Table of Contents

Advertisement

Quick Links

User's Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NORTON INTERNET SECURITY 2004 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Symantec NORTON INTERNET SECURITY 2004

  • Page 1 User’s Guide...
  • Page 2 Symantec Corporation. NO WARRANTY. The technical documentation is being delivered to you AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors.
  • Page 3 Software CONDITIONS OF THIS LICENSE AGREEMENT over that network; CAREFULLY BEFORE USING THE SOFTWARE. D. after written notice to Symantec, transfer the SYMANTEC CORPORATION AND/OR ITS Software on a permanent basis to another SUBSIDIARIES (“SYMANTEC”) IS WILLING TO...
  • Page 4: Limited Warranty

    United States will be that Symantec will, at its option, replace Government end users with only those rights as any defective media returned to Symantec...
  • Page 5 You and Symantec. Should You have any questions concerning this Agreement, or if You desire to contact Symantec for any reason, please write to: (i) Symantec Customer Service, 555 International Way, Springfield, OR 97477, U.S.A., (ii) Symantec Authorized Service...
  • Page 7: Table Of Contents

    Contents Chapter 1 Responding to emergencies If your product won’t install ...........16 If your computer won’t start ...........17 Scan for viruses using the CD ......17 Create Emergency Disks ..........18 If you need to use Emergency Disks ......19 How to maintain protection ..........20 Avoid viruses and threats ........20 Prepare for emergencies ..........21 Chapter 2...
  • Page 8 Contents After installation ..............43 Use the Information Wizard .........43 If you need to uninstall Norton Internet Security ..............46 Chapter 4 Basics Check the version number ..........49 Start Norton Internet Security ........50 Use the Norton Internet Security tray icon ....50 Use Web assistant from the Internet Explorer toolbar .................51 Use your email program toolbar ........52 Start Norton AntiVirus .............53...
  • Page 9 For more information ............78 Look up glossary terms ..........78 Use online Help ............78 Readme file ..............79 Access the User’s Guide PDF .......79 Symantec products on the Web ......80 Subscribe to the Symantec Security Response newsletter ........82 Chapter 5 Options Set Norton Internet Security options ......84 About General options ..........85...
  • Page 10 Contents If you can’t use LiveUpdate ..........98 Set LiveUpdate to Interactive or Express mode ..98 Turn off Express mode ...........99 If you run LiveUpdate on an internal network ..100 Run LiveUpdate automatically ........101 About your subscription ..........103 Chapter 7 Guarding against intrusion attempts About the Personal Firewall ........
  • Page 11 If Inoculation alerts you about a change in system files ........... 145 If Norton AntiVirus places files in Quarantine ..146 If Norton AntiVirus cannot repair a file ....147 Look up viruses on the Symantec Web site ..... 148...
  • Page 12 Contents Chapter 11 Creating accounts for multiple users About Norton Internet Security accounts ....149 Norton Internet Security accounts and Windows accounts ........150 Create Norton Internet Security accounts ....150 Set the startup account ........154 Set or change account passwords ....154 Assign Norton Internet Security account types to Windows accounts ..........
  • Page 13 About the Log Viewer ............ 188 Check the Activity Log ........188 Chapter 17 Troubleshooting Explore the Symantec service and support Web site ................191 Troubleshoot Norton Internet Security ..... 193 What is wrong with this Web site? ....193 Why can’t I post information online? ....
  • Page 14 Contents Troubleshoot Ad Blocking ..........198 Does Ad Blocking block all advertising on the current page? ........198 Will Popup Window Blocking block all pop-ups or only pop-up ads? ..... 198 Are there security issues associated with advertisements? .......... 198 Troubleshoot Norton AntiVirus ........
  • Page 15: Responding To Emergencies

    Responding to emergencies If you have an emergency, read these sections to try to find the solution to your problem. Common problems include: Virus threats Trouble restarting your computer Lost or missing files Possible disk damage If you purchased this product to address any of the problems listed above, read these sections first.
  • Page 16: If Your Product Won't Install

    You must be running Windows in order to install your Symantec product. If you try to install and your computer has a virus and you choose not to run the Symantec Pre-Install Scanner, start over and run the Symantec Pre-Install Scanner as directed.
  • Page 17: If Your Computer Won't Start

    Responding to emergencies If your computer won’t start If your computer won’t start If you have a virus or threat on your computer, you need to start the computer from an uninfected disk to remove the virus. Suggestion For more information Restart from the CD and scan your “Scan for viruses using the CD”...
  • Page 18: Create Emergency Disks

    Emergency Disks on another Disks” on page 19. computer or go to http://www.symantec.com/techsupp/ebd.html and download the Emergency Disk program. Follow the instructions included in the download to create the Emergency Disks. You will need several formatted 1.44-MB disks.
  • Page 19: If You Need To Use Emergency Disks

    Responding to emergencies If you need to use Emergency Disks If you need to use Emergency Disks If you have not created Rescue Disks, you can use “Create Emergency Disks” Emergency Disks to restart your computer and scan for on page 18. viruses or run DOS-based recovery utilities.
  • Page 20: How To Maintain Protection

    To avoid viruses: Write-protect removable media. Stay informed about viruses by logging on to the “Explore the Symantec service Symantec Security Response Web site and support Web (http://securityresponse.symantec.com) where there site” on page 191. is extensive, frequently updated information on viruses and automatic virus protection.
  • Page 21: Prepare For Emergencies

    Responding to emergencies Prepare for emergencies Prepare for emergencies It is also important that you are prepared in case your computer is infected by a virus. To prepare for emergencies: Back up files regularly and keep more than just the most recent backup.
  • Page 22 Responding to emergencies Prepare for emergencies...
  • Page 23: Feature Summary

    Feature summary Use the information in this section to familiarize yourself with the product. This section includes: A list of all of the features in the product A brief description of each feature The feature summary can help you determine which feature to use to solve a problem.
  • Page 24: Activation Protects You

    If you have purchased the product on DVD, look for the sticker on your DVD package. If you have downloaded the product from the Symantec Store, the product key is stored on your computer as part of the download process.
  • Page 25: Security Protection Features

    Feature summary Security protection features Security protection features Norton Internet Security includes a suite of security tools that help keep your computer safe from viruses, security threats, unwanted email, and privacy intrusions. Security protection features include: Personal Firewall The Personal Firewall protects your computer from Internet attacks, dangerous Web content, port scans, and other suspicious behavior.
  • Page 26 Feature summary Security protection features Alert Assistant The Alert Assistant helps you understand security issues, suggests how you can resolve problems, and advises you on avoiding future security problems. “Learn more with the Alert Assistant” on page 56. Norton AntiSpam Norton AntiSpam helps reduce the amount of unwanted email messages that you receive by intelligently filtering incoming messages and clearly marking potential spam.
  • Page 27: Norton Antispam Features

    Feature summary Norton AntiSpam features Norton AntiSpam features As email becomes more popular, many users are receiving an increasing amount of the unsolicited commercial email messages known as spam. Not only does spam make it difficult to identify valid email messages, some spam contains offensive messages and images.
  • Page 28 Popup blocking Blocks pop-up windows based on user-defined criteria “Enable or disable Popup Window Blocking” on page 67. Live update of Updates copies of Symantec spam definition files spam definitions automatically (subscription required) “Keeping current with LiveUpdate” on page 95.
  • Page 29: Virus And Threat Protection Features

    Feature summary Virus and threat protection features Virus and threat protection features Norton AntiVirus provides comprehensive virus prevention, threat detection, and repair software for your computer. It automatically detects and repairs known viruses. Norton AntiVirus detects viruses and other potential risks in instant messenger attachments as well as in email messages, Internet downloads, and other files.
  • Page 30 Feature summary Virus and threat protection features Feature Description Email protection Protects incoming and outgoing email messages, preventing your computer and other computers from infection. “What to do if a virus is found” on page 139. Instant messenger Scans for and detects viruses in instant messenger protection attachments.
  • Page 31: Installing Norton Internet Security

