser. By default,the DownloadIntelligence option is turned on. In thiscase, Download Insight notifies you about thereputation levels of any executable file that youdownload. The reputation details that Download Insightprovides indicate whether the downloaded file is safeto install.

There may be times when you want to turn offDownload Insight. For example, if you want todownload an unsafe file. In this case, you must turn offDownload Insight so that Norton AntiVirus lets youdownload the file and does not remove it from yourcomputer.

You can use the DownloadIntelligence option to turnoff or turn on Download Insight.

To turn off Download Intelligence

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the Network tab.

3 In the left pane, click Download Intelligence.

4 In the DownloadIntelligence row, move the On/Offswitch to the right to the Off position.

5 In the Settings window, click Apply.

6 In the Security Request dialog box, in the Selectthe duration drop-down list, select how long youwant to turn off Download Insight, and then clickOK.

7 In the Settings window, click Apply, and then clickOK.

201Protecting Internet activitiesAbout Download Insight

Page 202: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To turn on Download Intelligence

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the Network tab.

3 In the left pane, click Download Intelligence.

4 In the DownloadIntelligence row, move the On/Offswitch to the left to the On position.

5 In the Settings window, click Apply, and then clickOK.

Configuring the Download Insight Notifications optionYou can use the DownloadInsightNotifications optionto choose when you want Download Insight to displaynotifications.

By default, the DownloadInsightNotifications optionis set to On. Based on the type of portal you use todownload your file, Norton AntiVirus does one of thefollowing:

1 Notifies you each time when you download anexecutable file.

1 Notifies you only when you download a file that isinfected with a local virus identification. If the filethat you download is infected with a cloud virusidentification, Norton AntiVirus removes the filefrom your computer and notifies you with the threatdetails.

When the Download Insight Notifications option isset to RisksOnly, Download Insight notifies only whenyou download an infected or a suspicious executablefile.

Setting the Download Insight Notifications to RisksOnly does not turn off analysis of all the otherexecutable files that you download. Whether or notyou receive notifications of all files, Security Historykeeps a record of all the Download Insight activities.You can review the summary of the Download Insightalerts and notifications in Security History.

Protecting Internet activitiesAbout Download Insight

202

Page 203: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To configure the Download Insight Notifications option

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the Network tab.

3 In the left pane, click Download Intelligence.

4 Under Download Intelligence, in the DownloadInsight Notifications row, do one of the following:

1 To receive Download Insight notifications onlyfor the infected or the suspicious executable filesthat you download, move the DownloadInsightNotifications switch to the right to the RisksOnly position.

1 To receive Download Insight notifications forall files that you download, move the DownloadInsight Notifications switch to the left to theOn position.

5 In the Settings window, click Apply, and then clickOK.

Configuring the Show Report on Launch of Filesoption

The Show Report on Launch of Files option lets youspecify when and for what type of file you want to beprompted to select a suitable action. For example, youcan specify the type of downloaded files for whichDownload Insight asks you to decide what to do withthe file and how frequently these prompts for a suitableaction must appear.

203Protecting Internet activitiesAbout Download Insight

Page 204: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

You can use the following options to configure ShowReport on Launch of Files:

When you set the Show Reporton Launch of Files option toAlways, Download Insightprompts you for a suitable actionin case of safe and unknownfiles. In this case, the DownloadInsight window appearswhenever you try to launch anydownloaded file that has a safeor an unknown reputation score.In this window, you can viewdetails about the file and theoptions that let you select asuitable action for the file.

In the case of unsafe files,Norton AntiVirus identifies themas threats and removes them.

Always

Protecting Internet activitiesAbout Download Insight

204

Page 205: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

When you set the Show Reporton Launch of Files option toUnproven Files Only, DownloadInsight prompts you to select asuitable action for unknown filesonly. In this case, the DownloadInsight window appearswhenever you try to launch anydownloaded file that has anunknown reputation score. Inthis window, you can viewdetails about the file and theoptions that let you select asuitable action for the file.

By default, the Show Report onLaunch of Files option is set toUnproven Files Only. In thiscase, Norton AntiVirus allows theexecution of the safe fileswithout prompting you for asuitable action. In the case ofunsafe files, Norton AntiVirusidentifies them as threat andremoves them.

Unproven Files Only

205Protecting Internet activitiesAbout Download Insight

Page 206: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

When you set the Show Reporton Launch of Files option toNever, Download Insight doesnot prompt you to select asuitable action for any type offile that you download. In thiscase, the Download Insightwindow does not appearwhenever you try to launch anydownloaded file.

However, if the Alert on PoorStability option is turned on,Download Insight prompts youto select a suitable action whenyou try to download an unstablefile.

In case of unsafe files, NortonAntiVirus identifies them asthreat and removes them.

The alert messages that yousuppress and the activity detailscan be reviewed at any time inSecurity History.

Never

To configure the ShowReport on Launch of Files option

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the Network tab.

3 In the left pane, click Download Intelligence.

Protecting Internet activitiesAbout Download Insight

206

Page 207: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

4 Under Download Intelligence, in the ShowReporton Launch of Files row, do one of the following:

1 If you want Download Insight to prompt you fora suitable action in case of safe and unknownfiles, move the Show Report on Launch of Filesswitch to the Always position.

1 If you want Download Insight to prompts you toselect a suitable action for unknown files only,move the ShowReportonLaunchofFiles switchto the Unproven Files Only position.

1 If you do not want Download Insight to promptyou to select a suitable action for any type of file,move the ShowReportonLaunchofFiles switchto the Never position.

5 In the Settings window, click Apply, and then clickOK.

Turning on or turning off Alert on Poor StabilityWhen you turn on the Alert on Poor Stability option,Download Insight prompts you to select a suitableaction when you try to download an unstable file.

When you set the Show Report on Launch of Filesoption to Never, Download Insight does one of thefollowing:

1 Does not prompt you to select a suitable action forany type of file that you download if the Alert onPoor Stability option is turned off. The DownloadInsight window does not appear whenever you tryto open any downloaded file.

1 Prompts you to select a suitable action when youtry to download an unstable file if the AlertonPoorStability option is turned on. Norton AntiVirusidentifies unsafe files as security threat andremoves them.

By default, the AlertonPoorStability option is turnedoff.

207Protecting Internet activitiesAbout Download Insight

Page 208: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To turn on or turn off Alert on Poor Stability

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the Network tab.

3 In the left pane, click Download Intelligence.

4 Under DownloadIntelligence, in the AlertonPoorStability row, do one of the following:

1 To turn on Alert on Poor Stability, move theOn/Off switch to the left to the On position.

1 To turn off Alert on Poor Stability, move theOn/Off switch to the right to the Off position.

5 Click Apply, and then click OK.

About Intrusion PreventionIntrusion Prevention scans all the network traffic thatenters and exits your computer and compares thisinformation against a set of attack signatures. Attacksignatures contain the information that identifies anattacker's attempt to exploit a known operating systemor program vulnerability. Intrusion Prevention protectsyour computer against most common Internet attacks.

For more information about the attacks that IntrusionPrevention blocks, go to the following URL:

http://www.symantec.com/business/security_response/attacksignatures

If the information matches an attack signature,Intrusion Prevention automatically discards the packetand breaks the connection with the computer that sentthe data. This action protects your computer from beingaffected in any way.

Intrusion Prevention relies on an extensive list ofattack signatures to detect and block suspiciousnetwork activity. Norton AntiVirus runs LiveUpdateautomatically to keep your list of attack signatures upto date. If you do not use Automatic LiveUpdate, youshould manually run LiveUpdate once a week.

Protecting Internet activitiesAbout Intrusion Prevention

208

Page 209: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Turning off or turning on Intrusion Preventionnotifications

You can choose whether you want to receivenotifications when Intrusion Prevention blockssuspected attacks. Whether or not you receivenotifications, Intrusion Prevention activities arerecorded in Security History. The Security Historyentries include information about the attackingcomputer and information about the attack.

You can choose whether you want to receivenotifications when Intrusion Prevention blockssuspected attacks based on a particular signature.

To turn off or turn on Intrusion Prevention notifications

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the Network tab.

3 In the left pane, click Intrusion Prevention.

4 Under Intrusion Prevention, in the Notificationsrow, do one of the following:

1 To turn off notifications, move the On/Off switchto the right to the Off position.

1 To turn on notifications, move the On/Off switchto the left to the On position.

5 In the Settings window, click Apply.

6 Click OK.

To turn off or turn on an individual Intrusion Preventionnotification

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the Network tab.

3 In the left pane, click Intrusion Prevention.

4 Under Intrusion Prevention, in the IntrusionSignatures row, click Configure.

5 In the IntrusionSignatures window, click an attacksignature, and then click Properties.

209Protecting Internet activitiesAbout Intrusion Prevention

Page 210: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

6 In the Signature Properties window, uncheck orcheck Notify me when this signature is detected.

7 Click OK.

8 In the Intrusion Signatures window, click OK.

Excluding or including attack signatures in monitoringIn some cases, benign network activity may appearsimilar to an attack signature. You may receiverepeated notifications about possible attacks. If youknow that the attacks that trigger these notificationsare safe, you can create exclusion for the attacksignature that matches the benign activity.

Each exclusion that you create leaves your computervulnerable to attacks.

If you have excluded the attack signatures that youwant to monitor again, you can include them in the listof active signatures.

To exclude attack signatures from being monitored

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the Network tab.

3 In the left pane, click Intrusion Prevention.

4 Under Intrusion Prevention, in the IntrusionSignatures row, click Configure.

5 In the Intrusion Signatures window, uncheck theattack signatures that you want to exclude.

6 Click OK.

To include the attack signatures that were previouslyexcluded

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the Network tab.

3 In the left pane, click Intrusion Prevention.4 Under Intrusion Prevention, in the Intrusion

Signatures row, click Configure.

Protecting Internet activitiesAbout Intrusion Prevention

210

Page 211: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

5 In the Intrusion Signatures window, check theattack signatures that you want to include.

6 Click OK.

Turning off or turning on AutoBlockWhen an attack is detected from a computer, the attackis automatically blocked to ensure that your computeris safe. If a different attack signature is detected fromthe same computer, Norton AntiVirus activatesAutoBlock. The AutoBlock feature blocks all trafficbetween your computer and the attacking computerfor a specific time period. During this period, AutoBlockalso blocks the traffic that does not match an attacksignature.

w You can specify the period for which you want NortonAntiVirus to block the connections from attackingcomputers. By default Norton AntiVirus blocks alltraffic between your computer and the attackingcomputer for a period of 30 minutes.

AutoBlock stops traffic between your computer and aspecific computer. If you want to stop all traffic to andfrom your computer, you can use the Block AllNetwork Traffic option.

If AutoBlock blocks a computer or computers that youneed to access, you can turn off AutoBlock.

To turn off or turn on AutoBlock

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the Network tab.

3 In the left pane, click Intrusion Prevention.

4 Under Intrusion Prevention, in the IntrusionAutoBlock row, click Configure.

211Protecting Internet activitiesAbout Intrusion Prevention

Page 212: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

5 In the Intrusion AutoBlock window, underAutoBlock, do one of the following:

1 To turn off Intrusion AutoBlock, click Off.

1 To turn on Intrusion AutoBlock, click On(Recommended), and then in the AutoBlockattacking computers for drop-down list, selecthow long you want to turn on AutoBlock.

6 Click OK.

Unblocking AutoBlocked computersIn some cases, benign network activity can appear tobe similar to an attack and AutoBlock blocks thenetwork activity automatically to ensure that yourcomputer is safe. The list of computers that AutoBlockhas currently blocked may include the computer thatyou should be able to communicate with.

If a computer that you need to access appears on thelist of blocked computers, you can unblock it. You maywant to reset your AutoBlock list if you have changedyour protection settings. To reset the AutoBlock list,you can unblock all of the computers that are on thelist at one time.

To unblock AutoBlocked computers

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the Network tab.

3 In the left pane, click Intrusion Prevention.

4 Under Intrusion Prevention, in the IntrusionAutoBlock row, click Configure.

5 In the Intrusion AutoBlock window, underComputers currently blocked by AutoBlock, doone of the following:

1 To unblock one computer, select its IP address,and then click Unblock.

6 Click OK.

Protecting Internet activitiesAbout Intrusion Prevention

212

Page 213: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

About Vulnerability ProtectionVulnerability Protection is a component of IntrusionPrevention System. Vulnerability Protection providesinformation about the susceptibility of the programsthat may be on your computer against maliciousattacks. It also provides information about the knownattacks that they are protected from.

Vulnerabilities are flaws in your programs or youroperating system that can create weaknesses in overallsecurity of your system. Improper computerconfigurations or security configurations also createvulnerabilities. External attackers exploit thesevulnerabilities and perform malicious actions on yourcomputer. Examples of such malicious attacks areactive desktop monitoring, keylogging, and hacking.Such attacks can slow down the performance of yourcomputer, cause program failure, or expose yourpersonal data and confidential information to thehackers.

Norton AntiVirus provides signature-based solutionsto protect your computer from the most commonInternet attacks. Attack signatures contain theinformation that identifies an attacker’s attempt toexploit a known vulnerability in your operating systemor the programs that are installed on your computer.The Intrusion Prevention feature of Norton AntiVirususes an extensive list of attack signatures to detect andblock suspicious network activity.

Vulnerability Protection lets you view the correlationbetween the vulnerabilities that your computer isprotected against and the programs that may containthese vulnerabilities. For example, if Internet Explorerdoes not handle certain HTTP responses, it can resultin a vulnerability that can be exploited. In this case,Vulnerability Protection lists Internet Explorer as avulnerable program. It also provides details about thesignatures that Intrusion Prevention uses to detect anyattempt to exploit this vulnerability.

213Protecting Internet activitiesAbout Vulnerability Protection

Page 214: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Viewing the list of vulnerable programsThe Vulnerability Protection window lets you viewthe extensive list of programs with the knownvulnerabilities that Norton AntiVirus protects youagainst.

For each program, you can view details such as thename of the program, its vendor, and the number ofvulnerabilities that the program contains. You can alsoview more details about the vulnerabilities by clickingon the program name.

To view the list of vulnerable programs

1 In the Norton AntiVirus main window, clickAdvanced.

2 In the NetworkProtection pane, click VulnerabilityProtection.

3 In the Vulnerability Protection window, view thelist of vulnerable applications.

4 After you finish viewing the list, click Close.

Viewing details about a vulnerable applicationThe VulnerabilityProtection window displays the listof the programs on your computer that are susceptibleto malicious attacks. In addition, you can view detailsof the vulnerabilities that a program contains. TheProgram Vulnerability Details window displays thenames of the attack signatures that IntrusionPrevention uses to detect any attempts to exploit thevulnerabilities in the program.

You can click an attack signature to get additionalinformation about the signature in the SymantecSecurity Response Web site.

The Intrusion Signatures window of IntrusionPrevention lets you view a list of attack signatures.Intrusion Prevention relies on this list of attacksignatures to detect and block suspicious activity. Youcan uncheck a signature from the list, if you do notwant Norton AntiVirus to monitor the signature. The

Protecting Internet activitiesAbout Vulnerability Protection

214

Page 215: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Program Vulnerability Details list does not includeany signature that you disable in the IntrusionSignatures window. By default, all the signatures inthe IntrusionSignatures window are turned on. Unlessyou have a good reason to disable a signature, youshould leave the signatures turned on. If you disable asignature, your computer may be vulnerable to attack.

To view details about a vulnerable application

1 In the Norton AntiVirus main window, clickAdvanced.

2 In the NetworkProtection pane, click VulnerabilityProtection.

3 In the Vulnerability Protection window, in theProgram column, click the program name for whichyou want to view the details.

4 In the ProgramVulnerabilityDetails window, viewthe signature details of the program.

5 If you want to view additional information aboutthe signature, then click the signature name.

6 After you finish viewing the vulnerability details,in the ProgramVulnerabilityDetails window, clickClose.

7 In the VulnerabilityProtection window, click Close.

About the types of security risksSecurity risks, such as spyware and adware, cancompromise your personal information and privacy.Spyware and adware programs are closely related. Insome cases, their functionalities might overlap; butwhile they both collect information about you, the typesof information that they collect can differ.

Spyware programs might put you at risk for identitytheft or fraud. These programs might log yourkeystrokes, capture your email and instant messagingtraffic. These programs also steal sensitive personalinformation such as passwords, login IDs, or credit

215Protecting Internet activitiesAbout the types of security risks

Page 216: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

card numbers. These programs can then send yourcompromised data to other people.

Adware displays advertisements on your computer andcollects information about your Web browsing habits.It then gives this data to companies that can send youadvertisements based on these preferences.

Tracking cookies are the small files that programs canplace on your computer to track your computingactivities. Tracking cookies can then report thatinformation back to a third party.

Some programs rely on other programs that areclassified as security risks to function. For example, ashareware or freeware program that you downloadmight use adware to keep its price low. In this case,you might want to allow the security risk program toremain on your computer. Also, you might need torestore the security risk program if Spyware Protectionhas removed it.

Norton AntiVirus allows joke programs and otherlow-risk items to be installed on your computer bydefault. You can change your settings in the Settingswindow so that Norton AntiVirus detects these securityrisks.

Checking Antispyware settingsWhile the default settings provide maximum protectionfrom spyware, adware and other security risks, thesesettings are customizable.

To check Antispyware settings

1 In the Norton AntiVirus main window, clickSettings.

2 Under Real Time Protection, in the Antispywarerow, click Configure.

3 In the Antispyware window, check the category ofsecurity risks that you want Antispyware to detect.

4 Click OK.

Protecting Internet activitiesAbout the types of security risks

216

Page 217: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

About configuring POP3 and SMTP portsNorton AntiVirus automatically configures your emailprogram to protect it from viruses and other securitythreats. Norton AntiVirus supports all email accountsthat use non-SSL POP3 and SMTP communicationprotocols. Norton AntiVirus also scans all incomingand outgoing email messages.

