help
TRANSCRIPT
5.0Product Manual
We protect more people from more online threats than anyone in theworld.
Care for our Environment, ‘It's the right thing to do’.Symantec has removed the cover from this manual to reduce the Environmental Footprint of ourproducts.
Norton 360™ Product Manual
The software described in this book is furnished under a licenseagreement and may be used only in accordance with the terms ofthe agreement.
Documentation version 5.0
Copyright © 2010 Symantec Corporation. All rights reserved.
The product described in this document is distributed under licensesrestricting its use, copying, distribution, and decompilation/reverseengineering. No part of this document may be reproduced in anyform by any means without prior written authorization of SymantecCorporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESSOR IMPLIED CONDITIONS, REPRESENTATIONS ANDWARRANTIES, INCLUDING ANY IMPLIED WARRANTY OFMERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE ORNON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENTTHAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.SYMANTEC CORPORATION SHALL NOT BE LIABLE FORINCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTIONWITH THE FURNISHING, PERFORMANCE, OR USE OF THISDOCUMENTATION. THE INFORMATION CONTAINED IN THISDOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
Symantec Corporation350 Ellis Street,Mountain View, CA 94043
http://www.symantec.com
Chapter 1 Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7About Norton 360 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7Activation protects you . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19About your Norton Account . . . . . . . . . . . . . . . . . . . . . . . . 23About Norton Community Watch . . . . . . . . . . . . . . . . . 31About Norton Bootable Recovery
Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33About updating Norton 360 . . . . . . . . . . . . . . . . . . . . . . . 37About Network Proxy settings . . . . . . . . . . . . . . . . . . . . . 47About Norton 360 status . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Chapter 2 Monitoring your system'sperformance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
About System Insight . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Chapter 3 Maintaining total protection . . . . . . . . . . . . . . . . . . . 91About total protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91About keeping your computer secure . . . . . . . . . . . . 92About solving connection problems . . . . . . . . . . . . . . 94About responding to emergencies . . . . . . . . . . . . . . . . 94About monitoring protection
features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96About viewing details of system
vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Chapter 4 Scanning your computer . . . . . . . . . . . . . . . . . . . . . . . 133About the Norton 360 scan . . . . . . . . . . . . . . . . . . . . . . . 133About Computer Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Contents
About Insight Network scan . . . . . . . . . . . . . . . . . . . . . . 142About Reputation Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145About Scan Facebook Wall . . . . . . . . . . . . . . . . . . . . . . . . 155About SONAR Protection . . . . . . . . . . . . . . . . . . . . . . . . . . 158About scanning Office documents . . . . . . . . . . . . . . . 159About Silent Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161Running a scan at the command
prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Chapter 5 Responding to security issues . . . . . . . . . . . . . . . . 177What to do if a security risk is found . . . . . . . . . . . 177
Chapter 6 Understanding alerts andmessages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
About Norton 360 alerts andmessages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
About managing messages andalerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
Types of risks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189Types of threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190Types of viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Chapter 7 Doing routine tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193Turning on or turning off automatic
tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193About scheduling automatic tasks . . . . . . . . . . . . . . 194About scheduling backups . . . . . . . . . . . . . . . . . . . . . . . . 196Specifying Idle Time Out duration . . . . . . . . . . . . . . 197Choosing scans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Chapter 8 Keeping secure on the Internet . . . . . . . . . . . . . . 201About the Smart Firewall . . . . . . . . . . . . . . . . . . . . . . . . . 201About Intrusion Prevention . . . . . . . . . . . . . . . . . . . . . . 225About Download Insight . . . . . . . . . . . . . . . . . . . . . . . . . . . 233About Norton AntiSpam .. . . . . . . . . . . . . . . . . . . . . . . . . . 242
Contents4
Chapter 9 Securing your sensitive data . . . . . . . . . . . . . . . . . . 257About securing your sensitive data . . . . . . . . . . . . . 257
Chapter 10 Protecting your home network . . . . . . . . . . . . . . . 337About the Network Security Map .. . . . . . . . . . . . . . . 337
Chapter 11 Keeping your PC tuned up . . . . . . . . . . . . . . . . . . . . . 363About PC Tuneup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363About disk and file fragmentation . . . . . . . . . . . . . . 364Optimizing your permanent disks
manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364About using optimization efficiently . . . . . . . . . . . 365About cleaning up disk clutter . . . . . . . . . . . . . . . . . . . 366Running a scan to clean up disk
clutter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367Running Registry Cleanup . . . . . . . . . . . . . . . . . . . . . . . . 368Running Diagnostic Report . . . . . . . . . . . . . . . . . . . . . . . 368About Startup Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
Chapter 12 Protecting your media and data . . . . . . . . . . . . . 373About Norton Backup and Restore . . . . . . . . . . . . . . 373About backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374About Backup preparation . . . . . . . . . . . . . . . . . . . . . . . . 375About backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378Backing up your files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404Restoring files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404About Norton Backup Drive . . . . . . . . . . . . . . . . . . . . . . 413About solutions to the backup
problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416About online backup considerations . . . . . . . . . . . . 420Turning off or turning on backup . . . . . . . . . . . . . . . 425Turning off or turning on backup setting
options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
Chapter 13 Customizing settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431About Norton 360 Settings . . . . . . . . . . . . . . . . . . . . . . . . 431Customizing Norton 360 Settings . . . . . . . . . . . . . . . 436Turning on or turning off Quick Controls
services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
5Contents
About Antivirus settings . . . . . . . . . . . . . . . . . . . . . . . . . . 438About Firewall settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463About Norton AntiSpam settings . . . . . . . . . . . . . . . . 471About My Network Settings . . . . . . . . . . . . . . . . . . . . . . 475About backup settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477About Identity Protection settings . . . . . . . . . . . . . . 480About Task Scheduling settings . . . . . . . . . . . . . . . . . 484About Administrative Settings . . . . . . . . . . . . . . . . . . . 488
Chapter 14 Finding additional solutions . . . . . . . . . . . . . . . . . . 509Finding the version number of your
product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509Finding the End-User License
Agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510About upgrading your product . . . . . . . . . . . . . . . . . . . 510About simple solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513Staying informed about protection
issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515Service and support solutions . . . . . . . . . . . . . . . . . . . . 516Uninstalling Norton 360 . . . . . . . . . . . . . . . . . . . . . . . . . . 522
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525
Contents6
This chapter includes the following topics:
1 About Norton 360
1 Activation protects you
1 About your Norton Account
1 About Norton Community Watch
1 About Norton Bootable Recovery Tool
1 About updating Norton 360
1 About Network Proxy settings
1 About Norton 360 status
About Norton 360Norton 360 offers proven performance and deliverstoday’s fast and light all-in-one solution to protect yourPC and all your online activities. It protects againstviruses, worms, hackers, and botnet. With a singlesubscription, up to three PCs are protected. Itsafeguards against online identity theft, protectsimportant files, and keeps your PC tuned and runningat peak performance.
Norton 360 is completely automated and easy to use.It works quietly in the background to maintain youroverall system integrity with minimal effect on PC
1Getting Started
performance. By offering an unmatched combinationof performance and protection, Norton 360 helps youget the most out of your PC and your online experience.
Norton 360 provides complete protection, whichincludes the following features:
Protects you from virus,spyware, and unknown threats
PC Security
Guards against online identitytheft with antiphishing,password management, andNorton Safe Web features
Identity Protection
Safeguards important files witha secure online backup, localbackup, and restore services
Backup
Keeps your computer tuned-upfor peak performance and letsyou monitor the performance ofyour computer
PC Tuneup
Automatic LiveUpdate provides you latest definitionand program updates to safeguard your computer. Youcan also use Silent Mode to suppress alerts andnotifications when you perform important tasks onyour computer. Norton 360 also provides youeasy-to-use support options.
In addition, Norton 360 blocks spyware from trackingyour online activities or from hijacking your computer.You can also use Silent Mode to suppress alerts andnotifications when you perform important tasks onyour computer.
About Norton 360 main windowThe Norton 360 main window acts as a securitymanagement interface. You can access the main
Getting StartedAbout Norton 360
8
features and monitor the performance of yourcomputer from the main window.
As you use your computer, Norton 360 monitors howwell your computer and activities are protected fromthreats, risks, and damage. Norton 360 displays theprotection status of your computer in the main window.
Depending on the security status of your computer, atthe top left of the Norton 360 main window, Norton360 shows your System Status as Secure, Attention,or At Risk. If your system status is marked asAttention or At Risk, at the bottom of the mainwindow, click FixNow to resolve all the security threatson your computer.
The options that are available in the main windowsummarize the most essential security and theproductivity issues that challenge users. They are:
Includes all virus, spyware,firewall, and other securityfeatures.
PC Security
Includes the protectionagainst phishing andfraudulent Web sites.
Identity Protection
Includes the automatic andthe customizable backupsand restore capability.
Backup
Includes the performancetuning features, includingcleaning up unnecessary filesand removing file fragmentson your disk.
PC Tuneup
Depending on the security status of the differentcomponents of your computer, the status areas of the
9Getting StartedAbout Norton 360
four protection categories are marked as Protected,Attention, or At Risk.
When the System Status or protection categoriesstatuses are marked as At Risk or Attention, at thebottom of the main window, click Fix Now to resolveall the security threats on your computer.
Norton 360 also provides you easy links at the top ofthe main window to the most frequent tasks. They are:
Lets you access the Taskswindow to run general tasks,backup tasks, and PC Tuneuptasks.
Tasks
Lets you access the Settingswindow to configure settingssuch as Firewall, Antispam,and Backup.
Settings
Lets you open thePerformance window inNorton 360.
The Performance windowchronicles all installs,downloads, optimizations,detections, alerts, andinstances of Quick Scan thatoccurred on your computersince installing Norton 360.The window also displays adetailed graphicalrepresentation of the CPUand memory usage by yourNorton product.
Performance
Lets you give feedback aboutthe Norton product that youuse.
Feedback
Getting StartedAbout Norton 360
10
Lets you access the MyAccount window to manageyour Norton Account.
Account
Lets you access supportoptions, product upgradeoptions, subscription options,and product version number.
You can also access theonline Help from theSupportmenu. Help provides links toinformation that assists youwith the specific tasks thatyou want to complete. Theonline Help guides you toconfigure all of the productfeatures.
Support
The bottom section of the Norton 360 main windowprovides you up-to-date virus and threat information.When your system status is AtRisk or Attention, thissection automatically provides you the FixNow optionto fix all the issues at once.
11Getting StartedAbout Norton 360
The bottom section of the Norton 360 main windowhelps you do the following:
Activity Map
Getting StartedAbout Norton 360
12
Lets you access the worldmap with hotspots ofcybercrimes and the latestthreats.
The Activity Map shows thetop cities in the world wheremost of the cybercrimeactivities occur. These citiesare represented as yellowdots on the map. You canclick a continent in the worldmap to view its cities with thehighest number of threats.The details on the ActivityMap are updated from aSymantec server on a regularbasis. Your computer must beconnected to the Internet toreceive the activity mapupdates.
You can view the date andtime that the Activity Mapwas last updated. You canalso use theMap Details linkto get a brief idea of theActivity Map.
When you click Map Details,the Activity Map shows aseries of latest viruses andthreats that your productprotects your computer from.You can use the info link nextto each item to view itsdetails in an overlay window.You can also use the ViewDetails link in the overlaywindow to know more aboutthe threat in a Symantec Webpage.
13Getting StartedAbout Norton 360
Online Family
Getting StartedAbout Norton 360
14
Lets you monitor your child’sactivities on the Internet.
w Norton Online Familymay not be available withsome versions of Norton 360.In such case, you may not beable to access Norton OnlineFamily options.
When you clickOnline Familyicon on the main window, thebottom section of the Norton360 main window displaysNorton Online Family sign inoptions. Norton Online Familyprovides you advancedcontrols to monitor yourchild's online activities.
You can use the link on thebottom section of the Norton360 main window to set upyour account with NortonOnline Family.
Symantec recommends thatyou use your Norton Accountlogin credentials to sign in toNorton Online Family. If youregister your product withyour Norton Account, yourNorton Account emailaddress is auto-filled in theemail address text box.
After you set up youraccount, you can sign in toyour account on the bottomsection of the Norton 360main window and view yourchild’s Internet activities. Thebottom section of the Norton360 main window showsdetails such as your child’s
15Getting StartedAbout Norton 360
latest search terms, and thelatest alerts. After you signin, you can use the GetDetails option in the bottomsection of the Norton 360main window to view moredetails on the Norton OnlineFamily Web site.
Getting StartedAbout Norton 360
16
Safe Web
17Getting StartedAbout Norton 360
Lets you check the safety ofa Web site.
You can also perform a safesearch.
w This option may not beavailable with some versionsof Norton 360. In such case,you may not be able to accessthis option.
When you clickSafeWeb iconon the main window, thebottom section of the Norton360 main window displaysNorton Safe Web options.
You can use the Check Siteoption in the bottom sectionof the Norton 360 mainwindow to analyze thesecurity levels of any Website that you want to visit.When you type a Web siteaddress in the text box andclick Check Site, it shows theSymantec’s ratings for theWeb site.
You can use the Safe Searchoption in the bottom sectionof the Norton 360 mainwindow to search forinformation on the Internet.The Norton Safe Search usesAsk.com to generate thesearch results. Norton SafeSearch provides a site safetystatus and a Norton rating foreach of the search resultsgenerated.
You can also use the Viewrecent Norton Safe Web
Getting StartedAbout Norton 360
18
activity option in the bottomsection of the Norton 360main window to view therecent Norton Safe Webstatistics on malicious sitesand URLs. You can also viewthe list of new maliciousURLs.
Your activation status or subscription status appearsat the bottom of the main window. You can use theActivate Now option to activate or subscribe yourNorton product.
Activation protects youProduct activation is a technology that protects usersfrom pirated or counterfeit software. It protects youby limiting the use of a product to those users who haveacquired the product legitimately. Product activationrequires a Product Key for each installation of aproduct. You must activate the product within a limitedtime period after you install it.
If you are connected to the Internet, product activationtakes place automatically when you start the productfor the first time after installation. After activation,the Norton Account window appears. You can createyour Norton Account and register your product.
If you are not connected to the Internet, you can clickTry Later in the Activation not complete window tostart your product. The Activation window reappearsevery time you start your product until you activateyour product. If you choose not to activate at that time,you receive an alert that reminds you to activate theproduct. You can also activate your product by clickingthe Trial Period Status link in the Norton 360 mainwindow.
19Getting StartedActivation protects you
w If you do not activate the product within the timeperiod that the alert specifies, the product stopsworking. You can activate it after the time period haselapsed, but you are not protected until you activatethe product.
Activating Norton 360To use all of the features in Norton 360, you must firstactivate your product. Product activation reducessoftware piracy and ensures that you have authenticSymantec software. You can renew your subscriptionafter the end of your subscription period.
If you are connected to the Internet, product activationtakes place automatically when you start the productfor the first time after installation. During activation,the Norton Account window appears. You can createyour Norton Account and register your product. Youcan also view details, such as your Product Key andrecent updates to the product. If you skip the NortonAccount window, the product is activated, but theProduct Key is not saved in the Norton Account. Youcan print the Product Key for the future, if you needto reinstall your product.
If you did not activate your product during installation,Norton 360 prompts for activation each time you startthe product. Also, you receive an activation alertregularly until you activate the product.
w You must activate your product within the time periodthat the alert specifies, or your product stops working.
You can activate your product directly from theactivation alert. You can also activate your productfrom the Trial Period Status link in the main windowor from the My Account window. In some cases, youmight need to enter your Product Key to activate yourproduct. You can activate or renew the subscription ofyour product from any non-admin user account as well.Activation should take only a few minutes.
Getting StartedActivation protects you
20
To activate Norton 360, your computer must beconnected to the Internet. If you use a proxy server toconnect to the Internet, you must configure the proxysettings. You can configure Network Proxy Settingsin the Administration Settings window.
To activate Norton 360 from the alert
1 In the alert, click Activate Now or Renew Now.
2 Click OK.
3 Follow the on-screen instructions.
4 In the window that appears, click Done.
To activate your Norton 360 from the My Accountwindow
1 In the Norton 360 main window, click Account.
2 In the My Account window, click Activate Norton360 or Renew Subscription.The Renew Subscription option is available if youhave already activated your product.
3 Follow the on-screen instructions.
4 In the window that appears, click Done.
To activate your product from the main window
1 In the Norton 360 main window, do one of thefollowing:
1 If you purchased a subscription version of aretail product, click Activate Now.
1 If the product came installed on your computer,click Activate Online Now.
1 If you want to renew the subscription of yourproduct, click Renew.
2 Follow the on-screen instructions to activate orsubscribe your product.
Where to find your Product KeyThe product key is a unique key that helps you to installand activate the Symantec product on your computer.The Product Key is a 25-character alphanumeric stringthat is shown in five groups of five characters each,
21Getting StartedActivation protects you
separated by hyphens. The location of the Product Keyvaries depending on how you acquired the product.
The locations of the Product Key are as follows:
The Product Key is either ona sticker on the CD sleeve oron an insert in the productpackage.
If you purchased a retail copyof the product on CD
The Product Key is on theDVD package.
If you purchased the producton DVD
The Product Key is stored onyour computer as part of thedownload process and isincluded in the confirmationemail from the SymantecStore.
If you downloaded theproduct from the SymantecStore
The Product Key is providedas part of the activationprocess. Be sure to save yourProduct Key by creating orsigning in to your NortonAccount, or by printing thekey. You may need theProduct Key if you ever wantto reinstall your product.
If your computer came withthe product already installed
The Product Key is printed onthe card along withinstructions on how to use it.Be sure to save your ProductKey by creating or signing into your Norton Account. Youneed the Product Key if youever want to reinstall theproduct.
If you received a Product Keycard
Getting StartedActivation protects you
22
To recover or access yourProduct Key log on tohttps://www.mynortonaccount.com/amsweb.If you are not registered,register for Norton Account.You can find the Product Keyon the Products tab in theNorton Account page.
If you are still unable tolocate your Product Key, youcan recover it using NortonAccount
About problems during activationIf you cannot connect to the Symantec servers toactivate your product, first check your Internetconnection. You then need to see if you have parentalcontrol software, either installed or through your ISP,that might block the connection.
A connectivity problem can occur if you use parentalcontrol software. If you suspect that parental controlsmight block the connection, you can configure theparental controls so that they do not block theactivation procedure. You need to log in to yourparental control software or to the Internet throughyour ISP as an administrator to change yourconfiguration.
If you use a proxy server to connect to the Internet,you must configure the proxy settings. You canconfigure Network Proxy Settings in the MiscellaneousSettings section.
About your Norton AccountWhen you create a Norton Account, you can manageall of your Norton products in one place. You can storeyour Product Keys in your Norton Account and alsobuy additional Product Keys. You can also register yourproduct with the Norton Account. It takes only a fewmoments to create your Norton Account. You must beconnected to the Internet to create a Norton Account.
23Getting StartedAbout your Norton Account
After you create a Norton Account, you can access andmanage your account information and productinformation from anywhere. It helps to reinstall yourproducts and download the latest version of theproducts. If you install your product on more than onePC, you can use the same Norton Account. To accessyour Norton Account, go to the following URL:
https://www.mynortonaccount.com/amsweb
You can create a Norton Account in the following ways:
1 During activation
You can create your Norton Account and registeryour product from the Norton Account windowthat appears when you activate the product. Youmust provide your account information in theNorton Account window that appears.
1 Any time after activation
You can create a Norton Account from the AccessNorton Account link available in the My Accountwindow.
Getting StartedAbout your Norton Account
24
After you log in to your Norton Account, you canmanage your product information with the followingoptions:
Saves the information for all ofthe Norton products that youown.
The Products tab provides youthe information about theNorton products that you ownand the expiration date. You canclick the arrow icon against aproduct for more informationsuch as Product Key and theregistration date. You can alsobuy a new Product Key to protectadditional computers. You canuse the Update option to checkand download the latest productversion using Norton UpdateCenter.
Products
Contains order information ofthe Norton products you boughtfrom Norton online store.
Order History
25Getting StartedAbout your Norton Account
Saves your account informationand your billing details.
The Profile options are:1 Account Information
You can update your NortonAccount information andyour shipping address on theAccount Information tab.After you update, clickUpdate to save the changes.
1 Billing Information
You can save your credit cardinformation and your billingaddress on the BillingInformation tab. It makes iteasier for saving onlineorders. After you update,click Update to save thechanges.
1 Change Password
You can change your currentNorton Account password onthe Change Password tab.
Profile
You can use the icons at the bottom of your NortonAccount Web page to access and use the following:
Norton Online Familymonitors and manages yourchild's Internet activities andcomputer usage.
Norton Online Family
Getting StartedAbout your Norton Account
26
Norton Online Backupprovides a secure andeasy-to-use online backupsolution that safeguards yourimportant data againstsystem crash, accidentaldeleting, virus infection, andother disasters.
Norton Online Backup
Norton Safe Web checks thesafety of a Web site and letsyou perform a safe Websearch.
Norton Safe Web
The Symantec Web siteprovides more informationabout the various products ofSymantec, the latest updateson Internet security, andvarious support options.
Norton.com
Norton Update Center checksand lets you download thelatest version of your Nortonproduct.
Norton Update Center
If you forget your Norton Account password, you canget a temporary password by clicking the Forgot yourpassword link in the Norton Account sign-in Webpage. You need to provide your email address. You needto use the same email address that you provided whenyou created your Norton Account. Symantec sends atemporary password to your email address. You canuse the temporary password for a limited time period.You must reset your password after you log in to yourNorton Account.
27Getting StartedAbout your Norton Account
Creating a Norton AccountYour Norton Account stores the Product Key and thebilling information of your product. You can alsoregister your product with the Norton Account.
In addition, Norton Account helps you to do thefollowing:
1 Access the Product Key and other productinformation when you need it.
1 Reinstall your Norton product.
1 Buy additional Product Keys for your home or office.
1 Check and download the latest version of theproduct by using Norton Update Center.
1 Save online orders and update billing information.
1 Manage your online backup.
Your computer must be connected to the Internet tocreate a Norton Account. If you use a proxy server toconnect to the Internet, you must configure the proxysettings. You can configure Network Proxy Settings inthe Administration Settings window.
You can also create a Norton Account when youactivate your product. When you create your NortonAccount from the product, your product gets registeredin your account. If you have an existing NortonAccount, you can provide the same email address inthe NortonAccount window in your product. This way,you can register your current product and add it to thelist of Norton products in your existing NortonAccount. If you upgrade your registered product to thelatest available version, your product remainsregistered to the same Norton Account. In this case,you can continue using the same Norton Account logincredentials.
w Symantec products that are older than the 2006product year do not appear in your Norton Account.
Getting StartedAbout your Norton Account
28
To create a Norton Account from the Norton AccountWeb page
1 In the Norton 360 main window, click Account.
2 In the My Account window, click Access NortonAccount.
3 In the Norton Account Web page that appears, clickSign up now.
4 In the Norton Account Sign Up Web page, providethe details about your account information, andthen click Sign Up.
To create a Norton Account and register your productafter activation
1 In the Norton 360 main window, click Account.
2 In the My Account window, click Access NortonAccount.
3 In the Activation – Norton Account window, typeyour email address.
4 In the CreateyourNortonAccount window, provideyour account details, and then click Next.Your product information gets saved in your NortonAccount only after you log in to your NortonAccount.
5 Do one of the following:
1 To confirm your Norton Account, click Done.
1 To log in to your Norton Account and access yourproduct information, visithttps://www.mynortonaccount.com/amsweb.
Accessing your Norton AccountThe Product Key for each Norton product isconveniently stored in your Norton Account. After youhave created your Norton Account successfully, youcan access your account from anywhere in the world.You can log in to your Norton Account any time byvisiting the following URL:
https://www.mynortonaccount.com/amsweb
29Getting StartedAbout your Norton Account
You can easily find and update your account, product,and billing information from your Norton Account.You can also change your Norton Account password,if required. Your computer must be connected to theInternet to access your Norton Account.
w Symantec products that are older than the 2006product year do not appear in your Norton Account.
To access Norton Account
1 In the Norton 360 main window, click Account.
2 In the My Account window, click Access NortonAccount.
3 In the Norton Account Web page that appears, typeyour email address and password, and click SignIn.
Creating a temporary password for Norton AccountIf you forget the password of your Norton Account, youcan create a temporary password to sign in to yourNorton Account. The temporary password is sent tothe email address that you provided when you createdyour Norton Account.
After you sign in to your Norton Account by using thetemporary password, you are prompted to change yourpassword.
To create a temporary password for Norton Account
1 In the Norton 360 main window, click Account.
2 In the My Account window, click Access NortonAccount.
3 In the Norton Account Web page that appears, underForgot your password?, click Recover it here.
4 In the Forgot your Password Web page, verify theemail address that is provided in the EmailAddresstext box, and then click Continue.A temporary password is sent to your email address.You can use this temporary password to sign in toyour Norton Account.
Getting StartedAbout your Norton Account
30
About Norton Community WatchNorton Community Watch helps in identifying newsecurity risks by submitting selected security andapplication data to Symantec for analysis. Symantecassesses the data to determine the new threats andtheir sources. The collective efforts from Nortonsecurity product users help in quick identification ofsolutions for these threats and risks. NortonCommunity Watch improves user security and productfunctionality. In addition, it helps Symantec to analyzethe execution, schedule, and efficiency ofNorton-specific tasks and settings on your computer.
Norton Community Watch collects and submits thefollowing types of data:
1 Identified malicious software such as portableexecutable files and running processes
1 Any Web site URL that your product identifies asfraudulent
1 All the Web site URLs that you visited before thedetection of a risk
1 The applications and processes that run on yourcomputer regularly and during any security riskdetection
1 Response instances that your computer sends toany potential security risk
1 General system information and performanceattributes from the computer
1 General information about your computer such asidle time, standby, and screensaver settings
After the potential security risks are assessed from thesubmitted data, Symantec sends the information backto Norton 360. The Norton features such as NortonInsight and Insight Network use this information toidentify files and processes at risk.
You should participate in Norton Community Watchsubmissions to provide valuable contribution to theentire community that uses Norton security products.
31Getting StartedAbout Norton Community Watch
No personally identifiable information is exposedduring data collection and submission. Symantecmaintains an adequate level of protection for thecollected information. The Detailed Error DataCollection option under Norton Community Watchin the AdministrativeSettings window lets you allowor deny the detailed data submissions. The detaileddata may vary depending on the Norton-specific errorsand components. You can configure the option tomanage the data submissions.
If you chose not to join Norton Community Watch whenyou installed your Norton product, you can turn it onlater. You can use the Norton Community Watchoption in the Settings window for AdministrativeSettings. You can also review the data, which NortonCommunity Watch collects and submits to Symantec,in the Security History window.
Turning off or turning on Norton Community WatchNorton Community Watch remains active once it isinstalled. If for any reason, you want to temporarilydisable it, you can turn it off from within the programitself.
You can use Security History to review the informationthat has been sent to Symantec.
To turn off or turn on Norton Community Watch
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
3 In the Settings window for Administrative Settings,in the NortonCommunityWatch row, do one of thefollowing:
1 To turn off Norton Community Watch, move theOn/Off switch to the right to the Off position.
1 To turn on Norton Community Watch, move theOn/Off switch to the left to the On position.
4 In the Settings window, click Apply.
Getting StartedAbout Norton Community Watch
32
About Norton Bootable Recovery ToolNorton Bootable Recovery Tool scans and removesviruses, spyware, and other security risks from yourcomputer. Your computer might be infected with avirus if you experience any of the following symptoms:
1 You cannot install Norton 360.
1 You cannot start your computer.
1 Your computer is extremely slow.
Norton Bootable Recovery Tool is integrated withWindows Preinstallation Environment (WinPE).Therefore, you can run Norton Bootable Recovery Toolonly from a CD, DVD, or USB key. You must use NortonBootable Recovery Tool Wizard to create the NortonBootable Recovery Tool CD, DVD, or USB key.
You can use the Norton Bootable Recovery Tool CD,DVD, or USB key to recover a computer that is infectedwith viruses and other security threats. This securityprogram is not a replacement for continuous, real-timeprotection from viruses and latest security risks. Toprotect your computer from future infections, be sureto install or continue using Norton 360 that you alreadypurchased.
Norton Bootable Recovery Tool detects and resolvesthe following security threats:
Programs that infect anotherprogram, boot sector,partition sector, or documentby inserting themselves orattaching themselves to thatmedium. Most viruses justreplicate; many also dodamage.
Viruses
33Getting StartedAbout Norton Bootable Recovery Tool
Programs containingmalicious codes that aredisguised as or hiding insomething benign, such as agame or utility.
Trojan horses
Tools that are used by ahacker to gain unauthorizedaccess to your computer. Onetype of hacking tool, akeystroke logger, tracks andrecords your individualkeystrokes and can send thisinformation back to thehacker.
Hacking tools
Programs that can scansystems or monitor activityand relay the information toother computers or locationsin cyberspace.
Spyware
Programs that facilitate thedelivery of advertisingcontent through their ownwindow, or by using anotherprogram's interface.
Adware
Getting StartedAbout Norton Bootable Recovery Tool
34
Programs that track systemactivity, gather systeminformation, or track userhabits, and relay thisinformation to third-partyorganizations. Theinformation that is gatheredby such programs is neitherpersonally identifiable norconfidential. Trackwareprograms are installed withthe user's consent, and mayalso be packaged as part ofother software that isinstalled by the user.
Trackware
Downloading the Norton Bootable Recovery ToolWizard
If your attempt to install a Norton product fails, youcan download the Norton Bootable Recovery ToolWizard. This easy-to-use wizard helps you createNorton Bootable Recovery Tool on a CD, DVD, or USBkey. You can use Norton Bootable Recovery Tool toscan your computer and remove any security threatsthat prevent successful installation.
It is recommended that you download and installNorton Bootable Recovery Tool Wizard on a computerthat does not have any security threats and createNorton Bootable Recovery Tool. If you create NortonBootable Recovery Tool on an infected computer, thereis a chance that the recovery CD, DVD, or USB keymight get infected.
w To use Norton Bootable Recovery Tool, you must usethe Product Key of the Norton product that youpurchased. If you use a trial version of Norton 360, youneed to create a Norton Account to receive a ProductKey to use Norton Bootable Recovery Tool.
35Getting StartedAbout Norton Bootable Recovery Tool
To download theNortonBootable Recovery ToolWizardfrom the Internet
1 Open your Web browser, and go to the followingURL:http://www.norton.com/recoverytool_n360
2 Follow the on-screen instructions.
Using the Norton Bootable Recovery ToolIf the installation of your Norton product fails, you canuse the Norton Bootable Recovery Tool to scan andremove any security threats that prevent successfulinstallation. If your computer is infected and you arenot able to start your Windows operating system, youcan use Norton Bootable Recovery Tool to removethreats and recover your computer.
Norton Bootable Recovery Tool is available on theproduct CD that you purchased. You can use theproduct CD as a recovery media.
w To use Norton Bootable Recovery Tool, you must usethe Product Key of the Norton product that youpurchased. If you use a trial version of Norton 360, youneed to create a Norton Account to receive a ProductKey to use Norton Bootable Recovery Tool.
To use the Norton Bootable Recovery Tool
1 Insert the recovery media and start your computerfrom the recovery media.The recovery media can be a Norton BootableRecovery Tool CD, DVD, USB key, or the productCD.
2 In the Norton Bootable Recovery Tool window,select your language, and then click OK.
3 Read the Norton License Agreement, type yourProduct Key, and then click I Agree.
4 Click Start Scan.
5 After the scan is complete, remove the recoverymedia from the drive or USB port, and restart yourcomputer.
Getting StartedAbout Norton Bootable Recovery Tool
36
About updating Norton 360Norton 360 uses the Internet to automatically obtainupdates to its virus definition files and its programfiles. These updates continually enhance the technologythat Norton 360 uses to keep your PC protected.
Automatic updates require an Internet connection. Ifyou use a proxy server to connect to the Internet, youmust configure the proxy settings in your product. Ifyou do not normally keep your PC connected to theInternet, you can manually update Norton 360 afteryou connect to the Internet. Updating Norton 360 ona regular basis ensures that you have the latestdefinition updates and program updates.
About LiveUpdateSymantec products download the latest definitionupdates and program updates regularly from Symantecservers. The definition updates protect your computerfrom the latest viruses and unknown security threats.Symantec products help you to obtain and install theseupdates by using the LiveUpdate technology.
LiveUpdate takes little time to download and processthe definition updates and program updates. You canchoose Smart Definitions to minimize download time,installation time, and memory consumption as SmartDefinitions are a subset of virus definitions. The SmartDefinitions option is available on the ScansandRiskstab in the Antivirus settings window. You can cancelthe LiveUpdate session at any time.
You can also skip the LiveUpdate session.
LiveUpdate obtains these updates for your computerby using your Internet connection. If your networkuses proxy servers to connect to Internet, LiveUpdateuses the proxy settings in your product to downloadthe latest updates. You can use the Network ProxySettings option in the AdministrativeSettings windowto configure the proxy settings of your network.
37Getting StartedAbout updating Norton 360
About Program and Definition Updates
LiveUpdate obtains program updates and definitionupdates for your computer by using your Internetconnection.
Program updates are minor improvements to yourinstalled product. These differ from product upgrades,which are newer versions of the entire product.Program updates are usually created to extend theoperating system or hardware compatibility, adjust aperformance issue, or fix program errors. Programupdates are released on an as-needed basis.
w Some program updates may require that you restartyour computer after you install them.
LiveUpdate automates the process of downloading andinstalling program updates. It locates and obtains filesfrom an Internet site, installs them, and then deletesthe leftover files from your computer.
Definition updates are the files that keep yourSymantec products up to date with the latest antithreattechnology. The definition updates that you receivedepend on which product you use.
The type of definition updates that each of theSymantec products receive are as follows:
Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.
Norton AntiVirus, NortonAntiVirus Online
Getting StartedAbout updating Norton 360
38
In addition to the virusand security risk updates,users of these productsreceive definition updatesfor security protection.For the products thatcontain protectionagainst phishing, usersreceive definition updatesagainst phishing.
The security definitionupdates provide the latestpredefined firewall rules,the updated lists ofapplications that accessthe Internet, IntrusionPrevention signatures,and Symantec spamdefinition files. Theselists are used to identifyunauthorized accessattempts to yourcomputer.
Norton Internet Security, NortonInternet Security Online
Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.
In addition, users of theseproducts receiveSymantec spamdefinitionfiles and definitionupdates against phishing.
Norton 360, Norton 360 Online
39Getting StartedAbout updating Norton 360
Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.
In addition, users of theseproducts receiveSymantec spamdefinitionfiles and definitionupdates against phishing.
Norton Security Suite, NortonBusiness Suite
About Smart Definitions
Norton 360 downloads and installs virus definitionsregularly to protect your computer from the latestsecurity threats. For faster downloads and installationpurpose, Norton 360 classifies these virus definitionsinto two sets.
The virus definitions are classified into the followingtwo sets:
Contains all the virus definitionsfor each threat that is known toSymantec.
Complete Set
Getting StartedAbout updating Norton 360
40
Contains the most importantvirus definitions that arerequired for latest securitythreats as viewed by Symantec.
The Core Set is a subset of theComplete Set, and it isapproximately 30 percentsmaller than the Complete Set.The Core Set minimizesdownload time, installation time,and system start time. It alsooccupies lesser amount of diskspace as compared to theComplete Set virus definitions.Therefore, the Core Set resultsin faster performance of yourcomputer.
Core Set
The Core Set virus definitions are called as SmartDefinitions. Norton 360 provides the SmartDefinitionsoption to choose between Core Set virus definitionsand Complete Set virus definitions for LiveUpdatesessions. The option is available on the ScansandRiskstab in the Antivirus settings window.
During Automatic LiveUpdate or each time that yourun LiveUpdate manually, Norton 360 checks if theSmart Definitions option is turned on or off. It thendownloads and installs the desired set of virusdefinitions based on the option setting. By default, theoption is turned off, which means that the CompleteSet virus definitions are downloaded and installed.When you turn on Smart Definitions, Norton 360downloads and installs the Core Set virus definitionson your computer.
Turning on or turning off Smart Definitions
Smart Definitions are a subset of virus definitions thatcontains most important definitions for the latestsecurity threats.
41Getting StartedAbout updating Norton 360
As the Smart Definitions are of considerably smallersize, it results in lesser download time, lesserinstallation time, lesser boot time, and lesser memoryconsumption. It also occupies lesser amount of diskspace as compared to the full set of virus definitions.Therefore, Smart Definitions result in fasterperformance of your computer.
Norton 360 checks the Smart Definitions optionsettings during each LiveUpdate session. If the optionis turned on, the Smart Definitions are downloadedand installed. If the option is turned off, all of the virusdefinitions are downloaded and installed.
To turn on or turn off Smart Definitions
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Antivirus.
3 Click Scans and Risks tab.
4 Under Computer Scans, in the Smart Definitionsrow, do one of the following:
1 To turn on Smart Definitions, move the On/Offswitch to the left to the On position.
1 To turn off Smart Definitions, move the On/Offswitch to the right to the Off position.
5 In the Settings window, click Apply.
6 Click Close.
Turning off or turning on Automatic LiveUpdate
You can have LiveUpdate check for definition updatesand product updates automatically on a set schedule,by turning on the Automatic LiveUpdate option. Youcan also run LiveUpdate manually when the AutomaticLiveUpdate option is turned on. However, you mustrun LiveUpdate manually to obtain updates if you haveturned off the Automatic LiveUpdate option.
You can turn off or turn on the AutomaticLiveUpdateoption from the Antivirus settings window. You can
Getting StartedAbout updating Norton 360
42
also turn off or turn on the Automatic LiveUpdateoption from Quick Controls in the Settings window.
w If you are connected to the Internet, AutomaticLiveUpdate downloads product updates and definitionupdates every hour. If you have an ISDN router that isset to automatically connect to your Internet serviceprovider (ISP), it may incur charges each time. If thistype of setup is a problem, you can set your ISDN routernot to automatically connect to the ISP. Alternatively,you can turn off Automatic LiveUpdate.
To turn on Automatic LiveUpdate from Quick Controls
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Quick Controls,check Automatic LiveUpdate.
To turn off Automatic LiveUpdate from Quick Controls
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Quick Controls,uncheck Automatic LiveUpdate.
3 In the Select the duration drop-down list, selecthow long you want to turn off AutomaticLiveUpdate, and then click OK.
Checking for updates manually
If you disconnect your PC from the Internet, Symantecrecommends that you check for Norton 360 updatesafter you reconnect.
To check for updates manually
1 In the Norton 360 main window, move the mousepointer over PC Security, and then click RunLiveUpdate.
2 In the Activities and Scan Details window, whenthe LiveUpdate is completed successfully, clickClose.
43Getting StartedAbout updating Norton 360
Checking for the latest virus and spyware definitions date
Virus definition files contain the information thatallows Norton 360 to recognize and alert you to thepresence of a specific virus or security threat. Norton360 shows the date on which you last updated the virusand spyware definitions.
You can also check the latest virus definition date. TheDefinitionUpdate link at the bottom of the PCSecuritystatus area shows you the date and time of the lastdefinition updates.
To check for the latest virus and spyware definition date
1 In the Norton 360 main window, move the mousepointer over PC Security, and then click ViewDetails.
2 In the PC Security Details window, view the latestvirus definitions details.The Status column shows the date on which youlast downloaded and installed the latest definitionupdates.
About keeping your protection up to date
Definition updates are available to you as long as youmaintain an active product status. The ways in which
Getting StartedAbout updating Norton 360
44
you can acquire the product and maintain your statusare as follows:
The product includes a limited-timesubscription to definition updates. Whenthe subscription is due to expire, you areprompted to renew. Follow the on-screeninstructions to complete yoursubscription renewal.
After your product expires, you cannotobtain definition updates and all thesecurity features are turned off. If youdo not renew your product, you are nolonger protected against security threats.Though LiveUpdate continues todownload program updates afterexpiration, you must renew your productto enable all the security features.
If you purchaseda subscriptionversion of a retailproduct
If you do not activate your service orrenew your subscription, you cannotobtain updates of any kind and thesoftware no longer functions.
If you purchaseda product as aservice, or it cameinstalled on yourcomputer
Your product status is always active aslong as your security service is activewith your service provider.
If your security service is not active, youcannot obtain updates of any kind andthe software no longer functions.
If you receive thisservice throughyour serviceprovider
About Pulse Updates
In addition to the definition updates that AutomaticLiveUpdate downloads, Norton 360 uses streamingtechnology to download the latest virus definitions.These downloads are called Pulse Updates. The PulseUpdates are lighter and faster than AutomaticLiveUpdate. They keep your computer secure from the
45Getting StartedAbout updating Norton 360
ongoing threats that exist on the Internet. PulseUpdates protect you against the rapidly-changingenvironment of security threats without compromisingyour computer's performance. Pulse Updates shouldalways be turned on to get the latest updates.
Pulse Updates checks for definition updates every 5minutes. If definition updates are available, LiveUpdatedownloads the streamed virus definitions. PulseUpdates provide the updates in between the fullupdates, which Automatic LiveUpdate downloadsautomatically every hour. Norton 360 merges the newstream that is downloaded with the last updates thatare installed. The Pulse Updates downloads provideadditional and fast protection for the latest threats inbetween the full updates without disrupting your onlineexperience.
Even if you do not turn on Pulse Updates, LiveUpdatecollects all the missed streams and, it updates yourcomputer during full definition updates.
Turning off or turning on Pulse Updates
Pulse Updates provide frequent, lightweight updatesevery 5 minutes in between the full updates. Alwaysensure that the Pulse Updates option is turned on. Itprotects you from the latest threats withoutcompromising your system performance or disruptingyour online experience.
You must be connected to the Internet to obtain latestdefinition updates by using Pulse Updates. You canturn on or turn off Pulse Updates only if AutomaticLiveUpdate is turned on.
To turn off or turn on Pulse Updates
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Antivirus.
3 In the Settings window for Antivirus, click theAntispyware and Updates tab.
Getting StartedAbout updating Norton 360
46
4 Under Updates, in the Pulse Updates row, do oneof the following:
1 To turn off Pulse Updates, move the On/Offswitch to the right to the Off position.
1 To turn on Pulse Updates, move the On/Offswitch to the left to the On position.
5 In the Settings window, click Apply.
About Network Proxy settingsA proxy server regulates access to the Internet, andprevents external computers from accessing yournetwork. If you are on a network that uses a proxyserver to connect to the Internet, you can provide proxyserver details to Norton 360. You can use the NetworkProxy Settings window to specify the automaticconfiguration URL, the proxy settings, and theauthentication details. Norton 360 uses the proxysettings and authentication details to connect to theInternet automatically, whenever required. Forexample, LiveUpdate uses the specified proxy serversettings to retrieve updates. You must ensure that youspecify the proxy server details for LiveUpdate to runsuccessfully.
In some cases, your network uses an automaticconfiguration URL or script for managing Internetaccess. In this case, you must provide the URL of therequired Proxy Automatic Configuration (PAC) file. APAC file contains the code that lets your browser knowabout the proxy settings for different Web sites overthe Internet. It also contains the words which you wantto filter and block while you access the Internet. Youcan also choose the option that lets your browser toautomatically detect the proxy settings. If you wantyour manual settings in the network, ensure that youdisable the Automatic Configuration options.
47Getting StartedAbout Network Proxy settings
Network Proxy Settings window lets you specify thefollowing settings:
Lets you specify the automaticconfiguration URL or script tomanage Internet access.
You have the following options:1 Automatically detect
settings
Lets your browser detect thenetwork settingsautomatically.
If you do not want to overrideyour manual settings fornetwork connections, youmust disable this option.
1 Useautomatic configurationscript
Lets your browser use theautomatic configuration URLor script to manage Internetaccess.
Use the URL box to providethe HTTP URL or the script tothe required PAC file (suchas file://C:/Proxy.pac).
Automatic Configuration
Getting StartedAbout Network Proxy settings
48
Lets you provide the details ofyour Proxy Settings.
UnderProxySettings, checkUsea proxy server for your HTTPconnections, and do thefollowing:
1 In the Address box, type theURL or IP address of yourproxy server.
1 In the Port box, type the portnumber of your proxy server.
You can specify a value from1 to 65535.
Proxy Settings
Lets you connect to the Internetthrough a server that requiresauthentication.
Use the Username box andPassword box to type theauthentication details.
Authentication
Configuring Network Proxy SettingsWhen you use a proxy server to connect to the Internet,you must specify the proxy server details. The NetworkProxy Settings window lets you enter automaticconfiguration settings, proxy settings, and proxy serverauthentication settings. The Network Proxy settingslet you connect to the Internet while you perform taskssuch as activating the product or accessing the supportoptions.
To configure Network Proxy Settings
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
3 In the NetworkProxySettings row, click Configure.
49Getting StartedAbout Network Proxy settings
4 In the Network Proxy Settings window, do thefollowing:
1 If you want your browser to automatically detectnetwork connection settings, under AutomaticConfiguration, check Automatically detectsettings.
1 If the proxy server requires an automaticconfiguration URL, under AutomaticConfiguration, check Use automaticconfiguration script. Type the URL (such asfile://C:/Proxy.pac) in the URL box.
1 If your network uses a proxy server, under ProxySettings, check Use a proxy server for yourHTTPconnections. In the Address box, type theURL or IP address of your proxy server, and inthe Port box, type the port number of your proxyserver. You can specify a value from 1 to 65535.
1 If your proxy server requires a user name andpassword, under Authentication, check I needauthorization to connect through my firewallor proxy server. Type the user name in theUsername box and password in the Passwordbox.
5 In the NetworkProxySettings window, click Apply.
About Norton 360 statusNorton 360 displays the security status of yourcomputer at the top of the main window. Based on thesecurity status of your computer, Norton 360 showsyour system status as Secure, Attention, or At Risk.
The system status indicator displays one of thefollowing statuses:
Indicates that your computeris protected from threats,risks, and damages.
Secure
Getting StartedAbout Norton 360 status
50
Indicates that your computerrequires attention.
At the bottom section of theNorton 360 main window,click Fix Now to resolve thesecurity threats on yourcomputer.
Attention
Indicates that your computeris at risk.
At the bottom section of theNorton 360 main window,click Fix Now to resolve thesecurity threats on yourcomputer.
At Risk
Norton 360 displays individual security status for eachprotection category, such as PC Security, IdentityProtection, Backup, and PC Tuneup. Based on thesecurity status of the different components of yourcomputer, the status areas of the four protectioncategories are marked as Protected, Attention, or AtRisk.
See “Responding tosecurity statusindicators”on page 51.
When your system status or protection categoriesstatuses are marked as At Risk or Attention, at thebottom section of the Norton 360 main window, clickFix Now to resolve all the security threats on yourcomputer.
Responding to security status indicatorsWhen your system encounters a threat or a risk, theproduct displays the security status at the top of themain window. When a status indicator displays a status,you can take appropriate action to improve yourprotection status. Your protection is based on theprograms that are installed on your computer. Toimprove your protection status, ensure that yourinstalled programs are up to date.
51Getting StartedAbout Norton 360 status
When your system status or protection categoriesstatuses are marked as At Risk or Attention, you canresolve the security issues directly from the mainwindow.
To respond to security status indicators
1 In the Norton 360 main window, click Fix Now.
2 Follow the on-screen instructions.
About the Norton 360 iconWhen you install Norton 360, it places an icon in thenotification area at the far right of the taskbar. Thisicon indicates the current security status of yourcomputer. Norton 360 displays an animated icon whenit actively fixes any issues or wants to inform you aboutany warning or urgent issues.
You can see the following representations of Norton360 icon in the notification area:
Represents that your computeris fully protected
Icon with a green checkmark badge
Represents that there are someissues against your computerprotection that require yourattention
Icon with an orangeexclamation mark badge
Represents that there are someurgent issues against yourcomputer protection that requireimmediate resolution
Icon with a red cross markbadge
Represents that the Silent Modefeature is turned on
This icon also displays thecurrent protection status badge.
Icon with acrescent-shaped edge
Getting StartedAbout Norton 360 status
52
You can right-click the icon to see a shortcut menu forNorton 360. You can choose items on the shortcut menuto open the Norton 360 window, to fix any issues thatNorton 360 detects, or to get additional help.
About Norton 360 shortcut menuNorton 360 works in the background to keep your PCsecure. The Norton 360 icon is available in thenotification area at the far right of the taskbar. Theicon reassures you that your protection is up to date.It changes its color if any change in status occurs.
The messages that appear in the notification area mayrequire a response from you, such as opening a window.More often, messages inform you about currentactivities, and they disappear after a few seconds.
You can right-click the Norton 360 icon to accessspecific Norton 360 activities. Depending on the currentactivities, your options include the following:
Use this option to launch theNorton 360 main window tocomplete tasks, view currentstatus, or access otherfeatures
Open Norton 360
Use this option to run a QuickScan to protect possiblevirus-infected areas of yourcomputer
Run QuickScan
Use this option to runLiveUpdate to check fordefinition updates andprogram updates
Run LiveUpdate
53Getting StartedAbout Norton 360 status
Use this option to create abackup of your files
You can specify when andhow often Norton 360 backsup your files.
Run Backup Now
Use this option to review theinformation about thesecurity events for all of thecategories
View Recent History
Use this option to resolveyour problem easily usingOne Click Support
Get Support
Use this option to view all thelogins that you want IdentitySafe to manage
If you have not created anyIdentity Safe profile, thisoption first lets you create anIdentity Safe profile.
Manage Logins
Use this option to turn on orturn off Silent Mode
Turnon/Turnoff SilentMode
Use this option to turn on orturn off the firewall
Enable/Disable SmartFirewall
Use this option to turn on orturn off AntivirusAuto-Protect
Enable/Disable AntivirusAuto-Protect
Use this option to check anddownload the latest versionof the product
Check for New Version
Getting StartedAbout Norton 360 status
54
Viewing details of protection featuresIn the Norton 360 main window, you can see a summaryof each of the four protection features that Norton 360provides. You can view additional details about eachprotection feature.
To view details of a protection feature
1 In the Norton 360 main window, move the mousepointer over a protection feature, and then clickView Details to view the following details:
1 The current status of the protection feature.
1 A list of the checks that the feature performs,and the results of each check. In some cases, theresults of a check can include a link that providesadditional information.
1 A list of things that you can do.
2 After you view details, click Close.
55Getting StartedAbout Norton 360 status
Getting StartedAbout Norton 360 status
56
This chapter includes the following topics:
1 About System Insight
About System InsightNorton 360 continuously monitors your computer tokeep it free of any problems and run at peak efficiency.Norton 360 constantly scans the vital areas of yourcomputer including memory, registry keys, and runningprocesses. It monitors the important activities such asgeneral file operation, network traffic, and Internetbrowsing. In addition, Norton 360 ensures that theactivities that it performs on your computer do notdegrade the overall performance of your computer.
System Insight provides you a centralized locationwhere you can view and monitor the activities that youperform on your system. System Insight displays suchinformation in the Performance window.
You can use the Performance window for the following:
1 To view monthly history of the important systemactivities that you performed or that occurred overa period of the last three months
The Events graph that appears at the top of thewindow provides a pictorial representation ofimportant system activities. The activities includeapplication installations, application downloads,disk optimizations, threat detections, or Quick
2Monitoring yoursystem'sperformance
Scans. The graph displays the activities as icon orstripe, and the description for each icon or stripeis provided at the right side of the graph. Thepop-up that appears when you move the mousepointer over an icon provides you the details aboutthe activity. The View Details link in the pop-uplets you view additional details about the activityin the Security History window. You can use thetabs at the top of the graph to obtain details for thecurrent month and details for the last two months.
1 To rearrange the organization of files on yoursystem
Optimizing your system helps you maximize theusable free space on a disk by grouping files basedon how they are accessed. The Optimize option atthe top of the Events graph lets you defragmentyour system.
1 To view and analyze the effect of Norton 360 on theperformance of your computer
The Performance graph that appears at the bottomof the window provides a graphical representationof your CPU usage and memory usage. The CPU tabdisplays a graph that represents the overall systemCPU usage and Norton-specific CPU usage. Whenyou click at any point on the CPU graph andmemory graph, Norton 360 displays a list of theprocesses that consume maximum resources at thatpoint. It also displays the percentage of usage foreach process. You can click a process that isavailable in the list to get more information aboutthe process in the File Insight window. TheMemory tab displays a graph that representsoverall memory usage and Norton-specific memoryusage. You can select any of the Zoom options toobtain magnified view or historical data of thegraphs.
1 To view the details of Norton-specific jobs that arecurrently running in the background
The NortonTasks window provides the details suchas the timestamp, the duration, and the status of
Monitoring your system's performanceAbout System Insight
58
the background jobs. The details also include thetype of power the job needs to run and if a job randuring idle time. You can also start or stop abackground job at any time.
1 To view and manage your network
The Network Security Map window provides apictorial representation of the devices on thenetwork to which your computer is connected. Youcan view devices and customize the NetworkSecurity Map to remotely monitor the computerson which a Norton product is installed.
1 To view details about the known good files and theknown bad files
The NortonInsightNetwork window lets you viewthe total number of files that Symantec analyzeswithin the Norton Community. You can also viewthe total number of computers that are available inthe community to provide the data. You can viewthe number of trusted files that are available onyour computer.
You can use the Performance Monitoring option inthe Administrative Settings window to enable ordisable Norton 360 to monitor your system'sperformance.
Accessing the Performance windowSystem Insight provides you a centralized locationwhere you can view and monitor your system activities.System Insight displays such information in thePerformance window. You can access the Performancewindow to view details about the important systemactivities, CPU usage and memory usage, andNorton-specific background jobs. You can also viewNorton Insight details and defragment your bootvolume.
To access the Performance window
4 In the Norton 360 main window, click Performance.
59Monitoring your system's performanceAbout System Insight
About monitoring system activitiesSystem Insight provides information about theimportant system activities that you performed or thatoccurred over a period of the last three months. SystemInsight displays the information in the Performancewindow. The Events graph at the top of thePerformance window displays each activity as icon orstripe. The description for each icon or stripe appearsat the bottom of the graph. You can use the tabs at thetop of the graph to obtain details for the current monthand for the last two months. The activities include:
Provides the details about theinstallation activities that youperformed on your system overa period of the last three months
The details include theapplication that you installed,the date on which you installedthe application, and the totalnumber of installations on thatdate.
Installs
Provides the details about theapplication-download activitiesthat you performed on yoursystem over a period of the lastthree months
The details include the date onwhich you downloaded a file andthe total number of downloadson that date. You can click thefile name link to view additionaldetails about the downloadedfile such as the Download Insightreport, file name, reputationlevel, and recommended action.
Downloads
Monitoring your system's performanceAbout System Insight
60
Indicates the optimizationactivities that you performed onyour system over a period of thelast three months
Optimized
Provides the details about thethreat detection activities thatNorton 360 performed on yoursystem over a period of the lastthree months
The details include the date onwhich Norton 360 detected athreat and the total number ofthreats that Norton 360 detectedon that date. The View Detailslink provides additional detailsabout the risk such as the riskimpact and the origin of the risk.The details also include theaction that a threat hasperformed on your system andthe action that Symantecrecommends you to resolve thethreat.
Detections
Provides the details about theperformance alerts that Norton360 displayed over a period ofthe last three months
The details include themonitored date and the numberof performance alerts generated.The View Details link providesadditional details aboutperformance-related activities,program name, programlocation, and system resourcesutilization.
Alerts
61Monitoring your system's performanceAbout System Insight
Provides the details about QuickScans that Norton 360performed on your system overa period of the last three months
The details include the date onwhich a Quick Scan wasperformed and the number ofQuick Scans that wereperformed on that date. TheView Details link providesadditional details such as thescan time, total items scanned,total risk detected, total risksresolved, and recommendedaction.
Quick Scans
Viewing details of your system activities
System Insight lets you view details of the systemactivities that you performed or that occurred over thelast three months in the Performance window. Theactivities include application installations, applicationdownloads, disk optimizations, threat detections,performance alerts, or Quick Scans. You can use thetabs at the top of the Events graph to obtain details forthe current month and for the last two months. TheEvents graph at the top of the Performance windowdisplays each activity as icon or stripe. The descriptionfor each icon or stripe appears at the bottom of thegraph. The pop-up that appears when you move themouse pointer over an icon provides you the detailsabout the activity. The details include the date on whichan activity was performed and the number of suchactivities that you performed on that date. The ViewDetails link provides additional details of the activityin the Security History window.
To view details of your system activities
1 In the Norton 360 main window, click Performance.
Monitoring your system's performanceAbout System Insight
62
2 In the Performance window, at the top of the Eventsgraph, click the tab for a month to view the details.
3 In the Events graph, move the mouse pointer overthe icon or the stripe for an activity.
4 In the pop-up that appears, view the details of theactivity.
5 If the View Details option appears in the pop-up,click View Details to view additional details in theSecurity History window.
About performance alertingNorton 360 monitors your system performance. If itdetects an increased usage of system resources by anyprogram or process, it notifies you with performancealerts. Performance Alerting works only when thePerformance Monitoring option and PerformanceAlerting option are turned on.
Performance Alerting notifies you with informationabout the program name and resources that theprogram uses excessively. The Details & Settings linkin the performance notification alert lets you viewadditional details about the resource consumption bythe program. The File Insight window opens anddisplays the details of the file, the origin of the file, andthe complete resource usage list of the program. Fromthe FileInsight window, you can choose to exclude theprogram from being monitored. You can use theSettings option in the File Insight window to turn offthe Performance Alerting option.
w Performance alerts are not displayed when yourcomputer is idle or in Silent Mode.
For each system resource, such as CPU, memory, andhard disk, there is a resource consumption thresholddefined. When the resource consumption of a programexceeds the defined threshold limit, Norton 360 alertsyou with a performance alert.
63Monitoring your system's performanceAbout System Insight
You can configure the threshold limit by using theResourceThresholdProfile forAlerting option underAdministrative Settings in the Settings window.
You can use the Low-ResourceProfileUseOnBatteryPower option to let Norton 360 automatically changethe resource threshold profile to low when yourcomputer runs on battery power.
In addition, you can add programs to the ProgramExclusions list using the Program Exclusions option.When you add a program to the Program Exclusionslist, Norton 360 does not alert you when the programexceeds the resource consumption threshold limit.
You can view all the performance-related logs underthe Performance Alert category in the SecurityHistory window.
Configuring performance alerts
You can use the Performance Alerting option toreceive performance alerts when there is an increasedusage of system resources by any program or process.
You can use the following options to configureperformance alerts:
Turns off performance alerts.
Select this option if you donot want Norton 360 to notifyyou with performance alerts.
Off
Turns on performance alerts.
Select this option if you wantNorton 360 to notify you withperformance alerts when aprogram or process exceedsthe system resource usagethreshold limit.
By default, the PerformanceAlerting option is turned on.
On
Monitoring your system's performanceAbout System Insight
64
Monitors and records thesystem resource usage.
Select this option if you wantNorton 360 to only monitorthe system resource usage ofevery program or processrunning on your computer.
When a program or processexceeds the system resourceusage threshold limit, Norton360 records these details intheSecurity Historywindow.You can view the details thatare related to performancealerts under PerformanceAlert category in theSecurityHistory window.
Log Only
To configure performance alerts
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
3 Under Performance Monitoring, in thePerformanceAlerting row, do one of the following:
1 To turn off performance alerts, move thePerformanceAlerting switch to the Off position.
1 To turn on performance alerts, move thePerformanceAlerting switch to the On position.
1 To suppress the performance alerts, move thePerformance Alerting switch to the Log Onlyposition.
65Monitoring your system's performanceAbout System Insight
4 Under High-Usage Alert for:, do the following:
1 If you want Norton 360 to monitor the CPUusage, move the CPU switch to the On position.By default, this switch is turned on.
1 If you want Norton 360 to monitor the memoryusage, move the Memory switch to the Onposition. By default, this switch is turned on.
1 If you want Norton 360 to monitor the diskusage, move the Disk switch to the On position.By default, this switch is turned on.
1 If you want Norton 360 to monitor the handlecount, move the Handles switch to the Onposition.
5 Click Apply, and then click Close.
Configuring the resource threshold profile
The threshold limit for the system resourcesdetermines at which point Norton 360 should notifyyou with performance alerts. You can use the ResourceThreshold Profile for Alerting option in the Settingswindow to configure the resource consumptionthreshold limit. When a specific program exceeds thethreshold limit of using your system resource, Norton360 notifies you with a performance alert.
To configure the resource threshold profile
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
Monitoring your system's performanceAbout System Insight
66
3 Under Performance Monitoring, in the ResourceThreshold Profile for Alerting row, select one ofthe following options:
Configures a low thresholdlimit for alerting
If you choose this option,Norton 360 notifies you withperformance alerts whenevera program reaches the lowestthreshold limit of using yoursystem resource.
Symantec recommends youto select this option whenyour computer runs onbattery power.
Low
Configures a mediumthreshold limit for alerting
By default, the threshold limitis set to medium.
Medium
Configures a high thresholdlimit for alerting.
If you choose this option,Norton 360 notifies you withperformance alerts whenevera program reaches thehighest threshold limit ofusing your system resource.
High
4 Click Apply, and then click Close.
Turning off or turning on the Low-Resource Profile Use OnBattery Power option
When your computer runs on battery power, it isimportant that all active software programs consumeminimum resource usage. By reducing resource usage,
67Monitoring your system's performanceAbout System Insight
your computer gains longer battery life and becomesmore energy efficient.
