6
In the Signature Properties window, uncheck or
check Notify me when this signature is detected.
7
Click OK.
8
In the Intrusion Signatures window, click OK.
Excluding or including attack signatures in monitoring
In some cases, benign network activity may appear
similar to an attack signature. You may receive
repeated notifications about possible attacks. If you
know that the attacks that trigger these notifications
are safe, you can create exclusion for the attack
signature that matches the benign activity.
Each exclusion that you create leaves your computer
vulnerable to attacks.
If you have excluded the attack signatures that you
want to monitor again, you can include them in the list
of active signatures.
To exclude attack signatures from being monitored
1
In the Norton AntiVirus main window, click
Settings.
2
In the Settings window, click the Network tab.
3
In the left pane, click Intrusion Prevention.
4
Under Intrusion Prevention, in the Intrusion
Signatures row, click Configure.
5
In the Intrusion Signatures window, uncheck the
attack signatures that you want to exclude.
6
Click OK.
To include the attack signatures that were previously
excluded
1
In the Norton AntiVirus main window, click
Settings.
2
In the Settings window, click the Network tab.
3
In the left pane, click Intrusion Prevention.
4
Under Intrusion Prevention, in the Intrusion
Signatures row, click Configure.
Protecting Internet activities
About Intrusion Prevention
192
Summary of Contents for 10067161 - 10PK NORTON ANTIVIRUS
Page 30: ...Safe Web Lite Getting started About Norton AntiVirus main window 30...
Page 60: ...Getting started About Network Proxy settings 60...
Page 134: ...Trust Level Protecting your files and data About the Norton AntiVirus scans 134...
Page 271: ...Updates 271 Customizing protection features About customizing settings and options...
Page 276: ...Message Protection Customizing protection features About customizing settings and options 276...
Page 285: ...Other Settings 285 Customizing protection features About customizing settings and options...
Page 293: ...Product Security 293 Customizing protection features About customizing settings and options...
Page 306: ...Customizing protection features About customizing settings and options 306...
Page 324: ...Finding additional solutions About uninstalling 324...