Norton AntiVirus lets you manually configure yourPOP3 and SMTP email ports for email protection.Typically, your Internet service provider (ISP) providesyou the port numbers for your email program. If theSMTP and POP3 port numbers for your email programare different from the default port numbers, you mustconfigure Norton AntiVirus.

To ensure email protection, Symantec recommendsthat you check the POP3 and SMTP port numbers foryour email program. If they are not the default ports,add them to the ProtectedPorts window. To configurethe Protected Ports Settings option, go to the NortonAntiVirus main window, and then click Settings >Network > Message Protection > Protected PortSettings > Configure.

If you do not want Norton AntiVirus to protect a port,you can remove the port from the Protected Portswindow.

w You cannot remove the default SMTP port 25 and POP3port 110. Norton AntiVirus automatically protectsthese default ports.

Adding POP3 and SMTP ports to Protected PortsNorton AntiVirus supports all email programs that usePOP3 and SMTP communication protocols with defaultports. However, if your email program is not configuredwith the default ports, you can manually configureyour POP3 and SMTP email ports.

To ensure email protection, the POP3 and SMTP portnumbers must be protected. If the POP3 and SMTP port

217Protecting Internet activitiesAbout configuring POP3 and SMTP ports

Page 218: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

numbers are not the default ports, Symantecrecommends that you add the port numbers to theProtected Ports window.

To add POP3 and SMTP ports to Protected Ports

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the Network tab.

3 In the left pane, click Message Protection.

4 In the Protected Ports Settings row, clickConfigure.

5 In the Protected Ports window, click Add.

6 In the AddPorttoprotect window, in the PortTypedrop-down list, do one of the following:

1 To add the incoming email port, click POP3.

1 To add the outgoing email port, click SMTP.

7 In the Port box, type the port number.The port number must be between 1 and 65535.

8 Click OK.

9 In the Protected Ports window, click Apply, andthen click OK.

10 In the Settings window, click OK.

Removing an email port from Protected PortsIf you do not want Norton AntiVirus to protect a port,you can remove the port from the Protected Portswindow.

w Norton AntiVirus automatically protects the defaultSMTP port 25 and the default POP3 port 110. Youcannot remove these default ports.

To remove an email port from Protected Ports

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the Network tab.

3 In the left pane, click Message Protection.

Protecting Internet activitiesAbout configuring POP3 and SMTP ports

218

Page 219: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

4 In the Protected Ports Settings row, clickConfigure.

5 In the Protected Ports window, click the port thatyou want to remove, and then click Remove.

6 Click Apply and then click OK.

7 In the Settings window, click OK.

About the Network Security MapA home network typically consists of the computersand other devices that share your Internet connection.The Network Security Map helps you view and manageyour network.

After you configure Network Security Map, NortonAntiVirus automatically detects the devices that areconnected to your network and lists them in theNetwork Security Map. You can view devices andcustomize the Network Security Map to remotelymonitor the computers on which a Norton product isinstalled.

w Ensure that the computers that you want to remotelymonitor have a version of a Norton product thatsupports Remote Monitoring.

You can monitor the following items in the NetworkSecurity Map:

1 Security status of the computers that are connectedto the network

1 Status of the protection features of the computersthat are connected to the network

1 Subscription status and Norton product version ofthe computers that are connected to your network

1 Status of your wireless network connection

1 Connection status of the devices that are on thenetwork

1 The known, unknown, or intruder devices that areon your network

219Protecting Internet activitiesAbout the Network Security Map

Page 220: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

You can also modify details about a computer or devicethat is connected to your network.

Turning off or turning on Network Security OverviewThe Network Security Overview window provides abrief summary about the following features:

1 Wireless Security

1 Remote Monitoring

1 Network Map

1 Trust Controls

You can click each of the features and read thesummary to learn more about using Network SecurityMap to manage your home network. By default, theNetworkSecurityOverview window appears each timeyou open Network Security Map.

If you do not want to view the Network SecurityOverview window, you can turn it off. Turning off theNetwork Security Overview window does not affectthe performance or security of your computer.

w You can also turn off the NetworkSecurityOverviewwindow if you check Do not show this again optionthat is available at the bottom of the NetworkSecurityOverview window.

To turn off Network Security Overview

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the Network tab.

3 In the left pane, click Network Security Settings.

4 In the WelcomeScreen row, move the On/Off switchto the right to the Off position.

5 Click Apply.

6 Click OK.

To turn on Network Security Overview

1 In the Norton AntiVirus main window, clickSettings.

Protecting Internet activitiesAbout the Network Security Map

220

Page 221: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

2 In the Settings window, click the Network tab.

3 In the left pane, click Network Security Settings.

4 In the WelcomeScreen row, move the On/Off switchto the left to the On position.

5 Click Apply.

6 Click OK.

Viewing devices on the Network Security MapThe NetworkSecurityMap window provides a pictorialrepresentation of the devices on the network to whichyour computer is connected. You can view the detailsof each device, such as device name, security status,and IP address.

The Network Security Map window also provides thesecurity status of the following computers:

1 The computer on which you view the remotemonitoring status (MY PC)

1 The computers that are remotely monitored

Norton AntiVirus displays devices in the followingorder:

1 MY PC

1 Devices with online connection status

1 Devices with offline connection status

When you connect a new device to your network,Norton AntiVirus automatically refreshes the NetworkSecurity Map window and displays the device.

w Norton AntiVirus requires you to configure theSymantec Security Driver to open the Network SecurityMap. You cannot install the Symantec Security Driverwhen you run LiveUpdate. You can either allow theNorton LiveUpdate to complete or close the NortonLiveUpdate session before you install the SymantecSecurity Driver.

221Protecting Internet activitiesAbout the Network Security Map

Page 222: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To view devices on the Network Security Map

1 In the Norton AntiVirus main window, clickAdvanced.

2 Under NetworkProtection, click NetworkSecurityMap.

3 If the Product Configuration panel appears, clickContinue.The Product Configuration panel appears whenyou click Network Security Map for the first time.The ProductConfiguration panel helps you installSymantec Security Driver that is required to viewthe NetworkSecurityMap window. The process ofinstallation of the Symantec Security Driverdisrupts your network connection temporarily.

4 If the NetworkSecurityOverview window appears,click OK.The Network Security Overview window lets youview the summary of features of the NetworkSecurity Map. The Network Security Overviewwindow appears in the following instances:

1 When you open the Network Security Mapwindow for the first time

1 When you turn on Welcome Screen underNetwork Security Map in the Settings window

If you do not want to view the Network SecurityOverview window in the future, check Donotshowthis again before you click OK.

5 In the Network Details drop-down list, select thenetwork that lists the device for which you want tosee the details.

Protecting Internet activitiesAbout the Network Security Map

222

Page 223: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To view the details of a device on the Network SecurityMap

223Protecting Internet activitiesAbout the Network Security Map

Page 224: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

4 In the NetworkSecurityMap window, click a deviceicon.You can use the scroll arrows to view the devicesthat are listed in the network map.The device details section that is located below thenetwork map displays the following details:

Shows the name of the deviceDevice Name

For a computer, the NetworkSecurity Map displays theNetBIOS name by default.However, the Network SecurityMap displays the name of thedevice as NEW if it meets thefollowing conditions:

1 The device does not have aNetBIOS name

1 The device has a firewall thatis enabled

You can change the device namein the Edit Device Detailswindow.

Shows the name of the networkadapter manufacturer of thedevice

Adapter Manufacturer

The adapter manufacturer'sname is based on the physicaladdress (also known as MediaControl Access address or MACaddress) of the device.

Protecting Internet activitiesAbout the Network Security Map

224

Page 225: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Shows the category to which thedevice belongs

The device category iconprovides details on theconnection status and securitystatus. Norton AntiVirus labelsall unknown devices as NEW andsets the category as GENERICDEVICE.

This category may includecomputer-related devices, suchas printers, media devices, andgame consoles.

You can change the devicecategory in the Edit DeviceDetails window.

Category

Shows how well your computeris protected from threats, risks,and damage

w The security statusappears only for MY PC and thecomputers that are remotelymonitored.

Security Status

Shows the connection status ofRemote Monitoring

The statuses are:

1 ON

1 OFF

You can turn off RemoteMonitoring for an individualcomputer or for all thecomputers that you remotelymonitor.

Remote Monitoring

225Protecting Internet activitiesAbout the Network Security Map

Page 226: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Shows the status of theconnection

The statuses are:

1 ONLINE

1 OFFLINE

Connection

Shows the physical address (alsoknown as the Media AccessControl address or MAC address)of the computer or device

Physical Address

Shows the IP address of thecomputer or device

If you change the IP address ofa device, the updated IP addressappears in theNetwork SecurityMap window when you refreshthe list.

IP Address

Setting up Remote MonitoringYou can set up Remote Monitoring by allowingcomputers on your network to communicate with yourcomputer.

w Ensure that the computers that you want to remotelymonitor have a version of a Norton product thatsupports Remote Monitoring.

Norton AntiVirus requires a Passkey to set up RemoteMonitoring. You must type the same Passkey for allthe computers that you want to remotely monitor.

After you set up Remote Monitoring, you can connectany computer to your network and enter the samePasskey. Norton AntiVirus automatically identifies thecomputer and connects it to the Network Security Map.

Protecting Internet activitiesAbout the Network Security Map

226

Page 227: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To set up Remote Monitoring

1 In the Norton AntiVirus main window, clickAdvanced.

2 Under NetworkProtection, click NetworkSecurityMap.

3 On the left side of the Network Security Mapwindow, under Remote Monitoring, click Setup.

4 In the Remote Monitoring Setup window, type aPasskey.The Passkey should be between 6 and 20 charactersin length. The Passkey is case sensitive.

5 Under Choose the default mode for ComputerDiscovery, select one of the following options:

Lets your computer alwaysdiscover other computers thatare connected to the network

Computer Discoveryalways on

Lets your computer discoverother computers that areconnected to the network whenthe Network Security Mapwindow is open

Computer Discovery ononly when NetworkSecurity Map screen isdisplayed

6 Click OK.

7 Set up Remote Monitoring for all other computersthat you want to monitor remotely.

Turning off Remote MonitoringWhen you turn off Remote Monitoring, you stop remotemonitoring of the computers that are connected toyour network.

You can turn off Remote Monitoring for the following:

1 All of the computers that you remotely monitor

1 An individual computer that you remotely monitor

227Protecting Internet activitiesAbout the Network Security Map

Page 228: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

w You can turn off Remote Monitoring only after youcomplete the Remote Monitoring Setup process.

To turn off Remote Monitoring for all computers

1 In the Norton AntiVirus main window, ClickAdvanced.

2 Under NetworkProtection, click NetworkSecurityMap.

3 On the left side of the Network Security Mapwindow, under Remote Monitoring, click Disable.

4 In the confirmation dialog box, click Yes.

To turn off Remote Monitoring for an individualcomputer

1 In the Norton AntiVirus main window, clickAdvanced.

2 Under NetworkProtection, click NetworkSecurityMap.

3 In the Network Security Map window, in thenetwork map, click the computer for which you wantto disable Remote Monitoring.

4 In the device details area, next to RemoteMonitoring, click Disable.

5 In the confirmation dialog box, click Yes.

Adding a device to the Network Security MapYou can manually add a computer or device to theNetwork Security Map.

You can add the following details when you add adevice:

1 The name or description

1 The IP address or physical address

The Network Security Map finds any computers thatare connected to your network. However, you can addthe computers and the devices that are currently notconnected.

Protecting Internet activitiesAbout the Network Security Map

228

Page 229: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Norton AntiVirus adds to the Trust Control networkall the devices that you manually add to NetworkSecurity Map. You can select the Trust Control networkin the Network Details drop-down list to view thedevices that you added. You can also edit the name ofthe device.

w You cannot edit the Trust Control network details.

To add a device to the Network Security Map

1 In the Norton AntiVirus main window, clickAdvanced.

2 Under NetworkProtection, click NetworkSecurityMap.

3 On the left side of the Network Security Mapwindow, under Total in Network, click the plussymbol.

4 In the AddaDevice window, in the Name box, typethe name of the device that you want to add to theNetwork Security Map.The maximum character length of the device nameis 15 characters.

5 In the IP or Physical Address box, type the IPaddress or physical address of the device that youwant to add to the Network Security Map.You can use the following formats in the IP orPhysical Address box:

172.16.0.0IPv4 address

fe80::12ac:fe44:192a:14ccIPv6 address

11-22-c3-5a-fe-a4Physical address

ftp.myfiles.comResolvable host

The address that you provide is not verified untilthe device is physically found on the network.

6 Click Add Device.

229Protecting Internet activitiesAbout the Network Security Map

Page 230: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Finding a computer's IP addressYou can find a computer's IP address in various ways.On Windows 2000/XP, Windows Vista, Windows 7, andWindows 8 computers, you can use the ipconfigcommand to find the IP address of a computer.

The ipconfig command reports the IP address of itslocal computer only. You must run this program on thecomputer that you want to identify.

To find the IP address by using ipconfig on Windows2000/XP

1 On the computer you want to identify, on theWindows taskbar, click Start > Run.

2 In the Run dialog box, type cmd.

3 Click OK.

4 At the command prompt, type ipconfig, and thenpress Enter.

5 Write down the IP address.

To find the IP address by using ipconfig on WindowsVista

1 On the computer you want to identify, on theWindows taskbar, click Start.

2 In the Start Search text box, type cmd, and thenpress Enter on your keyboard.

3 At the command prompt, type ipconfig, and thenpress Enter.

4 Write down the IP address.

To find the IP address by using ipconfig on Windows 7

1 On the computer you want to identify, on theWindows taskbar, click Start.

2 In the Searchprogramsandfiles text box, typecmd,and then press Enter on your keyboard.

3 At the command prompt, type ipconfig, and thenpress Enter.

4 Write down the IP address.

Protecting Internet activitiesAbout the Network Security Map

230

Page 231: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To find the IP address by using ipconfig on Windows 8

1 On the Apps screen, under Windows System, clickCommand Prompt.

2 At the command prompt, type ipconfig, and thenpress Enter.

3 Write down the IP address.

Editing device detailsYou can change the name and category of a device thatis available on the Network Security Map. You canselect the categories such as Generic Device, Laptop,Media Device, or Game Console.

You cannot change the category of the device that youadded manually. By default, Norton AntiVirus displaysthe category of the manually added device as USERDEFINED.

The NetworkSecurityMap window displays differenticons, depending on the category that you select. Iconshelp you identify the devices that are listed in thenetwork map.

To edit the details of the device that is on your network

1 In the Norton AntiVirus main window, clickAdvanced.

2 Under NetworkProtection, click NetworkSecurityMap.

3 In the Network Security Map window, in thenetwork map, click a device icon.

4 In the device details section, next to Device Name,click Edit.

5 In the EditDeviceDetails window, in the Name box,type a new name.The maximum character length of the device nameis 15 characters.

231Protecting Internet activitiesAbout the Network Security Map

Page 232: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

6 In the Category drop-down list, click one of thefollowing device categories:

1 GENERIC DEVICE

1 DESKTOP PC

1 LAPTOP

1 SERVER PC

1 NETWORK PRINTER

1 ROUTER/SWITCH

1 CABLE/DSL MODEM

1 MEDIA DEVICE

1 GAME CONSOLE

1 PDA/MOBILE PHONE

1 NETWORK STORAGE DEVICE

1 WEB CAMERA

1 TABLET

1 MUSIC PLAYER

1 TV

7 Click OK.

To edit the name of the device that you addedmanually

1 In the Norton AntiVirus main window, clickAdvanced.

2 Under NetworkProtection, click NetworkSecurityMap.

3 In the Network Security Map window, in theNetworkDetails drop-down list, click TrustControl.

4 In the network map, select a device that you added.

5 In the device details area, next to DeviceName, clickEdit.

6 In the Edit Device Details dialog box, in the Namebox, type a new name.

7 Click OK.

Protecting Internet activitiesAbout the Network Security Map

232

Page 233: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Editing network detailsYou can view the details and change the name of yournetwork in the Edit Network Details window.

w You cannot edit the Trust Control network details.

To edit network details

1 In the Norton AntiVirus main window, clickAdvanced.

2 Under NetworkProtection, click NetworkSecurityMap.

3 In the NetworkSecurityMap window, on the rightside of Network Details, click Edit.

4 In the Edit Network Details dialog box, in theNetwork Name box, type a new name.

5 Click OK.

Removing devices from the Network Security MapThe Network Security Map window lists the devicesthat are connected to your network. You can remove adevice or a computer from the Network Security Map.You can purge all devices from the network map andcreate a new list of devices. For example, you can purgeall the devices that were present in your previousnetwork before you connect to a new network. Ensurethat you disable Remote Monitoring before you purgethe network map. Norton AntiVirus cannot purge thenetwork map when the Remote Monitoring is turnedon. Also, ensure that you close the Network SecurityMap window before you purge the network map. Youcannot purge the network map when the NetworkSecurity Map window is open.

When you remove an individual device, the onlinedevices appear again the next time you open theNetwork Security Map. However, Norton AntiViruspermanently removes the offline devices.

233Protecting Internet activitiesAbout the Network Security Map

Page 234: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To remove an individual device

1 In the Norton AntiVirus main window, clickAdvanced.

2 Under NetworkProtection, click NetworkSecurityMap.

3 In the Network Security Map window, do one ofthe following:

1 To remove a device that is on your network, inthe network map, click the device.

1 To remove a device that you manually added, inthe NetworkDetails drop-down list, select TrustControl, and then click the device.