You can configure a low threshold profile and ensurethat all programs consume minimum resource usage.When the resource usage of a program or a processexceeds the low threshold limit, Norton 360 notifiesyou with a performance alert. You can choose to closethe program or the process manually and free theresource.
If the Low-Resource Profile Use On Battery Poweroption is turned on, Norton 360 automatically changesthe threshold profile to low when your computer runson battery power. By default, this option is turned on.You can view the Low-ResourceProfileUseOnBatteryPower option under Administrative Settings in theSettings window.
w Symantec recommends that you keep theLow-Resource Profile Use On Battery Power optionturned on.
To turn off the Low-Resource Profile Use On BatteryPower option
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
3 Under Performance Monitoring, in theLow-Resource Profile Use On Battery Power row,move the On/Off switch to the right to the Offposition.
4 Click Apply, and then click Close.
To turn on the Low-Resource Profile Use On BatteryPower option
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
Monitoring your system's performanceAbout System Insight
68
3 Under Performance Monitoring, in theLow-Resource Profile Use On Battery Power row,move the On/Off switch to the left to the Onposition.
4 Click Apply, and then click Close.
Excluding programs from appearing in performance alerts
Norton 360 lets you exclude programs from appearingin performance alerts. You can add the programs thatconsume high CPU, memory, or disk usage to theProgram Exclusions list. When you add a program tothe ProgramExclusions list, Norton 360 does not alertyou when the program exceeds the resourceconsumption threshold limit.
To exclude a program from appearing in performancealerts
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
3 Under Performance Monitoring, in the ProgramExclusions row, click Configure.
4 In the Program Exclusions window, click Add.
5 In the Select a program dialog box, browse to theexecutable file for the program that you want toadd.
6 Click Open.
7 In the Program Exclusions window, click OK.
8 In the Settings window, click Apply, and then clickClose.
Removing programs from Program Exclusions
The ProgramExclusions window lists all the programsthat are excluded from appearing in performancealerts. If you want, you can remove any of the programsthat you already added to the Program Exclusionswindow. When you remove a program, the program
69Monitoring your system's performanceAbout System Insight
appears in the performance alert the next time itcrosses the resource consumption threshold limit.
To remove a program
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
3 Under Performance Monitoring, in the ProgramExclusions row, click Configure.
4 In the Program Exclusions window, select theprogram that you want to delete, and then clickRemove.
5 Click OK.
6 In the Settings window, click Apply, and then clickClose.
About CPU graph and memory graphNorton 360 monitors the overall system CPU usageand memory usage and the Norton-specific CPU usageand memory usage. Norton 360 displays the details inthe CPU graph and the memory graph. The CPU graphand memory graph are real-time graphs of CPUutilization and memory utilization.
The graphs display a performance time for the last 90minutes or for the duration since you started yourcomputer. The graphs update the information at aninterval of every 15 seconds. The graphs progress fromright to left, and the most recent data appear on thefar right of the graph. The blue pattern in the graphsdepicts the overall system usage, and the yellow patterndepicts the Norton-specific usage. The gray blocks thatare labeled as Idle indicate the idle period of yourcomputer. The gray blocks include the period whenyour computer is in shutdown, sleep, or log out state.
The graphs show a default performance time of 90minutes. However, you can use the Zoom options todefine a region of the graph that you are interested toview. You can select a Zoom option to obtain magnifiedview or historical data of the graphs. For example, if
Monitoring your system's performanceAbout System Insight
70
you select the 10min option, Norton 360 displays themagnified view of CPU graph or memory graph for thelast 10 minutes. If you select the 1d option, Norton 360displays a historical data of the last one day.
When you click at any point on the CPU graph ormemory graph, Norton 360 displays a list of theprocesses that consume maximum resources at thatpoint. It also displays the percentage of usage for eachprocess. You can click a process that is available in thelist to get more information in the FileInsight window.
The File Insight window provides information aboutthe process such as:
1 The file name, version number, digital signature,the date on which the process was installed
1 The date on which the process was last used andwhether it is a startup file
1 The confidence level
1 The resource usage details
1 The actions that the process performs on yoursystem
In addition, the File Insight window displays the CPUgraph and the resource usage details for the runningprocesses. The graph shows the breakdown of overallsystem CPU usage and the CPU usage by the process.
Viewing the CPU graph and memory graph
Norton 360 monitors the overall system CPU usageand memory usage and the Norton-specific CPU usageand memory usage. The CPU tab and the Memory tabat the top of the Performance graph display the CPUgraph and the memory graph respectively.
The Zoom options provide you the magnified view ofthe CPU graph and memory graph. For example, if youselect the 10min option, Norton 360 displays themagnified view of CPU graph or memory graph for thelast 10 minutes. If you select the 30min option, Norton360 displays a magnified view of the CPU graph andmemory graph for the last 30 minutes.
71Monitoring your system's performanceAbout System Insight
To view CPU graph and memory graph
1 In the Norton 360 main window, click Performance.
2 In the Performance window, do one of the following:
1 To view the CPU graph, click the CPU tab.
1 To view the memory graph, click the Memorytab.
3 Do one of the following:
1 To obtain a magnified view, click 10min or30min next to the Zoom option.
1 To obtain the default performance time, click90min next to the Zoom option.
Obtaining historical data of your CPU and memory usage
The Zoom options also provide you the historical dataof the CPU graph and memory graph. For example, ifyou select the 1d option, Norton 360 displays the dataof CPU graph or memory graph for the last one day.
To view historical data of your CPU or memory usage
1 In the Norton 360 main window, click Performance.
2 In the Performance window, do one of the following:
1 To view the CPU graph, click the CPU tab.
1 To view the memory graph, click the Memorytab.
3 Do one of the following:
1 To obtain historical data for the last one day,click 1d.
1 To obtain historical data for the last one week,click 1w.
1 To obtain historical data for the last one month,click 1m.
Identifying resource-consuming processes
You can click at any point on the CPU graph or memorygraph to obtain a list of the processes that consumemaximum resources of your computer at that point.
Monitoring your system's performanceAbout System Insight
72
You can click a process that is available in the list toget more information about the process in the FileInsight window.
To identify resource-consuming processes
1 In the Norton 360 main window, click Performance.
2 In the Performance window, do one of the following:
1 To view the CPU graph, click the CPU tab.
1 To view the memory graph, click the Memorytab.
3 Click at any point on the graph to obtain a list ofresource-consuming processes.
4 Click the name of a process to obtain additionalinformation about the process in the File Insightwindow.
About optimizationThe data storage space on a disk is divided into discreteunits. These units are called clusters. When files arewritten to the disk, they are broken up intocluster-sized pieces. When all of the file pieces arelocated in adjacent or contiguous clusters, the file canbe accessed quickly.
Your computer’s hard disk stores all of your files,applications, and the Windows operating system. Thebits of information that make up your files graduallyspread over the disk. This process is known asfragmentation. The more that you use your computer,the more fragmented the hard disk gets.
When a fragmented file is accessed, the diskperformance is slower. The performance is slowerbecause the drive head locates, loads, saves, and keepstrack of all of the fragments of the file. If free space isalso fragmented, the drive head might have to trackadequate free space to store temporary files or newlyadded files.
Optimization rearranges file fragments into adjacentor contiguous clusters. When the drive head accesses
73Monitoring your system's performanceAbout System Insight
all of the file data in one location, the file is read intothe memory faster. Optimization also maximizes theusable free space on a disk by grouping most frequentlyused files and infrequently used files. Optimizationconsolidates free space to avoid fragmenting newlyadded files. It adds extra space after major datastructures so that they can grow without immediatelybecoming fragmented again.
You can optimize your boot volume manually by usingthe Optimize option in the Performance window.
You can also configure Norton 360 to defragment yourboot volume or the local disk that contains boot volumewhen your computer is idle. Norton 360 automaticallyschedules the optimization when it detects theinstallation of an application on your computer. Theoptimization process starts next time when yourcomputer is idle. You can use the IdleTimeOptimizeroption in the Administrative Settings window tooptimize the boot volume during idle time.
Optimizing your boot volume
The Optimize option lets you optimize your bootvolume to improve the boot time of your computer.Optimization of your boot volume maximizes the usablefree space by rearranging file fragments into adjacentand contiguous clusters. When the drive head of yourhard drive accesses all of the file data in one location,the file is read into the memory faster.
When you use the Optimize option in Windows XP,Norton 360 optimizes only the boot volume (forexample, C:\Windows). Therefore, it requires less timeto complete optimization. However, when you use theOptimize option in Windows Vista or Windows 7,Norton 360 optimizes the drive that contains the bootvolume. Therefore, it requires more time to completeoptimization.
You can access the Optimize option at the top of thesecurity status graph in the Performance window. Youcan also optimize your boot volume using the Insight
Monitoring your system's performanceAbout System Insight
74
Optimizer option in the Norton Tasks window. TheInsightOptimizer row in the background jobs list thatis available in the Norton Tasks window displays thedetails of the boot volume optimization process. Youcan view details such as timestamp, duration, andstatus of the background job.
To optimize your boot volume from the Performancewindow
1 In the Norton 360 main window, click Performance.
2 In the Performance window, at the top of thesecurity status graph, click Optimize.
To optimize your boot volume from the Norton Taskswindow
1 In the Norton 360 main window, click Performance.
2 In the Performance window, click Norton Tasks.
3 In the Norton Tasks window, under the NortonTasks column, click the Play icon that appearsbefore Insight Optimizer.
About the Idle Time Optimizer
Idle Time Optimizer lets you configure Norton 360 todefragment your boot volume or the local disk thatcontains boot volume when your computer is idle.Norton 360 automatically schedules the optimizationwhen it detects the installation of an application onyour computer and your computer is idle. If you startusing your computer again, Norton 360 stops theoptimization task, and starts optimizing the next timethat your computer is idle. This way, the backgroundjob of optimization does not affect the performance ofyour computer.
Optimization rearranges file fragments into adjacentor contiguous clusters in the hard disk. It improves thecomputer performance by reading the files into thememory faster. Optimization also maximizes the usablefree space on a disk by grouping most frequently usedfiles and infrequently used files. In addition, it
75Monitoring your system's performanceAbout System Insight
consolidates free space to avoid fragmenting newlyadded files.
You must turn on the Idle Time Optimizer optionunder AdministrativeSettings in the Settings windowto optimize the boot volume during idle time. Bydefault, this option is turned on.
Turning off or turning on Idle Time Optimizer
Norton 360 automatically schedules the optimizationwhen it detects the installation of a new applicationon your computer. Norton 360 runs this optimizationonly when your computer is idle.
You must turn on the Idle Time Optimizer optionunder AdministrativeSettings in the Settings windowto optimize the boot volume during idle time. Bydefault, this option is turned on.
To turn off Idle Time Optimizer
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
3 In the Idle Time Optimizer row, move the On/Offswitch to the right to the Off position.
4 Click Apply, and then click Close.
To turn on Idle Time Optimizer
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
3 In the Idle Time Optimizer row, move the On/Offswitch to the left to the On position.
4 Click Apply, and then click Close.
About the Norton TasksThe NortonTasks window provides an interface whereyou can view and monitor all Norton-specificbackground tasks. Norton 360 runs most of thebackground tasks when your computer is idle. The
Monitoring your system's performanceAbout System Insight
76
Norton Tasks window provides the details of thebackground tasks that Norton 360 performs.
The details include things such as:
1 The name of the background task
You can use the icon that appears before the nameof a background job to start or stop a backgroundtask. You can start or stop a background task at anytime.
1 The timestamp of the background task
You can view details such as the date on which thebackground job last ran and the time. The detailshelps you decide whether to start a background taskor wait for Norton 360 to run the job during idletime.
1 The duration of the background task
You can view the length of time that a backgroundtask ran the last time. The details also help youdetermine the length of time a background tasktakes to complete if you start it.
1 The background task has run during idle time ornot
This detail helps you determine if a task has alreadyrun during idle time or you should run it.
1 The status of the background task
You can view details about the completion of thetask. You can also determine the type of power thata background task needs to complete.
In addition to viewing and monitoring the backgroundtask details, you can specify the IdleTimeOut duration.After the Idle Time Out duration is reached, Norton360 identifies the computer as idle and run thebackground tasks. You can use the Idle Countdownbar to confirm the idle state of your computer. You canview the CPU graph and memory graph to obtain theperformance data of your computer.
You can also manually turn on Silent Mode for aspecified duration.
77Monitoring your system's performanceAbout System Insight
Monitoring background jobs of Norton 360
The Norton Tasks window provides the details of thebackground tasks that Norton 360 performs and letsyou view and monitor the background tasks. Norton360 runs most of the background tasks when yourcomputer is idle. Performing all background tasks whenyour computer is idle helps your computer to run atpeak efficiency when you use your computer. However,you can manually start or stop a task at any time. Youcan also specify the Idle Time Out duration. After theIdle Time Out duration is reached, Norton 360identifies the computer as idle and run the backgroundtasks. You can use the IdleCountdown bar to confirmthe idle state of your computer. You can also view theCPU graph and memory graph to obtain theperformance data of your computer.
To monitor background jobs
1 In the Norton 360 main window, click Performance.
2 In the Performance window, click Norton Tasks.
3 In the Norton Tasks window, view the details ofbackground jobs.
4 Do one of the following:
1 To run a background job, click the Play icon thatappears before the name of the background job.
1 To stop a running background job, click the Stopicon that appears before the name of thebackground job.
5 Click Close.
About Norton InsightNorton Insight allows the smart scanning of files onyour computer. It improves the performance of Norton360 scans by letting you scan fewer files withoutcompromising the security of your computer.
Monitoring your system's performanceAbout System Insight
78
A Norton 360 scan can identify threats on yourcomputer in the following ways:
At regular intervals, Norton 360obtains definition updates fromSymantec. These updatescontain signatures of knownthreats. Each time when Norton360 obtains the definitionupdates, it performs a scan of allof the files that are available onyour computer. It compares thesignature of the files against theknown threat signatures toidentify threats on yourcomputer.
The Blacklist technique
79Monitoring your system's performanceAbout System Insight
Norton 360 obtains specificinformation about the Files ofInterest and submits theinformation to Symantec duringidle time. The informationincludes things such as filename, file size, and hash key.Symantec analyzes theinformation of each File ofInterest and its unique hashvalue and provides a confidencelevel to the file. The Symantecserver stores the hash value andconfidence level details of theFiles of Interest. The serverprovides the details immediatelyafter you open the NortonInsight - Application Ratingswindow. Even the slightestmodification of the file causes achange in the hash value and theconfidence level of the file.Typically, most Files of Interestbelong to the operating systemor known applications, and theynever change. These files do notrequire repeated scanning ormonitoring. For example,Excel.exe is a file that neverchanges but you always scan itduring a normal security scan.
The Whitelist technique
Symantec assigns the following confidence levels toFiles of Interest:
Symantec analyzes the file astrusted based on the fileinformation that Norton 360sends to Symantec.
Norton Trusted
Monitoring your system's performanceAbout System Insight
80
Symantec analyzes the file asgood based on the statisticalevaluation that is done on thefiles that are available within theNorton Community.
Good
Symantec does not have enoughinformation about the file toassign a trust level to the file.
Unproven
Symantec has only a fewindications that the file is nottrusted.
Poor
Symantec has high indicationsthat the file is not trusted.
Bad
Norton 360 also provides different profiles to configureyour scan performance. When you use the Full Scanprofile, Norton 360 follows the Blacklist technique toscan your computer. It scans all of the files on yourcomputer against the signatures that it obtained duringdefinition updates. When you use the Standard Trustor HighTrust profile, Norton 360 follows the Whitelisttechnique to scan the files based on their confidencelevel. This way, Norton 360 significantly reduces thetime that is required to scan your computer completelyfor security threats.
The Whitelist technique that Norton Insight uses alsohelps in heuristic detection of suspicious applications.Normally, the execution behavior of well-knownapplications appears identical to the execution behaviorof unknown applications. Such behavior results in falseidentification of good applications as suspicious, andtherefore, necessitates security applications tomaintain a low heuristic detection threshold. However,keeping a low detection threshold does not provide acomplete heuristic protection against maliciousapplications. Norton 360 uses the Whitelist technique
81Monitoring your system's performanceAbout System Insight
that helps maintain a high heuristic detectionthreshold. It excludes well-known applications fromheuristic detection to prevent false detection ofwell-known applications and to ensure a high detectionrate of malicious applications.
Viewing the files using Norton Insight
Norton Insight provides information about the Files ofInterest that are available on your computer. Norton360 lets you view specific categories of files based onthe option that you select in the Norton Insight -Application Ratings window.
The drop-down list that is available in the NortonInsight - Application Ratings window provides youthe following options:
Lists the processes that runon your computer at thatpoint in time when youselected this option
All Running Processes
Lists the Files of InterestAll Files
Lists the programs that startwhen you start yourcomputer
Startup Items
Lists all the files andprograms that are currentlyloaded on to the programmemory space
All Loaded Modules
Monitoring your system's performanceAbout System Insight
82
Lists the programs thatconsumemaximumresourcesof your computer
Norton 360 displays a list oftop 10 resources that highlyaffect the performance ofyour computer.
Highest Performance Impact
Lists the files that have themaximum community usage
Highest Community Usage
Lists the files that youinstalled most recently
The list contains the files thatyou installed in the last 30days after you installedNorton 360.
Most Recently Installed
Lists the Files of Interest thatyou manually trusted in theFile Insight window
This category does not listthe files that do not belongto the File of Interest even ifyou manually trust the files.However, Norton 360excludes all of the manuallytrusted files from Norton 360scan when you configureScan Performance Profilesto High Trust.
You can also remove the usertrust from all of the Files ofInterest that you manuallytrusted. You can use theClear All User Trust optionnext to the drop-down list toremove the user trust.
User Trusted Files
83Monitoring your system's performanceAbout System Insight
Lists the files that have theconfidence level as NotTrusted
You can manually trust all thefiles that are not trusted byclicking the Trust All Filesoption next to the drop-downlist.
Untrusted Files
You can view file details such as file name, trust level,community usage, resource usage, and the date onwhich the file was installed. There may be instanceswhen the trust level of a file has changed or a processrunning might have stopped running. You can refreshthe Norton Insight - Application Ratings window toupdate the file list, file details, and coveragepercentage. The coverage meter provides a graphicalrepresentation of the percentage of the Norton TrustedFiles and the total Files of Interest. The higher thepercentage, the lesser time the scan takes.
To view the files using Norton Insight
1 In the Norton 360 main window, move the mousepointer over PC Security, and click Run NortonInsight.
2 In the Norton Insight - Application Ratingswindow, select an option from the drop-down listto view a category of files.You may need to scroll the window to view all thefiles that are listed in the details area.
3 Click Close.
To refresh the list of files
4 In the Norton Insight - Application Ratingswindow, click Refresh.
Checking the trust level of a file
Norton Insight lets you check the details of the Filesof Interest that are available on your computer. You
Monitoring your system's performanceAbout System Insight
84
can view details such as signature of the file and thedate on which the file was installed. You can also viewdetails such as the trust level, community usage,resource usage, and the source of the file. You can usethe Locate this file option to find the location of thefile on your computer. When you right-click a file thatis available on your computer, the shortcut menudisplays Norton 360 option and then Norton FileInsight option. You can use the options to check thedetails of a File of Interest.
w Norton 360 displays the Norton File Insight optiononly when you right-click a File of Interest. In WindowsSafe mode, you cannot access this option for any file.Norton 360 also categorizes any file for which you openthe File Insight window to view details as a File ofInterest.
The Symantec server stores the hash value and trustlevel details of the File of Interest. The server providesthe file details immediately after you open the NortonInsight - Application Ratings window. However, youcan use theCheckTrustNow option in the FileInsightwindow to update the trust value of a file. You can alsomanually trust any well-known files. You can changethe trust level of any file to User Trusted other thanthe files that are Norton Trusted.
You can determine the resource usage of a file that isavailable on your computer. The File Insight windowdisplays the CPU graph and the system resource usagedetails for the running processes. The graph shows thebreakdown of overall system CPU usage and the CPUusage or memory usage by the process.
To check the trust level of a file
1 In the Norton 360 main window, move the mousepointer over PCSecurity, and then click RunNortonInsight.
2 In the Norton Insight - Application Ratingswindow, click a file for which you want to check thedetails.
85Monitoring your system's performanceAbout System Insight
3 In the File Insight window, view the details of thefile.
4 Click Close to close the File Insight window.
To check the trust level of a specific file
1 In the Norton 360 main window, move the mousepointer over PCSecurity, and then click RunNortonInsight.
2 In the Norton Insight - Application Ratingswindow, click Check a Specific File.
3 Browse to the location of the file for which you wantto check the details.
4 Select the file, and then click Open.
5 In the File Insight window, view the details of thefile.
6 Click Close to close the File Insight window.
To refresh the trust level of the file
4 In the File Insight window, click CheckTrustNow.
Configuring the Scan Performance Profiles
The Scan Performance Profiles settings let youconfigure how Norton 360 should scan your computerbased on the digital signature and confidence level ofthe files. To make Norton 360 scans lighter, faster, andmore effective, you can exclude from scans the filesthat have known digital signatures or high confidencelevels.
You can configure the Scan Performance Profilessettings to do the following:
1 Configure to Full Scan to perform a complete scanof your computer.
The complete scan includes a scan of all files onyour computer irrespective of the confidence levelor digital signature of the files.
1 Configure to StandardTrust to perform a scan thatexcludes the files that are Norton Trusted.
Monitoring your system's performanceAbout System Insight
86
Norton 360 scans the files that have a confidencelevel other than Norton Trusted.
1 Configure to High Trust to perform a scan thatexcludes the files that have known digital signaturesor high confidence levels.
Norton 360 does not scan the files that haveconfidence level as Norton Trusted or User Trusted.It also excludes the Good files with high confidencelevel from the scan. It scans the files withconfidence levels as Poor Trust, Unproven Trust,Bad Trust, and the files without a class 3 digitalsignature.
You must configure the Scan Performance Profilessettings before you run a scan or before a scan isscheduled to run. Norton 360 scans your computeraccording to the configuration you specified in theScan Performance Profiles settings.
To configure Scan Performance Profiles
1 In the Norton 360 main window, click Settings.
2 In the Settings window, click Antivirus.
3 On the ScansandRisk tab, in the ScanPerformanceProfiles row, drag the slider to one of the settings.Your options are:
1 Full Scan
1 Standard Trust
1 High Trust
4 In the Settings window, click Apply.
To configure ScanPerformanceProfiles from theNortonInsight - Application Ratings window
1 In the Norton 360 main window, move the mousepointer over PCSecurity, and then click RunNortonInsight.
87Monitoring your system's performanceAbout System Insight
2 In the Norton Insight - Application Ratingswindow, in the ScanPerformanceProfiles row, dragthe slider to one of the settings. Your options are:
1 Full Scan
1 Standard Trust
1 High Trust
3 Click Close.
About Monthly ReportMonthly Report lets you view a summary of whatNorton 360 has done for you. Norton 360 displays themonthly report every 30 days after you install yourproduct. After 30 days of installation, Norton 360displays the Monthly Report automatically. If you donot want Norton 360 to display the Monthly Reportautomatically, you can select the Do not displaymonthly reports automatically option in the Norton360 Monthly Report window.
You can view the Monthly Report using the CheckMonthly Report option that is present in the MyAccount window.
Norton 360 lets you turn off or turn on Monthly Reportfrom the AdministrativeSettings window. The Norton360 Monthly Report window displays the Tip of themonth to recommend some of the product’s featuresand services.
When your product expires after the trial period,Monthly Report displays the activation status of yourproduct. However, when your product expires after thesubscription period, Monthly Report displays thesubscription status of your product.
Monitoring your system's performanceAbout System Insight
88
Norton 360 provides reports based on the followingcategories:
Lets you view the details of thevarious attacks your PC isprotected from
For example, you can view thetotal number of viruses andspyware from which you areprotected.
PC Security
Lets you view the details ofAntiphishing activities
For example, you can view thetotal number of knownauthenticated sites that youvisited.
Identity Protection
Lets you view the details ofBackup activities
For example, you can view thetotal number of files that youbacked up on drive C of yourcomputer.
Backup
Lets you view the details of PCTuneup activities
For example, you can view thetotal number of Internet Explorertemporary files and Windowstemporary files that areremoved.
PC Tuneup
Monthly Report lets you view the latest news onInternet security and also provides information on howto stay safe while you are online. You can click the ReadMore option in the Norton 360 Monthly Reportwindow to view more information on how to stay safeonline.
89Monitoring your system's performanceAbout System Insight
Viewing the Monthly Report
The Monthly Report lets you view how Norton 360protected you for the past 30 days. This report includesdifferent activities that Norton 360 performed toprotect your computer.
The Monthly Report provides information about thefollowing activities:
1 The total number of threats that Norton 360detected on your computer.
1 The total number of phishing and authenticatedWeb sites that you visited.
1 The total number of files that you backed up.
1 The total number of unwanted files and the obsoleteWindows registry entries that are removed.
If you do not want Norton 360 to display the MonthlyReport automatically, you can do one of the following:
1 Select the Do not display monthly reportsautomatically option in the Norton 360 MonthlyReport window.
1 Turn off the Monthly Report option in theAdministrative Settings window.
To view the Monthly Report
1 In the Norton 360 main window, click Account.
2 In the My Account window, click Check MonthlyReport.
3 Click Close.
Monitoring your system's performanceAbout System Insight
90
This chapter includes the following topics:
1 About total protection
1 About keeping your computer secure
1 About solving connection problems
1 About responding to emergencies
1 About monitoring protection features
1 About viewing details of system vulnerabilities
About total protectionNorton 360 offers total protection of your PC thatincludes Antivirus and Spyware Protection, onlineidentity theft protection, backup, and PC tuneupcapabilities. It provides a complete protection againsta wide range of threats, leaving you free to work andplay confidently on your PC.
After you install Norton 360 and set up a backupstorage destination, it then does all the rest. You donot have to do anything else to be protected. However,Norton 360 also lets you customize your firewallsettings or adware protection, or set your own schedulefor automatic activities.
3Maintaining totalprotection
Norton 360 is grouped into the following fourcategories of protection:
Blocks and removes virusesand spyware from email anddownloaded sites, protectsagainst emerging threats,scans, cleans emailattachments, and securesconnections and datatransmission between yourcomputer and the Internet
PC Security
Helps to guard againstidentity theft, verifiesauthenticity of Web sites
Identity Protection
Backs up all your importantfiles and data to a variety ofstorage locations
Backup
Finds and fixes commoncomputer problems, cleansup unwanted cookies andfiles, and defragments thehard disk to optimize PCperformance
PC Tuneup
About keeping your computer secureNorton 360 automatically protects your PC when youinstall it and updates itself regularly to maintainprotection. However, you can increase the security ofyour PC further by learning how to avoid threatsagainst your PC and your data.
To avoid email threats, do the following:
1 Open only those email attachments that come froma trusted source and that you expect to receive.
Maintaining total protectionAbout keeping your computer secure
92
1 Delete all unwanted messages without openingthem.
1 Do not respond to email that you suspect is spam.Delete it.
1 Be wary of any email that requests confidentialinformation, and confirm the authenticity of therequest before you reply.
To protect yourself from phishing attempts, do thefollowing:
1 When you visit a Web site, type the address directlyinto your browser rather than clicking a link.
1 Provide personal information only on trusted sites.Examples include the sites that have "https" in theWeb address or that have a lock icon at the bottomof the browser window.
1 Do not provide personal information to anyunsolicited requests for information.
To avoid viruses, worms, and Trojan horses, do thefollowing:
1 Transfer files to your PC only from a well-knownsource or a trusted source.
1 Do not send or receive files over instant messagingconnections.
1 Terminate an instant messaging connection if aperson on your buddy list sends strange messages,files, or Web links.
To avoid spyware, do the following:
1 Do not approve suspicious error messages fromwithin your Web browser.
1 Be suspicious of "free deal" offers because spywaremay come as part of such a deal.
1 Carefully read the End User License Agreement forthe programs that you install. Also, do not installa program if other programs are installed as partof the required program.
93Maintaining total protectionAbout keeping your computer secure
About solving connection problemsNorton 360 uses an Internet connection to supportseveral of its protection features. If you use a proxyserver to connect to the Internet, you must configurethe proxy settings of Norton 360. You can configureNetwork Proxy Settings in the AdministrativeSettingswindow.
If you cannot connect to the Internet after you installNorton 360, you can use the Support features to helpyou troubleshoot your connection problem.
About responding to emergenciesNorton 360 automatically downloads definition updatesregularly and secures your computer from latestviruses and unknown threats. In addition, Norton 360monitors your Internet activities to protect yourcomputer from the Internet-based threats that exploitsoftware vulnerabilities.
However, security issues can arise, and you need todecide which action to take.
If you think that your computer is infected with a virusor with destructive software, you can take the followingactions:
Helps you to scan the possiblevirus-infected areas of acomputer that the viruses andother security risks often target
Because this scan does not scanyour entire computer, it takeslesser time to run than a FullSystem Scan.
Quick Scan
Maintaining total protectionAbout solving connection problems
94
Checks all boot records, files,and running programs to protectyour computer from viruses andspyware
It also runs other tasks (such asLiveUpdate, Cleanup, DiskOptimization, and Backup) toprovide a high level of protectionand improve the performance ofyour computer. Consequently,when you run a Full System Scanwith administrator privileges, itscans more files than when yourun it without administratorprivileges. This scan might takemore time than the other scans.
Full System Scan
Checks for vulnerabilities andrisks, and protects yourcomputer by running thefollowing checks:1 LiveUpdate
1 Virus and Spyware Scan
1 InternetExplorer TemporaryFiles
1 Windows Temporary Files
1 Internet Explorer History
1 Disk Optimization
1 Registry Cleanup
1 Backup
Custom Scan
When you right-click a folder, the shortcut menudisplays Norton 360 and then Scan Now option. Youcan use this command to scan any particular folder.
When you right-click a file, the shortcut menu displaysNorton 360 and then Insight Network Scan option.You can use this command to scan a file using bothlocal definitions and definitions that are hosted in theCloud.
95Maintaining total protectionAbout responding to emergencies
About monitoring protection featuresYour Symantec product maintains records of allprotection-related actions that it takes and theactivities that it monitors. You can review the historyand the logs through Security History. You can viewsummary and results of activities and scans. You canalso monitor other security tasks.
About Security HistorySecurity History provides a centralized location inwhich you can do the following activities:
1 View the summary of alerts and event messages.
1 View the results of scans that are run on yourcomputer.
1 View the items that you submitted to SymantecSecurity Response.
1 Manage Quarantine items.
1 Monitor the security tasks that your productsperform in the background.
Security History lets you monitor the security tasksthat your product performs in the background. Inaddition, the alerts that you receive can be reviewedat any time in Security History. If you cannot reviewan alert when you receive it, you can review it later inSecurity History.
The alerts, scan results, and other security items thatare related to various product features appear undertheir respective categories in the Security Historywindow. For example, the security items that arerelated to the Quarantine feature appear under theQuarantine category. In addition, the SecurityHistorywindow displays details of each item in the Detailspane.
Based on their functionalities, Security History broadlyorganizes all categories into the All Activity,ComputerProtection, Internet, Miscellaneous, or PCTuneup groups.
Maintaining total protectionAbout monitoring protection features
96
By default, the following information categories areavailable in the Security History window:
1 Recent History
1 Full History
1 Scan Results
1 Resolved Security Risks
1 Unresolved Security Risks
1 Quarantine
1 SONAR Activity
1 Firewall – Network and Connections
1 Firewall – Activities
1 Intrusion Prevention
1 Download Insight
1 AntiSpam
1 Email Errors
1 Sites reported to Symantec
1 Identity
1 Norton Community Watch
1 Norton Product Tamper Protection
1 Silent Mode
1 Norton Error Reporting
1 Performance Alert
1 Registry Cleanup
1 File Cleanup
1 Disk Optimization
1 Backup
1 LiveUpdate
You can view the security items based on the categoryof events that you select and the search string that youprovide. Norton 360 restricts the number of searchresults that appear on each page in the SecurityHistory window. Therefore, Security History dividesthe items that are returned for any search criteria anddisplays them on separate pages. You can use the
97Maintaining total protectionAbout monitoring protection features
pagination scroll at the bottom of the window tonavigate to different pages sequentially. In case youwant to view a specific page, you can use the Gotopageoption to open the page. The maximum number ofitems that appear per page is 100.
Norton 360 also lets you save the security eventshistory. You can view the security event informationwhenever you want. If you want to analyze the securityevents for a particular day, you can save the SecurityHistory logs for that day. You can later import the fileinto Security History and analyze the data.
Viewing items in Security History
Security History provides a record of all the activitiesthat Norton 360 performed on your computer.
You can view all the activities including:
1 Security History alerts and event messages
1 Results of different scans
1 Information that you submitted to SymantecSecurity Response
1 Quarantined items
1 Norton 360 firewall activities
1 Norton 360 PC Tuneup activities
1 Norton 360 backup and restore activities
1 Security tasks that Norton 360 performed in thebackground
The items that are related to the various productfeatures appear under their respective categories inthe SecurityHistory window. For example, the securityitems that are related to the Quarantine feature appearunder Quarantine category in the Security Historywindow. In addition, the Security History windowdisplays details of each item in the respective category.
To view items in Security History
1 In the Norton 360 main window, click Tasks.
Maintaining total protectionAbout monitoring protection features
98
2 In the Tasks window, under General Tasks, clickCheck Security History.
99Maintaining total protectionAbout monitoring protection features
3 In SecurityHistory window, in the Show drop-downlist, select the category of items that you want toview. Your options are:
The Recent History view inthe Security History window
Recent History
displays the alerts that youreceived during the last sevendays. It lists the history ofcertain recent securityevents.
The Full History view in theSecurity History window
Full History
displays the completeSecurity History.
You can scan your computerto check if any virus, spyware,
Scan Results
malware, or security risk hasinfected your computer.
The Scan Results view in theSecurity History windowdisplays the details about thescans that are run on yourcomputer.
Maintaining total protectionAbout monitoring protection features
100
The security risks include thesuspicious programs that cancompromise the security ofyour computer.
The Resolved Security Risksview in the Security Historywindow displays a list ofsecurity risks that Norton 360has detected and thenrepaired, quarantined, orremoved. The quarantineditems are listed in theQuarantine view. You canalso view the quarantineditems in theQuarantine view.
Resolved Security Risks
The security risks include thesuspicious programs that cancompromise the security ofyour computer.
The Unresolved SecurityRisks view in the SecurityHistorywindow displays a listof security risks that Norton360 was not able to repair,remove, or quarantine.
Security History does not letyou clear logs for theunresolved security risks.
Unresolved Security Risks
101Maintaining total protectionAbout monitoring protection features
The Security HistoryQuarantine provides a safelocation on your computerwhere you can isolate itemswhile you decide an action totake on them.
The Quarantine view in theSecurity History windowdisplays all of the securityrisks that are isolated in theSecurity History Quarantine.
Quarantine
Symantec Online Network forAdvanced Response (SONAR)identifies new threats basedon the suspicious behavior ofapplications. SONAR detectsand protects your computeragainst malicious code evenbefore virus definitions areavailable throughLiveUpdate.
The SONAR Activity view inthe Security History windowdisplays details about thesecurity risks that SONARdetects. This category alsolists any activity thatmodifies the configuration orthe settings of yourcomputer.
The More Details option forthis category provides detailsabout the resources that thisactivity affects.
SONAR Activity
Maintaining total protectionAbout monitoring protection features
102
The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.
The Firewall - Network andConnections category in theSecurity History windowdisplays information aboutthe networks that yourcomputer connects to. It alsodisplays the actions that youhave taken to trust or torestrict networks andcomputers.
This category also displays ahistory of all of the TCP/IPnetwork connections thatwere made with yourcomputer. Networkconnections are logged whenthe connection is closed.
The Security History -AdvancedDetailswindow forthis category lets you modifytrust or restrict settings forcomputers and networks.
Firewall - Network andConnections
103Maintaining total protectionAbout monitoring protection features
The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.The firewall maintains rulesto control Internet access toand from your computer.
The Firewall - Activities viewin the Security Historywindow displays the rulesthat firewall creates. Therules that you create alsoappear in this view.
The Security History -AdvancedDetailswindow forthis category shows thecreated Program rules. It alsolets you allow a blockedprogram rule.
Firewall - Activities
Intrusion Prevention scans allthe network traffic thatenters and exits yourcomputer for known threats.
The Intrusion Preventionview in the Security Historywindow displays detailsabout recent IntrusionPrevention activities.
The Security History -AdvancedDetailswindow forthis category lets you controlwhether or not to be notifiedwhen Intrusion Preventiondetects an IntrusionPrevention signature.
Intrusion Prevention
Maintaining total protectionAbout monitoring protection features
104
Download Insight processesany executable file that youdownload for analysis of itsreputation level. It theninforms you about theprocessing results based onthe Download Insightsettings.
The Download Insight viewin the Security Historywindow displays details of allevents that Download Insightprocesses and notifies. Thisview also containsinformation about the actionsthat you take based on thereputation data of the events.
Download Insight
Norton AntiSpam protectsyour computer from exposureto unsolicited email.
The AntiSpam view in theSecurity History windowdisplays details about theemail messages thatAntiSpam has processed.
AntiSpam
105Maintaining total protectionAbout monitoring protection features
Email errors include anyfailure that occurs whenNorton 360 tries to send,download, or scan an emailmessage that you send orreceive.
The Email Errors view in theSecurity History displaysdetails about any Email Erroralerts that you receive whenan Email error occurs. Detailsinclude the Error ID and theErrormessage. This view alsodisplays information aboutsubject, sender address, andthe recipient address that arerelated to the email messagein the alert.
Email Errors
In some cases, you mighthave submitted evaluation ofcertain Web pages toSymantec.
This view in the SecurityHistory window displays allthe Web sites that youreported to Symantec toverify authenticity.
Sites reported to Symantec
Maintaining total protectionAbout monitoring protection features
106
The various features ofIdentity Safe help youmanage your identities andprovide additional securitywhile you perform onlinetransactions.
The Identity view in theSecurity History windowdisplays the Antiphishingdefinitions that Norton 360downloads when you runLiveUpdate to obtain thelatest virus definitions.
Identity
The Norton CommunityWatch feature lets yousubmit any suspicioussecurity or suspiciousapplication data to Symantecfor analysis. Symantecassesses the data todetermine the new threats.
The Norton CommunityWatch view in the SecurityHistorywindow displays a listof files that you havesubmitted to Symantec foranalysis. Files, at variousstages of submission, alsoappear in the list.
Norton Community Watch
107Maintaining total protectionAbout monitoring protection features
Norton Product TamperProtection lets you protectyour Norton product from anyattack or modification byunknown, suspicious, ormalicious applications.
The Norton Product TamperProtection view in theSecurity History windowdisplays details aboutunauthorized attempts tomodify Symantec processes.The tasks that your Symantecproduct blocks also appear inthe list.
Norton Product TamperProtection
SilentMode suppresses alertsand notifications andtemporarily suspends mostof the background activities.
The Silent Mode view in theSecurity History windowdisplays the summary of theSilent Mode sessions.
The summary includes thefollowing information:1 The type of Silent Mode
such as Silent Mode orQuiet Mode
1 The type of program thatturns on Silent Mode suchas disk burning or TVrecording
1 The name ofUser-Specified programthat turns on Silent Mode
1 Whether Silent Mode isturned on or turned off
Silent Mode
Maintaining total protectionAbout monitoring protection features
108
Errors occur in some cases.For example, an error canoccur when you runLiveUpdate or scan a Webpage. Engine errors, timeouterrors, and program errorsare some of the types oferrors.
The Norton Error Reportingview in the Security Historywindow displays any errorthat Norton 360 hasgenerated.
Norton Error Reporting
The performance alertfeature lets you view,monitor, and analyze theimpact of the systemactivities on your computer.
The Performance Alert viewin the Security Historywindow provides detailsabout the impact of theprocesses that run on yourcomputer. The details includethe process name, theresources used, the extent ofresource utilization, and theoverall impact of the processon your computer. Inaddition, logs related toperformance alerts and theprograms that you haveexcluded from performancealerts also appear in the list.
Performance Alert
109Maintaining total protectionAbout monitoring protection features
The windows registry cancontain the entries that referto files that do not exist. Suchbroken registry items canslow down your computer.Registry Cleanup scans yourcomputer and cleans anybroken registry entries thatit finds.
TheRegistry Cleanup view inthe Security History windowdisplays the list of theRegistry Cleanup activitiesthat been performed in yourcomputer.
Registry Cleanup
The File Cleanup featureremovesunwanted temporaryfiles including leftoverInternet browser files,Internet search words, andother temporary files.
The File Cleanup view in theSecurity History windowshows the list of the FileCleanup activities that wereperformed on your computer.
File Cleanup
Disk optimization is a processin which the physicallocations of files arestreamlined. Files andmetadata are re-arranged toimprove data access time.
The disk optimization view inthe Security History windowshows the list of the diskoptimization activities thatwere performed on yourcomputer.
Disk Optimization
Maintaining total protectionAbout monitoring protection features
110
TheBackup view displays thelist of the backup and restoreactivities that you performed.
Backup
LiveUpdate obtains the latestvirus definition updates andthe program updates to allthe Symantec products thatyou installed on yourcomputer. These updatesprotect your computer fromnewly discovered threats.
The LiveUpdate view in theSecurity History windowshows the details of theLiveUpdate activities on yourcomputer. The details includethe severity, the status, andthe duration of theLiveUpdate sessions on yourcomputer.
LiveUpdate
4 Click a row to view details for that item.If you want to view additional information, clickMoreDetails. You can view the advanced details inthe Security History-Advanced Details windowand take actions as needed. For some categories, theMoreDetails option opens the File Insight windowthat displays the details about the selected SecurityHistory event. You must use the Options link in theSecurity History window to select an action thatNorton 360 must perform on any item in thesecategories. The Options link is also available in theFile Insight window for certain items.
About the Details window
The SecurityHistory -AdvancedDetails window letsyou view more information about the items that youselect in the various Security History views. You can
111Maintaining total protectionAbout monitoring protection features
also perform any action that is available for the selecteditem.
The following table lists the categories that providethe advanced details about the Security History items:
Displays the followinginformation about the item:1 Severity
This category displays therisk level of the selecteditem. The various levels ofsecurity risks are High,Medium, Low, and Info.
1 Activity
This category displays theactivity that has causedSecurity History to identifythe item as a security threat.
1 Date & Time
This category displays thedate and time of the activity.
1 Status
This category displays thestatus of the action that hasbeen taken on the item.
1 Recommended Action
This category displays theactions that you should taketo resolve the security threat.
Alert Summary
Displays the detailedinformation of the item
Some of the detailed informationincludes risk level, risk category,submission date of the risk, riskstatus, risk description, andrecommended actions for theitems.
Advanced Details
Maintaining total protectionAbout monitoring protection features
112
Displays the actions that areavailable for the selected item
The options in the Actions viewvary depending on the optionsthat are available in the Showdrop-down list in the SecurityHistory window.
The following are some of theActions options:1 Restore & exclude this file
This action returns theselected Quarantine item toits original location withoutrepairing it. The quarantineditem is also excluded frombeing detected in the futurescans.
This option is available in theQuarantine view.
1 Remove this file fromhistory
This action removes theselected Quarantine itemfrom the Security History log.
This option is available in theQuarantine view.
1 Submit to Symantec
This action sends theselected Quarantine item toSymantec. You can use thisoption if you suspect that anitem is infected, even if scanshave not identified it as arisk.
This option is available in theQuarantine view.
Actions
113Maintaining total protectionAbout monitoring protection features
Displays the links that providethe information that is relatedto the selected item
For some Security History items,this view lets you access therelevant settings pane of theNorton 360 window.
Risk Management
About the File Insight window
The File Insight window provides details about anyFile of Interest that is available on your computer. Thisoption of file analysis is available for the files that youdownload, scan, or use to perform an activity.
You can access the File Insight window in differentways. For example, you can use the variousnotifications, alerts, scan and performance-relatedwindows, and the shortcut menu of the various filesthat are present on your computer to open the window.Security History provides a centralized location whereyou can access the File Insight windows of the variousevents that are related to Security Risks, DownloadInsight, and Performance.
Maintaining total protectionAbout monitoring protection features
114
The File Insight window lets you view more details ofevents that belong to some of the following categoriesin the Security History window:
Lets you view the detailedinformation about the resolvedsecurity risks in an organizedway.
The Resolved Security Riskscategory includes the infectedfiles that Norton 360 repairs,removes, or quarantines. Thiscategory mostly includes themedium-level or the high-levelrisks that are either quarantinedor blocked.
The File Insightwindow providesdetails about the risk level, theorigin, and the activity report ofthe resolved security risks onyour system.
Resolved Security Risks
Lets you view the detailedinformation about theunresolved security risks in anorganized way.
The Unresolved Security Riskscategory includes the infectedfiles for which Norton 360 wasnot able to take any action. Thiscategory mostly includes thelow-level risks that require yourattention for a suitable action.
The File Insightwindow providesdetails about the risk level, theorigin, and the activity report ofthe unresolved security risks onyour system.
Unresolved SecurityRisks
115Maintaining total protectionAbout monitoring protection features
Lets you view the detailedinformation about quarantinedsecurity risks in an organizedway.
The Quarantine categoryincludes the infected files thatare isolated from the rest of yourcomputer while they await yourattention for a suitable action.
The File Insightwindow providesdetails about the risk level, theorigin, and the activity report ofquarantined security risks onyour system.
Quarantine
Lets you view the reputationdetails of a file that youdownload.
You can use these details todetermine the safety level of thefile and then decide the actionthat you want to perform.
Download Insight
Lets you view the performancedetails of any File of Interest thatis available on your computer.
The information includes thegeneral details, the origin andlineage information, theresource usage, and the actionsthat the file has performed onyour system.
Performance Alert
When you click the More link on the far right of a barin the File Insight window, Norton 360 displays vitalinformation in the details area. The informationincludes the general details, origin and lineageinformation, the resource usage, and the actions thatthe file has performed on your system. The following
Maintaining total protectionAbout monitoring protection features
116
bars in the File Insight window provide the variousdetails about a file:
Displays the information such asthe confidence level, communityusage of a file and how long agothe file was released.
You can view details such as thesignature and the date on whichthe file was created. You candetermine if a file is a startupfile and the date on which thefile was last used.
Details
Provides the lineage details of afile.
w If the lineage details of afile are not available, Norton 360disables this Origin bar.
Origin
Provides the details about theresource usage of a process andthe effect of the process on theoverall CPU utilization of yourcomputer.
Activity
In addition to viewing details, you can use the LearnMore link to access the online tutorial page to get moreinformation about the file. In some cases, you can usethe Locate this file option in the File Insight windowto find the location of the file on your computer. Thisoption is available only for certain security risks.Norton 360 might provide an icon next to the Locatethis file option. You can use this icon to copy the datafrom the File Insight window to the Clipboard. Afteryou copy the content to the Clipboard, you can open adocument, paste the data, and save the document.
The Options link is available in the FileInsight windowthat is related to certain security risks. You can use
117Maintaining total protectionAbout monitoring protection features
this link to select a suitable action to be performed onthe security risk.
About the Threat Detected window
The ThreatDetected window appears whenever Norton360 detects a security risk on your computer. You canuse this window to view details about the risk and selectan action for the risk. Sometimes, you may want toaccess the Threat Detected window for the same riskagain. In that case, the window can be opened at anytime from Security History. Security History is thecentralized location where you can access the ThreatDetected windows of risks that belong to some of thefollowing categories:
This category includes thesecurity risks or the infectedfiles that Norton 360 hasdetected and then repaired,quarantined, or removed.
Resolved Security Risks
This category includes thesecurity risks or the infectedfiles that Norton 360 was notable to repair, remove, orquarantine.
Unresolved SecurityRisks
This category includes thesecurity risk items that areisolated from the rest of yourcomputer while they await yourattention for a suitable action.
Quarantine
The action options in the ThreatDetected window fora risk vary depending on the risk type and its severity
Maintaining total protectionAbout monitoring protection features
118
level. The following are some of the options that areavailable in this window:
Returns the security risk that isquarantined to the originallocation on your computer
Restore
Returns the selected Quarantineitem to its original locationwithout repairing it and excludesthe item from being detected inthe future scans
Restore & exclude thisfile
Removes the security risk fromyour computer and quarantinesit
Remove this file
Excludes the security risk fromfuture scan
Exclude this program
Removes the selected securityrisk item from the SecurityHistory log
Remove from history
Takes you to the SymantecSecurity Response Web site
Get help
Sends the security risk toSymantec
Submit to Symantec
Searching in Security History
You can search the items that are listed in SecurityHistory. You can use the Quick Search option to finditems using a keyword or the name of a security risk.If you want to view all of the Security History itemsthat pertain to a particular security risk, you can filterthe items using QuickSearch. For example, if you want
119Maintaining total protectionAbout monitoring protection features
to view all of the alerts that Auto-Protect has generated,you can type Auto-Protect and filter the list.
You can clear the search results and return to thecurrent Security History list by clicking the black cross(x) icon in the Quick Search box.
The Quick Search option works on the current viewonly. If you want your search to include all of the itemsin Security History, you must select the Full Historyview.
To search in Security History
1 In the Security History window, in the QuickSearch text box, type the name of the item for whichyou want to search.
2 Click Go.
Exporting or Importing Security History information
Norton 360 lets you export the Security History eventsto a file. The Security History contents with summaryinformation of the events that you export get saved.You can view the security event information wheneveryou want.
For example, you can analyze the security events on aparticular day. You can use the Quick Search optionto obtain a list of all of the items that are related to aparticular security risk. You can then use the Exportoption to save the list in the Security History log. Youcan later import the log file and analyze the data.
Security History stores the information in a separatefile. When the file size reaches its maximum size limit,information that is related to new events overwritesthe information that is related to older events. You canexport the log periodically, if you want to keep theentire Security History information.
You can save your log file in one of the following fileformats:
1 Security History Log Files (.mcf)
Maintaining total protectionAbout monitoring protection features
120
The .mcf file format is the Security History Log Filesformat and is proprietary to Symantec.
When you use this file type option, you can viewthe file in the Security History window.
1 Text Files (.txt)
The data is saved in a comma-separated text format.
When you use this file type option, you can openand view the file externally without using SecurityHistory.
You can import only the log files that have .mcf fileextension. When you import a log file, the exported listof Security History information in the log file appears.This list replaces the current security events list. Youcan select an option in the Show drop-down list to viewthe option-specific details that are saved in the log file.To revert to the current Security History list you mustclose the log file.
To export Security History information
1 In the Norton 360 main window, click Tasks.
2 In the Tasks window, under General Tasks, clickCheck Security History.
3 In the Security History window, in the Showdrop-down list, select an option.
4 Click Export.
5 In the Save As dialog box that appears, navigate toa location and specify the name for the file.The category name in the Show drop-down listappears as the default file name. You can provide afile name of your choice.
6 In the Save as type box, select the format in whichyou want to save your log file.
7 Click Save.
To import Security History information
1 In the Norton 360 main window, click Tasks.
2 In the Tasks window, under General Tasks, clickCheck Security History.
3 In the Security History window, click Import.
121Maintaining total protectionAbout monitoring protection features
4 In the Open dialog box that appears, browse to thefolder that has the file you want to import.
5 Select the .mcf file and click Open.You can only open log files of .mcf format in theSecurity History window. You can open and viewlog files of .txt file externally without using SecurityHistory.In the import mode, you cannot make modificationsto the information. For example, you cannot clearthe logs. You can revert to the current SecurityHistory list by clicking the Closefile: file_name.mcflink.
Managing items in the Quarantine
The Security History Quarantine provides a safelocation on your computer where you can isolate itemswhile you decide an action to take on them.Quarantined items are isolated from the rest of yourcomputer so that they cannot spread or reinfect yourcomputer. In some cases, you may have an item thatyou think is infected, but is not identified as a risk bythe Norton 360 scans. You can manually place the itemin the Quarantine.
You cannot open quarantined items accidentally andspread the virus, but you can evaluate the quarantineditems for possible submission to Symantec.
The Security History Quarantine includes the followinggroups of items:
Includes the items suchas spyware and adwarethat are generally low riskand that another programrequires to functionproperly.
You can restore theseitems if necessary.
Security risks
Maintaining total protectionAbout monitoring protection features
122
Includes viruses andother high-risk items.
Security threats
Once an item has been quarantined, you have severaloptions. All of the actions that you take on quarantineditems must be performed in the Security HistoryQuarantine.
To perform an action on a quarantined item
1 In the SecurityHistory window, in the Quarantineview, select the item on which you want to performthe action.
2 In the right pane, click Options.You can use the More Details link to view moredetails about the item before you select an actionfor it. The link opens the File Insight window thatcontains more information about the risk.
123Maintaining total protectionAbout monitoring protection features
3 In the Threat Detected window, select the actionthat you want to perform. Some of the options are:
Returns the security risk thatis quarantined to the originallocation on your computer
This option is available onlyfor the detected viral threats.
Restore
Returns the selectedQuarantine item to itsoriginal location withoutrepairing it and excludes theitem from being detected inthe future scans
This option is available onlyfor the detected non-viralthreats.
Restore & exclude this file
Removes the selected itemfrom the Security History log
Remove from history
Sends the selected item toSymantec for evaluation ofthe security risk
In some cases, Norton 360might not identify an item asa security threat, but youmight suspect that the itemis infected. In such cases, youcan use this option to submitthe item to Symantec forfurther analysis.
Submit to Symantec
You can also navigate to this window by using theOptions link in the File Insight window for somerisks.
4 Follow the on-screen instructions.
Maintaining total protectionAbout monitoring protection features
124
Adding an item to the Quarantine
Security History Quarantine provides a safe locationon your computer in which you can isolate items whileyou decide an action to take on them.
The Quarantine view in the SecurityHistory windowdisplays a list of quarantined items. You can view thename and the risk status of each quarantined item.
You can manually add an item to the Security HistoryQuarantine. You can use the AddtoQuarantine optionin the Quarantine view in the SecurityHistory windowto quarantine the items that you suspect are infected.This action has no effect on the items that are alreadyquarantined.
w You cannot add a known Good File to Quarantine.
To add an item to the Quarantine
1 In the SecurityHistory window, in the Quarantineview, click Add to Quarantine.
2 In the Manual Quarantine dialog box, in theDescription text box, type a short name for the itemthat you want to add.This text appears in the Quarantine, so you shoulduse a recognizable description.
3 Click Browse.
4 In the Select File toQuarantine dialog box, browseto the item that you want to add, select it, and thenclick Open.
5 Click Add.
6 Click Close.
Restoring an item from the Quarantine
Some programs rely on other programs that areclassified as security risks to function. The programmay not function if a particular security file is removed.All of the removed security risks are automaticallybacked up in the Security History Quarantine. Thisway, Norton 360 lets you restore any risk to regain the
125Maintaining total protectionAbout monitoring protection features
functionality of a program that requires the riskprogram to run.
For example, a shareware or freeware program thatyou download may use adware to keep its price low. Inthis case, you can allow the security risk program toremain on your computer or restore it if SpywareProtection has removed it.
Some quarantined items are successfully disinfectedafter Norton 360 rescans them. You can also restoresuch items.
w If you restore an item to a directory other than itsoriginal location, it may not function properly.Therefore, it is recommended that you reinstall theprogram.
To restore an item from the Quarantine
1 In the SecurityHistory window, in the Quarantineview, select the item that you want to restore.
2 Click Options.
3 In the Threat Detected window, click Restore.In case of non-viral threats, you can use the Restore& exclude this file option. This option returns theselected Quarantine item to its original locationwithout repairing it and excludes the item frombeing detected in the future scans.
4 In the Quarantine Restore window, click Yes.In case of non-viral threats, you can use the optionthat is available in this window to exclude thesecurity risk. Norton 360 does not detect thesecurity risks that you exclude in the future scans.
5 Click Close.
Removing an item from the Quarantine
You can configure Norton 360 to remove a security riskfrom your computer. You can use the Remove this fileoption to remove the security risk and places it in theSecurity History Quarantine. Some programs may relyon the security risk item that you quarantine to
Maintaining total protectionAbout monitoring protection features
126
function. In this case, you can restore the security riskto regain the functionality of a program that requiresthe risk program to run.
w The Remove this file option is only available for thesecurity risks that are manually quarantined.
To remove an item from the Quarantine
1 In the SecurityHistory window, in the Quarantineview, select the item that you want to remove.
2 Click Options.
3 In the Threat Detected window, click Remove thisfile.This option is available for the security risks thatare manually quarantined.
4 In the Security Risk Removal window, clickRemove.
5 Click Finish.
Manually submitting an item to Symantec
When a virus or other risk is detected, it isautomatically submitted to Symantec SecurityResponse for analysis. If you have turned off the optionto submit risks automatically, you can manually submitthem from the Security History Quarantine. You musthave an Internet connection to submit an item.
When you submit files to Symantec automatically ormanually, you contribute to the effectiveness of yourSymantec product. For example, you can submit anitem that has not been detected during scanning thatyou believe may be a security risk. Symantec SecurityResponse analyzes the file. If it is identified as asecurity risk, it is added to a future definition update.
Personally identifiable information is never includedin submissions.
In some cases it is necessary for Symantec SecurityResponse to block submissions of a particular type orvolume. These items appear as Not Submitted inSecurity History.
127Maintaining total protectionAbout monitoring protection features
To manually submit an item to Symantec
1 In the SecurityHistory window, in the Quarantineview, select the item that you want to submit toSymantec.
2 Click Options.
3 In the Threat Detected window, click Submit toSymantec.
4 In the dialog box that appears, click OK.
About viewing details of systemvulnerabilities
The Intrusion Prevention feature of Norton 360provides a proactive solution to prevent the threatsthat might exploit the vulnerabilities of the programsor the operating system of your computer. Norton 360now provides the Vulnerability Protection featurethat enables you to view details of the protectionfeature against possible attacks on thesevulnerabilities. Vulnerability Protection displays anextensive list of the programs on your computer thatcontain vulnerabilities. In addition, it provides detailsabout the vulnerability and the solution that IntrusionPrevention provides to identify any attack on thevulnerability. You can use Vulnerability Protectionto view the correlation between the vulnerabilities thatyour computer is protected against and the programsthat may contain these vulnerabilities.
About Vulnerability ProtectionVulnerability Protection is a component of IntrusionPrevention System. Vulnerability Protection providesinformation about the susceptibility of the programsthat may be on your computer against maliciousattacks. It also provides information about the knownattacks that they are protected from.
Maintaining total protectionAbout viewing details of system vulnerabilities
128
Vulnerabilities are flaws in your programs or youroperating system that can create weaknesses in overallsecurity of your system. Improper computerconfigurations or security configurations also createvulnerabilities. External attackers exploit thesevulnerabilities and perform malicious actions on yourcomputer. Examples of such malicious attacks areactive desktop monitoring, keylogging, and hacking.Such attacks can slow down the performance of yourcomputer, cause program failure, or expose yourpersonal data and confidential information to thehackers.
Norton 360 provides the signature-based solutions toprotect your computer from the most common Internetattacks. Attack signatures contain the information thatidentifies an attacker’s attempt to exploit a knownvulnerability in your operating system or yourcomputer programs. The Intrusion Prevention featureof Norton 360 uses an extensive list of attack signaturesto detect and block suspicious network activity.
Vulnerability Protection lets you view the correlationbetween the vulnerabilities that your computer isprotected against and the programs that may containthese vulnerabilities. For example, if Internet Explorerdoes not handle certain HTTP responses, it can resultin a vulnerability that can be exploited. In this case,Vulnerability Protection lists Internet Explorer as avulnerable program. It also provides details about thesignatures that Intrusion Prevention uses to detect anyattempt to exploit this vulnerability.
Viewing the list of vulnerable programs
The Vulnerability Protection window lets you viewthe extensive list of programs with the knownvulnerabilities that Norton 360 protects you against.
For each program, you can view details such as thename of the program, its vendor, and the number ofvulnerabilities that the program contains. You can also
129Maintaining total protectionAbout viewing details of system vulnerabilities
view more details about the vulnerabilities by clickingon the program name.
To view the list of vulnerable programs
1 In the Norton 360 main window, click Tasks.
2 In the Tasks window, under General Tasks, clickCheck Vulnerability Protection.
3 After you finish viewing the list, click Close.
Viewing details about a vulnerable application
The VulnerabilityProtection window displays the listof the programs on your computer that are susceptibleto malicious attacks. In addition, you can view detailsof the vulnerabilities that a program contains. TheProgram Vulnerability Details window displays thenames of the attack signatures that IntrusionPrevention uses to detect any attempts to exploit thevulnerabilities in the program.
You can click an attack signature to get additionalinformation about the signature in the SymantecSecurity Response Web site.
The Intrusion Signatures window of IntrusionPrevention lets you view a list of attack signatures.Intrusion Prevention relies on this list of attacksignatures to detect and block suspicious activity. Youcan uncheck a signature from the list, if you do notwant Norton 360 to monitor the signature. TheProgram Vulnerability Details list does not includeany signature that you disable in the IntrusionSignatures window. By default, all the signatures inthe IntrusionSignatures window are turned on. Unlessyou have a good reason to disable a signature, youshould leave the signatures turned on. If you disable asignature, your computer may be vulnerable to attack.
