Symantec 10067161 - 10PK NORTON ANTIVIRUS Product Manual

Product manual
Hide thumbs Also See for 10067161 - 10PK NORTON ANTIVIRUS:

Advertisement

Quick Links

Product Manual
Care for our Environment, It's the right thing to do'.
Symantec has removed the cover from this manual to reduce the Environmental Footprint of our
products. This manual is made from recycled materials.

Advertisement

Table of Contents
loading

Summary of Contents for Symantec 10067161 - 10PK NORTON ANTIVIRUS

  • Page 1 Product Manual Care for our Environment, It's the right thing to do’. Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual is made from recycled materials.
  • Page 2 AntiSpam, Norton AntiVirus, Norton Internet Security, Norton 360, and Norton SystemWorks are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Windows is a trademark of Microsoft Corporation. Portions of this product Copyright [1996-2008] Glyph & Cog, LLC.
  • Page 3 Documentation”), that accompanies this IMPORTANT: PLEASE READ THE TERMS License Agreement (collectively the AND CONDITIONS OF THIS LICENSE Software”) is the property of Symantec or AGREEMENT ( LICENSE AGREEMENT”) its licensors, and is protected by copyright CAREFULLY BEFORE USING THE law.
  • Page 4 You may be required to provide A. You shall have the right to receive new Your unique activation code accompanying features to the Software as Symantec, in its the Software and Device configuration in the sole discretion, makes such features available...
  • Page 5: Limited Warranty

    Software to You. Rights: Your sole remedy in the event of a breach of this warranty will be that Symantec will, at For U.S. Government procurements, the its option, replace any defective media Software is deemed to be commercial returned to Symantec within the warranty computer software as defined in FAR 12.212...
  • Page 6 License Agreement and You shall cease use without Your permission. Files of this type of and destroy all copies of the Software and are being collected by Symantec only for the Documentation. The disclaimers of purpose of improving the ability of warranties and damages and limitations on Symantec’s products to detect malicious...
  • Page 7 Software initial setup of such Device. If collected, the encountered the problem. This information name will be used by Symantec as an account will be sent to Symantec only with Your name for the Device under which You may...
  • Page 8 may collect, transmit, store, disclose and analyze such information for these purposes. CPS / S 5.0 / USE...
  • Page 9: Table Of Contents

    Contents Chapter 1 Getting started ........11 Activation protects you ......11 About your Norton Account ......15 About Norton AntiVirus main window ........... 22 About Norton Community Watch ....35 About Norton Bootable Recovery Tool ..........37 Starting Norton AntiVirus from the command prompt ......
  • Page 10 Contents About Vulnerability Protection ....194 About the types of security risks ....197 About configuring POP3 and SMTP ports ..........198 About the Network Security Map ....201 About Metered Broadband Mode ....219 Chapter 6 Monitoring protection features ....
  • Page 11: Getting Started

    Getting started This chapter includes the following topics: Activation protects you About your Norton Account About Norton AntiVirus main window About Norton Community Watch About Norton Bootable Recovery Tool Starting Norton AntiVirus from the command prompt About the Norton AntiVirus icon About LiveUpdate About Network Proxy settings Activation protects you...
  • Page 12: Activating Your Product

    Product activation reduces software piracy and ensures that you use authentic Symantec software. Activation provides you with a specified period of subscription to your Norton product. You can also renew your subscription to continue using Norton AntiVirus.
  • Page 13 3 In the window that appears, click Done. Where to find your product key The product key is a unique key that helps you to install and activate the Symantec product on your computer. The product key is a 25-character alphanumeric string...
  • Page 14 The product key is on the on DVD DVD package. If you downloaded the The product key is stored on product from the Symantec your computer as part of the Store download process and is included in the confirmation email from the Symantec Store.
  • Page 15: About Your Norton Account

    Products tab in the Norton Account page. About problems during activation If you cannot connect to the Symantec servers to activate your product, first check your Internet connection. You then need to see if you have parental control software, either installed or through your ISP, that might block the connection.
  • Page 16 Getting started About your Norton Account moments to create your Norton Account. You must be connected to the Internet to create a Norton Account. After you create a Norton Account, you can access and manage your account information and product information from anywhere.
  • Page 17 Getting started About your Norton Account After you log in to your Norton Account, you can manage your product information with the following options: Products Saves the information for all of the Norton products that you own. The Products tab provides you the information about the Norton products that you own and the expiration date.
  • Page 18 Getting started About your Norton Account Profile Saves your account information and your billing details. The Profile options are: Account Information You can update your Norton Account information and your shipping address on the Account Information tab. After you update, click Update to save the changes.
  • Page 19 You need to provide your email address. You need to use the same email address that you provided when you created your Norton Account. Symantec sends a temporary password to your email address. You can use the temporary password for a limited time period.
  • Page 20 Norton Account. In this case, you can continue using the same Norton Account login credentials. Symantec products that are older than the 2006 product year do not appear in your Norton Account.
  • Page 21 Getting started About your Norton Account To create a Norton Account from the Norton Account Web page 1 In the Norton AntiVirus main window, click Account. 2 In the Norton Account Web page that appears, click Sign up now. 3 In the Norton Account Sign Up Web page, provide the details about your account information, and then click Sign Up.
  • Page 22: About Norton Antivirus Main Window

    About Norton AntiVirus main window if required. Your computer must be connected to the Internet to access your Norton Account. Symantec products that are older than the 2006 product year do not appear in your Norton Account. To access Norton Account 1 In the Norton AntiVirus main window, click Account.
  • Page 23 CPU and memory usage by your Norton product. Feedback Lets you provide feedback on the product on a Symantec Web page. This feature may not be available in some versions of Norton AntiVirus. Account Lets you create or access your Norton Account.
  • Page 24 Getting started About Norton AntiVirus main window Support Lets you access the Norton Autofix window that provides you various support options. You can also access the online Help from the Support drop-down menu. Help provides links to information that assists you with the specific tasks that you want to complete.
  • Page 25 Facebook Wall periodically to protect you from malicious links. LiveUpdate Lets you run LiveUpdate to download the latest virus definitions and program updates. Norton AntiVirus uses the latest virus definitions from Symantec servers to detect and remove latest security threats.
  • Page 26 Getting started About Norton AntiVirus main window Advanced Lets you access the Norton AntiVirus advanced window. By using the Norton AntiVirus advanced window, you can do the following: Run different scans. View Security History. View the quarantined items in the Security History window.
  • Page 27 The details on the Activity Map are updated from a Symantec server on a regular basis. Your computer must be connected to the Internet to receive the activity map updates.
  • Page 28 Getting started About Norton AntiVirus main window Manage Lets you access Norton Management. Norton Management lets you manage your Norton products on all of your devices from one location. Click the Manage icon at the bottom of the main window to sign up for or log into Norton Management.
  • Page 29 Getting started About Norton AntiVirus main window Backup Lets you set up the Norton Online Backup account or access your online backup status. Norton Online Backup may not be available in some versions of Norton AntiVirus. When you click the Backup icon on the main window, the bottom section displays Norton Online Backup...
  • Page 30 Getting started About Norton AntiVirus main window Safe Web Lite...
  • Page 31 Download Norton Safe Web Lite option. You can use the Download Norton Safe Web Lite option to access the Symantec Web page and download Norton Safe Web Lite. After you install Norton Safe Web Lite, you can view the Norton Safe Web Lite Toolbar on your Web browser.
  • Page 32 Getting started About Norton AntiVirus main window browser. Your activation status or subscription status appears at the bottom of the main window. You can use the Activate Now option to activate or subscribe your Norton product. About the Norton AntiVirus advanced window The Norton AntiVirus advanced window acts as a security management interface.
  • Page 33 Getting started About Norton AntiVirus main window Network Protection Provides you the essential network protection options. It also contains links to the list of vulnerable programs and Network Security Map. You can view the different protection features on the right side of the window. You can move your mouse pointer over each feature to view a brief summary about the feature.
  • Page 34 Getting started About Norton AntiVirus main window At Risk Indicates that your computer and activities are at risk. Take immediate action to improve your protection status. You can respond to the System Status indicators directly from the main window. To respond to System Status indicators from the main window 1 In the bottom section of the Norton AntiVirus main window, click Fix Now.
  • Page 35: About Norton Community Watch

    Norton Community Watch improves user security and product functionality. In addition, it helps Symantec to analyze the execution, schedule, and efficiency of Norton-specific tasks and settings on your computer.
  • Page 36 General information about your computer such as idle time, standby, and screensaver settings After the potential security risks are assessed from the submitted data, Symantec sends the information back to Norton AntiVirus. The Norton features such as Norton Insight and Insight Network use this information to identify files and processes at risk.
  • Page 37: About Norton Bootable Recovery Tool

    About Norton Bootable Recovery Tool Community Watch. You can also review the data, which Norton Community Watch collects and submits to Symantec, in the Security History window. About Norton Bootable Recovery Tool Norton Bootable Recovery Tool scans and removes viruses, spyware, and other security risks from your computer.
  • Page 38 Getting started About Norton Bootable Recovery Tool Norton Bootable Recovery Tool detects and resolves the following security threats: Viruses Programs that infect another program, boot sector, partition sector, or document by inserting themselves or attaching themselves to that medium. Most viruses just replicate;...
  • Page 39 Getting started About Norton Bootable Recovery Tool Trackware Programs that track system activity, gather system information, or track user habits, and relay this information to third-party organizations. The information that is gathered by such programs is neither personally identifiable nor confidential.
  • Page 40 Getting started About Norton Bootable Recovery Tool You can download Norton Bootable Recovery Tool Wizard in one of the following ways: From the Start menu. From the Norton Support Web site. To download the Norton Bootable Recovery Tool Wizard from the Start menu 1 On the Windows taskbar, do one of the following: In Windows XP, click Start >...
  • Page 41: Using The Norton Bootable Recovery Tool

    Getting started About Norton Bootable Recovery Tool Using the Norton Bootable Recovery Tool If the installation of your Norton product fails, you can use the Norton Bootable Recovery Tool to scan and remove any security threats that prevent successful installation. If your computer is infected and you are not able to start your Windows operating system, you can use Norton Bootable Recovery Tool to remove threats and recover your computer.
  • Page 42: Starting Norton Antivirus From The Command Prompt

