using the reputation-based threat detection. The
Insight Network Scan uses the Cloud technology
wherein a remote Symantec server on the Web stores
the latest reputation information. It checks the Cloud
for the reputation information on the filtered files.
Norton AntiVirus obtains specific information such as
file name and hash key about the filtered reputation
files and sends this information to the Cloud. The Cloud
analyzes the file information and provides a trust level
for each file. The Symantec server sends back the
reputation information to your computer. If any of the
filtered files is suspicious or vulnerable, Norton
AntiVirus assigns Bad or Poor trust level. Apart from
reputation information, Norton AntiVirus also checks
for the latest virus definitions on the Cloud.
w
Your computer must be connected to the Internet to
access the latest reputation information and virus
definitions from the Cloud. If your computer is not
connected to the Internet, Norton AntiVirus uses the
reputation information that is available locally.
When you perform a Reputation Scan, Norton
AntiVirus considers only the following categories of
files:
This category includes
Windows executable files
(.exe) and script files (.scr).
Executable files
This category includes
Windows System files (.sys),
dynamic link library files
(.dll), and device driver files
(.drv).
System files
This category includes
ActiveX control files (.ocx).
Developer files
127
Protecting your files and data
About the Norton AntiVirus scans
Summary of Contents for 10067161 - 10PK NORTON ANTIVIRUS
Page 30: ...Safe Web Lite Getting started About Norton AntiVirus main window 30...
Page 60: ...Getting started About Network Proxy settings 60...
Page 134: ...Trust Level Protecting your files and data About the Norton AntiVirus scans 134...
Page 271: ...Updates 271 Customizing protection features About customizing settings and options...
Page 276: ...Message Protection Customizing protection features About customizing settings and options 276...
Page 285: ...Other Settings 285 Customizing protection features About customizing settings and options...
Page 293: ...Product Security 293 Customizing protection features About customizing settings and options...
Page 306: ...Customizing protection features About customizing settings and options 306...
Page 324: ...Finding additional solutions About uninstalling 324...