To view details about a vulnerable application
1 In the Norton 360 main window, click Tasks.
2 In the Tasks window, under General Tasks, clickCheck Vulnerability Protection.
Maintaining total protectionAbout viewing details of system vulnerabilities
130
3 In the Vulnerability Protection window, in theProgram column, click the program name for whichyou want to view the details.
4 In the ProgramVulnerabilityDetails window, viewthe signature details of the program.
5 If you want to view additional information aboutthe signature, then click the signature name.
6 After you finish viewing the vulnerability details,in the ProgramVulnerabilityDetails window, clickClose.
7 In the VulnerabilityProtection window, click Close.
131Maintaining total protectionAbout viewing details of system vulnerabilities
Maintaining total protectionAbout viewing details of system vulnerabilities
132
This chapter includes the following topics:
1 About the Norton 360 scan
1 About Computer Scan
1 About Insight Network scan
1 About Reputation Scan
1 About Scan Facebook Wall
1 About SONAR Protection
1 About scanning Office documents
1 About Silent Mode
1 Running a scan at the command prompt
About the Norton 360 scanNorton 360 scans secure your computer from all typesof viruses and unknown threats using the latest virusdefinitions. It also scans all the Internet activities thatare performed on your computer to protect yourcomputer from the Internet-based threats that exploitsoftware vulnerabilities.
Norton 360 automatically performs different types ofscans to secure your computer from latest threats. It
4Scanning yourcomputer
also lets you run different types of scans manually tosecure your computer.
By using Norton 360, you can run the following typesof scans:
Computer Scan uses the latestvirus definitions that areavailable locally in the computer.
If you suspect that yourcomputer is infected, you canrun three types of computerscans manually to prevent virusinfections on your computer. Thethree types of scans that areavailable under Computer Scanare Quick Scan, Full SystemScan, and Custom Scan.
Computer Scan
Insight Network Scan uses thevirus definitions that areavailable locally and hosted inthe Cloud. InsightNetwork Scandetects the files that aresuspicious or vulnerable on yourcomputer using thereputation-based threatdetection. Norton 360 performsan Insight Network Scan onlywhen the Insight Protectionoption is turned on. By default,the Insight Protection option isturned on.
You can see this InsightProtection option under Scansand Risks tab in the Antivirussettings window.
Insight Network Scan
Scanning your computerAbout the Norton 360 scan
134
Reputation Scan displays thereputation information of thefiles. It displays the reputationinformation such as communitysummary, local summary, trustlevel, prevalence. ReputationScan displays the detailedreputation information of thegood files and the number of badfiles that have been detected orremoved.
Reputation Scan also internallyperforms Computer Scan andInsight Network Scan to detectthe threats. The different typesof scans that are available underReputation Scan areQuick Scan,Full System Scan, and CustomScan.
w Norton 360 ReputationScan is applicable only for theexecutable files and the installerfiles.
Reputation Scan
135Scanning your computerAbout the Norton 360 scan
Scan Facebook Wall lets youscan the links and URLs that areavailable on your Facebookprofile.
When you click the ScanFacebook Wall option, Norton360 takes you to the Facebooklogin Web page. After you log into your Facebook profile, NortonSafe Web asks you to grantpermission to access yourFacebook wall. To do so, use thegrant us permission to accessyour stream option available onthe Facebook Web page, andthen follow the on-screeninstructions. After you grantpermission, Norton safe Webscans all the available links onyour Facebook wall each timeyou use Scan Facebook Walloption. It then displays thesecurity status of the scannedURLs.
Scan Facebook Wall
Norton 360 also performs Idle Time Scans. Idle TimeScans detect the time when you are not using yourcomputer and intelligently run scans depending on thescan history of your computer. Norton 360 keeps yourcomputer secure from latest threats by automaticallyrunning scans on your computer by using the Idle TimeScans feature. You can use Idle Time Scans to protectyour computer against virus infections withoutcompromising the performance of your computer. IdleTimeScans automatically detect the idle state of yourcomputer and runs a Quick Scan or a Full System Scan.
Scanning your computerAbout the Norton 360 scan
136
About Computer ScanNorton 360 automatically downloads latest virusdefinition regularly and secures your computer fromall types of viruses and unknown threats. When Norton360 performs a Computer Scan, it uses the latest virusdefinitions that Symantec provides.
The threat detections that are based on the localdefinition are specified with a specific name. Forexample, if a Trojan horse is detected, the scan resultsof the Computer Scan displays the threat as Trojan.Foo.You can click the Run Scans option available in theTasks window to access the different types of computerscans.
If you suspect that your computer is infected, you canrun three types of computer scans manually to preventvirus infections on your computer.
You can run the following types of Computer Scans:
Scans the important locations ofyour computer that the virusesand other security threats oftentarget.
Quick Scan takes less time toscan than a Full System Scanbecause this scan does not scanyour entire computer.
Quick Scan
137Scanning your computerAbout Computer Scan
Scans your computer for alltypes of viruses and securitythreats.
Full System Scan thoroughlyexamines your entire computerfor viruses, spyware, anddifferent security vulnerabilities.It also runs LiveUpdate, Virusand Spyware Scan, diskoptimization, and backup. Inaddition, it cleans up theInternet Explorer temporary filesand Windows temporary files.
Full System Scan
Checks for softwarevulnerabilities, backups, anddisk optimization.
UsingCustomScan, you can runLiveUpdate and Virus andSpyware Scan. You can also backup your data, free disk space bycleaning up disk clutter, andoptimize your disk volume.
Custom Scan
Computer Scan provides details about the scanneditems. You can view the details such as total numberof files that are scanned, total security risks detected,total security risks resolved, and the total items thatrequire attention. It also provides you the differentways to resolve any items that were not automaticallyresolved during the scan. You can also view the severityof the risk, the name of the risk, and the status of therisk about the resolved items.
Running a Quick ScanA Quick Scan helps you to scan the possiblevirus-infected areas of a computer that the viruses andother security risks often targets. Because this scan
Scanning your computerAbout Computer Scan
138
does not scan your entire computer, it takes less timeto run than a Full System Scan.
When Norton 360 performs Quick Scan for the firsttime, it automatically runs LiveUpdate, and cleans upthe Internet Explorer temporary files and Windowstemporary files.
When the Insight Protection option is turned on,Norton 360 simultaneously performs a traditionalQuick Scan and an Insight Network Quick Scan. Bydefault, the Insight Protection option is turned on.
You can also export the scanned results to yourpersonal folder. For example, the Export Virus andSpyware Scan Results link in the Activities and ScanDetails window lets you save the results of virus andspyware scan status.
For some activities, you can also see more detailedinformation about the scanned results. For examplethe Details link in the Activities and Scan Detailswindow lets you view more detailed information aboutthe scanned results.
To run a Quick Scan
1 In the Norton 360 main window, move the mousepointer over PCSecurity, and then click RunScans.
2 In the Scans window, under Computer Scan, clickQuick Scan.
3 Click Go.You can use the following options:
Suspends the scan temporarily
Click Resume to continue thescan.
Pause
Skips the currently running taskSkip
Terminates a Quick ScanCancel
139Scanning your computerAbout Computer Scan
4 In the Activities and Scan Details window, clickClose.
Running a Full System ScanA Full System Scan thoroughly examines your entirecomputer for viruses, spyware, and different securityvulnerabilities.
A Full System Scan runs LiveUpdate, virus and spywarescan, disk optimization, and backup. In addition, itcleans up the Internet Explorer temporary files andWindows temporary files.
You can also export the scanned results to yourpersonal folder. For example, Export Virus andSpywareScanResults link lets you save the results ofvirus and spyware scan status.
A Full System Scan helps you to do the following:
1 Obtain latest protection and program updates.
1 Optimize disks to improve the performance of yourcomputer.
1 Back up your data.
You can back up your files regularly to protect thevaluable information on your computer.
To run a Full System Scan
1 In the Norton 360 main window, move the mousepointer over PCSecurity, and then click RunScans.
2 In the Scans window, under Computer Scan, clickFull System Scan.
Scanning your computerAbout Computer Scan
140
3 Click Go.Norton 360 displays the Manage Backup Setswindow. You can save the default backup set orcreate a new backup set to continue Full SystemScan.You can use the following options:
Suspends the scan temporarily.
Click Resume to continue thescan.
Pause
Skips the currently running task.Skip
Terminates a Full System Scan.Cancel
4 In the Activities and Scan Details window, clickClose.
Running customized scansNorton 360 helps you to choose your own combinationsof scans for viruses, spyware, and securityvulnerabilities.
Using the CustomScan option, you can run LiveUpdateand Virus and Spyware Scan. You can also back up yourdata, free disk space by cleaning up disk clutter, andoptimize your disks.
You can also export the scanned results to yourpersonal folder. For example, the Export Virus andSpywareScanResults link lets you save the results ofvirus and spyware scan status.
To run customized scans
1 In the Norton 360 main window, move the mousepointer over PCSecurity, and then click RunScans.
141Scanning your computerAbout Computer Scan
2 In the Scans window, under Computer Scan, clickCustom Scan.Check or uncheck the combinations that you wantNorton 360 to perform. To select all thecombinations check the Scans option.
3 Click Go.Norton 360 displays the Manage Backup Setswindow if you have checked Backup. You can savethe default backup set or create a new backup setto continue customized scan.
4 In the Scans window, check the scan items that youwant to run, and then click Go.You can use the following options:
Suspends the scan temporarily
Click Resume to continue thescan.
Pause
Skips the currently running task.Skip
Terminates the customized scan.Cancel
5 In the Activities and Scan Details window, clickClose.
About Insight Network scanThe Insight Network scan uses the Cloud technologywherein a remote server on the Web contains the latestvirus definitions. Norton 360 scans your computer forthe latest security threats. When Norton 360 performsthe Insight Network scan, it uses the virus definitionsthat are available locally and in the Cloud. Norton 360provides additional protection by using the most recentdefinitions in the Cloud, apart from the definitions thatare available locally on your computer.
Scanning your computerAbout Insight Network scan
142
Norton 360 performs an Insight Network scan onlywhen the Insight Protection option is turned on. Bydefault, the Insight Protection option is turned on.You can see this InsightProtection option under Scansand Risks tab in the Antivirus settings window.
When the Insight Protection option is turned on,Norton 360 performs a traditional scan and an InsightNetwork scan simultaneously. The traditional scanuses the definitions from the local system, and theInsight Network scan uses the definitions that arehosted in the Cloud.
Threat detection based on the Cloud definitions isidentical to the threat detection that is based on thelocal definitions. However, the Cloud definitions arespecified with additional data about the threats that itdetects which indicates that it has been obtained fromthe Internet. Definitions in the Cloud provide a genericname for the risk detected, but the local definitionsprovide the specific name for the risk detected. Forexample, if a Trojan horse is detected, the scan resultsof the Insight Network might display Cloud.Trojan.However, the scan results of the local definition mightdisplay Trojan.Foo.
If the traditional scan completes while the InsightNetwork scan is still running, you can view the InsightNetwork Scan progress status.
The Insight Network scan supports Quick Scan, InsightNetwork context-menu scan, Instant Messenger Scan,and Download Insight scan. It does not support EmailScan, Full System Scan, and Auto-Protect scan.
If the Insight Protection option is turned on, you canmanually run the following types of Insight Networkscans:
1 Insight Network Quick Scan
Norton 360 simultaneously performs a traditionalQuick Scan and an Insight Network Quick Scan toscan the areas of your computer that the virusesoften target. Norton 360 also performs an Insight
143Scanning your computerAbout Insight Network scan
Network Quick Scan simultaneously with an IdleQuick Scan.
w The Insight Network scan does not support a QuickScan that runs as a part of an Idle Full System Scan.
1 Insight Network context-menu scan
When you right-click a file, the shortcut menudisplays Norton 360 and then Insight NetworkScan. You can use this command to scan a file usingboth local definitions and definitions that arehosted in the Cloud.
w This Insight Network Scan command is availableonly for single file.
Turning off or turning on Insight ProtectionInsightProtection option lets Norton 360 perform anInsight Network scan on your computer
When the Insight Protection option is turned on,Norton 360 performs a traditional scan and an InsightNetwork scan simultaneously. The traditional scanuses the definitions from the local system, and theInsight Network scan uses the definitions that arehosted in the Cloud. Norton 360 performs only atraditional scan if the Insight Protection option isturned off.
Norton 360 performs an Insight Network scan onlywhen the Insight Protection option is turned on. Bydefault, the Insight Protection option is turned on.
The Insight Network scan supports only InsightNetwork Quick Scan, and Insight Networkcontext-menu scan. Insight Network scan does notsupport a Quick Scan that runs as a part of an Idle FullSystem Scan. It also does not support Full System Scan,Email Scan, single file Office document scan, andAuto-Protect scan.
To turn off or turn on the Insight Protection
1 In the Norton 360 main window, click Settings.
Scanning your computerAbout Insight Network scan
144
2 In the Settings window, under Detailed Settings,click Antivirus.
3 In the Antivirus settings window, click Scans andRisks tab.
4 In the Insight Protection row, do one of thefollowing:
1 To turn off Insight Protection, move the On/Offswitch to the right to the Off position.
1 To turn on Insight Protection, move the On/Offswitch to the left to the On position.
5 In the Settings window, click Apply.
About Reputation ScanReputation Scan provides information on thetrust-worthiness of all programs and running processeson your computer. It helps you detect the files that aresuspicious or vulnerable on your computer using thereputation-based threat detection. Norton 360 lets yourun different types of Reputation Scan and detectsuspicious programs on your computer.
Reputation Scan filters the files on the basis of certainfiltering criteria and performs an Insight NetworkScan on the filtered files. Reputation Scan filters thefiles as reputation files. It filters .exe files, .scr files,.sys files, .dll files, .drv files, .ocx files, and .msi filesand analyzes these files.
When you perform a Reputation Quick Scan or FullSystem Scan, Norton 360 considers the Files of Interestthat are available on your computer.
After it has filtered the reputation files, Norton 360performs an InsightNetworkScan. When Norton 360performs an Insight Network Scan, it also performs aComputer Scan. Norton 360 uses the Computer Scanto perform the signature-based threat detection. Itcompares the signature of the filtered reputation filesagainst the known threat signatures to identify threatson your computer. If a security threat is detected,
145Scanning your computerAbout Reputation Scan
Norton 360 automatically removes the threat fromyour computer.
Norton 360 uses the Insight Network Scan to detectsuspicious or vulnerable files on your computer usingthe reputation-based threat detection. The InsightNetwork Scan uses the Cloud technology wherein aremote Symantec server on the Web stores the latestreputation information. It checks the Cloud for thereputation information on the filtered files.
Norton 360 obtains specific information such as filename and hash key about the filtered reputation filesand sends this information to the Cloud. The Cloudanalyzes the file information and provides a trust levelfor each file. The Symantec server sends back thereputation information to your computer. If any of thefiltered files is suspicious or vulnerable, Norton 360assigns Bad or Poor trust level. Apart from reputationinformation, Norton 360 also checks for the latest virusdefinitions on the Cloud.
w Your computer must be connected to the Internet toaccess the latest reputation information and virusdefinitions from the Cloud. If your computer is notconnected to the Internet, Norton 360 uses thereputation information that is available locally.
When you perform a Reputation Scan, Norton 360considers only the following categories of files:
This category includesWindows executable files(.exe) and script files (.scr).
Executable files
This category includesWindows System files (.sys),dynamic link library files(.dll), and device driver files(.drv).
System files
Scanning your computerAbout Reputation Scan
146
This category includesActiveX control files (.ocx).
Developer files
This category includesWindows Installer Packagefiles (.msi).
Miscellaneous files
Norton 360 lets you scan specific areas of yourcomputer based on the type of Reputation Scan thatyou select. You can manually run the following typesof Reputation Scan:
Scans the important locationsof your computer that theviruses and other securitythreats often target.
When you perform a QuickScan , Norton 360 considersthe Files of Interest thatrelated to loaded programsand the running processes.
Quick Scan
Scans all the Files of Interestthat are available on yourcomputer.
When you perform a FullSystem Scan, Norton 360searches for Files of Intereston all the locations on yourcomputer. The locationsinclude all drives, runningprocesses, loaded programs,and startup files.
Full System Scan
147Scanning your computerAbout Reputation Scan
Scans a specific file, folder,drive, or removable drive.
When you perform a customscan,Norton 360 considersonly the filtered reputationfiles.
Custom Scan
Symantec rates a file based on the statistical evaluationthat is done on the file using the Norton CommunityWatch data and Symantec’s analysis. Symantec assignsthe following confidence levels to reputation files:
Symantec has a highindication that the file istrusted.
Good
Symantec does not haveenough information aboutthe file to assign a trust levelto the file.
The file is neither safe norunsafe.
Unproven
Symantec has a fewindications that the file is nottrusted.
This file is suspicious and canharm your computer.
Poor
Symantec has a highindication that the file is nottrusted.
This file is suspicious and canharm your computer.
Bad
When your Reputation Scan is complete, you can viewthe summary of the scan results in the Reputation
Scanning your computerAbout Reputation Scan
148
Scan window. You can view the reputation informationsuch as the file name, trust level, age of the file, andcommunity usage for each reputation file. The trustlevel determines whether a file is safe or unsafe. If afile has Poor or Bad trust level, Norton 360 lets youquarantine the file.
Running a Reputation Full System ScanWhen you perform a Full System Scan, Norton 360scans all the Files of Interest that are available on yourcomputer. This fileset includes the files that relate tothe running processes, startup files, and loadedprograms.
To run a Reputation Full System Scan
1 In the Norton 360 main window, move the mousepointer over PCSecurity, and then click RunScans.
2 In the Scans window, under ReputationScan, clickFull System Scan.
3 Click Go.In the Reputation Scan window, you can analyzethe trust level, age, and prevalence of the scanneditems.
4 If there are files with Poor or Bad trust level, clickthe red cross (x) icon to quarantine them.
5 Click Close.
Running a Reputation Quick ScanWhen you perform a Quick Scan, Norton 360 scansonly the running processes and the loaded programs.Reputation Quick Scan does not scan your entirecomputer and it takes lesser time to run than aReputation Full System Scan.
To run a Reputation Quick Scan
1 In the Norton 360 main window, move the mousepointer over PCSecurity, and then click RunScans.
2 In the Scans window, under ReputationScan, clickQuick Scan.
149Scanning your computerAbout Reputation Scan
3 Click Go.In the Reputation Scan window, you can analyzethe trust level, age, and prevalence of the scanneditems.
4 If there are files with Poor or Bad trust level, clickthe red cross (x) icon to quarantine them.
5 Click Close.
Running a Reputation Custom ScanNorton 360 lets you scan specific areas on yourcomputer by using the Reputation Custom Scan. Youcan scan any of your computer's drives, removabledrives, folders or files. For example, if you want tocheck the trust level of a specific file, you can scan theparticular file.
To run a Reputation custom scan
1 In the Norton 360 main window, move the mousepointer over PCSecurity, and then click RunScans.
2 In the Scans window, under ReputationScan, clickCustom Scan.
3 Click Go.
4 In the Reputation Custom Scan window, do one ofthe following:
1 Click Drive Scan, select the drive that you wantto scan, and then click Scan.
1 Click FolderScan, select the folder that you wantto scan, and then click OK.
1 Click File Scan, select the file that you want toscan, and then click Open.
In the Reputation Scan window, you can analyzethe trust level, age, and prevalence of the scanneditems.
5 If there are files with Poor or Bad trust level, clickthe red cross (x) icon to quarantine them.
6 Click Close.
Scanning your computerAbout Reputation Scan
150
About the Reputation Scan resultsNorton 360 lets you run different Reputation Scans todetect any suspicious programs or vulnerable programson your computer. Norton 360 lets you manually runthe following types of Reputation Scan:
1 Reputation Quick Scan
1 Reputation Full System Scan
1 Reputation Custom Scan
When you run a Reputation Quick Scan, Norton 360considers the Files of Interest which include runningprocesses and loaded programs. When you run aReputation Full System Scan, Norton 360 considers allthe Files of Interest that are available on yourcomputer. When you run a Reputation Custom Scan,Norton 360 lets you select the drive, folder, or file thatyou want to scan.
Reputation Scan filters the files on the basis of certainfiltering criteria and performs an Insight NetworkScan on the filtered files. Reputation Scan filters .exefiles, .scr files, .sys files, .dll files, .drv files, .ocx files,and .msi files and analyzes these files.
Norton 360 displays the reputation information of thescanned files in the Reputation Scan window. TheReputation Scan window displays the following:
1 Community Summary details
Community Summary displays the average trustlevel, average age, and average community usagedetails of the files that are collected from millionsof Norton Community Watch customers.
1 Local Summary details
Local Summary displays the average trust level,age, and community usage details of the reputationfiles based on your last Reputation Scan.
You can use the Community Summary and LocalSummary details to analyze the reputation detailsof the files on your computer.
151Scanning your computerAbout Reputation Scan
w Your computer must be connected to the Internetto view the Community Summary and LocalSummary details. Norton 360 connects to theSymantec servers to collect the reputationinformation.
1 Graphical statistics of the reputation informationcollected
Norton 360 consolidates the reputation informationof your most recent scan and represents thereputation information using different graphicalformats. When you click on a specific section on agraph, Norton 360 filters the results and displaysthe related files in the search results table. Forexample, if you want to view all files that have Poortrust level, click on the relevant section in the TrustLevel graph. The table at the bottom section of theReputationScan window lists all the files that havePoor trust level. You can click the Reset option toreset a graph.
1 Reputation information of each scanned item
For each scanned item, you can view the followingdetails:
Indicates the file name andfile type.
You can click a file name toview additional details aboutthe file in the File Insightwindow.
File Name
Scanning your computerAbout Reputation Scan
152
Indicates the trust level thatis assigned to a file.
Symantec analyzes specificinformation about a file suchas the digital signature andthe hash value to determinethe trust level of a file.Symantec rates a file basedon the statistical evaluationthat is done on the file usingtheNortonCommunityWatchdata and Symantec’sanalysis.
Symantec assigns thefollowing trust levels toreputation files:
1 Good: Symantec has ahigh indication that thefile is trusted.
1 Unproven: Symantecdoesnot have enoughinformation about the fileto assign a trust level tothe file.
1 Poor: Symantec has a fewindications that the file isnot trusted.
1 Bad: Symantec has a highindication that the file isnot trusted.
If you have a file that hasPoor or Bad trust level,Norton 360 displays a redcross (x) icon next to the trustlevel. You can click on the redcross (x) icon and quarantinethe suspicious file.
Trust Level
153Scanning your computerAbout Reputation Scan
Indicates the age of the filebased on the data thatmillions of NortonCommunity Watch customersshared and Symantec’sresearch analysis.
The search results aregrouped in to the followingcategories:
1 1-7 Days: Shows the filesthat are newly found onyour computer for thepast one week.
1 7-30 Days: Shows thefiles that are found onyour computer for thepast one month.
1 30+Days: Shows the filesthat are found on yourcomputer for more thanone month.
Age
Scanning your computerAbout Reputation Scan
154
Indicates the communityusage level of the file.
The search results aregrouped in to the followingcategories:
1 Very Few Users: Showsthe files that have verylow user prevalence.
1 Few Users: Shows thefiles that have averageuser prevalence.
1 Many Users: Shows thefiles that have very highuser prevalence.
You can also use thecommunity usage of a file todetermine the legitimacy ofthe file. Symantec uses astringent statistical methodto evaluate thetrustworthiness of a file andto classify the file as a Goodfile.
Prevalence
Indicates the date on whichNorton 360 determined theexistence of the file on yourcomputer.
Date Discovered
About Scan Facebook WallNorton Safe Web protects your computer while youuse Facebook. It scans each URL that is available onyour Facebook Wall and displays the Norton ratingicons for the scanned URLs.
You can also check if a URL is safe or unsafe and thenshare the URL with your friends on Facebook. NortonSafe Web scans the URL that you post on Facebook and
155Scanning your computerAbout Scan Facebook Wall
gives you the safety status for the URL. This way, youare not only protected from unsafe sites but you alsolet other Facebook users know the security status ofany Web site.
However, Norton Safe Web requires your permissionto scan the URLs that are available on your FacebookWall. When you log in to Facebook, Norton Safe Webasks for your permission to access your Facebook Wall.You can choose to allow or deny permission to letNorton Safe Web access your Facebook Wall.
The auto-scan feature in Norton Safe Web applicationpage helps you protect your Facebook Wall. NortonSafe Web scans the News Feed on your Facebook Wallperiodically and protects you from malicious links.When Norton Safe Web detects a malicious link, itnotifies you. To activate Norton Auto-Scan, go to yourNorton Safe Web page on Facebook and click EnableAuto-Scan.
To remove the malicious link from your Facebook Wall,go to your profile and remove the malicious link. Ifyour friend has posted the malicious link, you can usethe WARN YOUR FRIENDS option in the message toalert your Facebook friend. You can also click SeeNorton Safe Web Report to view Norton ratings andother details about this malicious link. When nomalicious activity is detected on your Facebook Wall,Norton Safe Web posts a message every week notifyingthat your Facebook Wall is safe.
If you later decide to remove Norton Safe Web fromyour Facebook profile, you can use the ApplicationSettings option of Facebook.
Scanning your computerAbout Scan Facebook Wall
156
The following are the safety states that Norton SafeWeb provides after it scans the links on your FacebookWall:
Indicates that the site is safe tovisit and Norton Trusted.
The sites with this rating do notharm your computer and so youcan visit this site.
Safe
Indicates that the site hassecurity risks.
The sites with this rating mayinstall malicious software onyour computer. Symantecrecommends that you do notvisit this site.
Warning
Indicates that Norton Safe Webhas not yet tested this site andit does not have sufficientinformation about this site.
Untested
Indicates that the site may havesecurity threats. Symantecrecommends you to be cautiouswhile you visit such Web sites.
Caution
Scanning your Facebook WallThe Norton Safe Web feature scans your Facebook Walland analyzes the security levels of all the availablelinks on your Facebook Wall. It then displays thesecurity status of the scanned URLs. However, NortonSafe Web requires your permission to scan yourFacebook Wall.
157Scanning your computerAbout Scan Facebook Wall
To scan your Facebook Wall
1 In the Norton 360 main window, move the mousepointer over PCSecurity, and then click RunScans.
2 In the Scans window, under Scan Facebook Wall,click Scan Facebook Wall.
3 Click Go.
4 In the Facebook login Web page, log in to yourFacebook profile.
5 In the Request for permission page, click Allow.
6 In the Web page that appears, click Pleasegrantuspermission to access your News Feed and Wall.
7 Follow the on-screen instructions to let Norton SafeWeb access your Facebook Wall.
About SONAR ProtectionSymantec Online Network for Advanced Response(SONAR) provides real-time protection against threatsand proactively detects unknown security risks on yourcomputer. SONAR identifies emerging threats basedon the behavior of applications. SONAR identifiesthreats quicker than the traditional signature-basedthreat detection techniques. SONAR detects andprotects you against malicious code even before virusdefinitions are available through LiveUpdate.
SONAR monitors your computer for malicious activitiesthrough heuristic detections.
SONAR automatically blocks and removeshigh-certainty threats. Norton 360 notifies you whenhigh-certainty threats are detected and removed.SONAR provides you the greatest control whenlow-certainty threats are detected. You can alsosuppress the SONAR notifications by disabling theShow SONAR Block Notifications option.
The ViewDetails link in the notification alert lets youview the summary of the resolved high-certaintythreats. You can also view the details under Resolved
Scanning your computerAbout SONAR Protection
158
Security Risks category in the Security Historywindow.
Turning off or turning on SONAR ProtectionSONAR protects you against malicious code even beforevirus definitions are available through LiveUpdate. Bydefault, SONAR Protection is turned on to proactivelydetect unknown security risks on your computer.
When you turn off SONAR Protection, you areprompted with a protection alert. This protection alertlets you specify the amount of time for which you wantSONAR Protection to be turned off.
w When Auto-Protect is turned off, SONAR Protection isalso disabled. In this case, your computer is notprotected against emerging threats.
To turn off or turn on SONAR Protection
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Antivirus.
3 On the AutomaticProtection tab, under RealTimeProtection, in the SONAR Protection row, do oneof the following:
1 To turn off SONAR Protection, move the On/Offswitch to the right to the Off position.
1 To turn on SONAR Protection, move the On/Offswitch to the left to the On position.
4 In the Settings window, click Apply.
About scanning Office documentsNorton 360 protects all Office documents that youreceive through email messages, through Internetdownload, and through inserted floppy disks or otherremovable media. By automatically scanning all Officefiles, Norton 360 maintains a higher level of security.Norton 360 scans the Office document when you openthem.
159Scanning your computerAbout scanning Office documents
By default, Microsoft Office Automatic Scan option,under Computer Scans, in the Antivirus settingswindow is turned off. Turn on this option to scanMicrosoft Office files automatically.
You can use Microsoft Office Automatic Scan optionunder Computer Scans, to scan documents of thefollowing Microsoft Office applications:
Microsoft Wordwinword.exe
Microsoft Excelexcel.exe
Microsoft PowerPointpowerpnt.exe
Microsoft Visiovisio.exe
Microsoft Accessmsaccess.exe
Microsoft Projectwinproj.exe
Norton 360 scans the Office documents and protectagainst threats, including virus macros and infectedembedded objects.
Turning on or turning off Microsoft Office AutomaticScan
Norton 360 maintains a higher level of security byautomatically scanning all Office files. You can turnon the Microsoft Office Automatic Scan option toprotect your computer against the virus macros andembedded objects.
To Turn on or turn off Microsoft Office Automatic Scan
1 In the Settings window, under Detailed Settings,click Antivirus.
2 In the Antivirus settings window, click Scans andRisks tab.
Scanning your computerAbout scanning Office documents
160
3 Under Computer Scans, in the Microsoft OfficeAutomatic Scan row, do one of the following:
1 To turn on Microsoft Office Automatic Scan,move the On/Off switch to the left to the Onposition.
1 To turn off Microsoft Office Automatic Scan,move the On/Off switch to the right to the Offposition.
4 In the Settings window, click Apply, and then clickClose.
About Silent ModeNorton 360 provides many solutions and features tohandle viruses and other security threats. Norton 360displays alerts and notifications to inform you howviruses and other security threats are detected andresolved. When you perform important tasks on yourcomputer, you likely prefer not to receive any alertmessages. Norton 360 suppresses alerts andnotifications and temporarily suspends most of thebackground activities based on the type of Silent Modethat is turned on.
Norton 360 has following types of Silent Mode:
The Silent Mode that youmanually turn on for a specifiedduration.
Silent Mode
The Silent Mode that Norton 360turns on automatically when itdetects a full-screen applicationand turns off when you stopusing the full-screen application.
Full Screen Detection
161Scanning your computerAbout Silent Mode
The Silent Mode that Norton 360turns on automatically when itdetects a disk burning task or aMedia Center TV recording task.Norton 360 also turns on QuietMode automatically when yourun a program that you includedin theQuietModePrograms list.Norton 360 turns off Quiet Modewhen the disk burning sessionor TV program recording sessionis complete. Norton 360 alsoturns off Quiet Mode when itstops detecting runninginstances of the programs thatyou included in the Quiet ModePrograms list.
Quiet Mode
The Norton 360 icon displays the turn-on status ofSilent Mode in the notification area, at the far right ofthe taskbar. The icon changes to a crescent-patternedicon when Silent Mode is turned on. Norton 360 alsonotifies you after Silent Mode is turned off.
You can view the summary of the Silent Mode sessionsunder the Recent History, Full History, and SilentMode categories in the Security History window.
The summary includes the following information:
1 The turn-on or turn-off status of Silent Mode
1 The type of Silent Mode, such as Silent Mode orQuiet Mode
1 The type of program that turns on Silent Mode,such as disk burning or TV recording
1 The name of a user-specified program that turnson Silent Mode
1 The time and date when Silent Mode is turned onor turned off
Scanning your computerAbout Silent Mode
162
About the Silent Mode that you turn on manuallyNorton 360 lets you manually turn on Silent Mode fora specified duration. When Silent Mode is turned on,Norton 360 suppresses alerts and suspends backgroundactivities for the duration that you specify. You canverify the turn-on status of Silent Mode in thenotification area, at the far right of the taskbar. TheNorton 360 icon in the notification area changes to acrescent-patterned icon to display the turn-on statusof Silent Mode. Turning on Silent Mode manuallybefore you perform your tasks helps you prevent alerts,notifications, or background activities interruptingyou for the specified duration.
You can turn on Silent Mode for a period of one hour,two hours, four hours, six hours, or one day. After thespecified duration, Norton 360 turns off Silent Mode.You can also manually turn off Silent Mode at any time.Norton 360 notifies you after Silent Mode is turned off.The activities that are suspended during Silent Moderun after Silent Mode is turned off.
Turning on or turning off Silent Mode manually
You can manually turn on Silent Mode for a specifiedduration before you perform any important task onyour computer. You can turn on Silent Mode for aperiod of one hour, two hours, four hours, six hours,or one day. The Norton 360 icon displays the turn-onstatus of Silent Mode in the notification area, at thefar right of the taskbar. Norton 360 notifies you afterSilent Mode is turned off. After Silent Mode is turnedoff, Norton 360 also displays alerts if it detected anysecurity activities that occurred during the Silent Modesession.
You can turn on or turn off Silent Mode from theAdministrative Settings window, Quick Controls inthe Settings window, or from the Norton Taskswindow. You can also turn on or turn off Silent Modeby using the Norton 360 icon in the notification area.
163Scanning your computerAbout Silent Mode
To turn onSilentMode from theAdministrative Settingswindow
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
3 Under Silent Mode Settings, in the Silent Moderow, move the On/Off switch to the left to the Onposition.
4 In the Settings window, click Apply.
5 In the TurnonSilentMode dialog box, in the Selectthe duration drop-down list, select how long youwant to turn on Silent Mode, and then click OK.
To turn off SilentMode from theAdministrative Settingswindow
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
3 Under Silent Mode Settings, in the Silent Moderow, move the On/Off switch to the right to the Offposition.
4 In the Settings window, click Apply.
To turn on Silent Mode from the Norton Tasks window
1 In the Norton 360 main window, click Performance.
2 In the Performance window, click Norton Tasks.
3 In the Norton Tasks window, next to Silent Mode,move the On/Off switch to the left to the Onposition.
4 In the TurnonSilentMode dialog box, in the Selectthe duration drop-down list, select how long youwant to turn on Silent Mode, and then click OK.
5 Click Close.
To turn off Silent Mode from the Norton Tasks window
1 In the Norton 360 main window, click Performance.
2 In the Performance window, click Norton Tasks.
Scanning your computerAbout Silent Mode
164
3 In the Norton Tasks window, next to Silent Mode,move the On/Off switch to the right to the Offposition.
4 Click Close.
To turn on Silent Mode from the notification area
1 In the notification area on the Windows taskbar,right-click the Norton 360 icon, and then click Turnon Silent Mode.
2 In the TurnonSilentMode dialog box, in the Selectthe duration drop-down list, select how long youwant to turn on Silent Mode, and then click OK.
To turn off Silent Mode from the notification area
4 In the notification area on the Windows taskbar,right-click the Norton 360 icon, and then click Turnoff Silent Mode.
About the Silent Mode that turns on automaticallyWhen you watch a movie, play games, or make apresentation, you run the application in the full-screenmode. Norton 360 detects the application that you runin the full-screen mode and automatically enablesSilent Mode. When Silent Mode is enabled, Norton 360suppresses most of the alerts and suspends backgroundactivities. Only those activities run that are involvedin protecting your computer from viruses and othersecurity threats. Minimum background activities alsoensure high performance of your computer. Theactivities that are suspended run after you finish usingthe application in the full-screen mode.
Silent Mode also helps you maintain an uninterruptedMedia Center Extender session. A Media CenterExtender session is an extended session of Media Centerto an entertainment device, such as a television. Thealerts and notifications that appear during a MediaCenter Extender session disconnect the session betweenthe host computer and the entertainment device.Norton 360 identifies a Media Center Extender sessionas an active full-screen application and turns on Silent
165Scanning your computerAbout Silent Mode
Mode. When Silent Mode is enabled, Norton 360suppresses alerts and notifications and suspendsbackground activities to provide an uninterruptedMedia Center Extender session.
Turning off or turning on Full Screen Detection
You can use the Full Screen Detection option in theSettings window to turn on or turn off Silent Modeautomatically when Norton 360 detects a full-screenapplication. By default, the Full Screen Detectionoption remains turned on after you install Norton 360.
To turn off Full Screen Detection
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
3 Under Silent Mode Settings, in the Full ScreenDetection row, move the On/Off switch to the rightto the Off position.
4 In the Settings window, click Apply.
To turn on Full Screen Detection
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
3 Under Silent Mode Settings, in the Full ScreenDetection row, move the On/Off switch to the leftto the On position.
4 In the Settings window, click Apply.
About Quiet ModeNorton 360 automatically enables Quiet Mode whenyou perform a few tasks that require higher utilizationof your system resources. When Quiet Mode is turnedon, Norton 360 suspends the background activities andlets the task use the maximum resources for betterperformance.
Scanning your computerAbout Silent Mode
166
You can choose to set Norton 360 to automaticallyenable Quiet Mode when you do the following tasks:
1 IMAPI 2.0 Disk Burn
1 Media Center TV Recording
1 User-Specified Programs
In addition, you can configure Norton 360 to enableQuiet Mode when you run a program of your choice.
167Scanning your computerAbout Silent Mode
The following table explains about the various options:
When you use a Media Centerapplication to burn a CD or aDVD, Norton 360 automaticallyenables Quiet Mode, if the IMAPI2.0 Disk Burn option is turnedon. By default, the IMAPI 2.0Disk Burn option is turned on.When Quiet Mode is enabled,Norton 360 suspendsbackground activities to improvethe performance of yourdisk-burning session. However,Norton 360 continues to displayalerts and notifications duringthe session.
Norton 360 supports thefollowing Media Centerdisk-burner applications to turnon Quiet Mode:1 IMAPI 2.0
1 J. River MEDIA CENTER(version 13.0.125 and later)
Norton 360 turns on Quiet Modeas soon as you start burning aCD or a DVD using a MediaCenter application. Norton 360turns Quiet Mode off after thedisk-burning session iscomplete. You cannot turn offQuiet Mode during thedisk-burning session by turningoff the IMAPI 2.0 Disk Burnoption in the Settings window.
IMAPI 2.0 Disk Burn
Scanning your computerAbout Silent Mode
168
When you use a Media Centerapplication to record a TVprogram, Norton 360automatically enables QuietMode, if the Media Center TVRecording option is turned on.By default, theMedia Center TVRecording option is turned on.When Quiet Mode is enabled,Norton 360 suspendsbackground activities to improvethe performance of your TVprogram recording session.However, Norton 360 continuesto display alerts andnotifications during the session.
Norton 360 supports thefollowing Media Centerapplications to turn on QuietMode:1 Windows Media Center
For Windows Media Centerto enable Quiet Mode duringTV program session, youmight need to restart yourcomputer after you installNorton 360.
1 J. River MEDIA CENTER(version 13.0.125 and later)
Norton 360 turns on Quiet Modeas soon as you start recording aTV program. After Quiet Mode isturned on, it turns off after therecording session is complete.You cannot turn off Quiet Modeduring the TV program recordingsession by turning off theMediaCenter TV Recording option inthe Settings window.
Media Center TVRecording
169Scanning your computerAbout Silent Mode
Norton 360 automatically turnson Quiet Mode when it detects aTV program recording session ora disk-burning session. Inaddition, you can manually addthe programs for which you wantNorton 360 to turn on QuietMode to the Quiet ModePrograms list. When Norton 360detects a running instance of aprogram that you added in thelist, it automatically turns onQuiet Mode. When Quiet Modeis turned on, Norton 360suspends the backgroundactivities but does not suppressalerts and notifications.
You can also add or remove arunning program to the QuietMode Programs list.
User-Specified Programs
Turning off or turning on the Quiet Mode options
You can turn off or turn on the Quiet Mode options,such as IMAPI 2.0 Disk Burn or Media Center TVRecording in the Settings window. By default, the QuietMode options are turned on. If you perform a task foran option that you turned on, Norton 360 detects thetask and automatically turns on Silent Mode. Forexample, you turn on the IMAPI2.0DiskBurn optionand start burning a disk using a Media Centerapplication. In this case, Norton 360 detects thedisk-burning session and turns on Quiet Mode.
Norton 360 turns on Quiet Mode as soon as you startrecording a TV program or burning a CD or a DVD.Once Quiet Mode is turned on, it turns off only afterthe TV program recording session or disk-burningsession is complete. You cannot turn off Quiet Modeduring the sessions by using the options in the Settingswindow.
Scanning your computerAbout Silent Mode
170
To turn off or turn on IMAPI 2.0 Disk Burn
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
3 Under Quiet Mode on Detection of:, do one of thefollowing:
1 To turn off detection, in the IMAPI 2.0 DiskBurn row, move the On/Off switch to the rightto the Off position.
1 To turn on detection, in the IMAPI2.0DiskBurnrow, move the On/Off switch to the left to theOn position.
4 In the Settings window, click Apply.
To turn off or turn on Media Center TV Recording
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
3 Under Quiet Mode on Detection of:, do one of thefollowing:
1 To turn off detection of a TV program recordingsession, in the MediaCenterTVRecording row,move the On/Off switch to the right to the Offposition.
1 To turn on detection of a TV program recordingsession, in the MediaCenterTVRecording row,move the On/Off switch to the left to the Onposition.
4 In the Settings window, click Apply.
About User-Specified Programs
Norton 360 automatically turns on Quiet Mode whenit detects a TV program recording session or adisk-burning session. In addition, you can manuallyadd the programs for which you want Norton 360 toturn on Quiet Mode to the Quiet Mode Programs list.When Norton 360 detects a running instance of aprogram that you added in the list, it automatically
171Scanning your computerAbout Silent Mode
turns on Quiet Mode. When Quiet Mode is turned on,Norton 360 suspends the background activities butdoes not suppress alerts and notifications.
You can also add a running program to the QuietModePrograms list. However, when you add a runningprogram, Norton 360 does not detect the currentrunning instance of the program to turn on Quiet Mode.Norton 360 turns on Quiet Mode the next time whenyou execute the program.
You can also remove a running program from the QuietModePrograms list. However, if Quiet Mode is turnedon, it turns off only after the running instances of allthe programs in the list are complete. You cannot turnoff Quiet Mode by removing a program from the listwhen it runs.
You can view the details of the programs that you addto the Quiet Mode Programs list or remove from thelist in the Security History window.
Adding programs to User-Specified Programs
You can manually add the programs for which you wantNorton 360 to turn on Quiet Mode to the Quiet ModePrograms list. When you execute the program that youadded to the list, Norton 360 detects the program andturns on Quiet Mode.
You can also add a running program to the QuietModePrograms list. However, when you add a runningprogram, Norton 360 does not detect the currentrunning instance of the program to turn on Quiet Mode.Norton 360 turns on Quiet Mode the next time whenyou execute the program.
You can only add the programs that have .exe fileextension to the Quiet Mode Programs list.
To add a program
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
Scanning your computerAbout Silent Mode
172
3 Under SilentModeSettings, in the User-SpecifiedPrograms row, click Configure.
4 In the Quiet Mode Programs window, click Add.
5 In the Add Program dialog box, navigate to thelocation of the file that you want to add to the QuietMode Programs window.
6 Select the file, and then click Open.
7 In the Quiet Mode Programs window, click OK.
Removing programs from User-SpecifiedPrograms
You can remove a program from the Quiet ModePrograms list. After you remove a program, Norton360 does not turn on Quiet Mode the next time whenit detects a running instance of the program.
You can also remove a running program from the QuietModePrograms list. However, if Quiet Mode is turnedon, it turns off only after the running instances of allthe programs in the list are complete. You cannot turnoff Quiet Mode by removing a program from the listwhen it runs.
To remove a program
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
3 Under SilentModeSettings, in the User-SpecifiedPrograms row, click Configure.
4 In the Quiet Mode Programs window, select theprogram that you want to delete, and then clickRemove.
5 In the confirmation dialog box, click Yes.
6 In the Quiet Mode Programs window, click OK.
173Scanning your computerAbout Silent Mode
Running a scan at the command promptYou can scan with Norton 360 from the commandprompt without opening the Norton 360 main window.You type the path and name of the file that you wantto scan or customize the scan by adding a specificcommand. The following commands are available:
NAVW32 launches helpand terminates.
/?
Scans all drives/A
Scans the local drives/L
Enables (+) or disables(-) subfolders scanning
/S[+|-]
Enables (+) or disables(-) boot recordscanning and masterboot record scanning(for example, NAVW32C: /B+ or NAVW32 C:/B-)
/B[+|-]
Scans only the bootrecords
/BOOT
Runs a Quick Scan/QUICK
Enables (+) or disables(-) a Quick Scan
/SE[+|-]
Enables (+) or disables(-) scanning of stealthitems
/ST[+|-]
Scanning your computerRunning a scan at the command prompt
174
Uses a task file as inputto the list of items toscan
Task file path shouldfollow the ':' (forexample,TASK:C:\Documentsand Settings\AllUsers\ApplicationData\Symantec\Norton360\Tasks\Full.sca)
/TASK:[taskfile.sca]
Uses a task file as inputto the list of items toscan
Task file path shouldfollow the ':' (forexample,TASK:C:\Documentsand Settings\AllUsers\ApplicationData\Symantec\Norton360\Tasks\Full.sca)
w Assumes the taskfile as a temporary fileand deletes the taskfile at the end ofprocessing.
/TTASK:[taskfile.sca]
Scans the files thatmatches specified wildcard
[folder_path]\*[?]
Scans the specifieddrive, folder, or file
[drive|folder|file]
175Scanning your computerRunning a scan at the command prompt
Performs Quick Scan inthe background.
w Norton 360displays the scanswindow only when athreat is detected.
/SESCAN
To run a scan from the command prompt
1 At the command prompt, type the path in whichNorton 360 is located and the executable's file name.The following examples show the syntax of a scancommand:
1 "\Program Files\Norton360\Engine\version\NAVW32"/command_name
Where version represents the version numberof Norton 360 and command_name representsthe command.
1 "\Program Files\Norton360\Engine\version\NAVW32"[path]file_name
Where version represents the version numberof Norton 360 and [path] file_name representsthe location, name, and extension of the file.
2 Press Enter.
Scanning your computerRunning a scan at the command prompt
176
This chapter includes the following topics:
1 What to do if a security risk is found
What to do if a security risk is foundYour product provides many solutions and features forhandling viruses and other security threats that itdetects.
In addition, your product provides solutions forsecurity risks, such as spyware and adware.
About detecting viruses, spyware, and other risksViruses and other security threats can be detectedduring a manual or customized scan. Auto-Protectdetects these threats when you perform an action withan infected file. Threats can also appear during aninstant messenger session, when you send an emailmessage, or during a manual or customized scan.
Security risks, such as spyware and adware, can alsobe detected when these activities are performed.
The files that can potentially infect your system whenyour computer first starts up are scanned first.
These files include the following:
1 Files that are associated with the processes that arecurrently running in memory
1 Files with startup folder entries
5Responding tosecurity issues
1 Files with system start INI file entries
1 Files with system start batch file entries
1 Files that the system start registry keys refers
If an infected file is detected during this portion of themanual scan, it is repaired or removed. Anyunnecessary references are also removed from yourcomputer. Before attempting to repair, quarantine, ordelete any infected file that has a process running inmemory, your product attempts to terminate theprocess. You are alerted and prompted to close allunnecessary programs before the process is terminated.
You can view information about detected viruses andother security threats in Security History.
Security History also includes information aboutspyware, adware, and other security risks.
Reviewing Auto-Protect notificationsAuto-Protect scans files for viruses, worms, and Trojanhorses when you perform an action with them, suchas moving them, copying them, or opening them.
It also scans for spyware, adware, and other securityrisks.
If Auto-Protect detects suspicious activity, it logs anotification in Security History that tells you that arisk was found and resolved.
If Auto-Protect detect one or more viruses it eitherrepairs or deletes the viruses and notifies you. Thenotification provides information on which file wasrepaired or deleted and which virus, Trojan horse, orworm infected the file. No further action is necessary.
To review Auto-Protect notifications
1 In the Norton 360 main window, click Tasks.
2 In the Tasks window, under General Tasks, clickCheck Security History.
Responding to security issuesWhat to do if a security risk is found
178
3 In the Show drop-down list, select the category forwhich you want to review Auto-Protect alerts.Your options are:
Review Auto-Protectnotifications that youreceived in the last sevendays.
Recent History
Review all of theAuto-Protect notificationsthat you have received.
Full History
Review all of the resolvedhigh-certainty securitythreats.
The Resolved SecurityRisks category includesthe infected files thatNorton 360 repairs,removes, or quarantines.
Resolved Security Risks
Review the list ofunresolved security risks.
The Unresolved SecurityRisks category includesthe infected files forwhich Norton 360 wasnot able to take anyaction. This categorymostly includes thelow-level risks thatrequire your attention fora suitable action.
Unresolved Security Risks
4 In the right pane, click the Options link.If one or more security risks such as spyware arefound, you can take action on these items, ifrequired.
179Responding to security issuesWhat to do if a security risk is found
5 In the Threat Detected window, select theappropriate action on the risk.The following are some of the options that areavailable in the Threat Detected window:
Returns the security riskthat is quarantined to the
Restore
original location on yourcomputer.
This option is availableonly for the detected viralthreats.
Returns the selectedQuarantine item to its
Restore & Exclude this file
original location andexcludes the item frombeing detected in thefuture scans.
This option is availableonly for the detectednon-viral threats.
Excludes the security riskfrom future scan.
Exclude this program
Norton 360 adds thesecurity risk to theappropriate exclusionslist.
Removes the security riskfrom your computer andquarantines it.
Remove this file (may causebrowser to close)(recommended)
This option is availablefor the security risks thatrequire your attention.
Responding to security issuesWhat to do if a security risk is found
180
Removes the selectedsecurity risk from thecomputer andquarantines it.
This option is availablefor the security risks thatrequire your attention formanual removal.
This option is alsoavailable for the securityrisks that are manuallyquarantined.
Remove this file (may causebrowser to close)
Removes the selectedsecurity risk item fromthe Security History log.
Remove from history
Takes you to theSymantec SecurityResponse Web site.
This option is availablefor the security risks thatrequire your attention formanual removal. You canrefer the SymantecSecurity Response Website for manual removalinstructions or otherinformation about therisk.
Get help (recommended)
181Responding to security issuesWhat to do if a security risk is found
Sends the security risk toSymantec.
In some cases, Norton360 might not identify anitem as a security threat,but you might suspectthat the item is infected.In such cases, you canuse this option to submitthe item to Symantec forfurther analysis.
Submit to Symantec
About responding to risks detected during a scanAt the end of a scan, the Activities and Scan Detailswindow lists each activity and a brief summary of thescan results. For some activities, you can also see moredetailed information about the scanned results byclicking the Details link. You can use the Showdrop-down list that is available in the SecurityHistorywindow to resolve any items that were notautomatically resolved during the scan.
The Recommended Action section in the SecurityHistory window displays the action that you shouldtake to resolve the security threat.
About actions when Norton 360 cannot repair a fileOne of the common reasons that Norton 360 cannotautomatically repair or delete an infected file is thatyou do not have the current definition updates. RunLiveUpdate, and then scan again.
Before running LiveUpdate to receive protectionupdates, ensure that Quick Scan is turned on (it isturned on by default). After LiveUpdate retrieves thelatest definition updates, Quick Scan automaticallychecks for the infections that have processes running
Responding to security issuesWhat to do if a security risk is found
182
in memory. It also checks for the infections that thestart-up files and folders refer.
If that does not work, read the information on theSecurity History - Advanced Details window toidentify the types of files that cannot be repaired. You
183Responding to security issuesWhat to do if a security risk is found
can take one of the following actions, depending on thefile type:
You canview thefile typeof thedetectedrisk. Thisinformationhelps youto decidetheactionthat canbe takendependingon thefile type.
Forexample,you canview theinfectedfiles withthefollowingfile nameextensions(any filecan beinfected):1 .exe
1 .doc
1 .dot
1 .xls
Infected files
Responding to security issuesWhat to do if a security risk is found
184
Replaceusingyouroperatingsystemdisks.
Hard disk master boot record, boot record, orsystem files (such as IO.SYS or MSDOS.SYS) andfloppy disk boot record and system files
185Responding to security issuesWhat to do if a security risk is found
Responding to security issuesWhat to do if a security risk is found
186
This chapter includes the following topics:
1 About Norton 360 alerts and messages
1 About managing messages and alerts
1 Types of risks
1 Types of threats
1 Types of viruses
About Norton 360 alerts and messagesMost of the time, Norton 360 quietly protects yourcomputer from viruses and other risks and threats sothat you can use your PC with confidence. The greenbadge on the Norton 360 status icon in the lower-rightcorner of your computer screen indicates that yourprotection is up to date. You can use your computerwith confidence. If the badge color changes to orangeor red, it means you should open Norton 360 to learnabout the problems that Norton 360 has encountered.
About managing messages and alertsNorton 360 displays messages in several ways and inseveral locations.
6Understandingalerts andmessages
You might see messages in the following locations:
Several types of Norton 360messages appear in thenotification area, at the farright of the taskbar. Forexample, your PC was turnedoff, or it has not beenconnected to the Internet fora while. In this case, you seea message that yourprotection may not be up todate.
A different alert appears if asecurity setting was turnedoff. This message warns youthat your PC might not besecure and helps you to turnon the setting.
In most cases you can clickthe alert to open Norton 360and fix the problems.
Notification area on yourWindows desktop
Alerts and other messagesappear at the top of the mainwindow. The color of themessage indicates itsurgency. If the message coloris green, your computer isprotected. If the messagecolor is orange or red, youmust take appropriate actionto ensure that you stayprotected.
Norton 360 main windowoverall status
Understanding alerts and messagesAbout managing messages and alerts
188
Norton 360 displaysindividual status areas foreach protection feature, suchas PC Security, IdentityProtection, Backup, and PCTuneup. The status areasshow how many issues needto be resolved for eachfeature. You can use ViewDetails under each statusarea for more informationabout those issues. You canuse the Fix Now option to fixall the issues that need to beresolved to secure yourcomputer.
Norton 360 protectioncategories and details
In Windows Vista andWindows 7, Norton 360displays the security statusof your computer in theNorton 360 gadget in theWindows sidebar.
Norton 360 gadget in theWindows sidebar
Types of risksA risk is anything that can be exploited to harm yourPC and its data, or that can be used to steal your data.Norton 360 protects your system from a variety ofrisks.
Risks fall into several categories:
These programs aredeliberately designed tocause damage to your PC.They include threats such asviruses, worms, and Trojanhorses. Malicious software issometimes called malware.
Malicious software
189Understanding alerts and messagesTypes of risks
These programs concealthemselves on your PC. Theymonitor what you do, or lookthrough the information thatis stored on your PC, andsend the information back totheir creators.
Spyware
These risks consist of flawsin legitimate software thatcan be exploited, either tocause damage, block data, orsteal information.Vulnerabilities are usuallyexploited through networkconnections.
Vulnerabilities
Types of threatsThreats consist of the software that has beendeliberately designed to destroy, modify, disclose, orblock your data.
Threats fall into the following categories:
Viruses are the smallprograms that attachthemselves tootherprogramsand replicate themselves.
Viruses
Worms are like viruses in thatthey copy themselves fromPC to PC, but they do notattach themselves to otherprograms.
Worms
Understanding alerts and messagesTypes of threats
190
These destructive programsclaim to be some other typeof program, but they causedamage when they run.
Trojan horses
Norton 360 scans your PC for viruses, worms, Trojanhorses, and other software that is intentionallydestructive. It also monitors your Internet connectionto protect you from the Internet-based threats thatexploit software vulnerabilities.
Types of virusesA virus is a small program that is designed to alter theway your PC operates, without your knowledge orpermission.
To be a virus, a program must do the following:
1 Run on its own, without you having to take anyaction
1 Make copies of itself so that it can spread to otherPCs
Although not all viruses are intended to cause damage,even harmless viruses can affect the performance andstability of your PC. Norton 360 attempts to removeall viruses from your PC.
Viruses fall into the following recognized categories:
These viruses infect programfiles. When infected files run,they can attach the virusesthat they carry to otherprogram files. Norton 360scans all program files onyour PC to find and eliminatefile infectors.
File infectors
191Understanding alerts and messagesTypes of viruses
These viruses attachthemselves to the systemareas of your PC and becomeactive as soon as your PCstarts. They can attachthemselves to disks or otherstorage devices that isconnected to your PC. Norton360 scans the system areasof your PC to find and removeboot viruses.
Boot viruses
These viruses use thetechniques of both boot andfile infector viruses. Norton360 scans for such virusesand eliminates them.
Multipartite viruses
These viruses attachthemselves to the data filesthat contain executablecomponents, such as somespreadsheet, presentation,and word-processing files.These viruses that are spreadwhen a program runs theexecutable portion of a datafile. Norton 360 scans datafiles for macro viruses andremoves them.
Macro viruses
Norton 360 scans your PC for both known viruses andunknown viruses.
Known viruses are automatically detected and repaired.Unknown viruses are detected by analyzing eachexecutable file for various characteristics common toviruses. In addition, Norton 360 automatically updatesitself over the Internet to expand and refine its list ofknown viruses.
Understanding alerts and messagesTypes of viruses
192
This chapter includes the following topics:
1 Turning on or turning off automatic tasks
1 About scheduling automatic tasks
1 About scheduling backups
1 Specifying Idle Time Out duration
1 Choosing scans
Turning on or turning off automatic tasksNorton 360 runs automatic tasks as it quietly works toprotect your PC. These automatic tasks includescanning for viruses, monitoring your Internetconnection, updating backups, and downloadingprotection updates. These activities run in thebackground when your PC is turned on.
If any item needs your attention, Norton 360 displaysa message that tells you the current status or asks youto do something. If you do not see any messages, thenNorton 360 is doing its job and your PC is protected.
You can open Norton 360 at any time to see the statusof your PC at a glance or to view protection details.
From time to time, you will see a small message in thelower-right corner of your Windows desktop that tellsyou that a background activity is in progress. You can
7Doing routinetasks
see the results of those latest activities the next timeyou open the Norton 360 main window. When you wantto see a current report of Norton 360 activities, youcan view the summary in the MonthlyReport window.
To turn on or turn off automatic tasks
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Tasks Scheduling.
3 In the TaskScheduling window, on the AutomaticTasks tab, do the following:
1 Check the feature that you want to runautomatically.
Check the Tasks check box to check all thefeatures at once.
1 Uncheck the feature that you do not want to runautomatically.
Uncheck the Tasks check box to uncheck all thefeatures at once.
4 Click Apply.
5 Click Close.
About scheduling automatic tasksYou can use the Task Scheduling settings to specifyhow often Norton 360 scans your system for securityand performance issues. You can also access backupscheduling options from Task Scheduling settings.
Scheduling security and performance scansUse the Task Scheduling settings to have Norton 360examine your system automatically for security andperformance issues. You can specify when and howoften Norton 360 performs those examinations.
Doing routine tasksAbout scheduling automatic tasks
194
You have the following options for scheduling securityand performance scans:
Examine your PC for securityand performance issueswhenever your PC is idle.
This setting provides themaximum protection.
Automatic (Recommended)
Examine your PC one or moretimes each week for securityand performance issues.
You can pick the days of theweek and the time of day onwhich the scan performs.
Weekly
Examine your PC once eachmonth for security andperformance issues.
You can pick the day of themonth and the time of day onwhich the scan performs.
Monthly
Do not perform a scheduledsecurity or performance scanof your PC.
If you choose this option, youshould perform manualsecurity and performancescans of your PC periodicallyto maintain protection.
Manual Schedule
Your computer's performance is maximized if youschedule your critical operations to occur when yourcomputer is idle. When you schedule your scans weeklyor monthly and check the Runonlyatidletime option,Norton 360 scans your computer when it is idle.Symantec recommends that you check Runonlyatidle
195Doing routine tasksAbout scheduling automatic tasks
time to experience better performance of yourcomputer.
To schedule security and performance scans
1 In the Norton 360 main window, click Settings.
2 In the Settings window, click Tasks Scheduling.
3 On the Scheduling tab, in the Schedule drop-downlist, select an option.When you click Weekly or Monthly, you must selectthe time and day to run the automatic tasks. Youalso have the option of specifying that the automatictasks must run only when the PC is idle.
4 Click Apply.
5 Click Close.
About scheduling backupsYou can configure backup scheduling on the When tabin the Manage Backup Sets window to specify whenand how often should Norton 360 back up your files.
You have the following backup scheduling options:
Backs up the changed fileswhenever your PC is idle
This setting provides the bestbackup protection.
Automatic (Recommended)
Backs up the changed filesone or more times each week
You can pick the days of theweek and the time of day onwhich Norton 360 shouldperform backups.
Weekly
Doing routine tasksAbout scheduling backups
196
Backs up the changed filesonce each month
You can pick the day of themonth and the time of day onwhich Norton 360 shouldperform backups.
Monthly
Does not perform anyscheduled backups ofchanged files
If you choose this option, youshould manually back up yourchanged files regularly.
Manual Backup
Your computer's performance is maximized if youschedule your critical operations to occur when yourcomputer is idle. When you schedule backup weeklyor monthly and check Run only at idle time, Norton360 backs up your files when your computer is idle.Symantec recommends that you check Runonlyatidletime to experience better performance of yourcomputer.