    Getting started Starting Norton AntiVirus from the command prompt Starting Norton AntiVirus from the command prompt If you work from the command line (for example, writing a script or code), you can start Norton AntiVirus while you are still in DOS. To start Norton AntiVirus from the command prompt 1 At the command-line prompt, type the directory where Norton AntiVirus is located, and the...
  • Page 43 Getting started About the Norton AntiVirus icon most cases, you can click the link available in the alert to view the details and fix the problems. The Norton AntiVirus icon represents the current state of your computer. The icon changes its color when it actively fixes any issues or wants to inform you about any warning or urgent issues.
  • Page 44 Getting started About the Norton AntiVirus icon About Norton AntiVirus shortcut menu Norton AntiVirus performs background activities to keep your computer secure. The icon in the notification area reassures you that your protection is up to date. The icon changes its color if any change in status occurs.
  • Page 45: About Liveupdate

    About LiveUpdate Symantec products download the latest definition updates and program updates regularly from Symantec servers. The definition updates protect your computer from the latest viruses and unknown security threats. Using the LiveUpdate technology, Symantec products help you to obtain and install these updates.
  • Page 46 Definition updates are the files that keep your Symantec products up to date with the latest antithreat technology. The definition updates that you receive depend on which product you use.
  • Page 47 Getting started About LiveUpdate The type of definition updates that each of the Symantec products receive are as follows: Norton AntiVirus, Norton Users of these products AntiVirus Online receive the latest virus definitions from Symantec that protects your computer from all types of security threats.
  • Page 48 Getting started About LiveUpdate Norton 360, Norton 360 Online Users of these products receive the latest virus definitions from Symantec that protects your computer from all types of security threats. In addition, users of these products receive Symantec spam definition files and definition updates against phishing.
  • Page 49 Core Set Contains the most important virus definitions that are required for latest security threats as viewed by Symantec. The Core Set is a subset of the Complete Set, and it is approximately 30 percent smaller than the Complete Set.
  • Page 50 5 Click OK. About running LiveUpdate You should run LiveUpdate as soon as you install Norton AntiVirus. Some Symantec products run LiveUpdate automatically to keep your protection up to date. If you do not use the Automatic LiveUpdate option, you should manually run LiveUpdate once a week.
  • Page 51 These updates protect your computer from newly discovered threats. LiveUpdate uses the Internet connection to connect to the Symantec server, checks for updates, and then downloads and installs them automatically. You should have the Automatic LiveUpdate option turned on to ensure that you have the latest definition updates and program updates.
  • Page 52 To check for updates manually 1 In the Norton AntiVirus main window, click LiveUpdate. LiveUpdate connects to the Symantec server, checks for available updates, and then downloads and installs them automatically. 2 In the Norton LiveUpdate window, when the installation is complete, click OK.
  • Page 53 Getting started About LiveUpdate you can acquire the product and maintain your status are as follows: If you purchased The product includes a limited-time a subscription subscription to definition updates. When version of a retail the subscription is due to expire, you are product prompted to renew.
  • Page 54 Getting started About LiveUpdate run LiveUpdate manually to obtain updates if you have turned off the Automatic LiveUpdate option. If you are connected to the Internet, Automatic LiveUpdate downloads product updates and definition updates every hour. If you have an Integrated Services Digital Network (ISDN) router that is set to automatically connect to your Internet service provider (ISP), it may incur charges each time.
  • Page 55 Getting started About LiveUpdate About Pulse Updates In addition to the definition updates that Automatic LiveUpdate downloads, Norton AntiVirus uses streaming technology to download the latest virus definitions. These downloads are called Pulse Updates. The Pulse Updates are lighter and faster than Automatic LiveUpdate.
  • Page 56: About Network Proxy Settings

    Getting started About Network Proxy settings turn on or turn off Pulse Updates only if Automatic LiveUpdate is turned on. To turn off or turn on Pulse Updates 1 In the Norton AntiVirus main window, click Settings. 2 In the Settings window, in the left pane, click Updates.
  • Page 57 Getting started About Network Proxy settings the Internet. It also contains the words which you want to filter and block while you access the Internet. You can also choose the option that lets your browser to automatically detect the proxy settings. If you want your manual settings in the network, ensure that you disable the Automatic Configuration options.
  • Page 58 Getting started About Network Proxy settings Proxy Settings Lets you provide the details of your Proxy Settings. Under Proxy Settings, check Use a proxy server for your HTTP connections, and do the following: In the Address box, type the URL or IP address of your proxy server.
  • Page 59 Getting started About Network Proxy settings 5 In the Network Proxy Settings window, do the following: If you want your browser to automatically detect network connection settings, under Automatic Configuration, check Automatically detect settings. If the proxy server requires an automatic configuration URL, under Automatic Configuration, check Use automatic configuration script.
  • Page 60 Getting started About Network Proxy settings...
  • Page 61: Monitoring Your System's Performance

    Monitoring your system's performance This chapter includes the following topics: About System Insight About System Insight Norton AntiVirus continuously monitors your computer to keep it free of any problems and run at peak efficiency. Norton AntiVirus constantly scans the vital areas of your computer including memory, registry keys, and running processes.
  • Page 62 Monitoring your system's performance About System Insight disk optimizations, threat detections, performance alerts, or Quick Scans. The graph displays the activities as icon or stripe, and the description for each icon or stripe is provided at the bottom of the graph.
  • Page 63 Monitoring your system's performance About System Insight The Norton Tasks window provides the details such as the timestamp, the duration, and the status of the background jobs. The details also include the type of power the job needs to run and if a job ran during idle time.
  • Page 64 Monitoring your system's performance About System Insight About monitoring system activities System Insight provides information about the important system activities that you performed or that occurred over a period of the last three months. System Insight displays the information in the Performance window.
  • Page 65 The details also include the action that a threat has performed on your system and the action that Symantec recommends you to resolve the threat. Alerts Provides the details about the...
  • Page 66 Monitoring your system's performance About System Insight Quick Scans Provides the details about Quick Scans that Norton AntiVirus performed on your system over a period of the last three months The details include the date on which a Quick Scan was performed and the number of Quick Scans that were performed on that date.
  • Page 67 Monitoring your system's performance About System Insight 2 In the Performance window, at the top of the Events graph, click the tab for a month to view the details. 3 In the Events graph, move the mouse pointer over the icon or the stripe for an activity. 4 In the pop-up that appears, view the details of the activity.
  • Page 68 Monitoring your system's performance About System Insight access the Resource Threshold Profile for Alerting option, go to the Norton AntiVirus main window, and then click Settings > General > Performance Monitoring > Resource Threshold Profile for Alerting. You can use the Use Low Resource Profile On Battery Power option to let Norton AntiVirus automatically change the resource threshold profile to low when your computer runs on battery power.
  • Page 69 Monitoring your system's performance About System Insight Turns on performance alerts. Select this option if you want Norton AntiVirus to notify you with performance alerts when a program or process exceeds the system resource usage threshold limit. By default, the Performance Alerting option is turned on.
  • Page 70 Monitoring your system's performance About System Insight 4 Under Performance Monitoring, in the Performance Alerting row, do one of the following: To turn off performance alerts, move the Performance Alerting switch to the Off position. To turn on performance alerts, move the Performance Alerting switch to the On position.
  • Page 71 If you choose this option, Norton AntiVirus notifies you with performance alerts whenever a program reaches the lowest threshold limit of using your system resource. Symantec recommends you to select this option when your computer runs on battery power. Medium Configures a medium...
  • Page 72 By default, this option is turned on. Symantec recommends that you keep the Use Low Resource Profile On Battery Power option turned on. To turn off the Use Low Resource Profile On Battery...
  • Page 73 Monitoring your system's performance About System Insight Excluding programs from appearing in performance alerts Norton AntiVirus lets you exclude programs from appearing in performance alerts. You can add the programs that consume high CPU, memory, or disk usage to the Program Exclusions list. When you add a program to the Program Exclusions list, Norton AntiVirus does not alert you when the program exceeds the resource consumption threshold limit.
  • Page 74 Monitoring your system's performance About System Insight 2 In the Settings window, click the General tab. 3 In the left pane, click Performance Monitoring. 4 Under Performance Monitoring, in the Program Exclusions row, click Configure. 5 In the Program Exclusions window, select the program that you want to delete, and then click Remove.
  • Page 75 Monitoring your system's performance About System Insight When you click at any point on the CPU graph or memory graph, Norton AntiVirus displays a list of the processes that consume maximum resources at that point. It also displays the percentage of usage for each process.
  • Page 76 Monitoring your system's performance About System Insight By default, the graphs display performance time for the last 90 minutes. To view CPU graph and memory graph 1 In the Norton AntiVirus main window, click Performance. 2 In the Performance window, do one of the following: To view the CPU graph, click the CPU tab.
  • Page 77 Monitoring your system's performance About System Insight Identifying resource-consuming processes You can click at any point on the CPU graph or memory graph to obtain a list of the processes that consume maximum resources of your computer at that point. You can click a process that is available in the list to get more information about the process in the File Insight window.
  • Page 78 Monitoring your system's performance About System Insight track of all of the fragments of the file. If free space is also fragmented, the drive head might have to track adequate free space to store temporary files or newly added files. Optimization rearranges file fragments into adjacent or contiguous clusters.
  • Page 79 Monitoring your system's performance About System Insight When you use the Optimize option in Windows XP, Norton AntiVirus optimizes only the boot volume (for example, C:\Windows). Therefore, it requires less time to complete optimization. However, when you use the Optimize option in Windows Vista or Windows 7, Norton AntiVirus optimizes the drive that contains the boot volume.
  • Page 80 Monitoring your system's performance About System Insight application on your computer and your computer is idle. If you start using your computer again, Norton AntiVirus stops the optimization task, and starts optimizing the next time that your computer is idle. This way, the background job of optimization does not affect the performance of your computer.
  • Page 81 Monitoring your system's performance About System Insight To turn on Idle Time Optimizer 1 In the Norton AntiVirus main window, click Settings. 2 In the Settings window, click the General tab. 3 In the left pane, click Norton Tasks. 4 In the Idle Time Optimizer row, move the On/Off switch to the left to the On position.
  • Page 82 Monitoring your system's performance About System Insight The status of the Norton task You can view details about the completion of the task. The power source that the Norton Task uses. You can specify the type of power source that each of the Norton Tasks uses.
  • Page 83 Monitoring your system's performance About System Insight 3 In the Norton Tasks window, view the details of background jobs. 4 Do one of the following: To run a background job, click the Play icon that appears before the name of the background job. To stop a running background job, click the Stop icon that appears before the name of the background job.
  • Page 84 Monitoring your system's performance About System Insight External and Battery Allows the Norton Tasks to run irrespective if the computer uses external power or battery power. If you choose this option, Norton AntiVirus performs the Norton Tasks when the computer is idle. It does not consider the type of power source the computer uses.
  • Page 85 A Norton AntiVirus scan can identify threats on your computer in the following ways: The Blacklist technique At regular intervals, Norton AntiVirus obtains definition updates from Symantec. These updates contain signatures of known threats. Each time when Norton AntiVirus obtains the definition updates, it performs a scan of all of the files that are available on your computer.
  • Page 86 Symantec analyzes the information of each File of Interest and its unique hash value and provides a confidence level to the file. The Symantec server stores the hash value and confidence level details of the Files of Interest. The server...
  • Page 87 Monitoring your system's performance About System Insight Symantec assigns the following confidence levels to Files of Interest: Good Symantec analyzes the file as good based on the statistical evaluation that is done on the files that are available within the Norton Community.
  • Page 88 Monitoring your system's performance About System Insight technique to scan your computer. It scans all of the files on your computer against the signatures that it obtained during definition updates. When you use the StandardTrust or HighTrust profile, Norton AntiVirus follows the Whitelist technique to scan the files based on their confidence level.
  • Page 89 Monitoring your system's performance About System Insight All Files Lists the Files of Interest Startup Items Lists the programs that start when you start your computer All Loaded Modules Lists all the files and programs that are currently loaded on to the program memory space Highest Performance Impact Lists the programs that...
  • Page 90 Monitoring your system's performance About System Insight User Trusted Files Lists the Files of Interest that you manually trusted in the File Insight window This category does not list the files that do not belong to the File of Interest even if you manually trust the files.
  • Page 91 File Insight window to view details as a File of Interest. The Symantec server stores the hash value and trust level details of the File of Interest. The server provides the file details immediately after you open the Norton...
  • Page 92 Monitoring your system's performance About System Insight Insight - Application Ratings window. However, you can use the Check Trust Now option in the File Insight window to update the trust value of a file. You can also manually trust any well-known files. You can change the trust level of any file to User Trusted other than the files that are Norton Trusted.
  • Page 93 Monitoring your system's performance About System Insight To find the location of the file In the File Insight window, click Locate. To refresh the trust level of the file In the File Insight window, click Check Trust Now. To manually trust the file In the File Insight window, in the Details tab, click Trust Now.
  • Page 94 Monitoring your system's performance About System Insight The complete scan includes a scan of all files on your computer irrespective of the confidence level or digital signature of the files. Configure to Standard Trust to perform a scan that excludes the files that are Norton Trusted. Norton AntiVirus scans the files that have a confidence level other than Norton Trusted.
  • Page 95 Monitoring your system's performance About System Insight To configure Scan Performance Profiles from the Norton Insight - Application Ratings window 1 In the Norton AntiVirus main window, click Advanced. 2 In the window that appears, in the Computer Protection pane, click Application Ratings. 3 In the Norton Insight - Application Ratings window, move the Scan Performance Profiles slider to one of the settings.
  • Page 96 Monitoring your system's performance About System Insight Norton AntiVirus provides reports based on the following categories: Computer Lets you view the details of the various attacks your computer is protected from For example, you can view the total number of viruses and spyware from which you are protected.
  • Page 97: Protecting Your Files And Data