    Installing Norton Internet Security Before installing Norton Internet Security, take a moment to review the system requirements. Windows 98/Me users should have several blank 1.44-MB disks available to make Rescue Disks. System requirements To use Norton Internet Security, your computer must have one of the following Windows operating systems installed: Windows 98, 98SE...
  • Page 32 Installing Norton Internet Security System requirements Your computer must also meet the following minimum requirements. Operating System Requirements Windows 98/98SE 133 MHz or higher processor 64 MB of RAM 200 MB of available hard disk space Internet Explorer 5.01 with Service Pack 2 or later (5.5 recommended) CD-ROM or DVD-ROM drive Windows Me...
  • Page 33: Supported Email And Instant Messenger Programs

    You should have no problems using Symantec “Change an existing firewall pcAnywhere as either a client or host with Norton rule” on page 114. Internet Security. For maximum protection, if you run a Symantec pcAnywhere host, edit the rule to limit its use...
  • Page 34 Installing Norton Internet Security System requirements to only the computers with which you use it. Symantec pcAnywhere passwords are also necessary for maximum security. Routers Norton Internet Security adds to the protection provided by the router. In some cases, you might want to reduce the protection provided by the router so that you can use programs like NetMeeting or MSN Messenger.
  • Page 35: Before Installation

    Installing Norton Internet Security Before installation About encrypted email connections Norton Internet Security does not support email connections using Secure Sockets Layer. Secure Sockets Layer (SSL) is a Netscape protocol designed to provide secure communications on the Internet. If you use an SSL connection to access your email, you are not protected by Norton Internet Security.
  • Page 36: Prepare Your Computer

    Installing Norton Internet Security Before installation Prepare your computer Quit all other Windows programs before installing Norton Internet Security. Other active programs may interfere with the installation and reduce your protection. If you have a recent version of Norton Internet Security Professional, Norton Internet Security, or Norton Personal Firewall, the installer can import and use your current security settings.
  • Page 37: Install Norton Internet Security

    Norton Internet Security. 3 In the Scan for Viruses dialog box, click Yes to scan your computer before installing. 4 In the Symantec Pre-Install Scanner window, review the progress of the scan. If Norton AntiVirus detects a virus, it prompts you to delete each file individually.
  • Page 38 Installing Norton Internet Security Install Norton Internet Security 7 After you review the results, close the scanresults- Notepad window, then click Next to continue with the installation. 8 Read the License Agreement, then click I accept the License Agreement. If you decline, you cannot continue with the installation.
  • Page 39 Installing Norton Internet Security Install Norton Internet Security 9 Click Next. 10 In the text boxes, type the product key for activation. “When to activate your 11 Click Next. product” page 24.
  • Page 40 Installing Norton Internet Security Install Norton Internet Security 12 Select an installation type. Your options are: Install Now Install using the most common settings. This is the best choice for most users. Custom View a list of the components and programs that will be installed, and add or remove components from the list.
  • Page 41: Customize Your Installation

    Installing Norton Internet Security Install Norton Internet Security 17 Do one of the following: To restart your computer now, click Restart Now (recommended). To restart your computer later, click Restart Later. Your computer is not protected until you restart. 18 Click Finish. Customize your installation During installation, if you select the Custom installation type, you can select the component programs that you...
  • Page 42: If The Opening Screen Does Not Appear

    Installing Norton Internet Security Install Norton Internet Security 3 Click Next. 4 In the Install Accounts and Parental Control window, select whether you want to install Accounts and Parental Control. If you do not install these features, you will have to reinstall Norton Internet Security to create accounts or use Parental Control.
  • Page 43: After Installation

    6 In the first Registration window, select the Country/ Region from which you are registering. 7 If you would like information from Symantec about Norton Internet Security, check the method by which you want to receive that information, type the corresponding address and phone number, then click Next.
  • Page 44 Installing Norton Internet Security After installation 8 Check if you would like to receive postal mail from Symantec. 9 Type your name and address, then click Next. 10 Make sure your computer is connected to the Internet, then click Next to activate.
  • Page 45 Installing Norton Internet Security After installation 14 Review the post-installation tasks and configuration settings for Norton Internet Security. If you want to change any of the settings, do so using Options. 15 Click Finish. If you selected any post-installation tasks, they start automatically.
  • Page 46: If You Need To Uninstall Norton Internet Security

    Installing Norton Internet Security If you need to uninstall Norton Internet Security If you need to uninstall Norton Internet Security If you need to remove Norton Internet Security from your computer, use the Add/Remove Programs option from the Windows Control Panel. You can also uninstall only the Norton AntiVirus component of Norton Internet Security.
  • Page 47 Installing Norton Internet Security If you need to uninstall Norton Internet Security 8 If you have files in Quarantine, you are asked if you want to delete them. Your options are: Deletes the quarantined files from your computer Leaves the quarantined files on your computer, but makes them inaccessible 9 Click Next.
  • Page 48 Installing Norton Internet Security If you need to uninstall Norton Internet Security...
  • Page 49: Basics

    Check the version number You can check the version number of your product on your computer. Use the version number to help you find more information about your product on the Symantec Web site. To check the version number 1 Start your product.
  • Page 50: Start Norton Internet Security

    Basics Start Norton Internet Security Start Norton Internet Security After installation, Norton Internet Security automatically protects any computer on which it is installed. You do not have to start the program to be protected. To start Norton Internet Security Do one of the following: On the Windows taskbar, click Start >...
  • Page 51: Use Web Assistant From The Internet Explorer Toolbar

    Basics Use Web assistant from the Internet Explorer toolbar You can also use the Norton Internet Security Options to “About General options” add additional tools to the menu. page 85. To use the Norton Internet Security tray icon 1 In the Windows system tray, right-click the Norton Internet Security icon.
  • Page 52: Use Your Email Program Toolbar

    Basics Use your email program toolbar Use your email program toolbar Norton AntiSpam adds a button or buttons to the toolbar of supported email programs. If a single Norton AntiSpam button is added, it drops down an abbreviated Norton AntiSpam menu. The buttons or menu options added are as follows: This is Spam Marks the selected email as spam...
  • Page 53: Start Norton Antivirus

    Basics Start Norton AntiVirus Start Norton AntiVirus After installation, Norton AntiVirus automatically protects any computer on which it is installed. You do not have to start the program to be protected. To start Norton AntiVirus Do one of the following: On the Windows taskbar, click Start >...
  • Page 54 “Monitor Norton AntiVirus activities” on page 188. View Virus Connects you to the Symantec Security Encyclopedia Response Web page, from which you can search for information on all types of viruses. Launch Scan...
  • Page 55: Activate Your Product

    Activate your product Activate your product Product activation reduces software piracy and ensures that you have received genuine Symantec software. You must activate your product within 15 days of installing it or the product will stop working. If you did not activate your product using the...
  • Page 56: Respond To Norton Internet Security Alerts

    Basics Respond to Norton Internet Security alerts Respond to Norton Internet Security alerts When a Norton Internet Security alert appears, read it before you make a decision. Identify what type of alert it is and the threat level. Once you understand the risks, you can make a choice.
  • Page 57: Use Web Assistant

    Basics Use Web assistant Use Web assistant Web assistant lets you customize Ad Blocking and Privacy Control settings for individual Web sites without leaving your browser. Web assistant adds a button to your Microsoft Internet Explorer toolbar that gives you fast access to Ad Blocking, Privacy Control, and the Norton Internet Security main window.
  • Page 58: Check Your Computer's Vulnerability To Attack

    Use Security Check to test your computer’s vulnerability to security intrusions. The Security Check link in Norton Internet Security connects you to the Symantec Web site, where you can scan for vulnerabilities and get detailed information about Security Check scans.
  • Page 59: Stop All Internet Communication

    Basics Stop all Internet communication You can trace connection attempts from the following locations: Statistics window AutoBlock Alerts When Visual Tracking is finished, it displays a visual representation of where this communication originated and contact information for the owner of the IP address. To trace a connection attempt from the Statistics window 1 In the main window, click Statistics.
  • Page 60 Basics Stop all Internet communication outside world, it appears that your computer has completely disconnected from the Internet. If you want to block all traffic into and out of your computer, Block Traffic is more effective than simply using your Internet software to disconnect. Most Internet programs can automatically connect without any input from the user, so a malicious program could reconnect when you are away from the computer.
  • Page 61: Manage How Norton Antispam Detects Spam