Specifying Idle Time Out durationYou can set the duration after which Norton 360 shouldidentify your computer as idle. You can select a value(in minutes) between 1 minute and 30 minutes. Whenyou do not use your computer for the specifiedduration, Norton 360 identifies your computer as idle.Norton 360 then runs the activities that are scheduledto run at idle time.
After you specify the Idle Time Out duration, you canview the Idle Countdown bar in the Norton Taskswindow. The IdleCountdown bar displays the idle stateof your computer.
197Doing routine tasksSpecifying Idle Time Out duration
To specify Idle Time Out duration from the Settingswindow
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
3 In the Idle Time Out row, in the drop-down list,select the duration that you want to specify.You might need to scroll the window to view theoption.
4 In the Settings window, click Apply.
To specify Idle TimeOut duration from theNorton Taskswindow
1 In the Norton 360 main window, click Tasks.
2 In theTasks window, under PCTuneupTasks, clickCheck Norton Tasks.
3 In the Norton Tasks window, in the Idle Timeoutdrop-down list, select the duration that you want tospecify.
4 Click Close.
Choosing scansIn most cases, Norton 360 automatically checks yoursystem and chooses the best settings to keep yoursystem secure. Sometimes, however, you might wantto run some specific checks. You can choose the specificchecks that you want to run by using the optionsavailable in the Scans window.
You can run the following individual checks:
Downloads the latestprotection and programupdates
LiveUpdate
Scans your PC for viruses,spyware, and related threats,and removes them
Virus and Spyware Scan
Doing routine tasksChoosing scans
198
Removes the old temporaryfiles that are left behind byInternet use
Internet Explorer TemporaryFiles
Removes the old temporaryfiles that are left behind byWindows activities
Windows Temporary Files
Removes the traces of anyInternet searches that areperformed on your PC
Internet Explorer History
Eliminates the file clutter andrearrange the placement offiles on your PC disks toimprove performance
Disk Optimization
Removes the broken entriesfrom the Windows registry
Registry Cleanup
Identifies the files to bebacked up and performs abackup if necessary
Backup
To choose scans
1 In the Norton 360 main window, move the mousepointer over PCSecurity, and then click RunScans.
2 In the Scans window, under Computer Scan, clickCustom Scan, and then click Go.
3 In the window that appears, select the scans thatyou want to run, and then click Go.
4 In the Activities and Scan Details window, clickClose.
199Doing routine tasksChoosing scans
Doing routine tasksChoosing scans
200
This chapter includes the following topics:
1 About the Smart Firewall
1 About Intrusion Prevention
1 About Download Insight
1 About Norton AntiSpam
About the Smart FirewallThe Smart Firewall monitors the communicationsbetween your computer and other computers on theInternet. It also protects your computer from suchcommon security problems as the following:
Warns you of connectionattempts from othercomputers and ofattempts by programs onyour computer to connectto other computers
Improper connection attempts
Cloaks the inactive portson your computer therebyproviding protectionagainst attacks throughhacking techniques suchas port scanning
Port scans
8Keeping secure onthe Internet
Monitors the networktraffic to or from yourcomputer for suspiciousbehavior and stops anyattack before theythreaten your system
Intrusions
A firewall blocks hackers and other unauthorizedtraffic, while it allows authorized traffic to pass.Turning off Smart Firewall reduces your systemprotection. Always ensure that the Smart Firewall isturned on.
About firewall rulesA firewall is a security system that uses rules to blockor allow connections and data transmission betweenyour computer and the Internet. Firewall rules controlhow the Smart Firewall protects your computer frommalicious programs and unauthorized access. Thefirewall automatically checks all traffic that comes inor out of your computer against these rules.
The Smart Firewall uses two kinds of firewall rules:
Control network access forprograms on your computer.
Program rules
Control all the incoming and theoutgoing network traffic.
Traffic rules
About the order in which firewall rules are processed
For example, you have a Program rule for the SymantecpcAnywhere application that blocks the use of theapplication with any other computer. You add anotherrule for the same application that allows its use witha specific computer. You then move the new rule beforethe original rule in the program rule list. Norton 360processes the new rule first and lets you use Symantec
Keeping secure on the InternetAbout the Smart Firewall
202
pcAnywhere with that specific computer. It thenprocesses the original rule and prevents its use withany other computer.
About Traffic rules
Norton 360 includes a number of predefined Trafficrules. These rules provide network functionality andprotection from known Internet risks. Examples ofdefault Traffic rules include the following:
Permit all types ofoutbound and safe typesof inbound ICMP (InternetControl MessageProtocol) messaging.
ICMP messages providestatus and controlinformation.
Default Allow Specific InboundICMP
Default Allow Specific OutboundICMP
203Keeping secure on the InternetAbout the Smart Firewall
Permit the use of theNetBIOS name serviceand the NetBIOSdatagram service that theMicrosoft Network usesin file and printer sharing.
NetBIOS is an acronymfor Network BasicInput/Output System.NetBIOS provides nameservice, session service,and datagram service.Name service providesresolution of names,Session service managessessions forconnection-orientedservices, and Datagramservice distributesdatagrams forconnection-orientedservices.
Default Allow Inbound NetBIOSName (Shared Networks)
Default Allow Inbound NetBIOS(Shared Networks)
Permit the use of theBootp service.
Bootp is short forBootstrap Protocol, whichenables a computer todiscover its own IPaddress.
Default Allow Inbound Bootp
Default Allow Outbound Bootp
The Traffic Rules tab displays a list of predefinedtraffic rules. Some of the default Traffic rules areread-only and are locked. You cannot modify theserules.
The rules appear in the order of their priority levels.Rules that appear higher in the list override the rulesthat appear lower in the list.
Keeping secure on the InternetAbout the Smart Firewall
204
You can add a new Traffic rule on this tab. You can alsodo the following activities:
You can change the settings ofa Traffic rule that does notfunction the way you want.
However, you cannot modifysome of the default rules thatare locked.
See “Modifying Traffic rules andProgram rules” on page 219.
Modify a Traffic rule
You can disable a Traffic rule.
However, you cannot turn offsome of the default rules thatare locked.
See “Turning off a Traffic ruletemporarily” on page 221.
Turn off a Traffic rule
You can change the priority of aTraffic rule by changing where itappears in the list.
w Only advanced users ornovice users at the direction oftechnical support, shouldperform this action.
See “Changing the order offirewall rules” on page 220.
Change the priority of aTraffic rule
About Program rules
Program rules control Internet access for the programsthat are on your computer. You can use the Firewallsettings to create and modify rules for programs.
On the Program Rules tab, you can do the following:
1 Add a program.
1 Rename a program.
205Keeping secure on the InternetAbout the Smart Firewall
1 Modify the rules for a program.
1 Add a rule for a program.
1 Modify the access settings of a program rule.
1 Modify the priority of a program rule by changingthe sequence of rules in the list.
1 Remove a program rule.
1 Remove a program.
You can create Program rules in the following ways:
Lets the firewallautomatically configureaccess for programs thefirst time that users runthem. This method is theeasiest way to createfirewall rules.
Automatically customize Internetaccess settings
Manages the list ofprograms that can accessthe Internet.
Use Firewall settings
Keeping secure on the InternetAbout the Smart Firewall
206
Lets the firewall notifyyou when a programattempts to access theInternet. You can thenallow or block Internetaccess for the program.
In some instances, suchas when you watch amovie, you might prefernot to be alerted with anymessages. In such cases,you can use the SilentMode to silence thefirewall alerts. In thiscase, the firewall behavesthe same as whenAutomatic ProgramControl is turned on.Norton 360 does notprompt you with anyfirewall alerts in thisstate.
The firewall notifies youonly if you have changedthe General Settingsoptions of Smart Firewallfrom their default,recommended settings.
Respond to alerts
Adding a program to Firewall settings
You can add programs to Firewall settings to controltheir ability to access the Internet. Manually configuredFirewall settings for programs override any settingsthat Automatic Program Control makes. However,Symantec recommends you to retain the settings thatAutomatic Program Control makes as and when yourun your programs.
207Keeping secure on the InternetAbout the Smart Firewall
w Firewall settings for programs are not migrated fromprevious versions of Norton 360. If you want to restoreany programs that you manually added in the previousversion, you must add them again in the currentversion.
To add a program to Firewall settings
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 On the Program Rules tab, click Add.
4 In the Select a program dialog box, browse to theexecutable file for the program that you want toadd.
5 Click Open.
6 In the ProgramControl alert, select the access levelthat you want this program to have. Your optionsare:
Allow all access attemptsby this program.
Allow
Deny all access attemptsby this program.
Block
Create the rules thatcontrol how this programaccesses the Internet.
You can set the followingcriteria for a rule:
Manually configure Internetaccess (Recommended)
1 Action
1 Connections
1 Computers
1 Communications
1 Advanced
1 Description
7 Click OK.
Keeping secure on the InternetAbout the Smart Firewall
208
Customizing a program
After you use Norton 360 for a while, you might needto change the access settings for certain programs.
To customize a program
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 On the ProgramRules tab, in the Program column,select the program that you want to change.
4 In the drop-down list next to the program that youwant to change, select the access level that you wantthis program to have. Your options are:
Allow all access attemptsby this program.
Allow
Deny all access attemptsby this program.
Block
Create the rules thatcontrol how this programaccesses the Internet.
Custom
The Auto option is the default option that isassigned automatically to a program whenAutomatic Program Control is turned on.
5 Click Apply.
Removing a program
You can remove programs from Firewall settings ifnecessary.
The firewall settings for the programs are not migratedfrom previous versions of Norton 360. If you removedany programs in the previous version and do not wantthem in the current version, you must remove themagain.
209Keeping secure on the InternetAbout the Smart Firewall
To remove a program from Firewall settings
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 On the ProgramRules tab, in the Program column,select the program that you want to remove.
4 Click Remove.
5 In the Confirmation dialog box, click Yes.The confirmation dialog box appears only when theAutomatic Program Control option is turned off.
6 Click Apply.
Adding Traffic rules and Program rulesFirewall settings automatically create most of thefirewall rules that you need. You can add custom rulesif necessary.
w Only experienced users should create their own firewallrules.
You can add the following types of firewall rules:
1 Traffic rules
1 Program rules
To add a Traffic rule
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 On the Traffic Rules tab, click Add.
4 Follow the instructions in the Add Rule Wizard.
To add a Program rule
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 On the ProgramRules tab, in the Program column,select the program to which you want to add a rule.
Keeping secure on the InternetAbout the Smart Firewall
210
4 Click Modify.You can also use the Access drop-down list next tothe program to modify the access level for theprogram. Accordingly, Smart Firewall modifies orcreates the relevant rule for the program.
5 In the Rules window, click Add.
6 Follow the instructions in the Add Rule Wizard.
Using the Add Rule Wizard
The AddRule Wizard leads you through the steps thatare necessary to create firewall rules.
To use the Add Rule Wizard
1 Open the Add Rule Wizard by creating a Trafficrule or a Program rule.
211Keeping secure on the InternetAbout the Smart Firewall
2 In the first panel of the AddRuleWizard, select theaction that you want for this rule. Your options are:
Allow communication ofthis type.
Allow
For example, consider aTraffic rule with thefollowing criteria: allinbound connectionsfrom Internet address192.168.1.1 through port8080. When you selectAllow, Smart Firewallallows all connections,which satisfies the othercriteria of this Trafficrule.
Prevent communicationof this type.
Block
For example, consider aTraffic rule with thefollowing criteria: allinbound connectionsfrom Internet address192.168.1.1 through port8080. When you selectBlock, Smart Firewallblocks all connections,which satisfies the othercriteria of this Trafficrule.
Keeping secure on the InternetAbout the Smart Firewall
212
Monitor
213Keeping secure on the InternetAbout the Smart Firewall
Update the Firewall –Activities category in theevent log each time thatcommunication of thistype takes place. Thisoption lets you monitorhow often this firewallrule is used. Norton 360notifies you every timethat the traffic matchingthe monitor rule criteriapasses through yourcomputer. You can usethe links in thesenotifications to view thelogs. You can view theevent log under Firewall– Activities category inthe Security Historywindow.
Norton 360 createsseparate action rules toallow or block theprograms that have onlyaMonitor rule associatedwith them. The Monitorrule must be of higherorder than the action rulefor successful log entry ofthe network event that isrelated to the program.
The monitor rule only logsthe traffic events. Youneed to create anotherAllow or Block rule tohandle the networktraffic.
You can monitor andallow or block the trafficby enabling theAdvancedoption in the Add Rule
Keeping secure on the InternetAbout the Smart Firewall
214
Wizard or the ModifyRule Wizard.
3 Click Next.
4 Select the type of connection for the rule. Youroptions are:
The rule applies tooutbound connectionsfrom your computer toanother computer.
Connections to other computers
The rule applies toinbound connectionsfrom another computer toyour computer.
Connections from othercomputers
The rule applies toinbound and to outboundconnections.
Connections to and from othercomputers
215Keeping secure on the InternetAbout the Smart Firewall
5 Click Next, and then select the computers that applyto the rule. Your options are:
The rule applies to allcomputers.
Any computer
This rule applies only tocomputers in the localsubnet.
Anorganization’snetworkis divided into subnets tofacilitate efficientInternet communications.A subnet represents all ofthe computers in thesame LAN.
Any computer in the localsubnet
The rule applies only tothe computers, sites, ordomains that you specify.
You can specify thenames and addresses ofcomputers that apply tothe rule. The details ofthe specified computersappear in the list. You canalso remove computersfrom the list.
When you select thisoption, the Add optionbecomes available. Youcan then specify orremove a computer byusing the Add or theRemove options.
Only the computers and siteslisted below
Keeping secure on the InternetAbout the Smart Firewall
216
6 Click Next, and then select the protocols for therule. Your options are:
The rule applies to TCP(Transmission Control
TCP
Protocol)communications.
The rule applies to UDP(User Datagram Protocol)communications.
UDP
The rule applies to TCPand to UDPcommunications.
TCP and UDP
The rule applies to ICMP(InternetControlMessage
ICMP
Protocol)communications.
This option is availableonly when you add aTraffic rule, modify aTraffic rule, or modify aProgramrule that handlesICMP traffic.
The rule applies to ICMP(InternetControlMessage
ICMPv6
Protocol for InternetProtocol version 6)communications.
This option is availableonly when you add aTraffic rule, modify aTraffic rule, or modify aProgramrule that handlesICMP traffic.
217Keeping secure on the InternetAbout the Smart Firewall
The rule applies to allsupported protocols.
When you select thisoption, you cannotspecify the types ofcommunications or portsthat apply to the rule.
All
7 Select the ports for the rule. Your options are:
The rule applies tocommunications that useany port.
All types of communication (allports, local and remote)
The rule applies to theports that you specify.You can specify the portsby selecting from thelisted ports or by addingspecific ports or portranges.
Only communications thatmatch all types and ports listedbelow
w If you select ICMPor ICMPv6 protocol, youcan specify thecommands. To do so,select a command fromthe list of knowncommandsor add specificcommands or commandranges.
When you select thisoption, the Add optionbecomes available. Youcan use theAdd option orthe Remove option tospecify or remove a portor a command.
Keeping secure on the InternetAbout the Smart Firewall
218
8 Click Next.
9 Check Create a Security History log entry if youwant Norton 360 to create an entry in the firewallevent log.Norton 360 creates an entry when a networkcommunication event matches this rule. You canview the event log in the Security History windowunder Firewall – Activities. If you selected theMonitor option in the Action window, then theCreate a Security History log entry option isautomatically checked. You cannot uncheck the boxto turn off this option as it is the default setting.
10 Check Apply this rule if you want to apply this ruleto Ipv6 NAT Traversal traffic.
11 Click Next, and then, in the text box, type a namefor this rule.
12 Click Next, and then review the new rule settings.
13 Click Finish.
14 When you have finished adding rules, click OK.
Modifying Traffic rules and Program rulesYou can change an existing firewall rule if it does notfunction the way that you want. You can use the Modifyoption to change the settings of an existing firewallrule. When you change a rule, the firewall uses the newcriteria of the modified rule to control network traffic.
You cannot modify some of the default rules that arelocked. However, you can view the settings of theserules by using the View option.
To modify a Traffic rule
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 On the Traffic Rules tab, select the rule that youwant to change.
4 Click Modify.
219Keeping secure on the InternetAbout the Smart Firewall
5 In the Modify Rule window, make the necessarychanges to modify any aspect of the rule.
6 When you have finished changing the rule, clickOK.
To modify a Program rule
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 On the ProgramRules tab, select the program thatyou want to change.
4 Click Modify.You can also use the Access drop-down list next tothe program to modify the access level for theprogram. Accordingly, Smart Firewall modifies orcreates the relevant rule for the program.
5 In the Rules window, select the rule that you wantto change.
6 Click Modify.
7 In the Modify Rule window, make the necessarychanges to modify to change any aspect of the rule.
8 When you have finished changing the rule, clickOK.
9 In the Rules window, click OK.
Changing the order of firewall rulesEach list of firewall rules is processed from the topdown. You can adjust how the firewall rules areprocessed by changing their order.
w Do not change the order of the default Traffic rulesunless you are an advanced user. Changing the orderof default Traffic rules can affect firewall functionalityand reduce the security of your computer.
To change the order of Traffic rules
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
Keeping secure on the InternetAbout the Smart Firewall
220
3 On the Traffic Rules tab, select the rule that youwant to move.
4 Do one of the following:
1 To move this rule before the rule above it, clickMove Up.
1 To move this rule after the rule below it, clickMove Down.
5 When you are done moving the rules, click Apply.
To change the order of Program rules
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 On the ProgramRules tab, select the program thatcontains the rule that you want to move.
4 Click Modify.
5 In the Rules window, select the rule that you wantto move.
6 Do one of the following:
1 To move this rule before the rule above it, clickMove Up.
1 To move this rule after the rule below it, clickMove Down.
7 When you are done moving the rules, click OK.
8 In the Settings window for Firewall, click Apply.
Turning off a Traffic rule temporarilyw You cannot turn off some of the default firewall rules
that appear in the list. You can only view the settingsof these rules by using the View option.
You can temporarily turn off a Traffic rule if you needto allow specific access to a computer or a program.You must remember to turn on the rule again whenyou are done working with the program or computerthat required the change.
221Keeping secure on the InternetAbout the Smart Firewall
To turn off a Traffic rule temporarily
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 On the Traffic Rules tab, uncheck the box next tothe rule that you want to turn off.
4 Click Apply.
Allowing a blocked programSometimes the Norton 360 firewall blocks certainprograms from accessing the Internet. Such programsmight include certain streaming-media programs,network games, or custom business applications thatare provided by your employer. If you know that theprogram's Internet activity is not a threat to yoursecurity, you can unblock the program's Internetaccess.
To allow a blocked program
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 On the ProgramRules tab, select the program thatyou want to allow access to the Internet.
4 In the Access drop-down list for the program entry,click Allow.
5 Click Apply.
Removing a firewall ruleYou can remove some of the firewall rules if necessary.However, you cannot modify some of the default Trafficrules that appear in the list. You can view the settingsof these rules by using the View option.
w Do not remove a default firewall rule unless you are anadvanced user. Removing a default firewall rule canaffect firewall functionality and reduce the security ofyour computer.
Keeping secure on the InternetAbout the Smart Firewall
222
To remove a Traffic rule
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 On the Traffic Rules tab, select the rule that youwant to remove.
4 Click Remove.
5 In the Confirmation dialog box, click Yes.
To remove a Program rule
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 On the ProgramRules tab, in the Program column,select the program that contains the rule that youwant to remove.
4 Click Remove to remove all the program rules thatare associated with the program.
5 To remove a specific rule that is associated with theprogram, click Modify.
6 In the Rules window, select the rule that you wantto remove.
7 Click Remove.
8 In the Confirmation dialog box, click Yes.
9 Click OK.
About Norton Firewall DiagnosisThere may be times when firewall may block thenetwork traffic that you want to allow based on itsconfiguration settings. In such cases, you may haveissues in accessing the Internet, the Network, oranother computer to perform tasks such as sharingresources.
When you experience network connection problems,Norton Firewall acts quickly in identifying the causeof failure and provides its diagnosis. Norton 360
223Keeping secure on the InternetAbout the Smart Firewall
displays the Firewall Diagnostics Wizard when youencounter network connection problems.
w Norton Firewall Diagnosis is available only in Windows7.
The Wizard contains the problem diagnosis report thatis unique for different cases of network blocks. Forinstance, a network block can occur in any of thefollowing cases:
1 The one click option to stop all network traffic isactive
1 The uncommon protocol that is handling the trafficis blocked
1 The currently active firewall rule is conditioned toblock the traffic that you want to allow
1 The traffic has violated the process policy of thefirewall
1 The traffic has violated the traffic policy of thefirewall
1 The traffic comes from the restricted zone ofnetworks or computers
1 The traffic matches an Intrusion Prevention attacksignature
You can use the FirewallDiagnosticsWizard as a guideto troubleshoot the network connection problem byyourself.
For each case of network block, the Wizard containsthe firewall’s analysis of the cause and the possiblesolutions to fix the block.
Norton 360 recommends that you use the FirewallDiagnostics Wizard to remove any type of block. Thesolutions in the Wizard let you analyze the issue andtake a suitable action to resolve the problem.
Using the Wizard to troubleshoot the problem has thefollowing advantages:
1 It automatically tries to fix the problem by itself
1 It lets you modify the settings that are related tothe block
Keeping secure on the InternetAbout the Smart Firewall
224
1 It lets you view the log details related to the networkblock event
1 It provides you the option to turn off firewall as thelast means to resolve the issue
About Intrusion PreventionIntrusion Prevention scans all the network traffic thatenters and exits your computer and compares thisinformation against a set of attack signatures. Attacksignatures contain the information that identifies anattacker's attempt to exploit a known operating systemor program vulnerability. Intrusion Prevention protectsyour computer against most common Internet attacks.
For more information about the attacks that IntrusionPrevention blocks, go to the following URL:
http://www.symantec.com/business/security_response/attacksignatures
If the information matches an attack signature,Intrusion Prevention automatically discards the packetand breaks the connection with the computer that sentthe data. This action protects your computer from beingaffected in any way.
Intrusion Prevention scanning of every request fromall the devices that access your computer increases thescan time which slows down the network speed of yourcomputer. You can reduce the scan time and improvethe network speed of your computer by excluding thetrusted devices from Intrusion Prevention scanning.If you are sure that a device on your network is safe,you can change the trust level of the device to FullTrust. These trusted devices can be excluded fromIntrusion Prevention scan.
Intrusion Prevention relies on an extensive list ofattack signatures to detect and block suspiciousnetwork activity. Norton 360 runs LiveUpdateautomatically to keep your list of attack signatures upto date. If you do not use Automatic LiveUpdate, youshould run LiveUpdate once a week.
225Keeping secure on the InternetAbout Intrusion Prevention
Turning off or turning on Intrusion Preventionnotifications
You can choose whether you want to receivenotifications when Intrusion Prevention blockssuspected attacks. Whether or not you receivenotifications, Intrusion Prevention activities arerecorded in Security History. The Security Historyentries include information about the attackingcomputer and information about the attack.
You can choose whether you want to receivenotifications when Intrusion Prevention blockssuspected attacks based on a particular signature.
To turn off or turn on Intrusion Prevention notifications
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the Notifications row, doone of the following:
1 Move the On/Off switch to the right to the Offposition.
1 Move the On/Off switch to the left to the Onposition.
4 Click Apply.
To turn off or turn on an individual Intrusion Preventionnotification
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionSignaturesrow, click Configure.
4 In the IntrusionSignatures window, click an attacksignature, and then click Properties.
5 In the Signature Properties window, uncheck orcheck Notify me when this signature is detected.
Keeping secure on the InternetAbout Intrusion Prevention
226
6 Click OK.
7 In the Intrusion Signatures window, click OK.
8 In the Settings window for Firewall, click Apply.
Excluding or including attack signatures in monitoringIn some cases, benign network activity may appearsimilar to an attack signature. You may receiverepeated notifications about possible attacks. If youknow that the attacks that trigger these notificationsare safe, you can create exclusion for the attacksignature that matches the benign activity.
Each exclusion that you create leaves your computervulnerable to attacks.
If you have excluded the attack signatures that youwant to monitor again, you can include them in the listof active signatures.
To exclude attack signatures from being monitored
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionSignaturesrow, click Configure.
4 In the Intrusion Signatures window, uncheck theattack signatures that you want to exclude.
5 Click OK.
To include the attack signatures that were previouslyexcluded
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionSignaturesrow, click Configure.
4 In the Intrusion Signatures window, check theattack signatures that you want to include.
227Keeping secure on the InternetAbout Intrusion Prevention
5 Click OK.
Turning off or turning on AutoBlockWhen an attack is detected, the connection isautomatically blocked to ensure that your computer issafe. If the attack comes from a computer that haspreviously tried to access your computer by usinganother attack signature, Norton 360 activatesAutoBlock. AutoBlock blocks all traffic between yourcomputer and the attacking computer for a set amountof time. During this period, AutoBlock also blocks thetraffic that does not match an attack signature.
AutoBlock stops traffic between your computer and aspecific computer. If you want to stop all traffic to andfrom your computer, you can use the Block AllNetwork Traffic option.
If AutoBlock blocks a computer or computers that youneed to access, you can turn off AutoBlock.
To turn off or turn on AutoBlock
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionAutoBlockrow, click Configure.
4 In the Intrusion AutoBlock window, underAutoBlock, do one of the following:
1 To turn off Intrusion AutoBlock, click Off.
1 To turn on Intrusion AutoBlock, click On[Recommended].
5 Click OK.
Unblocking AutoBlocked computers
In some cases, AutoBlock may recognize normalactivity as an attack. The list of computers that
Keeping secure on the InternetAbout Intrusion Prevention
228
AutoBlock has currently blocked may include thecomputer that you should be able to communicate with.
If a computer that you need to access appears on thelist of blocked computers, you can unblock it. You maywant to reset your AutoBlock list if you have changedyour protection settings. To reset the AutoBlock list,you can unblock all of the computers that are on thelist at one time.
To unblock AutoBlocked computers
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionAutoBlockrow, click Configure.
4 In the Intrusion AutoBlock window, underComputers currently blocked by AutoBlock, doone of the following:
1 To unblock one computer, select its IP address,and then click Unblock.
1 To unblock all computers on the AutoBlock list,click Unblock All.
5 Click OK.
Permanently blocking a computer that has been blocked byAutoBlock
You can permanently block a computer that has beenblocked by AutoBlock. The permanently blockedcomputer is removed from the AutoBlock list and addedas a Restricted computer in the Network Security Mapof Home Networking.
To permanently block a computer that has been blockedby AutoBlock
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
229Keeping secure on the InternetAbout Intrusion Prevention
3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionAutoBlockrow, click Configure.
4 In the Intrusion AutoBlock window, underComputers currently blockedbyAutoBlock, clickthe computer that you want to block permanently.
5 Click Restrict.
6 Click OK.
Turning off and turning on Browser ProtectionYou can choose whether you want to protect your Webbrowser by allowing Norton 360 to block unknownprograms from accessing your computer.
By default, the Browser Protection option is turnedon. In this case, Norton 360 proactively blocks new orunknown malware programs before they attack yourcomputer. By protecting your Web browser, Norton360 secures your sensitive information and preventsthe attackers from controlling your system remotely.This feature checks for browser vulnerabilities inInternet Explorer 6, Internet Explorer 7, or Firefoxbrowsers.
w Always keep the Browser Protection setting turned onto protect your Web browser against attacks bymalicious Web sites.
To turn off or turn on Browser Protection
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 On the Intrusion and Browser Protection tab, inthe BrowserProtection row, do one of the following:
1 To turn off Browser Protection, move the On/Offswitch to the right to the Off position.
1 To turn on Browser Protection, move the On/Offswitch to the left to the On position.
4 Click Apply.
Keeping secure on the InternetAbout Intrusion Prevention
230
5 If you turned off Browser Protection, in theProtection Alert dialog box, in the Select theduration drop-down list, select how long you wantto turn off Browser Protection.
6 Click OK.
About Intrusion Prevention exclusion listThe Intrusion Prevention System in Norton 360 scansall the network traffic that enters and exits yourcomputer. When a device on your network requestsaccess to your computer, Intrusion Prevention scansthis request to ensure that it is not a virus attack. Ifthe information matches an attack signature, IntrusionPrevention blocks the traffic from the suspicious deviceand protects your computer. Scanning every requestfrom all the devices that access your computerincreases the scan time which slows down the networkspeed of your computer.
If you are sure that a device on your network is safe,you can change the trust level of the device to FullTrust. You can configure the trust level of a deviceusing the Network Security Map. You can exclude thesetrusted devices from Intrusion Prevention scan.Excluding Full Trust devices from the IntrusionPrevention scan saves the scan time and improves thenetwork speed of your computer. When you exclude adevice that is set to Full Trust, Norton 360 does notscan any information that is received from this device.The Full Trust devices that are excluded from IntrusionPrevention scan are added to Intrusion Preventionexclusion list.
When a device on your network attempts to infect yourcomputer, AutoBlock stops all access requests fromthis device. If you add this device to the IntrusionPrevention exclusion list, Norton 360 removes thedevice from the exclusion list.
w Ensure that the IP address of the devices that are addedto Intrusion Prevention exclusion list never changes.
231Keeping secure on the InternetAbout Intrusion Prevention
If you find that any of the devices that you excludedfrom the Intrusion Prevention scan is infected, you canpurge the saved exclusion list. When you purge theexclusion list, Norton 360 removes all the trusteddevices from the exclusion list.
Removing all devices from Intrusion Preventionexclusion list
If you are sure that a device on your network is safe,you can change the trust level of the device to FullTrust. These trusted devices can be excluded fromIntrusion Prevention scan. Excluding Full Trust devicesfrom Intrusion Prevention scan saves the scan timeand improves the network speed of your computer.When you exclude a Full Trust device from IntrusionPrevention scan, Norton 360 does not scan anyinformation that is received from this device. The FullTrust devices that are excluded from IntrusionPrevention scan are added to Intrusion Preventionexclusion list.
If you find that any of the devices that you excludedfrom Intrusion Prevention scan is infected, you canpurge the saved exclusion list and remove all thedevices.
You can purge the saved exclusion list under thefollowing circumstances:
1 Any of the devices that you excluded from IntrusionPrevention scan is infected.
1 Any of the devices that you excluded from IntrusionPrevention scan attempts to infect your computer.
1 Your home network is infected.
When a device on your network attempts to infect yourcomputer, AutoBlock stops all the access requests fromthis device. If you add this device to the IntrusionPrevention exclusion list, Norton 360 removes thedevice from the exclusion list.
Keeping secure on the InternetAbout Intrusion Prevention
232
When you remove all the devices from the savedexclusion list, Intrusion Prevention scans every requestfrom all the devices that access your computer.
To remove all the devices from the Intrusion Preventionexclusion list
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 Click the Intrusion and Browser Protection tab.
4 Under Intrusion Prevention, in the Exclusion Listrow, click Purge.
5 In the confirmation dialog box, click Yes.
6 In the Settings window for Firewall, click Close.
About Download InsightDownload Insight provides information about thereputation of any executable file that you downloadfrom the supported portals. The reputation detailsindicate whether the downloaded file is safe to install.You can use these details to decide the action that youwant to take on the file.
Some of the supported portals are:
1 Internet Explorer
1 QQ (Chat)
1 MSN Messenger (Chat)
1 Limewire (P2P)
1 MSN Explorer (Browser, E-mail & Chat)
1 Opera (Browser)
1 Outlook (E-mail)
1 Thunderbird (E-mail)
1 Windows Mail (E-mail)
1 Firefox (Browser)
1 Chrome (Browser)
1 BitTorrent (P2P)
233Keeping secure on the InternetAbout Download Insight
1 AOL (Browser)
1 Yahoo Messenger (Chat)
1 Safari (Browser)
1 FileZilla (File Manager)
1 Outlook Express (E-mail)
When you download a file, Norton 360 analyzes thefile based on its reputation details. Download Insightuses the file analysis results to provide you thereputation details of the file.
The basic reputation levels of the files are good, bad,unproven, and poor. Based on the reputation levels,the files can be broadly classified as follows:
Includes the files that are eitherNorton trusted or User trusted.
Safe files have good reputationlevels. These files do not harmyour computer. By default,Auto-Protect allows theexecution of the safe files.
Safe
Includes the files that Norton360 identifies as a security riskor a threat.
Unsafe files are characterized bybad reputation levels and Norton360 removes them from yourcomputer.
Unsafe
Keeping secure on the InternetAbout Download Insight
234
Includes the files that areneither safe nor unsafe.
Unknown files have unproven orpoor reputation. These filesmight harm your computer. Inthe case of an unknown file,Download Insight notifies youthat it is unsure of thereputation level of the file. Youcan use the View Details link inthe notifications to view moredetails of the file.
For unknown files, Norton 360lets you decide the action thatyou want to perform on the file.For example, you can run a file,stop the file from running, installthe file, cancel file installation,or remove the file from yourcomputer.
Unknown
By default, Download Insight lets you install safe files.For files of unknown reputation levels, DownloadInsight prompts you to select an action that you wantto perform on the file. In case of an unsafe file,Download Insight informs you that Norton 360 hasdetected the file as a threat and has removed the file.
Based on the reputation details that the DownloadInsight notifications provide for the files that needattention, you can take an action on the file. TheDownloadInsight window provides the various optionsthat let you select an action. The options that appearin the window vary depending on the reputation levelof the downloaded file. The following are some of theoptions that are available in this window:
Lets you retain a file on yourcomputer but prevent it frombeing executed
Stop this program fromrunning
235Keeping secure on the InternetAbout Download Insight
Lets you quarantine a file onyour computer
Remove this file frommysystem
Lets you execute and run anexecutable file
Run this programanyway
Security History logs details of all events thatDownload Insight processes and notifies. It alsocontains information about the safety level of the fileand the action that you take on the file, if any. You canview these details in the Download Insight categoryin Security History.
When you turn off Auto-Protect, Norton 360automatically turns off Download Insight. In this case,your computer is not adequately protected fromInternet threats and security risks. Therefore, ensurethat you always keep Auto-Protect turned on to protectyour computer from security risks.
When Silent Mode is turned on, Norton 360 suppressesthe Download Insight notifications.
Turning off or turning on Download IntelligenceDownload Insight protects your computer against anyunsafe file that you may run or execute after youdownload it using a supported Web browser. By default,Download Insight is turned on. In this case, DownloadInsight notifies you about the reputation levels of anyexecutable file that you download. The reputationdetails that Download Insight provides indicatewhether the downloaded file is safe to install.
There may be times when you want to turn offDownload Insight. For example, if you want todownload an unsafe file. In this case, you must turn offDownload Insight so that Norton 360 lets you downloadthe file and does not remove it from your computer.
You can use the DownloadIntelligence option to turnoff or turn on Download Insight.
Keeping secure on the InternetAbout Download Insight
236
To turn off Download Intelligence
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 On the Intrusion and Browser Protection tab, inthe Download Intelligence row, move the On/Offswitch to the right to the Off position.
4 In the Settings window, click Apply.
5 In the Select the duration drop-down list, selecthow long you want to turn off Download Insight,and then click OK.
To turn on Download Intelligence
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 On the Intrusion and Browser Protection tab, inthe Download Intelligence row, move the On/Offswitch to the left to the On position.
4 In the Settings window, click Apply.
Configuring the Download Insight Notifications optionYou can use the DownloadInsightNotifications optionto choose when you want Download Insight to displaynotifications.
By default, the DownloadInsightNotifications optionis set to On. In this case, Norton 360 notifies you eachtime you download an executable file.
When the Download Insight Notifications option isset to RisksOnly, Download Insight notifies only whenyou download an infected or a suspicious executablefile.
Setting the Download Insight Notifications to RisksOnly does not turn off analysis of all the otherexecutable files that you download. Whether or notyou receive notifications of all files, Security Historykeeps a record of all the Download Insight activities.
237Keeping secure on the InternetAbout Download Insight
You can review the summary of the Download Insightalerts and notifications in Security History.
To configure the Download Insight Notifications option
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
3 On the IntrusionandBrowserProtection tab, underDownload Intelligence, in the Download InsightNotifications row, do one of the following:
1 To receive Download Insight notifications onlyfor the infected or the suspicious executable filesthat you download, move the DownloadInsightNotifications switch to the right to the RisksOnly position.
1 To receive Download Insight notifications forall files that you download, move the DownloadInsight Notifications switch to the left to theOn position.
4 In the Settings window, click Apply.
Configuring the Download Insight Full Report optionThe Download Insight Full Report settings let youspecify when and for what type of file you want to beprompted to select a suitable action. For instance, youcan specify the type of downloaded files for whichDownload Insight asks you to decide what to do withthe file and how frequently these prompts for a suitableaction must appear.
Keeping secure on the InternetAbout Download Insight
238
You can use the following options to configureDownload Insight Full Report:
When you set the DownloadInsight Full Report option toAlways, Download Insightprompts you for a suitable actionin case of safe and unknownfiles. In this case, the DownloadInsight window appearswhenever you try to launch anydownloaded file that has a safeor an unknown reputation score.In this window, you can viewdetails about the file and theoptions that let you select asuitable action for the file.
In the case of unsafe files,Norton 360 identifies them asthreats and removes them.
Always
239Keeping secure on the InternetAbout Download Insight
When you set the DownloadInsight Full Report option toUnproven Only, DownloadInsight prompts you to select asuitable action for unknown filesonly. In this case, the DownloadInsight window appearswhenever you try to launch anydownloaded file that has anunknown reputation score. Inthis window, you can viewdetails about the file and theoptions that let you select asuitable action for the file.
Unproven Only is default optionofDownload Insight Full Report.In this case, Norton 360 allowsthe execution of the safe fileswithout prompting you for asuitable action. In the case ofunsafe files, Norton 360identifies them as threat andremoves them.
Unproven Only
Keeping secure on the InternetAbout Download Insight
240
When you set the DownloadInsight Full Report option toNever, Download Insight doesnot prompt you to select asuitable action for any type offile. In this case, the DownloadInsightwindow does not appearwhenever you try to launch anydownloaded file.
However, Norton 360 continuesto process the files for analysisof its reputation level. Based onthe reputation level, Norton 360takes an appropriate action. Itallows the execution of the safeand the unknown files. In thecase of unsafe files, Norton 360identifies them as threat andremoves them.
The alert messages that yousuppress and the activity detailscan be reviewed at any time inSecurity History.
Never
To configure the Download Insight Full Report option
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Firewall.
241Keeping secure on the InternetAbout Download Insight
3 On the IntrusionandBrowserProtection tab, underDownload Intelligence, in the Download InsightFull Report row, do one of the following:
1 If you want Download Insight to prompt you fora suitable action in case of safe and unknownfiles, move the Download Insight Full Reportswitch to the Always position.
1 If you want Download Insight to prompts you toselect a suitable action for unknown files only,move the Download InsightFullReport switchto the Unproven Only position.
1 If you do not want Download Insight to promptyou to select a suitable action for any type of file,move the Download InsightFullReport switchto the Never position.
4 In the Settings window, click Apply.
About Norton AntiSpamNorton AntiSpam lets you categorize the emailmessages that you receive in your email programs intospam email and legitimate email. It filters legitimateemail into the Inbox folder and spam email into theJunk folder or the Norton AntiSpam folder.
Norton AntiSpam uses Symantec enterprise-class,spam-filtering technology to classify the spam emailmessages from legitimate email messages. NortonAntiSpam uses a real-time filter delivery mechanismand filters email messages using various local filtersat different levels. The local filters classify the emailmessages as spam or legitimate. If the local filtersclassify the email message as legitimate, NortonAntiSpam collects information such as signature andURL hashes of the email message. Norton AntiSpamthen sends this information to the Symantec Webserver for additional analysis.
When the email message is classified as spam, NortonAntiSpam changes the subject of the email message
Keeping secure on the InternetAbout Norton AntiSpam
242
and sends it to your email client. The email clientidentifies the change in the subject of the emailmessage and moves it to the Junk folder or the NortonAntiSpam folder.
The Norton AntiSpam local filters use Whitelisttechnique, Blacklist technique, and patented filteringtechnology to classify email messages as spam orlegitimate. For these filters to work efficiently, NortonAntiSpam requires antispam definition updates atregular intervals through LiveUpdate. These updatescontain signature information of spam and legitimateemail messages. The updates also contain any new rulethat Symantec creates to filter spam email messages.
Norton AntiSpam uses predefined email rules and theuser-defined Allowed List and Blocked List, to expeditethe scanning of email. It accepts email messages fromthe list of allowed email senders and blocks emailmessages from the list of blocked email senders.
Norton AntiSpam also automatically imports the listsof addresses from supported email programs duringthe initial integration. It helps you keep your list ofallowed and blocked email senders in sync with yourcurrent address books. When Norton AntiSpam importsthe addresses from your Outlook address book orWindows Mail address book, it also imports theaddresses that are available in the Safe Sender and theBlocked Sender lists.
w Turning off Norton AntiSpam increases your exposureto receive unsolicited email messages. Always ensurethat Norton AntiSpam is turned on. It secures youremail client from unwanted online content.
You can review all the antispam statistics under theAntiSpam category in the Security History window.
Spam filtering featuresWith the increase in usage of email, many users receivea number of unwanted and unsolicited commercialemail messages that are known as spam. Not only does
243Keeping secure on the InternetAbout Norton AntiSpam
spam make it difficult to identify valid email messages,but some spam contains offensive messages andimages.
Norton 360 provides several powerful features toreduce your exposure to unwanted online content.
Adds several options to the toolbar insupported email programs, if youchoose
See “About your email programtoolbar” on page 247.
Integration withemail programs
1 Uses a user-defined address listto expedite the scanning of email
1 Accepts all email messages fromsenders in the Allowed List
1 Treats all email messages fromsenders in the Blocked List asspam
1 Allows and blocks email messagesfrom entire domains as well asindividual email addresses
See “About Norton AntiSpam settings”on page 471.
Allowed and BlockedLists
Automatically imports lists ofaddresses from supported emailprograms to keep your list of allowedemail senders and blocked emailsenders in sync, if you choose
See “Identifying authorized senders”on page 250.
Automatic import ofaddresses
Lets you check the Symantec Webservers to filter the spam emailmessages which the local filtersclassify as legitimate
See “About Web Query” on page 254.
Web Query
Keeping secure on the InternetAbout Norton AntiSpam
244
Updates the copies of Symantec spamdefinition files automatically
Automatedupdateofspam definitions
Configuring Client IntegrationThe Client Integration tab lists the supported emailprograms, or clients, that are installed on yourcomputer and their associated address books. Whenyou select an email program, Norton 360 adds a NortonAntiSpam drop-down list or a few options to thetoolbar of the supported email program. You can usethe NortonAntiSpam drop-down list or the options toclassify the email messages as spam or legitimate. Youcan also use these options to empty the spam folderand to open the Settings window to configure theNorton AntiSpam settings. If your email program doesnot have a Junk folder, it also adds a Norton AntiSpamfolder in the folders area. You can use the NortonAntiSpam folder to sort and store spam messages.However, if your email client has a Norton AntiSpamfolder from the previous version of Norton 360, NortonAntiSpam uses the Norton AntiSpam folder and notthe Junk folder.
w Integration of Norton AntiSpam toolbar is notsupported in Windows Mail in Windows Vista.
When you classify an email message as spam orlegitimate, Norton AntiSpam lets you send themisclassified email message as feedback to Symantec.You can use the Feedback option to send themisclassified email message to Symantec for analysis.
You can also import into the Norton AntiSpam AllowedList and Blocked List, the list of addresses that arepresent in the supported email program. NortonAntiSpam automatically adds the new email addressesfrom the address book of your supported email programonce in a day when your computer is idle. However, ifyou want to manually import addresses, use the Importoption in the Allowed List window.
245Keeping secure on the InternetAbout Norton AntiSpam
When you open your email client, the welcome screenappears. If you do not want the welcome screen toappear in the future, check the Don't show this againoption before you click Close. Norton 360 notifies thesuccessful integration of Norton AntiSpam with youremail client.
Norton AntiSpam also automatically imports the listsof addresses from the supported email programs duringthe initial client integration. It helps you keep your listof allowed and blocked email senders in sync with yourcurrent address books. When Norton AntiSpam importsthe addresses from your Outlook address book orWindows Mail address book, it also imports theaddresses that are available in the Safe Sender and theBlocked Sender lists.
Norton 360 supports Norton AntiSpam integrationwith the following email programs:
1 Microsoft Outlook 2002/2003/2007/2010
1 Outlook Express 6.0 or later
1 Windows Mail in Windows Vista
w Norton 360 supports only the 32-bit version ofMicrosoft Outlook 2010.
Norton 360 does not add any options to theWindows Mail toolbar. However, it identifies thespam email messages and moves them into the Junkfolder or the Norton AntiSpam folder.
w After successful integration, Outlook Express restartsautomatically.
To configure Client Integration
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click AntiSpam.
3 On the Client Integration tab, turn on or turn offthe programs with which you want NortonAntiSpam to integrate.
4 Select one or more address books to be importedautomatically into your Allowed List.
Keeping secure on the InternetAbout Norton AntiSpam
246
5 Click Apply to save the changes.
About your email program toolbar
Norton AntiSpam adds a drop-down list or a fewoptions to the toolbar of supported email programs.
w Integration of Norton AntiSpam toolbar is notsupported in Windows Mail in Windows Vista.
You can use the following options:
Marks the selected email as spam and movesthe email message into the Junk folder or theNorton AntiSpam folder
When you reclassify an email message as spam,Norton 360 provides you the option to send themisclassified email message as feedback toSymantec. This option appears only if theFeedback option on the Addresses tab, in theAntiSpam Settings window, is set as Ask Me.
When you reclassify an email message as spam,Norton 360 displays a message whether or notto add the sender's email address to the BlockedList. This message appears depending on theoption that you select in the drop-down listpresent at the bottom of the Blocked Listwindow.
This isSpam
247Keeping secure on the InternetAbout Norton AntiSpam
Marks the selected email as allowed (not spam)and moves the email message into the Inbox
When you reclassify an email message aslegitimate, Norton 360 provides you the optionto send the misclassified email message asfeedback to Symantec. This option appears onlyif the Feedback option on the Addresses tab, inthe AntiSpam Settings window, is set as AskMe.
When you reclassify an email message aslegitimate, Norton 360 displays a messagewhether or not to add the sender's email addressto the Allowed List. This message appearsdepending on the option that you select in thedrop-down list present at the bottom of theAllowed List window.
This isnot Spam
Removes all email that has been placed in theJunk folder or the Norton AntiSpam folder
EmptySpamFolder
Displays the Norton AntiSpam settings sectionof the Norton 360 Settings window
OpenNortonAntiSpam
Setting Address Book ExclusionsWhen you add an email address to the Address BookExclusions list, Norton AntiSpam does not import theaddress into the Allowed List and Blocked List. If youdelete an email address from the Allowed List orBlocked List, Norton AntiSpam automatically adds theaddress to the Address Book Exclusions list. However,when you delete an email address that you manuallyadded to the Allowed List or Blocked List, NortonAntiSpam does not add the address to the Address BookExclusions list.
You cannot add a domain name to the Address BookExclusions list. When you delete a domain name from
Keeping secure on the InternetAbout Norton AntiSpam
248
the Allowed List or Blocked List, Norton AntiSpam doesnot add the domain name to the Address BookExclusions list.
w You can specify Address Book Exclusions before youimport the address book. Add all email addresses tothe Address Book Exclusions list that you do not wantto import from the address book of your email program.
To add entries to the Address Book Exclusions list
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click AntiSpam.
3 On the Addresses tab, in the Address BookExclusions row, click Configure.
4 In the AddressBookExclusions window, click Add.
5 In the AddEmailAddress dialog box, type the emailaddress.Optionally, type the name that corresponds to theemail address for easy identification.
6 Click OK to close the AddEmailAddress dialog box.
7 Click OK to save and close the Address BookExclusions window.
To edit or delete entries in the Address Book Exclusionslist
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click AntiSpam.
3 On the Addresses tab, in the Address BookExclusions row, click Configure.
4 In the AddressBookExclusions window, select theitem with which you want to work.
5 Do one of the following:
1 To edit an entry, click Edit to open the EditEmailAddress window, edit the details, and thenclick OK.
1 To delete an entry, click Remove.
249Keeping secure on the InternetAbout Norton AntiSpam
6 Click OK to save and close the Address BookExclusions window.
Identifying authorized sendersWhen you know that you want to receive any emailmessages from a specific address or domain, you canadd it to the Allowed List.
Norton AntiSpam automatically imports the addressbook entries and Safe Sender List entries once in a daywhen your computer is idle.
If you have added a new supported email program, youcan import its address book manually to your AllowedList immediately or at any time. You can also addnames and domains to the Allowed List individually.
w Before you import the address book, you can specifyyour Address Book Exclusions. Norton AntiSpam doesnot import the email addresses that you add to theAddress Book Exclusions list.
To import an address book
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click AntiSpam.
3 On the Addresses tab, in the AllowedList row, clickConfigure.
4 In the Allowed List window, click Import.
5 Click OK to save and close the AllowedList window.
To add entries to your Allowed List
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click AntiSpam.
3 On the Addresses tab, in the AllowedList row, clickConfigure.
4 In the Allowed List window, click Add.
5 In the Add Email Address dialog box, in theAddress Type drop-down list, specify whether youadd an email address or a domain name.
Keeping secure on the InternetAbout Norton AntiSpam
250
6 Do one of the following:
1 To add an email address, type the email addressthat you want to allow, and optionally, the nameof the sender.
1 To add a domain name, type the address of thedomain (for example, symantec.com), andoptionally, the name of the domain.
7 Click OK to close the AddEmailAddress dialog box.
8 Click OK to save and close the AllowedList window.
To edit or delete entries in the Allowed List
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click AntiSpam.
3 On the Addresses tab, in the AllowedList row, clickConfigure.
4 In the Allowed List window, select the item withwhich you want to work.
5 Do one of the following:
1 To edit an entry, click Edit to open the EditEmail Address dialog box, edit the details, andclick OK.
1 To delete an entry, click Remove.
When you delete an entry that was imported,Norton AntiSpam automatically adds it to theAddress Book Exclusions list.
6 Click OK to save and close the AllowedList window.
Identifying senders of spamIf you do not want to receive any email messages froma specific address or domain, you can add it to theBlocked List. Norton AntiSpam marks all emailmessages from this address or domain as spam.
w Norton AntiSpam also automatically imports the listsof addresses that are available in the Blocked Senderlists of your email program into the Blocked List duringthe initial client integration or address book import.
251Keeping secure on the InternetAbout Norton AntiSpam
Norton AntiSpam lets you type invalid email addressesto the Blocked List.
w Always add unknown email addresses and domains tothe Blocked List, so that you do not receive unsolicitedemail messages from such addresses or domains.
To import addresses to the Blocked List
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click AntiSpam.
3 On the Addresses tab, in the AllowedList row, clickConfigure.
4 In the Allowed List window, click Import.
5 Click OK to save and close the AllowedList window.
To add entries to the Blocked List
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click AntiSpam.
3 On the Addresses tab, in the BlockedList row, clickConfigure.
4 In the Blocked List window, click Add.
5 In the Add Email Address dialog box, in theAddress Type drop-down list, specify whether youadd an email address or a domain name.
6 Do one of the following:
1 To add an email address, type the email addressthat you want to block, and the name of thesender.
1 To add a domain, enter the address of the domain(for example, symantec.com), and the name ofthe domain.
7 Click OK to close the AddEmailAddress dialog box.
8 Click OK to save and close the BlockedList window.
To edit or delete entries in the Blocked List
1 In the Norton 360 main window, click Settings.
Keeping secure on the InternetAbout Norton AntiSpam
252
2 In the Settings window, under Detailed Settings,click AntiSpam.
3 On the Addresses tab, in the BlockedList row, clickConfigure.
4 In the Blocked List window, select the item withwhich you want to work.
5 Do one of the following:
1 To edit an entry, click Edit to open the EditEmail Address dialog box, edit the details, andthen click OK.
1 To delete an entry, click Remove.
When you delete an entry that was imported,Norton AntiSpam automatically adds it to theAddress Book Exclusions list.
6 Click OK to save and close the BlockedList window.
Setting the Feedback optionEmail messages in the email client might sometimesget wrongly classified as spam or legitimate. TheFeedback option lets you send the misclassified emailmessage as feedback to Symantec for analysis.
w The Feedback option is available only when MicrosoftOutlook or Outlook Express is installed on yourcomputer.
To set the Feedback option
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click AntiSpam.
253Keeping secure on the InternetAbout Norton AntiSpam
3 On the Addresses tab, in the Feedback row, selectany one from the following three options:
Automatically sends themisclassified email message toSymantec when you classify anemail message as spam orlegitimate
On
Prompts you before NortonAntiSpam sends themisclassified email message toSymantec when you classify anemail message as spam orlegitimate
Ask Me
Does not send the misclassifiedemail message to Symantec
Off
4 Click Apply to save the changes.
About Web QueryWith the increase in usage of email, many users receivea number of unwanted and unsolicited commercialemail messages that are known as spam. Not only doesspam make it difficult to identify valid email messages,but some spam contains offensive messages andimages. The Web Query is a feature of Norton AntiSpamthat Norton 360 uses to classify the email messagesmore effectively.
An effective spam filtration is possible when each emailmessage that you receive is scanned through differentfilters. With only one or two levels of email filters, ahigh percentage of legitimate emails are misclassifiedas spam or spam is misclassified as legitimate. To avoidsuch misclassification, Norton AntiSpam employsdifferent filters. Each email filter uses a unique
Keeping secure on the InternetAbout Norton AntiSpam
254
approach to filter spam email messages from legitimateemail messages.
The email messages that you receive in your emailprogram undergo scanning through different localfilters of Norton AntiSpam. The local filters useWhitelist technique, Blacklist technique, and patentedfiltering technology to classify email messages aslegitimate or spam. If the local filters classify an emailmessage as spam, Norton AntiSpam changes the subjectof the email message. Norton AntiSpam then sends theemail message to your email client. However, if thefilters classify the email message as legitimate, NortonAntiSpam collects information such as signature andURL hashes of the email message. Norton AntiSpamthen sends this information to the Web Query filterfor additional analysis.
The Web Query filter analyzes the signature and URLhashes of the email message and then sends theanalysis report to Norton AntiSpam. If the emailmessage is identified as spam, Norton AntiSpam altersthe subject of the email message and sends it to youremail program. Based on predefined email rules, theemail program then moves the email message to theJunk folder or the Norton AntiSpam folder.
w Symantec recommends that you keep the Web Queryoption turned on. Turning off the Web Query optionincreases your exposure to the spam email messagesthat contain phishing or spam URLs.
You can turn on or turn off the Web Query option inthe Norton 360 AntiSpam Settings window.
Turning off or turning on Web Query
Norton AntiSpam uses local filters to identify spamemail messages. The email messages that the localfilters do not identify as spam are then scannedadditionally through the Web Query filter. Web Queryfilter analyzes the signature and URL hashes of theemail messages to classify them as legitimate email orspam email.
255Keeping secure on the InternetAbout Norton AntiSpam
If the email message is identified as spam, then NortonAntiSpam alters the subject of the email message.Norton AntiSpam then sends the email message to youremail program. Based on predefined email rules, theemail program then moves the email message to theJunk folder or the Norton AntiSpam folder.
w Symantec recommends you to keep the Web Queryoption turned on. Turning off the Web Query optionincreases your exposure to the spam email messagesthat contain phishing or spam URLs.
To turn off the Web Query filter
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click AntiSpam.
3 On the Addresses tab, in the WebQuery row, movethe On/Off switch to the right to the Off position.
4 Click Apply to save the changes.
To turn on the Web Query filter
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click AntiSpam.
3 On the Addresses tab, in the WebQuery row, movethe On/Off switch to the left to the On position.
4 Click Apply to save the changes.
Keeping secure on the InternetAbout Norton AntiSpam
256
This chapter includes the following topics:
1 About securing your sensitive data
About securing your sensitive dataThe Internet provides the fastest and the easiest wayto exchange information. In spite of the manyadvantages that the Internet provides, you arevulnerable to information theft and identity theft.Information can be stolen and misused in several ways.
Following are a few of the most common methods ofinformation theft:
1 Online financial transactions
1 Unsafe online storage of sensitive information
1 Misuse of your identity while you communicateonline
The Identity Safe feature in Norton 360 offers severalpowerful ways to tackle identity theft. Identity Safe isthe best tool that you can use to safeguard your identitywhile you are online.
About Safe SurfingWhen you install Norton 360, it adds the NortonToolbar to Internet Explorer and Firefox. Norton 360protects your Internet Explorer browser and Firefox
9Securing yoursensitive data
browser when you turn on the options under SafeSurfing.
Safe Surfing comprises the Antiphishing and theNorton Safe Web features. Antiphishing analyzes thesecurity levels of the Web sites you visit and displaysthe results in the Norton Site Safety pop-up. TheNorton Safe Web feature provides you a safe Websearch environment by displaying the site-rating iconsnext to every search result.
w The Antiphishing and Norton Safe Web features aresupported only in Internet Explorer versions 5.0 orlater and Firefox versions 3.0 or later.
When you turn off Antiphishing and Norton Safe Webfeatures, Identity Safe may autofill fraudulent Websites with your confidential information. Symantecrecommends that you do not browse the Web whenAntiphishing and Norton Safe Web features are turnedoff.
About Antiphishing
Antiphishing protects you from visiting unsafe Websites. When Antiphishing is turned on, the Antiphishingcomponent analyzes the security level of the Web sitesthat you visit. It then displays the results in the NortonSiteSafety pop-up. Antiphishing also blocks navigationto the Web sites that are confirmed to be fraudulent.
Antiphishing provides you the following informationabout the Web pages:
1 If it is safe to enter confidential information
1 If the Web page is known to be fraudulent
1 If the Web page is authentic and Symantec approved
1 If the Web page is known to belong to a suspicioussite
1 If the Web page is known to give annoying results
The Site Safety bar in Internet Explorer and Firefoxlets you view more details about the status of the Webpage.
Securing your sensitive dataAbout securing your sensitive data
258
In addition, the Norton Site Safety pop-up includesinformation about Norton Authenticated Web pages.Web site hackers often mimic company Web sites tocreate fraudulent Web sites. Norton Site Safetyidentifies the fraudulent Web sites and lets you knowthe Web sites that are authenticated. The authenticatedWeb sites are categorized as SiteApproved Web sites.These sites usually belong to large financial institutionsor are shopping sites, with the pages that requestpersonal information.
Symantec analyzes the pages of these sites and verifiesthat they belong to the company that it represents. Youcan be confident that the information that you providegoes to the company with which you want to dobusiness.
You can report the evaluation of a Web page yoususpect to be fraudulent to Symantec for furtherevaluation. Use the Report Site option from NortonToolbar to report a Web page. You can also report theevaluation of a Web page that Antiphishing reports asfraudulent or suspicious site as a safe site. The Webpage that you report must be open in your browser'swindow to report it to Symantec.
Even when you turn off the Antiphishing option,Norton 360 protects you from Internet threats throughits Norton Safe Web features. When Antiphishing isturned off, you cannot use the Report Site link in theNorton menu to submit the evaluation of the Web pageto Symantec.
The Norton Site Safety pop-up displays the followingmessages:
1 Site is Safe
1 Site is Unsafe
1 Site Untested
1 Norton Secured
1 Site is Safe - Shopping Site Information
1 Caution
259Securing your sensitive dataAbout securing your sensitive data
1 Site Approved
1 Fraudulent Site
1 Suspicious Site
1 Page Not Analyzed
Turning off or turning on Antiphishing
Antiphishing protects you from visiting unsafe Websites. The Antiphishing feature in Norton 360 analyzesthe security level of all the Web sites that you visit anddisplays the results in the Norton Site Safety pop-up.Antiphishing also blocks navigation to Web sites thatare confirmed to be fraudulent.
The Norton Site Safety pop-up helps you understandif the Web site that you visit is safe or unsafe.
You can turn off or turn on Antiphishing from theSettings window for Identity Protection.
To turn off or turn on Antiphishing
1 In the Norton 360 main window, move the mousepointer over Identity Protection, and then clickManage Identity Protection.
2 In the Settings window for Identity Protection,under Safe Surfing, do one of the following
1 To turn off Antiphishing, in the Antiphishingrow, move the On/Off switch to the right to theOff position.
1 To turn on Antiphishing, in the Antiphishingrow, move the On/Off switch to the left to theOn position.
3 Click Apply.
Reporting an incorrect evaluation of a Web page
On rare occasions, Antiphishing may report anevaluation of a Web page that you suspect to be inerror. For example, you might visit a site that you shopwith regularly and Antiphishing says that the page isfraudulent. On the contrary, you might visit a Web
Securing your sensitive dataAbout securing your sensitive data
260
page that you suspect is a phishing page, butAntiphishing reports that no fraud was detected. Ineither case, you can report the page to Symantec forfurther evaluation.
w The Web page you want to report must be open in yourbrowser's window to report it to Symantec.
To report an incorrect evaluation of a suspicious Webpage
1 On the Norton Toolbar, on the Norton menu, clickReport site.
2 In the dialog box that appears, verify that the Webpage address that is shown matches the page thatyou want to report.
3 Do one of the following:
1 If the address is correct, click Submit.
1 If the address is not correct, click Cancel.
Ensure that you are on the Web page in questionand repeat this procedure, because the address inthe dialog box is not editable.