4 On the left side of the Network Security Mapwindow, under Total in Network, click the minussymbol.

5 In the confirmation dialog box, click Yes.

To purge the Network Security Map

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the Network tab.

3 In the left pane, click Network Security Settings.

4 In the Network Security Map row, click Purge.

5 In the confirmation dialog box, click Yes.

Viewing the status of your wireless networkYou can view the status of your wireless network inthe Network Security Map window. The NetworkSecurity Map displays the status of your wirelessnetwork as secure or not secure. A secure networkrequires a strong wireless encryption. If your wirelessnetwork is not secure, you can turn on encryption onyour wireless router.

For more information on how to secure your wirelessnetwork, on the left side of the NetworkSecurityMapwindow, click the Why is it not secure link. Follow theinstructions.

Protecting Internet activitiesAbout the Network Security Map

234

Page 235: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

w You should only trust a wireless connection that issecure. Trusting a wireless connection that is notsecure puts all of the devices on your network at risk.

To view the status of your wireless network

1 In the Norton AntiVirus main window, clickAdvanced.

2 Under NetworkProtection, click NetworkSecurityMap.

3 On the left side of the Network Security Mapwindow, view the status of your wireless network.Your wireless network statuses are:

Indicates that your wirelessnetwork is secure.

WirelessNetwork Secure

Indicates that your wirelessnetwork is not secure.

Wireless Network NotSecure

Viewing the device detailsThe Network Security Map lets you view the details ofyour computer. You can view the following details:

1 The configuration status of your protectionfeatures, such as Auto-Protect, IntrusionPrevention, and Email Scanning

1 The configuration status of your definition updates,such as Automatic LiveUpdate and Pulse Updates

1 The version number of your Norton product

1 The subscription status of your Norton product

To view the device details

1 In the Norton AntiVirus main window, clickAdvanced.

2 Under NetworkProtection, click NetworkSecurityMap.

235Protecting Internet activitiesAbout the Network Security Map

Page 236: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

3 In the Network Security Map window, in thenetwork map, click the device for which you wantto see the details.You can view the details of only the computers thatyou remotely monitor.

4 In the device details section, next to Category, clickDetails.

5 In the Device Details window, view the details ofthe device.

6 Click Close.

Modifying the communication port for NetworkSecurity Map

The Network Security Map settings let you configurethe communication port number that Norton productsuse to communicate with each other over a network.By default, Norton products use 31077 as thecommunication port number.

If you change the communication port number of yourNorton product, you must change it on every computerthat is connected to your home network. In addition,when you find more computers that use the RemoteMonitoring Setup process, ensure that the same portnumber is used on every computer.

w Though you can modify the communication portnumber, it is recommended that you do not change thisport number. If you change the communication portnumber, you must use a port number in the range of1-65535.

Tomodify the communication port forNetwork SecurityMap

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the Network tab.

Protecting Internet activitiesAbout the Network Security Map

236

Page 237: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

3 In the Communication Port box, type a newcommunication port number.You must use the same port number for each of thedevice that is connected to your Network SecurityMap.

4 Click Apply.

5 Click OK.

About Network Cost AwarenessThe Network Cost Awareness feature lets you set uppolicies to restrict the Internet usage of NortonAntiVirus. You can define the amount of networkbandwidth that Norton AntiVirus can use.

You can choose a communication policy that suits yourInternet connection. If you have unlimited Internetplan, you can set up No Limit policy so that NortonAntiVirus connects to Symantec servers to ensurecomplete protection. However, if you think that NortonAntiVirus uses too much of your Internet connection,you can restrict the Internet usage of Norton AntiVirus.Network Cost Awareness helps you manage the Internetusage of Norton AntiVirus.

To connect to the Internet, Norton AntiVirus accessesthe gateway through a network connection. Theconnecting device can be a 3G phone, an Internet datacard, or a wireless network card. Network CostAwareness lets you set up a policy for each networkconnection that Norton AntiVirus uses to connect tothe Internet.

You can set up one of the following policies for each ofthe network connection that Norton AntiVirus uses toconnect to the Internet:

1 AutoAllows Norton AntiVirus to receive all product andvirus definition updates based on the Windows 8cost awareness policy. By default, the Auto policy

237Protecting Internet activitiesAbout Network Cost Awareness

Page 238: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

has unlimited Internet connection on LAN andWi-Fi.

w The Auto option is available only in Windows 8.

1 No LimitAllows Norton AntiVirus use the networkbandwidth that is required to receive all productand virus definition updates. Symantecrecommends that you apply this policy. If you donot use Windows 8, the default policy is set to NoLimit.

1 EconomyAllows Norton AntiVirus access the Internet onlyto receive critical product updates, virus definitions,and web queries needed to protect your device.

1 No TrafficBlocks Norton AntiVirus from connecting to theInternet. If you choose this policy, Norton AntiViruscannot receive critical virus definitions andprogram updates, which can lead to potentialdangers and virus attacks.

Turning off or turning on Network Cost AwarenessYou can set up policies to restrict the Internet usageof Norton AntiVirus. If you do not want to restrict theInternet usage of Norton AntiVirus, you can turn offNetwork Cost Awareness.

If you feel that Norton AntiVirus uses too muchnetwork bandwidth, you can turn on Network CostAwareness. Then, you can set up policies to restrictthe Internet usage of Norton AntiVirus. NortonAntiVirus connects to the Internet based on the policythat you set up in the Network Cost AwarenessSettings window. By default, NetworkCostAwarenessis turned on.

To turn off Network Cost Awareness

1 In the Norton AntiVirus main window, clickSettings.

Protecting Internet activitiesAbout Network Cost Awareness

238

Page 239: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

2 In the Settings window, click the Network tab.

3 In the left pane, click Network Security Settings.

4 In the Network Cost Awareness row, move theOn/Off switch to the right to the Off position.

5 Click Apply.

6 Click OK.

To turn on Network Cost Awareness

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the Network tab.

3 In the left pane, click Network Security Settings.

4 In the Network Cost Awareness row, move theOn/Off switch to the left to the On position.

5 Click Apply.

6 Click OK.

Defining the Internet usage of Norton AntiVirusIf you think that Norton AntiVirus uses too much ofyour network bandwidth, you can restrict the Internetusage of Norton AntiVirus. You can set up policy foreach network connection that Norton AntiVirus usesto connect to the Internet.

The Network Cost Awareness Settings window listsall the network connections that your computer usesto connect to the Internet. You can view the status ofthe network connections that are currently in use. Thenetwork policy that you set up defines the amount ofnetwork bandwidth that Norton AntiVirus can use.

To define the Internet usage of Norton AntiVirus

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the Network tab.

3 In the left pane, click Network Security Settings.

4 In the Network Cost Awareness row, move theOn/Off switch to the left to the On position.

239Protecting Internet activitiesAbout Network Cost Awareness

Page 240: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

5 Click Configure.The NetworkCostAwarenessSettings window listsall the network connections that Norton AntiVirususes to connect to the Internet.

6 Under the Policy column, click the drop-down listnext to the network connection for which you wantto set up a policy.

7 Select one of the following:

1 AutoAllows Norton AntiVirus to receive all productand virus definition updates based on theWindows 8 cost awareness policy. By default,the Auto policy has unlimited Internetconnection on LAN and Wi-Fi.

w The Auto option is available only in Windows 8.

1 No LimitAllows Norton AntiVirus use the networkbandwidth that is required to receive all productand virus definition updates. If you do not useWindows 8, the default policy is set to NoLimit.

1 EconomyAllows Norton AntiVirus access the Internet onlyto receive critical product updates and virusdefinitions.

If you have a limited Internet connection, youcan select the Economy option to ensureprotection from critical security threats.

1 No TrafficBlocks Norton AntiVirus from connecting to theInternet. If you choose this policy, NortonAntiVirus cannot receive critical virusdefinitions and program updates, which can leadto potential dangers and virus attacks.

8 Click Apply, and then click OK.

9 In the Settings window, click OK.

Protecting Internet activitiesAbout Network Cost Awareness

240

Page 241: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

This chapter includes the following topics:

1 About Security History

About Security HistorySecurity History window lets you do the following:

1 View the summary of alerts and event messages.

1 View the results of scans that are run on yourcomputer.

1 View the items that you submitted to SymantecSecurity Response Web site.

1 Manage Quarantine items.

1 Monitor the security tasks that your productsperform in the background.

Security History lets you monitor the security tasksthat your product performs in the background. Inaddition, the alerts that you receive can be reviewedat any time in Security History. If you cannot reviewan alert when you receive it, you can review it later inSecurity History.

The alerts, scan results, and other security items thatare related to various product features appear undertheir respective categories in the Security Historywindow. For example, the security items that arerelated to the Quarantine feature appear under theQuarantine category. In addition, the SecurityHistory

6Monitoringprotectionfeatures

Page 242: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

window displays details of each item in the Detailspane.

Based on their functionalities, Security History broadlyorganizes all categories into the following groups:

1 All Activity

1 Protection and Performance

1 Submissions and Errors

1 Informational

By default, the following information categories areavailable in the Security History window:

1 Recent History

1 Full History

1 Scan Results

1 Resolved Security Risks

1 Unresolved Security Risks

1 Quarantine

1 SONAR Activity

1 Intrusion Prevention

1 Download Insight

1 Norton Product Tamper Protection

1 Performance Alert

1 Network Cost Awareness

1 Norton Error Reporting

1 Email Errors

1 Norton Community Watch

1 Silent Mode

1 LiveUpdate

You can view the security items based on the categoryof events that you select and the search string that youprovide. Norton AntiVirus restricts the number ofsearch results that appear on each page in the SecurityHistory window. Therefore, Security History dividesthe items that are returned for any search criteria anddisplays them on separate pages. You can use the

Monitoring protection featuresAbout Security History

242

Page 243: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

pagination scroll at the bottom of the window tonavigate to different pages sequentially. In case youwant to view a specific page, you can use the Gotopageoption to open the page. The maximum number ofitems that appear per page is 100.

Based on the security status of an item in aninformation category, you can take an appropriateaction to resolve a risk or a threat. Some of the actionsthat you can take are Remove this file, Exclude thisprogram, and Submit to Symantec.

Norton AntiVirus also lets you save the security eventshistory. You can view the security event informationwhenever you want. If you want to analyze the securityevents for a particular day, you can save the SecurityHistory logs for that day. You can later import the fileinto Security History and analyze the data.

Opening Security HistorySecurity History provides a record of all the activitiesthat Norton AntiVirus performed on your computer.

You can access Security History from the followingareas:

1 Norton AntiVirus advanced window

1 Various alert windows and notifications

1 Notification area of the Windows taskbar

1 ThreatsDetected section in different Scan windows

To open Security History

1 In the Norton AntiVirus main window, clickAdvanced.

2 In the Computer Protection pane, click History.

Viewing items in Security HistorySecurity History provides a record of all the activitiesthat Norton AntiVirus performed on your computer.

You can view details about all the activities including:

243Monitoring protection featuresAbout Security History

Page 244: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

1 Security History alerts and event messages

1 Results of different scans

1 Information that you submitted to SymantecSecurity Response Web site

1 Quarantined items

1 Security tasks that Norton AntiVirus performed inthe background

Based on their functionalities, all Security Historycategories appear under the following groups in theShow drop-down list:

1 All Activity

1 Protection and Performance

1 Submissions and Errors

1 Informational

The items that are related to the various productfeatures appear under their respective categories inthe SecurityHistory window. For example, the securityitems that are related to the Quarantine feature appearunder Quarantine category in the Security Historywindow. In addition, the Security History windowdisplays details of each item in the Details pane.

To view items in Security History

1 In the Norton AntiVirus main window, clickAdvanced.

2 In the Computer Protection pane, click History.

Monitoring protection featuresAbout Security History

244

Page 245: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

3 In SecurityHistory window, in the Show drop-downlist, select the category of items that you want toview. Your options are:

The Recent History view inthe Security History window

Recent History

displays the alerts that youreceived during the last sevendays. It lists the history ofcertain recent securityevents.

The Full History view in theSecurity History window

Full History

displays the completeSecurity History.

You can scan your computerto check if any virus, spyware,

Scan Results

malware, or security risk hasinfected your computer.

The Scan Results view in theSecurity History windowdisplays the details about thescans that are run on yourcomputer.

245Monitoring protection featuresAbout Security History

Page 246: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

The security risks include thesuspicious programs that cancompromise the security ofyour computer.

The Resolved Security Risksview in the Security Historywindow displays a list ofsecurity risks that NortonAntiVirus has detected andthen repaired, quarantined,or removed. The quarantineditems are listed in theQuarantine view. You canalso view the quarantineditems in theQuarantine view.

Resolved Security Risks

The security risks include thesuspicious programs that cancompromise the security ofyour computer.

The Unresolved SecurityRisks view in the SecurityHistorywindow displays a listof security risks that NortonAntiVirus was not able torepair, remove, or quarantine.

Certain threats requiresystem restart. Logs for suchthreats can be cleared onlyafter you restart your system.

Unresolved Security Risks

Monitoring protection featuresAbout Security History

246

Page 247: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

The Security HistoryQuarantine provides a safelocation on your computerwhere you can isolate itemswhile you decide an action totake on them.

The Quarantine view in theSecurity History windowdisplays all of the securityrisks that are isolated in theSecurity History Quarantine.

Quarantine

Symantec Online Network forAdvanced Response (SONAR)identifies new threats basedon the suspicious behavior ofapplications. SONAR detectsand protects your computeragainst malicious code evenbefore virus definitions areavailable throughLiveUpdate.

The SONAR Activity view inthe Security History windowdisplays details about thesecurity risks that SONARdetects. This category alsolists any activity thatmodifies the configuration orthe settings of yourcomputer.

The More Details option forthis category provides detailsabout the resources that thisactivity affects.

SONAR Activity

247Monitoring protection featuresAbout Security History

Page 248: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Intrusion Prevention scans allthe network traffic thatenters and exits yourcomputer for known threats.

The Intrusion Preventionview in the Security Historywindow displays detailsabout recent IntrusionPrevention activities.

The Security History -AdvancedDetailswindow forthis category lets you controlwhether or not to be notifiedwhen Intrusion Preventiondetects an IntrusionPrevention signature.

Intrusion Prevention

Download Insight processesany executable file that youdownload for analysis of itsreputation level. It theninforms you about theprocessing results based onthe Download Insightsettings.

The Download Insight viewin the Security Historywindow displays details of allevents that Download Insightprocesses and notifies. Thisview also containsinformation about the actionsthat you take based on thereputation data of the events.

Download Insight

Monitoring protection featuresAbout Security History

248

Page 249: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Norton Product TamperProtection lets you protectyour Norton product from anyattack or modification byunknown, suspicious, ormalicious applications.

The Norton Product TamperProtection view in theSecurity History windowdisplays details aboutunauthorized attempts tomodify Symantec processes.The tasks that your Symantecproduct blocks also appear inthe list.

Norton Product TamperProtection

The performance alertfeature lets you view,monitor, and analyze theimpact of the systemactivities on your computer.

The Performance Alert viewin the Security Historywindow provides detailsabout the impact of theprocesses that run on yourcomputer. The details includethe process name, theresources used, the extent ofresource utilization, and theoverall impact of the processon your computer. Inaddition, logs related toperformance alerts and theprograms that you haveexcluded from performancealerts also appear in the list.

Performance Alert

249Monitoring protection featuresAbout Security History

Page 250: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Network Cost Awareness letsyou set up policies andrestrict the Internet usage ofNorton AntiVirus. You candefine the amount of networkbandwidth that NortonAntiVirus can use.

The Network Cost Awarenessview in the Security Historywindow provides detailsabout the actions that youperformed to restrict theInternet usage of NortonAntiVirus.

Network Cost Awareness

Norton AntiVirus maygenerate errors in somecases. For example, an errorcan occur when you runLiveUpdate or scan a folder.Engine errors, timeout errors,and program errors are someof the types of errors.

The Norton Error Reportingview in the Security Historywindow displays any errorthat Norton AntiVirus hasgenerated.

Norton Error Reporting

Monitoring protection featuresAbout Security History

250

Page 251: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Email errors include anyfailure that occurs whenNorton AntiVirus tries tosend, download, or scan anemail message that you sendor receive.

The Email Errors view in theSecurity History displaysdetails about any Email Erroralerts that you receive whenan Email error occurs. Detailsinclude the Error ID and theErrormessage. This view alsodisplays information aboutsubject, sender address, andthe recipient address that arerelated to the email messagein the alert.

Email Errors

The Norton CommunityWatch feature lets yousubmit any suspicioussecurity or suspiciousapplication data to Symantecfor analysis. Symantecassesses the data todetermine the new threats.

The Norton CommunityWatch view in the SecurityHistorywindow displays a listof files that you havesubmitted to Symantec foranalysis. Files, at variousstages of submission, alsoappear in the list.

Norton Community Watch

251Monitoring protection featuresAbout Security History

Page 252: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

SilentMode suppresses alertsand notifications andtemporarily suspends mostof the background activities.

The Silent Mode view in theSecurity History windowdisplays the summary of theSilent Mode sessions.

The summary includes thefollowing information:1 The type of Silent Mode

such as Silent Mode orQuiet Mode

1 The type of program thatturns on Silent Mode suchas disk burning or TVrecording

1 The name ofUser-Specified programthat turns on Silent Mode

1 Whether Silent Mode isturned on or turned off

Silent Mode

LiveUpdate obtains the latestvirus definition updates andthe program updates to allthe Symantec products thatyou installed on yourcomputer. These updatesprotect your computer fromnewly discovered threats.

The LiveUpdate view in theSecurity History windowshows the details of theLiveUpdate activities on yourcomputer. The details includethe severity, the status, andthe duration of theLiveUpdate sessions on yourcomputer.