    Basics Manage how Norton AntiSpam detects spam Manage how Norton AntiSpam detects spam Norton AntiSpam begins filtering email as soon as it is installed. If you are using a supported email program, it will also be available from within that program after installation.
  • Page 62: Identify Authorized Senders

    Basics Manage how Norton AntiSpam detects spam 4 Use the Norton AntiSpam slider to control how Norton AntiSpam filters email. Your options are: High Maximum filtering. Most spam is correctly identified. More likely to identify personal email messages as spam. Medium Moderate filtering.
  • Page 63: Identify Senders Of Spam Email Messages

    Basics Manage how Norton AntiSpam detects spam To add names to your allowed list 1 In the main window, double-click Allowed List. 2 In the Allowed List window, click Add. 3 In the Add Address to Allowed List dialog box, type the email address you want to allow and, optionally, the first and last name of the sender.
  • Page 64: Teach Norton Antispam Your Email Preferences

    Basics Manage how Norton AntiSpam detects spam To add names to the Blocked List 1 In the main window, double-click Blocked List. 2 In the Blocked List window, click Add. 3 In the Add Address to Blocked List dialog box, type the email address you want to block and, optionally, the first and last name of the sender.
  • Page 65 Basics Manage how Norton AntiSpam detects spam To train the filtering engine 1 Start your email program. 2 Select each item that should have been marked as spam. 3 Using the buttons added to your email program by Norton AntiSpam, click This is Spam. 4 If you have set your options to ask before adding senders to the Blocked List, answer the prompt accordingly.
  • Page 66: Manage Advertising Filters

    Basics Manage advertising filters Manage advertising filters Ad Blocking can block several kinds of ads that appear on Web sites while you are browsing the Internet. You can set individual Ad Blocking settings for each user. Supervisor and Adult users can make changes to program settings.
  • Page 67: Enable Or Disable Popup Window Blocking

    Basics Manage advertising filters 2 In the Ad Blocking window, check or uncheck Turn on Ad Blocking. 3 Click OK. Enable or disable Popup Window Blocking Pop-up and pop-under ads are secondary windows that Web sites open when you visit or leave the sites. Pop-ups appear on top of the current window, while pop-unders appear behind the current window.
  • Page 68: Check Norton Antivirus Configuration Status

    Basics Check Norton AntiVirus configuration status Check Norton AntiVirus configuration status If Norton AntiVirus is behaving in an unexpected way, or if you’re not sure that everything is being scanned for viruses, check the status on the main window. In the System Status pane of the Norton AntiVirus main window, a check mark indicates that the system status is OK and a triangle indicates that your system needs attention.
  • Page 69: Check Office Plug-In Status

    Basics Check Norton AntiVirus configuration status Check Office Plug-in status Office Plug-in protects Microsoft Office documents from viruses, worms, and virus-like activities. It scans documents whenever you open them in a Microsoft Office program. Office Plug-in is enabled in Options. If you have set a password for Options, Norton AntiVirus asks you for the password before you can view or adjust the settings.
  • Page 70: Temporarily Disable Norton Internet Security

    Basics Temporarily disable Norton Internet Security Temporarily disable Norton Internet Security There may be times when you want to temporarily disable Norton Internet Security or one of its features. For example, you might want to see if Norton Internet Security is preventing a Web page from appearing correctly.
  • Page 71: Create And Use Rescue Disks

    76. Create a Rescue Disk set You can create Rescue Disks any time. You can start the Rescue Disk Wizard from the main window of your Symantec product.
  • Page 72 Basics Create and use Rescue Disks If you start the Rescue Disk Wizard from the main window, temporarily disable Auto-Protect while you are creating the Rescue Disk set. If you do not restart your computer after creating Rescue Disks, remember to enable Auto-Protect again.
  • Page 73: Test Your Rescue Disks

    Basics Create and use Rescue Disks when it prepares the bootable floppy disk for the Rescue Disk set. 4 Click OK to return to the Rescue Disk window. 5 When you have either assembled the required number of floppy disks or identified another location for the Rescue Disk files, click Create.
  • Page 74: Update Your Rescue Disks

    Basics Create and use Rescue Disks 3 Press Escape to exit to DOS. 4 Remove the disk from drive A and slide open the plastic tab on the back of the disk to write-protect it. 5 Restart your computer. Update your Rescue Disks You can update your Rescue Disks as often as you like.
  • Page 75 Basics Create and use Rescue Disks Rescue items list The list is categorized and presented in a hierarchical view, similar to a Windows Explorer view. Click the plus sign next to a category to expand the list and see what the category contains.
  • Page 76: If You Need To Use Rescue Disks To Restore Your System

    Basics If you need to use Rescue Disks to restore your system If you need to use Rescue Disks to restore your system Rescue Disks are available only for Windows 98/Me. Sometimes a virus or threat prevents your computer from starting normally. Some viruses can only be removed if the computer is started from a clean disk, not the infected hard disk.
  • Page 77 Basics If you need to use Rescue Disks to restore your system 4 Follow the on-screen instructions for inserting and removing the Rescue Disks. 5 When the Rescue program is done, remove the Rescue Disk from drive A and restart your computer.
  • Page 78: For More Information

    For more information The product documentation provides glossary terms, online Help, a Readme file, the User’s Guide in PDF format, and links to the Knowledge Base on the Symantec Web site. Look up glossary terms Technical terms that are italicized in the User’s Guide are defined in the glossary, which is available in both the User’s Guide PDF and Help.
  • Page 79: Readme File

    Basics For more information Window and dialog box Help Window and dialog box Help provides information about the program. This type of Help is context-sensitive, meaning that it provides help for the dialog box or window that you are currently using. To access window or dialog box Help Do one of the following: In the window, click any available Help link.
  • Page 80: Symantec Products On The Web

    1 Open the location into which you copied the PDF. 2 Double-click the PDF. Symantec products on the Web The Symantec Web site provides extensive information about all Symantec products. There are several ways to access the Symantec Web site.
  • Page 81 View Virus Encyclopedia. This option connects you to the Symantec Security Response Web page, from which you can search for information on all types of viruses. To access the Symantec Web site in your browser On the Internet, go to www.symantec.com...
  • Page 82: Subscribe To The Symantec Security Response Newsletter

    Basics For more information Subscribe to the Symantec Security Response newsletter Each month, Symantec publishes a free electronic newsletter that is focused on the needs of Internet security customers. It discusses the latest antivirus technology produced by Symantec Security Response,...
  • Page 83 Options The default settings for this product provide complete protection for your computer. However, you may want to adjust them to optimize system performance or disable options that do not apply. You can change the product’s settings to fit your work environment. If you are using Windows 2000/XP, you will need administrator access to change options.
  • Page 84: Set Norton Internet Security Options

    Options Set Norton Internet Security options Set Norton Internet Security options The default settings for Norton Internet Security provide a safe, automatic, and efficient way of protecting your computer. If you want to change or customize your protection, you can access all Norton Internet Security tools from the Status &...
  • Page 85: About General Options

    Options Set Norton Internet Security options To customize Norton Internet Security 1 At the top of the main window, click Options. If a menu appears, click Norton Internet Security. 2 Select the tab on which you want to change options. Your options are: General “About General options”...
  • Page 86: About Email Options

    Options Password protect Norton Internet Security options About Email options Email options let you control how Norton Internet Security notifies you when it is scanning email messages for private information and spam. Password protect Norton Internet Security options You can protect Norton Internet Security options with a password.
  • Page 87 Options Password protect Norton Internet Security options 4 Do one of the following: In Windows 2000/Me, click Change/Remove. In Windows 98, click Add/Remove. In Windows XP, click Change. 5 In the Remove Application window, click Reset Password. 6 In the password reset dialog box, in the Reset Password Key text box, type the Reset Password Key that appears above the text box.
  • Page 88: Customize Norton Antivirus

    Options Customize Norton AntiVirus Customize Norton AntiVirus The default settings for Norton AntiVirus provide complete virus protection for your computer. However, you may want to adjust them to optimize system performance or disable options that do not apply. Norton AntiVirus provides password protection for your option settings.
  • Page 89: About System Options