4 In the confirmation dialog box, click Close.
To report an incorrect evaluation of a safe Web page
1 On the Norton Toolbar, on the Norton menu, clickReport Site.
2 In the dialog box that appears, verify that the Webpage address that is shown matches the page thatyou want to report.
3 Do one of the following:
1 If the address is correct, click Submit.
1 If the address is not correct, click Cancel.Ensure that you are on the Web page in questionand repeat this procedure, because the addressin the dialog box is not editable.
4 In the confirmation dialog box, click Close.
261Securing your sensitive dataAbout securing your sensitive data
About Norton Safe Web
Norton Safe Web protects your computer while youbrowse the Internet using Internet Explorer or Firefox.It analyzes the security levels of the Web sites you visitand indicates if the Web sites are free from threats. Itprovides you a safe environment on the Web bydisplaying the site rating icons next to each searchresult. The site rating icons lets you know if a Web siteis malicious or not even before you visit it. For onlineshopping Web sites, Norton Safe Web also indicateswhether the Web site offers safe online shoppingexperience.
You can view the site safety status of any Web siteusing the FullReport option on the NortonSiteSafetypop-up. You can also use the Community Buzz optionon Norton menu to view the safety status.
w The Community Buzz option is available only inEnglish-language versions of Windows.
The Norton Safe Web site offers the following features:
1 Displays the community rating
1 Lets you add your reviews
1 Lets you view user reviews
1 Displays a list of keywords that are tagged to theWeb site
1 Displays the general information and the threatinformation
If you use a proxy server to connect to the Internet,you must configure the Network Proxy Settings ofNorton 360.
When you search the Internet using Google, Yahoo, orBing search engines, Norton Safe Web displays Nortonrating icons next to the search results. As you movethe mouse pointer over an icon, a pop-up appears withsite safety and shopping safety information. Thepop-up displays brief information about the safety ofthe site. Norton Safe Web also provides a detailedreport of the site safety.
Securing your sensitive dataAbout securing your sensitive data
262
You can click the icon or the FullReport option in thepop-up window to view the detailed report. The reportis displayed on the Norton Safe Web site.
Norton Safe Web provides the following Web site safetystates when you browse through the Internet:
You can see Norton Secured iconnext to the search results.
Symantec has analyzed this pageand determined that the Website is VeriSign trusted and issafe to visit.
Norton Secured
You can see a green OK icon nextto the search results.
When you visit a Web site withthis status, you can see a similarstatus icon on the NortonToolbar. Norton Safe Web hasanalyzed this site anddetermined that it is safe to visit.
Site is Safe
You can see a gray questionmark icon next to the searchresults.
When you visit this Web site, theNorton Toolbar shows a greenOK icon. Norton Safe Web hasnot analyzed this site and it doesnot have sufficient informationabout this site. As Symantec hasnot tested the site, it isrecommended that you do notvisit this site.
Site Untested
263Securing your sensitive dataAbout securing your sensitive data
You can see a red cross (x) iconnext to the search results.
When you visit a Web site withthis status, you can see a similarstatus icon on the NortonToolbar. Norton Safe Web hasanalyzed this site anddetermined that the site isunsafe to visit. This Web sitemay attempt to install malicioussoftware on your computer.
Site is Unsafe
You can see a yellow exclamationmark icon next to the searchresults.
When you visit a Web site withthis status, you can see a similarstatus icon on the NortonToolbar. Norton Safe Web hasanalyzed this site anddetermined that this site hassome threats that are classifiedas Annoyance Factors. Theseannoyance factors are notdangerous, but it can installunwanted applications on yourcomputer without yourpermission.
Caution
In addition to the site safety information, Norton SafeWeb provides the following shopping safetyinformation:
Norton Safe Web has analyzedthis Web site and determinedthat you can have a safeshopping experience.
Safe
Securing your sensitive dataAbout securing your sensitive data
264
Norton Safe Web does not havesufficient information about thesite to provide a shopping safetyrating.
Untested
Norton Safe Web has analyzedthis Web site and determinedthat the site has shopping risks.
Symantec recommends that youdo not visit this page. The sitemay sell counterfeit itemswithout proper indication.
Risky
Norton Safe Web has analyzedthis site and has only someinformation about the site toprovide shopping safetyinformation.
The information is not sufficientto declare that the site is safe toshop.
Limited
When you visit any Web site that has an unsafe status,Norton Safe Web blocks that Web page. If you still wantto view the site, use the Continuetositeanyway optionthat appears on the blocked page. You can use theMalicious Site Warning Page option under SafeSurfing section of the Identity Protection settings toturn off or turn on this setting. If you turn off thisoption, Norton Safe Web does not block the unsafe Websites. However, NortonToolbar still displays the statusof these sites as unsafe even when the option is turnedoff.
In addition, Norton Safe Web protects your computerwhile you use Facebook. It scans each URL that isavailable on your Facebook Wall and displays theNorton rating icons for the scanned URLs. You can alsolet other Facebook users know about the security statusof any Web site.
265Securing your sensitive dataAbout securing your sensitive data
To scan your Facebook Wall using Norton Safe Web,use the ScanFacebookWall option. The option appearswhen you click RunScans option in the Tasks window.
Turning off or turning on Norton Safe Web
Norton Safe Web protects your computer while youbrowse the Internet using Internet Explorer or Firefox.It analyzes the security levels of the Web sites that youvisit and indicates if the Web sites are free fromthreats. It provides you a safe environment on the Webby displaying the site rating icons next to each searchresult. The site rating icons lets you know if a Web siteis malicious or not even before you visit it.
You can turn off or turn on Norton Safe Web from theSettings window for Identity Protection.
To turn off or turn on Norton Safe Web
1 In the Norton 360 main window, move the mousepointer over Identity Protection, and then clickManage Identity Protection.
2 In the Settings window for Identity Protection,under Safe Surfing, do one of the following
1 To turn off Norton Safe Web, in the NortonSafeWeb row, move the On/Off switch to the rightto the Off position.
1 To turn on Norton Safe Web, in the NortonSafeWeb row, move the On/Off switch to the left tothe On position.
3 Click Apply.
Searching the Web using Norton Safe Search
Norton Safe Search enhances your Web searchexperience. When you search the Internet using NortonSafe Search, it uses Ask.com to generate the searchresults. Norton Safe Search provides the site safetystatus and Norton rating for each of the search resultsgenerated.
Securing your sensitive dataAbout securing your sensitive data
266
By default, the Norton Safe Search box is disabled.After you install Norton 360 and open Internet Exploreror Firefox for the first time, an alert message isdisplayed. The alert message prompts you to enableNorton Safe Search. You can choose to enable or disableNorton Safe Search.
As you type a few letters in the search box, Norton SafeSearch displays the search suggestions in the searchbox pop-up. You can see the search suggestions afteryou type three or more characters in the search box.It also provides you the intelligent search-as-you-typefeature that displays search suggestions when you typea few letters of the search phrase.
In addition, Norton Safe Search provides the followingfeatures:
When you search the Internetusing Norton Safe Search, itanalyzes the security levels ofthe Web sites and displays thesearch results.
You can use the Filter OutUnsafe Sites option in theNorton Safe Search Web page tofilter the unsafe Web sites fromthe search results.
Unsafe Site Filter
267Securing your sensitive dataAbout securing your sensitive data
Norton Safe Search enables youto erase all the data that arerelated to your search activitiesfrom the Ask.com server. ThePrivacy Safeguard feature ofNorton Safe Search removes thesearch data, such as your IPaddress, user identifier, andsession identifier from theAsk.com server.
You can turn on or turn offPrivacy Safeguard using theTurnOn Privacy Safeguard and TurnOff Privacy Safeguard optionsrespectively.
Erase Search History
w Norton Safe Search is available for some regionsincluding the United States, the United Kingdom,Canada, Australia, and Germany. The PrivacySafeguard feature is available only for the UnitedStates, the United Kingdom, and Canada.
You can use Norton Safe Search even when you turnoff the Identity Safe features.
To search the Web using Norton Safe Search
1 Start Internet Explorer or Firefox.
2 On the Norton Toolbar, in the Norton Safe Searchbox, type the search item that you want to search.
3 Do one of the following:
1 Click Search.
1 In the pop-up window that appears, select asearch suggestion that matches your searchstring.
About Identity SafeIdentity Safe helps you manage your identities andprovide additional security while you perform onlinetransactions.
Securing your sensitive dataAbout securing your sensitive data
268
The following features in Identity Safe provide securestorage of your sensitive information:
Stores login information, suchas your online bank account,email user ID, or password.
Manage Logins
Stores your personalinformation, such as addresses,date of birth, and credit cardinformation.
Manage Cards
Stores the details, such aspassport numbers and socialsecurity numbers.
Manage Notes
In addition to being a depository of sensitiveinformation, Identity Safe provides the followingfeatures:
1 Protects you from identity theft when you conductonline transactions
Antiphishing also helps to protect you frommalicious Web sites when you conduct onlinetransactions.
1 Manages your card information when you havemultiple credit cards to maintain
1 Safeguards the data that you save on your computer
By saving your data with a local profile, you canprevent your sensitive Identity Safe data on yourcomputer from being misused. A local profile isspecific to each of the Windows User Accountspresent on your computer.
1 Provides you the ease of carrying and using yourIdentity Safe data when you are on the move
By saving your data using a portable profile, youcan access your sensitive Identity Safe data fromany computer that has Norton 360 installed. A
269Securing your sensitive dataAbout securing your sensitive data
portable profile is a profile that you save on anexternal drive.
Norton 360 adds the Norton Toolbar to InternetExplorer and Firefox. The Norton Toolbar has thefollowing components:
1 Norton menu
1 Norton Safe Search
1 Safe Web indicator
1 Identity Safe menu
When you have cards or logins in Identity Safe, theIdentitySafe menu displays the list of cards and logins.
w If you turn off Identity Safe, you cannot access yourlogins and Identity Safe features from the NortonToolbar.
Norton 360 lets you view and access some of theIdentity Safe features even after the product expires.This way, you can still view your login details evenafter Norton 360 expires. However, it is not safe tobrowse the Internet after Norton 360 expires as youare vulnerable to online thefts and phishing attacks.
When your product expires, you cannot access theIdentity Safe features from the Identity Protectionsection of the Settings window. You can view andaccess these features using the Identity Safe menu orthe Norton menu that is available on the NortonToolbar.
The following are the activities that you can performafter the product expires:
1 Log in and log out of local profile or portableprofiles.
1 Switch from one profile to another profile.
1 Back up an Identity Safe profile and save it as .NPMfile.
1 Export your current Identity Safe profile to theexternal drive that is connected to your computer.
Securing your sensitive dataAbout securing your sensitive data
270
1 Open the Manage Logins window and view thelogins that you saved.
1 Auto-restore a profile when corruption is detected.
Turning off or turning on Identity Safe
Identity Safe helps you manage your identities andprovide additional security while you perform onlinetransactions. You can use the various features inIdentity Safe to manage your personal data, such asaddresses, date of birth and credit card information.The logins, cards, and notes help you store and useyour information in a secure way.
You can turn off or turn on the Identity safe from theQuick Controls in the Settings window or from theSettings window for Identity Protection.
w After you turn on Identity Safe, you must log in toIdentity Safe to access the various features.
To turn off or turn on Identity Safe from Quick Controls
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Quick Controls, doone of the following:
1 To turn off Identity Safe, uncheck IdentitySafe.
1 To turn on Identity Safe, check Identity Safe.
To turn off Identity Safe from Settings window
1 In the Norton 360 main window, move the mousepointer over Identity Protection, and then clickManage Identity Protection.
2 In the Settings window for Identity Protection, inthe Identity Safe row, move the On/Off switch tothe right to the Off position.
3 Click Apply.
To turn on Identity Safe from Settings window
1 In the Norton 360 main window, move the mousepointer over Identity Protection, and then clickManage Identity Protection.
271Securing your sensitive dataAbout securing your sensitive data
2 In the Settings window for Identity Protection, inthe Identity Safe row, move the On/Off switch tothe left to the On position.
3 Click Apply.
About Identity Safe profiles
You can create a local profile for each Windows UserAccount on your computer. The data that you save andthe Identity Safe settings that you make are specific tothat local profile. You cannot access the data that yousave in one Windows User Account from anotherWindows User Account. This way Identity Safe protectsyour sensitive data from the misuse of multiple usersof your computer.
w Symantec recommends that you create separatepassword-protected Windows User Accounts if youwant to share your PC across multiple users.
In addition to the profile that you create on a WindowsUser Account, you can save your Identity Safe data onan external drive. The profile that you create on aremovable drive is called portable profile.
When you create a portable profile, Norton 360 createsa folder that is labeled Norton Identity Safe Data inthe root directory. This folder contains the details ofthe portable profile data and the backup data. You cansee the details of the portable profile data and thebackup data in the IDDStore.dat file andIDDStore_bak.dat file, respectively.
You can use portable profiles on any PC on whichNorton 360 is installed. However, you can access yourportable profile only if you know the password for it.
In addition to the features such as saving logins, cards,and notes, you can do the following using your localprofile and portable profile:
1 Back up and restore your Identity Safe data.
The data that you back up are stored as .NPM files.You can also restore the previously backed up data
Securing your sensitive dataAbout securing your sensitive data
272
present in your local profiles and portable profiles,interchangeably.
1 Export your Identity Safe profile to the externaldrive that you insert.
1 Import your Identity Safe profile from an olderversion of the product to the upgraded version.
1 Rename the profile that you create.
1 Export Identity Safe data of your local profile andportable profile to a text file.
1 Restore and reset your Identity Safe password.
About creating Identity Safe profiles
Identity Safe lets you create one local profile perWindows User Account and one portable profile perexternal drive. You can create and save data in aportable profile in the same way you create and savedata in a local profile. You can also provide a name tothe profile so that you can easily identify the profileyou are logged in to.
When you insert an external drive, Identity Safeautomatically detects the presence of the drive andoffers you the option to create a portable profile. Incase you have already configured a portable profile inthe drive, you have the option to switch to the portableprofile. You can use multiple external drives at a time.However, you can create only one portable profile perexternal drive.
w Ensure that the external drive on which you create anew profile has at least 5 megabytes (MB) of free space.
Norton 360 supports the following external drives onwhich you can create your portable profiles:
1 Universal Serial bus (USB) flash drives
1 Portable USB hard drives
1 Cameras
1 MP3 players
1 Cell phones
273Securing your sensitive dataAbout securing your sensitive data
1 Zip drives
However, Norton 360 does not support devices such asfloppy drives, CD drives, DVD drives, and devices thatrequire Media Transfer Protocol or Picture TransferProtocol.
You can create and set up Identity Safe in the followingareas of Norton 360:
1 The Identity Safe menu on the Norton ToolbarWhen you click the Identity Safe menu, a dialogbox appears. You can use the dialog box to createan Identity Safe profile. Also, if you visit anytransactional Web site or a Web page that has formsbefore you create any profile, Norton 360 displaysa pop-up message. The alert message prompts youto create a profile and set a password for it. You canuse the Set up now option in the pop-up messageto create a profile.
1 The Identity Protection section in the Norton 360Settings window
Immediately after you create a profile with acorresponding password, Identity Safe lets you do thefollowing:
1 Create and save a card with general details, contactdetails, and credit card details.
The general details include name and gender, andcontact details include phone numbers and emailaddresses.
1 Import the logins that you saved in InternetExplorer.
Creating a local profile or a portable profile
Norton 360 provides the IdentitySafeSetup option tocreate local profile and portable profile. The optiondoes not appear after you successfully create localprofile and a portable profile.
The option does not appear in the following cases:
Securing your sensitive dataAbout securing your sensitive data
274
1 If you have not connected an external drive, theoption disappears after you create the local profile.
1 If you have connected one or more external drives,the option disappears after you create portableprofile on all the external drives.
When you insert an external drive, Identity Safeautomatically detects the presence of the drive andoffers you the option to create a portable profile.
After you create an Identity Safe profile, you can usethe Create your Norton Identity Safe profile windowto set a password for the profile. You can also providea name for the profile.
If you create a local profile, the Windows User Accountname appears as the profile name by default. But if youcreate a portable profile, the phrase My removablemedia appears as the profile name. You can renameboth your local profile and portable profile if necessary.Symantec recommends that you provide a portableprofile name that you can easily identify.
If you create a portable profile while you are loggedinto a local profile, Identity Safe automatically logsyou out of the local profile.
w An Identity Safe profile is created only after you set apassword for it.
To create a local profile or a portable profile
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
2 Under IdentitySafe, in the IdentitySafeSetup row,click Configure.
275Securing your sensitive dataAbout securing your sensitive data
3 In the dialog box that appears, do one of thefollowing:
1 To create a local profile, click Onmycomputer.
1 To create a portable profile, click On myremovable drive drive: drive name.The drive represents the drive in which yourexternal drive is connected and the drive nameis the name of your external drive.
The option appears only when you connect anexternal drive to your PC. The dialog boxdisplays this option for each external drive thatyou have connected to the PC.
4 In the Create your Norton Identity Safe profilewindow, in the Profile Name box, type a name forthe profile.
5 In the Password box, type a password. The passwordstrength is reflected in the graphic on the right sideof this page.
6 In the Confirm Password box, type your passwordagain.
7 In the Password Hint box, provide a hint thatreminds you of the password if you forget it.If your password and hint are the same, Norton 360warns you not to have a password hint same as yourpassword.
Securing your sensitive dataAbout securing your sensitive data
276
8 Choose one of the following options:
Prompts for your Identity Safepassword every time you log into Identity Safe.
You can change this setting inthe Password & Securitywindow.
Require my password atthe beginning of eachsession
Prompts for your Identity Safepassword whenever it tries toautofill any login.
You can change this setting inthe Password & Securitywindow.
Require my passwordbefore each login is filled
Cancels the Identity Safe setupprocess.
You can use this option if youdecide to create a profile later.
Don’t set up now
To create a profile you can select either of the firsttwo options that are mentioned in the table.
9 In the Edit Card window that appears, you cancreate your first Identity card if you want.
Importing logins
Identity Safe lets you import the logins that you havesaved in Internet Explorer. Immediately after youcreate an Identity Safe profile and save a password forit, the Profile Created dialog box appears. The dialogbox gives you a confirmation that the profile is created.
You can use this dialog box to import your logins. Theimported logins appear in the Identity Safe menu onthe NortonToolbar and in the ManageLogins window.You can use the imported logins the same way that youuse the logins that you create.
277Securing your sensitive dataAbout securing your sensitive data
To import logins
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
2 Under IdentitySafe, in the IdentitySafeSetup row,click Configure.
3 Set up Identity Safe.
4 In the Profile Created dialog box, click Yes.
Renaming your Identity Safe profile
Identity Safe lets you name the profiles you createusing Profilename option present in the SetupNortonIdentity Safe dialog box. Later, if you want to renameyour profiles, you can use the Rename Profile optionpresent in the Settings window for Identity Protection.When you log in to Identity Safe next time, the newname is displayed in the Login to Identity Safe dialogbox.
w The dialog box displays only your portable profile’sname.
To rename your profile
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
2 Under Identity Safe, in the Rename Profile row,click Configure.
3 In the Enteranewprofilename box, enter the namethat you want to use to name your profile.
4 Click OK.
Exporting Identity Safe data to portable profiles
Identity Safe lets you export your current profile to anexternal drive that you connect to your PC.
Securing your sensitive dataAbout securing your sensitive data
278
w Norton 360 does not support external drives such asfloppy drives, CD drives, DVD drives, and devices thatrequire Media Transfer Protocol or Picture TransferProtocol.
If you already have a profile configured in the externaldrive, this option does not appear in the Identity Safesettings of the current profile.
To export your Identity Safe data to portable profile
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
2 Under Identity Safe, in the Log in to Identity Saferow, click Configure, and log in to the profile thatyou want to export.
3 Under Identity Safe, in the Export Identity SafeData to Portable Profile row, click Configure.This option appears until you have connected anexternal drive that does not have a portable profile.
4 In the ValidateYourPassword dialog box, type thepassword of your current profile that you are loggedin.
5 Click OK.
6 In the dialog box that appears, in the Profile namebox, type a name of your choice.By default, Identity Safe displays My removablemedia as your portable profile’s name.
7 In the Export to box, type, or browse to the locationinto which you want to save your current profile’ssettings.
8 Click Export Identity Safe Data.
9 In the confirmation dialog box, click OK.
Exporting Identity Safe data
Identity Safe lets you export you cards, logins, andnotes whenever you want to. You can use the ExportIdentity Safe Data dialog box to export your IdentitySafe data.
279Securing your sensitive dataAbout securing your sensitive data
Norton 360 exports your confidential information toan unencrypted .csv (comma-separated value) formatand anyone can read it. You must not use this featureto create the backup of your Identity Safe data.
To export Identity Safe data
1 Do one of the following:
1 In Windows XP, click Start > Run.
1 In Windows Vista, click Start > Start Search.
1 In Windows 7, click Start > Search programsand files.
2 Type the path to the folder in which Norton 360 islocated and the executable’s file name.The following example shows the syntax:"C:\Program Files\Norton360\Engine\version\coExport.exe"
3 Click OK.
4 In the Export IdentitySafeData dialog box, do oneof the following:
1 If you want to export your local profile, selectLocal Profile.
1 If you want to export your portable profile, selectPortable Profile.
The Local Profile and Portable Profile optionsappear only if you insert an external drive witha portable profile configured in the externaldrive.
5 In the ExportIdentitySafepassword box, type yourIdentity Safe password.
6 Browse to the folder into which you want your datato be saved, and then click OK.
7 Type the name that you want to assign to the file,and then click OK.
8 In the confirmation dialog box, click OK.
Securing your sensitive dataAbout securing your sensitive data
280
Restoring or resetting Identity Safe password
There may be instances when you may need to eitherrestore your Identity Safe data or reset Identity Safesettings.
You may need to restore or reset on the followingoccasions:
1 You experience a computer failure.
Your Identity Safe data might have been damaged.If Identity Safe does not recognize your correctpassword, you can restore your data. If you are surethat your password is correct, first try to restoreyour Identity Safe data. Some data may be lost, butall critical information such as logins, cards, andnotes are retained.
1 You forget your Identity Safe password.
Norton 360 lets you enter an incorrect passwordtwice. If your attempts are unsuccessful, Norton360 provides you the option to restore Identity Safedata or reset your Identity Safe password.
If you cannot restore the Identity Safe data, or if youforget your Identity Safe password, you can reset yourIdentity Safe password. If you reset the Identity Safepassword, you lose all Identity Safe data that youstored, such as your login information, cards, andnotes.
To restore your Identity Safe data
1 In the Identity Safe dialog box, click RestoreIdentity Safe.
2 In the Restore Identity Safe Data dialog box, typeyour Identity Safe password, and click OK.
3 In the Identity Safe Data At Risk dialog box, clickYes, restore Identity Safe.
4 In the confirmation dialog box, click OK.
To reset your Identity Safe password
1 In the IdentitySafe dialog box, click ResetIdentitySafe Password.
281Securing your sensitive dataAbout securing your sensitive data
2 In the Identity Safe Data at Risk dialog box, clickYes, reset my password to continue with IdentitySafe setup.
Switching profiles
When you insert an external drive with a portableprofile, Identity Safe automatically detects the presenceof the drive. If you are already logged in to a profile,you can either switch to the profile in the external driveor use your current profile.
w Norton 360 automatically logs you out of your currentprofile when you switch to another portable profile.
To switch to your portable profile
4 In the A new profile has been found on yourremovable media dialog box, do one of thefollowing:
1 If you want to log in to your portable profile,click Switch profiles.
The option displays the drive in which yourexternal drive is connected. It also displays thename of your portable profile.
1 If you want to continue to be logged into yourcurrent profile, click Use current profile.
Locating your missing profiles
When you create a portable profile, Norton 360 createsa folder, Norton Identity Safe Data, in the rootdirectory. It also creates an index file, which is aninvisible file that tracks the location of the NortonIdentity Safe Data folder. The Missing Profile dialogappears when Norton 360 is unable to locate the NortonIdentity Safe Data folder.
Securing your sensitive dataAbout securing your sensitive data
282
To locate your missing profiles
4 In the Missing Profile dialog box, do one of thefollowing:
1 In the New location box, type, or browse to thelocation into which you have moved yourportable profile, and then click Profile wasmoved.
If the path that you type does not contain theportable profile, an error message appears.
1 If you deleted your portable profile, click Profilewas deleted.
Accessing Identity Safe
You can access the Identity Safe from the followingsections of Norton 360:
1 From the Identity Safe section in the Settingswindow for Identity Protection
1 From the Norton Toolbar
1 From the IdentityProtection section in the Norton360 main window
With Norton 360, you can access and configure someof the Identity Safe features even after the productexpires. The following are the features that you canview or access after the product expires:
You can view theManage Loginswindow using the Identity Safemenu on the Norton Toolbar.
Although the product is expired,you can still view all the loginsthat you saved for a Web page.However, you cannot save, add,or update logins after theproduct expires.
Manage Logins
283Securing your sensitive dataAbout securing your sensitive data
You can use this feature to takea backup of your Identity Safedata.
The data that you back up aresaved in .NPM format.
Backup Identity Safe data
You can use this option to exportyour current profile to anexternal drive that is connectedto your PC even after the productexpires.
Export Identity SafeDatato Portable Profile
In addition, you can do the following after the productexpires:
1 Log in and log out of local profile and portableprofiles.
1 Switch from one profile to another profile.
1 Auto-restore a profile when corruption is detected.
1 Use the IdentitySafeOptions window to configurethe Identity Safe settings.
1 Specify the security level of the Identity Safepassword that you saved. However, you cannotchange the password after the product is expired.
1 Use the Autofill Exclusions window to view theWeb pages for which you wanted Identity Safe notto save your logins or automatically fill the form.However, you cannot use the Do not Autofill thispage option after Norton 360 expires.
w You must be logged in to Identity Safe to access theIdentity Safe features.
To access Identity Safe Settings from the main window
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
2 Under Identity Safe, for the Identity Safe featurethat you want to open, click Configure.
Securing your sensitive dataAbout securing your sensitive data
284
To access Identity Safe Settings from the Settingswindow
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Identity Protection.
3 Under Identity Safe, for the Identity Safe featurethat you want to open, click Configure.
Toaccess Identity SafeSettings from theNortonToolbar
1 Start Internet Explorer or Firefox.
2 On the Norton Toolbar, in the Norton menu, clickSettings.
3 For the Identity Safe feature that you want to open,click Configure.
To access Identity Safe Settings after the productexpires
1 Start Internet Explorer or Firefox.
2 Click Identity Safe menu on the Norton Toolbarand log in to either local profile or portable profile.
3 On the Norton Toolbar, click Identity Safe >Manage > Settings.
Logging in to and out of Identity Safe
Norton 360 provides various ways by which you canlog in to or log out of Identity Safe.
You can log in to or log out of Identity Safe from thefollowing areas of Norton 360:
1 The Identity Safe section in the Settings windowfor Identity Protection
1 The Identity Protection section in the Norton 360main window
1 The Norton Toolbar
To secure your Identity Safe data when you are awayfrom your computer, log out of Identity Safe to prohibitaccess by others.
285Securing your sensitive dataAbout securing your sensitive data
When you have connected your external drives, incertain instances, Identity Safe automatically logs youout of the profile that you are logged in to.
Identity Safe automatically logs you out of your currentprofile under the following circumstances:
1 When you are logged in to a portable profile or alocal profile and click IdentitySafeSetup to createa new profile
1 When you are logged in to a portable profile andsafely or unsafely remove your external drive
1 When you switch from one profile to another profile
To view or edit your confidential data, you must belogged in to Identity Safe.
To log in to Identity Safe
1 In the Norton 360 main window, move the mousepointer over Identity Protection and click Log into Identity Safe.
2 If you have not inserted any external drive with aportable profile configured, in the LogintoIdentitySafe dialog box, type your Identity Safe password.
3 If you insert an external drive that has a portableprofile, in the Select the Identity Safe profile youwant to use dialog box, do one of the following:
1 To log in to the local profile, in the Profiledrop-down list, select the local profile and typeyour password in the Password box.
1 To log in to the portable profile, select theportable profile from the drop-down list and typeyour password in the Password box.
The Profile drop-down list displays the driveinto which you have connected your externaldrive. It also displays the portable profile name.
4 Click Log in now.
Securing your sensitive dataAbout securing your sensitive data
286
To log out of Identity Safe
4 In the Norton 360 main window, move the mousepointer over Identity Protection and click Log outof Identity Safe. You can also log out from theSettings window for Identity Protection.
To log in to Identity Safe from the Norton Toolbar
1 Start Internet Explorer or Firefox.
2 On the Norton Toolbar, click Identity Safe.
3 If you have not inserted any external drive with aportable profile configured, in the LogintoIdentitySafe dialog box, type your Identity Safe password.
4 If you insert an external drive that has a portableprofile, in the Select the Identity Safe profile youwant to use dialog box, do one of the following:
1 To log in to the local profile, in the Profiledrop-down list, select the local profile and typeyour password in the Password box.
1 To log in to the portable profile, select theportable profile from the drop-down list and typeyour password in the Password box.
5 Click Log in now.
To log out of Identity Safe from the Norton Toolbar
1 Start Internet Explorer or Firefox.
2 On the Norton Toolbar, click Identity Safe, andthen click Log out of Profile: Profile name.Where Profile name represents the name of yourprofile.
Configuring Identity Safe Settings
You can use the various features in Identity Safe tomanage your personal sensitive information. Thelogins, cards, and notes help you store and use yourinformation in a secure way.
287Securing your sensitive dataAbout securing your sensitive data
To configure Identity Safe Settings
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
Securing your sensitive dataAbout securing your sensitive data
288
2 Under Identity Safe, identify the feature that youwant to use, and click Configure. Your options are:
Lets you view the Web pageswhere you asked Identity Safe
Autofill Exclusions
not to save your logins orautomatically fill the form.
You can use the autofill optionon a Web page that you excludedto remove the Web page URLsfrom the Autofill Exclusions list.You can use the Identity Safemenu on the Norton Toolbar tomake online decisions aboutautofill.
Lets you back up the IdentitySafe data in .NPM file format.
Backup Identity SafeData
w You should back up all ofyour Identity Safe dataperiodically.
Lets you export the profile thatyou are currently using to theexternal drive connected.
Export Identity SafeDatato Portable Profile
If you already have a profileconfigured in the external drive,this option does not appear inthe Identity Safe settings of thecurrent profile. The optionappears until you haveconnected an external drive thatdoes not have a portable profile.
289Securing your sensitive dataAbout securing your sensitive data
Lets you set the options that letIdentity Safe securely collect andstore your Web page logininformation.
In addition, you can do thefollowing activities:1 Configure the region for your
card information.1 Specify how you want Norton
Identity Safe to use theautofill feature.
1 Set the options that makeIdentity Safe to display amessage to notify you thatyou have inserted an externaldrive.
1 Set the options that makeIdentity Safe to warn youabout the unsafe removal ofexternal drives.
Identity Safe Options
Lets you change the passwordsettings and Identity Safepassword security level.
w You should change yourIdentity Safe passwordfrequently to keep your IdentitySafe data from being misused.
Identity Safe Password &Security
Securing your sensitive dataAbout securing your sensitive data
290
Lets you manage your personalinformation such as name, dateof birth, email address, andcredit card information in oneplace.
You can use the information thatyou store to automatically fillforms. This feature lets youprovide sensitive informationwithout typing it when you areonline. In this way, Identity Safeprotects you from keyloggersthat steal and misuse youridentity.
Manage Cards
Lets you manage your variouslogin information.
Logins include information suchas your email login credentialsand Internet bankingcredentials.
When you save all of your logininformation in the Identity Safe,you can do the following:1 Easily track all your logins
1 Quickly launch your loginWeb pages
1 View or update yourpassword for the Web page
1 Use folders to organize yourlogins
1 Change your login settings
Manage Logins
291Securing your sensitive dataAbout securing your sensitive data
Lets you store and managesensitive information.
In Manage Notes, you can savesocial security number, driver'slicense number, insurance policynumber, and passport number.You can also save privateaccounts, lock combinations,documents, notes, frequent fliernumbers, bank account number,security challenge questions,and legal and financialinformation.
Manage Notes
Lets you rename the profile thatyou are currently using.
Rename Profile
Lets you restore the Identity Safedata from the backed up .npmfile.
You can use this option after youhave reset your Identity Safeoptions, but you want to revertto your backed up Identity Safedata.
When you restore a backed upfile of any profile, Norton 360overwrites the Identity Safe dataof the profile that you arecurrently logged in.
For example, you restore thebacked up file of your portableprofile while you are logged intoa local profile. In this case,Norton 360 overwrites your localprofile’s Identity Safe data withyour portable profile’s IdentitySafe data.
Restore Identity SafeData
Securing your sensitive dataAbout securing your sensitive data
292
About Manage logins
The Manage Logins feature in Identity Safe lets youview all the logins that you want Identity Safe tomanage. Login information includes information suchas your email login credentials and Internet bankingcredentials.
Identity Safe provides you the option to save yourlogins when you enter your login information in a Website's login page. You can instantly save your logininformation in Identity Safe.
Identity Safe offers the following features:
1 Safely stores Web page login information
1 Lets you save multiple IDs or accounts andpasswords for a Web site
1 Lets you organize your logins under variouscategories
1 Intelligently searches for a particular login
1 Lets you save the Web site name with a name otherthan the default name
1 Displays the login ID and lets you show or hide thepassword
1 Displays the strength of the password for your login
1 Lets you quickly launch the Web site login page
1 Fills in your login automatically when you revisitWeb pages
1 Lets you manually add logins
1 Lets you change the URL of your saved logins
1 Lets you view the last time you made changes tothe settings of your saved logins
1 Lets you view and fill the login details that yousaved for a Web page even after Norton 360 expires.To do so, use the IdentitySafe menu on the NortonToolbar.
To manage your logins, you must be logged in toIdentity Safe.
293Securing your sensitive dataAbout securing your sensitive data
Saving logins
Logins are saved when you enter them for the firsttime. You can save multiple logins for the same Webpage. You can also save the same login for differentWeb pages.
When you provide your login credentials on a Web site,Identity Safe displays the Save your login pop-updialog box. You can use the Save in drop-down list tosave your login in a general folder. The folders thatyou create appear in the Saveyourlogin pop-up dialogbox.
After Identity Safe saves a login, it automatically fillsthe login details next time you visit the Web page.
You must be logged in to Identity Safe to save and useautofill passwords. If the password or user name fieldis blank, Identity Safe does not prompt you to save thelogin.
Identity Safe lets you view and fill the details that yousaved even after the product expires. You can use theIdentitySafe menu on the NortonToolbar to view thelogins. Although you can continue to view your savedlogins after Norton 360 expires, you cannot save or addany new logins.
When you try to save a login after the product expires,a pop-up appears and suggests you to renew thesubscription of the product. You can use the pop-up torenew the subscription.
To save a login
1 Go to the Web page for which you want to save yourlogin.
2 Type your login details, and then click the optionor link that logs you in.
Securing your sensitive dataAbout securing your sensitive data
294
3 In the Save your login dialog box, do one of thefollowing:
1 If you do not want to save your login in a folder,click Save this login now.
1 If you want to save your login in a specific folder,use the following options, and then click Savethis login now.
The default site domain andpage title appear.
Save as
You can modify the site name.
Organizes your logins in variousfolders.
Save in
You can use any of the foldersthat you have already created tosave your login. When you savea login in a folder and later saveanother login for the same Webpage, the folder name isautomatically displayed. Forexample, you save a login forSymantec in a folder calledSymantec. Next time when youadd another login for Symantec,the Symantec folder isautomatically displayed in theSave in drop-down list.
In addition, you can create afolder using the Save indrop-down list. To do so, type aname for your folder where youwant to save your login details.The folder that you createappears in the Manage Loginswindow.
You can create folders and group all of the loginsyou have saved and their related Web pages. The
295Securing your sensitive dataAbout securing your sensitive data
logins appear on the NortonToolbar, in the IdentitySafe menu, in the same order in which you groupedthem.
To save additional logins for a Web page
1 Go to the Web page for which you want to saveanother login.Your login credentials automatically appear on theWeb page.
2 Clear the login credentials that appear on the Webpage.
3 Type the new login, and then click the option or linkthat logs you in.
4 In the Add a login dialog box, take the appropriateaction to organize your login, and then click Savethis login now.
Managing logins
Manage Logins lets you view all of the logins that youwant Identity Safe to manage.
Manage Logins offers you the following features:
1 Organizes your logins under various categories
You can organize your logins under differentfolders. If you have created folders in the ManageLogins window, you have the option to choose afolder under which you want to save your login.
1 Intelligently searches for a particular login.
Manage Logins offers you the intelligentfind-as-you-type search feature. Results are filteredbased on the characters that you type.
1 Lets you save the Web site name with a name otherthan the default name
You can also change the site name when you saveyour login.
1 Lets you add a login manually
You can add a login for a Web site or for a non-Website. Examples of non-Web site logins are your PC
Securing your sensitive dataAbout securing your sensitive data
296
credentials or login credentials for any otherapplication.
1 Lets you change the user name or password for yourlogins
Manage Logins uses the updated user name andpassword the next time you visit the login Webpage. Ensure that the updated user name orpassword is valid.
1 Displays the login ID and lets you show or hide thepassword
In the hide password mode, Identity Safe displaysonly eight characters, regardless of the length ofyour password. Also, when you create a login andchoose not to save any password at that moment,Identity Safe displays eight characters. If you wantto set the password later, you can use the Showoption and type the password in the Password box.
1 Displays the strength of the password for your login
Manage Logins also provides you a graphicalrepresentation of the strength of the password foryour login.
1 Lets you view the details of the date and time whenyou last made to the Manage Logins settings
To create a new folder
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
2 Under Identity Safe, in the Manage Logins row,click Configure.
3 In the Manage Logins window, click New folder.
4 In the New Folder dialog box, in the Enter newfolder name box, type a folder name.
5 Click OK.
To add a login manually
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
297Securing your sensitive dataAbout securing your sensitive data
2 Under Identity Safe, in the Manage Logins row,click Configure.
3 In the Manage Logins window, click New Login.
4 In the New Login dialog box, type the URL of theWeb site or a name for which you want to use thislogin.If it is a URL, ensure that you prefix it with HTTP.
5 Click OK.
6 In the Username dialog box, in the Enter newusername box, type the user name of the login, andthen, click OK.
7 In the confirmation dialog box, click OK.The confirmation dialog box prompts you to set apassword for the login that you created.
8 Click OK.
To set a password for the login that you addedmanually
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
2 Under Identity Safe, in the Manage Logins row,click Configure.
3 In the ManageLogins window, under Logins, selectthe login for which you want to set a password.
4 Under Details, next to Password box, click Show.The ValidateYourPassword window appears. Thiswindow appears only if you have changed theIdentity Safe password security level to Ask formypasswordbeforefillingoutaLogin in the Password& Security window
5 In the Password box, type your Identity Safepassword.
6 Click Validate my password.
7 In the ManageLogins window, in the Password box,type the password of your login.
8 Click OK.
Securing your sensitive dataAbout securing your sensitive data
298
To delete a login or a folder
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
2 Under Identity Safe, in the Manage Logins row,click Configure.
3 In the ManageLogins window, under Logins, selectthe Web site name or the folder that you want todelete.
4 Click Delete.
5 In the confirmation dialog box, click OK.
Managing your URL details
Manage Logins lets you view the URL of the logins thatyou saved. You can view the URL of the Web site loginsthat you save in Manage Logins.
When you save a login, you can do the following:
1 Quickly launch the Web site login page using theURL
1 Change the URL of the login manually
Ensure that the URL you change belongs to thesame domain as the current URL.
1 View the details of the date and time when you lastmade to the Manage Logins settings
To quick-launch a login Web page
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
2 Under Identity Safe, in the Manage Logins row,click Configure.
3 In the ManageLogins window, under Logins, selectthe login for which you want to launch the Web site.
4 Under Details, click the URL that is available nextto the Address option to launch the Web site.
5 Click OK to close the Manage Logins window.
299Securing your sensitive dataAbout securing your sensitive data
To change the URL of your login
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
2 Under Identity Safe, in the Manage Logins row,click Configure.
3 In the ManageLogins window, under Logins, selectthe login for which you want to launch the Web site.
4 Under Details, click Change that is available nextto the Address option.
5 In the dialog box that appears, type the new URL inthe Update URL box.Ensure that the URL you modify is valid and isprefixed with HTTP.
6 Click OK.
7 In the Manage Logins window, click OK.
Changing the user name and password
Identity Safe lets you change the user name andpassword for the logins that you have saved in theManage Logins window. The updated information isautomatically filled the next time you visit that Webpage.
To change the user name
1 In the Norton 360 main window, move the mousepointer over Identity protection, and then clickManage Identity Protection.
2 Under Identity Safe, in the Manage Logins row,click Configure.
3 In the ManageLogins window, under Logins, selectthe Web site name for which you want to changethe user name.
4 Under Details, next to Username box, clickChange.
5 In the Username dialog box, in the Enter newusername box, type the new user name.
6 Click OK.
Securing your sensitive dataAbout securing your sensitive data
300
To change the password
1 In the Norton 360 main window, move the mousepointer over Identity protection, and then clickManage Identity Protection.
2 Under Identity Safe, in the Manage Logins row,click Configure.
3 In the ManageLogins window, under Logins, selectthe Web site name for which you want to changethe password.
4 Under Details, next to the Password box, clickShow.The ValidateYourPassword window appears. Thiswindow appears only if you have changed theIdentity Safe password security level to Ask formypasswordbeforefillingoutaLogin in the Password& Security window.
5 In the Validate Your Password window do thefollowing:
1 In the Password box, type your Identity Safepassword.
1 Click Validate my password.
6 In the ManageLogins window, in the Password box,type the new password.
7 Click OK.
Updating the password for a login
Good security practice requires that you regularlychange the password for a login. You can keep yourlogin credentials in Identity Safe updated every timeyou change your password for a Web page. The updatedinformation is automatically filled the next time youvisit that login's associated Web page.
You can also update your new login information inIdentity Safe when you are on the Web page. IdentitySafe asks you if you want to update your logins.
301Securing your sensitive dataAbout securing your sensitive data
To update the password for a login
1 Go to the Web page for which you want to changethe password information.
2 Clear the password entry that Identity Safeautofilled.
3 Type the new password, and then click the buttonor link that logs you in.
4 In the Update your login dialog box, click Yes.
About Manage Cards
Manage Cards lets you manage your personalinformation such as name, date of birth, email address,and credit card information in one place.
You can use the information that you store in the cardsto do the following:
1 Automatically fill forms
1 Provide sensitive information without having totype it while you are online
In this way, Identity Safe protects you from keyloggersthat steal and misuse your identity.
w Some Web sites have forms with fields for credit cardsor other personal information. The IdentitySafe menuon the NortonToolbar lists the cards that you createdfor autofill. You can choose a card from the list to fillthe forms automatically.
You can add, view, edit, and duplicate the details of anycard that you create. You can also delete a card if it isno longer needed.
In addition, Manage Cards provides you the followingfeatures:
1 Lets you upload an image for each card so that youcan identify the card quickly
1 Lets you password-protect the card to protectyourself from misuse of your sensitive informationand personal information
Securing your sensitive dataAbout securing your sensitive data
302
1 Recognizes the Web pages that have forms andimmediately displays a pop-up window with the listof cards
1 Provides you a quick view of any of your cards thatis not password-protected
Identity Safe provides additional security for yourpassword-protected cards by not displaying thesummary of the card
When you are on a Web page that has forms, a pop-upappears with the cards that you saved. You can selectthe card that you want to use to fill the Web page. Youcan also use the IdentityCards option in IdentitySafemenu to select the cards. The next time that you visitthe same Web page, Identity Safe offers to autofill theform with the same card details. If you upload anyimage for your card while you create it, the IdentityCards option displays the image along with the nameof your card.
Adding cards
The cards in the Manage Cards window help you toautomatically fill forms on Web sites with a single click.You can create cards to store information, such aspersonal details, contact details, and credit card details.You can provide a card name to help you identify aspecific card.
If you have more than one credit card, you can createmultiple cards with different sets of information. Whenyou visit a transactional Web site, you can provide thecredit card details that are present in any of the cardsthat you created.
You can also create anonymous cards for use onunfamiliar Web sites where you may be uncomfortableproviding your personal information. You canautomatically fill online forms when you visit a Website.
303Securing your sensitive dataAbout securing your sensitive data
To add a card
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
2 Under IdentitySafe, in the ManageCards row, clickConfigure.
3 In the Manage Cards window, click Add Card.
Securing your sensitive dataAbout securing your sensitive data
304
4 Use the following tabs to type your card details:
Provide details such as cardname, name, gender, and date
General
of birth. You can set a passwordand provide additional securityfor your card. You can also typetheOpenIDURL of your personalWeb page, if any.
Online form filling is languagespecific. In the Country/Regionbox, the country United Statesis selected by default. Youshould change your region andcreate a new card before you fillonline forms for any otherlanguage.
You can change the region in theIdentity Safe Options window.
You can also browse to a Webpage of any region and thencreate a card. Use the ManageCardsoption in theNortonmenuon theNorton Toolbar. The cardis created with the Web pageregion. You can use this card tofill the Web page form.
Provide your contact informationon this tab. Contact information
Contact
includes your email address,postal address, and phonenumbers.
305Securing your sensitive dataAbout securing your sensitive data
Provide your credit card detailson this tab. You can enter thestandard credit card details,such as the type of the card,expiration date, and cardnumber. You cannot enter acredit card number of more than16 digits.
Credit Card
5 If you want to update the image for your card, clickthe Update Image link and upload the image.When you click UpdateImage, Norton 360 displaysa list of images. You can either select an image fromthe list or upload an image of your choice. Bydefault, Identity Safe uploads the CreditCard imagefor the cards you create.
6 Click Save.
Editing, deleting, or duplicating cards
All the cards that you have saved in Identity Safe arelisted in Manage Cards. You can select, view, duplicate,and edit the details of any card that you created. Youcan delete a card if it is no longer needed. You can alsoduplicate a saved card and change only the fields thatyou want to change.
You can view a summary of the card that you created.You can select any of the cards that are present in thelist of cards at the bottom of the ManageCards window.When you select a card, you can view a summary of thecard.
w When you lock your card with a password, IdentitySafe provides additional security to your card. Youcannot view the summary of the locked card. Youcannot edit, delete, or duplicate a card unless youprovide the password.
If you have multiple cards, use the scroll arrows tobrowse the list.
Securing your sensitive dataAbout securing your sensitive data
306
When you create, duplicate, or edit a card, the card'sregion is set to the user's default region. If you browseto a Web page other than the default region and usethe card on that form, the fields may not fill correctly.For example, your card has a default United Statesregion but you are on a France Web page. In this case,you must use the card with France as the region to fillthe Web page form.
You should change your region and create a new cardbefore you fill online forms for any other language.You can change the region in the IdentitySafeOptionswindow.
You can also browse to a Web page of any region andthen create a card. Use the Manage Cards option inthe Norton menu on the Norton Toolbar. The card iscreated with the Web page region. You can use thiscard to fill the Web page form.
To edit a card
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
2 Under IdentitySafe, in the ManageCards row, clickConfigure.
3 On the Manage Cards window, select the card thatyou want to edit.
4 Click Edit Card.
5 Modify the fields that you want to change.
6 Click Save.
To delete a card
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
2 Under IdentitySafe, in the ManageCards row, clickConfigure.
3 On the Manage Cards window, select the card thatyou want to delete.
4 Click Delete Card.
307Securing your sensitive dataAbout securing your sensitive data
5 In the confirmation dialog box, click OK.
To duplicate a card
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
2 Under IdentitySafe, in the ManageCards row, clickConfigure.
3 On the Manage Cards window, select the card thatyou want to duplicate.
4 Click Duplicate Card.
5 Change the fields that you want to change.
6 If you want to update the image for your card, clickthe Update Image link and upload the image.When you click UpdateImage, Norton 360 displaysa list of images. You can either select an image fromthe list or upload an image of your choice. Bydefault, Identity Safe uploads the CreditCard imagefor the cards you create.
7 Click Save.
About Manage Notes
Identity Safe stores and manages your sensitiveinformation. It becomes difficult to manage all of theidentity numbers that you use when you browse theWeb. Manage Notes stores all your sensitive IDs in avery secure way and lets you use them easily when youare online. Use Manage Notes to include informationsuch as social security number, driver's license number,insurance policy number, and legal and financialinformation.
Managing Notes
You can use Manage Notes to store your personalinformation, which you can retrieve and use whenneeded. You can use this information to fill out Website registration forms. You can also view, edit, anddelete the notes that you have saved.
Securing your sensitive dataAbout securing your sensitive data
308
To create Notes
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
2 Under IdentitySafe, in the ManageNotes row, clickConfigure.
3 In the ManageNotes window, under Details, selecta category from the drop-down list.If a note already exists, click New, and then underDetails, select a category from the drop-down list.
4 If you want to add a title to the note you create, inthe Title box, type a title.
5 Type any additional information in the Informationbox.
6 Click Save.
7 Click OK.
To edit Notes
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
2 Under IdentitySafe, in the ManageNotes row, clickConfigure.
3 In the ManageNotes window, on the left side, selectthe title of the information that you want to edit.
4 Click Edit, and modify the information underDetails.You can change the category, modify the title, andedit the information that you have already typed.
5 Click Save.
6 Click OK.
To delete Notes
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
2 Under IdentitySafe, in the ManageNotes row, clickConfigure.
309Securing your sensitive dataAbout securing your sensitive data
3 In the Manage Notes window, under Title, selectthe title of the information that you want to delete.
4 Click Delete.
5 In the confirmation dialog box, click OK.
6 Click OK.
About Autofill Exclusions
The Autofill Exclusions feature lets you view the Webpages for which you asked Identity Safe to not saveyour logins or automatically fill forms. Identity Saferemembers your decision and does not prompt you touse the logins or cards that are available in IdentitySafe.
When you do not want Identity Safe to automaticallyfill the details, you can use Do not Autofill this pageoption. This option is available in the Identity Safemenu on the Norton Toolbar.
If you later decide to autofill a Web page that youexcluded, you can remove the Web page URL from theAutofill Exclusions dialog box.
Specifying Autofill exclusions
Identity Safe offers to automatically fill in your loginson those Web pages for which you have saved thelogins. However, you can configure Identity Safe to notuse logins and cards to automatically fill details in aWeb page.
w If you choose Neverforthispage in the Saveyourloginpage that appears when you log in to a Web page, thesite is listed under this option.
You must be logged in to Identity Safe to delete a URLfrom the Autofill Exclusions list.
To specify autofill exclusions before you log in to aWebsite
1 Go to the Web page that you want to exclude fromautofill.
Securing your sensitive dataAbout securing your sensitive data
310
2 On the Norton Toolbar, click Identity Safe.
3 On the Identity Safe menu, click Do not Autofillthis page.The option appears only when you are on a Web sitethat has forms or login information.
To specify autofill exclusions after you log in to a Website
1 Go to the Web page that you want to exclude fromautofill.
2 Type your login, and then click the option or linkthat logs you in.
3 In the Saveyourlogin dialog box that appears, clickNever for this page.The URL is added to the Autofill Exclusions dialogbox.
Deleting entries fromyour Autofill Exclusions list
If you decide to autofill a Web page that you excluded,you can remove the Web page URL from the AutofillExclusions list.
w You must be logged in to Identity Safe to delete a URLfrom the Autofill Exclusions dialog box.
To edit your Autofill Exclusions list
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
2 Under IdentitySafe, in the AutofillExclusions row,click Configure.
3 Select the Web page where you want to restoreautomatic fill-in of the login, and then click Delete.
4 Click Apply.
5 Click OK.
About Backup and Restore
You can back up your Identity Safe data for securitypurposes, data recovery, or when you transfer your
311Securing your sensitive dataAbout securing your sensitive data
Identity Safe data to a new computer. The backup filesare saved as .NPM files.
You can protect your backup files with a password.Symantec recommends that you use a password to keepyour Identity Safe data more secure. The backuppassword need not be the same as your Identity Safepassword. You must provide the password when yourestore the Identity Safe data that you backed up.
You can also restore the data that you have previouslybacked up.
w Restoring your data overwrites your data in IdentitySafe, and replaces it with the contents of the backupfile.
Backing up your data
You can back up your Identity Safe data for securitypurposes, data recovery, or when you transfer yourIdentity Safe data to a new computer.
You can retrieve Identity Safe data when your productexpires.
To back up your data
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
2 Under Identity Safe, in the Backup Identity SafeData row, click Configure.
3 In the Backup Identity Safe Data dialog box, type,or browse to the location to which you want yourdata saved.
4 Type the name that you want to assign to the filewith a .NPM suffix.
5 If you want to back up your data with a passwordfor more security, type and verify the password.
6 Click OK.
7 In the confirmation dialog box, click OK.
Securing your sensitive dataAbout securing your sensitive data
312
Restoring your data
You can restore your backed up Identity Safe data ifyou delete it by mistake. You can also restore yourIdentity Safe data if you want to transfer it to a newcomputer.
When you restore, Norton 360 replaces any existingIdentity Safe data with the contents of the backup file.
w Restoring your data overwrites your data in IdentitySafe, and replaces it with the contents of the backupfile.
To restore your data
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
2 Under Identity Safe, in the Restore Identity SafeData row, click Configure.
3 In the Restore Identity Safe Data dialog box, clickYes.
4 In the Restore Identity Safe Data dialog box, typeor browse to the location of the file from which youwant to restore the data.
5 If you backed up your data with a password, typethat password.
6 Click OK.
7 In the confirmation dialog box, click OK.
About Identity Safe Options
Identity Safe Options allows you to configure the wayyou want Identity Safe to collect, store, and display thelogin information for the Web pages you visit. You canconfigure Identity Safe to display your cards that you
313Securing your sensitive dataAbout securing your sensitive data
created for the Web sites that have forms. You can alsoselect the region for the new cards that you create.
Lets you do the following:
1 Configure Identity Safe tocollect and store your logininformation for the Webpages, and fill the loginswhen you revisit those Webpages.
1 Configure Identity Safe todisplay your logins each timeyou visit a Web page that hasmultiple logins.
Logins
Securing your sensitive dataAbout securing your sensitive data
314
Identity Cards
315Securing your sensitive dataAbout securing your sensitive data
Lets you do the following:1 Displays the cards that you
create.
When you are on a Web pagethat has forms, a pop-upwindow lists the cards thatare available. The windowalso tells you the card thatyou used to fill the formpreviously, if applicable. Youcan select a card from the listand use the information inthe card to fill your form.
1 Select the region for creatinga new card.
The region that you selectappears on the General tabof the Manage Cardswindow. You cannot modifythe region in the ManageCards window itself.
Online form filling islanguage-specific.Dependingon your region, a defaultvalue appears in theCountry/Region box.
When you create a card, thecard's region is set to thedefault region of the user. Ifyou browse a Web page otherthan the default region anduse the card on that Webpage, the fields may not fillcorrectly. For example, yourcard has a default UnitedStates region but you are ona France Web page. In thiscase, you must use the cardwith France as the region tofill the Web page form.w Symantec recommends
Securing your sensitive dataAbout securing your sensitive data
316
that you change your regionand create a new card beforeyou fill forms on a Web sitethat uses a different region.
You can also browse to aWeb page of any region andthen create a card. Use theManage Cards option in theNorton menu on the NortonToolbar. The card is createdwith the Web page region.You can use this card to fillthe Web page form.
1 Use the autofill feature whenyou visit unsafe Web sites.
You may lose your sensitivedata when you use them onunsafe Web sites. IdentitySafe fills your logins or carddetails on unsafe Web sitesdepending on the option thatyou set.
You can use theAutofill sitescontaining security threatsoption to specify how youwant Norton Identity Safe torespond to the Web sites thathave security threats. To doso, use the Yes, No, or Askoptions.
317Securing your sensitive dataAbout securing your sensitive data
1 Display a message when youinsert an external drive.
At times, you may want touse your portable profilewhile you are logged intoanother profile. When youinsert an external drive witha portable profile configured,Identity Safe displays adialog box. You can use thisdialog box to switch to yourportable profile. The settingof this option is specific toWindows User Account.
You can choose to turn on orturn off this setting using thePrompt to log into portableprofile upon deviceconnectionoption. Symantecrecommends that you alwaysturn on this option.
1 Warns you about the unsaferemoval of the externaldrives.
You should never detachyour external drive manually.In case you manually ejectthe external drive, IdentitySafe displays a warningmessage. The setting of thisoption is specific to WindowsUser Account.
You can use the Warn aboutunsafe portable profileremoval option to turn on orturn off this setting.Symantec recommends thatyou always turn on thisoption.
Securing your sensitive dataAbout securing your sensitive data
318
About Identity Safe Password & Security options
You can use Identity Safe Password & Security tochange your Identity Safe password. You can also usethis option to set the level of security that you wantfor Identity Safe password usage.
The following options let you change the Identity Safepassword and set security levels for your password:
Change your Identity Safepassword and set a newpassword hint using theChange Password option.
Identity Safe Password
319Securing your sensitive dataAbout securing your sensitive data
Password Security
Securing your sensitive dataAbout securing your sensitive data
320
Specify the Identity Safepassword security level.
Identity Safe provides fourlevels of security to protectyour Identity Safe password.Choose one of the followingoptions:1 Ask for my password at
the beginning of eachLogin session
Prompts for your IdentitySafe password the firsttime you access IdentitySafe.
As long as you are loggedin to Windows, you do notneed to provide thepassword again.
You should use thisoption to make your logincredentials more secure.
1 Ask for my passwordbefore filling out a Login
Prompts for your IdentitySafe password with everyonline form before itautofills any login.
You can specify thatindividual logins requirethe entry of your IdentitySafe password beforeautofill occurs.
1 Automatically log out ofIdentity Safe if computeris inactive for: <nn>minutes
Automatically logs youout of Identity Safe whenyour computer is idle forthe time that you specify.
321Securing your sensitive dataAbout securing your sensitive data
This option is useful if youare frequently in an areawhere other people haveaccess to your computer.
1 No password needed.Automatically log me inwhenWindows is started
Set this option if you wantto automatically log in toIdentity Safe whenWindows is launched.
Symantec recommendsthat you do not choosethis option.
The setting of this optionis specific to WindowsUser Account.w You must validateyour Norton Identity Safepassword each time youchange the security levelof the profile to a settingthat is less secure thanthe current security level..This option does notappear if you are loggedin to your portable profile.
Changing the Identity Safe password
You should change your Identity Safe Passwordregularly to prevent unauthorized access to yourpersonal information in Identity Safe. You can changethe password by using the Identity Safe Password &Security option in Settings window for IdentityProtection Settings.
w You can set your password hint here if you did notprovide it when you configured Identity Safe.
Securing your sensitive dataAbout securing your sensitive data
322
To change the Identity Safe password
1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.
2 Under IdentitySafe, in the IdentitySafePassword& Security row, click Configure.
3 In the Password & Security window, click ChangePassword.
4 In the ChangeIdentitySafePassword window, typethe current password and the new password, andconfirm the new password.
5 Click OK.
6 In the confirmation dialog box, click OK.
323Securing your sensitive dataAbout securing your sensitive data
About Norton ToolbarWhen you install Norton 360, it adds Norton Toolbarto Internet Explorer and Firefox. You have thefollowing options:
Lets you access IdentityProtection and other settings.
The following options areavailable in the Norton menu:1 Report Site
1 Minimize Toolbar
1 Settings
1 Manage Logins
1 Manage Cards
1 Manage Notes
1 Community Buzz
1 Go to Norton Safe Webwebsite
1 Enable Norton Safe Web
1 Enable Norton Safe Search
1 My Norton Account
1 Launch Tutorial
1 Help
w The Minimize Toolbaroption appears only in theInternet Explorer browser. Also,the Community Buzz option isavailable only inEnglish-language versions ofWindows.
Norton menu
Securing your sensitive dataAbout securing your sensitive data
324
Lets you perform an enhancedInternet search using NortonSafe Search.
You can type a search string inthe Norton Safe Search box andperform a search. When yousearch using the search box, apop-up window appears anddisplays the relevant searchresults.
Norton 360 uses the Ask searchengine to display the searchresults. By default, the NortonSafe Search box is hidden. Afteryou install Norton 360 andconnect to Internet usingInternet Explorer or Firefox, analert message is displayed. Thealert message prompts you toenable Norton Safe Search. Youcan choose to enable or disableNorton Safe Search.
Norton Safe Search
Lets you know if the Web siteyou visit is safe or unsafe.
When the options under SafeSurfing are turned on,Antiphishing and Norton SafeWeb analyze the security level ofthe Web sites you visit. It thendisplays the results in theNorton Site Safety pop-up.
Safe Web indicator
325Securing your sensitive dataAbout securing your sensitive data
Lets you view the logins andcards that you have saved inIdentity Safe.
Some Web sites have forms tofill or require login information.You can use the Identity Safemenu to fill the details to suchWeb sites. The Identity Safemenu displays the list of alllogins and cards that you saved.You can select a login from thelist and a use it to log in to theWeb page. You can also select acard from the list and use to fillforms.
You can use the Manage optionto manage your logins, cards,and notes and to access theIdentity Protection Settingswindow. In addition, you can alsoedit and delete a login using theIdentity Safe menu.
w You should be logged in toyour Identity Safe profile toaccess the Identity Safe menu.