LiveUpdate

Monitoring protection featuresAbout Security History

252

Page 253: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

4 Click a row to view details for that item.If you want to view additional information about anitem, click the More Details option in the Detailspane or double-click the particular row. You canview the advanced details about the item in theSecurity History-Advanced Details window andtake actions as needed. For some categories, theMoreDetails option opens the File Insight windowthat displays the details about the selected SecurityHistory event. You must use the Options link in theSecurity History window to select an action thatNorton AntiVirus must perform on any item in thesecategories. The Options link is also available in theFile Insight window for certain items.

About the Security History - Advanced Details windowThe SecurityHistory -AdvancedDetails window letsyou view more information about the items that youselect in the Show drop-down list in the SecurityHistory window. You can also perform any action thatis available for the selected item from this window.

253Monitoring protection featuresAbout Security History

Page 254: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

The following table lists the categories that providethe advanced details about the Security History items:

Displays the followinginformation about the item:1 Severity

This category displays therisk level of the selecteditem. The various levels ofsecurity risks are High,Medium, Low, and Info.

1 Activity

This category displays theactivity that was performedby Norton AntiVirus.

1 Date & Time

This category displays thedate and time of the activity.

1 Status

This category displays thestatus of the action that hasbeen taken on the item.

1 Recommended Action

This category displays theactions that you might needto perform.

Alert Summary

Displays the detailedinformation of the item

You can view the details such ascategory, risk level, riskcategory, submission date of therisk, risk status, risk description,and recommended actions forthe items.

Advanced Details

Monitoring protection featuresAbout Security History

254

Page 255: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Displays the actions that areavailable for the selected item

The options in the Actions viewvary depending on the optionsthat are available in the Showdrop-down list in the SecurityHistory window.

The following are some of theActions options:1 Allow

This action allows theselected program to accessthe Internet.

This option is available in theSecurity History - IntrusionPrevention view.

1 Stop Notifying Me

This action prevents NortonAntiVirus from notifying youwhen it blocks the selectedattack signature in thefuture.

This option is available in theSecurity History - IntrusionPrevention view.

1 Notify Me

This action allows NortonAntiVirus to notify you whenit blocks the selected attacksignature in the future.

This option is available in theSecurity History - IntrusionPrevention view.

Actions

255Monitoring protection featuresAbout Security History

Page 256: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Displays the links that providethe information that is relatedto the selected item

For some Security History items,this view lets you access therelevant settings pane of theNorton AntiVirus window.

Risk Management

About the File Insight windowThe File Insight window provides details about anyFile of Interest that is available on your computer. Thisoption of file analysis is available for the files that youdownload, scan, or use to perform an activity.

You can access the File Insight window in differentways. For example, you can use the variousnotifications, alerts, scan and performance-relatedwindows, and the shortcut menu of the various filesthat are present on your computer to open the window.Security History provides a centralized location whereyou can access the File Insight windows of the variousevents that are related to Security Risks, DownloadInsight, and Performance.

Monitoring protection featuresAbout Security History

256

Page 257: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

The File Insight window lets you view more details ofevents that belong to some of the following categoriesin the Security History window:

Lets you view the detailedinformation about the resolvedsecurity risks in an organizedway.

The Resolved Security Riskscategory includes the infectedfiles that Norton AntiVirusrepairs, removes, or quarantines.This category mostly includesthe medium-level or thehigh-level risks that are eitherquarantined or blocked.

The File Insightwindow providesdetails about the risk level, theorigin, and the activity report ofthe resolved security risks onyour system.

Resolved Security Risks

Lets you view the detailedinformation about theunresolved security risks in anorganized way.

The Unresolved Security Riskscategory includes the infectedfiles for which Norton AntiViruswas not able to take any action.This category mostly includesthe low-level risks that requireyour attention for a suitableaction.

The File Insightwindow providesdetails about the risk level, theorigin, and the activity report ofthe unresolved security risks onyour system.

Unresolved SecurityRisks

257Monitoring protection featuresAbout Security History

Page 258: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Lets you view the detailedinformation about quarantinedsecurity risks in an organizedway.

The Quarantine categoryincludes the infected files thatare isolated from the rest of yourcomputer while they await yourattention for a suitable action.

The File Insightwindow providesdetails about the risk level, theorigin, and the activity report ofquarantined security risks onyour system.

Quarantine

Lets you view the reputationdetails of a file that youdownload.

You can use these details todetermine the safety level of thefile and then decide the actionthat you want to perform.

Download Insight

Lets you view the performancedetails of any File of Interest thatis available on your computer.

The information includes thegeneral details, the origin andlineage information, theresource usage, and the actionsthat the file has performed onyour system.

Performance Alert

The FileInsight window provides various details aboutthe Security History item. These details are classifiedin different tabs in the File Insight window.

Monitoring protection featuresAbout Security History

258

Page 259: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

You can select a tab to view more details about it. TheFile Insight window provides details about a file in thefollowing tabs:

Displays the information such asthe confidence level, communityusage of a file, how long ago thefile was released and how stablethe file is.

w Stability ratings of a filemay vary depending upon youroperating system.

You can view details such as thesignature and the date on whichthe file was created. You candetermine if a file is a startupfile and the date on which thefile was last used.

Details

Provides the lineage details of afile.

You can view the file name andthe URL of the source fromwhere the file was downloaded.The lineage details of a file areavailable only if you downloadedor created the file after youinstalled Norton AntiVirus.

w If the historical details ofa file are not available, NortonAntiVirus disables this Originsection.

Origin

259Monitoring protection featuresAbout Security History

Page 260: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Provides the details about thesuspicious actions performed bythe file on your computer. It alsoprovides information about theresource usage of a process andthe effect of the process on theoverall CPU utilization of yourcomputer.

Activity

Based on the severity of the security risks and the risktype, Norton AntiVirus might display one or more ofthe following options in the File Insight window:

Lets you locate the file onyour computer.

This option is available at thetop of the window.

Locate

Lets you copy the data fromthe File Insightwindow to theclipboard.

After you copy the content tothe Clipboard, you can opena document, paste the data,and save the document.

Copy to Clipboard

Monitoring protection featuresAbout Security History

260

Page 261: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Let you return the securityrisk that is quarantined to theoriginal location on yourcomputer.

Returns the selectedQuarantine item to itsoriginal location withoutrepairing it and excludes theitem from being detected inthe future scans. If you do notwant to exclude the item fromfuture scans uncheck thecheck box available in theQuarantine Restorewindow.

Restore

Lets you access the ThreatDetected window and viewmore details and performactions.

Options

About the Threat Detected windowThe ThreatDetected window appears whenever NortonAntiVirus detects a security risk on your computer.You can use this window to view details about the riskand select an action for the risk. Sometimes, you maywant to access the Threat Detected window for thesame risk again. In that case, the window can be openedat any time from Security History. Security History isthe centralized location where you can access theThreatDetected windows of risks that belong to someof the following categories:

This category includes thesecurity risks or the infectedfiles that Norton AntiVirus hasdetected and then repaired,quarantined, or removed.

Resolved Security Risks

261Monitoring protection featuresAbout Security History

Page 262: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

This category includes thesecurity risks or the infectedfiles that Norton AntiVirus wasnot able to repair, remove, orquarantine.

Unresolved SecurityRisks

This category includes thesecurity risk items that areisolated from the rest of yourcomputer while they await yourattention for a suitable action.

Quarantine

The action options in the ThreatDetected window fora risk vary depending on the risk type and its severitylevel. The following are some of the options that areavailable in this window:

Returns the security risk that isquarantined to the originallocation on your computer

Restore

Returns the selected Quarantineitem to its original locationwithout repairing it and excludesthe item from being detected inthe future scans

Removes the security risk fromyour computer and quarantinesit

Remove this file

Excludes the security risk fromfuture scan

Exclude this program

Removes the selected securityrisk item from the SecurityHistory log

Remove from history

Monitoring protection featuresAbout Security History

262

Page 263: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Takes you to the SymantecSecurity Response Web site

Get help

Sends the security risk toSymantec

Submit to Symantec

Searching in Security HistoryYou can search the items that are listed in SecurityHistory. You can use the Quick Search option to finditems using a keyword or the name of a security risk.If you want to view all of the Security History itemsthat pertain to a particular security risk, you can filterthe items using QuickSearch. For example, if you wantto view all of the alerts that Auto-Protect has generated,you can type Auto-Protect and filter the list.

You can clear the search results and return to thecurrent Security History list by clicking the black cross(x) icon in the Quick Search box.

The Quick Search option works on the current viewonly. If you want your search to include all of the itemsin Security History, you must select the Full Historyview.

To search in Security History

1 In the Security History window, in the QuickSearch text box, type the name of the item that youwant to search.

2 Click Go.

Exporting or Importing Security History informationNorton AntiVirus lets you export the Security Historyevents to a file. You can export and save the SecurityHistory events and view them at your leisure.

For example, you can analyze the security events on aparticular day. You can use the Quick Search optionto obtain a list of all of the items that are related to a

263Monitoring protection featuresAbout Security History

Page 264: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

particular security risk. You can then use the Exportoption to save the list in the Security History log. Youcan later import the log file and analyze the data.

Security History stores the information in a separatefile. When the file size reaches its maximum size limit,information that is related to new events overwritesthe information that is related to older events. You canexport the log periodically, if you want to keep theentire Security History information.

You can save your log file in one of the following fileformats:

1 Security History Log Files (.mcf)

The .mcf file format is the Security History Log Filesformat and is proprietary to Symantec.

When you use this file type option, you can viewthe file only in the Security History window.

1 Text Files (.txt)

The data is saved in a comma-separated text format.

When you use this file type option, you can openand view the file externally without using SecurityHistory.

You can import only the log files that have .mcf fileextension. When you import a log file, the exported listof Security History information in the log file appears.This list replaces the current security events list. Youcan select an option in the Show drop-down list to viewthe option-specific details that are saved in the log file.To revert to the current Security History list you mustclick the Close file: file_name.mcf link.

To export Security History information

1 In the Norton AntiVirus main window, clickAdvanced.

2 In the Computer Protection pane, click History.

3 In the Security History window, in the Showdrop-down list, select an option.

4 Click Export.

Monitoring protection featuresAbout Security History

264

Page 265: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

5 In the Save As dialog box that appears, navigate toa location and specify the name for the file.The category name in the Show drop-down listappears as the default file name. You can provide afile name of your choice.

6 In the Save as type box, select the format in whichyou want to save your log file.

7 Click Save.

To import Security History information

1 In the Norton AntiVirus main window, clickAdvanced.

2 In the Computer Protection pane, click History.

3 In the Security History window, click Import.

4 In the Open dialog box that appears, browse to thefolder that has the file you want to import.

5 Select the .mcf file and click Open.You can only open log files of .mcf format in theSecurity History window. You can open and viewlog files of .txt file externally without using SecurityHistory.In the import mode, you cannot make modificationsto the information. For example, you cannot clearthe logs. You can revert to the current SecurityHistory list by closing the file.

Managing items in the QuarantineThe Security History Quarantine provides a safelocation on your computer where you can isolate itemswhile you decide on an action to take on them.Quarantined items are isolated from the rest of yourcomputer so that they cannot spread or reinfect yourcomputer. In some cases, you may have an item thatyou think is infected, but is not identified as a risk bythe Norton AntiVirus scans. You can manually placesuch items in the Quarantine.

You cannot open quarantined items accidentally andspread the virus, but you can evaluate the quarantineditems for possible submission to Symantec.

265Monitoring protection featuresAbout Security History

Page 266: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

The Security History Quarantine includes the followinggroups of items:

Includes the items suchas spyware and adwarethat are generally low riskand that another programrequires to functionproperly.

You can restore theseitems if necessary.

Security risks

Includes viruses andother high-risk items.

Security threats

Once an item has been quarantined, you have severaloptions. All of the actions that you take on quarantineditems must be performed in the Security HistoryQuarantine.

To open the Quarantine

1 In the Norton AntiVirus main window, clickAdvanced.

2 In the ComputerProtection pane, click Quarantine.

To perform an action on a quarantined item

1 In the SecurityHistory window, in the Quarantineview, select the item on which you want to performthe action.

2 In the Details pane, click Restore & Options.You can use the More Details link to view moredetails about the item before you select an actionfor it. The link opens the File Insight window thatcontains more information about the risk.

Monitoring protection featuresAbout Security History

266

Page 267: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

3 In the Threat Detected window, select the actionthat you want to perform. Some of the options are:

Returns the security risk thatis quarantined to the originallocation on your computer

This option is available onlyfor the detected viral threats.

Restore

Returns the selectedQuarantine item to itsoriginal location withoutrepairing it and excludes theitem from being detected inthe future scans

This option is available forthe detected viral andnon-viral threats.

Restore & exclude this file

Removes the selected itemfrom the Security History log

Remove from history

Sends the selected item toSymantec for evaluation ofthe security risk

In some cases, NortonAntiVirus might not identifyan item as a security threat,but you might suspect thatthe item is infected. In suchcases, you can use this optionto submit the item toSymantec for furtheranalysis.

Submit to Symantec

You can also navigate to this window by using theOptions link in the File Insight window for somerisks.

4 Follow the on-screen instructions.

267Monitoring protection featuresAbout Security History

Page 268: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Adding an item to the Quarantine

Security History Quarantine provides a safe locationon your computer in which you can isolate items whileyou decide on an action to take on each item.

The Quarantine view in the SecurityHistory windowdisplays a list of quarantined items. You can view thename and the risk status of each quarantined item.

You can manually add an item to the Security HistoryQuarantine. You can use the AddtoQuarantine optionin the Quarantine view in the SecurityHistory windowto quarantine the items that you suspect are infected.This action has no effect on the items that are alreadyquarantined.

w You cannot add a known Good File to Quarantine.

To add an item to the Quarantine

1 In the SecurityHistory window, in the Quarantineview, click Add to Quarantine.

2 In the Manual Quarantine dialog box, in theDescription text box, type a short name for the itemthat you want to add.This text appears in the Quarantine, so you shoulduse a recognizable description.

3 Click Browse.

4 In the Select File toQuarantine dialog box, browseto the item that you want to add, select it, and thenclick Open.

5 Click Add.

6 Click Close.

Restoring an item from the Quarantine

Some programs rely on other programs that areclassified as security risks to function. The programmay not function if a particular security file is removed.All of the removed security risks are automaticallybacked up in the Security History Quarantine. Thisway, Norton AntiVirus lets you restore any risk to

Monitoring protection featuresAbout Security History

268

Page 269: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

regain the functionality of a program that requires therisk program to run.

For example, a shareware or freeware program thatyou download may use adware to keep its price low. Inthis case, you can allow the security risk program toremain on your computer or restore it if SpywareProtection has removed it.

Some quarantined items are successfully disinfectedafter Norton AntiVirus rescans them. You can alsorestore such items.

w If you restore an item to a directory other than itsoriginal location, it may not function properly.Therefore, it is recommended that you reinstall theprogram.

To restore an item from the Quarantine

1 In the SecurityHistory window, in the Quarantineview, select the item that you want to restore.

2 In the Details pane, click Restore & Options.

3 In the Threat Detected window, click Restore &exclude this file.This option returns the selected Quarantine itemto its original location without repairing it andexcludes the item from being detected in the futurescans.

4 In the Quarantine Restore window, click Yes.In case of non-viral threats, you can use the optionthat is available in this window to exclude thesecurity risk. Norton AntiVirus does not detect thesecurity risks that you exclude in the future scans.

5 In the Browse forFolder dialog, select the folder ordrive where you want to restore the file and thenclick OK.

6 Click Close.

Manually submitting an item to Symantec

When a virus or other risk is detected, it isautomatically submitted to Symantec Security

269Monitoring protection featuresAbout Security History

Page 270: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Response Web site for analysis. If you have turned offthe option to submit risks automatically, you canmanually submit them from the Security HistoryQuarantine. You must have an Internet connection tosubmit an item.

When you submit files to Symantec automatically ormanually, you contribute to the effectiveness of yourSymantec product. For example, you can submit anitem that has not been detected during scanning thatyou believe may be a security risk. Symantec SecurityResponse analyzes the file. If it is identified as asecurity risk, it is added to a future definition update.

Personally identifiable information is never includedin submissions.

In some cases it is necessary for Symantec SecurityResponse to block submissions of a particular type orvolume. These items appear as Not Submitted inSecurity History.

To manually submit an item to Symantec

1 In the SecurityHistory window, in the Quarantineview, select the item that you want to submit toSymantec.

2 In the Details pane, click Restore & Options.

3 In the Threat Detected window, click Submit toSymantec.

4 In the dialog box that appears, click OK.

Monitoring protection featuresAbout Security History

270

Page 271: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

This chapter includes the following topics:

1 Feature summary

1 About turning off automatic features

1 About customizing settings and options

Feature summaryUse the information in this section to familiarizeyourself with the product.

This section includes the following information:

1 A list of all of the features in the product

1 A brief description of each feature

The feature summary can help you determine whichfeature to use to solve a problem. Read the featuredescriptions to locate the correct component to use.

For more information, select one of the sub-entries forthis Help topic.

About virus and security risk protection featuresVirus and security risk protection features providecomprehensive virus prevention and security riskdetection for your computer. Known viruses areautomatically detected and repaired. Instant messengerattachments, email message attachments, Internet

7Customizingprotectionfeatures

Page 272: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

downloads, and other files are scanned for viruses andother potential risks. In addition, the definition updatesthat Automatic LiveUpdate downloads when yourcomputer is connected to the Internet keeps youprepared for the latest security risks.

Your computer is continually monitored and protectedfrom known and unknown threats by the followingfeatures:

Checks for viruses and othersecurity risks every time that yourun programs on your computer.Auto-Protect options let youcustomize the protection of yourcomputer. Auto-Protect optionsare:1 Loads into memory when

Windows starts, providingconstant protection whileyou work.