    Options Customize Norton AntiVirus About System options The System options control scanning and monitoring of your computer. You use System options to determine what gets scanned, what the scan is looking for, and what happens when a virus or virus-like activity is encountered.
  • Page 90: About Internet Options

    Options Customize Norton AntiVirus About Internet options Internet options define what happens when your computer is connected to the Internet. You use Internet options to define how Norton AntiVirus should scan email and instant messenger attachments, enable Worm Blocking, and determine how updates should be applied with LiveUpdate.
  • Page 91 Options Customize Norton AntiVirus The Other options that you can set are as follows. Option Description Threat Categories Determine the threats that you want Norton AntiVirus to detect. Advanced options include how to respond when a threat is found and what to do when deleting threats. Exclusions options specify the files that should not be scanned by file name extension or by specific file name.
  • Page 92: Set Norton Antivirus Options

    Options Set Norton AntiVirus options Set Norton AntiVirus options You change the settings for Norton AntiVirus options in the Options window. If you set a password for Options, Norton AntiVirus asks you for the password before you can continue. To change settings 1 At the top of the main window, click Options.
  • Page 93: Password Protect Norton Antivirus Options

    Options Password protect Norton AntiVirus options Password protect Norton AntiVirus options To protect your Norton AntiVirus options from being changed without your permission, you can choose to protect or remove protection from your option settings with a password. If you specify a password, you are asked to enter a password every time that you view the Options window, or temporarily enable or disable Auto- Protect.
  • Page 94 Options Password protect Norton AntiVirus options...
  • Page 95: Keeping Current With Liveupdate

    Keeping current with LiveUpdate Symantec products depend on current information to protect your computer from newly discovered threats. Symantec makes this information available to you through LiveUpdate. Using your Internet connection, LiveUpdate obtains program updates and protection updates for your computer.
  • Page 96: About Protection Updates

    Keeping current with LiveUpdate About protection updates About protection updates Protection updates are files that are available from Symantec that keep your Symantec products up-to-date with the latest anti-threat technology. The protection updates you receive depend on which product you are using.
  • Page 97: Obtain Updates Using Liveupdate

    Keeping current with LiveUpdate Obtain updates using LiveUpdate Obtain updates using LiveUpdate LiveUpdate checks for updates to all of the Symantec products that are installed on your computer. If your Internet service provider does not automatically connect you to the Internet, connect to the Internet first, and then run LiveUpdate.
  • Page 98: If You Can't Use Liveupdate

    If you can’t use LiveUpdate If you can’t use LiveUpdate When new updates become available, Symantec posts them on the Symantec Web site. If you can’t run LiveUpdate, you can obtain new updates from the Symantec Web site. To obtain updates from the Symantec Web site 1 On the Internet, go to securityresponse.symantec.com...
  • Page 99: Turn Off Express Mode

    I want LiveUpdate to Installs updates automatically start automatically whenever you start LiveUpdate 5 To have access to a Symantec self-help Web site in the event that an error occurs while using LiveUpdate, check Enable Enhanced Error Support. 6 Click OK.
  • Page 100: If You Run Liveupdate On An Internal Network

    Keeping current with LiveUpdate If you run LiveUpdate on an internal network If you run LiveUpdate on an internal network If you run LiveUpdate on a computer that is connected to a network that is behind a company firewall, your network administrator might set up an internal LiveUpdate server on the network.
  • Page 101: Run Liveupdate Automatically

    Keeping current with LiveUpdate Run LiveUpdate automatically Run LiveUpdate automatically You can have LiveUpdate check for protection updates automatically, on a set schedule, by enabling Automatic LiveUpdate. You must continue to run LiveUpdate manually to receive product updates. Automatic LiveUpdate checks for an Internet connection every five minutes until a connection is found, and then every four hours.
  • Page 102 Keeping current with LiveUpdate Run LiveUpdate automatically 5 For each type of update for which you want Automatic LiveUpdate to check, select how you want those updates to be applied. Your options are: Automatically LiveUpdate checks for and installs update my protection updates without prompting protection you.
  • Page 103: About Your Subscription

    LiveUpdate to obtain program updates. However, you cannot obtain protection updates through LiveUpdate or from the Symantec Web site and will not be protected against newly discovered threats. Also, whenever you use LiveUpdate, you will receive a warning that your subscription has expired.
  • Page 104 Keeping current with LiveUpdate About your subscription...
  • Page 105: Guarding Against Intrusion Attempts

    Guarding against intrusion attempts The Personal Firewall and Intrusion Detection features protect your computer from online attacks, unwanted connection attempts, malicious Web content, port scans, and other suspicious behavior. About the Personal Firewall When the Personal Firewall is active, it monitors communications among your computer and other computers on the Internet.
  • Page 106: Customize Firewall Protection

    Guarding against intrusion attempts Customize firewall protection improper connection attempts, Trojan horses, and malicious Web content. Customize firewall protection The default Personal Firewall settings should provide adequate protection for most users. If the default protection is not appropriate, you can customize Personal Firewall protection by using the Security Level slider to select preset security levels, or by changing individual security settings.
  • Page 107 Guarding against intrusion attempts Customize firewall protection To change individual security settings 1 In the main window, double-click Personal Firewall. 2 In the Personal Firewall window, in the Choose a security level for drop-down list, select the account that you want to change. 3 Click Custom Level.
  • Page 108: Allow Or Block Access To Your Computer

    Guarding against intrusion attempts Allow or block access to your computer Allow or block access to your computer Norton Internet Security allows you to organize computers on your home network and the Internet into Trusted and Restricted Zones. Zones allow you to grant trusted computers more access to your computer while blocking malicious users.
  • Page 109: Customize Firewall Rules

    Guarding against intrusion attempts Customize firewall rules 5 In the Specify Computers window, identify the “Identify computers to computer. Norton Internet 6 When you have finished adding computers, click OK. Security” page 115. To remove computers from zones 1 In the main window, double-click Personal Firewall. 2 In the Personal Firewall window, on the Networking tab, select the zone containing the computer you want to remove.
  • Page 110: Create New Firewall Rules

    Internet access settings for programs the first time that they run. Automatic Program Control only configures Internet access for the versions of programs that Symantec has identified as safe. When Automatic Program Control configures access for a new program, Norton Internet Security displays a message above the Windows toolbar.
  • Page 111 Guarding against intrusion attempts Customize firewall rules To enable Automatic Program Control 1 In the main window, double-click Personal Firewall. 2 In the Personal Firewall window, on the Programs tab, select the Location you want to customize. 3 Check Turn on Automatic Program Control. 4 Click OK.
  • Page 112 Guarding against intrusion attempts Customize firewall rules Manually add a program to Program Control Add programs to Program Control to strictly control the “Customize firewall programs’ ability to access the Internet. This overrides protection” any settings made by Automatic Program Control. page 106.
  • Page 113: Manually Add A Firewall Rule

    Guarding against intrusion attempts Customize firewall rules Manually add a firewall rule While Program Control automatically creates most of the firewall rules that you need, you may want to add specific rules. Only experienced Internet users should create their own firewall rules. There are three sets of firewall rules you can customize: General Rules Trojan Horse Rules...
  • Page 114: Change An Existing Firewall Rule

    Guarding against intrusion attempts Customize firewall rules Change an existing firewall rule You can change firewall rules if they are not functioning the way that you want. To change an existing firewall rule 1 In the General Rules, Trojan Horse Rules, or Program Rules window, select the rule that you want to change.
  • Page 115: Identify Computers To Norton Internet Security

    Specify an individual computer The computer name that you type can be an IP address, a URL such as service.symantec.com, or a Microsoft Network computer name, such as Mojave. You can find the names of computers on your local network in Network Neighborhood or Network Places on your Windows desktop.
  • Page 116: Specify A Range Of Computers

    Guarding against intrusion attempts Identify computers to Norton Internet Security Specify a range of computers You can enter a range of computers by specifying the starting (lowest numerically) IP address and the ending (highest numerically) IP address. All of the computers within that range of IP addresses are included.
  • Page 117: About Intrusion Detection

    Guarding against intrusion attempts About Intrusion Detection About Intrusion Detection Intrusion Detection scans all the network traffic that enters and exits your computer and compares this information against a set of attack signatures, arrangements of information that identify an attacker’s attempt to exploit a known operating system or program vulnerability.
  • Page 118: Customize Intrusion Detection