Identity Safe menu
Norton 360 lets you install the NortonToolbar for freeeven after you uninstall the product. When youuninstall Norton 360, it offers to leave the NortonToolbar without any cost to search and browse safelyover the Internet. However, when you choose to installthe Norton Toolbar, the only features that you haveare Norton Safe Search and Norton Safe Web.
w Your computer must be connected to the Internet toavail this option. Norton 360 does not offer to leavethe NortonToolbar if you upgrade your product to thelatest version or choose to reinstall another Nortonproduct.
Securing your sensitive dataAbout securing your sensitive data
326
Hiding and showing the Norton Toolbar
You can hide the Norton Toolbar if you do not want tosee the evaluation of every Web page that you visit.When you hide the toolbar, Norton 360 does not displaythe Norton Site Safety pop-up. However, Norton 360notifies you about suspicious and known fraudulentpages or if an error needs your attention.
To hide or show the Norton Toolbar
1 At the top of your browser window, click View.
2 On the Toolbars submenu, do one of the following:
1 Uncheck Norton Toolbar to hide the toolbar.
1 Check Norton Toolbar to show the toolbar.
Accessing Identity Safe settings from the Norton Toolbar
Both Internet Explorer and Firefox include the NortonToolbar, which provides direct access to Identity Safesettings. The Identity Safe options in the Norton menuon the Norton Toolbar provide quick links to IdentitySafe settings. The Identity Safe menu on the NortonToolbar provides quick links to login settings.
To access the Identity Safe settings from the Nortonmenu
1 Start Internet Explorer or Firefox.
327Securing your sensitive dataAbout securing your sensitive data
2 On the NortonToolbar, in the Norton menu, selectone of the following:
Lets you report to Symantecabout the current Antiphishingevaluation.
Report Site
Lets you minimize the NortonToolbar.
Minimize Toolbar
When you check this option, theIdentity Safe phrase and theSafe Web phrase disappear andonly the Identity Safe and SafeWeb indicators remain.
In addition, the size of theNorton Safe Search box isreduced.
w The Minimize Toolbaroption appears only in theInternet Explorer browser.
Lets you open the Settingswindow for Identity Protection
Settings
and configure the Identity Safeoptions.
Lets you access the logins thatyou saved in theManage Loginswindow.
Manage Logins
The Manage Logins optionappears only if you have set upIdentity Safe.
You must be logged in to IdentitySafe to use this option.
Securing your sensitive dataAbout securing your sensitive data
328
Lets you access the cards thatyou saved in the Manage Cardswindow.
The Manage Cards optionappears only if you have set upIdentity Safe. You can alsochoose a card to fill the onlineforms when you are on a Webpage.
You must be logged into IdentitySafe to use this option.
Manage Cards
Lets you access the notes thatyou saved in the Manage Noteswindow.
The Manage Notes optionappears only if you have set upIdentity Safe.
You must be logged into IdentitySafe to use this option.
Manage Notes
329Securing your sensitive dataAbout securing your sensitive data
Lets you view the communitysite rating of the Web sites youvisit.
You can click Community Buzzto know further details about theWeb sites. Norton Safe Webrates the sites and providesdetailed reports. In addition, youcan see user reviews and postyour reviews about the Websites.
When you have not opened anyWeb site, you can clickCommunity Buzz to visit theNorton Safe Web site. You canprovide the address of any Website and find the security details,Norton rating, and communityreviews of the Web site.
w The Community Buzzoption is available only inEnglish-language versions ofWindows.
Community Buzz
Lets you open the Norton SafeWeb sitehttp://www.safeweb.norton.com.
Go to Norton Safe Webwebsite
Securing your sensitive dataAbout securing your sensitive data
330
Lets you turn on the Norton SafeWeb feature which provides asafe online browsing experience.
The following are the uniquefeatures of Norton Safe Web:
1 Displays the site safetyrating icons for the searchresults in the search Webpage
1 Displays the site safetyrating icons when you are ona Web page
Enable Norton Safe Web
Lets you view the Norton SafeSearch box.
You can type a search string inthe Norton Safe Search box andperform a search. The search boxdisplays relevant searchsuggestions in a pop-up window.
By default, the Norton SafeSearch box is hidden. After youinstall Norton 360 and openInternet Explorer or Firefox, analert message is displayed. Thealert message prompts you toenable Norton Safe Search. Youcan choose to enable or disableNorton Safe Search. If you wantto disable Norton Safe Search,you can use the Disable NortonSafe Search option.
Enable Norton SafeSearch
Lets you open the Web sitehttps://www.mynortonaccount.com/amsweb.
Norton Account lets you registeryour product with Symantec andmanage all of your Nortonproducts in one place.
My Norton Account
331Securing your sensitive dataAbout securing your sensitive data
Lets you use the online tutorialto learn more about IdentitySafe.
Launch Tutorial
Lets you view the Norton menuhelp page.
Help
Accessing the Identity Safe menu
The Identity Safe menu on the NortonToolbar lets youview and manage the logins, cards, and notes that yousaved. You can also access the Identity Safe Settingswindow using the IdentitySafe menu. In addition, youcan navigate to any Web page for which you have savedthe login credentials.
When you visit any login Web page without settingyour Identity Safe password, a pop-up appears in theIdentitySafe menu. You can use the Setupnow optionthat is available in the pop-up to set your Identity Safepassword.
Identity Safe menu lets you view the logins that yousaved even after the product expires. You can use thisoption to autofill the login details of the saved login.As Antiphishing is disabled when the product isexpired, it is not recommended to autofill the logindetails. In addition, you can view the IdentityProtection Settings window. However, you cannotview, access, or configure all the features in the IdentityProtection Settings after Norton 360 expires.
To access your logins from the Identity Safe menu
1 Start Internet Explorer or Firefox.
Securing your sensitive dataAbout securing your sensitive data
332
2 On the Norton Toolbar, in the Identity Safe menu,select one of the following:
Lets you create an autofillexclusion for the Web page loginor forms.
Do not Autofill this page
You can use this option whenyou do not want Identity Safe toautomatically fill the details ofthe saved logins or cards.
w The option appears onlywhen you are on a Web site thathas forms or login information.
Lets you open the ManageLogins window, the Manage
Manage
Notes window, and the ManageCards window.
You can use this option to accessyour logins, cards, notes, andIdentity Protection Settingswindow.
Lets you log out of or log in toIdentity Safe.
Log out of Profile: Profilename
You should log out of IdentitySafe to secure your Identity Safedata when you are away fromyour computer. The optionshows the name of your profilethat you are currently loggedinto.
Lets you use a saved login for aWeb page from the list of loginsthat is displayed.
Available Logins for thispage
333Securing your sensitive dataAbout securing your sensitive data
Lets you use a card while you areon a Web page that has forms.
The option displays the cardsthat you saved from which youcan choose the one you want touse to fill the form. If you uploadan image for your card while youcreate it, the option displays theimage along with the name ofthe card.
Identity Cards
Securing your sensitive dataAbout securing your sensitive data
334
Lets you open the Web page forwhich you have saved logins.
You can also view the logins thatare organized into folders. Thefolder displays the site names ofthe Web pages. You can view thesite names that you providedwhen you saved your login inIdentity Safe.
The following options areavailable when you right-clickany of the saved login:1 Open in New Tab
You can use this option toopen a Web page with asaved login on a new tab ofthe browser window. Thenew tab opens with the logindetails autofilled andauto-submitted. You can usethis option even after theproduct expires.
The Open in New Tab optionis available only in InternetExplorer 7 or later, andFirefox browsers.
1 Edit
You can use this option toedit the details of the loginsthat you saved. This optionlets you open the ManageLogins window where youcan view and edit the logindetails.
1 Delete
You can use this option tomanually delete any of thelogins present in the IdentitySafe menu.
site name/folder name
335Securing your sensitive dataAbout securing your sensitive data
Securing your sensitive dataAbout securing your sensitive data
336
This chapter includes the following topics:
1 About the Network Security Map
About the Network Security MapA home network typically consists of the computersand other devices that share your Internet connection.The Network Security Map helps you view and manageyour network.
After you configure Network Security Map, Norton 360automatically detects the devices that are connectedto your network and lists them in the Network SecurityMap. You can view devices and customize the NetworkSecurity Map to remotely monitor the computers onwhich a Norton product is installed.
w Ensure that the computers that you want to remotelymonitor have a version of a Norton product thatsupports Remote Monitoring.
You can access the Network Security Map from the MyNetwork Settings window.
You can monitor the following items in the NetworkSecurity Map:
1 Security status of the computers that are connectedto the network
1 Status of the protection features of the computersthat are connected to the network
10Protecting yourhome network
1 Subscription status and Norton product version ofthe computers that are connected to your network
1 Status of your wireless network connection
1 Connection status of the devices that are on thenetwork
1 The known, unknown, or intruder devices that areon your network
You can grant or deny permission to the networkeddevices to access your computer.
You can also modify details about a computer or devicethat is connected to your network.
Viewing devices on the Network Security MapThe NetworkSecurityMap window provides a pictorialrepresentation of the devices on the network to whichyour computer is connected. You can view the detailsof each device, such as device name, security status,and IP address.
The Network Security Map window also provides thesecurity status of the following computers:
1 The computer on which you view the remotemonitoring status (MY PC)
1 The computers that are remotely monitored
The trust level of the device appears at the bottom ofthe icon in the network map.
Norton 360 displays devices in the following order:
1 MY PC
1 Devices with online connection status
1 Devices with offline connection status
When you connect a new device to your network,Norton 360 automatically refreshes the NetworkSecurity Map window and displays the device.
Protecting your home networkAbout the Network Security Map
338
w Norton 360 requires you to configure the SymantecSecurity Driver to open the Network Security Map. Youcannot install the Symantec Security Driver when yourun LiveUpdate. You can either allow the NortonLiveUpdate to complete or close the Norton LiveUpdatesession before you install the Symantec Security Driver.
To view devices on the Network Security Map
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click My Network.
3 If the Product Configuration panel appears, clickContinue.The Product Configuration panel appears whenyou click Network Security Map for the first time.The ProductConfiguration panel helps you installSymantec Security Driver that is required to viewthe NetworkSecurityMap window. The process ofinstallation of the Symantec Security Driverdisrupts your network connection temporarily.
4 Under Network Security Map, click Configure.The Network Security Overview window lets youview the summary of features of the NetworkSecurity Map. The Network Security Overviewwindow appears in the following instances:
1 When you open the Network Security Mapwindow for the first time.
1 When you turn on Welcome Screen at Startupin the Settings window for My Network, underNetwork Security Map.
5 If the NetworkSecurityOverview window appears,click OK.If you do not want to view the Network SecurityOverview window in the future, check Donotshowthis again before you click OK.
6 In the Network Details drop-down list, select thenetwork that lists the device for which you want tosee the details.
339Protecting your home networkAbout the Network Security Map
To view the details of a device on the Network SecurityMap
Protecting your home networkAbout the Network Security Map
340
4 In the NetworkSecurityMap window, click a deviceicon.You can use the scroll arrows to view the devicesthat are listed in the network map.The device details section that is located below thenetwork map displays the following details:
Shows the name of the deviceDevice Name
For a computer, the NetworkSecurity Map displays theNetBIOS name by default.However, the Network SecurityMap displays the name of thedevice as NEW if it meets thefollowing conditions:
1 The device does not have aNetBIOS name
1 The device has a firewall thatis enabled
You can change the device namein the Edit Device Detailswindow.
Shows the name of the networkadapter manufacturer of thedevice
Adapter Manufacturer
The adapter manufacturer'sname is based on the physicaladdress (also known as MediaControl Access address or MACaddress) of the device.
341Protecting your home networkAbout the Network Security Map
Shows the category to which thedevice belongs
The device category iconprovides details on theconnection status and securitystatus. Norton 360 labels allunknown devices as NEW andsets the category as GENERICDEVICE.
This category may includecomputer-related devices, suchas printers, media devices, andgame consoles.
You can change the devicecategory in the Edit DeviceDetails window.
Category
Shows how well your computeris protected from threats, risks,and damage
w The security statusappears only for MY PC and thecomputers that are remotelymonitored.
Security Status
Shows the connection status ofRemote Monitoring
The statuses are:
1 ON
1 OFF
You can turn off RemoteMonitoring for an individualcomputer or for all thecomputers that you remotelymonitor.
Remote Monitoring
Protecting your home networkAbout the Network Security Map
342
Shows the access level that isgranted to a remote device toconnect to your computer
The initial trust level is set basedon the configuration of yourcomputer. You can set trust levelfor all devices other thanMYPC.
Trust Level
Shows the status of theconnection
The statuses are:
1 ONLINE
1 OFFLINE
Connection
Shows the physical address (alsoknown as the Media AccessControl address or MAC address)of the computer or device
Physical Address
Shows the IP address of thecomputer or device
If you change the IP address ofa device, the updated IP addressappears in theNetwork SecurityMap window when you refreshthe list.
IP Address
Turning off or turning on Network Security OverviewThe Network Security Overview window provides abrief summary about the following features:
1 Wireless Security
1 Remote Monitoring
1 Network Map
1 Trust Controls
343Protecting your home networkAbout the Network Security Map
You can click each of the features and read thesummary to learn more about using Network SecurityMap to manage your home network. By default, theNetworkSecurityOverview window appears each timeyou open Network Security Map.
If you do not want to view the Network SecurityOverview window, you can turn it off. Turning off theNetwork Security Overview window does not affectthe performance or security of your computer.
w You can also turn off the NetworkSecurityOverviewwindow if you check Do not show this again optionthat is available at the bottom of the NetworkSecurityOverview window.
To turn off Network Security Overview
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click My Network.
3 Under Network Security Map, in the WelcomeScreen at Startup row, move the On/Off switch tothe right to the Off position.
4 Click Apply.
5 Click Close.
To turn on Network Security Overview
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click My Network.
3 Under Network Security Map, in the WelcomeScreen at Startup row, move the On/Off switch tothe right to the On position.
4 Click Apply.
5 Click Close.
Setting up Remote MonitoringYou can set up Remote Monitoring by allowingcomputers on your network to communicate with yourcomputer.
Protecting your home networkAbout the Network Security Map
344
w Ensure that the computers that you want to remotelymonitor have a version of a Norton product thatsupports Remote Monitoring.
Norton 360 requires a Passkey to set up RemoteMonitoring. You must type the same Passkey for allthe computers that you want to remotely monitor.
After you set up Remote Monitoring, you can connectany computer to your network and enter the samePasskey. Norton 360 automatically identifies thecomputer and connects it to the Network Security Map.
To set up Remote Monitoring
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click My Network.
3 In the NetworkSecurityMap row, click Configure.
4 On the left side of the Network Security Mapwindow, under Remote Monitoring, click Setup.
5 In the Remote Monitoring Setup window, type aPasskey.The Passkey should be between 6 and 20 charactersin length. The Passkey is case sensitive.
6 Under Choose the default mode for ComputerDiscovery, select one of the following options:
Lets your computer alwaysdiscover other computers thatare connected to the network
Computer Discoveryalways on
Lets your computer discoverother computers that areconnected to the network whenthe Network Security Mapwindow is open
Computer Discovery ononly when NetworkSecurity Map screen isdisplayed
7 Click OK.
8 Set up Remote Monitoring for all other computersthat you want to monitor remotely.
345Protecting your home networkAbout the Network Security Map
Turning off Remote MonitoringWhen you turn off Remote Monitoring, you stop remotemonitoring of the computers that are connected toyour network.
You can turn off Remote Monitoring for the following:
1 All of the computers that you remotely monitor
1 An individual computer that you remotely monitor
w You can turn off Remote Monitoring only after youcomplete the Remote Monitoring Setup process.
To turn off Remote Monitoring for all computers
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click My Network.
3 In the NetworkSecurityMap row, click Configure.
4 On the left side of the Network Security Mapwindow, under Remote Monitoring, click Disable.
5 In the confirmation dialog box, click Yes.
To turn off Remote Monitoring for an individualcomputer
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click My Network.
3 In the NetworkSecurityMap row, click Configure.
4 In the Network Security Map window, in thenetwork map, click the computer for which you wantto disable Remote Monitoring.
5 In the device details area, next to RemoteMonitoring, click Disable.
6 In the confirmation dialog box, click Yes.
Adding a device to the Network Security MapYou can manually add a computer or device to theNetwork Security Map.
Protecting your home networkAbout the Network Security Map
346
You can add the following details when you add adevice:
1 The name or description
1 The IP address or physical address
The Network Security Map finds any computers thatare connected to your network. However, you can addthe computers and the devices that are currently notconnected.
Norton 360 adds to the Trust Control network all thedevices that you manually add to Network SecurityMap. You can select the Trust Control network in theNetwork Details drop-down list to view the devicesthat you added. You can also edit the name of thedevice.
w You cannot edit the Trust Control network details.
The default trust level of the devices that you add tothe Network Security Map is Protected. However, youcan change the trust level of the devices.
w If you trust a device that is not on your network, youcan expose your computer to potential security risks.
To add a device to the Network Security Map
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click My Network.
3 In the NetworkSecurityMap row, click Configure.
4 On the left side of the Network Security Mapwindow, under Total in Network, click the plussymbol.
5 In the AddaDevice window, in the Name box, typethe name of the device that you want to add to theNetwork Security Map.The maximum character length of the device nameis 15 characters.
347Protecting your home networkAbout the Network Security Map
6 In the IP or Physical Address box, type the IPaddress or physical address of the device that youwant to add to the Network Security Map.You can use the following formats in the IP orPhysical Address box:
172.16.0.0IPv4 address
fe80::12ac:fe44:192a:14ccIPv6 address
11-22-c3-5a-fe-a4Physical address
ftp.myfiles.comResolvable host
The address that you provide is not verified untilthe device is physically found on the network.
7 Click Add Device.
Finding a computer's IP addressYou can find a computer's IP address in various ways.On Windows 2000/XP, Windows Vista, and Windows7 computers, you can use Ipconfig to find the IP addressof a computer.
Ipconfig reports the IP address of its local computeronly. You must run this program on the computer thatyou want to identify.
To find an IP address by using Ipconfig on Windows2000/XP
1 On the computer you want to identify, on theWindows taskbar, click Start > Run.
2 In the Run dialog box, type cmd.
3 Click OK.
4 At the command prompt, type ipconfig, and thenpress Enter on your keyboard.
5 Write down the IP address.
Protecting your home networkAbout the Network Security Map
348
To find an IP address by using Ipconfig onWindowsVista
1 On the computer you want to identify, on theWindows taskbar, click Start.
2 In the Start Search text box, type cmd, and thenpress Enter on your keyboard.
3 At the command prompt, type ipconfig, and thenpress Enter on your keyboard.
4 Write down the IP address.
To find an IP address by using Ipconfig on Windows 7
1 On the computer you want to identify, on theWindows taskbar, click Start.
2 In the Searchprogramsandfiles text box, typecmd,and then press Enter on your keyboard.
3 At the command prompt, type ipconfig, and thenpress Enter on your keyboard.
4 Write down the IP address.
Editing device detailsYou can change the name and category of a device thatis available on the Network Security Map. You canselect the categories such as Generic Device, Laptop,Media Device, or Game Console.
You cannot change the category of the device that youadded manually. By default, Norton 360 displays thecategory of the manually added device as USERDEFINED.
The NetworkSecurityMap window displays differenticons, depending on the category that you select. Iconshelp you identify the devices that are listed in thenetwork map.
To edit the details of the device that is on your network
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click My Network.
3 In the NetworkSecurityMap row, click Configure.
349Protecting your home networkAbout the Network Security Map
4 In the Network Security Map window, in thenetwork map, click a device icon.
5 In the device details section, next to Device Name,click Edit.
6 In the EditDeviceDetails window, in the Name box,type a new name.The maximum character length of the device nameis 15 characters.
7 In the Category drop-down list, click one of thefollowing device categories:
1 GENERIC DEVICE
1 DESKTOP PC
1 LAPTOP
1 SERVER PC
1 NETWORK PRINTER
1 ROUTER/SWITCH
1 CABLE/DSL MODEM
1 MEDIA DEVICE
1 GAME CONSOLE
1 PDA/MOBILE PHONE
1 NETWORK STORAGE DEVICE
1 WEB CAMERA
8 Click OK.
To edit the name of the device that you addedmanually
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click My Network.
3 In the NetworkSecurityMap row, click Configure.
4 In the Network Security Map window, in theNetworkDetails drop-down list, click TrustControl.
5 In the network map, select a device that you added.
6 In the device details area, next to DeviceName, clickEdit.
7 In the Edit Device Details dialog box, in the Namebox, type a new name.
Protecting your home networkAbout the Network Security Map
350
8 Click OK.
Editing network detailsYou can view the details and change the name of yournetwork in the Edit Network Details window.
w You cannot edit the Trust Control network details.
To edit network details
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click My Network.
3 In the NetworkSecurityMap row, click Configure.
4 In the NetworkSecurityMap window, on the rightside of Network Details, click Edit.
5 In the Edit Network Details dialog box, in theNetwork Name box, type a new name.
6 Click OK.
Changing the trust level of your network and devicesThe trust level determines the default level of accessthat devices on your network have to your computer.Any device on your network that is not explicitlyTrusted or Restricted uses the trust level of yournetwork. The initial network trust level is set based onthe configuration of your computer.
w Ensure that you change the trust level of a device toFull Trust, if it is a known device, and is connected toyour network.
The following conditions are necessary for the trustlevel of a device to be Shared:
1 The computer should not have a public IP address.
Your computer does not have a public IP address ifit is not directly connected to the Internet.
1 The computer should be connected to a LANthrough a secure connection.
351Protecting your home networkAbout the Network Security Map
1 The network category should be private in WindowsVista.
In addition, the trust level of a device is Shared in anyof the following cases:
1 When the computer on the network has one or morefolders or printers that are shared
1 When the computer is Media Center compatible (forexample, if you have Windows XP Media CenterEdition, Windows Vista Home Premium, WindowsVista Ultimate, Windows 7 Home Premium,Windows 7 Professional, or Windows 7 Ultimate)
w If you use a wireless network that is not secure, thedefault trust level of all the devices that are on thenetwork is Protected.
The trust level of a device also depends on the trustlevel of its network. When you change the trust levelof a network, Norton 360 assigns the same trust levelto all the devices that are connected to that network.However, Norton 360 does not change the trust levelof the devices that you individually trust or restrict.
You can modify these settings if you want to changethe trust level for the following:
1 Your network
1 Devices that are connected to the Network SecurityMap
To change the trust level of your network
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click My Network.
3 In the NetworkSecurityMap row, click Configure.
4 In the NetworkSecurityMap window, on the rightside of Network Details, click Edit.
5 In the Edit Network Details window, next to TrustLevel, click Edit.You can view the details of the network in the EditNetwork Details window before you change thetrust level.
Protecting your home networkAbout the Network Security Map
352
6 To select a trust level for a network, in the EditNetwork Trust Level window, click one of thefollowing:
Adds the network to the Trustedlist
FULL TRUST
All the network traffic that yourcomputer receives from aTrusted network is filtered andallowed through firewall.However, known attacks andinfections are still monitored.You should select this settingonly when you are sure that thenetwork is completely safe.
Adds the network to the Sharedlist
SHARED
All the network traffic that yourcomputer receives from a Sharednetwork is filtered. Only sharedresources on your computer,such as files, folders, andprinters are allowed. You shouldselect this setting if you want thefirewall to protect you from alltraffic except those that pertainto file and printer sharing.
Adds the network to theProtected list
PROTECTED
A network is in the ProtectedTrust Level when it has not beenclassified as Trusted, Shared, orRestricted. You remain protectedfrom known attacks and allunexpected traffic.
353Protecting your home networkAbout the Network Security Map
Adds the network to theRestricted list
The devices that are onRestricted network cannotcommunicate with yourcomputer. However, you can stilluse the network to browse Websites, send email messages, ortransmit other communications.
RESTRICTED
7 Click OK.
To change the trust level of a device
1 In the Norton 360 main window, click Settings.
2 In the Settings window, click My Network.
3 Under NetworkSecurityMap, in the TrustControlrow, click Configure.
4 In the Network Security Map window, do one ofthe following:
1 To edit the trust level of a device that youmanually added, in the network map, click thedevice.
1 To edit the trust level of a device that is on yournetwork, in the NetworkDetails drop-down list,click LocalAreaConnection, and then click thedevice.
5 In the device details section, next to Trust Level,click Edit.
Protecting your home networkAbout the Network Security Map
354
6 To select a trust level for a device, in the EditDeviceTrust Level window, click one of the following:
Adds a device to the Full Trustlist
Full Trust devices are monitoredonly for known attacks andinfections. You should select thissetting only when you are surethat the device is completelysafe.
FULL TRUST
Adds a device to the Restrictedlist
Restricted devices do not haveaccess to your computer.
RESTRICTED
Adds a device to a default trustlevel
The devices that are removedfrom the Full Trust level orRestricted trust level take thedefault trust level of thenetwork. The trust level of thenetwork can be Full Trust,Restricted, Protected, or Shared.
USE NETWORK TRUST(trust level)
7 Click OK.Norton 360 displays the trust level status of eachrestricted device on the icon of the device.
Excluding a device from Intrusion Prevention scanThe Intrusion Prevention System in Norton 360 scansall the network traffic that enters and exits yourcomputer. When a device on your network requestsaccess your computer, Intrusion Prevention scans thisrequest to ensure that it is not a virus attack. Scanningevery request from all the devices that access your
355Protecting your home networkAbout the Network Security Map
computer increases the scan time which slows downthe network speed of your computer.
If you know that a specific device on your network issafe, you can apply Full Trust level to this device. Inaddition, you can exclude this specific device fromIntrusion Prevention scan. When you exclude a devicefrom Intrusion Prevention scan, Norton 360 trusts thisdevice and does not scan any information that isreceived from this device. This improves the networkspeed of your computer and helps the trusted deviceto access your device quickly.
w You can exclude only full trusted devices that are onthe local subnet.
To exclude a device from Intrusion Prevention scan,you must ensure that the IP address of the device neverchanges. Norton 360 uses IP addresses to identifydevices on your home network. If the IP address of thedevice changes, Norton 360 cannot identify the trusteddevice that should be excluded from IntrusionPrevention scan.
w You can exclude a trusted device from IntrusionPrevention scan only if you are sure that the devicedoes not have any security threats.
When you apply Full Trust to a device and exclude itfrom Intrusion Prevention scan, the IP address andMAC address of the device are added to the TrustControl.
To exclude a device from Intrusion Prevention scan
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click My Network.
3 Under My Network, in the Network Security Maprow, click Configure.
4 If the NetworkSecurityOverview window appears,click OK.
Protecting your home networkAbout the Network Security Map
356
5 In the Network Security Map window, do one ofthe following:
1 To edit the trust level of a device that is on yournetwork, in the network map, click the device.
1 To edit the trust level of a device that youmanually added, in the Network Detailsdrop-down list, click Trust Control, and thenclick the device.
6 In the device details section, in the TrustLevel row,click Edit.
7 In the Edit Device Trust Level window, click FULLTRUST.
8 At the bottom of the Edit Device Trust Levelwindow, check Exclude from IPS scanning.
9 In the Exclude fromIPSScanning dialog box, clickYes to confirm.
10 Click OK.
Removing devices from the Network Security MapThe Network Security Map window lists the devicesthat are connected to your network. You can remove adevice or a computer from the Network Security Map.You can purge all devices from the network map andcreate a new list of devices. For example, you can purgeall the devices that were present in your previousnetwork before you connect to a new network. Ensurethat you disable Remote Monitoring before you purgethe network map. Norton 360 cannot purge the networkmap when the Remote Monitoring is turned on. Also,ensure that you close the Network Security Mapwindow before you purge the network map. You cannotpurge the network map when the Network SecurityMap window is open.
w Norton 360 purges the devices that you add manuallyin the Trust Control network depending upon theirtrust level. It does not purge the devices that have atrust level as Full Trust or Restricted.
357Protecting your home networkAbout the Network Security Map
When you remove an individual device, the onlinedevices appear again the next time you open theNetwork Security Map. However, Norton 360permanently removes the offline devices.
To remove an individual device
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click My Network.
3 In the NetworkSecurityMap row, click Configure.
4 In the Network Security Map window, do one ofthe following:
1 To remove a device that is on your network, inthe network map, click the device.
1 To remove a device that you manually added, inthe NetworkDetails drop-down list, select TrustControl, and then click the device.
5 On the left side of the Network Security Mapwindow, under Total in Network, click the minussymbol.
6 In the confirmation dialog box, click Yes.
To purge the Network Security Map
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click My Network.
3 Under NetworkSecurityMap, in the NetworkMaprow, click Purge.
4 In the confirmation dialog box, click Yes.
Viewing the status of your wireless networkYou can view the status of your wireless network inthe Network Security Map window. The NetworkSecurity Map displays the status of your wirelessnetwork as secure or not secure. A secure networkrequires a strong wireless encryption. If your wirelessnetwork is not secure, you can turn on encryption onyour wireless router.
Protecting your home networkAbout the Network Security Map
358
For more information on how to secure your wirelessnetwork, on the left side of the NetworkSecurityMapwindow, click the Why is it not secure link. Follow theinstructions.
w You should only trust a wireless connection that issecure. Trusting a wireless connection that is notsecure puts all of the devices on your network at risk.
To view the status of your wireless network
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click My Network.
3 In the Network Security Map row, click Configure4 On the left side of the Network Security Map
window, view the status of your wireless network.Your wireless network statuses are:
Indicates that your wirelessnetwork is secure
WirelessNetwork Secure
Indicates that your wirelessnetwork is not secure
Wireless Network NotSecure
Viewing the device detailsThe Network Security Map lets you view the details ofthe computers that you remotely monitor. You canview the following details:
1 The configuration status of your protectionfeatures, such as Auto-Protect, IntrusionPrevention, and Email Scanning
1 The configuration status of your definition updates,such as Automatic LiveUpdate and Pulse Updates
1 The version number of your Norton product
1 The subscription status of your Norton product
1 The configuration status of your transactionsecurity, such as Identity Safe and Antiphishing
359Protecting your home networkAbout the Network Security Map
1 The last five AntiVirus threats that are detected
To view the device details
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click My Network.
3 In the Network Security Map row, click Configure4 In the Network Security Map window, in the
network map, click the device for which you wantto see the details.You can view the details of only the computers thatyou remotely monitor.
5 In the device details section, next to Category, clickDetails.
6 In the Device Details window, view the details ofthe device.
7 Click Close.
Modifying the communication port for NetworkSecurity Map
The Network Security Map Settings lets you configurethe communication port number that Norton Productsuse to communicate with each other over a network.By default, Norton products use 31077 as thecommunication port number.
If you change the communication port number of yourNorton product, you must change it on every computerthat is connected to your home network. In addition,when you find more computers that use the RemoteMonitoring Setup process, ensure that the same portnumber is used on every computer.
w Though you can modify the communication portnumber, it is recommended that you do not change thisport number. If you change the communication portnumber, you must use a port number in the range of1-65535.
Protecting your home networkAbout the Network Security Map
360
Tomodify the communication port forNetwork SecurityMap
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click My Network.
3 Under Network Security Map, in theCommunication Port box, type a newcommunication port number.You must use the same port number for each of thedevice that is connected to your Network SecurityMap.
4 Click Apply.
5 Click Close.
361Protecting your home networkAbout the Network Security Map
Protecting your home networkAbout the Network Security Map
362
This chapter includes the following topics:
1 About PC Tuneup
1 About disk and file fragmentation
1 Optimizing your permanent disks manually
1 About using optimization efficiently
1 About cleaning up disk clutter
1 Running a scan to clean up disk clutter
1 Running Registry Cleanup
1 Running Diagnostic Report
1 About Startup Manager
About PC TuneupNorton 360 offers total protection of your PC thatincludes PC Tuneup capability, which increases yourPC performance. PC Tuneup keeps your computer tunedup for peak performance.
Norton 360 keeps your PC tuned up and runningsmoothly by using various techniques, such asoptimizing your hard disk and deleting unusedtemporary files.
11Keeping your PCtuned up
PC Tuneup detects and fixes common computerproblems, cleans up unwanted cookies and files, anddefragments the hard disk to optimize PC performance.
About disk and file fragmentationYour PC's hard disk stores all of your files, applications,and the Windows operating system. Over time, the bitsof information that make up your files gradually spreadover the disk. This process is known as fragmentation.The more you use your computer, the more fragmentedyour disks become.
When a fragmented file is accessed, the diskperformance is slower. The performance is slowerbecause the drive head locates, loads, saves, and keepstrack of all of the fragments of the file. If free space isalso fragmented, the drive head might have to trackadequate free space to store temporary files or newlyadded files.
Norton 360 optimizes your permanent disks to improveyour PC's efficiency and speed. The optimizationprocess rearranges the scattered file fragments intoadjacent or contiguous clusters. When the drive headaccesses all of the file data in one location, the file isread into the memory faster. Optimization alsoconsolidates free space to avoid fragmenting newlyadded files. It adds extra space after major datastructures so that they can grow without immediatelybecoming fragmented again.
Optimizing your permanent disks manuallyOptimizing your PC's permanent disks can improveperformance and reliability. Norton 360 automaticallychecks your permanent disks for fragmentation andoptimizes them if they are more than 10 percentfragmented. You can always check the latest reportsto see if optimization is necessary.
Keeping your PC tuned upAbout disk and file fragmentation
364
Some programs, such as movie-editing programs orprograms that require large amounts of disk space, canwork more efficiently if your disks are optimized. Ifyou prefer not to wait until Norton 360 performsautomatic optimization, you can optimize your disksmanually.
To optimize your permanent disks manually
1 In the Norton 360 main window, move the mousepointer over PC Tuneup, and then click Run DiskOptimization.
2 When the activity is complete, in the ActivitiesandScan Details window, click Close.
About using optimization efficientlyNorton 360 automatically optimizes the permanentdisk in your PC as necessary and does not require youto take any action to accomplish that task. You can,however, adopt some practices that help Norton 360perform automatic optimization more efficiently.
The following practices can help make automaticoptimization more efficient:
Norton 360 performs diskoptimization when your PC isidle. If you turn off your PCwhenever you finish yourwork, Norton 360 cannotperform automaticoptimization. If you turn offyour PC during optimization,Norton 360 restarts theoptimization process whenyou turn on your PC again.
Occasionally leave your PCturned on when you do notuse the PC
365Keeping your PC tuned upAbout using optimization efficiently
Norton 360 automaticallyoptimizes the hard disk asneeded. You can also set aschedule for optimization.
Set a schedule foroptimization
Large files are often morefragmented than the smallerfiles. These fragmented filesaffect the performance ofyour computer.
Remove the large files thatyou no longer need
About cleaning up disk clutterOver time, the permanent disk in your PC canaccumulate many temporary and unneeded files.Eventually, these files can significantly reduce theavailable disk storage space and affect the performanceof your PC. Norton 360 automatically cleans upaccumulated disk clutter.
The temporary files that clutter your PC can come fromthe following sources:
When you install software onyour PC, the installationprocess creates temporaryfiles as part of theinstallation process. In somecases, the installer might notclean up these temporaryfiles when the installationfinishes.
Software installations
Keeping your PC tuned upAbout cleaning up disk clutter
366
When you browse a Webpage, your browserdownloads the text andgraphics that comprise thecontents of the page. Whenyou finish viewing the page,the browser can leave thedownloaded contents on yourPC. The downloaded contentshelp to display the Web pagemore quickly if you view thepage again. These browserfiles accumulate over time.
Web browsing
During normal operation,some programs createtemporary files to improveefficiency while you work. Ifa program ends unexpectedlybecause of a software error,those temporary files can beleft behind.
Program errors
Running a scan to clean up disk clutterA cleanup scan searches your PC's permanent disk fortemporary and unused files to improve performanceand increase available disk space. Norton 360automatically removes the temporary and the unusedfiles from your PC.
Various activities, such as extensive Web browsing ora series of software installations produce temporaryfiles. You can run a manual cleanup scan to remove thetemporary files immediately.
To clean up your disk clutter
1 In the Norton 360 main window, move the mousepointer over PC Tuneup, and then click Run FileCleanup.
367Keeping your PC tuned upRunning a scan to clean up disk clutter
2 When the activity is complete, in the ActivitiesandScan Details window, click Close.
Running Registry CleanupThe Windows registry can contain the entries that referto files that do not exist. Such broken registry itemscan slow down your computer. Registry Cleanup scansyour computer and cleans any broken registry entriesthat it finds.
To run Registry Cleanup
1 In the Norton 360 main window, click Tasks.
2 In the Tasks window, under PCTuneupTasks, clickRun Registry Cleanup.
3 When the activity is complete, in the ActivitiesandScan Details window, click Close.
Running Diagnostic ReportNorton 360 Diagnostic Report gathers informationabout your computer, which includes the operatingsystem, programs, and hardware. You can use thisreport to find and fix the issues.
Norton 360 Diagnostic Report is a real-time report witha timestamp. Norton 360 does not generate this reportautomatically. You need to use the Run DiagnosticReport option and manually generate the report.
You can save, email, or print the report when neededfor review.
To run Diagnostic Report
1 In the Norton 360 main window, move the mousepointer over PC Tuneup, and then click RunDiagnostic Report.
2 When the activity is complete, view the details inDiagnostic Report window, and then click Close.
Keeping your PC tuned upRunning Registry Cleanup
368
About Startup ManagerSome programs are configured to launch during startupof your computer. The number of startup itemsincreases as you install new applications, and the timethat is required to start your computer increases as aresult. Norton 360 Startup Manager helps to managethe startup items on your computer. For any startupprogram that the Startup Manager lists, you can viewthe detailed information such as Community Usageand Resource Usage. You can also click the applicationname and view the File Insight details. These detailswould help you determine whether or not to enable anapplication during startup.
Startup Manager lets you view the list of programs thatare included to the startup items. Based on yourpriority, you can configure Startup Manager to run ornot run these programs when your computer starts.You can also choose to delay the start of the programsand run them manually from the Startup Manager.This way, you can enhance the performance of yourcomputer.
You can disable a program and measure theperformance of your computer the next time you startyour computer at startup.
Disabling or enabling startup itemsWhenever you start your computer, there are someprograms that automatically start and run in parallel.These programs are called startup items. The startupitems increase the start time of your computer.
Startup Manager helps you manage the startup itemsof your computer efficiently. If you do not want aprogram to automatically start when you turn on yourcomputer, you can disable the program in the StartupManager. You can also delay a startup item that youwant to start at a later time.
369Keeping your PC tuned upAbout Startup Manager
To disable startup items
1 In the Norton 360 main window, move the mousepointer over PC Tuneup, and click Run StartupManager.
2 In the On/Off column, uncheck a program that youdo not want to automatically start when you turnon your computer.
3 Click Apply to save the changes.
4 Click Close.
To enable startup items
1 In the Norton 360 main window, move the mousepointer over PC Tuneup, and click Run StartupManager.
2 In the On/Off column, check a program that youwant to automatically start when you turn on yourcomputer.
3 Click Apply to save the changes.
4 Click Close.
Delaying and running delayed startup itemsNorton 360 Startup Manager monitors and lists theprograms that automatically start when you turn onyour computer. To reduce the start time of yourcomputer and improve the performance, you can delaythe start of some of the programs when you turn onyour computer.
To delay startup items
1 In the Norton 360 main window, move the mousepointer over PCTuneup, and then click RunStartupManager.
2 In the Delay Start column, check a program thatyou want to delay.
3 Click Apply to save the changes.
4 Click Close.
Keeping your PC tuned upAbout Startup Manager
370
To run delayed startup items manually
1 In the Norton 360 main window, move the mousepointer over PCTuneup, and then click RunStartupManager.
2 In the StartupManager window, click RunDelayedItems Now.
3 Wait for the program to start, and then in theStartup Manager window, click Close.
371Keeping your PC tuned upAbout Startup Manager
Keeping your PC tuned upAbout Startup Manager
372
This chapter includes the following topics:
1 About Norton Backup and Restore
1 About backups
1 About Backup preparation
1 About backup set
1 Backing up your files
1 Restoring files
1 About Norton Backup Drive
1 About solutions to the backup problems
1 About online backup considerations
1 Turning off or turning on backup
1 Turning off or turning on backup setting options
About Norton Backup and RestoreThe Norton Backup and Restore feature protects yourimportant data and media files by regularly backingup the files. If something catastrophic happens to yourPC, you can restore your valuable information fromthe backups that Norton 360 has made.
12Protecting yourmedia and data
About backupsOne of the most important ways to protect the valuableinformation on your PC is to back up your filesregularly. In case you lose your data, Norton 360 letsyou restore them later. For example, you accidentallyerase an important file or your PC has a hardwaremalfunction that destroys some files. In this case, youcan restore your lost files from your backup.
You can also use backup to keep your PC's permanentdisk from becoming filled with old and seldom-usedfiles. After you have backed up such files, you canremove them from your PC and restore them later ifyou need to use them again.
Norton 360 lets you to conveniently back up your filesto any media that Windows recognizes as a storagedrive. The backup destination may include externaldrive, network storage folders, CD, DVD, Blu-ray disc,iPod, flash drive, cameras, smart-phones, or a host ofother devices.
For any file that you have backed up, Norton 360 letsyou view the status through the icon overlays and theBackup tab in Properties page. The icon overlays ona file show the backup status of your protected files.You can view details such as the last backup time ofeach backup set in the Backup tab of the file Propertiespage. You can turn off these options if you do not wantto view these icon overlays and the Backup details.
Norton 360 also provides a safe and a private onlinestorage environment to which you can back up yourfiles. The online storage location is different from thelocation where you normally store files in your PC.Disasters that damage or destroy your PC cannot harmyour backups because they are stored in a differentlocation. In addition, when you use the Norton 360online backup, you can restore your files from anycomputer at any time. Norton 360 must be installed inthe PC to access your Norton Account.
Protecting your media and dataAbout backups
374
No matter which backup method you choose, you canalways add or remove items from the set of files thatyou select to back up. You can add or remove anindividual file from the backup sets by using theshortcut menu that appears when you right-click a file.
About Backup preparationAfter you install Norton 360, you must configureNorton 360 backup to back up your important files onyour computer. You can back up your important fileswith Norton 360 either automatically or at a time thatyou specify. You can always change the backup settingsyou initially make.
Choose the following settings when you make a backup:
You can perform the varioustasks that are related to thebackup sets such as creating,deleting, and renamingbackup sets.
You can also preview thedetails that are related to anyparticular backup set such asthe size and the availablefiles.
Summary
375Protecting your media and dataAbout Backup preparation
You can choose from a varietyof file types, such as photos,documents, and music. Youcan also specify individualfiles.
You have the followingoptions:1 Backup Sources
Lets you select a sourcefrom which you want toback up your files
Norton Backup iscomprehensive or shortdepending on thelocations that you select.
1 File Types
Lets you include orexclude a backup filecategory
You can add a file or afolder to the backup orexclude a file or a folderfrom the backup. You canalso use Add or excludefiles and folders optionto view the added andexcluded files and folders.In addition, you can usethe Edit file types optionto edit file extensionswithin each file category.When you check Edit filetypes, you can add, edit,or remove the fileextensions in eachBackup category by usingthe Configure option.
What
Protecting your media and dataAbout Backup preparation
376
You can choose any storagelocation that Norton 360offers for your backuplocation, depending on yourPC and the connecteddevices.
You can choose to store yourbackups on external media,such as CD, DVD, Blu-raydisc, or iPod. You can alsostore your backups on anetwork drive, removableflash memory drive, orpermanent disk in your PC.
w Backing up your files toa location where your sourcefiles are available is not safe.You may lose your dataduring hardwaremalfunctions.
You can delete the previouslybacked-up files. You can alsodecide if you want to verifyyour backups by checking theVerify all backups option.
Norton 360 also provides asecure online backup servicethat you can use to store yourbacked-up files in a safelocation on the Internet. Thisservice protects yourinformation even ifsomething catastrophichappens to your PC.
Where
377Protecting your media and dataAbout Backup preparation
You can have Norton 360back up your files when yourcomputer is idle. You can alsoset a regular backup scheduleor manually back up yourfiles.
When
The online backup service that is provided with theNorton 360 requires you to create a Norton Accountfirst. When you back up files online, Norton 360requests your Norton Account name and password,which prevents unauthorized access to your backed-upfiles.
Before Norton 360 runs a backup, it examines the fileson your computer so that it can back up your files moreefficiently. During this initial examination, Norton 360counts the number of files that may need to be backedup. Norton 360 also records the types and sizes of thosefiles. This process usually takes no more than a fewminutes the first time you run a backup.
About backup setNorton 360 lets you create multiple sets of backupconfigurations. The configuration is a set of rules andis called a backup set. You can specify the files that youintend to back up, the backup destination, and the timewhen you want to back up your files. You can usemultiple backup sets to back up different combinationsof files or file categories to different locations.
Multiple backup set creation helps you to use yourlimited Secure Online Storage judiciously. For example,you can create a backup set to back up your picturefiles and music files to a CD. You can also createanother backup set to back up your Microsoft Officedocuments and your financial files to your SecureOnline Storage.
You can do the following tasks:
Protecting your media and dataAbout backup set
378
1 You can create multiple backup sets with differentset of rules. For example, you can create a backupset to back up your pictures to your local fixed disk.You can also create another backup set to back upyour videos to a CD. You can configure differentschedules for each backup set.
1 You can modify a backup set to include or excludefiles or file categories or to use another backupdestination to back up your files. You can changethe schedule of a backup set. You can also renamea backup set if the name does not describe thebackup set after you modify the rules.
1 You can delete a backup set if it is no longer needed.You can create a new backup set to start backingup your files from the beginning.
The Summary tab of the ManageBackupSets windowdisplays the set of rules that you have configured foreach backup set. You can select a backup set from theBackupSetName drop-down list to view the rules. Thisway, you can keep a record of the files or file categoriesthat Norton 360 backs up to different destinations. Youcan also modify the rules if required. In addition, youcan view the date and time of the last backup activityfor a backup set.
Creating a new backup setYou can create multiple backup sets with differentconfigurations. For example, you can create a backupset to back up your pictures to your local fixed disk.You can create another backup set to back up yourvideos to a CD. You can also configure differentschedules for each backup set.
When you create a new backup set, Norton 360 appliesthe default configuration for the backup set. You canchange the configuration if the default configurationdoes not meet your needs.
You can identify each backup set with a backup setName. The default name of a backup set is DefaultSet.You can save a backup set with the default name as
379Protecting your media and dataAbout backup set
well. But, whenever you create a new backup set, youmust provide a name for the backup set. The maximumcharacter length of a backup set Name is 32alphanumeric characters. You cannot create more than10 backup sets.
To create a new backup set
1 In the Norton 360 main window, move the mousepointer over Backup, and then click ManageBackupSets.
2 On the Summary tab, under Things you can do,click Create new backup set.
3 In the window that appears, type a name for yourbackup set, and then click OK.
4 On the What tab, under File Types, select a filecategory.
5 In the Manage Backup Sets window, click SaveSettings.
Modifying or renaming a backup setWhen you create a new backup set, Norton 360 appliesthe default configuration for the backup set. You canchange the configuration if the default configurationdoes not meet your needs.
You can modify a backup set to include or exclude filesor file categories or choose another backup destinationto back up your files. You can change the schedule ofa backup set. You can also rename a backup set if thename does not describe the backup set after you modifythe configuration.
w The maximum character length of a backup set Nameis 32 alphanumeric characters.
To modify a backup set
1 In the Norton 360 main window, move the mousepointer over Backup, and click Manage BackupSets.
Protecting your media and dataAbout backup set
380
2 On the Summary tab, in the Backup Set Namedrop-down list, select the backup set that you wantto modify.
3 Under BackupSetSummary, view the details of thebackup set, and do the following:
1 To include or exclude files or file categories in abackup set, click What, and change the settings.
1 To change the backup destination, click Where,and change the settings.
1 To change the backup schedule, click When, andchange the settings.
4 In the Manage Backup Sets window, click SaveSettings.
To rename a backup set
1 In the Norton 360 main window, move the mousepointer over Backup, and click ManageBackupSet.
2 On the Summary tab, in the Backup Set Namedrop-down list, select the backup set that you wantto rename.
3 Under Thingsyoucando, click Renamebackupset.
4 In the window that appears, change the name of thebackup set, and then click OK.
5 In the Manage Backup Sets window, click SaveSettings.
About backup file categories
When Norton 360 performs a backup, it first examinesthe permanent disk of your PC for files to back up andsorts them into various categories. It then backs up thefiles that fall into these categories.
381Protecting your media and dataAbout backup set
Norton 360 uses the following file categories:
This category includes, but isnot limited to: PhotographicJPEG and JIFF images (.jpg,.jpeg, .jpe, .jP2, .j2k, .j2c,.jpf); Graphic InterchangeFormat image files (.gif);Bitmap Graphics files (.bmp,.pct); Tagged Image Formatfiles (.tif, .tiff); AdobePhotoDeluxe images (.pdd);Windows Metafile (.wmf);Portable (Public) NetworkGraphic files (.png);Photoshop files (.psd);Macintosh Quickdraw/PICTDrawing files (.pict);Encapsulated PostScript files(.eps); MS Foxpro Screen files(.sct); Run Length EncodedBitmap files (.rle);Device-Independent BitmapGraphic files (.dib); BorlandJBuilder Project files (.jpx);Japan Picture Format files(.jpc); Image Alchemy HSITemporary Raw Bitmap files(.raw); Pixar Picture files(.pxr); CAD files (.vda); PixarPicture File (.pxr); TARGA File(.tga); Adobe IllustratorVector Graphic (.ai); KodakPhoto CD (.pcd); Kodak RAWBitmap Image (.kdc); AdobeInDesign Document (.indd);Paint Shop Pro Image (.psp);Corel Vector Graphic Drawing(.cdr); and Targa Bitmap files(.icb, .vst).
Pictures
Protecting your media and dataAbout backup set
382
This category includes, but isnot limited to: MPEG AudioStream, Layer III files (.mp3);MPEG-4 Video files (.mp4);MPEG-4 Audio Layer files(.m4a); Apple Protected AACfiles (.m4p); Real NetworksRealMedia Streaming Mediafiles (.ra); RealMediaStreaming Media files (.rm);RealMedia Metafile files(.ram); MIDI files (.rmi); MSWindows Media Audio files(.wma); MPEG-2 AdvancedAudio Coding files (.aac);Monkey's Audio LosslessAudio Compression Formatfiles (.ape); Free LosslessAudio Codec files (.flac);Waveform Audio files (.wav);MP3 Playlist files (.m3u);Musical Instrument DigitalInterface MIDI Sound files(.mid; .midi); Fast Tracker 2Extended Module files (.xm);ScreamTracker v3 Sound files(.s3m); MPEG Audio Stream,Layer I (.mp1); WindowsMedia Player Playlist (.wpl);Playlist (.pls); Audio Codec 3File (.a3c); Audio InterchangeFile Format (.aif, .aifc, .aiff);and MPEG Audio Stream,Layer II (.mp2).
Music
383Protecting your media and dataAbout backup set
This category includes, but isnot limited to: MicrosoftMoney files (.mny, .mn1,.mn2, .mn3, .mn4, .mn5,.mn6, .mn7, .mn8, .mn9,.mn10, .mn11, .mn12, .mn13,.mn14, .mn15, .mbf);TurboTax Tax Return files(.tax); H&R Tax Return files(.t01, .t02, .t03, .t04, .t05,.t06); TaxACT files (.ta0, .ta1,.ta2, .ta3, .ta4, .ta5, .ta8,.ta9); QuickBooks files (.qba,.qbb, .qbi, .qbw, .qbx, .qph,.qdf, .qdb, .qif, .qsd, .qel,.qph, q00, q01, .q02, .q03,.q04, .q05, .Q98); Olicom Faxfiles (.ofx); Quicken Data File(.qdt); Simply Accounting File(.sdb); and Open FinancialConnectivity files (.ofc).
Financial Files
Protecting your media and dataAbout backup set
384
This category includes, but isnot limited to: MicrosoftWindows Media files (.wmv);Apple QuickTime Video Clipfiles (.mov); MPEG 1 SystemStream files (.mpg, .mpeg);Macromedia Flash Formatfiles (.swf); Audio VideoInterleave files (.avi); MSAdvanced Streaming Formatfiles (.asf); Beijer E-Designerfiles (.mpa); MPEG Movie Clipfiles (.mpe); MPEG-4 Videofiles (.m4v); Digital Video File(.dv); Ogg Vorbis CompressedVideo File (.ogm); Open MediaFormat File (.omf) MPEG-1Video File (.m1v); MPEG-2Program Stream Format File(.m2p); MPEG-2 Video OnlyFile (.m2v); QuickTime Movie(.moov); MPEG-1 Video File(.mpv); QuickTime Movie (.qt);VDOScript File (.vdo); andDVD Video Movie File (.vob).
Video
385Protecting your media and dataAbout backup set
This category includes, but isnot limited to: MicrosoftWord documents andtemplates (doc, .dot);Microsoft Excel Worksheetand templates (.xls, .xlt,.xlam); Microsoft PowerPointPresentation and Slideshowfiles (.ppt, .pps); MicrosoftProject files (.mpp); AdobeAcrobat files (.pdf); Text files(.txt); PostScript files (.ps);HyperText Markup Languagefiles (.htm, .html); MicrosoftHTML documents (.mht);WildTangent Branded .PNGfiles (.wpg);Comma-Separated Variablestext files (.csv); andWordPerfect PC Suitedocuments (.wpd).
Office Documents
This category includes, but isnot limited to: MicrosoftOutlook Personal Folder files(.pst); Microsoft ExchangeMail messages (.msg);Microsoft Outlook ExpressE-mail or Windows Mail(.dbx); Netscape Mail E-mailMessage files (.snm); MediaStream Broadcast (.msb);Mailbox Message File (.mbx);Microsoft Outlook RulesWizard File (.rwz); MicrosoftOutlook Express ElectronicMail (.eml); First ReaderSaved Message Folder (.fol);and (.MsMessageStore).
Protecting your media and dataAbout backup set
386
This category includes, but isnot limited to: MicrosoftOutlook Address Book files(.wab); Microsoft PersonalAddress Book files (.pab);Palm Address Book files(.aba); Beijer E-Designer files(.mpa); Palm Date Book files(.tda); vCard files (.vcf);Microsoft Outlook AddressBook (.oab); MicrosoftPhonebook (.pbk); PalmDateBook File (.dba); andSharp Organizer TelephoneBank (.ozp).
Contacts
This category includes, but isnot limited to: InternetLocation files (.url) thatappear on the InternetExplorer Favorites menu.
Internet Favorites
This category includes thefiles that you specifically addto the backup. The categoryalso includes the files thatNorton 360 cannot add to anyof its file categories.
Other File Types
About backup file extensions
A file extension is a string of characters that isappended to the name of a file and is used to identifythe file format. Norton 360 uses the file extension toback up the files that are present on your computerinto different categories. Each backup file categorycontains a list of default file extensions. When you runa backup, Norton 360 identifies the files that are basedon the file extensions and backup file categories. Forexample, if you want to back up the documents with a
387Protecting your media and dataAbout backup set
.fm file extension in the Office Documents category,you can add the .fm file extension to the category.
The Edit file types option on the What tab of theManage Backup Sets window lets you add, edit, orremove file extensions in each backup category. Whenyou check Edit file types, the Configure option thatappears next to each backup category lets you edit fileextensions in that category.
You can use the Edit file types option on the What tabof the ManageBackupSets window to do the following:
1 You can view the file extensions that are alreadylisted in a backup file category.
This option helps to ensure that the list has theextensions of files that you intended to back up.
1 You can add a file extension to the list or edit a fileextension that is present in the list.
This option helps to ensure that the next time whenyou run backup, Norton 360 must back up the fileswith the extensions that you added.
1 You can remove a file extension from the existinglist or a file extension that you added.
This option helps to ensure that Norton 360 doesnot back up the unintended files, the next time yourun backup.
1 You can reset a file category to its default fileextensions.
This option helps to restore the changes you madeto a backup file category.
w The file extensions are independent of a backup set. Ifyou change a file extension in a backup file category,the change applies to all backup sets.
Adding or editing a file extension in a backup filecategory
Each backup file category contains a list of fileextensions. However, you can add a file extension to abackup file category. Norton 360 identifies the files
Protecting your media and dataAbout backup set
388
with the file extension that you added and backs themup to that file category. For example, if you want toback up the documents with a .fm file extension in theOffice Documents category, you can add the .fm fileextension to that category.
You can also edit an existing file extension or a fileextension that you added.
The maximum character length of a file extension is10 characters.
To add a file extension to a backup file category
1 In the Norton 360 main window, move the mousepointer over Backup, and click Manage BackupSets.
2 On the What tab, next to FileTypes, check Edit filetypes.
3 Under File Types, next to a file category, clickConfigure.
4 In the window that appears, click Add New.
5 Type the file extension that you want to add.
6 Click OK.
7 Click Save.
To edit a file extension in a backup file category
1 In the Norton 360 main window, move the mousepointer over Backup, and click Manage BackupSets.
2 On the What tab, next to FileTypes, check Edit filetypes.
3 Under File Types, next to a file category, clickConfigure.
4 In the window that appears, select the file extensionthat you want to edit, and then click Edit.
5 Edit the file extension.
6 Click OK.
7 Click Save.
389Protecting your media and dataAbout backup set
Removing a file extension fromabackup category
Each backup file category contains a list of fileextensions. However, you can remove a default fileextension or a file extension that you added to a backupfile category. Norton 360 identifies the files with thefile extension that you removed and does not back themup the next time that you run backup. For example,you do not want to back up the documents with a .rtffile extension in the Office Documents category. Inthis case, you can remove the .rtf file extension fromthat category.
To remove a file extension from a backup category
1 In the Norton 360 main window, move the mousepointer over Backup, and then click ManageBackupSets.
2 On the What tab, next to FileTypes, check Edit filetypes.
3 Under File Types, next to a file category, clickConfigure.
4 In the window that appears, select the file extension,and then click Remove.
5 Click Save.
Resetting a backup category to default fileextensions
You can reset a file category to its default list of fileextension. When you reset a file category, Norton 360restores the default file extension that you removedpreviously and remove the file extensions that youadded.
To reset a backup category to default file extensions
1 In the Norton 360 main window, move the mousepointer over Backup, and then click ManageBackupSets.
2 On the What tab, next to File Types, check Edit filetypes.
Protecting your media and dataAbout backup set
390
3 Under File Types, next to a file category, clickConfigure.
4 In the window that appears, click Reset Defaults.
5 Click Save.
Deleting previously backed up files
You can delete the files that you backed up previouslyfrom your backup location. You can also delete the filesif the files are no longer useful for you and you have alimited space on your backup location. You can alsodelete backed up files if you changed the file categoryfor a backup set. You may want to delete previouslybacked up files before you run a backup.
You can also uncheck the backup category if you nolonger want to back up the files that you deleted.
Deleting previously backed up files is particularlyhelpful if you want to free some space on your SecureOnline Storage.
To delete previously backed up files
1 In the Norton 360 main window, move the mousepointer over Backup, and then click ManageBackupSets.
2 On the Where tab, click Delete backed up files.
3 In the window that appears, in the drop-down list,select the backup set from which you want to deletethe previously backed up files.This window appears when you have more than onebackup set.
4 Click OK.
5 In the window that appears, in the left pane, clickthe folder that contains the file or folder.
6 In the right pane, uncheck the file or folder that youwant to exclude.You can check Backup Item to select all files thatare listed under Backup Item.
7 Click Delete Selected.
8 In the confirmation dialog box, click Yes.
391Protecting your media and dataAbout backup set
9 Click Close.
Adding files and folders to a backup set
You are not limited to backing up the files that Norton360 automatically detects and places into its filecategories. You can add files to the set of files to bebacked up, and you can exclude files from being backedup as well.
Norton 360 lets you select a file or folder from yourcomputer that you want to include in your backup. TheAdd or exclude files and folders option on the Whattab in the Manage Backup Sets window provides youthe options to add files and folders to a backup set.
You can also right-click a file or a folder and add it toa backup set using the Norton 360 option on theshortcut menu. The shortcut menu is available afteryou configure your backup and when the ManageBackupSets window and the RestoreFiles window areclosed. When you add a file to the backup set, Norton360 lists the information in the window that appearswhen you click Addorexcludefilesandfolders option.You can view all the files and folders that you addedto the backup.
You can also remove an addition from the list of itemsthat is included or excluded from backup by using theRemove from list option. This option is available inthe window that appears when you click Addorexcludefiles and folders.
To add a file to a backup set
1 In the Norton 360 main window, move the mousepointer over Backup, and click Manage BackupSets.
2 On the What tab, click Add or exclude files andfolders.
3 In the window that appears, click Include File.
4 In the file selection window that appears, navigateto file that you want to add, click to select it, andthen click Open.
Protecting your media and dataAbout backup set
392
5 Click OK.
6 In the Manage Backup Sets window, click SaveSettings to save the settings.
To add a folder to a backup set
1 In the Norton 360 main window, move the mousepointer over Backup, and click Manage BackupSets.
2 On the What tab, click Add or exclude files andfolders.
3 In the window that appears, click Include Folder.
4 In the folder selection window that appears,navigate to the folder that you want to add, and thenclick OK.
5 Click OK.
6 In the Manage Backup Sets window, click SaveSettings to save the settings.
To add a file or folder to a backup set in WindowsExplorer
1 In Windows Explorer, right-click the file or folder,select Norton 360 > Add to Backup.The Add to Backup option in the shortcut menu isenabled only after you configure your backup andwhen the ManageBackupSets window and RestoreFiles window are closed.