1 Checks for viruses andsecurity risks every time thatyou use software programson your computer. It alsochecks every time when youinsert removable media,access the Internet, or usedocument files.

1 Monitors your computer forany unusual symptoms thatmay indicate an activethreat.

Auto-Protect

Notifies you of program updatesand downloads definitionupdates automatically.

See “About LiveUpdate”on page 59.

Automatic LiveUpdate

Customizing protection featuresFeature summary

272

Page 273: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Detects viruses, spyware, andother security risks incompressed files during manualscans.

See “What to do if a security riskis found” on page 185.

Compressed File Scan

Protects your computer againstthe threats that you may receivethrough email attachments.

You can use the Email AntivirusScan option to configure youremail program for protectionagainst viruses and othersecurity threats.

Email Protection

Lets Norton AntiVirus performan Insight Network scan on yourcomputer

The Insight Network scan usesthe virus definitions that areavailable locally and hosted inthe Cloud. Norton AntiVirusprovides additional protectionby using the most recentdefinitions from the Cloud, apartfrom the definitions that areavailable locally on yourcomputer.

See “About Insight Networkscan” on page 140.

Insight Protection

273Customizing protection featuresFeature summary

Page 274: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Scans for and detects viruses ininstant messenger attachments.

Scans the instant messengerattachments for the supportedinstant messenger programsthat were on your computerwhen you installed your product.New instant messengerprograms must be configured inInstant Messenger Scanwindow.

Instant Messenger Scan

Detects the new and theunknown viruses by analyzingan executable file's structure,and behavior. Also, by analyzingother attributes such asprogramming the logic,computer instructions, and anydata that is contained in the file.

Heuristic Protection

Protects Norton AntiVirusSettings from unauthorizedchanges.

Settings PasswordProtection

Checks for the infections thathave processes running inmemory and the infections thatthe startup folders and filesrefer.

Automatically runs onceLiveUpdate updates yourcomputer with program updatesand definition updates.

See “Running a Quick Scan”on page 126.

Quick Scan

Customizing protection featuresFeature summary

274

Page 275: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

About spyware and other security risk protectionfeatures

Spyware and other security risk protection featuresprovide protection against the latest security risks,such as spyware and adware. These features scan forexisting risks and blocks new risks before they can beinstalled on your computer.

Spyware and other security risk protection featuresinclude the following:

Auto-Protect blocks theprograms that have beenidentified as spyware oradware before they can beinstalled on your computer.

Auto-Protect SpywareBlocking

By default, manual andscheduled scans search forspyware, adware, and othersecurity risks. Auto-Protectscans for these items as well.

Security risk scan

If a scan removes a securityrisk program that anotherprogram relies on forfunctionality, you can restorethe security risk programfrom Security History.

Security risk restore

275Customizing protection featuresFeature summary

Page 276: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

If you are unsure how tohandle a program that isclassified as a security risk,you can view the security riskassessment. The security riskassessment describes thelevel of impact that a securityrisk program has on yourcomputer. You can access thesecurity risk assessment fromtheRiskDetailswindow. Thiswindow is available when thescan results require inputbefore it process a securityrisk program.

Security risk assessment

About turning off automatic featuresYour Symantec product is set by default to providecomplete protection for your computer. Many of thesesettings include the automatic features that providecontinuous protection. Under certain circumstances,you might need to turn off an automatic feature tocomplete a task.

w When you have completed the task for which youturned off the automatic feature, make sure that youturn the feature on again.

Customizing protection featuresAbout turning off automatic features

276

Page 277: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

See “Turning offAuto-Protecttemporarily andturning it on again”on page 277.See “Turning off orturning on NortonCommunity Watch”on page 278.

Turning off Auto-Protect temporarily and turning iton again

If you have not changed the default option settings,Auto-Protect loads when you start your computer.Auto-Protect also guards against viruses, Trojan horses,worms, and other malicious threats. It checks programsfor viruses when programs run and monitors yourcomputer. It also checks the removable media for anyactivity that might indicate the presence of a virus.When Auto-Protect detects a virus or virus-like activity,it alerts you.

In some cases, Auto-Protect might warn you about avirus-like activity that you know are not the work of avirus. If you perform such an activity and want to avoidthe warning, you can turn off Auto-Protect.

If you have set a password for settings, NortonAntiVirus asks you for the password before you canview or change the settings.

w When you turn off Auto-Protect, SONAR Protectionand Download Intelligence are also turned off.

To turn off Auto-Protect temporarily

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, in the left pane, click RealTime Protection.

3 In the Auto-Protect row, move the On/Off switchto the right to the Off position.

4 In the Settings window, click Apply.

277Customizing protection featuresAbout turning off automatic features

Page 278: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

5 In the dialog box that appears, in the Select theduration drop-down list, select how long you wantto turn off Auto-Protect, and then click OK.

To turn on Auto-Protect temporarily

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, in the left pane, click RealTime Protection.

3 In the Auto-Protect row, move the On/Off switchto the left to the On position.

4 In the Settings window, click Apply.

Turning off or turning on Norton Community WatchYou can use the Norton Community Watch option tosend information about a suspicious file to Symantecfor analysis. Symantec assesses the data to determinethe new threats and their sources. The Norton featuressuch as Norton Insight and Insight Network use theSymantec assessed information to detect the securitythreats.

w Norton Community Watch collects and submits detaileddata about the Norton-specific errors and componentsonly. It does not collect or store any personalinformation of any user.

You can use Security History to review the informationthat has been sent to Symantec.

To turn off or turn on Norton Community Watch

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Other Settings.

Customizing protection featuresAbout turning off automatic features

278

Page 279: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

4 In the Norton Community Watch row, do one ofthe following:

1 To turn off Norton Community Watch, move theOn/Off switch to the right to the Off position.

1 To turn on Norton Community Watch, move theOn/Off switch to the left to the On position.

5 In the Settings window, click Apply.

6 Click OK.

About customizing settings and optionsThe default settings provide complete protection foryour computer. However, you may want to adjust thesettings to optimize system performance or disable theoptions that do not apply. You can change the product'ssettings to fit your work environment.

From non-admin accounts of your computer, you needadministrator authentication to change productsettings. If you are an administrator, keep in mind thatthe changes that you make apply to everyone who usesthe computer.

For more information, select one of the sub-entries forthis Help topic.

Configuring Norton AntiVirus settingsThe default Norton AntiVirus settings provide a safe,automatic, and efficient way to protect your computer.If you want to change or customize your protection,you can access most features from the main window.

To configure Norton AntiVirus settings for individualfeatures

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click any of the settings tabto open it.

3 Move the switch to the desired position.

279Customizing protection featuresAbout customizing settings and options

Page 280: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

4 Click Configure for the feature that you want tochange.

5 In the window that appears, make the necessarychanges, and then click OK.

6 To apply the default settings in a specific section,click Use Section Defaults on the tab.

7 In the Settings window, do one of the following:

1 To save your changes and close the Settingswindow, click OK.

1 To save your changes without closing theSettings window, click Apply.

1 To apply the default settings, click Default All,and then click OK or Apply.

8 If Security Request dialog box appears, select theduration for how long you want to turn off a feature,and then click OK.

To configure Norton AntiVirus Settings

1 In the Norton AntiVirus main window, clickSettings.

Customizing protection featuresAbout customizing settings and options

280

Page 281: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

2 In the Settings window, configure your settings inthe following tabs:

Lets you configure howyou want Norton

Computer

AntiVirus to scan yourcomputer for viruses andother security threats.

You can also configureNorton AntiVirus toobtain regular updatesfor complete protectionof your computer. Youcan include additionalprotection to yourcomputer by using themost recent definitionsfrom Cloud during scans.

Your options are:1 AntiVirus and SONAR

Exclusions1 Computer Scan

1 Real Time Protection

1 Updates

281Customizing protection featuresAbout customizing settings and options

Page 282: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Lets you configure howyou want NortonAntiVirus to monitor yournetwork activities.

You can protect yourcomputer against thethreats that you mightreceive through emailattachments, instantmessaging programattachments. You canalso configure thecommunication port thatNorton products use tocommunicate with eachother.

In addition, you canprotect your computeragainst intrusionattempts.

Your options are:1 Browser Protection

1 DownloadIntelligence

1 Intrusion Prevention

1 Message Protection

1 Network SecuritySettings

Network

Customizing protection featuresAbout customizing settings and options

282

Page 283: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Lets you configure theappearance and securityof your product.

In addition, you canconfigure how NortonAntiVirus submits riskdetails to Symantec. Youcan specify your proxysettings to obtaindefinition updates. Youcan also configure SilentMode, PerformanceMonitoring, Idle Time Outduration, Monthly Report,and other miscellaneousoptions.

Your options are:1 Norton Tasks

1 Other Settings

1 PerformanceMonitoring

1 Product Security

1 Silent Mode Settings

General

If you set a password to access the Settings window,you must enter the password to view or configuresettings even if you are an administrator. Therefore,ensure that you set an easy password. However, if youforget your settings password, you can reset thepassword in the window that appears when you chooseto uninstall Norton AntiVirus. You need not uninstallthe product to reset your password. You can use thereset settings password option in the uninstallpreference window to reset your password.

283Customizing protection featuresAbout customizing settings and options

Page 284: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

About Computer settings

The various options in the Computer tab let youconfigure how you want Norton AntiVirus to scan yourcomputer for viruses and other security threats.

Your options are:

AntiVirus and SONARExclusions options let youspecify the items that NortonAntiVirus excludes from itsscans. Scans and signatures aresome items that you can excludefrom scanning.

AntiVirus and SONARExclusions options also let youchoose which categories of risksyou want Norton AntiVirus todetect.

w AntiVirus and SONARExclusions reduce your level ofprotection and should be usedonly if you have a specific need.

AntiVirus and SONARExclusions

Customizing protection featuresAbout customizing settings and options

284

Page 285: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Norton AntiVirus lets you rundifferent types of scans to detectand prevent any virus infectionon your computer.

You can use the variousComputer Scan options to selectthe scan type, file types to scan,and the scan schedule. You canalso specify scanning ofcompressed files and MicrosoftOffice documents. You canperform a Full System Scan. Youcan also individually scan drives,folders, or files.

TheComputer Scan options alsolet you specify scans to detectrootkits, other stealth items,network drives, tracking cookies,and unknown security threats.

The Scan Performance Profilesoption lets you configure aNorton AntiVirus scan based onthe digital signature and trustlevel of the files on yourcomputer.

w You must configure theScan Performance Profilessettings before you run a scanor before a scan is scheduled torun. Norton AntiVirus scans yourcomputer according to theconfiguration that you specifiedin the Scan Performance Profilessettings.

Computer Scan

285Customizing protection featuresAbout customizing settings and options

Page 286: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Real Time Protection

Customizing protection featuresAbout customizing settings and options

286

Page 287: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Real Time Protection optionprotects your computer bycontinuously checking forviruses and other security risks.

You can use the Real TimeProtection options to control thescanning and monitoring of yourcomputer.

Your options are:

1 Antispyware

Antispyware protects yourcomputer against thesecurity risks that cancompromise your personalinformation and privacy.Antispyware options let youchoose which categories ofrisk you want NortonAntiVirus to detect formanual, email, and instantmessenger scanning.

1 Auto-Protect

Auto-Protect loads intomemory when Windowsstarts, providing constantprotection while you work.Auto-Protect checks forsecurity risks every time thatyou use software programson your computer, insertremovable media, access theInternet, or use documentfiles. It also monitors yourcomputer for any unusualsymptoms that may indicatean active threat.

You can use theAuto-Protect options tocustomize the protection ofyour computer.

287Customizing protection featuresAbout customizing settings and options

Page 288: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

SONAR Protection1

Symantec Online Network forAdvancedResponse (SONAR)provides you with real-timeprotection against threats byproactively detectingunknown security risks onyour computer.

SONAR identifies emergingthreats based on thebehavior of applications.SONAR Protection is quickerthan the traditionalsignature-based threatdetection techniques. SONARdetects and protects youagainst malicious code evenbefore virus definitions areavailable throughLiveUpdate. You can turn onthis option to proactivelydetect unknown securityrisks on your computer.

SONAR provides you thegreatest control when lowcertainty threats aredetected.

1 EnableBoot TimeProtection

EnableBoot TimeProtectionstarts Auto-Protect when youstart your computer. Itprovides enhanced securitylevel from the time your startyour computer.

Customizing protection featuresAbout customizing settings and options

288

Page 289: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

1 Early Launch Anti-MalwareProtection

This feature provides betterprotection by running all thenecessary components ofNorton AntiVirus that blockmalware intrusion when youstart your computer.w This feature isavailable only in Windows 8.

289Customizing protection featuresAbout customizing settings and options

Page 290: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Updates

Customizing protection featuresAbout customizing settings and options

290

Page 291: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Norton AntiVirus protects yourcomputer from vulnerabilitiesthrough the latest program anddefinition updates. Definitionupdates contain the informationthat lets Norton AntiVirusrecognize and alert you to thepresence of a specific virus orsecurity threat.

You can use the options in theUpdates section to obtain thelatest virus definitions and keepyour computer secure from thelatest security threats.

Your options are:

1 Automatic LiveUpdate

Automatic LiveUpdateautomatically checks fordefinition updates andprogram updates to yourvirus protection when youare connected to theInternet.

1 Pulse Updates

In addition to the definitionupdates that AutomaticLiveUpdate downloads,Norton AntiVirus usesstreaming technology todownload the latest virusdefinitions. These downloadsare called Pulse Updates. ThePulse Updates are lighter andfaster, and keep yourcomputer secure from theongoing threats on the WorldWide Web.

1 AutomaticDownloadofNewVersion

Automatically downloads the

291Customizing protection featuresAbout customizing settings and options

Page 292: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

latest available version andprompts you for freeinstallation. To get the latestversion, this option must beturned on.w This feature may notwork in some versions ofNorton AntiVirus.

1 Smart Definitions

Activates the Core Set virusdefinitions which contain themost important virusdefinitions that are requiredfor latest security threats asviewed by Symantec. Turningon the Smart Definitionsoption minimizes downloadtime, installation time, andsystem start time. Therefore,the Core Set results in fasterperformance of yourcomputer.

Customizing protection featuresAbout customizing settings and options

292

Page 293: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

1 Apply updates only onreboot

Lets you choose how theprogram updates obtainedby Automatic LiveUpdateneed to be applied to yourcomputer. Certain programupdates may require you torestart your computer for theupdates to complete.

When you turn on thisoption, program updates thatrequire system restart areautomatically applied thenext time you restart yoursystem. However, programupdates that do not requiresystem restart are appliedinstantly. By default, thisoption is turned off.w This option is availableonly in Windows 7 andWindows 8.

About Network settings

The options in the Network tab let you configureNorton AntiVirus to monitor your Internet activities.

You can configure Norton AntiVirus to protect yourcomputer against any threat that you may receivethrough email attachments or instant messengerattachments. You can also use the options in theNetwork tab to protect your computer againstintrusion attempts.

293Customizing protection featuresAbout customizing settings and options

Page 294: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Your options are:

The Browser Protection featurechecks for browservulnerabilities in the followingbrowsers:

1 Internet Explorer 7.0 andlater

1 Chrome 17.0 and later

1 Firefox 10.0 and later

You must turn on the BrowserProtection option to enable thisfeature.

Browser Protection

Download Intelligence protectsyour computer against anyunsafe file that you downloadfrom the supported portals.

The Download Intelligenceoptions let you specify whetheryou want to receive anynotifications or alerts when youdownload or run a filerespectively.

Download Intelligence

Customizing protection featuresAbout customizing settings and options

294

Page 295: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Intrusion Prevention scans allthe network traffic to and fromyour computer and comparesthis information against a set ofattack signatures. Attacksignatures contain theinformation that identifies anattacker's attempt to exploit aknown vulnerability in theoperating system or in aprogram. If the informationmatches an attack signature,Intrusion Prevention blocks thetraffic from the suspiciouscomputer.

The following are some activitiesthat you can do using theIntrusion Prevention options:

1 View the list of IntrusionPrevention signatures.

1 Exclude individual signaturesfrom being monitored.

1 Specify whether or not youmust be notified whenIntrusion Preventionsignatures are detected.

1 Activate AutoBlock for aspecified duration to blockall incoming traffic from acomputer that continues toattack your system.

1 View, restrict, or unblock thelist of computers thatAutoBlock blocks.

1 View or unblock the list ofcomputers that AutoBlockblocks.

1 Determine whether or notyou are notified whenIntrusion Preventionactivities are detected.

Intrusion Prevention

295Customizing protection featuresAbout customizing settings and options

Page 296: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Message Protection

Customizing protection featuresAbout customizing settings and options

296

Page 297: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Email Protection protects yourcomputer against the threatsthat you may receive throughemail attachments. You can usethe Email Antivirus Scan optionand the Protected PortsSettings option to configureyour email program forprotection against viruses andother security threats.

Email Antivirus Scan protectsyou from the threats that aresent or received in emailattachments.

You can use the Email AntivirusScan options to define howNorton AntiVirus should behavewhen it scans email messages.Based on the options youchoose, Norton AntiVirusautomatically scans the emailmessages that you send orreceive.

Instant Messenger Scan optionlets you customize the scanningof the files the instantmessenger programs receive.You can select the supportedinstant messenger programsfrom which you may receive files.Norton AntiVirus scans the filesthat you receive from theselected instant messengerprograms.

You can use theProtected PortsSettings option to protect thePOP3 and SMTP ports that areassociated with your emailprogram. Norton AntiVirusautomatically protects the

297Customizing protection featuresAbout customizing settings and options

Page 298: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

default SMTP port 25 and thedefault POP3 port 110. If youremail program is not configuredwith the default ports, you canmanually configure NortonAntiVirus to protect your POP3and SMTP ports.

