In some cases, Norton AntiVirus might not identify an
item as a security threat, but you might suspect that
the item is infected. In such cases, you can submit the
item to Symantec for further analysis.
In addition, your product provides solutions for
security risks, such as spyware and adware.
About detecting viruses, spyware, and other risks
Viruses and other security threats can be detected
during a manual or scheduled scan. Auto-Protect
detects these threats when you perform an action with
an infected file. Threats can also appear during an
instant messenger session, when you send an email
message, or during a manual or scheduled scan.
Security risks, such as spyware and adware, can also
be detected when these activities are performed.
The files that can potentially infect your system when
your computer first starts up are scanned first.
These files include the following:
1
Files that are associated with the processes that are
currently running in memory
1
Files with startup folder entries
1
Files with system start INI file entries
1
Files with system start batch file entries
1
Files that the system start registry keys refers
If an infected file is detected during this portion of the
manual scan, it is repaired or removed. Any
unnecessary references are also removed from your
computer. Before attempting to repair, quarantine, or
delete any infected file that has a process running in
memory, your product attempts to terminate the
process. You are alerted and prompted to close all
unnecessary programs before the process is terminated.
You can view information about detected viruses and
other security threats in Security History.
Responding to security issues
What to do if a security risk is found
166
Summary of Contents for 10067161 - 10PK NORTON ANTIVIRUS
Page 30: ...Safe Web Lite Getting started About Norton AntiVirus main window 30...
Page 60: ...Getting started About Network Proxy settings 60...
Page 134: ...Trust Level Protecting your files and data About the Norton AntiVirus scans 134...
Page 271: ...Updates 271 Customizing protection features About customizing settings and options...
Page 276: ...Message Protection Customizing protection features About customizing settings and options 276...
Page 285: ...Other Settings 285 Customizing protection features About customizing settings and options...
Page 293: ...Product Security 293 Customizing protection features About customizing settings and options...
Page 306: ...Customizing protection features About customizing settings and options 306...
Page 324: ...Finding additional solutions About uninstalling 324...