2 Click the backup set to which you want to add thefile or the folder.
Excluding files and folders from a backup set
Norton 360 lets you exclude backing up the files thatNorton 360 automatically detects and places into itsfile categories or a complete file category. The Add orexcludefilesandfolders option on the What tab in theManageBackupSets window provides you the optionsto exclude files and folders to a backup set.
You can exclude a file or folder from the backup setfrom Windows Explorer by using the shortcut menu.The shortcut menu is available after you configure your
393Protecting your media and dataAbout backup set
backup and when the Manage Backup Sets windowand the Restore Files window are closed. When youexclude a file from the backup set, Norton 360 lists theinformation in the window that appears when you clickAdd or exclude files and folders option. You can viewall the files that you excluded from the backup.
You can also remove an exclusion from the list of itemsthat is included or excluded from backup by using theRemove from list option. This option is available inthe window that appears when you click Addorexcludefiles and folders.
To exclude a file from a backup set
1 In the Norton 360 main window, move the mousepointer over Backup, and click Manage BackupSets.
2 On the What tab, click Add or exclude files andfolders.
3 In the window that appears, click Exclude File.
4 In the file selection window that appears, navigateto the file that you want to exclude, and then clickOpen.
5 Click OK.
6 In the Manage Backup Sets window, click SaveSettings to save the settings.
To exclude a folder from a backup set
1 In the Norton 360 main window, move the mousepointer over Backup, and click Manage BackupSets.
2 On the What tab, click Add or exclude files andfolders.
3 In the window that appears, click Exclude Folder.
4 In the folder selection window that appears,navigate to the folder that you want to exclude, andthen click OK.
5 Click OK.
6 In the Manage Backup Sets window, click SaveSettings to save the settings.
Protecting your media and dataAbout backup set
394
To exclude a file or folder fromabackup set inWindowsExplorer
1 In Windows Explorer, right-click the file, clickNorton 360 > Exclude from Backup.The Exclude from Backup option in the shortcutmenu is enabled only after you configure yourbackup and when the ManageBackupSets and theRestore Files windows are closed.
2 Click the backup set from which you want to excludethe file or the folder.
About backup locations
Norton 360 can back up your files to several kinds ofstorage locations. The speed, safety, and quantity ofyour backup depend on the choice of your location. Noone backup location is the best in all situations and forall users.
You can choose any storage location that Norton 360offers for your backup location, depending on your PCand the connected devices. Use the information in the
395Protecting your media and dataAbout backup set
following table to choose a location that best meetsyour needs for safety, speed, and storage capacity:
Secure Online Storage
Protecting your media and dataAbout backup set
396
Your subscription to Norton 360comes with an allocation ofstorage space on a secure serverthat is located on the Internet.This location is the safest, mostsecure backup choice availablebecause it stores yourinformation in a remote location.As a consequence, even thedisasters that might damage ordestroy your PC cannot affectyour backups. Online backupscan take place automatically, aslong as your PC has an activeInternet connection. However,you require a reasonably fastInternet connection.
You can configure the Internetbandwidth that backup uses toback up your files usingBandwidth Throttle on theWhere tab of the ManageBackup Sets window.
You can alter the followingbandwidth throttle states:1 Fastest (recommended)
1 High usage
1 Moderate usage
1 Low usage
Using Secure Online Storage forbackups is a good choice if yourbackup can fit within yourstorage allocation. Secure OnlineStorage is also helpful if youwant the convenience ofautomatic backups, or you wantthe security that an off-sitebackup location provides.However, you can buy moreonline storage space, if required.
397Protecting your media and dataAbout backup set
This choice backs your files upto a special folder on drive C ofyour PC. Backing up to drive C isvery quick and convenient, andis only limited to the amount offree space available on yourdrive. You can run automaticbackups with this choice.
Backing up to drive C is aconvenient but an unsafe backupmethod. Any mechanicalproblem that the drive mightexperience can damage bothyour original files and yourbackups.
If you use drive C for quick andautomatic backups, you mustback up your files occasionallyto a different drive or anotherlocation.
C: (Local Fixed Disk)
This choice provides for fast,convenient backups. You can runautomatic backups and alwayshave access to your backed upfiles as long as the drive isconnected to your PC.
Although using another drive issafer than using drive C, doingso still leaves your data at riskfrom any PC hardwaremalfunctions.
If you choose to back up toanother drive, you should alsoback up your files occasionallyto some other location.
Other internal or externaldrive
Protecting your media and dataAbout backup set
398
This choice requires that youhave recordable CDs, DVDs, orBlu-ray discs and an optical drivein your PC to record on thosediscs. You must be present toinsert and remove discs whenrequested. Therefore, you cannotselect automatic scheduling ofbackups when you back up toCDs, DVDs, or Blu-ray discs.
Backing up to CDs, DVDs, orBlu-ray discs is slower thanbacking up to other media.Backing up to CDs, DVDs, orBlu-ray discs is also lessconvenient because you must bepresent during the backup.
By using Norton 360, you canback up your data to any of thefollowing optical media types ifyour optical drive supports them:1 CD-R
1 CD-RW
1 DVD+R
1 DVD-R
1 DVD+R DL
1 DVD-R DL
1 DVD+RW
1 DVD-RW
1 DVD RAM
1 BD-R
1 BD-RE
You should store your backupdiscs in a safe place elsewhereto provide protection against adisaster that occurs at yourcomputer's location.
CD, DVD, or Blu-ray discs
399Protecting your media and dataAbout backup set
You can use this choice if yourPC is connected to a localnetwork that offers a storagelocation to which you haveaccess. Depending on the speedof your network, this choice canbe almost as fast as backing upto an internal drive or externaldrive.
This choice does not appear ifyour PC is not connected to anetwork that offers a storagedevice to which you have access.
To back up your data to anexternal network drive, you mustmap the external network driveto your computer. When you mapa drive, you must also specify adrive letter for the connection.
Network drive
Flash drives and the other datastorage devices that areattached to your PC can alsoserve as backup locations.Norton 360 displays suchdevices as external disk drives.If such a device is alwaysattached to your PC, you can useit for automatic backups.
The amount of storage spacethat is available on these devicescan be less than on hard disks.If you use a flash drive forbackups, you should also backup your files occasionally toanother storage location.
Flash drive andremovable storagedevices, including iPod
Protecting your media and dataAbout backup set
400
Choosing a backup location
Norton 360 provides several kinds of storage locationsfor backups. You can choose a different location if yourbackup needs change or if you want to store yourbackups in several locations for added security.
When you select Secure Online Storage as the backuplocation, Norton 360 prompts you to register to yourNorton Account. You must be connected to the Internetto register to your Norton Account.
w You must activate your Norton 360 with a valid licensekey to use the online storage space.
To choose a backup location
1 Make sure that the device to which you want to backup your data is connected to your PC and turned on.
2 In the Norton 360 main window, move the mousepointer over Backup, and click Manage BackupSets.
3 On the Where tab, select the location and devicewhere you want your backups to be stored.If the device or location does not appear on the list,click Refresh.
4 Click Save Settings.
Viewing or changing a backup schedule
Norton 360 lets you schedule backups when it isconvenient for you. You can schedule your backups torun late at night or whenever you know that your PCis not needed for any other activity.
401Protecting your media and dataAbout backup set
You have the following backup schedule choices:
Choose this option to back upyour PC when it is turned onbut not otherwise in use. Thischoice is the recommendedchoice for most users. Norton360 checks your computer tobe idle every four hours torun an automatic backup.Note that the backup locationmust be available at the timethat the automatic backuptakes place.
w You cannot back upyour data to a CD or DVD ifyou select this option.
Automatic (Recommended)
Choose this option to pickone or more days of the week,and the time of day, for yourbackups to occur.
Weekly
Choose a day of the month,and the time of day, for yourbackups to occur. You canchoose any day of the monthbetween 1 and 30, as well asa special choice, Last. Sincenot all months have 31 days,choosing Last performs thebackup on the last day of themonth, irrespective of thenumber of days.
Monthly
Choose this option to haveNorton 360 back up your filesonly when you start thebackup yourself.
Manual Backup
Protecting your media and dataAbout backup set
402
Your computer's performance is maximized if youschedule to perform your critical operations when yourcomputer is idle. When you schedule backup weeklyor monthly and check the Runonlyatidletime option,Norton 360 backs up your files when your computer isidle. Symantec recommends you to check the Runonlyat idle time option to experience better performanceof your computer.
To view or change a backup schedule
1 In the Norton 360 main window, move the mousepointer over Backup, and then click ManageBackupSets.
2 On the When tab, select an option in the Scheduledrop-down list.
3 Click Save Settings.
Deleting a backup setYou can delete a backup set if it is no longer needed.You cannot delete a backup set if only one backup setis available. However, you can create a new backup setbefore you delete the old backup set.
When a backup set is deleted, the Backup details of thefiles that are included in that backup set also change.For example, the icon overlays and the Backup tab inthe file properties of the file no longer appear.
To delete a backup set
1 In the Norton 360 main window, move the mousepointer over Backup, and then click ManageBackupSets.
2 On the Summary tab, in the Backup Set Namedrop-down list, select the backup set that you wantto delete.
3 Under Things you cando, click Delete this backupset.
4 In the confirmation dialog box, click Yes.
403Protecting your media and dataAbout backup set
Backing up your filesAfter you provide Norton 360 with your preferredbackup settings, running a backup is very easy. In fact,if you scheduled all backup sets to run backupsautomatically, you do not need to do anything at all.Norton 360 performs automatic backups for all backupsets when your PC is turned on but not engaged inperforming any other tasks. However, Norton 360 doesnot back up your files automatically if the backupdestination is a CD, DVD, or Blu-ray disc. Backing upto these destinations needs your intervention.
Whether you have set Norton 360 to back up your PCautomatically or not, you can always run a backup. Forexample, you have added or modified important filesand you want to be sure they are safe. In this case, youcan run a backup manually. You can also run a backupat the end of the day if you do not want to wait for anautomatic backup to occur.
You can view the details of your backup activity underthe backup category in the Security History window.
To back up your files
1 In the Norton 360 main window, move the mousepointer over Backup, and then click Run BackupNow.
2 Follow any instructions for performing the backupthat Norton 360 provides.For example, if you choose to back up your files toCDs, then Norton 360 asks you to insert a recordableCD.
3 In the Activities and Scan Details window, clickClose.
Restoring filesThe reason to have a good backup is to restore yourfiles from the backup if the need arises. Norton 360
Protecting your media and dataBacking up your files
404
provides an easy method to restore your backed-upfiles.
By default, Norton 360 displays the backup location ofthe most recent backup set you ran and the originallocations of the files.
When you restore files, you can change any of thefollowing settings:
You can choose any of thebackup sets to restore thefiles.
If you backed up your data inan external media, you mustconnect it to your computerto restore those files. Norton360 lists all the backup setsthat you ran backup for andthat your PC can currentlydetect.
Restore From
You can restore the backedup files in a backup set thatyou selected. You can use theSearch option to search forfiles by name and add theselected file to restore. Youcan also check the RestoreAll Files and Categoriesoption next to the Filesheading to select all filecategories. In addition, youcan browse for backed upfiles based on file categoriesand folders by using theBrowse for Files and Foldersoption.
You can filter the backed upfiles in a backup set by thebackup file categories.
Files
405Protecting your media and dataRestoring files
You can restore to theoriginal locations of the files,or navigate to a new locationwhere you can restore yourfiles. Norton 360 displays thetotal number of files and thetotal size of the files that youhave selected for restoration.
If files with the same nameare present at the originallocation, the files that yourestore replace those files.
Restore To
w If you backed up files to CDs or DVDs, do not restorefiles by copying them directly to your PC from thebackup disks. When Norton 360 backs files up to CDsor DVDs, it sometimes has to split files between twodiscs. Directly copying a file back from a disc, therefore,may only copy part of the file. Such a file appears tobe damaged when you try to use it. Instead, let Norton360 restore your files for you.
To restore files
1 In the Norton 360 main window, move the mousepointer over Backup, and then click Restore Files.
2 In the Restore Files window, do one or more of thefollowing:
1 Under Restore From, change where to restorefrom.
1 Under Files, specify what to restore.
1 Under Restore To, change where to restore thefiles to.
3 Click Restore Files.
4 Follow the on-screen instructions to finish restoringyour files.
Protecting your media and dataRestoring files
406
Choosing where to restore files fromWhen Norton 360 restores files, it displays the backuplocation of the most recent backup set you ran. Youcan change the location to restore files from a differentbackup location. For example, you have backed up filesto drive C and then later backed up files to CDs. Youcan then choose to restore files from either drive C orfrom the CDs.
To choose where to restore files from
1 In the Norton 360 main window, move the mousepointer over Backup, and click Restore Files.
2 In the Restore Files window, under Restore From,click View All.
3 In the window that appears, click the backup setthat you want to restore, and then click OK.If the backup set is not visible, make sure that themedia in which you had backed up your files isconnected, and click Refresh.If you have activated online backup, the windowalso contains the backup set that contains the filesthat you backed up online from another computer.For example, you can view the backup set containingthe files that you backed up from your homecomputer. However, the other computer must haveNorton 360 registered with the same NortonAccount.
4 Make any other necessary changes to your restoresettings, and click Restore Files.
5 Follow the on-screen instructions to finish restoringyour files.
Selecting files to restoreWhen you restore backed-up files with Norton 360, youmight not need to restore all the files from a backup.You can restore the files that may have been damaged,accidentally erased, or modified incorrectly. Norton360 provides several ways for you to select only thefiles that you need to restore.
407Protecting your media and dataRestoring files
When you click the Browse for Files and Foldersoption, you can view a list of all the backed-up files.You can easily select the files that you want to restoreby checking them. You can filter the files by itscategories available in the left pane in the RestoreFileswindow.
The various options that are available under Categoryin the left pane of the window are:
You can view all the backed-upfiles in a backup set.
All file types
You can view all the filecategories in the left pane thatyou have previously backed up.When you click a file category,you can view all the backed-upfiles of that file category in theright pane.
File Categories
You can view all the backed-upfolders containing files availablein a backup set.
Folders
You can view all the files andfolders that you select to restore.
Selected Files
You can also search for a particular file by using theSearch option. You can exclude each item in the rightpane if you want to exclude it from restoration byunchecking it.
You can use any of the following methods, and you cancombine methods, to select files to restore:
You can restore all thebacked-up files withoutexcluding any file within abackup set.
Restore all files andcategories
Protecting your media and dataRestoring files
408
You can search by file name,or by part of a file name fromthe list of backed up files andrestore them. You can alsouse wildcard characters, suchas asterisks (*) or questionmarks (?) to search file namesor folder names. For example,you can type *.doc to searchall the Microsoft Worddocuments.
Restore files by searching
You can see a list of the filesthat are included in each filecategory, and choose whichof those files to restore.
Restore individual files withina file category
You can select the files and the file categories that youwant to restore in the Restore Files window.
To select all the backed-up files to restore
1 In the Norton 360 main window, move the mousepointer over Backup, and click Restore Files.
2 In the Restore Files window, next to Files, checkRestore All Files and Categories.All of the backed-up files and folders in the backupset get selected for restore.
To select files to restore by searching
1 In the Norton 360 main window, move the mousepointer over Backup, and click Restore Files.
2 Under Files, in the Search text box, type all or partof a file name, or the extension of the file.
3 Click Search.The window that appears displays the file namesthat contain the text that you typed.
4 Check the files that you want to restore, and thenclick OK.
5 Repeat steps 2 through 4 to add more files to thelist of those that Norton 360 restores.
409Protecting your media and dataRestoring files
To select an individual file within a file category torestore
1 In the Norton 360 main window, move the mousepointer over Backup, and click Restore Files.
2 In the Restore Files window, under Files, clickBrowse for Files and Folders.
3 In the left pane, under ShowResults for, click a filecategory from which you want to restore files.
4 In the right pane, do one of the following:
1 Check the files that you want to restore.
1 If you want to restore all the files in thatcategory or folder, check the check box in theheader close to Backup Item.
5 Repeat steps 3 through 4 to add more files to thelist of those that Norton 360 restores.You can use the Selected Files option in the leftpane under ShowResultsfor to view all the selectedfiles that you want to restore.
6 Click OK.
Choosing a restore destinationWhen you restore files from a backup, you can choosewhere Norton 360 places the restored files. You canrestore the files to a separate folder of your choice ortheir original location. By default, Norton 360 selectsthe original locations of the files.
w Restoring files to their original locations deletes newerversions of the same files that are stored in thoselocations. If you do not want to replace those files withthe restored files, you must move the newer versionssomewhere else before you restore. You can also restorethem to a different location.
You can change the restore destination from any PCat any time.
Protecting your media and dataRestoring files
410
w Some drives use older Windows file systems, such asFAT-16 or FAT-32, which cannot store files larger than4 GB. For such large files to restore, make sure thatyour restore destination is formatted with a file systemthat supports large files, such as NTFS.
To change a restore destination
1 In the Norton 360 main window, move the mousepointer over Backup, and then click Restore Files.
2 In the RestoreFiles window, under RestoreTo, clickChange.
3 In the window, click New Location.
4 Do one of the following:
1 Type a restore location in the space provided.
1 Click Browse, use the browse window to navigateto the location to which you want to restore files,and then click OK.
5 Make any other necessary changes to your restoresettings, and then click Restore Files.
6 Follow the on-screen instructions to finish restoringyour files.
About Norton 360 Autorun RestoreNorton 360 Autorun Restore helps you restore the filesthat are backed up on an optical disc. You can also usethis feature to restore your backed up files to acomputer that does not have Norton 360 installed.
When you insert an optical disc that contains thebacked-up files, the Autorun Restore featureautomatically opens the Portable Restore window.
w If you disable Windows auto-run option, you mustmanually launch the Autorun Restore feature.
The Portable Restore window provides you thefollowing information:
1 The name of the backup set
1 The size of the backed-up files
1 The date and time you backed up the files
411Protecting your media and dataRestoring files
You can select the files that you want to restore. Youcan restore the files to their original location. Bydefault, Autorun restores the files you select toC:\Restored Files\. You can customize the locationwhere you want to restore the selected files.
You can also launch the Norton 360 main window ifNorton 360 version 3.0 or later is installed on yourcomputer. If Norton 360 version 3.0 or later is notinstalled on your computer, Autorun tells you that theproduct is not installed on your computer.
You can also use the following link to obtain moreinformation:
http://www.symantec.com/norton/360
Restoring files by using Norton 360 Autorun Restore
Norton 360 Autorun Restore lets you restore your filesbacked-up on an optical disk. Autorun can restore yourbacked-up files to a computer that does not haveNorton 360 installed on it.
You can restore your backed-up files to their originallocations or custom locations. You can also use theLaunch Norton 360 option in the Portable Restorewindow to open the Norton 360 main window. Norton360 version 3.0 or later must be installed on yourcomputer to open Norton 360.
To restore files using Norton 360 Autorun Restore
1 Insert an optical disc that contains the backed-upfiles.
2 If the Windows autorun option is disabled, doubleclick the ARestore icon to launch the AutorunRestore feature.
3 In the Portable Restore window, click Select Filesto Restore option.
4 In the window that appears, in the left pane, underCategory, click a file category from which you wantto restore files.
Protecting your media and dataRestoring files
412
5 In the right pane, check the files that you want torestore.If you want to restore all the files, click All filetypes, and then check the check box in the headerclose to Backup Item.
6 Under Restore to, click one of the following:
1 Original LocationChoose this option if you want to restore the filesto the original location.
1 Custom LocationChoose this option if you want to restore the filesto a new location. By default, Autorun restoresthe files you select to C:\Restored Files\.
7 Click Restore Selected.
8 Follow the on-screen instructions to finish restoringyour files.
About Norton Backup DriveNorton 360 provides the Norton Backup Drive in yourWindows Explorer after you configure your backup.Norton Backup Drive contains a list of backupdestinations where your files are backed up. Eachbackup destination contains the backup sets to whichthe backup destination is configured.
Norton Backup Drive displays the files that you backedup to a media device. You must connect and turn onthe media device before you view your files.
You can also view the files that you backed up to SecureOnline Storage. You must be connected to the Internetand logged in to Norton Account.
w The Norton Backup Drive appears in Windows Explorerwhen the ManageBackupSets window and the RestoreFiles window are closed. The Norton Backup Drive isaccessible only to system administrator.
You can do the following with Norton Backup Drive:
413Protecting your media and dataAbout Norton Backup Drive
1 View the files that are backed up in different backupdestinations.
To view the files that you backed up to a mediadevice, you must connect the device to yourcomputer.
1 Drag a file from a backup set on the Norton BackupDrive to restore to your computer.
1 Select and delete a file from a backup set on theNorton Backup Drive.
Norton 360 does not back up the file you deletedthe next time you run backup.
1 Open a file to view the content of the file before yourestore or delete it on the Norton Backup Drive.
1 Use the Search command on the Start menu or theSearchToolbar option to locate files in the NortonBackup Drive.
w Norton Backup Drive appears in Windows Exploreronly when the Backup option in the Backup Settingswindow is turned on.
Viewing backup files on the Norton Backup DriveYou can use the Norton Backup Drive to view the filesthat are backed up. You can view the Norton BackupDrive after you configure backup and when the BackupSettings window is closed.
If you backed up your files to a media device, ensurethat the device is connected to your PC and turned on.You can then view the files on the Norton Backup Drive.
If you backed up your files to Secure Online Storage,you must be connected to the Internet. You must alsobe logged in to Norton Account to view the files on theNorton Backup Drive.
To view backup files on the Norton Backup Drive
1 In Windows Explorer, click Norton Backup Drive.
2 Select the backup destination, and navigate to thebackup set that contains the files that you backedup.
Protecting your media and dataAbout Norton Backup Drive
414
Restoring a file from a backup set on the NortonBackup Drive
To restore a file, you can drag it from a backup set onthe Norton Backup Drive to your computer. You canalso click to open and view the contents of the filebefore you restore it.
To restore a file fromabackup set on theNortonBackupDrive
1 In Windows Explorer, click Norton Backup Drive.
2 Select the backup destination, and navigate to thebackup set destination that contains the file thatyou backed up.
3 Do one of the following:
1 Right-click to select the files to restore in NortonBackup Drive, and then click Restore.
The files are restored to the original location byoverwriting the existing files.
1 Drag the file from the backup set to the restoredestination.
Deleting a file from a backup set on the NortonBackup Drive
You can select and delete a file from a backup set onthe Norton Backup Drive. Norton 360 does not back upthe deleted file the next time you run a backup. Youcan also click the file to open and view the file contentbefore you restore it.
To delete a file from a backup set on the Norton BackupDrive
1 In Windows Explorer, click Norton Backup Drive.
2 Select the backup destination, and navigate to thebackup set destination that contains the file thatyou backed up.
415Protecting your media and dataAbout Norton Backup Drive
3 Do one of the following:
1 Right-click to select the files to delete, and thenclick Delete.
1 Select the file, and then press Delete.
About solutions to the backup problemsThe following table provides some tips to help youavoid backup problems.
The following tips apply to allbackups:1 Perform backups
regularly. The more oftenyou back up, the lesschance there is that youcan lose importantinformation.Anautomaticbackup schedule isrecommended, since thattends to back up thosefiles that have mostrecently changed. Ascheduled weekly backupis a good second choice.
1 If you use automaticbackups, leave your PCturned on when not inuse. Automatic backupstake place when your PCis turned on but not inuse.
1 Regularly check thebackup results thatNorton 360 provides toensure that all of the filesthat should be backed upare backed up.
All backups
Protecting your media and dataAbout solutions to the backup problems
416
The following tips apply tobackups to CDs or DVDs:1 Have extra discs on hand
when you back up. Thistip helps you to avoidoccasional disc flaws orsituations where theamount of backed up datais more than youanticipated.
1 Label your backup discswith the complete details,so that you can find theright disc when you needto restore files.
1 Do not copy files directlyfrom the backup discs toyour PC. You mayinadvertently copy onlypart. Instead, use theNorton 360 restorefeature or use the Norton360 Autorun Restorefeature.
Backing up to CDs or DVDs
417Protecting your media and dataAbout solutions to the backup problems
The following tips apply tobackups to external drives:1 Some drives use older
Windows file systems,such as FAT-16 or FAT-32that cannot store fileslarger than 4 GB. For suchlarge files to back up,ensure that your backupdrive is formatted with afile system that supportslarge files, such as NTFS.
1 If you use automatic orscheduled backups, makesure that the externaldrives are connected andturned on.
1 To avoid accidentallycorrupting your backedup files, do not use abackup drive for purposesother than for backing up.
Backing up to external drives,including flash drives
Protecting your media and dataAbout solutions to the backup problems
418
The following tips apply tobackups to online storage:1 Make sure that your PC
does not automaticallydisconnect from theInternet when it is not inuse.
1 Regularly check theamount of space that youhave left in your SecureOnline Storage, andconsider purchasing morestorage space before youneed it.
1 Online backups work bestwith a fast Internetconnection. If yourbackups take too long,consider backing up onlythe files that you regularlywork. Then periodicallyback up to CDs, DVDs,Blu-ray discs, or externaldrives to back up yourlarger, seldom-used files.
1 If you back up more thanone PC to your onlinestorage, give each PC adifferent nickname.Giving a differentnickname to each PChelps you identify the PCand the backups thatcorresponds to each PC.
Backing up to your SecureOnline Storage
Getting additional help with backup problemsIf you run into problems with your Symantec productthat you cannot solve, or have questions about theproduct, additional help is available.
419Protecting your media and dataAbout solutions to the backup problems
To get additional help with backup problems
1 In the Norton 360 main window, click Support, andthen click Get Support.
2 In the OneClickSupport window, choose one of thefollowing:
1 Click BeginSupportSession to have Norton 360attempt to diagnose and repair the problem. Youmay also be put in touch with an online supporttechnician to help you if you choose that option.
1 Click Support Web Site to launch the supportWeb site and search the Symantec KnowledgeBase for solutions to your problem.
About online backup considerationsNorton 360 provides you with secure backup storagespace on a server that is accessible to your PC throughits Internet connection. When your backup location isdistant from your PC, your data is safe from localdisasters, such as a fire, flood, or earthquake.
Protecting your media and dataAbout online backup considerations
420
Although online backup is convenient and safe, beforechoosing it for your backup method, consider thefollowing limitations:
Speed limitations
421Protecting your media and dataAbout online backup considerations
The amount of time that it takesto transfer your backup to theSecure Online Storage dependson the speed of your Internetconnection. If you have manyfiles to back up, the first backupcan take hours or days,depending on the speed of yourInternet connection.
You can configure the Internetbandwidth that backup uses toback up your files using theBandwidth Throttle option. Thisoption is available on theWheretab of the Manage Backup Setswindow.
You can alter the followingbandwidth throttle states:1 Fastest (recommended)
1 High usage
1 Moderate usage
1 Low usage
Furthermore, many home andsmall business Internetconnections are asymmetrical,meaning that their uploadspeeds are slower than theirdownload speeds. A single largefile, such as a high-qualityphotograph, may take severalminutes or longer to upload toyour Secure Online Storage.
If you have many large files andasymmetrical or slow Internetconnection, consider the use ofone of the other backuplocations that Norton 360provides. You can then use yourSecure Online Storage to back
Protecting your media and dataAbout online backup considerations
422
up your smaller files, such asyour financial documents andword-processing documents.
If a backup is in progress, youshould leave your PC turned on,so that the backup can finish.However, if a backup isinterrupted, then the next timeit starts, it resumes where it leftoff and continues until itfinishes.
Norton 360 provides sufficientonline storage to handle manyof your backup needs, and youcan purchase more storage whenyou need it. Nonetheless, theamount of space in your SecureOnline Storage is much smallerthan the typical permanent diskthat most recent PCs have.Online backups are ideal for thefiles that you regularly work on.You can back up large files andthe files that seldom change toa different location.
In addition, you shouldperiodically look over the filesthat you have in your SecureOnline Storage. Eliminate thosefiles that you no longer need, tomake additional storage spaceavailable.
Storage limitations
About online backup activationNorton 360 uses your Norton Account to keep track ofthe following:
1 The PCs that you back up to online storage
423Protecting your media and dataAbout online backup considerations
1 The amount of online storage space that is availableto you
Your product needs to be activated to use the onlinebackup feature. The first time you configure onlinebackup, Norton 360 connects to your Norton Accountand requests that you sign in to the account. You mayhave established a Norton Account when you installedNorton 360 or when you installed another Nortonproduct.
To sign in to your Norton Account, you use the emailaddress and the password that you supplied when youcreated your Norton Account. You only need to sign into your Norton Account the first time that youconfigure online backup. Norton 360 retains youraccount information so you do not have to sign in again.If you do not have a Norton Account when youconfigure online backup for the first time, Norton 360lets you create one.
You can share the online storage space that is allocatedfor your Norton Account among your computers. Forexample, you have two computers having Norton 360installed on it and registered with the same NortonAccount. 2 GB of online storage space is allocated foryour Norton Account. You can share the storage spaceamong your two computers. You use 1 GB of onlinestorage space for your first computer. When youactivate the online storage for your second computerusing the same Norton Account, that computer can usethe remaining 1 GB of space.
Purchasing more online storage spaceYour Norton 360 subscription comes with an allotmentof secure online storage space. When Norton 360performs an online backup, it calculates the amountof space that it needs for the backup. If your onlinestorage does not contain sufficient space for thebackup, Norton 360 notifies you and provides you anoption to buy more space.
Protecting your media and dataAbout online backup considerations
424
You do not have to wait until Norton 360 tells you thatyou need more online storage space. You can purchaseadditional space at any time.
You must be connected to the Internet to purchasemore online storage space.
It can take about 30 seconds for the status on the MyAccount page to display the amount of space that youpurchased.
To purchase additional online storage space whenbacking up
1 When Norton 360 notifies you that it needs moreonline storage space, click Buy More Storage.Your Web browser opens to a secure page, on whichyou can purchase additional online storage space.
2 Follow the instructions on the secure Web page topurchase additional online storage space.
To purchase additional online storage space at othertimes
1 In the Norton 360 main window, move the mousepointer over Backup, and click Buy More Storage.Your Web browser opens to a secure page, on whichyou can purchase additional online storage space.
2 Follow the instructions on the Web page to purchaseadditional online storage space.
Turning off or turning on backupWhen the Backup option is turned on, Norton 360automatically backs up your files when your computeris idle. However, if you want to temporarily disablebackup, you can turn it off from within the program.
When you turn off backup, the backup status in theNorton 360 main window changes from Protected toDisabled. In the Disabled state, Norton 360 disablesall automatic backup of files. You can use the RunBackupNow option in the main window if you want toback up your files from all the backup sets.
425Protecting your media and dataTurning off or turning on backup
You can turn off or turn on backup from the Settingswindow, BackupSettings window, or from the BackupDetails window.
To turn off or turn on backup from the Settings window
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Quick Controls, doone of the following:
1 To turn off backup, uncheck Backup.
1 To turn on backup, check Backup.
To turn off or turn on backup from the Backup Settingswindow
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Backup Settings.
3 In the Settings window for backup settings, do oneof the following:
1 To turn off backup, move the On/Off switch tothe right to the Off position.
1 To turn on backup, move the On/Off switch tothe left to the On position.
4 In the Settings window, click Apply.
To turn off or turn on backup from the Backup Detailswindow
1 In the Norton 360 main window, move the mousepointer over Backup, and click View Details.
2 In the Backup Details window, under Things YouCan Do, do one of the following:
1 To turn off backup, click Turn Off Backup.
1 To turn on backup, click Turn On Backup.
Protecting your media and dataTurning off or turning on backup
426
Turning off or turning on backup settingoptions
Norton 360 provides you various options to manageyour backup settings. Norton 360 backup settings letyou access the backup details of a particular file bystatus icon overlays without opening the product. Youcan use the icon overlays to view the backup status ofa file or folder. You can also use the Properties pageof a file to know the backup status of your backup sets.
When the Backup Status Overlays option is turnedon, Norton 360 adds a backup status icon to the files,based on the following conditions:
1 The files belong to a backup file category that youincluded in any of the backup sets.
1 The files are located at a source that you includedin any of the backup sets.
The following table lists the backup status overlay iconsfor the files on your computer:
Indicates that the file has beenbacked up
This icon changes to blue iconwith arrows if you modify thefile.
Green icon with a checkmark
Indicates that the file has notbeen backed up
This icon changes to green whenNorton 360 automatically backsup the file during idle time.
Blue icon with arrows
427Protecting your media and dataTurning off or turning on backup setting options
Indicates that the file has beenexcluded from backup
Norton 360 displays a disabledbackup status on a file when youexclude the file from any of thebackup sets.
Gray icon with a slashmark
Norton 360 Backup provides the Norton Backup Drivein your Windows Explorer after you configure yourbackup. Norton Backup Drive contains a list of backupdestinations where your files are backed up.
You can use the ContextMenu option to add or excludea file or a folder to your backup sets when youright-click it. You can use this option after youconfigure Backup in the ManageBackupSets window.
You can use the Property Page option to view moredetails about the backup status icons. When youright-click a file that you backed up and view the FileProperties, you can see its backup details on theBackup tab. The Backup tab lists the state of the filefor each backup set and the last backup time.
You can turn off these options if you do not want tosee the icons and backup statuses.
To turn off backup setting options
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Backup Settings.
Protecting your media and dataTurning off or turning on backup setting options
428
3 In the Settings window for backup settings, do oneof the following:
1 To turn off icon overlays, in the Backup StatusOverlays row, move the On/Off switch to theright to the Off position.
1 To turn off NortonBackupDrive, in the NortonBackup Drive row, move the On/Off switch tothe right to the Off position.
1 To turn off right-click backup menu, in theContext Menu row, move the On/Off switch tothe right to the Off position.
1 To turn off Backup tab in the Properties page,in the Property Page row, move the On/Offswitch to the right to the Off position.
4 In the Settings window, click Apply.
To turn on backup setting options
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Backup Settings.
3 In the Settings window for backup settings, do oneof the following:
1 To turn on icon overlays, in the Backup StatusOverlays row, move the On/Off switch to theleft to the On position.
1 To turn on NortonBackupDrive, in the NortonBackup Drive row, move the On/Off switch tothe left to the On position.
1 To turn on right-click backup menu, in theContext Menu row, move the On/Off switch tothe left to the On position.
1 To turn on Backup tab in the Properties page,in the Property Page row, move the On/Offswitch to the left to the On position.
4 In the Settings window, click Apply.
429Protecting your media and dataTurning off or turning on backup setting options
Protecting your media and dataTurning off or turning on backup setting options
430
This chapter includes the following topics:
1 About Norton 360 Settings
1 Customizing Norton 360 Settings
1 Turning on or turning off Quick Controls services
1 About Antivirus settings
1 About Firewall settings
1 About Norton AntiSpam settings
1 About My Network Settings
1 About backup settings
1 About Identity Protection settings
1 About Task Scheduling settings
1 About Administrative Settings
About Norton 360 SettingsThe Detailed Settings in the Settings window let youadjust protection settings and network settings. Youcan also customize schedules for security scans andbackups.
13Customizingsettings
You can configure the following Detailed Settings inthe Settings window:
Specify how certain types ofviruses and spyware, as well asother threats, are handled inNorton 360.
You can specify whetherincoming emails are checked andinstant messenger is scanned.You can also specify which filesand signatures are excludedfrom scans, and how low-riskthreats are handled. In addition,you can configure Real TimeProtection, Antispyware, andLiveUpdate.
Antivirus
Specify in detail how to handleincoming and outgoingconnections for your PC.
You can specify Traffic rules andrules for specific programs. Youcan also specify how you wantNorton 360 to handle intrusionattempts and browserprotection.
Firewall
Secure your email client fromunwanted online content.
You can configure NortonAntiSpam to define which clientit should integrate with and howit should handle the email thatit scans on those clients. You canspecify if you want NortonAntiSpam to check the Symantecservers to filter the spam emailmessages which the local filtersclassify as legitimate.
AntiSpam
Customizing settingsAbout Norton 360 Settings
432
View all the devices available inyour network and specify thetrust level of the devices that areconnected to your network.
You can hide or show theNetwork Security Overviewwindow at startup and configurethe communication port thatNorton products use tocommunicate with each other.You can also purge the NetworkSecurity Map.
My Network
Lets you download and installNorton Safety Minder andconfigure Norton Online Family.
Norton Online Family is aparental control application thatprovides a smart way to keepyour children safe when they areonline. Norton Safety Minder isan application that needs to beinstalled on each computer thatyour child uses to monitor theInternet activities. You can usethe Parental Controls link tovisit Norton Online Family Webpage to download Norton SafetyMinder. Click Download NortonSafety Minder to downloadNorton Safety Minder. Follow theon-screen instructions tocomplete the installation.
If you have already installedNorton Safety Minder, you canclick Parental Control to openthe Parental Control window.
Parental Controls
433Customizing settingsAbout Norton 360 Settings
Configure Identity Safe to secureyour online identities andtransaction data.
You can also configure SafeSurfing options.
Identity Protection
Specify when and how oftenNorton 360 examines yourcomputer for viruses and otherrisks.
Tasks Scheduling
Use the options in this windowto configure the security of yourproduct.
You can specify your proxysettings in Norton 360. You canalso configure Idle TimeOptimizer, PerformanceMonitoring, and Power SavingMode. In addition, you canconfigure Silent Mode, Idle TimeOut duration, Automatic TasksDelay duration, NortonCommunity Watch, and FirefoxCleanup.
Administrative Settings
Specify the files and folders thatyou want to back up, the backuplocation, and the backupschedule.
You can also turn off or turn onoptions such as Backup StatusOverlays,Norton Backup Drive,Context Menu, and PropertyPage.
Backup Settings
Customizing settingsAbout Norton 360 Settings
434
The Quick Controls in the Settings window let youturn on or turn off the following services:
Turns on or turns off Silent Mode
You can turn on Silent Mode fora period of one hour, two hours,four hours, six hours, or one day.
Silent Mode
Turns on or turns offAntiphishing and Norton SafeWeb features
When you turn on Safe Surfing,it protects your computer whileyou browse with InternetExplorer or Firefox.
Safe Surfing
Turns on or turns off IdentitySafe
When you turn off Identity Safe,Norton 360 no longer lets youmanage your logins, cards, andnotes.
Identity Safe
Turns on or turns off Backup
When you turn on Backup, yourcomputer starts backing up withyour specified settings.
Backup
Turns on or turns off iconoverlays on files
Icon overlays show the backupstatus of your files.
Backup Status Overlays
Turns on or turns off theautomatic updates that guardagainst new and emergingthreats
Automatic LiveUpdate
435Customizing settingsAbout Norton 360 Settings
Turns on or turns off SmartFirewall
When you turn on SmartFirewall, it monitorscommunications between yourcomputer and the othercomputers on the Internet. Italso protects your computerfromcommonsecurity problems.
Smart Firewall
Turns on or turns off NortonTamper Protection
When you turn on NortonTamper Protection, it protectsNorton 360 from attacks ormodifications by unknown,suspicious, or threateningapplications.
Norton TamperProtection
Customizing Norton 360 SettingsThe default Norton 360 settings provide a safe,automatic, and efficient way to protect your computer.However, if you want to change or customize yourprotection settings, you can access most features fromthe Settings window.
You can configure Norton 360 settings in the followingways:
1 You can use the On/Off switch to turn on or turnoff a feature. When you turn off a feature, the colorof the On/Off switch turns red, which indicates thatyour computer is vulnerable to security threats.When you turn on a feature, the color of the On/Offswitch turns green, which indicates that yourcomputer is protected against security threats.
1 You can drag the slider of a protection feature toyour preferred setting. Most often, Norton 360
Customizing settingsCustomizing Norton 360 Settings
436
provides the slider setting for you to decide whetherto resolve security threats automatically or ask youbefore it takes an action.
1 You can configure a protection feature by eitherselecting the options that are provided for theconfiguration or by providing the requiredinformation. Most of these options are available ascheck boxes for you to check or uncheck.
You can also use the DefaultAll option to reset theconfiguration to the default level.
1 You can select a preferred option from thedrop-down list.
1 You can check or uncheck the Quick Controlsoptions to turn on or turn off a feature.
Norton 360 also provides the Use Defaults option inmost of the Settings window. You can use this optionto reset the configuration to the default level.
To customize Norton 360 settings
1 In the Norton 360 main window, click Settings.
2 In the Settings window, click the protection featurethat you want to customize.
3 In the window that appears, set the option to yourpreferred settings.You may need to click a tab to access the settingsthat are listed under that tab.
4 In the Settings window, do one of the following:
1 To save the changes, click Apply.
1 To close the window without saving the changes,click Close.
Turning on or turning off Quick Controlsservices
In the Settings window, you can turn on or turn off thefollowing Quick Controls services:
1 Silent Mode
437Customizing settingsTurning on or turning off Quick Controls services
1 Safe Surfing
1 Identity Safe
1 Backup
1 Backup Status Overlays
1 Automatic LiveUpdate
1 Smart Firewall
1 Norton Tamper Protection
You can move the mouse pointer over a service nameto see a description of that service. You should leaveall of the services turned on except Silent Mode.
To turn on or turn off Quick Controls services
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Quick Controls, doone of the following:
1 To turn on a service, check its check box.
1 To turn off a service, uncheck its check box.
If an alert or a message appears, select theduration from the drop-down menu, and thenclick OK.
About Antivirus settingsNorton 360 always protects you from known virusesand the latest virus outbreak. The Antivirus settingsmonitor your PC for the presence of viruses andspyware, as well as other threats, and eitherquarantines or remove them.
The Antivirus settings protect your computer againstthe security risks that can compromise your personalinformation and privacy. The different type of scans,such as Computer Scans, Email Antivirus Scan, andInstant Messenger scan detects and prevents from anyvirus infection on your computer.
Customizing settingsAbout Antivirus settings
438
The Antivirus settings obtain the latest virusdefinitions through definition updates and keep yourcomputer secure from the latest security threats.
You can use the following Antivirus settings:
The Automatic Protectionsettings let you control thescanning and monitoring of yourcomputer.
It protects your computer bycontinuously checking forviruses and other security risks.Your options are:1 Real Time Protection
You can use the Real TimeProtectionoptions to protectyour computer bycontinuously checking forviruses and other securityrisks.
You can use the Real TimeProtection options to controlthe scanning and monitoringof your computer.
1 Boot Time Protection
You can use the Boot TimeProtection option to providean enhanced security levelfrom the time you start yourcomputer. This optionensures better security byrunning all the necessarycomponents that arerequired for computerprotection as soon as yourestart your computer.
Automatic Protection
439Customizing settingsAbout Antivirus settings
Scans and Risks
Customizing settingsAbout Antivirus settings
440
Scans and Risks settings let youcustomize the scans that Norton360 performs on your computer.
You can use the following Scansand Risks options:1 Computer Scans
Norton 360 lets you rundifferent types of scans todetect and prevent any virusinfection on your computer.
You can use the variousComputer Scans options tocustomize the scans thatNorton 360 performs on yourcomputer. You can alsospecify scanning ofcompressed files andMicrosoft Office documents.
1 Scan Performance Profiles
Scan Performance Profilessettings let you configurehow Norton 360 should scanyour computer based on thedigital signature and trustlevel of the files.
1 Email Antivirus Scan
Email Antivirus Scan protectsyou from the threats that aresent or received in emailattachments.
This option lets you definehow Norton 360 shouldbehave when it scans emailmessages. Based on theoptions you choose, Norton360 automatically scans theemail messages that yousend or receive.
1 Instant Messenger Scan
The Instant Messenger Scan
441Customizing settingsAbout Antivirus settings
option lets you customizescanning of the files that youreceive from instantmessenger programs.
You can select the supportedinstant messenger programsfrom which you may receivefiles. Norton 360 scans thefiles that you receive fromthe selected instantmessenger programs.
1 Exclusions / Low Risks
Exclusions options specifythe items such as folders,files, and drives that youexclude from Norton 360scans. Scans, signatures, andlow-risk items are someitems that you can excludefrom scanning
Exclusions options let youchoose which categories ofrisks you want Norton 360 todetect.w Exclusions reduce yourlevel of protection andshould be used only if youhave a specific need.
Customizing settingsAbout Antivirus settings
442
1 Insight Protection
The Insight Network scanuses the Cloud technologywherein a remote server onthe web contains the latestvirus definitions. Norton 360scans your computer for thelatest security threats. WhenNorton 360 performs theInsight Network scan, it usesthe virus definitions that areavailable locally and in theCloud. Norton 360 providesadditional protection byusing the most recentdefinitions in the Cloud,apart from the definitionsthat are available locally onyour computer.
443Customizing settingsAbout Antivirus settings
Antispyware protects yourcomputer against the securityrisks that can compromise yourpersonal information andprivacy.
Norton 360 protects yourcomputer from vulnerabilitiesthrough the latest definition andprotection updates. Your optionsare:1 Antispyware
Antispyware protects yourcomputer against thesecurity risks that cancompromise your personalinformation and privacy
This option lets you choosewhich categories of risk youwant Norton 360 to detectfor manual, email, andinstant messenger scanning.
1 Updates
Norton 360 protects yourcomputer fromvulnerabilities through thelatest definition andprotection updates.Definition updates containthe information that letsNorton 360 to recognize andalert you to the presence ofa specific virus or securitythreat
You can use the Updatesoptions to obtain the latestvirus definitions throughdefinition updates and keepyour computer secure fromthe latest security threats.
Antispyware andUpdates
Customizing settingsAbout Antivirus settings
444
About Automatic Protection settingsThe Boot Time Protection option on the AutomaticProtection tab provides an enhanced security levelfrom the time you start your computer. This optionensures better security by running all the necessarycomponents that are required for computer protectionas soon as you start your computer.
The Real Time Protection settings on the AutomaticProtection tab let you control the scanning andmonitoring of your computer. It protects your computerby continuously checking for viruses and other securityrisks.
You can use the Real Time Protection options todetermine what gets scanned and what the scan looksfor. It also provides you with advanced protection byproactively detecting unknown security risks on yourcomputer. You can determine what happens when asecurity risk or risk-like activity is encountered.
445Customizing settingsAbout Antivirus settings
You can use the following Real Time Protectionoptions:
Auto-Protect
Customizing settingsAbout Antivirus settings
446
Auto-Protect loads intomemory and providesconstant protection while youwork. It checks for virusesand other security risks everytime that you run programson your computer.
Auto-Protect checks forviruses when you insert anyremovable media, access theInternet, or use the documentfiles that you receive orcreate. It also monitors yourcomputer for any unusualsymptoms thatmight indicatean active threat.
You can stay protected byusing the following options:1 Caching
Improves theperformance of yourcomputer
If you turn on this option,Norton 360 keeps arecord of the files that areaccessed often. Norton360 does not scan thoserecorded files, even whenyou restart yourcomputer.
1 Removable Media Scan
Checks for boot viruseswhen you accessremovable media
After the removablemedia has been scannedfor boot viruses, it is notscanned again until it isreinserted or formatted.If you still suspect that a
447Customizing settingsAbout Antivirus settings
boot virus infects yourremovable media, ensurethat Auto-Protect isturned on to rescan theremovable media. Youthen insert the removablemedia and open it fromMy Computer forAuto-Protect to rescan it.You can also scan itmanually to verify that itis not infected.
Customizing settingsAbout Antivirus settings
448
SONAR Protection
449Customizing settingsAbout Antivirus settings
Symantec Online Network forAdvanced Response (SONAR)provides the real-timeprotection against threatsand proactively detectsunknown security risks onyour computer.
SONAR identifies theemerging threats that arebased on the behavior ofapplications. SONAR isquicker than the traditionalsignature-based threatdetection techniques. It alsodetects and protects yourcomputer against maliciouscode even before virusdefinitions are availablethrough LiveUpdate.
SONAR Protection includesthe following options:1 SONAR Advanced Mode
Norton 360 provides youthe greatest control overlow-certainty threats onlyif this option is turned on.
1 Remove RisksAutomatically
This option lets thelow-certainty threatsbehave as high-certaintythreats when SONARAdvancedMode option isenabled. In this case,Norton 360 automaticallyremoves the threats andnotifies you.
1 Remove Risks if I AmAway
This option lets Norton
Customizing settingsAbout Antivirus settings
450
360 to automaticallyremove low-certaintythreats if it does not getany response from youwhen SONAR AdvancedMode option is enabled.
1 Show SONAR BlockNotifications
This option lets youenable or disable SONARBlock notifications.Norton 360 suppressesthe SONAR Blocknotifications when you setthe Show SONAR BlockNotifications option toLog Only.
About Scans and Risks settingsScans and Risks settings let you customize the scansthat Norton 360 performs on your computer. You canconfigure a Norton 360 scan based on the digitalsignature and trust level of the files on your computer.You can define how Norton 360 should behave whenit scans email messages and customize scanning of thefiles that you receive from instant messenger programs.
451Customizing settingsAbout Antivirus settings
You can use the following Scans and Risks settings:
Computer Scans
Customizing settingsAbout Antivirus settings
452
Norton 360 lets you run differenttypes of scans to detect andprevent any virus infection onyour computer. The scans areQuick Scan, Full System Scan,and Customized Scan. You canuse the various Computer Scansoptions to customize the scansthat Norton 360 performs onyour computer. You can alsospecify scanning of compressedfiles and Microsoft Officedocuments.
The Computer Scans optionsalso let you specify scans todetect rootkits, other stealthitems, tracking cookies, andunknown security threats. Youroptions are:1 Smart Definitions
Lets you install only the CoreSet virus definitions.
You can choose SmartDefinitions to minimizedownload time, installationtime, and memoryconsumption as SmartDefinitions are a subset ofvirus definitions.
1 Compressed Files Scan
Scans and repairs the filesinside compressed files
When you turn on thisfeature, Norton 360 scansand detects viruses andother security risks in thefiles within compressed files.
1 Microsoft Office AutomaticScan
Scans the Microsoft Office
453Customizing settingsAbout Antivirus settings
files when you open them.
If you install Microsoft Office2000 or later after Norton360 is installed, you mustturn on this option to scanMicrosoft Office filesautomatically.
1 Rootkits and Stealth ItemsScan
Scans for rootkits and othersecurity risks that might behidden on your computer.
1 Network Drives Scan
Scans the network drivesthat are connected to yourcomputer.
Norton 360 performs aNetwork Drives Scan duringVirus and Spyware Scanunder Full System Scan andCustomized Scan. By default,the Network Drives Scanoption is turned on. If youturn off this option, Norton360 does not scan networkdrives.
1 Heuristic Protection
Scans your computer toprotect against unknownsecurity threats.
Norton 360 uses heuristictechnology to checksuspicious characteristics ofa file to categorize it asinfected. It compares thecharacteristics of a file to aknown infected file. If the filehas sufficient suspiciouscharacteristics, then Norton360 identifies the file asinfected with a threat.
Customizing settingsAbout Antivirus settings
454
1 Tracking Cookies Scan
Scans for the small files thatprograms might place onyour computer to track yourcomputing activities.
1 Idle Time Scans
Scans your computer whenit is idle.
When your computer is idle,Norton 360 runs a scandepending on the scanhistory of your computer.After the scan is complete,you can view the summary ofthe scan results and takeappropriate action when youstart using your computeragain.
1 Number of Threads forManual Scan
Lets you select the numberof threads that Norton 360uses for manual scanThreads are subsets of aprocess that share theprocess resources butexecute independently ofeach other. Threads help inparallel execution of aprogram to allow theprogram to operate faster ina multiprocessorenvironment.
455Customizing settingsAbout Antivirus settings
The Scan Performance Profilessettings let you configure howNorton 360 should scan yourcomputer based on the digitalsignature and trust level of thefiles.
w You must configure theScan Performance Profilessettings before you run a scanor before a scan is scheduled torun. Norton 360 scans yourcomputer according to theconfiguration you specified inthe Scan Performance Profilessettings.
You can configure the followingScan Performance Profilessettings:1 Full Scan
Configure a complete scan ofyour computer.
1 Standard Trust
Configure a scan thatexcludes the files that areNorton Trusted.
1 High Trust
Configure a scan thatexcludes the Norton andCommunity Trusted files andthe files that have knowndigital signatures.
Scan PerformanceProfiles
Customizing settingsAbout Antivirus settings
456
Email Antivirus Scan protectsyou from the threats that aresent or received in emailattachments.
You can use the Email AntivirusScan options to define howNorton 360 should behave whenit scans email messages. Basedon the options you choose,Norton 360 automatically scansthe email messages that yousend or receive.
Email Antivirus Scan
Instant Messenger Scan optionslet you customize the scanningof the files that you receive frominstant messenger programs.
You can select the supportedinstant messenger programsfrom which you may receive files.Norton 360 scans the files thatyou receive from the selectedinstant messenger programs.
Instant Messenger Scan
457Customizing settingsAbout Antivirus settings
Exclusion / Low Risks
Customizing settingsAbout Antivirus settings
458
Exclusions options specify theitems such as folders, files, anddrives that you exclude fromNorton 360 scans. Scans,signatures, and low-risk itemsare some items that you canexclude from scanning.
Exclusions options also let youchoose which categories of risksyou want Norton 360 to detect.Your options are:1 Low Risks
Lets you manage the low-riskitems that are found in yourcomputer.
You can specify how youwant Norton 360 to respondto low-risk items.
1 Items to Exclude fromScans
Lets you determine whichdisks, folders, or files youwant to exclude from riskscanning.
You can add new exclusionitems or edit the added itemsin the excluded-items list.You can also remove itemsfrom the excluded-items list.
1 Items to Exclude fromAuto-Protect and SONARDetection
Lets you determine whichdisks, folders, or files youwant to exclude fromAuto-Protect scans andSONAR scans.
You can add the new itemsthat need to be excluded ormodify the items that youalready excluded. You can
459Customizing settingsAbout Antivirus settings
also remove items from theexcluded-items list.
1 Signatures to Exclude fromAll Detections
Lets you select known risksby name and remove a riskname from theexcluded-items list
You can also view the riskimpact that is based on theperformance, privacy,removal, and stealth impact.
w Exclusions reduce yourlevel of protection and should beused only if you have a specificneed.
The Insight Network scan usesthe Cloud technology wherein aremote server on the Webcontains the latest virusdefinitions. Norton 360 scansyour computer for the latestsecurity threats. When Norton360 performs the InsightNetwork scan, it uses the virusdefinitions that are availablelocally and in the Cloud. Norton360 provides additionalprotection by using the mostrecent definitions in the Cloud,apart from the definitions thatare available locally on yourcomputer.
Insight Protection
About Antispyware and Updates settingsAntispyware protects your computer against thesecurity risks that can compromise your personalinformation and privacy.
Customizing settingsAbout Antivirus settings
460
Security risks, such as spyware and adware, cancompromise your personal information and privacy.Spyware and adware programs are closely related. Insome cases, their functionalities may overlap; but whilethey both collect information about you, the types ofinformation that they collect can differ.
Norton 360 protects your computer from vulnerabilitiesthrough the latest program updates and definitionupdates. Automatic LiveUpdate and Pulse Updatesobtain the latest virus definitions through definitionupdates and keep your computer secure from the latestsecurity threats.
You can use the following Antispyware and Updatessettings:
Antispyware options let youchoose which categories of riskyou want Norton 360 to detectfor manual, email, and instantmessenger scanning.
Antispyware
461Customizing settingsAbout Antivirus settings
Norton 360 protects yourcomputer from vulnerabilitiesthrough the latest program anddefinition updates. Definitionupdates contain the informationthat lets Norton 360 recognizeand alert you to the presence ofa specific virus or securitythreat. You can use the Updatesoptions to obtain the latest virusdefinitions through definitionupdates and keep your computersecure from the latest securitythreats. Your options are:
1 Automatic LiveUpdate
Automatic LiveUpdateautomatically checks fordefinition updates andprogram updates to yourvirus protection when youare connected to theInternet.
1 Pulse Updates
In addition to the definitionupdates that AutomaticLiveUpdate downloads,Norton 360 uses streamingtechnology to download thelatest virus definitions. Thesedownloads are called PulseUpdates. The Pulse Updatesare lighter and faster, andkeep your computer securefrom the ongoing threats onthe World Wide Web.
Updates
Customizing settingsAbout Antivirus settings
462
About Firewall settingsFirewall settings in Norton 360 check your PC's Internetconnection to protect it from unwanted communicationactivity and Internet intrusions.
The following tabs are available on the Settings windowfor Firewall:
Lets you activate the generalfirewall features andcustomize the ports that yourcomputer uses to access Webpages
The general settings let youcontrol how firewall handlesthe uncommon protocols andthe network traffic to andfrom your computer.According to the generalsettings, the firewall allowsor blocks the incoming or theoutgoing connectionattempts and the sharing ofresources with yourcomputer. You can also usethe general settings to let thefirewall control connectionattempts to or from theblocked and the inactiveports in your computer.
General Settings
Lets you control settings forthe programs that access theInternet
Program Rules
463Customizing settingsAbout Firewall settings
Lets you determine how thefirewall handles incomingandoutgoing networkconnections of various kinds
You can change the settingsto allow or deny specifictypes of connections withyour PC.
Traffic Rules
Prevents intrusion attemptsand protects your Webbrowser from attacks bymalicious Web sites
You can use the DownloadIntelligence option that isavailable on this tab toprotect your computeragainst any unsafe file thatyou download. This featuresupports only downloadsusing the HTTP protocol andInternet Explorer and Firefox3.0 browser.
Intrusion and BrowserProtection
Customizing settingsAbout Firewall settings
464
Lets you activate theadvanced protection featuresof Smart Firewall
The advanced settings let youturn on or turn off theAutomatic Program Controlfeature. Automatic ProgramControl automaticallyconfigures Internet accesssettings for the Web-enabledprograms that you run for thefirst time.
The Automatic Learn IPv6NAT Traversal Traffic optionis available only whenAutomatic Program Controlis turned on. Norton 360provides the Automatic LearnIPv6 NAT Traversal Trafficoption to control the networktraffic that uses Teredo tocommunicate with yourcomputer.
When you turn off AutomaticProgram control, you can turnon Advanced EventsMonitoring. You can use theAdvancedEventsMonitoringoptions to configure theInternet access settings forInternet-enabled programsthe first time that they run.
Advanced Settings
About Firewall General settingsSmart Firewall General settings let you activate thegeneral firewall features and customize the ports that
465Customizing settingsAbout Firewall settings
your computer uses to access Web pages. Your optionsare:
Determines how the SmartFirewall handles uncommonprotocols
Uncommon Protocols
Returns the Smart Firewall to itsdefault state
You can use the Reset option toensure that all recommendedfirewall rules and settings areconfigured.
w If you reset the firewall,you remove any custom rules orsettings that you haveconfigured. Therefore, Norton360 prompts you with aconfirmation dialog box whenyou reset firewall.
Firewall Reset
Ensures that blocked andinactive ports do not respond toconnection attempts
Active ports are prevented fromresponding to connectionattempts that have incorrectsource or destinationinformation.
Stealth Blocked Ports
Customizing settingsAbout Firewall settings
466
Automatically allows the Internettraffic that matches theconnections that an applicationopens
Check this option to do thefollowing:1 Analyze the network traffic
that enters your computer.1 Block the suspicious
applications that try toconnect to your computer.
Stateful Protocol Filter
Allows the computers on thenetwork to share resources suchas files, folders, and printers(that are locally attached)
Automatic File/PrinterSharing Control
Blocks all networkcommunications to and fromyour computer
Block All Network Traffic
About the Intrusion and Browser Protection settingsIntrusion Prevention scans all the network traffic thatenters and exits your computer and compares thisinformation against a set of attack signatures. Attacksignatures contain the information that identifies anattacker's attempt to exploit a known operating systemor program vulnerability. Intrusion Prevention protectsyour computer against most common Internet attacks.
If the information matches an attack signature,Intrusion Prevention automatically discards the packetand breaks the connection with the computer that sentthe data. This action protects your computer from beingaffected in any way.
Intrusion Prevention relies on an extensive list ofattack signatures to detect and block suspiciousnetwork activity. Norton 360 runs LiveUpdateautomatically to keep your list of attack signatures up
467Customizing settingsAbout Firewall settings
to date. If you do not use Automatic LiveUpdate, youshould run LiveUpdate once a week.
Norton 360 also provides the Web Browser Protectionfeature to protect your Web browser from maliciousprograms.
w The Browser Protection feature is available for InternetExplorer 6 or later and Firefox.
With increasing Internet use, your Web browser isprone to attack by malicious Web sites. These Web sitesdetect and exploit the vulnerability of your Webbrowser to download malware programs to your systemwithout your consent or knowledge. These malwareprograms are also called drive-by downloads. Norton360 protects your Web browser against drive-bydownloads from malicious Web sites.
The Intrusion and Browser Protection settings alsoinclude the Download Intelligence option to protectyour computer against any unsafe file that youdownload. Download Intelligence provides informationabout the reputation level of any executable file thatyou download using the Web browser. DownloadIntelligence supports only downloads using the HTTPprotocol, Internet Explorer 6 browser or later, andFirefox 3.0 browser or later. The reputation details thatDownload Intelligence provides indicate whether thedownloaded file is safe to install. You can use thesedetails to decide whether you want to install theexecutable file.
About Advanced SettingsSmart Firewall Advanced settings let you activate theadvanced protection features of Smart Firewall byturning off Automatic Program Control.
Automatic Program Control automatically configuresInternet access settings for the Web-enabled programsthat are run for the first time. The Automatic LearnIPv6 NAT Traversal Traffic option is available onlywhen Automatic Program Control is turned on. You
Customizing settingsAbout Firewall settings
468
can use this option to specify how Norton 360 mustcontrol any network traffic that uses Teredo tocommunicate with your computer.