Customizing protection featuresAbout customizing settings and options

298

Page 299: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Network SecuritySettings

299Customizing protection featuresAbout customizing settings and options

Page 300: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

The Network Cost Awarenessoption lets you set up policiesand restrict the Internet usageof Norton AntiVirus. You candefine the amount of networkbandwidth that Norton AntiViruscan use.

The Network Security Mapoption provides a pictorialrepresentation of the devices onthe network to which yourcomputer is connected. You canview the security status of thedevices that are connected tothe network to which yourcomputer is connected.

Network Security Map also letsyou configure thecommunication port that Nortonproducts use to communicatewith each other.

The Welcome Screen optiondisplays the Network SecurityOverview window when youopen Network Security Map.

TheProxy Server option lets youspecify the automaticconfiguration URL, proxysettings, and the authenticationdetails for firewall or proxyserver. In case of proxy servers,Norton AntiVirus uses theNetwork Proxy Settings toconnect to the Symantec serverand the Internet.

The following are also someactivities that you can do usingthe Norton Security Map feature:1 View or modify details

related to the computers or

Customizing protection featuresAbout customizing settings and options

300

Page 301: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

devices that are on yournetwork.

1 Grant or deny permissions tothe networked devices toaccess your computer.

1 Add or Remove any device inthe Network Security Map.

About General settings

You can use General settings to schedule your producttasks and configure different Norton AntiVirussettings. You can access the General settings optionsunder the General tab in the Settings window. You canalso configure the security settings of your productfrom General settings.

By using General settings, you can do the following:

1 Schedule your Norton Tasks.

1 Configure the General settings of your product.

1 Monitor the performance of your system.

1 Configure the security settings.

1 Customize the Silent Mode settings.

301Customizing protection featuresAbout customizing settings and options

Page 302: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Your options are:

Norton Tasks

Customizing protection featuresAbout customizing settings and options

302

Page 303: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Lets you configure yourNorton Tasks settings.

Your options are:

1 Automatic ResumeDelayFrom Sleep orHibernation

This option delays theautomatic backgroundtasks for a specificduration even if yourcomputer is idle for thatperiod. You can specifyAutomatic Resume Delayduration for a period ofone minute to 20minutes. By default, theAutomatic ResumeDelayFrom Sleep orHibernation option is setto 10 minutes.

1 Automatic Tasks Delay

Lets you delay thestart-up ofNorton-specific programson your computer thatrun automatically whenyou turn on yourcomputer.

Automatic Tasks Delaydoes not delay NortonAntiVirus protection. Youcan specify AutomaticTasks Delay duration fora period of one minute to20 minutes. The defaultduration is 20 minutes.

1 Idle Time Optimizer

Lets you configure NortonAntiVirus to defragmentyour boot volume or the

303Customizing protection featuresAbout customizing settings and options

Page 304: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

local disk that containsthe boot volume whenyour computer is idle.

When the option is turnedon, Norton AntiVirusautomatically schedulesthe optimization after youinstall an application onyour computer.Optimization improvesthe performance of yourcomputer bydefragmenting thefragmented parts of thedisk.

1 Idle Time Out

Lets you specify the IdleTime Out duration afterNorton AntiVirusidentifies your computeras idle. You can specifythe Idle Time Out for aperiod of one minute to30 minutes. The defaultduration is 10 minutes.

1 Norton TaskNotification

Lets you configure NortonAntiVirus to show or hidethe notifications thatappear when automaticNorton Tasks are started.

Customizing protection featuresAbout customizing settings and options

304

Page 305: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Other Settings

305Customizing protection featuresAbout customizing settings and options

Page 306: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Lets you configure themiscellaneous settings.

Your options are:

1 Power Saving Mode

Lets you save your batterypower by suspending theNorton Tasks when yourcomputer is on batterypower.

By default, this option isturned on.

1 Monthly Report

Lets you view the MonthlyReport for the last 30days.

You can configure theMonthly Report optionsto remind you to viewMonthly Report.

1 SpecialOfferNotification

Lets you configure NortonAntiVirus to notify youabout special offers onthe latest Nortonproducts, add-ons, andother useful informationfrom Symantec.

1 Insight Protection

Lets Norton AntiVirus toperform an InsightNetwork scan on yourcomputer.

The Insight Network scanuses the virus definitionsthat are available locallyand hosted in the cloud.Norton AntiVirus providesadditional protection byusing the most recent

Customizing protection featuresAbout customizing settings and options

306

Page 307: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

definitions.1 Norton Community

Watch

Lets you submit selectedsecurity and applicationdata to Symantec foranalysis. Symantecanalyses the data todetermine any possiblesecurity risks andprovides you the usefulstatistical informationabout the applications.

The Detailed Error DataCollection option lets youallow or deny some of thedetailed datasubmissions. Thesedetailed data may varydepending on theNorton-specific errorsand components. You canuse the Always, Never,and Ask Me options toconfigure thesubmissions.

307Customizing protection featuresAbout customizing settings and options

Page 308: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

1 Remote Management

Lets you remotely viewyour device’s securitystatus and fix somesecurity issues by usingNorton Management,Norton One, and NortonStudio. Norton Sudio is anapp that works onWindows 8.

When you turn onRemoteManagement, NortonAntiVirus publishesdetails such as yoursubscription status,security status of yourdevice, and other detailsto the NortonManagement, NortonOne, and Norton Studioapp. These details helpyou view and fix securityissues of your device. Youcan access these detailsby using Norton Studioapp in Windows 8, orusing NortonManagement and NortonOne from anywhere tomanage Norton AntiViruson your device.w By default, thisfeature is disabled unlessyou register your NortonAntiVirus with yourNorton Account.

Customizing protection featuresAbout customizing settings and options

308

Page 309: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Performance Monitoring

309Customizing protection featuresAbout customizing settings and options

Page 310: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Lets you monitor theperformance of yourcomputer.

1 PerformanceMonitoring

When you turn on thePerformanceMonitoringoption, Norton AntiVirusmonitors the CPU usageand memory usage ofyour computer. You canalso monitor theimportant systemactivities that youperformed for the lastthree months in thePerformance window.

In addition, NortonAntiVirus notifies youwith performance alertswhen there is high usageof your system resourcesby a program or process.

Your options are:2 PerformanceAlerting

Lets you configureNorton AntiVirus todetect and notify youabout the increasedusage of yourcomputer resourcesby any program orprocess.

Norton AntiVirusnotifies you with thedetails of the programname and resourcesthat the programuses. You can setPerformanceAlertingto theOn, LogOnly, orthe Off mode. The

Customizing protection featuresAbout customizing settings and options

310

Page 311: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Details&Settings linkin the notificationalert lets you viewadditional detailsabout the resourceconsumption by theprogram in the FileInsight window.

2 Resource ThresholdProfile for Alerting

Lets you configure theresource thresholdprofile for displayingperformance alerts.

2 Use Low ResourceProfile On BatteryPower

Lets you configureNorton AntiVirus tochange the resourcethreshold to lowprofile when yourcomputer runs onbattery power.

311Customizing protection featuresAbout customizing settings and options

Page 312: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

2 Alert for High-Usageof:2 CPU

When this optionis turned on,Norton AntiVirusdetects andnotifies you withthe details ofincreased usage ofthe CPU resourceby any program orprocess.

2 Memory

When this optionis turned on,Norton AntiVirusdetects andnotifies you aboutthe increasedusage of memoryby any program orprocess.

2 Disk

When this optionis turned on,Norton AntiVirusdetects andnotifies you aboutthe increasedusage of your diskby any program orprocess.

2 Handles

When this optionis turned on,Norton AntiVirusdetects andnotifies you aboutthe increasedusage of handles

Customizing protection featuresAbout customizing settings and options

312

Page 313: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

by any program orprocess.

2 Program Exclusions

Lets you selectspecific programs toexclude fromappearing inperformance alerts.

313Customizing protection featuresAbout customizing settings and options

Page 314: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Product Security

Customizing protection featuresAbout customizing settings and options

314

Page 315: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Lets you protect NortonAntiVirus from unauthorizedchanges.

Your options are:

1 Non-Admins Access toSettings

Lets you access andconfigure all the optionsin the Settings windowfrom a non-admin useraccount as well.

By default, this option isturned off. You need tolog in to your computer asan administrator to turnon this option. You cannotaccess the Settingswindow if the Settingswindow is opened in someother user account onyour computer.

1 Norton Product TamperProtection

Lets you protect yourNorton product from anattack or modification byunknown or suspiciousapplications.

1 Settings PasswordProtection

Lets you set up apassword to protectNorton AntiVirus settings.

It protects the productsettings fromunauthorized access. Ifyou set a password, youmust enter the passwordeach time that you wantto view or configure your

315Customizing protection featuresAbout customizing settings and options

Page 316: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

product settings.

However, if you forgetyour settings password,you can reset thepassword in the windowthat appears when youchoose to uninstallNorton AntiVirus. You donot need to uninstall theproduct to reset yourpassword. You can usethe reset settingspassword option in theuninstall preferencewindow to reset yourpassword.

Customizing protection featuresAbout customizing settings and options

316

Page 317: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Silent Mode Settings

317Customizing protection featuresAbout customizing settings and options

Page 318: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Lets you turn on or turn offSilent Mode.

Your options are:

1 Silent Mode

When you turn on theSilentModeoption, SilentMode is enabled for aspecifiedduration.NortonAntiVirus suppresses allalerts and suspends thebackground activities forthe duration that youspecify.

1 Full Screen Detection

When you turn on the FullScreen Detection option,Norton AntiVirusautomatically detects theapplications that are runin full-screen mode andenables Silent Mode.Norton AntiVirussuppresses most of thealerts and suspends thebackgroundactivities. Theonly activities that run arethose that protect yourcomputer from virusesand other securitythreats.

1 QuietMode onDetectionof:2 IMAPI 2.0 Disk Burn

When you use theMedia Centerapplication to burn aCD or DVD, NortonAntiVirus detects theactivity, andautomatically turnson

Customizing protection featuresAbout customizing settings and options

318

Page 319: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Quiet Mode. WhenQuiet Mode is turnedon, Norton AntiVirussuppresses thebackground activitiesbut continues todisplay alerts andnotifications.

2 Media Center TVRecording

When you use theMedia Centerapplication to recorda TV program, NortonAntiVirus detects theactivity, andautomatically turnsonQuiet Mode. WhenQuiet Mode is turnedon, Norton AntiVirussuppresses thebackground activitiesbut continues todisplay alerts andnotifications.

319Customizing protection featuresAbout customizing settings and options

Page 320: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

2 User-SpecifiedPrograms

When you run anapplication that islisted in theUser-SpecifiedPrograms list, NortonAntiVirus detects theactivity, andautomatically turnsonQuiet Mode. WhenQuiet Mode is turnedon, Norton AntiVirussuppresses thebackground activitiesbut continues todisplay alerts andnotifications.

You can configure thelist of programs forwhich you want toturn on Quiet Mode.

About Norton Product Tamper Protection

Norton Product Tamper Protection prevents outsideprograms from making changes to the Norton product.This security feature also prevents Windows SystemRestore from changing Norton files, which results inthe Restoration Incomplete message.

Norton Product Tamper Protection protects NortonAntiVirus from an attack or modification by any virusor other unknown threat. You can protect your productfrom accidental modification or deletion by keepingthe NortonProductTamperProtection option turnedon.

If you want to temporarily turn off Norton ProductTamper Protection, you can turn it off for a specifiedduration.

Customizing protection featuresAbout customizing settings and options

320

Page 321: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

w You cannot run System Restore on your computer whenNortonProductTamperProtection is turned on. Youmust temporarily turn off Norton Product TamperProtection to run a successful System Restore.

Turning off or turning on Norton Product Tamper

Protection

Norton Product Tamper Protection protects the NortonAntiVirus files from an attack or modification by anyvirus or other unknown threat. You can protect yourproduct from accidental modification or deletion bykeeping the NortonProductTamperProtection optionturned on.

If you want to temporarily turn off Norton ProductTamper Protection, you can turn it off for a specifiedduration.

w You cannot run System Restore on your computer whenNortonProductTamperProtection is turned on. Youmust temporarily turn off Norton Product TamperProtection to run a successful System Restore.

To turn off Norton Product Tamper Protection

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Product Security.

4 In the Norton Product Tamper Protection row,move the On/Off switch to the right to the Offposition.

5 Click Apply.

6 In the Security Request dialog box, in the Selectthe duration drop-down list, select how long youwant to turn off Norton Product Tamper Protection.

7 Click OK.

8 In the Settings window, click OK.

321Customizing protection featuresAbout customizing settings and options

Page 322: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To turn on Norton Product Tamper Protection

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Product Security.

4 In the Norton Product Tamper Protection row,move the On/Off switch to the left to the Onposition.

5 Click Apply, and then click OK.

About securing Norton AntiVirus Settings usinga password

You can configure Norton AntiVirus to preventunauthorized access to your product settings. If youshare your computer with others and do not want themto modify your Norton AntiVirus Settings, you cansecure Norton AntiVirus Settings using a password.The Settings Password Protection option lets yousecure your Norton AntiVirus Settings by setting up apassword.

By default, Settings Password Protection option isturned off. You must turn on the Settings PasswordProtectionoption to set up a password for your productsettings. To use the Settings Password Protectionoption, go to the Norton AntiVirus main window, andthen click Settings >General >Product Security. Thepassword must be between 8 and 256 characters inlength.

After you set up a password for Norton AntiVirusSettings, you must enter the password each time toaccess or configure your product settings. If you forgetyour settings password, you can reset the password inthe window that appears when you choose to uninstallNorton AntiVirus. You do not need to uninstall theproduct to reset your password. You can use the resetsettingspassword option in the SelectyourUninstallPreference window to reset your password.

Customizing protection featuresAbout customizing settings and options

322

Page 323: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

w The reset settings password option appears in theSelect your Uninstall Preference window only whenthe SettingsPasswordProtection option is turned on.

You can turn off the Settings Password Protectionoption if you no longer require password protectionfor your Norton AntiVirus Settings.

Securing your Norton AntiVirus Settings using a

password

You can secure your Norton AntiVirus Settings fromunauthorized access by setting up a password for yourproduct settings. The Settings Password Protectionoption lets you secure your Norton AntiVirus Settingsusing a password.

After you set up a password for Norton AntiVirussettings you must enter the password each time to viewor configure your product settings.

By default, the Settings Password Protection optionis turned off. You must turn on the SettingsPasswordProtection option to set up a password for your productsettings.

w The password must be between 8 and 256 charactersin length.

To secure your Norton AntiVirus Settings using apassword

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Product Security.

4 In the SettingsPasswordProtection row, move theOn/Off switch to the left to the On position.

5 Do one of the following:

1 In the Settings Password Protection row, clickConfigure.

1 In the Settings window, click Apply.

323Customizing protection featuresAbout customizing settings and options

Page 324: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

6 In the dialog box that appears, in the Password box,type a password.

7 In the Confirm Password box, type the passwordagain.

8 Click OK.

9 In the Settings window, click OK.

Turning off Norton AntiVirus Settings password

You can protect your Norton AntiVirus Settings witha password using the Settings Password Protectionoption. If the Settings Password Protection option isturned on, you need to enter the Settings passwordeach time to view or configure your Norton AntiVirussettings. You cannot access the product settingswithout providing your Settings password.

w In case you forget your Settings password, you canreset it using the resetsettingspassword option in theSelect Uninstall Preference window.

You can turn off the Settings Password Protectionoption if you do not require password protection forNorton AntiVirus settings.

To turn off Norton AntiVirus Settings password

1 In the Norton AntiVirus main window, clickSettings.

2 In the dialog box that appears, in the Password box,type your Settings password, and then click OK.

3 In the Settings window, click the General settingstab.

4 In the left pane, click Product Security.

5 Click Apply, and then click OK.

Resetting your Norton AntiVirus Settings password

If you forget your Norton AntiVirus Settings password,you can reset the password. You can reset your NortonAntiVirus Settings password using the reset settings

Customizing protection featuresAbout customizing settings and options

324

Page 325: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

password option in the Select Uninstall Preferencewindow.

To access the SelectUninstallPreference window, youmust choose to uninstall Norton AntiVirus. However,you need not uninstall the product to reset yourSettings password.

w The reset settings password option appears in theSelect Uninstall Preference window only if theSettings Password Protection option is turned on. Touse the SettingsPasswordProtection option, go to theNorton AntiVirus main window, and then click Settings>General >Product Security.

To reset your Norton AntiVirus Settings password

1 On the Windows taskbar, do one of the following:

1 In Windows XP, Windows Vista, or Windows 7,click Start > Control Panel.

1 In Windows 8, on the Apps screen, underWindows System, click Control Panel.

2 In WindowsControlPanel, do one of the following:

1 In Windows XP, double-click Add or RemovePrograms.

1 In Windows Vista, click ProgramsandFeatures.

1 In Windows 7 or Windows 8, click Programs >Programs and Features.

The Programs option in Windows 7 or Windows8 is available when you select the Categoryoption in the View by drop-down list.

3 In the list of currently installed programs, do oneof the following:

1 In Windows XP, click Norton AntiVirus, andthen click Change/Remove.

1 In Windows Vista, Windows 7, or Windows 8,click Norton AntiVirus, and then clickUninstall/Change.

4 At the bottom of the Select Your UninstallPreference window, click reset settingspassword.

325Customizing protection featuresAbout customizing settings and options

Page 326: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

5 In the dialog box that appears, in the ResetPassword Key box, type the randomly generatedkey that is displayed against Reset Password Key.