    Guarding against intrusion attempts Customize Intrusion Detection Customize Intrusion Detection The default Intrusion Detection settings should provide adequate protection for most users. You can customize Intrusion Detection by excluding specific network activity from monitoring, enabling or disabling AutoBlock, and restricting blocked computers. Turn Intrusion Detection alerts on and off You can choose whether you want to receive alerts when “Identify the...
  • Page 119: Exclude Specific Network Activity From Being Monitored

    Guarding against intrusion attempts Customize Intrusion Detection 3 Click OK. Exclude specific network activity from being monitored In some cases, benign network activity may appear similar to an attack signature. If you receive repeated warnings about possible attacks, and you know that these warnings are being triggered by safe behavior, you can create an exclusion for the attack signature that matches the benign activity.
  • Page 120: Enable Or Disable Autoblock

    Guarding against intrusion attempts Customize Intrusion Detection If you have excluded attack signatures that you want to monitor again, you can include them in the list of active signatures. To include attack signatures 1 In the main window, double-click Intrusion Detection.
  • Page 121: Unblock Autoblocked Computers

    Guarding against intrusion attempts Customize Intrusion Detection To customize the AutoBlock duration 1 In the main window, double-click Intrusion Detection. 2 In the Intrusion Detection window, under AutoBlock, on the AutoBlock attacking computer for menu, select a new duration. 3 Click OK. AutoBlock stops all inbound communications with a “Stop all Internet...
  • Page 122: Restrict A Blocked Computer

    Guarding against intrusion attempts Customize Intrusion Detection 3 Do one of the following: In the Currently blocked list, select a blocked IP address, then click Exclude. Click Add, then type the computer’s name, IP address, network identification, or a range of IP addresses containing the computer that you want to exclude.
  • Page 123: Customizing Protection For Different Locations

    Customizing protection for different locations Use Network Detector to create and customize security settings for different networks. This makes it easy for mobile users who connect to the Internet from the road to stay protected at all times. About Network Detector Network Detector lets you customize Program Control and Trusted Zone settings for different locations.
  • Page 124: Create A New Location

    Customizing protection for different locations About Network Detector Norton Internet Security includes four preconfigured locations. Office Low security. Primarily for use on networks containing a hardware firewall. Home Medium security. Good for general use. Away High security. Primarily for use on public networks. Default Security level is based on your current settings.
  • Page 125 Customizing protection for different locations About Network Detector Click Yes (recommended) to turn on Automatic Program Control. This reduces the number of alerts that you receive. Click No to turn off Automatic Program Control. You will be alerted the first time that programs attempt to connect to the Internet.
  • Page 126: Add New Networks To Locations

    Customizing protection for different locations About Network Detector Add new networks to locations Network Detector alerts you every time that your computer connects to an unrecognized network. You can choose to place this network in an existing location or create a new location. To add a new network to one of the preconfigured locations In the Network Detector alert, on the Which location...
  • Page 127: Customize A Location's Settings

    Customizing protection for different locations About Network Detector Interface Information about the network adapter that made the connection connection description Domain This network’s domain name (if available) To learn more about networks In the Network Detector alert, click Show details. Customize a location’s settings You can customize the Program Control and Trusted Zone settings for the predefined locations and any new...
  • Page 128: Delete A Location

    Customizing protection for different locations About Network Detector To clear networks from a location 1 In the main window, double-click Personal Firewall. 2 In the Personal Firewall window, on the Location tab, in the list of locations, select the location that you want to clear.
  • Page 129: Protecting Disks, Files, And Data From Viruses

    Protecting disks, files, and data from viruses Keeping your computer protected requires regular monitoring by Auto-Protect and Worm Blocking; scanning of your email attachments and files transferred by instant messenger; and frequent system scans. All of these tasks can be set to occur automatically. For added protection in Norton AntiVirus on Windows 98/98SE/Me, enable Inoculation to alert you if a system file changes.
  • Page 130: Manually Scan Disks, Folders, And Files

    Protecting disks, files, and data from viruses Manually scan disks, folders, and files Feature In the main window, Then for maximum click protection, select Email scanning Options > Norton Scan incoming Email AntiVirus > Email Scan outgoing Email If your email program uses one of the supported communications protocols, both options are selected by...
  • Page 131: Perform A Full System Scan

    Protecting disks, files, and data from viruses Perform a full system scan Although the default settings for manual scanning are usually adequate, you can raise the level of Bloodhound heuristics or adjust the options for manual scanning in the Options window. For more information about manual scanning options, see the online Help.
  • Page 132: Scan Individual Elements

    Protecting disks, files, and data from viruses Create and use custom scans Scan individual elements Occasionally, you may want to scan a particular file, removable drives, a floppy disk, any of your computer’s drives, or any folders or files on your computer. You may have been working with floppy disks or have received a compressed file in an email message and suspect a virus.
  • Page 133 Protecting disks, files, and data from viruses Create and use custom scans You can also schedule the custom scan to run automatically. You can delete the scan when it is no longer necessary. For example, if you are working on a project for which you need to frequently swap files with others, you might want to create a folder into which you copy and scan those files before using them.
  • Page 134: Run A Custom Scan

    Protecting disks, files, and data from viruses Delete a custom scan 9 Type a name for the scan by which you can identify it in the list of scans. 10 Click Finish. Run a custom scan When you run a custom scan, you do not have to redefine what you want to scan.
  • Page 135: Schedule A Custom Scan

    Protecting disks, files, and data from viruses Schedule scans You can schedule customized virus scans that run unattended on specific dates and times or at periodic intervals. If you are using the computer when the scheduled scan begins, it runs in the background so that you do not have to stop working.
  • Page 136: Edit Scheduled Scans

    Protecting disks, files, and data from viruses Schedule scans To create multiple schedules for a single scan 1 On the left side of the main window, under Norton AntiVirus, click Scan for Viruses. 2 In the Scan for Viruses pane, under Task, select the custom scan that you want to schedule.
  • Page 137: Delete A Scan Schedule

    Protecting disks, files, and data from viruses Schedule scans Delete a scan schedule You can delete any scan schedule. Deleting the schedule does not delete the scan. To delete a scan schedule 1 On the left side of the main window, under Norton AntiVirus, click Scan for Viruses.
  • Page 138 Protecting disks, files, and data from viruses Schedule scans...
  • Page 139: What To Do If A Virus Is Found

    “If Norton AntiVirus places Makes the file inaccessible by any programs other files in than a Symantec antivirus program. You cannot Quarantine” accidentally open the file and spread the virus, but page 146. you can still evaluate it for possible submission to Symantec.
  • Page 140: If A Virus Is Found During A Scan

    What to do if a virus is found If a virus is found during a scan infected file. Threats and security risks can appear during an instant messenger session, when sending an email message, or during a manual or scheduled scan. If a virus is found during a scan If Norton AntiVirus finds a virus, Trojan horse, worm, or security risk during a scan or from an instant messenger...
  • Page 141 What to do if a virus is found If a virus is found during a scan To use the Repair Wizard 1 If the Repair Wizard opens in the Fix Infections pane, uncheck any files that you don’t want Norton AntiVirus to fix.
  • Page 142: If A Virus Is Found By Auto-Protect

    Repair is always the best choice. Quarantine the Isolates the infected file, but does not remove the infected file threat. Select Quarantine if you suspect that the infection is caused by an unknown threat and you want to submit the threat to Symantec for analysis.
  • Page 143: If You Are Using Windows 2000/Xp

    Trojan horse, or worm was infecting the file. If you have an active Internet connection, selecting the virus name opens the Symantec Web page that describes the virus. If Auto-Protect finds a virus in a compressed file, such as a .zip file, the alert displays the name and location of the...
  • Page 144: If A Threat Is Found By Worm Blocking

    What to do if a virus is found If a threat is found by Worm Blocking in this compressed file, select the option “Don’t alert me about this file again.” To close the alert Click OK. If the file cannot be repaired, you receive two alerts, one telling you that Auto-Protect was unable to repair the file, and another telling you that access to the file was denied.
  • Page 145: If Inoculation Alerts You About A Change In System Files