When you turn off Automatic Program control, youcan turn on Advanced Events Monitoring. You can usethe AdvancedEventsMonitoring options, to configurethe Internet access settings for Internet-enabledprograms the first time that they run. When you turnon the Advanced Events Monitoring feature, you areprompted with numerous firewall alerts. You can allowor deny any of the events that may harm yourcomputer. When the event occurs for the first time, afirewall alert appears and you can allow or block theevent. When you allow the event, the event detailsappear under the relevant category that is available inAdvanced Events Monitoring. The application thattriggers the allowed event is added to the Trusted listof its corresponding category in Advanced EventsMonitoring. You can remove the application from thelist. In this case, firewall alert appears when theapplication triggers the event next time.
The Advanced Events Monitoring settings consist ofthe following categories that provides your computerwith advanced protection:
Monitors themaliciousprogramsthat launch Internet-enabledprograms
Program Component
Monitors themaliciousprogramsthat attach to safe programswithout being detected
Program Launch
Monitors the Trojan horses ormalicious programs that launchtrusted applications in hiddenmode through command-lineparameters
CommandLine Execution
469Customizing settingsAbout Firewall settings
Monitors the Trojan horses ormalicious programs that injectcode into an application'sprocess without triggeringfirewall alerts
Code Injection
Monitors the Trojan horses andother malicious programs thatmanipulate an application'sbehavior to connect to theInternet without triggeringfirewall alerts
Window Messages
Monitors the Trojan horses andother malicious programs thatbypass network traffic
These programs penetrate theWindows TCP/IP layer to sendand receive data withouttriggering firewall alerts.
Direct Network Access
Monitors themaliciousprogramsthat use the documentedinterfaces that the trustedapplications provide to transmitdata outside the networkwithout triggering firewall alerts
Active Desktop Change
Monitors themalicious keyloggerprograms that access personalinformation of a user on aparticular computer bymonitoring their keystrokeactivities
Key Logger Monitor
Monitors themaliciousprogramsthat manipulate an application'sbehavior by instantiatingcontrolled COM objects
COM Control
Customizing settingsAbout Firewall settings
470
About Norton AntiSpam settingsWith the increase in usage of email, many users receivea number of unwanted and unsolicited commercialemail messages that are known as spam. Not only doesspam make it difficult to identify valid email messages,but some spam contains offensive messages andimages.
Norton AntiSpam incorporates several powerfulfeatures to reduce your exposure to unwanted onlinecontent.
Norton AntiSpam settings help you configure thefollowing:
1 The email client with which Norton AntiSpamshould integrate
1 The list of allowed email senders
1 The list of blocked email senders
1 The email addresses and domains that NortonAntiSpam should not import into the list of allowedand blocked email senders
1 The option to send feedback to Symantec aboutmisclassified email
1 The option to filter email messages through WebQuery to maintain high spam detection efficiency
471Customizing settingsAbout Norton AntiSpam settings
You can configure Norton AntiSpam settings on thefollowing tabs:
The options on the Addressestab let you configure the list ofallowed and blocked emailsenders. You can define whetherfeedback about a misclassifiedemail message should be sent toSymantec. You can alsoconfigure the option to filter theemailmessages through theWebQuery filter. In addition, you canconfigure the Address BookExclusions list.
Addresses
The options on the ClientIntegration tab let you integrateNorton AntiSpam with youremail clients to keep you freefrom unsolicited emailmessages. You can also specifywhether or not to display a briefintroduction of Norton AntiSpameach time you start your emailprogram. In addition, you canspecify which address book youwant Norton AntiSpam tointegrate with.
Client Integration
About Addresses settingsThe Addresses tab in the AntiSpam Settings windowprovides options to configure AntiSpam settings.
Customizing settingsAbout Norton AntiSpam settings
472
You can use the following options on the Addressestab:
Lets you exclude the emailaddresses that must not beautomatically added from youraddress book to the Allowed List
Address Book Exclusions
Lets you add specific addressesand domains (for example,@symantec.com) fromwhichyouwant to receive email messages
Allowed List
Lets you add specific addressesand domains from which you donot want to receive emailmessages
Norton AntiSpam marks all emailmessages from these addressesor domains as spam.
Blocked List
Lets you send feedback aboutthe misclassified email messageto Symantec
w The option is available onlywhen Microsoft Outlook orOutlook Express is installed onyour computer.
Feedback
Lets you check the SymantecWeb servers to filter the spamemail messages which the localfilters classify as legitimate
Web Query
About Client Integration settingsThe Client Integration tab in the AntiSpam Settingswindow lists the supported email programs, or clients,
473Customizing settingsAbout Norton AntiSpam settings
that are installed on your computer and theirassociated address books.
You have the following options on the ClientIntegration tab:
Norton 360 supports NortonAntiSpam integration withMicrosoft Outlook and OutlookExpress. In Windows Vista,Norton 360 also supports NortonAntiSpam integration withWindows Mail.
When you turn on an emailclient, Norton AntiSpamintegrates with the email client.
Email Clients
Norton 360 supports NortonAntiSpam integration with theaddress books of email clientsfrom which you want NortonAntiSpam to import emailaddresses.
You can also import into theAllowed List the list of addressesthat are present in an emailprogram. You do not have tointegrate Norton AntiSpam withyour email clients to import theaddresses into the Allowed List.
Address Books
The WelcomeScreen option under the Miscellaneousrow provides a brief introduction of Norton AntiSpameach time you start your email program. You can turnoff the Welcome Screen option if you do not want thewelcome screen to appear.
Customizing settingsAbout Norton AntiSpam settings
474
About My Network SettingsThe Network Security Map settings let you configurethe communication port that Norton products use tocommunicate with each other. You can also specifywhether to display the Network Security Overviewwindow when you open Network Security Map.
You can use the Configure option in the NetworkSecurity Map row to access Network Security Mapwindow. The NetworkSecurityMap window providesa pictorial representation of the devices on the networkto which your computer is connected. You can view thedetails of each device before you set up RemoteMonitoring. The ProductConfiguration panel appearswhen you click the Configure option for the first time.The ProductConfiguration panel helps you install thecomponent that is required to view Network SecurityMap.
You have the following options:
Manages the trust level of the devicesthat you manually add to your homenetwork
Trust Control is a special networkthat lists all the devices that youmanually add to the Network SecurityMap, irrespective of their connectionstatus. You can select the TrustControl network in the NetworkDetails drop-down list to view thedevices that you added. You can alsoreclassify the devices that you addedto the Network Security Map astrusted or restricted. You cannot editthe details of Trust Control network.
Trust Control
475Customizing settingsAbout My Network Settings
Removes all of the devices that arelisted in Network Map
You can purge Network Map if youwant to create a new list of devices.For example, you can purge all of thedevices that were present on yourprevious network before you connectto a new network. Ensure that youdisable Remote Monitoring beforeyou purge the Network Map. Norton360 cannot purge the Network Mapwhen the Remote Monitoring isturned on.
w Norton 360 purges the devicesthat you add manually in the TrustControl network depending upontheir trust level. It does not purge thedevices that have a trust level of FullTrust or Restricted.
Network Map
Customizing settingsAbout My Network Settings
476
Shows the communication port thatNorton products use to communicatewith each other over the network
If you change the communicationport number on your computer, youmust change it on each computerthat is connected to your NetworkSecurity Map. In addition, when youfind more computers that use theRemote Monitoring Setup process,ensure that the same port number isused on every computer.
w Though this communicationport is configurable, Symantecrecommends that you do not changethe port number to avoid potentialconflicts with other well-knownnetworking ports. If you change thecommunication port number, youmust use a port number in the range1-65535.
CommunicationsPort
Displays the Network SecurityOverview window when you openNetwork Security Map
Welcome Screen atStartup
About backup settingsYou can use the backup settings in Norton 360 toconfigure your system backup.
Norton 360 Backup lets you perform the followingtasks:
1 Select the files that are required to be backed up.
1 Choose the location to store the backed up files.
1 Assign a schedule to run a backup.
In addition to the backup tasks, Norton 360 backupsettings let you easily access the backup status of a
477Customizing settingsAbout backup settings
particular file without opening the product. TheBackup Settings window provides you the option toturn off or turn on the Backup.
Under Backup, you have the following options:
Lets you configure what, where,and when to back up yourimportant files
You can use the Configureoption to specify the source,destination, and schedule of thebackup.
Manage Backup
Lets you view the backup statusof a file by adding the statusoverlay to the file’s icon
The status overlays that appearsare:1 Green icon with a check mark
Indicates that the file hasbeen backed up
This icon changes to blueicon with arrows if youmodify the file.
1 Blue icon with arrows
Indicates that the file has notbeen backed up
This icon changes to greenwhen Norton 360automatically backs up thefile during idle time.
1 Gray icon with a slash mark
Indicates that the file hasbeen excluded from backup
Norton 360 displays adisabled backup status on afile when you exclude the filefrom any of the backup sets.
Backup Status Overlays
Customizing settingsAbout backup settings
478
Lets you view the list of backupdestinations where your files arebacked up in the WindowsExplorer
You can also add a file to abackup set and delete a file froma backup set. In addition, youcan restore a file from a backupset on the Norton Backup Driveto your customized location.
Norton Backup Drive
Lets you add or exclude a file ora folder to a backup set by usingthe right-click shortcut menu
You can use this option after youconfigure Backup in theManageBackup Sets window. It listsdown all the available backupsets for easy backups.
Context Menu
Lets you view the backup statusof each backup set on theBackup tab in the file Propertiespage that you included in yourbackup
It lists down all the availablebackup sets along with the dateand time that it was last backedup. It also shows thecorresponding icon overlay thatindicates if the file is included orexcluded in a particular backupset.
Property Page
479Customizing settingsAbout backup settings
Lets you specify the amount oflocal disk space that you want toreserve.
When you perform an onlinebackup, Norton 360 creates atemporary file in your local diskfor file transfer. At times, thisfile becomes large and consumesa large amount of free spaceavailable on your local drive.
When the available free diskspace on your computer reachesthe specified limit, Norton 360notifies you and does notperform an online backup. Youmust free some disk space andthen perform an online backup.By default, Norton 360 reserves2048 MB (2 GB) of your localdisk space.
Reserved FreeDisk SpaceDuring Online Backup (inMB)
About Identity Protection settingsIdentity thieves often use fraudulent Web sites toattempt to trick you into divulging private information.These sites may be disguised as shopping sites orfinancial transaction sites. Norton 360 helps guardagainst identity theft by verifying the Web sites youvisit.
Antiphishing, Norton Safe Web, and Identity Safefeatures in Norton 360 let you safely browse theInternet and securely perform online transactions.
When you install Norton 360, it adds the NortonToolbar to Internet Explorer and Firefox. Norton 360protects your Internet Explorer browser and Firefoxbrowser when you turn on the Safe Surfing option.
Antiphishing tells you the following things about theWeb pages that you visit:
Customizing settingsAbout Identity Protection settings
480
1 If it is safe to enter confidential information
1 If the Web page is known to be fraudulent
1 If the Web page is authentic and Symantec approved
1 If the Web page is known to belong to a suspicioussite
1 If the Web page is known to give annoying results
Norton Safe Web lets you know that a Web site ismalicious before you visit it. It provides you a safe Websearch environment by displaying the site rating iconsnext to every search result.
When you turn on Norton Safe Web, you can see thefollowing site rating icons next to the search results:
Indicates the site is VeriSigntrusted
Norton Secured icon
Indicates that the site is safe tovisit
Green OK
Indicates that the site mayattempt to install malicioussoftware in your computer andis unsafe to visit
Red cross (x) mark
Indicates that the site mayprovide annoying results
Yellow exclamation mark
Indicates that Norton Safe Webhas not analyzed the site and itdoes not have sufficientinformation
Grey question mark
The Identity Safe feature in Norton 360 lets you saveand protect your logins. However, the feature remainsinactive until you create an Identity Safe password andlog in to Identity Safe. The password protects you by
481Customizing settingsAbout Identity Protection settings
restricting unauthorized access to your data in IdentitySafe.
You can set up Identity Safe in the following areas ofNorton 360:
1 The Cards & Log-ins menu on the Norton Toolbar
1 The Identity Safe section in the Settings windowfor Identity Protection
1 The Identity Protection section in the Norton 360main window
Identity Safe provides you the following features for asecure online transaction experience:
Table 13-1 Identity Safe features
AdviceDescriptionFeature
When you saveall of your logininformation inIdentity Safe, youcan do thefollowing:1 Easily track
all of yourlogins
1 Quicklylaunch yourlogin Webpages
Lets youmanage yourlogininformation
Thisinformationincludessuch thingsas youremail logincredentialsand Internetbankingcredentials.
Manage Logins
Customizing settingsAbout Identity Protection settings
482
AdviceDescriptionFeature
You can use theinformation thatyou store in thecards to do thefollowing:1 Automatically
fill forms1 Provide
sensitiveinformationwithouthaving totype it whileyou areonline
In this way,Identity Safeprotects youfrom keyloggersthat steal andmisuse youridentity.
Lets youmanage yourpersonalinformationin one place
Manage Cards
483Customizing settingsAbout Identity Protection settings
AdviceDescriptionFeature
It becomesdifficult tomanage variousidentitynumbers.Manage Notesstores all of yoursensitive IDs in avery secure wayand lets youeasily use themwhile you areonline.
Lets youstore andmanagesensitiveinformation
In ManageNotes, youcan includeinformationsuch asSocialSecuritynumber,driverslicensenumber,insurancepolicynumber, andlegal andfinancialinformation.
Manage Notes
About Task Scheduling settingsThe Task Scheduling settings let you specify the tasksthat Norton 360 should run automatically when yourcomputer is idle. They also help you to schedule youractivities that are related to security, performance, andbackup.
Customizing settingsAbout Task Scheduling settings
484
Task Scheduling includes the following settings:
Lets you specify the tasks thatshould run in the backgroundautomatically when yourcomputer is idle
These automatic tasks includeactivities that are related to PCSecurity and PC Tuneup.
Your options are:1 InternetExplorer Temporary
Files1 Windows Temporary Files
1 Internet Explorer History
1 Disk Optimization
1 Registry Cleanup
Automatic Tasks
485Customizing settingsAbout Task Scheduling settings
Scheduling
Customizing settingsAbout Task Scheduling settings
486
Lets you schedule PC Securityand PC Tuneup related activities
You can specify how oftenNorton 360 should scan yoursystem for security andperformance issues and when itshould perform backups.
You have the following optionsfor scheduling custom PCSecurity and PC Tuneupactivities:1 Automatic (Recommended)
This option is therecommendedoption.Norton360 detects the time your PCis idle and then automaticallyruns the tasks.
1 Weekly
You can schedule to run yourtasks on a weekly basis. Youmust specify the day andtime. You can also specifythat the schedule must runonly when the PC is idle.
1 Monthly
You can schedule to run yourtasks on a monthly basis. Youmust specify the time andthe day of the month. Youcan also specify that theschedule must run only whenthe PC is idle.
1 Manual Schedule
You can run the tasksmanually.
Your computer's performance ismaximized if you schedule yourcritical operations to occur whenyour computer is idle. Norton360 identifies your computer as
487Customizing settingsAbout Task Scheduling settings
idle when there is no detectablemouse or keyboard activity for aperiod that you specify as idletimeout duration. When youschedule your scans weekly ormonthly and check the Run onlyat idle time option, Norton 360scans your computer when it isidle. Symantec recommends youto check the Run only at idletime option to experience betterperformance of your computer.
You can also navigate to theBackup Settings window withthe Click here to schedulebackup option. You canconfigure the BackupScheduling option on the Whentab.
About Administrative SettingsYou can use Administrative Settings window toconfigure various important options of Norton 360.
Customizing settingsAbout Administrative Settings
488
You have the following options:
Lets you configure Norton 360to defragment your boot volumeor the local disk that containsthe boot volume when yourcomputer is idle
When the option is turned on,Norton 360 automaticallyschedules the optimization afteryou install an application onyour computer. Optimizationspeeds up your computer’sperformance by defragmentingthe fragmented parts of the disk.
Idle Time Optimizer
Lets you view how Norton 360has protected you for the past30 days
This report includes theactivities that Norton 360performed to protect yourcomputer. You can turn on theMonthly Report option to letNorton 360 automaticallydisplay the Monthly Report oncein every 30 days.
Monthly Report
Lets you automatically downloadthe latest version of the Norton360
You can easily upgrade to thelatest version of Norton 360when prompted. By default, thisoption is turned on. Symantecrecommends you to install thelatest product version as it mightcontain new features, and itensures better protectionagainst security threats.
Automatic Download ofNew Version
489Customizing settingsAbout Administrative Settings
Lets you specify the automaticconfiguration details, proxysettings, and the authenticationdetails to connect to the Internet
Programs such as LiveUpdateand Norton Insight use thespecified proxy server settingsto connect to the Symantecserver over the Internet.LiveUpdate uses proxy settingsto retrieve updates. NortonInsight uses proxy settings toobtain specific informationabout the files such as trust levelor digital signature.
Network Proxy Settings
Customizing settingsAbout Administrative Settings
490
Lets you submit selectedsecurity and application data toSymantec for analysis
Norton Community Watchprotects you against newpotential risks. It collects theinformation about new securitythreats from your computer andsubmits the information toSymantec for analysis. Symantecassesses the data to identify thenew threats and resolves it.
The Detailed Error DataCollection option is availablewhen the Norton CommunityWatch option is turned on.
Detailed Error Data Collectionlets you allow or deny some ofthe detailed data submissions.These detailed data may varydepending on theNorton-specific errors andcomponents. You can use theAlways, Never and Ask Meoptions to configure thesubmissions.
NortonCommunityWatch
Lets you configure Norton 360to show or hide the notificationsthat appear whenNorton-specific automaticbackground tasks are run.
Norton Task Notification
491Customizing settingsAbout Administrative Settings
Performance Monitoring
Customizing settingsAbout Administrative Settings
492
Lets you monitor theperformance of your computer
When the PerformanceMonitoring option is turned on,Norton 360 monitors the CPUusage and memory usage of yourcomputer. It also monitors theimportant system activities thatyou performed over the periodof the last three months.
In addition, Norton 360 notifiesyou with performance alertswhen there is a high usage ofyour system resource by aprogram or process.
You have the following optionswhen the PerformanceMonitoring option is turned on:1 Performance Alerting
Lets you configure Norton360 to detect and notify youabout the increased usage ofyour computer resources byany program or process.
Norton 360 alerts you withthe information about theprogram name and theresources that the programuses. The Details & Settingslink in the notification alertlets you view additionaldetails about the resourceconsumption by the programin the File Insight window.
When this option is set toOn,Norton 360 notifies you withthe performance alerts andsaves the event in theSecurity History log. Whenthis option is set to LogOnly,
493Customizing settingsAbout Administrative Settings
Norton 360 saves the eventin the Security History logbut does not alert you withthe notifications. You canalso turn off this option ifyou do not want to viewperformance alerts. Bydefault, this option is turnedon.
1 Resource Threshold Profilefor Alerting
Lets you configure theresource threshold profile fordisplaying performancealerts.
When the resourceconsumption of a programexceeds the definedthreshold limit, Norton 360notifies you with aperformance alert.
You can set your thresholdlevel to Low, Medium, orHigh. Medium is the defaultsetting.
Customizing settingsAbout Administrative Settings
494
1 Low-Resource Profile UseOn Battery Power
Lets you configure Norton360 to change the resourcethreshold to low profile whenyour computer runs onbattery power.
It ensures betterperformance of yourcomputer on battery power.When this option is turnedoff, Norton 360 uses thethreshold level that you setin the Resource ThresholdProfile For Alerting option.By default, this option isturned on.
495Customizing settingsAbout Administrative Settings
1 High-Usage Alert for:2 CPU
When this option isturned on, Norton 360detects and notifies youabout the increasedusage of the CPUresource by any programor process. By default,this option is turned on.
2 Memory
When this option isturned on, Norton 360detects and notifies youabout the increasedusage of memory by anyprogram or process. Bydefault, this option isturned on.
2 Disk
When this option isturned on, Norton 360detects and notifies youabout the increasedusage of your disk by anyprogram or process. Bydefault, this option isturned off.
2 Handles
When this option isturned on, Norton 360detects and notifies youabout the increasedusage of handles by anyprogram or process. Ahandle is a pointer thatenables a program toaccess or identify aresource. By default, thisoption is turned off.
Customizing settingsAbout Administrative Settings
496
1 Program Exclusions
Lets you select specificprograms to exclude fromappearing in performancealerts.
You can use the Configureoption to list the programsfor which you do not want toget performance alerts.
Lets you save your battery powerby suspending a list ofbackground jobs when yourcomputer is on battery power
By default, this option is turnedon.
Power Saving Mode
497Customizing settingsAbout Administrative Settings
Lets you secure the product andprotect it from unauthorizedchanges
You have the following options:1 Non-Admins Access to
Settings
Lets you access andconfigure all the options inthe Settings window from anon-admin user account aswell
By default, this option isturned off. You need to log into your computer as anadministrator to turn on thisoption. You cannot accessthe Settings window if theSettings window is openedin some other user accounton your computer.
1 Norton Product TamperProtection
Lets you protect your Nortonproduct from an attack ormodification by unknown,suspicious, or threateningapplications
1 Settings PasswordProtection
Lets you protect Norton 360settings with a password. Itprotects the product settingsfrom unauthorized access
1 Product State Monitoring
Lets you monitor or ignorethe protection status ofAntivirus, Firewall, IdentityProtection, andMiscellaneous features ofNorton 360
Product Security
Customizing settingsAbout Administrative Settings
498
Silent Mode Settings
499Customizing settingsAbout Administrative Settings
Lets you turn on or turn offSilent Mode
You have the following options:1 Silent Mode
When you turn on the SilentMode option, you enableSilent Mode for a specifiedduration. Norton 360suppresses all alerts andsuspends the backgroundactivities for the durationthat you specify.
1 Full Screen Detection
When you turn on the FullScreen Detection option,Norton 360 automaticallydetects the applications thatyou run in full-screen modeand enables Silent Mode.Norton 360 suppresses mostof the alerts and suspendsthe background activities.The only activities that runare those that protect yourcomputer from viruses andother security threats.
1 QuietModeonDetection of:2 IMAPI 2.0 Disk Burn
When you use a MediaCenter application toburn a CD or DVD, Norton360 detects the activity,and automatically turnson Quiet Mode. WhenQuiet Mode is turned on,Norton 360 suppressesthe background activitiesbut continues to displayalerts and notifications.
2 Media Center TVRecording
Customizing settingsAbout Administrative Settings
500
When you use a MediaCenter application torecord a TV program,Norton 360 detects theactivity, andautomatically turns onQuiet Mode. When QuietMode is turned on,Norton 360 suppressesthe background activitiesbut continues to displayalerts and notifications.
2 User-SpecifiedPrograms
When you run anapplication that is listedin the User-SpecifiedPrograms list, Norton360 detects the activity,and automatically turnson Quiet Mode. WhenQuiet Mode is turned on,Norton 360 suppressesthe background activitiesbut continues to displayalerts and notifications.
You can configure the listof programs for whichyou want to turn on QuietMode.
Lets you configure Norton 360to notify you about special offerson the latest Norton products,add-ons, and other usefulinformation from Symantec.
Special OfferNotification
501Customizing settingsAbout Administrative Settings
Lets you delay the automaticrunning of Norton-specificbackground tasks when youresume your computer fromhibernate mode or standbymode.
Automatic ResumeDelay
Lets you specify duration forrunning Norton-specificprograms on your computer thatrun automatically when you turnon your computer
It does not delay Norton 360protection. You can specifyAutomatic Tasks Delay durationfor a period of 1 minute to 20minutes. The default duration is20 minutes.
Automatic Tasks Delay
Lets you specify the Idle Timeoutduration after Norton 360identifies your computer as idle
You can specify Idle Timeout fora period of 1 minute to 30minutes. The default duration is10 minutes.
Idle Time Out
Customizing settingsAbout Administrative Settings
502
Lets your PC run smoothly andefficiently by deleting theunused temporary files andbrowsing history if you useFirefox Web browser
Norton 360 automatically cleansup Internet Explorer temporaryfiles, history, and bookmarks asa background activity.
You have the following options:1 Firefox Temporary File
Cleanup
Lets you clean up thetemporary files that getaccumulated when you visitWeb pages in the Firefox Webbrowser
1 Firefox History Cleanup
Lets you clean up the historyand bookmarks that getaccumulated when you visitWeb pages on the FirefoxWeb browser
Firefox Cleanup
About Norton Product Tamper ProtectionNorton Product Tamper Protection prevents outsideprograms from making changes to the Norton product.This security feature also prevent Windows SystemRestore from changing Norton files, which results inthe Restoration Incomplete message.
Norton Product Tamper Protection protects Norton360 from an attack or modification by any virus orother unknown threat. You can protect your productfrom accidental modification or deletion by keepingthe NortonProductTamperProtection option turnedon.
503Customizing settingsAbout Administrative Settings
If you want to temporarily turn off Norton ProductTamper Protection, you can turn it off for a specifiedduration.
w You cannot run System Restore on your computer whenNortonProductTamperProtection is turned on. Youmust temporarily turn off Norton Product TamperProtection to run a successful System Restore.
Turning off or turning on Norton Product Tamper Protection
Norton Product Tamper Protection protects the Norton360 files from an attack or modification by any virusor other unknown threat. You can protect your productfrom accidental modification or deletion by keepingthe NortonProductTamperProtection option turnedon.
If you want to temporarily turn off Norton ProductTamper Protection, you can turn it off for a specifiedduration. You can turn off or turn on Norton ProductTamperProtection from the AdministrativeSettingswindow. You can also turn off or turn on NortonProduct Tamper Protection from Quick Controls inthe Settings window.
w You cannot run System Restore on your computer whenNortonProductTamperProtection is turned on. Youmust temporarily turn off Norton Product TamperProtection to run a successful System Restore.
To turn off Norton Product Tamper Protection
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
3 Under Product Security, in the Norton ProductTamper Protection row, move the On/Off switchto the right to the Off position.
4 Click Apply.
5 In the Security Request dialog box, in the Selectthe duration drop-down list, select how long youwant to turn off Norton Product Tamper Protection.
Customizing settingsAbout Administrative Settings
504
6 Click OK.
7 In the Settings window, click Close.
To turn on Norton Product Tamper Protection
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
3 Under Product Security, in the Norton ProductTamper Protection row, move the On/Off switchto the left to the On position.
4 Click Apply, and then click Close.
About securing Norton 360 Settings using a passwordYou can configure Norton 360 to prevent unauthorizedaccess to your product settings. If you share yourcomputer with others and do not want them to modifyyour Norton 360 Settings, you can secure Norton 360Settings using a password. The Settings PasswordProtection option lets you secure your Norton 360Settings by setting up a password.
By default, Settings Password Protection option isturned off. You must turn on the Settings PasswordProtectionoption to set up a password for your productsettings. You can access the Settings PasswordProtection option under Product Security, in theAdministrativeSettings window. The password mustbe between 8 and 256 characters in length.
After you set up a password for Norton 360 Settings,you must enter the password each time to access orconfigure your product settings. If you forget yoursettings password, you can reset the password in thewindow that appears when you choose to uninstallNorton 360. You do not need to uninstall the productto reset your password. You can use the reset settingspassword option in the Select your UninstallPreference window to reset your password.
505Customizing settingsAbout Administrative Settings
w The reset settings password option appears in theSelect your Uninstall Preference window only whenthe SettingsPasswordProtection option is turned on.
You can turn off the Settings Password Protectionoption if you no longer require password protectionfor your Norton 360 Settings.
Securing your Norton 360 Settings using a password
You can secure your Norton 360 Settings fromunauthorized access by setting up a password for yourproduct settings. The Settings Password Protectionoption in the AdministrativeSettings window lets yousecure your Norton 360 Settings using a password.
After you set up a password for Norton 360 settingsyou must enter the password each time to view orconfigure your product settings.
By default, the Settings Password Protection optionis turned off. You must turn on the SettingsPasswordProtection option to set up a password for your productsettings.
w The password must be between 8 and 256 charactersin length.
To secure your Norton 360 Settings using a password
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
3 Under ProductSecurity, in the SettingsPasswordProtection row, move the On/Off switch to the leftto the On position.
4 Do one of the following:
1 In the Settings Password Protection row, clickConfigure.
1 In the Settings window, click Apply.
5 In the dialog box that appears, in the Password box,type a password.
Customizing settingsAbout Administrative Settings
506
6 In the Confirm Password box, type the passwordagain.
7 Click OK.
8 In the Settings window, click Close.
Turning off Norton 360 Settings password
You can protect your Norton 360 Settings with apassword using the Settings Password Protectionoption. If the Settings Password Protection option isturned on, you need to enter the Settings passwordeach time to view or configure your Norton 360settings. You cannot access the product settingswithout providing your Settings password.
w In case you forget your Settings password, you canreset it using the resetsettingspassword option in theSelect Uninstall Preference window.
You can turn off the Settings Password Protectionoption if you do not require password protection forNorton 360 settings.
To turn off Norton 360 Settings password
1 In the Norton 360 main window, click Settings.
2 In the Settings window, under Detailed Settings,click Administrative Settings.
3 In the dialog box that appears, in the Password box,type your Settings password, and then click OK.
4 In the Settings window, under Product Security,in the SettingsPasswordProtection row, move theOn/Off switch to the right to the Off position.
5 Click Apply, and then click Close.
Resetting your Norton 360 Settings password
If you forget your Norton 360 Settings password, youcan reset the password. You can reset your Norton 360Settings password using the reset settings passwordoption in the Select Uninstall Preference window.
507Customizing settingsAbout Administrative Settings
To access the SelectUninstallPreference window, youmust choose to uninstall Norton 360. However, youneed not uninstall the product to reset your Settingspassword.
w The reset settings password option appears in theSelect Uninstall Preference window only if theSettings Password Protection option in theAdministrative Settings window is turned on.
To reset your Norton 360 Settings password
1 On the Windows taskbar, click Start > ControlPanel.
2 In WindowsControlPanel, do one of the following:
1 In Windows XP, double-click Add or RemovePrograms.
1 In Windows Vista, click ProgramsandFeatures.
1 In Windows 7, click Programs > Programs andFeatures.
The Programs option in Windows 7 is availablewhen you select the Category option in the Viewby drop-down list.
3 In the list of currently installed programs, do oneof the following:
1 In Windows XP, click Norton360, and then clickChange/Remove.
1 In Windows Vista or Windows 7, click Norton360, and then click Uninstall/Change.
4 At the bottom of the Select Your UninstallPreference window, click reset settingspassword.
5 In the dialog box that appears, in the ResetPassword Key box, type the randomly generatedkey that is displayed against Reset Password Key.
6 In the New Password box, type the new password.
7 In the Confirm New Password box, type the newpassword again.
8 Click OK.
Customizing settingsAbout Administrative Settings
508
This chapter includes the following topics:
1 Finding the version number of your product
1 Finding the End-User License Agreement
1 About upgrading your product
1 About simple solutions
1 Staying informed about protection issues
1 Service and support solutions
1 Uninstalling Norton 360
Finding the version number of your productIf you want to upgrade your Norton product or wantto reach the customer support for assistance, you mustknow your product version number. You can find theversion number of your product on your computer.
To find the version number of your product
1 In the Norton 360 main window, click Support.
2 In the Support menu, click About.You can note the version number of your productin the window that appears.
14Finding additionalsolutions
Finding the End-User License AgreementEnd-User License Agreement (EULA) is a legaldocument that you agree to while installing theproduct. EULA contains information such as therestriction on sharing or usage of the software, theuser rights on the software, and the supportinformation.
You may need to read the EULA of your product toknow about the usage policies or to be aware of theterms and conditions. You can find the EULA of yourproduct on your computer.
To find the End-User License Agreement
1 In Windows Explorer, double-click the drive whereNorton 360 is located.
2 Double-click Program Files > Norton 360 > MUI >version > 09 > 01.Where version represents the version number ofinstalled Norton 360.
3 Do one of the following:
1 If you are a North American user, double-clickEULA_NorthAmerica.htm.
1 If you are an International user, double-clickEULA_ International.htm.
About upgrading your productNorton 360 helps you upgrade your product if you havean active subscription. You can upgrade your currentproduct to the later version without any cost as longas you have an active subscription with the currentproduct. You can access this option from the Supportdrop-down menu in the Norton 360 main window. If anew version of your product is available, Norton 360lets you download the new version.
If you choose to install the latest version of the product,Norton 360 downloads and seamlessly installs the latest
Finding additional solutionsFinding the End-User License Agreement
510
version. Ensure that you have saved all your importantdata before you install the new version of the product.
If you download and install the latest version of yourproduct, your subscription status remains the same asyour previous version of product. For example, youhave 200 days of subscription left with your currentversion of product and you upgrade your product tothe latest version. In this case, the subscription statusof your upgraded product remains 200 days only.
If a new version is not available, the Web page informsyou that no new version is available and your productis up to date. Symantec recommends that you have thelatest version of the product, as it contains new andenhanced features for better protection against securitythreats.
Product upgrade is different from the program updatesand the definition updates that are minorimprovements to your installed product. The maindifferences are as follows:
1 Product upgrade lets you download and install anew version of the entire product.
1 Definition updates are the files that keep yourSymantec products up to date with the latestantithreat technology.
1 Program updates are enhancements to Norton 360that Symantec issues periodically.
If a new version of the product is not available, ensurethat you have all the latest program updates anddefinition updates. LiveUpdate automates the processof obtaining and installing program and definitionupdates. You can use LiveUpdate to obtain the latestupdates.
The upgrade process might not work if your Webbrowser is incompatible to communicate with theSymantec servers.
w Your product must be activated and you need anInternet connection to check and install new productversion.
511Finding additional solutionsAbout upgrading your product
Checking for a new version of the productYou can upgrade your product to the latest version ifyou have an active subscription. If you have a newversion available, you can download and install thenew version of your product. You can also let Norton360 notify you when a new version of your product isavailable. You can do so by turning on the AutomaticDownload of New Version option in theAdministrative Settings window. The latest versionof your product may contain new and enhancedfeatures for better protection against security threats.
When you check for a new version, details about yourproduct such as product name and version are sent toSymantec servers. The servers then check whether anew version of the specified product is available or not.
If a new version is available, you can download andinstall it from the Web page. If a new version is notavailable, the Web page informs you about it. In suchcase, you can run LiveUpdate to obtain latest programand definition updates and keep the existing versionof your product up to date.
The upgrade process might not work if your Webbrowser is incompatible to communicate with theSymantec servers. You can use Internet Explorerversions 5.5 or later and Firefox versions 3.0 or later.
w You need an Internet connection to check and installnew product version.
To check for a new version of the product
1 In the Norton 360 main window, click Support.
2 In the Support menu, click CheckforNewVersion.This option is available only if your product isactivated. The Web page that appears displayswhether a new version of the product is availableor not.
3 Follow the on-screen instructions to download thenew product.
Finding additional solutionsAbout upgrading your product
512
About simple solutionsOne Click Support provides additional product supportwith one-click access from the Norton 360 mainwindow. One Click Support performs a Quick Scan ofyour computer and repairs problems without yourintervention. You can solve common problems withthe Begin Support Session option in the One ClickSupport window. If the problem persists, you can usethe Launch Support Web Site option to go to theNorton support Web site for help by telephone, email,or chat.
In addition, the Norton Support Web site providesaccess to the knowledge base articles. By using thesearticles, you can easily find solutions to your technicalproblems.
The support technicians can help you solve morecomplex problems by using remote-assistancetechnology.
w Support offerings can vary based on the language orproduct.
When you click Get Support, Norton 360 checks yourInternet connection. To access One Click Support, makesure that your computer is connected to the Internet.If you use a proxy server to connect to the Internet,you must configure the proxy settings of Norton 360.
Solving a problem using One Click SupportOne Click Support performs a Quick Scan of yourcomputer and repairs problems without yourintervention. If a problem persists, you can use theNorton support Web site for additional online supportand contact options.
Your computer must be connected to the Internet toaccess One Click Support. If you use a proxy server toconnect to the Internet, you must configure the proxysettings in Norton 360.
513Finding additional solutionsAbout simple solutions
To solve a problem if your computer is connected to theInternet
1 In the Norton 360 main window, click Support.
2 In the Support drop-down menu, click GetSupport.
3 In the One Click Support window, click BeginSupport Session.
4 Follow the on-screen instructions.
5 In the One Click Support window, do one of thefollowing:
1 If the problem is not fixed automatically, clickLaunch Support Web Site, and follow theon-screen instructions to find additional support.
1 If the problem is fixed, click Close.
To solve a problem if your computer is unable to connectto the Internet
1 In the Norton 360 main window, click Support.
2 In the Support drop-down menu, click GetSupport.
3 Follow the on-screen instructions in the CheckingYour Connection window.
4 If the problem persists, in the Checking YourConnection window, click Continue.
5 In the window that appears, click Yes to release andrenew your IP settings.
6 If your hosts file has been modified, Norton 360 willprompt you to correct it. Click Yes to correct thehosts file.
7 If the problem still persists, in the Checking YourConnection window, do one of the following:
1 On the left pane, select a region and then yourcountry. You can use the contact details thatappear on the right pane to contact our technicalsupport team.
1 Click Retry to try again.
Finding additional solutionsAbout simple solutions
514
Staying informed about protection issuesIf you need help using Norton 360, you can find helpfulinformation on the Symantec Web site. It containsmany useful and informative features that areespecially designed to complement Norton 360,including the following:
1 Detailed background information about currentthreats and outbreaks.
1 Newsletter to which you can subscribe.
1 Protection blog that lets you post your owncomments and view comments from experts.
w The Symantec Web site is constantly updated andenhanced, so the available resources may vary.
To stay informed about protection issues
1 Open your Web browser, and go to the followingURL:http://www.symantec.com
2 In the Symantec Web site, click Norton.
515Finding additional solutionsStaying informed about protection issues
3 In the menu that appears, do the following:
1 Click the Viruses&Risks tab, and then click anyitem on the left pane to know more details aboutit.
1 Click the Community tab, and then use one ofthe following:
Register as a user andparticipate in discussions.
You can create your own threadsof topics or take help from theexisting forum discussions.
Norton Forums
Read the messages thatprominent leaders post frominside and outside Symantec andobtain information straight fromthe source.
You can add comments or askquestions on the blogs that youare interested in.
Norton Blogs
Check about Norton in otherWeb sites and social networksthat are available.
Other NortonCommunities
Service and support solutionsUse the information that is contained in these topicswhen you need support for your product.
About online supportOne Click Support offers a range of technical supportand customer service options. You can access theseoptions by clicking the Support option in the Norton360 main window. If you cannot access One Click
Finding additional solutionsService and support solutions
516
Support, then you can access our support options byvisiting the following URL:
http://www.symantec.com/techsupp/
Under the Norton Support section, click NortonProductSupport and follow the on-screen instructions.You can also select the language of your choice fromthe Select your language drop-down list.
The Symantec Web site also contains answers to themost common customer questions. The Top TechIssues option provides you the links to the frequentlyasked questions. You can also use the Search optionto search for articles by using a keyword.
You can find the current Symantec consumer supportpolicies on our Web site at the following address:
www.symantec.com/supportpolicy
w If you received this product when you purchased yourcomputer, your computer manufacturer may beresponsible for providing your support.
About Symantec Support Web siteThe Symantec Support Web site provides a full rangeof self-help options.
By using Symantec Support Web site, you can do thefollowing:
1 Find help with your product download, productsubscription, product activation, productinstallation, and other issues.
1 Find and download the latest product manual.
1 Manage your products and services using NortonAccount.
1 Search Norton Forum to find the additional producthelp about installing, configuring, andtroubleshooting errors. You can also post yourquestions in the forum and get answers fromexperts. To post your questions, you need to firstregister for Norton Forum.
517Finding additional solutionsService and support solutions
1 Find information about the latest virus threats andremoval tools.
In addition to the self-help options, you can use theContact Us option at the bottom of the Web page tocontact a support representative by chat, email, orphone.
w Availability of support varies by region, language, orproduct. For additional support, go to the followingURL:
www.symantec.com/globalsupport
You can also contact the Symantec Technical Supportteam in the following ways:
Chat in real time with asupport representative.
For more complex technicalissues, chat offers the optionto allow a supportrepresentative to connectremotely to your computerand resolve your problem.
Chat
Submit your question on ourWeb site and receive aresponse by email.
Email support has a slowerresponse time than chat orphone.
Speak to a supportrepresentative in real time.
Phone
Using the Symantec Support Web site
The Symantec Support Web site contains answers tothe most common customer questions. You can findthe latest product manual, knowledge base articles,and virus removal tools.
Finding additional solutionsService and support solutions
518
Symantec Support Web site contains problem-solvingarticles that are presented in an easy step-by-stepformat. The articles are categorized and listed on theleft side of the Web page. Using the categories, you canbrowse through the available support topics. You canalso use the SearchSupport box to find solution usinga keyword.
Symantec Support Web site also contains useful linksto the product manual, the Norton Account, the NortonForum, and the spyware help under AdditionalResources.
To use the Symantec Support Web site
1 In the Norton 360 main window, click Support.
2 In the Support drop-down menu, click GetSupport.
3 In the One Click Support window, click SupportWeb Site.The Norton Support Web page appears.
4 Follow the on-screen instructions.
ClubNorton
ClubNorton is your one-stop resource center forInternet security. As a Norton customer, Symantecwants to make your experience with your computersafe, enjoyable, and productive. Whether you use yourcomputer to manage your personal finances, shoponline, or share your latest digital photos with friendsand family, ClubNorton makes your experience a goodone. Our goal is to consistently provide the proper toolsand information to keep you up to date.
For more information, go to the following URL andselect your country or region in the Select YourCountry/Region drop-down menu:
www.clubnorton.com
The ClubNorton Web page includes a regularly updatedarticle library, a glossary, the Norton Forums, and theNorton Update Center. You can also find the followinguseful links in the Web page:
519Finding additional solutionsService and support solutions
1 Symantec Security Check
1 Subscription Troubleshooter
1 Home & Home Office Security
1 Product Manuals
1 Product Updates
1 Product Reviews
1 Order Status
1 Returns
1 Rebates
About keeping your subscription currentSubscription period lengths vary by Symantec product.To maintain uninterrupted protection, you must keepyour subscription up to date. If you do not renew yoursubscription, you cannot obtain updates of any kindand the software no longer functions.
When you run LiveUpdate near the end of yoursubscription period, you are prompted to subscribe fora nominal charge. Follow the on-screen instructionsto renew your subscription.
When you renew your subscription, the definitionupdates and new product features are availablethroughout the subscription period. Please note thatfeatures may be added, modified, or removed duringthis period.
Worldwide service and supportWorldwide service and support solutions vary bycountry. For the Symantec local offices please see thedetails and addresses that are listed below. To contactone of our Support offices, please go to the followingWeb site and select your language.
Finding additional solutionsService and support solutions
520
www.symantec.com/globalsupport
Contact informationRegion
1 Symantec Corporation
555 International Way
Springfield, OR 97477
U.S.A.
www.symantec.com/globalsupport
North America
1 Symantec Australia
Level 2, 1 Julius Avenue
North Ryde, NSW 2113
Sydney
Australia
www.symantec.com/globalsupport
Australia and NewZealand
1 Symantec Ltd
PO Box 5689 Blanchardstown
Dublin 15 Ireland
www.symantec.com/globalsupport
Europe, MiddleEast, and Africa
1 Symantec Brasil
Sevico e Suporte Symantec
Av. Dr. Chucri Zaidan, 920, 14º andar
CEP 04583-904
São Paulo - SP
Brasil
www.symantec.com/globalsupport
1 Portuguese language support:
www.symantec.com/globalsupport
1 Spanish language support:
www.symantec.com/globalsupport
Latin America
521Finding additional solutionsService and support solutions
Uninstalling Norton 360You can remove Norton 360 from your computer in thefollowing ways:
1 From Windows Control Panel
1 From the Start menu
w You should print out the Uninstalling Norton 360 Helptopic before continuing with the uninstallation. Youcannot access online Help during uninstallation.
If you want to reinstall Norton 360 on your computer,you must uninstall Norton 360 from your computer.You can reinstall the product using the installation filethat you downloaded from Symantec Web site or fromthe product disc. To reinstall Norton 360, follow theinstallation procedures that are available in the userguide.
To uninstall Norton 360 from Windows Control Panel
1 On the Windows taskbar, click Start > ControlPanel.
2 In Windows ControlPanel, do one of the following:
1 In Windows XP, click AddorRemovePrograms.
1 In Windows Vista, click ProgramsandFeatures.
1 In Windows 7, click Programs > Programs andFeatures.
The Programs option in Windows 7 is availablewhen you select the Category option in the Viewby drop-down list.
3 In the list of currently installed programs, do oneof the following:
1 In Windows XP, click Norton360, and then clickChange/Remove.
1 In Windows Vista or Windows 7, click Norton360, and then click Uninstall.
Finding additional solutionsUninstalling Norton 360
522
4 In the page that appears, under Select YourUninstall Preference, click one of the following:
Lets you retain your settings,passwords, and preferences forNorton features before youuninstall Norton 360
Select this option if you want toreinstall Norton 360 or anotherNorton product.
I plan to reinstall aNorton product in thefuture. Please leave mysettings behind.
Lets you completely removeNorton 360 without saving yoursettings, passwords, andpreferences
Please remove all userdata including my storedpasswords & quarantinecontents.
5 To uninstall Norton 360, click Next.
6 Do one of the following:
1 To restart your computer now, click RestartNow, which is recommended.
1 To restart your computer later, click RestartLater.
Norton 360 is not fully uninstalled until yourestart your computer.
To uninstall Norton 360 from the Start menu
1 On the taskbar, click Start>AllPrograms>Norton360 > Uninstall Norton 360.
523Finding additional solutionsUninstalling Norton 360
2 In the page that appears, under Select YourUninstall Preference, click one of the following:
Lets you retain your settings,passwords, and preferences forNorton features before youuninstall Norton 360
Select this option if you want toreinstall Norton 360 or anotherNorton product.
I plan to reinstall aNorton product in thefuture. Please leave mysettings behind.
Lets you completely removeNorton 360 without saving yoursettings, passwords, andpreferences
Please remove all userdata including my storedpasswords & quarantinecontents.
3 To uninstall Norton 360, click Next.
4 Do one of the following:
1 To restart your computer now, click RestartNow, which is recommended.
1 To restart your computer later, click RestartLater.
Norton 360 is not fully uninstalled until yourestart your computer.
Finding additional solutionsUninstalling Norton 360
524
Aabout customer support 517activation 20
about 19Norton Account 23online backups 423problems 23troubleshooting 23
activitiesscanning 198
Add Rule Wizardusing 211
Address Book Exclusionssetting 248
addressesadding allowed 250adding blocked 251importing allowed 250settings 472
Administrative Settingsabout 488
Advanced Modeallow an event 158
adwarefound by Auto-Protect 178
adware protection settings 438Aggressive
SONAR Protection 158alerts 187
responding to 205
Allowed List 250Antiphishing
about 258hiding the toolbar 327showing the toolbar 327turning off 260turning on 260
AntiSpamabout 242Address Book Exclusions 248Allowed List 250Blocked List 251Client Integration 245configure 471Feedback 253settings 471Web Query 254
antivirus settings 438Application Ratings
check trust level 84Scan Performance Profiles 86
attack signatures 225attacks
network 202attention
infected files 182Auto-Protect
notifications 178Autofill Exclusions
about 310
Index
Autofill Exclusions (continued)deleting 311specifying 310
Automatic LiveUpdateturning off or turning on 42
Automatic Program Controlabout 205
automatic tasks 193automatic updates 37Autorun Restore
about 411restoring 412
Bbackground jobs
about 76monitoring 78
backup 199, 373additional help 419backup file categories 381Backup Set 378categories 91file extensions 387file selection 392file types 381Identity Safe data 311locations 395Norton Backup Drive 413preparation 375problem solving 416restoring 404, 407restoring selected files 407scheduling 401settings 427, 477supported media 395turning off or turning on 425
Backup and Restoreabout 311schedules 196
backup file categoriesadding or editing file
extensions 388removing file extensions 390resetting file extensions 390
backup filesdeleting 391
Backup Setabout 378adding files and folders 392creating 379deleting 403excluding files and folders 393modifying 380renaming 380
Backup Settingsabout 477turning off and turning on 427
backupsabout 374locations 401online 420online storage space 424restore destinations 410running 404
Blocked List 251blocking
spam 242boot viruses 191browser cache files 366Browser Protection
turning on and turning off 230
Ccache files 366Cards
about 302adding 303deleting 306duplicating 306update image 303
Index526
Cards (continued)updating 306
categories in Norton 360viewing details 55
CDs for backups 416cleaning up disks 363, 367cleanups
in PC Tuneup 363Client Integration
configuring 245cloud technology
Cloud 142ClubNorton
security tips 519communication port
modifying 360Computer
protecting 94computers
blocking with AutoBlock 228IP address 348
configureIdentity Safe 287
connections 94cookies protection settings 438CPU graph
about 70obtaining historical data 72resource-consuming
processes 72CPU usage
viewing 71customer support
about 517using 518
customizingAllowed List 250Blocked list 251
Ddefinition status 44
definition updates 38obtaining 46
definitionsvirus and spyware 44
details links 55detecting
security risks 177device
adding 346editing details 349excluding from Intrusion
Prevention scan 355purging from exclusion list 232remotely monitoring 338removing from the Network
Security Map 357viewing 338
deviceschanging trust level 351
Diagnostic Reportrunning 368
dialers protection settings 438disk optimization 199, 364disks
cleaning up 366fragmentation 364optimizing 364
domainsadding allowed 250adding blocked 251
Download Insightabout 233configuring alerts 238turning off notifications 237turning on notifications 237
Download Intelligenceturning off 236turning on 236
DVDs for backups 416
527Index
Eemail
menu 247program 247spam 242
error messages 187EULA
checking 510Events graph
monitoring activities 60
Ffeatures
email filtering 243Feedback
Norton AntiSpam 253file extensions
of infected files 182file infectors 191files
backing up 404fragmentation 364scanning 141selection, for backups 392
filterWeb Query 254
filteringemail 471identifying email senders 250–
251SSL 242web-based 254
firewallgeneral settings 463, 465intrusion prevention 463program rules 463protection settings 222, 463removing programs 209traffic rules 463
firewall rulesabout 202changing the order of 220creating 205, 211default 203processing order 202, 220removing 222turning on and off 221
Firewall settingsadding programs 207
foldersscanning 141
fragmentation 364Full Screen Detection
about 161Full System Scan 140
GGeneral Rules
removing 222
Hhack tools protection settings 438Help
Symantec service andsupport 516
home networksettings 475
Iicons in Norton 360 52Identity Protection
categories 91Settings 480
Identity Safeabout 268accessing 283, 327, 332backing up 312changing password 322configuring 287
Index528
Identity Safe (continued)exporting data 279information 257logging in and out 285logins 293Norton toolbar 285options 313password 319resetting password 281restoring data 313restoring password 281security 319turning off 271turning on 271
Identity Safe Optionsabout 313
Identity Safe Password & Securityoptions
about 319Identity Safe profiles
about 272creating 273creating local profile 274creating portable profile 274exporting 278locating 282renaming 278switching 282
identity theftInternet 257
Idle Time Optimizerabout 75turning off 76turning on 76
Idle Time Outsetting 197
importlogins 277
Insight Networkabout 142cloud computing 142
Insight Network (continued)Insight Network scan 142Quick Scan 142scan 142shortcut menu scan 142Single File Scan 142
Insight Protectionturning off 144turning on 144
installationproblems 35–36
integration with email clients 245integration with email
programs 247Internet
connection problems 94search Explorer history 199temporary files 199, 366
Intrusion AutoBlockblocking computers
permanently 229turning on and off 228unblocking computers 228
Intrusion Prevention 463, 467about 225exclusion list 231turning individual notifications
on and off 226turning notifications on and
off 226Intrusion Prevention scan
excluding a device 355exclusion list 231purging devices 232remove devices 232
IP addresses 348finding 348
itemssubmitting from
Quarantine 127
529Index
Jjoke programs protection
settings 438
LLiveUpdate 43
about 37Smart Definitions 40–41technology 37updating 198
locations for backup 395Login
adding manually 296changing password 300changing URL 299changing user name 300configuring 287creating new folder 296deleting 296editing 296importing 277managing 296saving 294updating 301
low resource profile on batteryturning off 67turning on 67
Mmacro viruses 191main window
messages 92status colors 187status messages 187
malware 189Manage Logins
about 293Manage Notes
about 308
Manual Repairreviewing remaining risks
in 182manual scan options 451Media Center Extender
Silent Mode 165Memory graph
about 70obtaining historical data 72
messages 92, 187Norton 360 187
Monthly Reportactivities 90
multipartite viruses 191
NNetwork
changing trust level 351discovering devices 344editing details 351forming 344joining 344managing 337
network locations 463Network Proxy Settings
about 47configuring 49
Network Security Mapabout 337adding devices 346modifying communication
port 360purging 357removing devices 357turning off 346turning off Network Security
Overview 343turning on Network Security
Overview 343viewing device details 359viewing devices 338
Index530
Network Security Map (continued)wireless network
viewing status 358Network Security Overview
turning off 343turning on 343
new versionchecking 512
newsletter 519Norton 360
about 7about securing 505Allowed and Blocked lists 243background jobs 76categories 91details 55EULA 510icons 52main window 8, 187new version 512password 506–507protecting 507registering 28securing 506shortcut menu 53status 50uninstalling 522upgrading 510version number 509
Norton 360 scanabout 133command line scanning 174Computer Scan 133Idle Time Scan 133Insight Network 142Insight Network scan 133Reputation Scan 133
Norton 360 settings 222resetting password 507
Norton Account 423about 23
Norton Account (continued)accessing 29changing password 30creating 28
Norton Account password 30Norton AntiSpam 242
about 242Address Book Exclusions 248configure 471Feedback 253settings 471SSL 242Web Query 254
Norton Backup and Restore 373Norton Backup Drive
about 413deleting files 415restoring files from a Backup
Set 415Norton Bootable Recovery Tool
about 33using 36
Norton Bootable Recovery ToolWizard
downloading 35Norton Community Watch
about 31joining 31turning off or turning on 32
Norton Firewall Diagnosisabout 223
Norton Insightabout 78Files of Interest 82refreshing trust level 82trusted files 78viewing processes 82
Norton LiveUpdateabout 37
Norton Product Tamper Protectionabout 503
531Index
Norton Product TamperProtection (continued)
turning off 504turning on 504
Norton Safe Searchsearching Web 266
Norton Safe Webabout 262turning off 266turning on 266
Norton Tasksabout 76
Norton toolbarabout 324accessing 327settings 283
Notesdeleting 308saving 308updating 308
notification area icon 92notifications
Auto-Protect 178Intrusion Prevention 226
OOffice documents
embedded objects 159scanning office documents 159turn on or turn off 160virus macros 159
One Click Supportsupport assistants 513using 513
online backupsactivation 423considerations 420purchasing more storage 424
Online transactionsidentity theft 268
Optimizationabout 73and performance 365boot volume 74running 364
optimizing 363and fragmentation 364
OptionsClient Integration 245
Ppassword
changing 322editing 296Norton Account 30saving 294updating 301
PC securitycategories 91
PC Tuneupcategories 91disk cleanup 367disk optimization 364optimization 364Startup Manager 369
PC tuneup 363, 366Performance
accessing 59alerts 63monitoring 71
performance alertsabout 63configure 64configure threshold 66excluding programs 69removing programs from
exclusion list 69turning off 64turning off low resource
profile 67turning on 64
Index532
performance alerts (continued)turning on low resource
profile 67performance improvement 364Personal data
backing up 312pop-up messages 187port scans 201problem solving 515problem solving backups 416problems
problems found during 182resolve any items 182solving 513
Product Key 21accessing 29
product passwordprotecting 506
product status 44program
patches 38Program Control
Automatic 205Program rules
removing 222program updates 38programs
removing programs 209programs, blocked 222protection
dates 44maintaining 92quick scan 138updates 37
protection featuresmonitoring 96
proxy serverconfiguring 49settings 47
Pulse Updatesabout 45
Pulse Updates (continued)using 46
QQuarantine
adding an item 125items, submitting for
analysis 127managing items 122opening 122removing items 126restoring items 125
Quarantined Items viewadding items 98
Quick Controlsturning on or turning off 437
Quick Scanrunning quick scan 138
Quiet Modeabout 161, 166disk burning 166options 170turning off 170turning on 170TV recording 166User-Specified Programs 171
RRegistry Cleanup 199, 368Remote Monitoring
setting up 344repair
actions 182infected files 182removable media 182system files 182
Reputation Scanabout 145results 151running Custom Scan 150
533Index
Reputation Scan (continued)running Full System Scan 149running Quick Scan 149
Respondingabout 94responding to emergencies 94
restore 373Autorun Restore 411–412choosing destinations 410Identity Safe data 311restoring backed-up files 404selecting Backup Set 407selecting files to restore 407
restoring itemsQuarantine 125
risksintrusions 202malware 189port scans 201spyware 189vulnerabilities 189
ruleschanging 211creating 211
running Full System ScanReputation Scan 149
running Quick ScanReputation Scan 149
SSafe Surfing
about 257Safe Web
turning off 266turning on 266
scan at the command promptcommand line scanning 174
Scan Completeappearing after a scan 182
Scan Facebook Wallabout 155
Scan Facebook Wall (continued)scanning 157
scanningproblems found during 182
Scanschoosing 198command line 174Computer Scan 137Custom Scan 137custom scan 141Full System Scan 137, 140Insight Network 142manual 43Norton Bootable Recovery
Tool 36Quick Scan 137quick scan 138
scheduling 194backup and restore 196backups 401tasks 484
searchingSecurity History 119
secure online storage 424Security History
about 96adding items to the
Quarantine 98full alert history 98importing or exporting 120manual scan results 98Quarantine 122Quick Search 119recent alert history 98searching 119security risks 98submission, items to
Symantec 98suspicious email 98viewing items 98viewing quarantined items 98
Index534
security risksadding to Quarantine 125attacks 202found by Auto-Protect 177–178port scans 201removing from the
Quarantine 126restoring from Quarantine 125
security status 51self-healing 513Service and Support 516Settings 431
Administrative Settings 488antivirus 438customizing 436firewall 222, 463, 465home network 475Identity Protection 480Quick Controls 437
settingsTask Scheduling 484
settings passwordresetting 507turning off 507
Settings Password Protectionabout 505configuring 506resetting 507turning off 507
shortcut menu 53signatures
including and excluding 227Silent Mode
about 161Full Screen Detection 165Media Center Extender 165turning off 163, 166turning on 163, 166turning on manually 163
Smart Definitionsabout 40
Smart Definitions (continued)turning on or turning off 41
Smart Firewallabout 201customizing 202
SONAR Protectionabout 158emerging threats 158heuristic technology 158SONAR Advanced Mode 158turning off 159turning on 159
spyware 189, 460found by Auto-Protect 178protection settings 438settings 445system scan 140
SSL (Secure Sockets Layer)Norton AntiSpam 242
startup files 177startup items
delaying and running 370disabling or enabling 369
Startup Managerabout 369delaying and running delayed
items 370disabling or enabling startup
items 369status 50–51submission, items to Symantec 127subscription
maintaining 520product updates 44
Supervisor user accountcreating firewall rules 205
SupportAutoFix Scan 513solving problems 513worldwide service 520
535Index
supportservice 516
Symantec Security Response 127viewing submitted files 98
Symantec Support Web siteabout 517using 518
Symantec Web siteblogs and forums 515
System Insightabout 57Events graph 57monitoring activities 60Performance graph 57
system status graphactivity details 62
TTask Scheduling
settings 484Tasks
choosing 198tasks
automatic 193Technical Support 516technical support
about 517using 518
threatsnewly discovered 44protection from 201Trojan horses 190viruses 190worms 190
trackware protection settings 438Trojan horses 190troubleshooting
technical support 516Trust Control
Intrusion Prevention and 225
trust levelchanging 351device 351network 351
Uupdates 37
automatically 42manual 43obtaining 46Pulse Updates 45summary 38
upgradingnew version 510
User-Specified Programsabout 171adding programs 172Quiet Mode 171removing programs 173
Vversion number
checking 509virus and spyware checks
scheduling 194virus and spyware Scan
running 198virus and spyware settings 445virus definitions 44virus protection
system scan 140viruses 190
boot 191file infectors 191macro 191multipartite 191protection settings 438types 191
vulnerabilities 189
Index536
Vulnerability Protectionabout 128, 130viewing programs 129
WWeb pages
launching 299protection 258reporting 260
Web Queryabout 254turning off 255turning on 255
Web sitescache files 366
Windows temporary files 199wireless network
viewing status 358worms 190
537Index
foo
Norton from Symantec products protect consumers from traditional threats with antivirus, phishing protection, and spywareprotection. They also protect against bots, drive-by downloads, and identity theft, and are light on system resources. In addition,Symantec provides services such as online backup and PC Tuneup, and is a trusted source for family online safety. For moreinformation, please click one of the following links:
Antivirus | Phishing Protection | Spyware Protection | Online Backup
Copyright © 2010 Symantec Corporation. All rights reserved. Symantec, Norton, and the Norton Logo are trademarks or registeredtrademarks of Symantec Corporation and its affiliates in the U.S. and other countries. Other names may be trademarks of theirrespective owners.