6 In the New Password box, type the new password.

7 In the Confirm New Password box, type the newpassword again.

8 Click OK.

About Remote Management

The Remote Management feature lets you remotelymanage Norton AntiVirus using Norton Studio app,Norton Management, and Norton One. It allows NortonAntiVirus to send the product-related details to NortonManagement, Norton One, and Norton Studio app. Thedetails that Remote Management publishes help youview and fix some security issues of the device.

w By default, this feature is disabled unless you registeryour Norton AntiVirus with your Norton Account.

Norton Studio is a Metro App and works only onWindows 8. But, you can view the security status andfix security issues of your devices running earlierversions of Windows from Norton Studio app. In thiscase, you must turn on the RemoteManagement optionin your Norton product that is installed on your devices.For example, you have a Norton Studio app and Norton360 installed on your laptop running Windows 8. Youalso have Norton Internet Security and NortonAntiVirus installed on your desktops running WindowsXP and Vista, respectively. In this case, you can viewthe security status of all three devices in the NortonStudio app. If any of the device is at risk, you can alsofix them from the Norton Studio app.

To use the Remote Management feature, you need toregister your Norton AntiVirus with your NortonAccount. Your device needs to be connected to theInternet to use Remote Management feature. Whenthe Remote Management option is turned on, NortonAntiVirus publishes details such as your Norton

Customizing protection featuresAbout customizing settings and options

326

Page 327: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

AntiVirus subscription status, current security stateof your device, and other details to the NortonManagement, Norton One, and Norton Studio app. Youcan access your Norton Studio app in Windows 8, orNorton Management and Norton One from anywhereto view your Norton AntiVirus details and resolve anysecurity issue. When this option is turned off, NortonAntiVirus does not publish any of its details in theNorton Management, Norton One, and Norton Studioapp.

By default, the Remote Management option is turnedoff. You can turn on this option if you want to remotelymanage Norton AntiVirus on your device.

In the Norton Management, Norton One, and NortonStudio app, you can do the following:

1 View the security statistics of Norton AntiVirus forthe last 30 days (only in Norton Studio app)

w The activities that are displayed in Norton Studioapp may vary depending on the latest version ofNorton product that is installed on your devices.

2 Blocked malicious software

2 Blocked intrusions

2 Blocked spam messages

2 Blocked phishing Web sites

2 Blocked Safe Web sites

2 Quarantined items

2 Blocked Firewall threats

2 Total number of known threats

2 Total number of known attacks

2 Total number of known antiphishing sites

2 Timestamp of last full scan

2 Timestamp of last Quick Scan

2 Timestamp when stats were published

1 View health states of different components of yourdevice

327Customizing protection featuresAbout customizing settings and options

Page 328: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

2 Overall product health

2 Computer category health

2 Network category health

2 Web category health

1 Fix the following items:

2 Firewall

2 Auto-Protect

2 Scan incoming emails

2 Scan outgoing emails

2 Antispyware

2 Intrusion Prevention

2 SONAR

2 Antiphishing

2 Browser Protection

1 Perform the following tasks:

2 Resolve issues

2 Re-key Norton AntiVirus

2 Re-sync license

2 Run LiveUpdate

Turning on or turning off Remote Management

Remote management lets you remotely manage NortonAntiVirus using Norton Management, Norton One, andNorton Studio app. Norton Studio is a Metro App andworks only on Windows 8. When you turn on RemoteManagement option, you can view your NortonAntiVirus details and fix some security issues of yourdevice.

By default, this feature is disabled unless you registeryour Norton AntiVirus with your Norton Account.

When the Remote Management option is turned on,Norton AntiVirus sends details related to your Nortonproduct to Norton Management, Norton One, andNorton Studio app. When this option is turned off,

Customizing protection featuresAbout customizing settings and options

328

Page 329: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Norton AntiVirus does not publish any of its details inthe Norton Management, Norton One, and NortonStudio app.

By default, the Remote Management option is turnedoff.

In some cases, you are prompted to enter your NortonAccount password when turning on RemoteManagement option.

To turn on Remote Management

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Other Settings.

4 In the Remote Management row, move the On/Offswitch to the left to the On position.

5 Click Apply, and then click OK.

To turn off Remote Management

1 In the Norton AntiVirus main window, clickSettings.

2 In the Settings window, click the General tab.

3 In the left pane, click Other Settings.

4 In the Remote Management row, move the On/Offswitch to the right to the Off position.

5 Click Apply, and then click OK.

329Customizing protection featuresAbout customizing settings and options

Page 330: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Customizing protection featuresAbout customizing settings and options

330

Page 331: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

This chapter includes the following topics:

1 Finding the version number of your product

1 Finding the End-User License Agreement

1 About upgrading your product

1 About Norton Autofix

1 Staying informed about protection issues

1 About Support

1 About uninstalling

Finding the version number of your productIf you want to upgrade your Norton product or wantto reach the customer support for assistance, you mustknow your product version number. You can find theversion number of your product on your computer.

To find the version number of your product

1 In the Norton AntiVirus main window, clickSupport.

2 In the Support drop-down menu, move your mousepointer over About.You can note the version number of your productin the pop-up that appears.

8Finding additionalsolutions

Page 332: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Finding the End-User License AgreementEnd-User License Agreement (EULA) is a legaldocument that you agree to while installing theproduct. EULA contains information such as therestriction on sharing or usage of the software, theuser rights on the software, and the supportinformation.

You can read the EULA to learn more about thefollowing information:

1 The usage policies of Norton AntiVirus.

1 The terms and conditions for using NortonAntiVirus.

To find the End-User License Agreement

1 In the Norton AntiVirus main window, clickSupport.

2 In the Support drop-down menu, click UserLicenseAgreement.

3 Read the Norton License Agreement and click Close.

About upgrading your productNorton AntiVirus helps you upgrade your product ifyou have an active subscription. You can upgrade yourcurrent product to the latest version without any costas long as you have an active subscription with thecurrent product. If a new version of your product isavailable, Norton AntiVirus lets you download the newversion.

The Automatic Download of New Version optionautomatically downloads the latest available versionof Norton AntiVirus and prompts you for freeinstallation. To get the latest version of NortonAntiVirus, you need to turn on the AutomaticDownload of New Version option. To turn on theAutomatic Download of New Version option, go theNorton AntiVirus main window, and then click Settings

Finding additional solutionsFinding the End-User License Agreement

332

Page 333: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

> Updates > Automatic Download of New Version >On.

If you choose to install the latest version of the product,Norton AntiVirus downloads and seamlessly installsthe latest version. Ensure that you have saved all yourimportant data such as pictures and financial recordsbefore you install the new version of the product.

If you download and install the latest version of yourproduct, your subscription status remains the same asyour previous version of product. For example, youhave 200 days of subscription left with your currentversion of product and you upgrade your product tothe latest version. In this case, the subscription statusof your upgraded product remains 200 days only.

If a new version is not available, the Web page informsyou that no new version is available and your productis up to date. Symantec recommends that you have thelatest version of the product, as it contains new andenhanced features for better protection against securitythreats.

Product upgrade is different from the program updatesand the definition updates that are minorimprovements to your installed product. The maindifferences are as follows:

1 Product upgrade lets you download and install anew version of the entire product.

1 Definition updates are the files that keep yourSymantec products up to date with the latestantithreat technology.

1 Program updates are enhancements to NortonAntiVirus that Symantec issues periodically.

If a new version of the product is not available, ensurethat you have all the latest program updates anddefinition updates. LiveUpdate automates the processof obtaining and installing program and definitionupdates. You can use LiveUpdate to obtain the latestupdates.

333Finding additional solutionsAbout upgrading your product

Page 334: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

The upgrade process might not work if your Webbrowser is incompatible to communicate with theSymantec servers.

w Your product must be activated and you need anInternet connection to check and install new productversion.

Checking for a new version of the productYou can upgrade your product to the latest version ifyou have an active subscription. If you have a newversion available, you can download and install thenew version of your product. You can also let NortonAntiVirus notify you when a new version of yourproduct is available. You can do so by turning on theAutomatic Download of New Version option. To turnon the Automatic Download of New Version option,go the Norton AntiVirus main window, and then clickSettings > Updates > Automatic Download of NewVersion > On. The latest version of your product maycontain new and enhanced features for betterprotection against security threats.

When you check for a new version, details about yourproduct such as product name and version are sent toSymantec servers. The servers then check whether anew version of the specified product is available or not.

If a new version is available, you can download andinstall it from the Web page. If a new version is notavailable, the Web page informs you about it. In suchcase, you can run LiveUpdate to obtain latest programand definition updates and keep the existing versionof your product up to date.

The upgrade process might not work if your Webbrowser is incompatible to communicate with theSymantec servers. You can use Internet Explorerversion 6.0 or later, Chrome version 10.0 or later, andFirefox version 3.6 or later.

Finding additional solutionsAbout upgrading your product

334

Page 335: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

w Your product must be activated and you need anInternet connection to check if a new version isavailable and install new version of the product.

To check for a new version of the product

1 In the Norton AntiVirus main window, clickSupport.

2 In the Support drop-down menu, click NewVersionCheck.This option is available only if your product isactivated. The Web page that appears displayswhether a new version of the product is availableor not.

3 Follow the on-screen instructions to download thenew product.

About Norton AutofixNorton Autofix provides additional product supportwith one-click access from the Norton AntiVirus mainwindow. Norton Autofix performs a Quick Scan of yourcomputer and repairs problems without yourintervention. If the problem persists, you can use theOpen Support Web Site option to go to the NortonSupport Web site for help using our online forum, chat,email, or telephone.

In addition, the Norton Support Web site providesaccess to the knowledge base articles. By using thesearticles, you can easily find solutions to your technicalproblems.

The support technicians can help you solve morecomplex problems by using remote-assistancetechnology. The remote-assistance technology allowsSymantec support technicians to access your computeras remote users so that they can perform maintenanceor service.

w Support offerings can vary based on the language orproduct.

335Finding additional solutionsAbout Norton Autofix

Page 336: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

When you click the GetSupport option in the Supportdrop-down menu, Norton AntiVirus checks yourInternet connection. To access Norton Autofix, ensurethat your computer is connected to the Internet. If youuse a proxy server to connect to the Internet, you mustconfigure the proxy settings of Norton AntiVirus. See“Configuring Network Proxy Settings” on page 73.

If you do not know your proxy settings, contact yourInternet service provider or network administrator forassistance.

Solving a problem using Norton AutofixNorton Autofix performs a Quick Scan of yourcomputer and repairs problems without yourintervention. If a problem persists, you can use theNorton Support Web site for additional online supportand contact options.

Your computer must be connected to the Internet toaccess Norton Autofix. If you use a proxy server toconnect to the Internet, you must configure the proxysettings of Norton AntiVirus.

w If you do not want to proceed with the support session,you can use the Cancel option to bypass the scan.

To solve a problem if your computer is connected to theInternet

1 In the Norton AntiVirus main window, clickSupport.

2 In the Support drop-down menu, click GetSupport.

3 In the Norton Autofix window, do one of thefollowing:

1 If the problem is not fixed automatically, clickOpen Support Web Site, and follow theon-screen instructions to find additional support.

1 If the problem is fixed, click Close.

Finding additional solutionsAbout Norton Autofix

336

Page 337: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

To solve a problem if your computer is unable to connectto the Internet

1 In the Norton AntiVirus main window, clickSupport.

2 In the Support drop-down menu, click GetSupport.

3 Follow the on-screen instructions in the CheckingYourConnection window to attempt to correct yourconnection issue.

4 In the Checking Your Connection window, clickRetry.

5 If you use a proxy server to connect to the Internet,you may be prompted to authenticate. If you areprompted, then in the Proxy Settings Detectedwindow, do the following:

1 In the Username box, type the user name thatyou provided when you configured your NetworkProxy settings.

1 In the Password box, type the password that youprovided when you configured your NetworkProxy settings.

1 Click OK.

6 If the problem still persists, in the Norton Autofixwindow, click the click here link.Under SupportContactNumbers, select the region,and then your country to view the contact details.You can use the contact details to contact thetechnical support team.

Staying informed about protection issuesIf you need help using Norton AntiVirus, you can findhelpful information on the Symantec Web site. Itcontains many useful and informative features thatare especially designed to complement NortonAntiVirus, including the following:

1 Detailed background information about currentthreats and outbreaks.

337Finding additional solutionsStaying informed about protection issues

Page 338: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

1 Newsletter to which you can subscribe.

1 Protection blog that lets you post your owncomments and view comments from experts.

w The Symantec Web site is constantly updated andenhanced, so the available resources may vary.

To stay informed about protection issues

1 Open your Web browser, and go to the followingURL:http://www.symantec.com

2 In the Symantec Web site, click Norton.

3 In the menu bar that appears, do the following:

1 Click the Viruses&Risks tab, and then click anyitem on the left pane to find out more detailsabout it.

1 Click the Community tab, and then use one ofthe following:

Register as a user andparticipate in discussions.

You can create your own threadsof topics or take help from theexisting forum discussions.

Norton Forums

Read the messages thatprominent leaders post frominside and outside Symantec andobtain information straight fromthe source.

You can add comments or askquestions on the blogs that youare interested in.

Norton Blogs

Check about Norton in otherWeb sites and social networksthat are available.

Other NortonCommunities

Finding additional solutionsStaying informed about protection issues

338

Page 339: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

About SupportIf you have purchased Norton AntiVirus, you can accessSupport from the product.

w Support offerings may vary based on the language orproduct.

About Norton Support Web siteThe Norton Support Web site provides a full range ofself-help options.

By using Norton Support Web site, you can do thefollowing:

1 Find help with your product download, productsubscription, product activation, productinstallation, and other issues.

1 Find and download the latest product manual.

1 Manage your products and services using NortonAccount.

1 Search Norton Forum to find the additional producthelp about installing, configuring, andtroubleshooting errors. You can also post yourquestions in the forum and get answers fromexperts. To post your questions, you need to firstregister for Norton Forum.

1 Find information about the latest virus threats andremoval tools.

w Availability of support varies by region, language, orproduct. For additional support, go to the followingURL:

http://www.norton.com/support

In addition to the self-help options, you can use theContact Us option at the bottom of the Web page to

339Finding additional solutionsAbout Support

Page 340: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

contact the technical support team in the followingways:

Chat in real time with asupport representative.

For more complex technicalissues, chat offers the optionto allow a supportrepresentative to connectremotely to your computerand resolve your problem.

Live Chat

Submit your question on ourWeb site and receive aresponse by email.

Email support has a slowerresponse time than chat orphone.

Email

Speak to a supportrepresentative in real time.

Phone

Search for additional producthelp about installing,configuring, andtroubleshooting errors.

Norton Forums

Using the Norton Support Web site

Norton Support Web site contains answers to the mostcommon customer questions. You can find the latestproduct manual, knowledge base articles, and virusremoval tools.

Norton Support Web site contains problem-solvingarticles that are presented in an easy step-by-stepformat. The articles are categorized and listed on theleft side of the Web page. Using the categories, you canbrowse through the available support topics. You can

Finding additional solutionsAbout Support

340

Page 341: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

also use the SearchSupport box to find solution usinga keyword.

Norton Support Web site also contains useful links tothe product manual, the Norton Account, the NortonForum, and the spyware help under AdditionalResources.

To use the Norton Support Web site

1 In the Norton AntiVirus main window, clickSupport.

2 In the Support drop-down menu, click GetSupport.

3 Follow the on-screen instructions.

4 In the NortonAutofix window, click OpenSupportWeb Site.The Norton Support Web page appears.

5 Follow the on-screen instructions.

About phone supportNorton Autofix offers a range of technical support andcustomer service options. When you click the GetSupport option in the Support drop-down menu,Norton Autofix performs a Quick Scan and repairsproblems without your intervention.

If the problem persists, and you have an active Internetconnection, you can use the Open Support Web Siteoption in the NortonAutofix window. This option takesyou to the Norton Support Web site for additionalonline support and contact details.

You get the click here option in the Norton Autofixwindow, only when you have a problem connecting tothe Internet. You can use the click here link to get thephone number to contact a support representative.

w Support offerings may vary based on the language orproduct.

If you cannot access phone support by using NortonAutofix, then you can access the phone support optionsat the following URL:

341Finding additional solutionsAbout Support

Page 342: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

http://www.norton.com/support

Getting support by phone

When you click the GetSupport option in the Supportdrop-down menu, Norton Autofix performs a QuickScan and should repair your computer problems.However, if the problem persists, you can use the OpenSupport Web Site option to go to the Norton SupportWeb site for help by telephone, email, chat, or forum.

If you have a problem connecting to the Internet, youget the clickhere option in the NortonAutofix window.You can use the clickhere link to get the phone numberto contact a support representative.

w Availability of support varies by region. Regulartelephone and Internet connection fees apply in certaincountries.

To get support by phone if your computer is unable toconnect to the Internet

1 In the Norton AntiVirus main window, clickSupport.

2 In the Support drop-down menu, click GetSupport.

3 Follow the on-screen instructions.

4 In the Norton Autofix window, click the click herelink.

5 In the Norton Autofix window, under SupportContact Numbers, select the region, and then thelocation.You can use the phone number to contact a supportrepresentative.

To get support by phone if your computer is connectedto the Internet

1 In the Norton AntiVirus main window, clickSupport.

2 In the Support drop-down menu, click GetSupport.

3 After Norton Autofix scans, click the OpenSupportWeb Site link.The Norton Support Web page appears.

Finding additional solutionsAbout Support

342

Page 343: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

4 Click the Contact Us option at the bottom of theWeb page and follow the on-screen instructions.

Support policySymantec recommends that you have the latest versionof the product, as it contains new and enhancedfeatures for better protection against security threats.Current help and support for your Norton product canbe found at the following URL:

www.norton.com/support

Symantec reserves the right to change its supportpolicies at any time without notice. You can view thelatest version of the support policy at the followingURL:

www.symantec.com/supportpolicy

About keeping your subscription currentSubscription period lengths vary by Symantec product.To maintain uninterrupted protection, you must keepyour subscription up to date. If you do not renew yoursubscription, you cannot obtain updates of any kindand the software no longer functions.