    To avoid security risks: Stay informed about the latest viruses and other security risks by logging in to the Symantec Security Response Web site at the following URL: http://securityresponse.symantec.com The Web site includes extensive, frequently updated information on viruses and automatic virus protection.
  • Page 98 Protecting your files and data About maintaining protection Run LiveUpdate regularly to receive new program updates. Keep Auto-Protect turned on at all times to prevent viruses from infecting your computer. Watch for email messages from unknown senders. Do not open attachments from these senders. Keep Email Protection turned on to avoid sending or receiving infected email attachments.
  • Page 99 Protecting your files and data About maintaining protection 2 In the Settings window, in the Computer tab, move the On/Off switch to the left to the On position for the following settings: Computer Scan Computer Scan provides the following options: Compressed Files Scan Intelligent Skip...
  • Page 100: About The Norton Antivirus Scans

    Protecting your files and data About the Norton AntiVirus scans 5 In the Message Protection section, move the On/Off switch to the left to the On position, click Configure, and check all options for the following features: Email Antivirus Scan Email Antivirus Scan provides the following options: Scan incoming email...
  • Page 101 Protecting your files and data About the Norton AntiVirus scans Norton AntiVirus automatically performs different types of scans to secure your computer from latest threats. It also lets you run different types of scans manually to secure your computer. By using Norton AntiVirus, you can run the following types of scans: Computer Scan Computer Scan uses the latest...
  • Page 102 Protecting your files and data About the Norton AntiVirus scans Reputation Scan Reputation Scan displays the reputation information of the files on your computer. It displays the reputation information such as trust level, prevalence, stability rating, and resource usage. Reputation Scan displays the detailed reputation information of the good files and the number of bad...
  • Page 103 Protecting your files and data About the Norton AntiVirus scans Scan Facebook Wall Scan Facebook Wall lets you scan the links and URLs that are available on your Facebook profile. When you click the Scan Facebook Wall option, Norton AntiVirus takes you to the Facebook login Web page.
  • Page 104 Protecting your files and data About the Norton AntiVirus scans the options in the network settings let you configure how you want Norton AntiVirus to scan your computer for viruses and other security threats. You can click the Settings link available in the Norton AntiVirus main window and view the options that are available under the Computer tab and Network tab.
  • Page 105 When Norton AntiVirus performs a Computer Scan, it uses the latest virus definitions that Symantec provides. The threat detections that are based on the local definition are specified with a specific name. For...
  • Page 106 Protecting your files and data About the Norton AntiVirus scans of the Computer Scan displays the threat as Trojan.Foo. You can click the Scan Now option available in the Norton AntiVirus main window to access the different types of computer scans. If you suspect that your computer is infected, you can run three types of computer scans manually to prevent virus infections on your computer.
  • Page 107 Protecting your files and data About the Norton AntiVirus scans Custom Scan Scans a particular file, removable drives, any of your computer's drives, or any folders or files on your computer. You can create a custom scan if you regularly scan a particular location of your computer.
  • Page 108 Protecting your files and data About the Norton AntiVirus scans 2 In the Computer Scan pane, click Full System Scan. You can use the following options to suspend a Full System Scan: Pause Suspends a Full System Scan temporarily. Click Resume to continue the scan.
  • Page 109 Protecting your files and data About the Norton AntiVirus scans 2 In the Computer Scan pane, click Quick Scan. You can use the following options to suspend a Quick Scan: Pause Suspends a Quick Scan temporarily. Click Resume to continue the scan.
  • Page 110 Protecting your files and data About the Norton AntiVirus scans 3 In the Scans window, do one of the following: To scan specific drives, click Run next to Drive Scan, select the drives that you want to scan, and then click Scan. To scan specific folders, click Run next to Folder Scan, select the folders that you want to scan, and then click Scan.
  • Page 111 Protecting your files and data About the Norton AntiVirus scans computer. Viruses, spyware, and other risks often target these areas. If your most recent scan was a Full System Scan, this window shows the results of a comprehensive scan of your entire computer.
  • Page 112 Protecting your files and data About the Norton AntiVirus scans About custom scans You can create a custom scan if you regularly scan a particular segment of your computer. This custom scan lets you scan the segment frequently without having to specify it every time.
  • Page 113 Protecting your files and data About the Norton AntiVirus scans 6 On the Scan Schedule tab, set the frequency and time at which you want to perform the scan. See Scheduling a scan” on page 117. 7 On the Scan Options tab, configure the scan options as required.
  • Page 114 Protecting your files and data About the Norton AntiVirus scans 4 In the window that appears, on the Scan Items tab, do the following: To add drives, click Add Drives, in the Scan Drives dialog box, select the drives to be scanned, and click Add.
  • Page 115 Protecting your files and data About the Norton AntiVirus scans 4 In the Edit Scan window, on the Scan Options tab, configure the scan options as required. 5 Click Save. Editing a custom scan You can edit a custom scan that you created. You can include additional files or folders to the scan or remove the files and folders that you do not want to scan.
  • Page 116 Protecting your files and data About the Norton AntiVirus scans 2 In the Computer Scan pane, click Custom Scan. 3 In the Scans window, click Run next to the custom scan that you want to run. You can use the following options to suspend a custom scan: Pause Suspends a custom scan...
  • Page 117 Protecting your files and data About the Norton AntiVirus scans About scheduling scans Norton AntiVirus uses Idle Time Scans to automatically detect the idle state of your computer and runs a Full System Scan when the computer is idle. However, you can schedule a Full System Scan according to your preferences.
  • Page 118 Protecting your files and data About the Norton AntiVirus scans To schedule a custom scan 1 In the Norton AntiVirus main window, click Scan Now. 2 In the Computer Scan pane, click Custom Scan. 3 In the Scans window, in the Edit Scan column, click the edit icon next to the custom scan that you want to schedule.
  • Page 119 The Idle Time Scans option provides sufficient protection to your computer by running a Full System Scan when your computer is idle. Symantec recommends you not to turn off the Idle Time Scans option. To schedule a Full System Scan 1 In the Norton AntiVirus main window, click Scan Now.
  • Page 120 Protecting your files and data About the Norton AntiVirus scans loaded programs. Quick Scan takes less time to scan than a Full System Scan because this scan does not scan your entire computer. Norton AntiVirus lets you schedule a Quick Scan. You can schedule a Quick Scan in the Scans window.
  • Page 121 Protecting your files and data About the Norton AntiVirus scans Running a scan at the command prompt You can scan with Norton AntiVirus from the command prompt without opening the Norton AntiVirus main window. You type the path and name of the file that you want to scan or customize the scan by adding a specific command.
  • Page 122 Task file path should follow the ':' (for example, TASK:C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus\Tasks\Full.sca) /TTASK:[taskfile.sca] Uses a task file as input to the list of items to scan Task file path should follow the ':' (for...
  • Page 123 Protecting your files and data About the Norton AntiVirus scans /SESCAN Performs Quick Scan in the background. Norton AntiVirus displays the scans window only when a threat is detected. To run a scan from the command prompt 1 At the command prompt, type the path in which Norton AntiVirus is located and the executable's file name.
  • Page 124 Protecting your files and data About the Norton AntiVirus scans Cloud, apart from the definitions that are available locally on your computer. Norton AntiVirus performs an Insight Network scan only when the Insight Protection option is turned on. To turn on the Insight Protection option, go to the Norton AntiVirus main window, and then click Settings >...
  • Page 125 Protecting your files and data About the Norton AntiVirus scans Insight Network Single File Scan Norton AntiVirus simultaneously performs a traditional Single File Scan and an Insight Network Single File Scan to scan a file on your computer. It also scans the files that are received through instant messenger programs.
  • Page 126 Protecting your files and data About the Norton AntiVirus scans 4 In the Insight Protection row, do one of the following: To turn off Insight Protection, move the On/Off switch to the right to the Off position. To turn on Insight Protection, move the On/Off switch to the left to the On position.
  • Page 127 About the Norton AntiVirus scans using the reputation-based threat detection. The Insight Network Scan uses the Cloud technology wherein a remote Symantec server on the Web stores the latest reputation information. It checks the Cloud for the reputation information on the filtered files.
  • Page 128 Protecting your files and data About the Norton AntiVirus scans Miscellaneous files This category includes Windows Installer Package files (.msi) and resource-only DLL files (.loc). Norton AntiVirus lets you scan specific areas of your computer based on the type of Reputation Scan that you select.
  • Page 129 Protecting your files and data About the Norton AntiVirus scans Symantec rates a file based on the statistical evaluation that is done on the file using the Norton Community Watch data and Symantec’s analysis. Symantec assigns the following confidence levels to reputation files:...
  • Page 130 Protecting your files and data About the Norton AntiVirus scans Running a Reputation Full System Scan When you perform a Full System Scan, Norton AntiVirus scans all the Files of Interest that are available on your computer. This fileset includes the files that relate to the running processes, startup files, and loaded programs.