    Scan your system. “Perform a full system scan” on page 131. Go to the Symantec Security See the Symantec Security Response Web Response Web page for the page at securityresponse.symantec.com most up-to-date virus definitions and clean-up tools. If Inoculation alerts you about a change in...
  • Page 146: If Norton Antivirus Places Files In Quarantine

    What to do if a virus is found If Norton AntiVirus places files in Quarantine To respond to Inoculation changes In the Alert window, select the action that you want to take. Your options are: Update the saved Use if the alert appears after a copy of my Master legitimate change in system files.
  • Page 147: If Norton Antivirus Cannot Repair A File

    What to do if a virus is found If Norton AntiVirus cannot repair a file Submit Item Sends the selected file to Symantec. Use this option if you suspect that a file is infected even if Norton AntiVirus did not detect it.
  • Page 148: Look Up Viruses On The Symantec Web Site

    Help. Look up viruses on the Symantec Web site The Symantec Web site contains a complete list of all known viruses and related malicious code, along with descriptions. You must be connected to the Internet to look up viruses.
  • Page 149: Creating Accounts For Multiple Users

    Creating accounts for multiple users If you have chosen to install the Accounts feature of Norton Internet Security, you can create customized security settings for individual members of your family. Norton Internet Security uses accounts to control access to the Internet. An account stores the type of Internet access that is allowed for the users assigned to the account.
  • Page 150: Norton Internet Security Accounts And Windows Accounts

    Creating accounts for multiple users Create Norton Internet Security accounts There is also a default account, Not Logged In, that blocks all Internet access. When a user logs off, the settings for Not Logged In become active and stay active until another user logs on.
  • Page 151 Creating accounts for multiple users Create Norton Internet Security accounts 3 In the Choose account manager screen, click Create Norton Internet Security accounts. 4 Click Next. 5 In the Create accounts screen, type one or more account names. 6 On the account level menus, select an appropriate account level for each account.
  • Page 152 Creating accounts for multiple users Create Norton Internet Security accounts 9 Click Next. If you have created more than one account, repeat the previous two steps with each account. 10 In the Set startup account screen, select the account “Set the startup account”...
  • Page 153 Creating accounts for multiple users Create Norton Internet Security accounts To create Norton Internet Security accounts with the User Accounts screen 1 In the main window, click User Accounts. 2 In the User Accounts screen, click Create Account. 3 In the Create Account dialog box, in the Account Name text box, type a name for this account.
  • Page 154: Set The Startup Account

    Creating accounts for multiple users Create Norton Internet Security accounts 6 Click OK. Set the startup account Every time that you start your computer, Norton Internet Security automatically logs on to the account that is designated as the startup account. To ensure that users do not make unwanted changes to Norton Internet Security settings, you should create a Restricted account and set it as the default startup account.
  • Page 155: Assign Norton Internet Security Account Types To Windows Accounts

    Creating accounts for multiple users Assign Norton Internet Security account types to Windows accounts To set or change passwords for other users 1 In the main window, click User Accounts. 2 In the User Accounts screen, select the account that you want to change.
  • Page 156: Log On To Norton Internet Security

    Creating accounts for multiple users Log on to Norton Internet Security 4 Click Next. In the Choose account level screen, all of your currently defined Windows accounts are listed. 5 For each account, select an account type. 6 Click Next. 7 Click Finish to close the Parental Control Wizard.
  • Page 157: Customize Norton Internet Security Accounts

    Creating accounts for multiple users Customize Norton Internet Security accounts To log on to another account 1 In the Windows system tray, right-click the Norton Internet Security icon, then click Log Off. 2 Click Yes to confirm that you want to log off. 3 In the Windows system tray, right-click the Norton Internet Security icon, then click Account Login.
  • Page 158 Creating accounts for multiple users Customize Norton Internet Security accounts...
  • Page 159: Controlling Individuals' Internet Use

    Controlling individuals’ Internet Parental Control lets parents manage their children’s Internet access by controlling the following: Web sites Block access to sexually explicit, violent, or otherwise inappropriate Web pages. Programs Block categories of Internet programs that are not safe for children to use unsupervised. Newsgroups Restrict access to discussion groups related to extreme, illegal, or inappropriate topics.
  • Page 160: Enable Or Disable Parental Control

    Controlling individuals’ Internet use Enable or disable Parental Control Enable or disable Parental Control Supervisor and Adult users can enable or disable Parental Control. Adult users can change Parental Control settings for their accounts. Supervisor users can also make changes to any user’s Parental Control settings.
  • Page 161: Customize Parental Control

    Controlling individuals’ Internet use Customize Parental Control Customize Parental Control You can add or remove categories to or from the list of blocked Web sites, newsgroups, and Internet programs. You can also exclude specific sites and newsgroups from blocking and create a list of permitted Web sites and newsgroups.
  • Page 162 Controlling individuals’ Internet use Customize Parental Control 3 Click Sites. 4 In the Sites window, click Specify blocked sites. 5 Under Web site categories to block, check the categories that you want to block for this account. 6 Click OK. 7 When you are done specifying sites, click OK.
  • Page 163 Controlling individuals’ Internet use Customize Parental Control To block or unblock specific sites 1 In the main window, double-click Parental Control. 2 In the Parental Control window, in the Parental Control settings for drop-down list, select the account that you want to change. 3 Click Sites.
  • Page 164 Controlling individuals’ Internet use Customize Parental Control Create a list of permitted Web sites You can strictly control Web access by creating a list of Web sites that people using this computer are allowed to access. Any sites that are not on the list of permitted Web sites are blocked.
  • Page 165: Restrict Programs That Access The Internet

    Programs access the Internet for many reasons. Your Web browser accesses the Internet to display Web pages. LiveUpdate accesses the Internet to retrieve program and protection updates for Symantec products. Microsoft NetMeeting accesses the Internet to let users conduct meetings over the Internet.
  • Page 166: Restrict Newsgroup Access

    Controlling individuals’ Internet use Customize Parental Control To block and permit categories of Internet programs 1 In the main window, double-click Parental Control. 2 In the Parental Control window, on the Settings For menu, select the account that you want to change. 3 Click Programs.
  • Page 167 Controlling individuals’ Internet use Customize Parental Control By default, Child users cannot use newsreader programs. “To block and permit categories To allow Child users to view newsgroups, you must of Internet unblock the newsreaders program category. programs” page 166. Enter text strings to block or permit Parental Control includes a list of text strings that block newsgroups that many people would find objectionable.
  • Page 168 Controlling individuals’ Internet use Customize Parental Control To create exceptions to blocked newsgroups 1 In the main window, double-click Parental Control. 2 In the Parental Control window, on the Settings For menu, select the account that you want to change. 3 Click Newsgroups.
  • Page 169: Protecting Your Privacy

    Protecting your privacy Every time that you browse the Internet, computers and Web sites collect information about you. Some of this information comes from forms that you fill out and choices that you make. Other information comes from your browser, which automatically provides information about the Web page you last visited and the type of computer that you’re using.
  • Page 170: Add Private Information

    Protecting your privacy Identify private information to protect Add private information You must add information that you want to protect to the Private Information list. All users on a single computer share a single Private Information list. To add private information 1 In the main window, double-click Privacy Control, then click Private Information.
  • Page 171: Customize Privacy Control

    Protecting your privacy Customize Privacy Control 5 Click OK. Customize Privacy Control Privacy Control protects four areas: Private Blocks specific text that you do not want sent over the Information Internet Cookie Blocking Stops Web sites from retrieving personal information stored in cookie files Browser Privacy Protects information about your browsing habits...
  • Page 172: Adjust Individual Privacy Control Settings

    Protecting your privacy Customize Privacy Control To set the Privacy Level 1 In the main window, double-click Privacy Control. 2 In the Privacy Control window, in the Privacy Control settings for drop-down list, select the account that you want to change. 3 Move the slider to the Privacy Level that you want.
  • Page 173 Protecting your privacy Customize Privacy Control site, and deliver optimized pages for your computer. However, sites can also use cookies to track your Internet usage and browsing habits. Change the Cookie Blocking setting to control how Privacy Control handles sites that attempt to place cookies on your computer.
  • Page 174 Protecting your privacy Customize Privacy Control Disable or enable secure Web connections When you visit a secure Web site, your browser sets up an encrypted connection with the Web site. By default, all accounts can use secure connections. If you want to ensure that users are not sending private information to secure Web sites, you can disable secure Web connections.
  • Page 175: Blocking Unwanted Email Messages