When you run LiveUpdate near the end of yoursubscription period, you are prompted to subscribe fora nominal charge. Follow the on-screen instructionsto renew your subscription.

When you renew your subscription, the definitionupdates and new product features are availablethroughout the subscription period. Please note thatfeatures may be added, modified, or removed duringthis period.

Worldwide service and supportWorldwide service and support solutions vary bycountry. To contact one of our Support offices, pleasego to the following Web site and select your language.

343Finding additional solutionsAbout Support

Page 344: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

www.norton.com/support

If you are a Norton One Premium Member, go to thefollowing Norton One support Web site for informationon this topic:

https://one.norton.com/support

ClubNortonClubNorton is your one-stop resource center forInternet security. As a Norton customer, Symantecwants to make your experience with your computersafe, enjoyable, and productive. Whether you use yourcomputer to manage your personal finances, shoponline, or share your latest digital photos with friendsand family, ClubNorton makes your experience a goodone. Our goal is to consistently provide the proper toolsand information to keep you up to date.

For more information, go to the following URL andselect your country or region in the Select YourCountry/Region drop-down menu:

www.clubnorton.com

The ClubNorton Web page includes a regularly updatedarticle library, a glossary, the Norton Forums, and theNorton Update Center. You can also find the followinguseful links in the Web page:

1 Symantec Security Check

1 Subscription Troubleshooter

1 Home & Home Office Security

1 Product Manuals

1 Product Updates

1 Product Reviews

1 Order Status

1 Returns

1 Rebates

Finding additional solutionsAbout Support

344

Page 345: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

About uninstallingTo remove your Symantec product from your computer,use the Add/RemovePrograms option in the WindowsControl Panel.

You must restart your computer after uninstalling theproduct, so ensure that you do not have any otherprograms running while you follow this procedure.

Uninstalling Norton AntiVirusYou can remove Norton AntiVirus in the followingways:

1 From Windows Control Panel.

1 From the Start menu.

w You cannot access online Help while uninstalling.Therefore, you should print out the Uninstalling NortonAntiVirus Help topic before continuing to uninstall.

If you want to reinstall Norton AntiVirus on yourcomputer, you must uninstall Norton AntiVirus fromyour computer. You can reinstall the product using theinstallation file that you downloaded from SymantecWeb site or from the CD. To reinstall Norton AntiVirus,follow the installation procedures that are available inthe User's guide.

During uninstallation, Norton AntiVirus offers to leavethe Norton Toolbar for free to search and browse safelyover the Internet even after the product is uninstalled.You can choose to keep the Norton Toolbar thatcomprises Norton Safe Search and Norton Safe Webfeatures without any cost. Norton Safe Search providessite safety status and Norton rating for each of thesearch results generated. Norton Safe Web analysesthe security levels of the Web sites you visit andindicates if the Web sites are free from threats.

345Finding additional solutionsAbout uninstalling

Page 346: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

w Your computer must be connected to the Internet toavail this option. Norton AntiVirus does not offer toleave the Norton Toolbar if you upgrade your productto the latest version or choose to reinstall anotherNorton product. In addition, the Norton Toolbarinstallation is available only if the operating system ofyour computer is English.

To uninstall Norton AntiVirus from Windows ControlPanel

1 Do one of the following:

1 On the Windows taskbar, click Start > ControlPanel.

1 In Windows 8, go to Apps, and under WindowsSystem, Click Control Panel

2 In Windows ControlPanel, do one of the following:

1 In Windows XP, double-click Add or RemovePrograms.

1 In Windows Vista, click ProgramsandFeatures.

1 In Windows 7 or Windows 8, click Programs >Programs and Features.

The Programs option in Windows 7 andWindows 8 is available when you select theCategory option in the View by drop-down list.

3 In the list of currently installed programs, do oneof the following:

1 In Windows XP, click Norton AntiVirus, andthen click Change/Remove.

1 In Windows Vista, Windows 7, or Windows 8,click Norton AntiVirus, and then clickUninstall/Change.

Finding additional solutionsAbout uninstalling

346

Page 347: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

4 In the page that appears, under Select YourUninstall Preference, click one of the following:

Lets you retain your settings,passwords, and preferences forNorton features before youuninstall Norton AntiVirus.

Select this option if you want toreinstall Norton AntiVirus oranother Norton product.

I plan to reinstall aNorton product. Pleaseleavemy settings behind.

Lets you completely removeNorton AntiVirus without savingyour settings, passwords, andpreferences.

Please remove all userdata.

5 If Norton AntiVirus offers to install the NortonToolbar after uninstall, do one of the following:

1 To keep the Norton Toolbar after uninstall, clickAgree & Install.

1 To uninstall Norton AntiVirus without keepingthe Norton Toolbar, click Skip.

6 To uninstall Norton AntiVirus, click Next.

7 Do one of the following:

1 Click RestartNow (recommended) to restart thecomputer.

1 Click Restart Later to restart your computerlater.

Norton AntiVirus is not fully uninstalled until yourestart your computer.

To uninstall Norton AntiVirus from the Start menu

1 Do one of the following:

1 On the Windows taskbar, Click Start > AllPrograms > Norton AntiVirus> UninstallNorton AntiVirus

1 In Windows 8, go to Start screen and then clickUninstall Norton AntiVirus

347Finding additional solutionsAbout uninstalling

Page 348: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

2 In the page that appears, under Select YourUninstall Preference, click one of the following:

Lets you retain your settings,passwords, and preferences forNorton features before youuninstall Norton AntiVirus.

Select this option if you want toreinstall Norton AntiVirus oranother Norton product.

I plan to reinstall aNorton product. Pleaseleavemy settings behind.

Lets you completely removeNorton AntiVirus without savingyour settings, passwords, andpreferences.

Please remove all userdata.

3 If Norton AntiVirus offers to install the NortonToolbar after uninstall, do one of the following:

1 To keep the Norton Toolbar after uninstall, clickAgree & Install.

1 To uninstall Norton AntiVirus without keepingthe Norton Toolbar, click Skip.

4 To uninstall Norton AntiVirus, click Next.

5 Do one of the following:

1 Click RestartNow (recommended) to restart thecomputer.

1 Click RestartLater to restart the computer later.

Norton AntiVirus is not fully uninstalled until yourestart your computer.

Finding additional solutionsAbout uninstalling

348

Page 349: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Aabout customer support 339accessing

Facebook Scan 122accessing Norton AntiVirus scans

Computer Scan 122Reputation Scan 122

Actions windowdeleting security risks 253performing actions 253restoring security risks 253submission, items to

Symantec 253activation

about 11alerts 12Norton Account 16problems 15procedure 12troubleshooting 15

Advanced Modeallow an event 161

adwareabout 215found by Auto-Protect 187in freeware programs 215protection features 275

AggressiveSONAR Protection 161

alertsWorm Blocking 192

Antispywaremanaging using the main

window 216Application Ratings

check trust level 108Scan Performance Profiles 110

attack signatures 208attention

infected files 194infected items 128resolve any items 128

Attention Requiredabout 128resolving the risk 128

Auto-Protectfunctions 271notifications 187turning on and off 277

automatic featuresdisabling 276

Automatic LiveUpdateturning off or turning on 67

Bbackground jobs

about 95monitoring 98

Index

Page 350: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Bandwidthdefining usage 239managing 237

Boot Time Protection 181configure 182

Cchanging

scan schedules 137cloud technology

Cloud 140ClubNorton

security tips 344communication port

modifying 236computer

protection status 39Computer Settings

about 284computers

blocking with AutoBlock 211IP address 230

CPU graphabout 88obtaining historical data 90resource-consuming

processes 90CPU usage

viewing 89Creating custom scans

adding files 129adding folders 129

custom scanconfigure scan options 131select items 130

custom scansabout 129creating 129deleting 133editing 132particular area 129

custom scans (continued)running a custom scan 133scan frequently 129schedule the custom scan 129scheduling 134, 137

customer supportabout 339using 340

Ddefinition status 66definition updates 60

obtaining 70deleting

custom scans 133deleting custom scans

deleting 133detecting

security risks 186device

adding 228editing details 231remotely monitoring 221removing from the Network

Security Map 233viewing 221

Download Insightabout 197configuring alerts 203turning off notifications 202turning on notifications 202

Download Intelligenceturning off 201turning on 201

Eemergency

preparations 115ensuring

protection settings 116

Index350

Page 351: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

EULAchecking 332

Events graphmonitoring activities 77

Ffeatures 271

security risk protection 275file extensions

of infected files 194Full Screen Detection

about 169Full System Scan

running Full System Scan 125scheduling 136

Hhigh-risk security threats

excluding from scanning 164

IIdle Time Optimizer

about 93turning off 94turning on 94

Idle Time Outsetting 161

Idle Time Scansabout 158Full System Scan 158Quick Scan 158turning off 160turning on 160

Insight Networkabout 140cloud computing 140Insight Network scan 140Quick Scan 140scan 140shortcut menu scan 140

Insight Network (continued)Single File Scan 140

Insight Protectionturning off 142turning on 142

installationproblems 44, 51

Instant Messengervirus protection 271

Intrusion AutoBlockturning on and off 211unblocking computers 212

Intrusion Preventionabout 208turning individual notifications

on and off 209turning notifications on and

off 209IP addresses 230

finding 230items

submitting fromQuarantine 269

Kkeystroke logging 215, 275

LLiveUpdate

about 59Smart Definitions 62–63using 65when to run 64

low resource profile on batteryturning off 85turning on 85

Mmaintaining protection

about 115

351Index

Page 352: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

maintaining protection(continued)

avoiding security risks 115Manual Repair

reviewing remaining risksin 194

Manual Repair windowreviewing remaining risks

in 125, 127Media Center Extender

Silent Mode 173Memory graph

about 88obtaining historical data 90

Miscellaneous Settingsabout 301

Monthly Reportabout 112viewing 113

NNetwork

discovering devices 226editing details 233forming 226joining 226managing 219

Network Cost Awarenessabout 237defining bandwidth 239turning off 238turning on 238

Network Proxy Settingsabout 71configuring 73

Network Security Mapabout 219adding devices 228modifying communication

port 236purging 233

Network Security Map (continued)removing devices 233turning off 227turning off Network Security

Overview 220turning on Network Security

Overview 220viewing device details 235viewing devices 221wireless network

viewing status 234Network Security Overview

turning off 220turning on 220

Network Settingsabout 293

new versionchecking 334

newsletter 344non-admin account 279Norton Account

about 16accessing 21creating 20

Norton AntiVirusabout securing 322activating 12background jobs 95EULA 332icon 56new version 334password 323–324protecting 324registering 20securing 323settings 279, 293shortcut menu 58starting from the DOS command

prompt 56uninstalling 345upgrading 332

Index352

Page 353: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Norton AntiVirus (continued)version number 331

Norton AntiVirus scanabout 118accessing Norton AntiVirus

scans 122command line scanning 138Computer Scan 118custom scans 129Full System Scan 125Idle Time Scan 118Insight Network 140Insight Network scan 118Quick Scan 126Reputation Scan 118

Norton AntiVirus settingsresetting password 324

Norton Autofixsupport assistants 335

Norton Bootable Recovery Toolabout 42using 51

Norton Bootable Recovery ToolWizard

downloading 44Norton Community Watch

about 40joining 40turning off or turning on 278

Norton Insightabout 101Files of Interest 105refreshing trust level 105trusted files 101viewing processes 105

Norton LiveUpdateabout 59obtaining updates 65

Norton Product Tamper Protectionabout 320turning off 321

Norton Product TamperProtection (continued)

turning on 321Norton Tasks

about 95notification area

icon 56shortcut menu 58

notificationsAuto-Protect 187Intrusion Prevention 209

OOffice documents

embedded objects 167scanning office documents 167turn on or turn off 168virus macros 167

One Click Supportusing 336

Optimizationabout 91boot volume 92

Optionscustomizing 279password protection 271

Ppassword

for Settings 279Performance

accessing 77alerts 81monitoring 89

performance alertsabout 81configure 82configure threshold 84excluding programs 86

353Index

Page 354: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

performance alerts (continued)removing programs from

exclusion list 87turning off 82turning off low resource

profile 85turning on 82turning on low resource

profile 85preparing for emergencies

maintaining protection 115problem solving 337problems

problems found during 194resolve any items 194solving 336

Product Key 14accessing 21

product passwordprotecting 323

product status 66program

patches 60program updates 60protection

preparing for emergencies 115system scans 125

protection settingsconfiguring 116ensuring 116turning on 116

proxy serverconfiguring 73settings 71

Pulse Updatesabout 70using 70

QQuarantine

adding an item 268

Quarantine (continued)items, submitting for

analysis 269managing items 265opening 265restoring items 268

Quarantined Items viewadding items 243

Quick Scan 271scheduling 137

Quiet Modeabout 169, 174disk burning 174options 177turning off 177turning on 177TV recording 174User-Specified Programs 179

RReal Time Exclusions

about 163Remote Management

about 326turning off 328

Remote managementturning on 328

Remote Monitoringsetting up 226

repairactions 194infected files 194removable media 194system files 194

repairingviruses 271

Reputation Scanabout 143results 149running Custom Scan 148running Full System Scan 147

Index354

Page 355: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Reputation Scan (continued)running Quick Scan 147

restoring itemsQuarantine 268

resultresolved risks 128

Results Summaryabout 128resolved risks 128total items scanned 128

Running custom scansscanning required files 133scanning required folders 133

running Full System ScanReputation Scan 147scanning entire computer 125

running Quick Scanfast scan 126Insight Network Quick Scan 126Quick Scan 126Reputation Scan 147

Sscan at the command prompt

command line scanning 138Scan Complete

appearing after a scan 194Scan Complete window

appearing after a scan 125, 127Scan Facebook Wall

about 155enabling 157

scannedtotal items scanned 128

scanningautomatically 134entire computer 125individual elements 127problems found during 194

Scanscommand line 138

Scans (continued)Computer Scan 123create a custom scan 129Custom Scan 123deleting custom scans 133file 127floppy disk 127folder 127Full System Scan 123hard drive 127Insight Network 140Norton Bootable Recovery

Tool 51Quick Scan 123removable drive 127running custom scans 133using custom 129

schedulingcustom scans 134scans 134

scheduling custom scanmultiple schedules 134

scheduling custom scansscheduling Full System

Scan 134searching

Security History 263Security History

about 241Actions window 253adding items to the

Quarantine 243full alert history 243importing or exporting 263manual scan results 243opening 243Quarantine 265Quick Search 263recent alert history 243searching 263security risks 243

355Index

Page 356: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Security History (continued)submission, items to

Symantec 243suspicious email 243viewing items 243viewing quarantined items 243

security risksabout 215, 275adding to Quarantine 268assessment 275found by Auto-Protect 185, 187managing protection using the

main window 215other programs 215protection features 275restoring 275restoring from Quarantine 268scan 275

security status indicatorviewing 39

self-healing 335Settings

accessing 280configuring 279customizing 279Miscellaneous 301

settings passwordresetting 324turning off 324

Settings Password Protectionabout 322configuring 323resetting 324turning off 324

Signature Exclusionsabout 164

Signature Ezclusionsexcluding items 165

signaturesincluding and excluding 210

Silent Modeabout 169Full Screen Detection 173Media Center Extender 173turning off 171, 173turning on 171, 173, 301turning on manually 171

Smart Definitionsabout 62turning on or turning off 63

SONAR Protectionabout 161emerging threats 161heuristic technology 161SONAR Advanced Mode 161turning off 162turning on 162

spywareabout 215found by Auto-Protect 187managing protection using the

main window 215protection features 275

startingvirus protection 271

startup files 186submission, items to Symantec 269subscription

maintaining 343product updates 66

summaryproduct features 271

SupportAutoFix Scan 336Self Help 339solving problems 336worldwide service 343

Support policy 343Symantec Security Response 269

viewing submitted files 243

Index356

Page 357: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

Symantec Support Web siteabout 339using 340

Symantec Web siteblogs and forums 337

System Insightabout 75Events graph 75monitoring activities 77Performance graph 75

system status graphactivity details 80

System Status indicatorsresponding 38

Ttechnical support

about 339using 340

threatsavoiding 115newly discovered 66

Trust ControlIntrusion Prevention and 208

UUninstall

about 345procedure 345

unknown viruses 271updates

automatically 67checking 65obtaining 70Pulse Updates 70summary 60

upgradingnew version 332

User-Specified Programsabout 179

User-Specified Programs(continued)

adding programs 179Quiet Mode 179removing programs 180

Vversion number

checking 331virus protection

about 271system scans 125updates 271

virusesautomatic protection 271descriptions 271unknown 271

Vulnerability Protectionabout 213–214viewing programs 214

Wwireless network

viewing status 234Worm Blocking

threats found by 192worms

found by Worm Blocking 192in email messages 192

357Index

Page 358: Product Manualstatic.highspeedbackbone.net/pdf/Symantec Norton... · before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine

foo

Norton from Symantec products protect consumers from traditional threats with antivirus, antispam, and Spyware Protection.They also protect against bots, drive-by downloads, and identity theft, and are light on system resources. In addition, Symantecprovides services such as online backup and PC Tuneup, and is a trusted source for family online safety. For more information,please click one of the following links:

Antivirus | Antispam | Spyware Protection | Online Backup

Copyright © 2012 Symantec Corporation. All rights reserved. Symantec, Norton, and the Norton Logo are trademarks or registeredtrademarks of Symantec Corporation and its affiliates in the U.S. and other countries. Other names may be trademarks of theirrespective owners.