  • Page 131 Protecting your files and data About the Norton AntiVirus scans 3 In the Reputation Scan pane, click Quick Scan. In the Norton Reputation Scan window, you can analyze the trust level, prevalence, resource usage, and stability of the scanned items. 4 If there is a file with Poor or Bad trust level, under the Trust Level column, click the red cross (x) icon.
  • Page 132 Protecting your files and data About the Norton AntiVirus scans 6 In the Quarantine File window, click Quarantine this file. 7 In the Manual Quarantine window, click Add. 8 Click Close. 9 In the Norton Reputation Scan window, click Close. About the Reputation Scan results Norton AntiVirus lets you run different Reputation Scans to detect any suspicious programs or vulnerable...
  • Page 133 About the Norton AntiVirus scans The Trust Level graph displays the average trust level of files on your computer. It also displays the average trust level of the files that Symantec analyzes within the Norton Community. The Prevalence graph displays the average high user prevalence of files on your computer.
  • Page 134 Protecting your files and data About the Norton AntiVirus scans Trust Level...
  • Page 135 Symantec rates a file based on the statistical evaluation that is done on the file using the Norton Community Watch data and Symantec’s...
  • Page 136 You can also use the community usage of a file to determine the legitimacy of the file. Symantec uses a stringent statistical method to evaluate the trustworthiness of a file and to classify the file as a Good...
  • Page 137 Protecting your files and data About the Norton AntiVirus scans Resource Usage Indicates the system resource usage level of the file. The usage levels are as follows: Low: Indicates that the file consumes minimum system resources. Moderate: Indicates that the file consumes moderate system resources.
  • Page 138 Protecting your files and data About the Norton AntiVirus scans Stability Indicates the stability rating of the file. The stability rating depends on how frequently the program crashes. The different stability ratings are as follows: Reliable: Indicates that the program is reliable. Stable: Indicates that the program is comparatively stable.
  • Page 139 Protecting your files and data About the Norton AntiVirus scans are not only protected from unsafe sites but you also let other Facebook users know the security status of any Web site. However, Norton Safe Web requires your permission to scan the URLs that are available on your Facebook Wall.
  • Page 140 Warning Indicates that the site has security risks. The sites with this rating may install malicious software on your computer. Symantec recommends that you do not visit this site. Untested Indicates that Norton Safe Web has not yet tested this site and it does not have sufficient information about this site.
  • Page 141 Protecting your files and data About the Norton AntiVirus scans To scan your Facebook Wall 1 In the Norton AntiVirus main window, click Scan Now. 2 In the window that appears, click Scan Facebook Wall. 3 In the Norton Safe Web for Facebook pane, click Scan Facebook Wall.
  • Page 142 Protecting your files and data About the Norton AntiVirus scans The following list provides details on the settings that you can make and the predefined parameters: Idle Time Out duration You can set the duration after which Norton AntiVirus should identify your computer as idle.
  • Page 143 Protecting your files and data About the Norton AntiVirus scans Norton AntiVirus discontinues any Idle Time Scans that it started during idle time if you begin to use your computer again. However, it resumes the scan when your computer is idle again. You must turn off Idle Time Scans to schedule a Full System Scan.
  • Page 144 2 In the Performance window, click Norton Tasks. 3 In the Norton Tasks window, in the Idle Timeout drop-down list, select the duration that you want to specify. 4 Click Close. About SONAR Protection Symantec Online Network for Advanced Response (SONAR) provides real-time protection against threats...
  • Page 145 Protecting your files and data About the Norton AntiVirus scans and proactively detects unknown security risks on your computer. SONAR identifies emerging threats based on the behavior of applications. SONAR identifies threats quicker than the traditional signature-based threat detection techniques. SONAR detects and protects you against malicious code even before virus definitions are available through LiveUpdate.
  • Page 146 On position. 4 In the Settings window, click Apply. About Real Time Exclusions Symantec Online Network for Advanced Response (SONAR) provides real-time protection against threats and proactively detects unknown security risks on your computer. SONAR identifies emerging threats based on the behavior of applications.
  • Page 147 Protecting your files and data About the Norton AntiVirus scans Exclude a program from Norton AntiVirus scans only if you are confident that the program is safe. For example, if another program relies on a security risk program to function, you might decide to keep the program on your computer.
  • Page 148 Protecting your files and data About the Norton AntiVirus scans About Signature Exclusions Norton AntiVirus lets you select specific known security risks and exclude them from Norton AntiVirus scans. Exclude a risk from Norton AntiVirus scans only if you have a specific need. For example, if another program relies on a security risk program to function, you might decide to keep the program on your computer.
  • Page 149 Protecting your files and data About the Norton AntiVirus scans To add a signature to the Signature Exclusions 1 In the Norton AntiVirus main window, click Settings. 2 In the Settings window, in the left pane, click AntiVirus and SONAR Exclusions. 3 In the Signatures to Exclude from All Detections row, click Configure.
  • Page 150 Protecting your files and data About the Norton AntiVirus scans winproj.exe Microsoft Project Norton AntiVirus scans the Office documents and protect against threats, including virus macros and infected embedded objects. By default, the Microsoft Office Automatic Scan option in the Settings window is turned off. Turn on this option to scan Microsoft Office files automatically.
  • Page 151 Protecting your files and data About the Norton AntiVirus scans and resolved. When you perform important tasks on your computer, you likely prefer not to receive any alert messages. Norton AntiVirus suppresses alerts and notifications and temporarily suspends most of the background activities based on the type of Silent Mode that is turned on.
  • Page 152 Protecting your files and data About the Norton AntiVirus scans of the taskbar. The icon changes to a crescent-patterned icon when Silent Mode is turned on. Norton AntiVirus also notifies you after Silent Mode is turned off. You can view the summary of the Silent Mode sessions under the Recent History, Full History, and Silent Mode categories in the Security History window.
  • Page 153 Protecting your files and data About the Norton AntiVirus scans when Silent Mode is turned on, run after Silent Mode is turned off. Turning on or turning off Silent Mode manually You can manually turn on Silent Mode for a specified duration before you perform any important task on your computer.
  • Page 154 Protecting your files and data About the Norton AntiVirus scans 4 In the Silent Mode row, move the On/Off switch to the right to the Off position. 5 In the Settings window, click Apply. 6 Click OK. To turn on Silent Mode from the Norton Tasks window 1 In the Norton AntiVirus main window, click Performance.
  • Page 155 Protecting your files and data About the Norton AntiVirus scans About the Silent Mode that turns on automatically When you watch a movie, play games, or make a presentation, you run the application in the full-screen mode. Norton AntiVirus detects the application that you run in the full-screen mode and automatically enables Silent Mode.
  • Page 156 Protecting your files and data About the Norton AntiVirus scans 2 In the Settings window, click the General tab. 3 In the left pane, click Silent Mode Settings. 4 In the Full Screen Detection row, move the On/Off switch to the right to the Off position. 5 In the Settings window, click Apply.
  • Page 157 Protecting your files and data About the Norton AntiVirus scans The following table explains about the various options: IMAPI 2.0 Disk Burn When you use a Media Center application to burn a CD or a DVD, Norton AntiVirus automatically enables Quiet Mode, if the IMAPI 2.0 Disk Burn option is turned on.
  • Page 158 Protecting your files and data About the Norton AntiVirus scans Media Center TV When you use a Media Center Recording application to record a TV program, Norton AntiVirus automatically enables Quiet Mode, if the Media Center TV Recording option is turned on. By default, the Media Center TV Recording option is turned on.
  • Page 159 Protecting your files and data About the Norton AntiVirus scans User-Specified Programs Norton AntiVirus automatically turns on Quiet Mode when it detects a TV program recording session or a disk-burning session. In addition, you can manually add the programs for which you want Norton AntiVirus to turn on Quiet Mode to the Quiet Mode Programs list.
  • Page 160 Protecting your files and data About the Norton AntiVirus scans during the sessions by using the options in the Settings window. To turn off or turn on IMAPI 2.0 Disk Burn 1 In the Norton AntiVirus main window, click Settings. 2 In the Settings window, click the General tab.
  • Page 161 Protecting your files and data About the Norton AntiVirus scans About User-Specified Programs Norton AntiVirus automatically turns on Quiet Mode when it detects a TV program recording session or a disk-burning session. In addition, you can manually add the programs for which you want Norton AntiVirus to turn on Quiet Mode to the Quiet Mode Programs list.
  • Page 162 Protecting your files and data About the Norton AntiVirus scans Norton AntiVirus turns on Quiet Mode the next time when you execute the program. You can only add the programs that have .exe file extension to the Quiet Mode Programs list. To add a program 1 In the Norton AntiVirus main window, click Settings.
  • Page 163 Protecting your files and data About the Norton AntiVirus scans 4 Under Quiet Mode on Detection of, in the User-Specified Programs row, click Configure. 5 In the Quiet Mode Programs window, select the program that you want to delete, and then click Remove.
  • Page 164 Protecting your files and data About the Norton AntiVirus scans Turns off boot time protection. If you turn off the Enable Boot Time Protection option, the protection level of your computer reduces. Configuring boot time protection The boot time protection feature provides enhanced security level from the time you start your computer.
  • Page 165: Responding To Security Issues