    Blocking unwanted email messages Norton AntiSpam uses a pattern-matching engine that automatically compares the contents of incoming email messages to a list of spam characteristics. If the message contains many spam characteristics, it is more likely to be spam than a message that contains few spam characteristics.
  • Page 176 Blocking unwanted email messages Customize Norton AntiSpam Everyone using this computer shares a single customized Norton AntiSpam list. Supervisor and Adult users can make changes to this list. Child and Teenager users cannot make any changes to Norton AntiSpam settings. To add a new Norton AntiSpam entry 1 In the main window, double-click AntiSpam.
  • Page 177: Change The Priority Of A Spam Rule

    Blocking unwanted email messages Customize Norton AntiSpam 4 In the Spam Rules window, select the Norton AntiSpam entry with which you want to work. 5 Do one of the following: Click Edit to change the entry, and follow the same steps as adding an entry. Click Delete to delete the entry.
  • Page 178 Blocking unwanted email messages Customize Norton AntiSpam...
  • Page 179: Blocking Internet Advertisements

    Blocking Internet advertisements When Ad Blocking is enabled, it transparently removes: Ad banners Pop-up and pop-under ads Macromedia Flash-based ads Use the Ad Trashcan As you use the Internet, you may find ads that are not included on the default Ad Blocking list. You can use the Ad Trashcan to add these to your personal list of blocked ads.
  • Page 180: Use Text Strings To Identify Ads To Block Or Permit

    Blocking Internet advertisements Use text strings to identify ads to block or permit If you are using Microsoft Internet Explorer, drag the unwanted ad from the Web site to the Ad Blocking dialog box. If you are using Netscape, right-click the advertisement, then click Copy Image Location.
  • Page 181: Add An Ad Blocking String

    Blocking Internet advertisements Use text strings to identify ads to block or permit For example, if you add the string uninvitedads.com to the (Defaults) block list, you block everything in the uninvitedads.com domain. If you are more specific and add the string nifty_images/image7.gif to the site- specific block list maintained for www.uninvitedads.com, you block only that particular image.
  • Page 182 Blocking Internet advertisements Use text strings to identify ads to block or permit 3 In the left side of the Advanced window, do one of the following: To modify or remove a string in the (Defaults) list, click (Defaults). To modify or remove a site-specific string, click the site’s name.
  • Page 183: Monitoring Norton Internet Security

    Monitoring Norton Internet Security Norton Internet Security maintains records of all incoming and outgoing Internet connections and any actions that the program takes to protect your computer. You should periodically review this information to spot potential problems. There are several sources of information: Status &...
  • Page 184: Reset Information In The Statistics Window

    Monitoring Norton Internet Security Review detailed statistics The Statistics window includes information on the following: Personal Firewall Any recent attacks on this computer, including the time of the most recent attack and the address of the attacking computer Online Content The number of cookies, images, and other online Blocking content that has been blocked and the number of times...
  • Page 185: View Norton Internet Security Logs

    Monitoring Norton Internet Security View Norton Internet Security logs The detailed statistics include the following information: Network TCP and UDP bytes sent and received, the number of open network connections, and the highest number of simultaneous open network connections since the program started Online content The number of graphics, cookies, spam, and private...
  • Page 186: Review Log Information

    Monitoring Norton Internet Security View Norton Internet Security logs Review log information View the Norton Internet Security logs from the Statistics window. To view the logs 1 In the main window, click Statistics > View Logs. 2 In the Log Viewer, in the left pane, select the log that you want to review.
  • Page 187 Monitoring Norton Internet Security View Norton Internet Security logs System Severe system errors, the current status of IP filtering, if the logged program started as a Windows service, and information about programs that are using too many resources or otherwise operating under less than optimum conditions Web History URLs visited by the computer,...
  • Page 188: Monitor Norton Antivirus Activities

    Monitoring Norton Internet Security Monitor Norton AntiVirus activities Monitor Norton AntiVirus activities Occasionally, you may need to look at previous Norton AntiVirus activities, such as when the last system scan was done or how many viruses were detected last week. Norton AntiVirus displays a record of its threat detection, application, and error activities in the Log Viewer.
  • Page 189 Monitoring Norton Internet Security About the Log Viewer 3 In the left pane, select the log that you want to review. Your options are: Threat alerts A history of threat alerts, such as the ID and type of threat, date and time when it occurred, the action taken, and the version of the virus definitions used.
  • Page 190 Monitoring Norton Internet Security About the Log Viewer...
  • Page 191: Chapter 17 Troubleshooting

    Symantec Web site. Explore the Symantec service and support Web site On the Symantec service and support Web site, you can find the latest protection and program updates, patches, online tutorials, Knowledge Base articles, and virus removal tools.
  • Page 192 Explore the Symantec service and support Web site To search the Symantec service and support Web site 1 On the left side of any Symantec Web site page, click search. 2 On the search page, type a word or phrase that best represents the information for which you are looking.
  • Page 193: Troubleshoot Norton Internet Security

    Troubleshooting Troubleshoot Norton Internet Security Troubleshoot Norton Internet Security Check here for possible solutions to issues that might arise with Norton Internet Security. What is wrong with this Web site? If you cannot connect to a Web site with Norton Internet Security disabled, there might be a problem with the Internet or your Internet service...
  • Page 194: Why Can't I Post Information Online

    Troubleshooting Troubleshoot Norton Internet Security Why can’t I post information online? If you are unable to post information to a Web site, it may “Modify or remove private be because Privacy Control is blocking the information. information” Check the Private Information list to see if the page 170.
  • Page 195: How Can A Web Site Get My Browser Information

    Troubleshooting Troubleshoot Norton Internet Security How can a Web site get my browser information? The Browser Privacy settings prevent your browser from sending browser information. However, some diagnostic sites on the Internet might report browser information even though the Browser Privacy settings are blocking it.
  • Page 196: Troubleshoot Norton Antispam

    Troubleshooting Troubleshoot Norton AntiSpam Troubleshoot Norton AntiSpam This information will help you solve the most frequently encountered problems with Norton AntiSpam. Why do I still receive spam? Several factors make it difficult to completely eliminate spam. For example, different people will consider different classes of email messages to be unwelcome or intrusive.
  • Page 197: How Do I Keep My Protection Updated

    To some degree, Norton AntiSpam updates itself by learning from your outgoing email messages and other data. However, to receive up-to-date copies of Symantec spam definitions, you must subscribe to this service. You can then choose to have these definitions updated automatically.
  • Page 198: Troubleshoot Ad Blocking

    Troubleshooting Troubleshoot Ad Blocking Troubleshoot Ad Blocking This information will help you solve the most frequently encountered problems with Ad Blocking. Does Ad Blocking block all advertising on the current page? Ads that are integrated with standard content—for instance text statements—will not be blocked. Will Popup Window Blocking block all pop-ups or only pop-up ads? Ad Blocking blocks all pop-ups that are started...
  • Page 199: Troubleshoot Norton Antivirus

    Troubleshooting Troubleshoot Norton AntiVirus Troubleshoot Norton AntiVirus Check here for possible solutions to issues that might arise with Norton AntiVirus. Auto-Protect does not load when I start my computer If the Norton AntiVirus Auto-Protect icon does not appear in the lower-right corner of the Windows taskbar, Auto- Protect is not loaded.
  • Page 200: I Have Scanned And Removed A Virus, But It Keeps Infecting My Files

    Troubleshooting Troubleshoot Norton AntiVirus To show the Auto-Protect icon in the tray 1 At the top of the main window, click Options. If a menu appears, click Norton AntiVirus. 2 In the Options window, under System, click Auto- Protect. 3 Ensure that Show the Auto-Protect icon in the tray is checked.
  • Page 201: Norton Antivirus Cannot Repair My Infected Files

    If after using LiveUpdate the virus still cannot be repaired, the file may be corrupted, or contain a new virus. There are two additional options: Quarantine the file and submit it to Symantec. “If Norton AntiVirus places If you don’t need the file or a non-infected copy of the...
  • Page 202: I Can't Send Email Messages

