Check Your Computer's Vulnerability To Attack; Identify The Source Of Internet Traffic - Symantec NORTON INTERNET SECURITY 2004 User Manual

Table of Contents

Advertisement

58
Basics

Check your computer's vulnerability to attack

Check your computer's vulnerability to
attack
w

Identify the source of Internet traffic

Use Security Check to test your computer's vulnerability
to security intrusions. The Security Check link in Norton
Internet Security connects you to the Symantec Web site,
where you can scan for vulnerabilities and get detailed
information about Security Check scans.
You must be connected to the Internet to check your
computer's vulnerability.
To check your computer's vulnerability to attack
1 In the main window, click Security.
2 Click Check Security.
3 On the Security Check Web page, click Scan for
Security Risks.
4 To learn more about the Security Check tests, click
About Scan for Security Risks.
When the scan is complete, the results page lists all of
the areas that were checked and your level of
vulnerability in each one. For any area marked as at risk,
you can get more details about the problem and how to
fix it.
To get more information about an at-risk area
On the results page, next to the scan name, click
4
Show Details.
Visual Tracking helps you learn more about computers
that attempt to connect to your computer. Using Visual
Tracking, you can identify the location of the
used and contact information for the owner of the
address. You can use this information to identify the
origin of an attack and to learn more about intrusion
attempts.
IP address

Advertisement

Table of Contents
loading

Table of Contents