    In some cases, Norton AntiVirus requires your attention to manually resolve the detected security risk. You can access the Symantec Security Response Web site and refer the manual removal instructions.
  • Page 166 In such cases, you can submit the item to Symantec for further analysis. In addition, your product provides solutions for security risks, such as spyware and adware.
  • Page 167 Responding to security issues What to do if a security risk is found Security History also includes information about spyware, adware, and other security risks. Reviewing Auto-Protect notifications Auto-Protect scans files for viruses, worms, and Trojan horses when you perform an action with them, such as moving them, copying them, or opening them.
  • Page 168 Responding to security issues What to do if a security risk is found 3 In the Show drop-down list, select the category for which you want to review Auto-Protect alerts. Your options are: Recent History Review Auto-Protect notifications that you received in the last seven days.
  • Page 169 Responding to security issues What to do if a security risk is found 4 In the right pane, click the Options link. The option name appears as Restore & Options for few items. If one or more security risks such as spyware are found, you can take action on these items, if required.
  • Page 170 Responding to security issues What to do if a security risk is found 5 In the Threat Detected window, select the appropriate action on the risk. The following are some of the options that are available in the Threat Detected window: Restore &...
  • Page 171 Takes you to the Symantec Security Response Web site. This option is available for the security risks that require your attention for manual removal. You can refer the Symantec Security Response Web site for manual removal instructions or other information about the risk.
  • Page 172 In such cases, you can use this option to submit the item to Symantec for further analysis. Responding to Worm Blocking alerts If a program tries to email itself or a copy of itself, it could be a worm trying to spread through email.
  • Page 173 Responding to security issues What to do if a security risk is found To respond to Worm Blocking alerts In the alert window, select the action that you want to take. Your options are: Quarantine Permanently stops the worm by putting it in Security History.
  • Page 174 Running a Full System Scan” on page 107. If nothing is detected, submit the infected file to Symantec Security Response. Also, indicate that the file was detected and that you have scanned it with the latest definition updates. Symantec Security Response replies to you within 48 hours.
  • Page 175 Responding to security issues What to do if a security risk is found If that does not work, read the information on the Threats Detected window to identify the types of files...
  • Page 176 Responding to security issues What to do if a security risk is found that cannot be repaired. You can take one of the following actions, depending on the file type: Infected files...
  • Page 177 Responding to security issues What to do if a security risk is found You can view the file type of the detected risk. This information helps you to decide action that can be taken depending on the file type. example, you can view the infected...
  • Page 178 Responding to security issues What to do if a security risk is found Hard disk master boot record, boot record, or Replace system files (such as IO.SYS or MSDOS.SYS) and using floppy disk boot record and system files your operating system disks.
  • Page 179: Protecting Internet Activities

    Protecting Internet activities This chapter includes the following topics: About Download Insight About Intrusion Prevention About Vulnerability Protection About the types of security risks About configuring POP3 and SMTP ports About the Network Security Map About Metered Broadband Mode About Download Insight Download Insight provides information about the reputation of any executable file that you download from the supported portals.
  • Page 180 Protecting Internet activities About Download Insight AOL (Browser) Safari (Browser) Yahoo (Browser) MSN Explorer (Browser, E-mail & Chat) QQ (Chat) ICQ (Chat) Skype (Chat) MSN Messenger (Chat) Yahoo Messenger (Chat) Limewire (P2P) BitTorrent (P2P) Thunder (P2P) Vuze (P2P) Bitcomet (P2P) uTorrent (P2P) Outlook (E-mail) Thunderbird (E-mail)
  • Page 181 Protecting Internet activities About Download Insight and poor. Based on the reputation levels, the files can be broadly classified as follows: Safe Includes the files that are either Norton trusted or User trusted. Safe files have good reputation levels. These files do not harm your computer.
  • Page 182 Protecting Internet activities About Download Insight By default, Download Insight lets you install safe files. For files of unknown reputation levels, Download Insight prompts you to select an action that you want to perform on the file. In case of an unsafe file, Download Insight informs you that Norton AntiVirus has detected the file as a threat and has removed the file.
  • Page 183 Protecting Internet activities About Download Insight When Silent Mode is turned on, Norton AntiVirus suppresses the Download Insight notifications. Turning off or turning on Download Intelligence Download Insight protects your computer against any unsafe file that you may run or execute after you download it using a supported Web browser.
  • Page 184 Protecting Internet activities About Download Insight 2 In the Settings window, click the Network tab. 3 In the left pane, click Download Intelligence. 4 In the Download Intelligence row, move the On/Off switch to the left to the On position. 5 In the Settings window, click Apply.
  • Page 185 Protecting Internet activities About Download Insight 2 In the Settings window, click the Network tab. 3 In the left pane, click Download Intelligence. 4 Under Download Intelligence, in the Download Insight Notifications row, do one of the following: To receive Download Insight notifications only for the infected or the suspicious executable files that you download, move the Download Insight Notifications switch to the right to the Risks...
  • Page 186 Protecting Internet activities About Download Insight You can use the following options to configure Show Report on Launch of Files: Always When you set the Show Report on Launch of Files option to Always, Download Insight prompts you for a suitable action in case of safe and unknown files.
  • Page 187 Protecting Internet activities About Download Insight Unproven Files Only When you set the Show Report on Launch of Files option to Unproven Files Only, Download Insight prompts you to select a suitable action for unknown files only. In this case, the Download Insight window appears whenever you try to launch any downloaded file that has an...
  • Page 188 Protecting Internet activities About Download Insight Never When you set the Show Report on Launch of Files option to Never, Download Insight does not prompt you to select a suitable action for any type of file that you download. In this case, the Download Insight window does not appear whenever you try to launch any...
  • Page 189 Protecting Internet activities About Download Insight 4 Under Download Intelligence, in the Show Report on Launch of Files row, do one of the following: If you want Download Insight to prompt you for a suitable action in case of safe and unknown files, move the Show Report on Launch of Files switch to the Always position.
  • Page 190: About Intrusion Prevention

    Internet attacks. For more information about the attacks that Intrusion Prevention blocks, go to the following URL: http://www.symantec.com/business/security_response/attacksignatures If the information matches an attack signature, Intrusion Prevention automatically discards the packet and breaks the connection with the computer that sent the data.
  • Page 191 Protecting Internet activities About Intrusion Prevention Turning off or turning on Intrusion Prevention notifications You can choose whether you want to receive notifications when Intrusion Prevention blocks suspected attacks. Whether or not you receive notifications, Intrusion Prevention activities are recorded in Security History. The Security History entries include information about the attacking computer and information about the attack.
  • Page 192 Protecting Internet activities About Intrusion Prevention 6 In the Signature Properties window, uncheck or check Notify me when this signature is detected. 7 Click OK. 8 In the Intrusion Signatures window, click OK. Excluding or including attack signatures in monitoring In some cases, benign network activity may appear similar to an attack signature.
  • Page 193 Protecting Internet activities About Intrusion Prevention 5 In the Intrusion Signatures window, check the attack signatures that you want to include. 6 Click OK. Turning off or turning on AutoBlock When an attack attempt is detected, the connection is automatically blocked to ensure that your computer is safe.
  • Page 194: About Vulnerability Protection

    Protecting Internet activities About Vulnerability Protection Unblocking AutoBlocked computers In some cases, AutoBlock may recognize normal activity as an attack. The list of computers that AutoBlock has currently blocked may include the computer that you should be able to communicate with. If a computer that you need to access appears on the list of blocked computers, you can unblock it.
  • Page 195 Protecting Internet activities About Vulnerability Protection Vulnerabilities are flaws in your programs or your operating system that can create weaknesses in overall security of your system. Improper computer configurations or security configurations also create vulnerabilities. External attackers exploit these vulnerabilities and perform malicious actions on your computer.
  • Page 196 Prevention uses to detect any attempts to exploit the vulnerabilities in the program. You can click an attack signature to get additional information about the signature in the Symantec Security Response Web site. The Intrusion Signatures window of Intrusion Prevention lets you view a list of attack signatures.
  • Page 197: About The Types Of Security Risks

    Protecting Internet activities About the types of security risks To view details about a vulnerable application 1 In the Norton AntiVirus main window, click Advanced. 2 In the Network Protection pane, click Vulnerability Protection. 3 In the Vulnerability Protection window, in the Program column, click the program name for which you want to view the details.
  • Page 198: About Configuring Pop3 And Smtp Ports

    Protecting Internet activities About configuring POP3 and SMTP ports Tracking cookies are the small files that programs can place on your computer to track your computing activities. Tracking cookies can then report that information back to a third party. Some programs rely on other programs that are classified as security risks to function.
  • Page 199 POP3 and SMTP email ports. To ensure email protection, the POP3 and SMTP port numbers must be protected. If the POP3 and SMTP port numbers are not the default ports, Symantec recommends that you add the port numbers to the Protected Ports window.
  • Page 200 Protecting Internet activities About configuring POP3 and SMTP ports To add POP3 and SMTP ports to Protected Ports 1 In the Norton AntiVirus main window, click Settings. 2 In the Settings window, click the Network tab. 3 In the left pane, click Message Protection. 4 In the Protected Ports Settings row, click Configure.
  • Page 201: About The Network Security Map