    Troubleshooting Troubleshoot Norton AntiVirus If you continue to experience problems downloading email messages, disable email protection. To disable email protection 1 At the top of the main window, click Options. If a menu appears, click Norton AntiVirus. 2 In the Options window, under Internet, click Email. 3 Uncheck Scan incoming Email.
  • Page 203: Troubleshoot Rescue Disks

    Troubleshooting Troubleshoot Rescue Disks Troubleshoot Rescue Disks Check here for possible solutions to issues that might arise with Rescue Disks. My Rescue Disk does not work Due to the number of product-specific technologies used “Create and use Rescue Disks” by manufacturers to configure and initialize hard drives, on page 71.
  • Page 204: I Cannot Start From Drive A

    Troubleshooting Troubleshoot Rescue Disks I cannot start from drive A If your computer does not check drive A first on startup, “Create and use Rescue Disks” use your computer’s Setup program to change settings. on page 71. Be careful when making changes using your computer’s Setup program.
  • Page 205 Troubleshooting Troubleshoot Rescue Disks To repair the Rescue Boot Disk without having to reformat the disk and create a new Rescue Disk set 1 Remove the Rescue Boot Disk and restart your computer. 2 Insert the Rescue Boot Disk into the floppy disk drive. 3 On the Windows taskbar, click Start >...
  • Page 206 Troubleshooting Troubleshoot Rescue Disks...
  • Page 207: Service And Support Solutions

    Customer service The Service & Support Web site at http://service.symantec.com tells you how to: Subscribe to Symantec newsletters. Locate resellers and consultants in your area. Replace defective CD-ROMs and manuals.
  • Page 208: Technical Support

    Symantec products: Online Service and Support Connect to the Symantec Service & Support Web site at http://service.symantec.com, select your user type, and then select your product and version. You can access hot topics, Knowledge Base articles, tutorials, contact options, and more.
  • Page 209: Worldwide Service And Support

    Worldwide service and support Technical support and customer service solutions vary by country. For Symantec and International Partner locations outside of the United States, contact one of the service and support offices listed below, or connect to http://service.symantec.com and select your region...
  • Page 210 Level 2, 1 Julius Avenue +61 (2) 8879-1000 North Ryde, NSW 2113 Fax: +61 (2) 8879-1001 Sydney Australia Europe, Middle East, and Africa Symantec Authorized Service Center http://www.symantec.com/region/reg_eu/ Postbus 1029 +353 (1) 811 8032 3600 BA Maarssen The Netherlands Latin America...
  • Page 211: Glossary

    Glossary access privileges The types of operations that a user can perform on a system resource. For example, a user can have the ability to access a certain directory and open, modify, or delete its contents. ActiveSync The synchronization software for Microsoft Windows- based Pocket PCs.
  • Page 212 Glossary boot record A sector at the start of a disk that describes the disk (sector size, cluster size, and so on). On startup disks, the boot record also has a program that loads the operating system. bootable disk A disk that can be used to start a computer. cache A location on your disk in which data is stored for reuse.
  • Page 213 DNS server that translates the domain name into an IP address (206.204.212.71). domain The common Internet address for a single company or organization (such as symantec.com). See also host name. DOS window A method of accessing the MS-DOS operating system to execute DOS programs through the Windows graphical environment.
  • Page 214 DOS or Windows directory list. host name The name by which most users refer to a Web site. For example, www.symantec.com is the host name for the Symantec Web site. Host names are translated to IP addresses by the DNS.
  • Page 215 Glossary 215 HotSync The synchronization software for Palm OS handheld devices. HTML (Hypertext The language used to create Web pages. Markup Language) ICMP (Internet An extension to the basic Internet Protocol (IP) that Control Message provides feedback about network problems. Protocol) IGMP (Internet An extension to the basic Internet Protocol (IP) that is...
  • Page 216 Glossary JavaScript A scripting language used to enhance Web pages. Most sites use JavaScript to add simple interactivity to pages, but some use it to open pop-up ads and reset visitors' homepages. macro A simple software program that can be started by a specific keystroke or a series of keystrokes.
  • Page 217 Glossary 217 port number A number used to identify a particular Internet service. Internet packets include the port number to help recipient computers decide which program should handle the data. PPP (Point-to-Point A protocol for communication between two Protocol) computers using a dial-up connection. PPP provides error-checking features.
  • Page 218 Glossary SSL (Secure Sockets A protocol for secure online communication. Layer) Messages sent using SSL are encrypted to prevent unauthorized viewing. SSL is often used to protect financial information. subnet A local area network that is part of a larger intranet or the Internet.
  • Page 219 Glossary 219 wildcard characters Special characters (like *, $, and ?) that act as placeholders for one or more characters. Wildcards let you match several items with a single specification. worm A program that replicates without infecting other programs. Some worms spread by copying themselves from disk to disk, while others replicate only in memory to slow a computer down.
  • Page 220 Glossary...
  • Page 221: Index

    Index Ad Blocking 180 (continued) modifying text strings 182 access Ad Trashcan 179 Block Traffic 59 adding files to Quarantine 146 options 85 addresses Security Check 58 adding allowed 62 Visual Tracking 58, 59 adding blocked 63 accounts importing allowed 62 creating 150, 154 Adobe Acrobat Reader creating with Parental Control...
  • Page 222 Index attacks 59, 122 booting (continued) about 117 changing boot sequence 204 alerts 118 floppy disk drive fails 204 blocking 118 Rescue Disks fail 203 excluding 119 browser network 105 information 195 tracing 58, 59 privacy 173 from AutoBlock 59 from Statistics 59 AutoBlock 120, 122 CD-ROM drive, starting from 17...
  • Page 223 Index 223 creating (continued) displaying the Norton AntiVirus firewall rules 109 toolbar 54 Rescue Disks 71 drive A credit card numbers 170 boot sequence 204 custom installation 41 using for Emergency Disks 18 custom scans using for Rescue Disks 72, 76 creating 132 deleting 134 deleting schedule 137...
  • Page 224 131 contents 185 resetting 184 Knowledge Base articles 191 options 90 glossary 78 Symantec service and support Web site 191 Symantec Web sites 80 Help Internet-enabled programs 111 online 78 Intrusion Detection window and dialog box 79...
  • Page 225 Index 225 Network Detector 123, 128 (continued) Java applets 193 locations 124 (continued) Network Detector alert 126 removing networks from 127 LiveUpdate networks Interactive and Express modes 98 configuring with Home options 85, 90 Networking Wizard 108 procedure 97 internal LiveUpdate server 100 locations 127 troubleshooting 194 about 124...
  • Page 226 Index Norton Internet Security (continued) options 83 (continued) Log Viewer 183 Other 90 logging on 156 password protection in Norton monitoring 183 AntiVirus 30 statistics 183 protecting with password 86 Visual Tracking 58, 59 resetting defaults 92 resetting password 86 Threat Categories 91 Worm Blocking 90 Office Plug-in...
  • Page 227 Rescue Disks manually configuring Internet creating 71 access 113 creating folder on hard disk 72 protection disabling Auto-Protect 72 downloading from Symantec Web failure to start from 203 site 98 not current 76 maintaining 20 supported platforms 71 maximum 129...
  • Page 228 Index Rescue Disks (continued) scans (continued) testing 73 using custom 132 troubleshooting 203 scheduling updating 74 custom scans 135 using 76 multiple schedules for a scan 135 restarting virus scans 134 after installation 41 secure Web connections, disabling and Block Traffic 60 and enabling 174 Windows in safe mode 199 security...
  • Page 229 Traffic 60 Cookie Blocking 193 submitting firewall rules 193 files to Symantec 147 networks 194 Web sites to Symantec 165 Norton AntiSpam 196 subnet masks 116 Norton AntiVirus 199 subscription to product updates 103 printing 194 summary of product features 23...
  • Page 230 29 Repair 140 found by Auto-Protect 142 Worm Blocking found during a scan 140 monitoring by 129 looking up on the Symantec Web Norton AntiVirus 30 site 148 options 90 submitting to Symantec 147 threats found by 144 unknown 30...

Table of Contents