    Protecting Internet activities About the Network Security Map 6 Click Apply and then click OK. 7 In the Settings window, click OK. About the Network Security Map A home network typically consists of the computers and other devices that share your Internet connection. The Network Security Map helps you view and manage your network.
  • Page 202 Protecting Internet activities About the Network Security Map Turning off or turning on Network Security Overview The Network Security Overview window provides a brief summary about the following features: Wireless Security Remote Monitoring Network Map Trust Controls You can click each of the features and read the summary to learn more about using Network Security Map to manage your home network.
  • Page 203 Norton AntiVirus automatically refreshes the Network Security Map window and displays the device. Norton AntiVirus requires you to configure the Symantec Security Driver to open the Network Security Map. You cannot install the Symantec Security Driver when you run LiveUpdate. You can either allow the...
  • Page 204 The Product Configuration panel appears when you click Network Security Map for the first time. The Product Configuration panel helps you install Symantec Security Driver that is required to view the Network Security Map window. The process of installation of the Symantec Security Driver disrupts your network connection temporarily.
  • Page 205 Protecting Internet activities About the Network Security Map To view the details of a device on the Network Security...
  • Page 206 Protecting Internet activities About the Network Security Map In the Network Security Map window, click a device icon. You can use the scroll arrows to view the devices that are listed in the network map. The device details section that is located below the network map displays the following details: Device Name Shows the name of the device...
  • Page 207 Protecting Internet activities About the Network Security Map Category Shows the category to which the device belongs The device category icon provides details on the connection status and security status. Norton AntiVirus labels all unknown devices as NEW and sets the category as GENERIC DEVICE.
  • Page 208 Protecting Internet activities About the Network Security Map Connection Shows the status of the connection The statuses are: ONLINE OFFLINE Physical Address Shows the physical address (also known as the Media Access Control address or MAC address) of the computer or device IP Address Shows the IP address of the computer or device...
  • Page 209 Protecting Internet activities About the Network Security Map To set up Remote Monitoring 1 In the Norton AntiVirus main window, click Advanced. 2 Under Network Protection, click Network Security Map. 3 On the left side of the Network Security Map window, under Remote Monitoring, click Setup.
  • Page 210 Protecting Internet activities About the Network Security Map You can turn off Remote Monitoring only after you complete the Remote Monitoring Setup process. To turn off Remote Monitoring for all computers 1 In the Norton AntiVirus main window, Click Advanced. 2 Under Network Protection, click Network Security Map.
  • Page 211 Protecting Internet activities About the Network Security Map Norton AntiVirus adds to the Trust Control network all the devices that you manually add to Network Security Map. You can select the Trust Control network in the Network Details drop-down list to view the devices that you added.
  • Page 212 Protecting Internet activities About the Network Security Map Finding a computer's IP address You can find a computer's IP address in various ways. On Windows 2000/XP, Windows Vista, and Windows 7 computers, you can use Ipconfig to find the IP address of a computer.
  • Page 213 Protecting Internet activities About the Network Security Map Editing device details You can change the name and category of a device that is available on the Network Security Map. You can select the categories such as Generic Device, Laptop, Media Device, or Game Console. You cannot change the category of the device that you added manually.
  • Page 214 Protecting Internet activities About the Network Security Map 6 In the Category drop-down list, click one of the following device categories: GENERIC DEVICE DESKTOP PC LAPTOP SERVER PC NETWORK PRINTER ROUTER/SWITCH CABLE/DSL MODEM MEDIA DEVICE GAME CONSOLE PDA/MOBILE PHONE NETWORK STORAGE DEVICE WEB CAMERA 7 Click OK.
  • Page 215 Protecting Internet activities About the Network Security Map To edit network details 1 In the Norton AntiVirus main window, click Advanced. 2 Under Network Protection, click Network Security Map. 3 In the Network Security Map window, on the right side of Network Details, click Edit. 4 In the Edit Network Details dialog box, in the Network Name box, type a new name.
  • Page 216 Protecting Internet activities About the Network Security Map 3 In the Network Security Map window, do one of the following: To remove a device that is on your network, in the network map, click the device. To remove a device that you manually added, in the Network Details drop-down list, select Trust Control, and then click the device.
  • Page 217 Protecting Internet activities About the Network Security Map To view the status of your wireless network 1 In the Norton AntiVirus main window, click Advanced. 2 Under Network Protection, click Network Security Map. 3 On the left side of the Network Security Map window, view the status of your wireless network.
  • Page 218 Protecting Internet activities About the Network Security Map 3 In the Network Security Map window, in the network map, click the device for which you want to see the details. You can view the details of only the computers that you remotely monitor.
  • Page 219: About Metered Broadband Mode

    Internet connection. If you have unlimited Internet plan, you can set up No Limit policy so that Norton AntiVirus connects to Symantec servers to ensure complete protection. However, if you think that Norton AntiVirus uses too much of your Internet connection, you can restrict the Internet usage of Norton AntiVirus.
  • Page 220 Protecting Internet activities About Metered Broadband Mode Lets Norton AntiVirus access the Internet only to receive critical product updates or virus definitions. If you have a limited Internet connection, you can select the Critical Updates Only option to ensure protection from different security threats. No Traffic Lets you block Norton AntiVirus from connecting to the Internet.
  • Page 221 Protecting Internet activities About Metered Broadband Mode 2 In the Settings window, click the Network tab. 3 In the left pane, click Network Security Settings. 4 In the Metered Broadband Mode row, move the On/Off switch to the left to the On position. 5 Click Apply.
  • Page 222 Protecting Internet activities About Metered Broadband Mode 7 Select one of the following: No Limit Lets Norton AntiVirus use the network bandwidth that is required to ensure complete protection. Critical Updates Only Lets Norton AntiVirus access the Internet only to receive critical product updates or virus definitions.
  • Page 223: Monitoring Protection Features

    View the summary of alerts and event messages. View the results of scans that are run on your computer. View the items that you submitted to Symantec Security Response Web site. Manage Quarantine items. Monitor the security tasks that your products perform in the background.
  • Page 224 Monitoring protection features About Security History window displays details of each item in the Details pane. Based on their functionalities, Security History broadly organizes all categories into the All Activity, ProtectionandPerformance, SubmissionsandErrors, and Informational groups. By default, the following information categories are available in the Security History window: Recent History Full History...
  • Page 225 100. Restore and exclude a quarantined item. Remove an item from Security History. Submit an item to Symantec for further analysis. Trust or restrict devices on a selected network. Remove the trusted or restricted status of devices on the selected network.
  • Page 226 Norton AntiVirus performed on your computer. You can view details about all the activities including: Security History alerts and event messages Results of different scans Information that you submitted to Symantec Security Response Web site Quarantined items Security tasks that Norton AntiVirus performed in...
  • Page 227 Monitoring protection features About Security History 3 In Security History window, in the Show drop-down list, select the category of items that you want to view. Your options are: Recent History The Recent History view in the Security History window displays the alerts that you received during the last seven days.
  • Page 228 Monitoring protection features About Security History Resolved Security Risks The security risks include the suspicious programs that can compromise the security of your computer. The Resolved Security Risks view in the Security History window displays a list of security risks that Norton AntiVirus has detected and then repaired, quarantined, or removed.
  • Page 229 Security History window displays all of the security risks that are isolated in the Security History Quarantine. SONAR Activity Symantec Online Network for Advanced Response (SONAR) identifies new threats based on the suspicious behavior of applications. SONAR detects and protects your computer...
  • Page 230 Monitoring protection features About Security History Intrusion Prevention Intrusion Prevention scans all the network traffic that enters and exits your computer for known threats. The Intrusion Prevention view in the Security History window displays details about recent Intrusion Prevention activities. The Advanced Details view in this category lets you control whether or not to be notified...
  • Page 231 The Norton Product Tamper Protection view in the Security History window displays details about unauthorized attempts to modify Symantec processes. The tasks that your Symantec product blocks also appear in the list. Performance Alert The performance alert feature lets you view,...
  • Page 232 Monitoring protection features About Security History Metered Network Metered Broadband Mode lets you set up policies and restrict the Internet usage of Norton AntiVirus. You can define the amount of network bandwidth that Norton AntiVirus can use. The Metered Network view in the Security History window provides details about the actions that you performed...
  • Page 233 Norton Community Watch The Norton Community Watch feature lets you submit any suspicious security or suspicious application data to Symantec for analysis. Symantec assesses the data to determine the new threats. The Norton Community Watch view in the Security...
  • Page 234 LiveUpdate LiveUpdate obtains the latest virus definition updates and the program updates to all the Symantec products that you installed on your computer. These updates protect your computer from newly discovered threats. The LiveUpdate view in the...
  • Page 235 Monitoring protection features About Security History 4 Click a row to view details for that item. If you want to view additional information about an item, click the More Details option in the Details pane. You can view the advanced details about the item in the Security History-Advanced Details window and take actions as needed.
  • Page 236 Monitoring protection features About Security History The following table lists the categories that provide the advanced details about the Security History items: Alert Summary Displays the following information about the item: Severity This category displays the risk level of the selected item.
  • Page 237 Monitoring protection features About Security History Actions Displays the actions that are available for the selected item The options in the Actions view vary depending on the options that are available in the Show drop-down list in the Security History window. The following are some of the Actions options: Allow...
  • Page 238 Monitoring protection features About Security History Risk Management Displays the links that provide the information that is related to the selected item For some Security History items, this view lets you access the relevant settings pane of the Norton AntiVirus window. About the File Insight window The File Insight window provides details about any File of Interest that is available on your computer.
  • Page 239 Monitoring protection features About Security History The File Insight window lets you view more details of events that belong to some of the following categories in the Security History window: Resolved Security Risks Lets you view the detailed information about the resolved security risks in an organized way.
  • Page 240 Monitoring protection features About Security History Quarantine Lets you view the detailed information about quarantined security risks in an organized way. The Quarantine category includes the infected files that are isolated from the rest of your computer while they await your attention for a suitable action.
  • Page 241 Monitoring protection features About Security History You can select a tab to view more details about it. The File Insight window provides details about a file in the following tabs: Details Displays the information such as the confidence level, community usage of a file, how long ago the file was released and how stable the file is.
  • Page 242 Monitoring protection features About Security History Activity Provides the details about the actions performed by the file on your computer. It also provides information about the resource usage of a process and the effect of the process on the overall CPU utilization of your computer.
  • Page 243 Monitoring protection features About Security History You can use this window to view details about the risk and select an action for the risk. Sometimes, you may want to access the Threat Detected window for the same risk again. In that case, the window can be opened at any time from Security History.
  • Page 244 Remove from history Removes the selected security risk item from the Security History log Get help Takes you to the Symantec Security Response Web site Submit to Symantec Sends the security risk to Symantec Searching in Security History You can search the items that are listed in Security History.
  • Page 245 Security History Log Files (.mcf) The .mcf file format is the Security History Log Files format and is proprietary to Symantec. When you use this file type option, you can view the file only in the Security History window.
  • Page 246 Monitoring protection features About Security History This list replaces the current security events list. You can select an option in the Show drop-down list to view the option-specific details that are saved in the log file. To revert to the current Security History list you must click the Close file: file_name.mcf link.
  • Page 247 Norton AntiVirus scans. You can manually place such items in the Quarantine. You cannot open quarantined items accidentally and spread the virus, but you can evaluate the quarantined items for possible submission to Symantec. The Security History Quarantine includes the following groups of items: Security risks...
  • Page 248 Monitoring protection features About Security History 2 In the Details pane, click Actions. You can use the More Details link to view more details about the item before you select an action for it. The link opens the File Insight window that contains more information about the risk.
  • Page 249 Remove from history Removes the selected item from the Security History log Submit to Symantec Sends the selected item to Symantec for evaluation of the security risk In some cases, Norton AntiVirus might not identify an item as a security threat, but you might suspect that the item is infected.
  • Page 250 Monitoring protection features About Security History You can also navigate to this window by using the Options link in the File Insight window for some risks. 4 Follow the on-screen instructions. Adding an item to the Quarantine Security History Quarantine provides a safe location on your computer in which you can isolate items while you decide on an action to take on each item.
  • Page 251 Monitoring protection features About Security History Restoring an item from the Quarantine Some programs rely on other programs that are classified as security risks to function. The program may not function if a particular security file is removed. All of the removed security risks are automatically backed up in the Security History Quarantine.
  • Page 252 Symantec product. For example, you can submit an item that has not been detected during scanning that you believe may be a security risk. Symantec Security Response analyzes the file. If it is identified as a security risk, it is added to a future definition update.
  • Page 253: Customizing Protection Features

    Customizing protection features This chapter includes the following topics: Feature summary About turning off automatic features About customizing settings and options Feature summary Use the information in this section to familiarize yourself with the product. This section includes the following information: A list of all of the features in the product A brief description of each feature The feature summary can help you determine which...
  • Page 254 Customizing protection features Feature summary downloads, and other files are scanned for viruses and other potential risks. In addition, the definition updates that Automatic LiveUpdate downloads when your computer is connected to the Internet keeps you prepared for the latest security risks. Your computer is continually monitored and protected from known and unknown threats by the following features:...
  • Page 255 Customizing protection features Feature summary Compressed File Scan Detects viruses, spyware, and other security risks in compressed files during manual scans. “What to do if a security risk is found” on page 165. Email Protection Protects your computer against the threats that you may receive through email attachments.
  • Page 256 Customizing protection features Feature summary Instant Messenger Scan Scans for and detects viruses in instant messenger attachments. Scans the instant messenger attachments for the supported instant messenger programs that were on your computer when you installed your product. New instant messenger programs must be configured in Instant Messenger Scan window.
  • Page 257 Customizing protection features Feature summary About spyware and other security risk protection features Spyware and other security risk protection features provide protection against the latest security risks, such as spyware and adware. These features scan for existing risks and blocks new risks before they can be installed on your computer.
  • Page 258: About Turning Off Automatic Features

    About turning off automatic features Your Symantec product is set by default to provide complete protection for your computer. Many of these settings include the automatic features that provide continuous protection. Under certain circumstances, you might need to turn off an automatic feature to complete a task.
  • Page 259 Customizing protection features About turning off automatic features Turning off Auto-Protect temporarily and turning it on again” on page 259. Turning off or turning on Norton Community Watch” on page 260. Turning off Auto-Protect temporarily and turning it on again If you have not changed the default option settings, Auto-Protect loads when you start your computer.
  • Page 260 Turning off or turning on Norton Community Watch You can use the Norton Community Watch option to send information about a suspicious file to Symantec for analysis. Symantec assesses the data to determine the new threats and their sources. The Norton features...
  • Page 261: About Customizing Settings And Options

    Customizing protection features About customizing settings and options 4 In the Norton Community Watch row, do one of the following: To turn off Norton Community Watch, move the On/Off switch to the right to the Off position. To turn on Norton Community Watch, move the On/Off switch to the left to the On position.
  • Page 262 Customizing protection features About customizing settings and options 4 Click Configure for the feature that you want to change. 5 In the window that appears, make the necessary changes, and then click OK. 6 To apply the default settings in a specific section, click Use Section Defaults on the tab.
  • Page 263 Customizing protection features About customizing settings and options 2 In the Settings window, configure your settings in the following tabs: Computer Lets you configure how you want Norton AntiVirus to scan your computer for viruses and other security threats. You can also configure Norton AntiVirus to obtain regular updates for complete protection...
  • Page 264 Customizing protection features About customizing settings and options Network Lets you configure how you want Norton AntiVirus to monitor your network activities. You can protect your computer against the threats that you might receive through email attachments, instant messaging program attachments.
  • Page 265 Lets you configure the appearance and security of your product. In addition, you can configure how Norton AntiVirus submits risk details to Symantec. You can specify your proxy settings to obtain definition updates. You can also configure Silent Mode, Performance...
  • Page 266 Customizing protection features About customizing settings and options About Computer settings The various options in the Computer tab let you configure how you want Norton AntiVirus to scan your computer for viruses and other security threats. Your options are: AntiVirus and SONAR AntiVirus and SONAR Exclusions Exclusions options let you...
  • Page 267 Customizing protection features About customizing settings and options Computer Scan Norton AntiVirus lets you run different types of scans to detect and prevent any virus infection on your computer. You can use the various Computer Scan options to select the scan type, file types to scan, and the scan schedule.
  • Page 268 Customizing protection features About customizing settings and options Real Time Protection...
  • Page 269 Customizing protection features About customizing settings and options Real Time Protection option protects your computer by continuously checking for viruses and other security risks. You can use the Real Time Protection options to control the scanning and monitoring of your computer.
  • Page 270 Customizing protection features About customizing settings and options SONAR Protection Symantec Online Network for Advanced Response (SONAR) provides you with real-time protection against threats by proactively detecting unknown security risks on your computer. SONAR identifies emerging threats based on the behavior of applications.
  • Page 271 Customizing protection features About customizing settings and options Updates...
  • Page 272 Customizing protection features About customizing settings and options Norton AntiVirus protects your computer from vulnerabilities through the latest program and definition updates. Definition updates contain the information that lets Norton AntiVirus recognize and alert you to the presence of a specific virus or security threat.
  • Page 273 Activates the Core Set virus definitions which contain the most important virus definitions that are required for latest security threats as viewed by Symantec. Turning on the Smart Definitions option minimizes download time, installation time, and system start time. Therefore,...
  • Page 274 Customizing protection features About customizing settings and options Your options are: Browser Protection The Browser Protection feature checks for browser vulnerabilities in Internet Explorer 6 and Internet Explorer You must turn on the Browser Protection option to enable this feature. Download Intelligence Download Intelligence protects your computer against any...
  • Page 275 Customizing protection features About customizing settings and options Intrusion Prevention Intrusion Prevention scans all the network traffic to and from your computer and compares this information against a set of attack signatures. Attack signatures contain the information that identifies an attacker's attempt to exploit a known vulnerability in the operating system or in a...
  • Page 276 Customizing protection features About customizing settings and options Message Protection...
  • Page 277 Customizing protection features About customizing settings and options Email Protection protects your computer against the threats that you may receive through email attachments. You can use the Email Antivirus Scan option and the Protected Ports Settings option to configure your email program for protection against viruses and other security threats.
  • Page 278 Customizing protection features About customizing settings and options default SMTP port 25 and the default POP3 port 110. If your email program is not configured with the default ports, you can manually configure Norton AntiVirus to protect your POP3 and SMTP ports.
  • Page 279 Customizing protection features About customizing settings and options Network Security Settings...
  • Page 280 In case of proxy servers, Norton AntiVirus uses the Network Proxy Settings to connect to the Symantec server and the Internet. The following are also some activities that you can do using the Norton Security Map feature:...
  • Page 281 Customizing protection features About customizing settings and options devices that are on your network. Grant or deny permissions to the networked devices to access your computer. Add or Remove any device in the Network Security Map. About General settings You can use General settings to schedule your product tasks and configure different Norton AntiVirus settings.
  • Page 282 Customizing protection features About customizing settings and options Your options are: Norton Tasks...
  • Page 283 Customizing protection features About customizing settings and options Lets you configure your Norton Tasks settings. Your options are: Automatic Resume Delay This option delays the automatic background tasks for a specific duration even if your computer is idle for that period.
  • Page 284 Customizing protection features About customizing settings and options When the option is turned on, Norton AntiVirus automatically schedules the optimization after you install an application on your computer. Optimization improves the performance of your computer by defragmenting the fragmented parts of the disk.
  • Page 285 Customizing protection features About customizing settings and options Other Settings...
  • Page 286 Lets you configure Norton AntiVirus to notify you about special offers on the latest Norton products, add-ons, and other useful information from Symantec. Insight Protection Lets Norton AntiVirus to perform an Insight Network scan on your computer. The Insight Network scan...
  • Page 287 Customizing protection features About customizing settings and options definitions. Norton Community Watch Lets you submit selected security and application data to Symantec for analysis. Symantec analyses the data to determine any possible security risks and provides you the useful statistical information about the applications.
  • Page 288 Customizing protection features About customizing settings and options Performance Monitoring...
  • Page 289 Customizing protection features About customizing settings and options Lets you monitor the performance of your computer. Performance Monitoring When you turn on the Performance Monitoring option, Norton AntiVirus monitors the CPU usage and memory usage of your computer. You can also monitor the important system activities that you...
  • Page 290 Customizing protection features About customizing settings and options Details & Settings link in the notification alert lets you view additional details about the resource consumption by the program in the File Insight window. Resource Threshold Profile for Alerting Lets you configure the resource threshold profile for displaying performance alerts.
  • Page 291 Customizing protection features About customizing settings and options Alert for High-Usage When this option is turned on, Norton AntiVirus detects and notifies you with the details of increased usage of the CPU resource by any program or process. Memory When this option is turned on, Norton AntiVirus detects and...
  • Page 292 Customizing protection features About customizing settings and options by any program or process. Program Exclusions Lets you select specific programs to exclude from appearing in performance alerts.
  • Page 293 Customizing protection features About customizing settings and options Product Security...
  • Page 294 Customizing protection features About customizing settings and options Lets you protect Norton AntiVirus from unauthorized changes. Your options are: Non-Admins Access to Settings Lets you access and configure all the options in the Settings window from a non-admin user account as well. By default, this option is turned off.
  • Page 295 Customizing protection features About customizing settings and options product settings. However, if you forget your settings password, you can reset the password in the window that appears when you choose to uninstall Norton AntiVirus. You do not need to uninstall the product to reset your password.
  • Page 296 Customizing protection features About customizing settings and options Silent Mode Settings...
  • Page 297 Customizing protection features About customizing settings and options Lets you turn on or turn off Silent Mode. Your options are: Silent Mode When you turn on the Silent Mode option, Silent Mode is enabled for a specified duration. Norton AntiVirus suppresses all alerts and suspends the background activities for the duration that you...
  • Page 298 Customizing protection features About customizing settings and options Quiet Mode. When Quiet Mode is turned on, Norton AntiVirus suppresses the background activities but continues to display alerts and notifications. Media Center TV Recording When you use the Media Center application to record a TV program, Norton AntiVirus detects the activity, and...
  • Page 299 Customizing protection features About customizing settings and options User-Specified Programs When you run an application that is listed in the User-Specified Programs list, Norton AntiVirus detects the activity, and automatically turns on Quiet Mode. When Quiet Mode is turned on, Norton AntiVirus suppresses the background activities but continues to...
  • Page 300 Customizing protection features About customizing settings and options You cannot run System Restore on your computer when Norton Product Tamper Protection is turned on. You must temporarily turn off Norton Product Tamper Protection to run a successful System Restore. Turning off or turning on Norton Product Tamper Protection Norton Product Tamper Protection protects the Norton AntiVirus files from an attack or modification by any...
  • Page 301 Customizing protection features About customizing settings and options To turn on Norton Product Tamper Protection 1 In the Norton AntiVirus main window, click Settings. 2 In the Settings window, click the General tab. 3 In the left pane, click Product Security. 4 In the Norton Product Tamper Protection row, move the On/Off switch to the left to the On position.
  • Page 302 Customizing protection features About customizing settings and options The reset settings password option appears in the Select your Uninstall Preference window only when the Settings Password Protection option is turned on. You can turn off the Settings Password Protection option if you no longer require password protection for your Norton AntiVirus Settings.
  • Page 303 Customizing protection features About customizing settings and options 6 In the dialog box that appears, in the Password box, type a password. 7 In the Confirm Password box, type the password again. 8 Click OK. 9 In the Settings window, click OK. Turning off Norton AntiVirus Settings password You can protect your Norton AntiVirus Settings with a password using the Settings Password Protection...
  • Page 304 Customizing protection features About customizing settings and options password option in the Select Uninstall Preference window. To access the Select Uninstall Preference window, you must choose to uninstall Norton AntiVirus. However, you need not uninstall the product to reset your Settings password.
  • Page 305 Customizing protection features About customizing settings and options 7 In the Confirm New Password box, type the new password again. 8 Click OK.
  • Page 306 Customizing protection features About customizing settings and options...
  • Page 307: Finding Additional Solutions

    Finding additional solutions This chapter includes the following topics: Finding the version number of your product Finding the End-User License Agreement About upgrading your product About Norton Autofix Staying informed about protection issues About Support About uninstalling Finding the version number of your product If you want to upgrade your Norton product or want to reach the customer support for assistance, you must know your product version number.
  • Page 308: Finding The End-User License Agreement

    Finding additional solutions Finding the End-User License Agreement Finding the End-User License Agreement End-User License Agreement (EULA) is a legal document that you agree to while installing the product. EULA contains information such as the restriction on sharing or usage of the software, the user rights on the software, and the support information.
  • Page 309 If a new version is not available, the Web page informs you that no new version is available and your product is up to date. Symantec recommends that you have the latest version of the product, as it contains new and enhanced features for better protection against security threats.
  • Page 310 When you check for a new version, details about your product such as product name and version are sent to Symantec servers. The servers then check whether a new version of the specified product is available or not. If a new version is available, you can download and install it from the Web page.
  • Page 311: About Norton Autofix

    Finding additional solutions About Norton Autofix Your product must be activated and you need an Internet connection to check if a new version is available and install new version of the product. To check for a new version of the product 1 In the Norton AntiVirus main window, click Support.
  • Page 312 Finding additional solutions About Norton Autofix that your computer is connected to the Internet. If you use a proxy server to connect to the Internet, you must configure the proxy settings of Norton AntiVirus. See Configuring Network Proxy Settings” on page 58. If you do not know your proxy settings, contact your Internet service provider or network administrator for assistance.
  • Page 313: Staying Informed About Protection Issues

    Staying informed about protection issues If you need help using Norton AntiVirus, you can find helpful information on the Symantec Web site. It contains many useful and informative features that are especially designed to complement Norton AntiVirus, including the following: Detailed background information about current threats and outbreaks.
  • Page 314: About Support

    1 Open your Web browser, and go to the following URL: http://www.symantec.com 2 In the Symantec Web site, click Norton. 3 In the menu that appears, do the following: Click the Viruses & Risks tab, and then click any item on the left pane to find out more details about it.
  • Page 315 Availability of support varies by region, language, or product. For additional support, go to the following URL: www.symantec.com/globalsupport In addition to the self-help options, you can use the Contact Us option at the bottom of the Web page to...
  • Page 316 Finding additional solutions About Support contact the technical support team in the following ways: Chat Chat in real time with a support representative. For more complex technical issues, chat offers the option to allow a support representative to connect remotely to your computer and resolve your problem.
  • Page 317: About Phone Support

    If you cannot access phone support by using Norton Autofix, then you can access the phone support options at the following URL: http://www.symantec.com/globalsupport Getting support by phone When you click the Get Support option in the Support drop-down menu, Norton Autofix performs a Quick Scan of your computer and should repair your computer problems.
  • Page 318 You can use the phone number to contact a support representative. Support policy Symantec recommends that you have the latest version of the product, as it contains new and enhanced features for better protection against security threats. In case of older versions, complimentary support is offered for a minimum of 2 years.
  • Page 319: Worldwide Service And Support

    Finding additional solutions About Support About keeping your subscription current Subscription period lengths vary by Symantec product. To maintain uninterrupted protection, you must keep your subscription up to date. If you do not renew your subscription, you cannot obtain updates of any kind and the software no longer functions.
  • Page 320: About Uninstalling

    Order Status Returns Rebates About uninstalling To remove your Symantec product from your computer, use the Add/Remove Programs option in the Windows Control Panel. You must restart your computer after uninstalling the product, so ensure that you do not have any other programs running while you follow this procedure.
  • Page 321 Finding additional solutions About uninstalling Web site or from the CD. To reinstall Norton AntiVirus, follow the installation procedures that are available in the User's guide. To uninstall Norton AntiVirus from Windows Control Panel 1 On the Windows taskbar, click Start > Control Panel.
  • Page 322 Finding additional solutions About uninstalling 5 To uninstall Norton AntiVirus, click Next. 6 Do one of the following: Click Restart Now (recommended) to restart the computer. Click Restart Later to restart your computer later. Norton AntiVirus is not fully uninstalled until you restart your computer.
  • Page 323 Finding additional solutions About uninstalling 4 Do one of the following: Click Restart Now (recommended) to restart the computer. Click Restart Later to restart the computer later. Norton AntiVirus is not fully uninstalled until you restart your computer.
  • Page 324 Finding additional solutions About uninstalling...
  • Page 325: Index

    235 attention performing actions 235 infected files 174 restoring security risks 235 infected items 111 submission, items to resolve any items 111 Symantec 235 Attention Required activation about 111 about 11 resolving the risk 111 alerts 12 Auto-Protect...
  • Page 326 Index Bandwidth custom scans (continued) defining usage 221 running a custom scan 115 managing 219 scan frequently 112 Boot Time Protection 163 schedule the custom scan 112 configure 164 scheduling 117, 120 customer support about 315 using 316 changing scan schedules 120 cloud technology Cloud 123 definition status 52...
  • Page 327 Index EULA Insight Network (continued) checking 308 Single File Scan 123 Events graph Insight Protection monitoring activities 64 turning off 125 turning on 125 installation problems 39, 41 features 253 Instant Messenger security risk protection 257 virus protection 253 file extensions Intrusion AutoBlock of infected files 174 turning on and off 193...
  • Page 328 Index maintaining protection Network Security Map (continued) about 97 purging 215 avoiding security risks 97 removing devices 215 Manual Repair turning off 209 reviewing remaining risks turning off Network Security in 174 Overview 202 Manual Repair window turning on Network Security reviewing remaining risks Overview 202 in 107, 109...
  • Page 329 Index Norton AntiVirus (continued) Norton Product Tamper uninstalling 320 Protection (continued) upgrading 308 turning on 300 version number 307 Norton Tasks Norton AntiVirus scan about 81 about 100 notification area accessing Norton AntiVirus icon 42 scans 104 shortcut menu 44 command line scanning 121 notifications Computer Scan 100...
  • Page 330 Index performance alerts (continued) Quarantine (continued) removing programs from items, submitting for exclusion list 73 analysis 252 turning off 68 managing items 247 turning off low resource opening 247 profile 71 restoring items 251 turning on 68 Quarantined Items view turning on low resource adding items 226 profile 71...
  • Page 331 174 searching 244 Scans security risks 226 command line 121 submission, items to Computer Scan 105 Symantec 226 create a custom scan 112 suspicious email 226 Custom Scan 105 viewing items 226 deleting custom scans 116 viewing quarantined items 226...
  • Page 332 257 accessing 262 starting configuring 261 virus protection 253 customizing 261 startup files 166 Miscellaneous 281 submission, items to Symantec 252 settings password subscription resetting 303 maintaining 319 turning off 303 product updates 52 Settings Password Protection summary...
  • Page 333 Index System Insight (continued) virus protection monitoring activities 64 about 253 Performance graph 61 system scans 107 system status graph updates 253 activity details 66 viruses System Status indicators automatic protection 253 responding 33 descriptions 253 unknown 253 Vulnerability Protection about 194, 196 technical support viewing programs 195...
  • Page 334 Copyright © 2011 Symantec Corporation. All rights reserved. Symantec, Norton, and the Norton Logo are trademarks or registered trademarks of Symantec Corporation and its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This manual is also suitable for:

Norton antivirus

Table of Contents