background image

Identifying resource-consuming processes

You can click at any point on the CPU graph or memory
graph to obtain a list of the processes that consume
maximum resources of your computer at that point.
You can click a process that is available in the list to
get more information about the process in the File
Insight 
window.

To identify resource-consuming processes

1

In the Norton AntiVirus main window, click
Performance.

2

In the Performance window, do one of the following:

1

To view the CPU graph, click the CPU tab.

1

To view the memory graph, click the Memory
tab.

3

Click at any point on the graph to obtain a list of
resource-consuming processes.

4

Click the name of a process to obtain additional
information about the process in the File Insight
window.

About optimization

The data storage space on a disk is divided into discrete
units. These units are called clusters. When files are
written to the disk, they are broken up into
cluster-sized pieces. When all of the file pieces are
located in adjacent or contiguous clusters, the file can
be accessed quickly.

Your computer’s hard disk stores all of your files,
applications, and the Windows operating system. The
bits of information that make up your files gradually
spread over the disk. This process is known as
fragmentation. The more that you use your computer,
the more fragmented the hard disk gets.

When a fragmented file is accessed, the disk
performance is slower. The performance is slower
because the drive head locates, loads, saves, and keeps

77

Monitoring your system's performance

About System Insight

Summary of Contents for 10067161 - 10PK NORTON ANTIVIRUS

Page 1: ...t Manual Care for our Environment It s the right thing to do Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products This manual is made from recycled mat...

Page 2: ...d in this document is distributed under licenses restricting its use copying distribution and decompilation reverse engineering No part of this document may be reproduced in any form by any means with...

Page 3: ...reement collectively the Software is the property of Symantec or its licensors and is protected by copyright law Although Symantec continues to own the Software after Your acceptance of this License A...

Page 4: ...he Software at any time B Certain Software uses content that is updated from time to time including but not limited to the following Software antivirus and crimeware software use updated virus definit...

Page 5: ...EU OF ALL OTHER WARRANTIES WHETHER EXPRESS OR IMPLIED INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE AND NON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS THIS WAR...

Page 6: ...by a written document that has been signed by both You and Symantec Should You have any questions concerning this License Agreement or if You desire to contact Symantec for any reason please write to...

Page 7: ...tware encountered the problem The information could contain personally identifiable information if such information is included in or is a part of the name of the files or folders open at the time the...

Page 8: ...may collect transmit store disclose and analyze such information for these purposes CPS S 5 0 USE...

Page 9: ...ton AntiVirus icon 42 About LiveUpdate 45 About Network Proxy settings 56 Chapter 2 Monitoring your system s performance 61 About System Insight 61 Chapter 3 Protecting your files and data 97 About ma...

Page 10: ...23 Chapter 7 Customizing protection features 253 Feature summary 253 About turning off automatic features 258 About customizing settings and options 261 Chapter 8 Finding additional solutions 307 Find...

Page 11: ...orton AntiVirus icon 1 About LiveUpdate 1 About Network Proxy settings Activation protects you Product activation is a technology that protects users from pirated or counterfeit software It protects y...

Page 12: ...psed but you are not protected until you activate the product Activating your product If you did not activate your product during installation you receive an activation needed alert regularly until yo...

Page 13: ...uct 4 In the window that appears click Done To activate your product from the main window 1 In the Norton AntiVirus main window do one of the following 1 If you purchased a subscription version of a r...

Page 14: ...ded in the confirmation email from the Symantec Store If you downloaded the product from the Symantec Store The product key is provided as part of the activation process Be sure to save your product k...

Page 15: ...that parental controls might block the connection you can configure the parental controls so that they do not block the activation procedure You need to log in to your parental control software or to...

Page 16: ...tps www mynortonaccount com You can create a Norton Account in the following ways 1 During activation You can create your Norton Account and register your product from the Norton Account window that a...

Page 17: ...the expiration date You can click the arrow icon against a product for more information such as product key and the registration date You can also buy a new product key to protect additional computer...

Page 18: ...on and your billing address on the Billing Information tab It makes it easier for saving online orders After you update click Update to save the changes 1 Change Password You can change your current N...

Page 19: ...ort options Norton com Norton Update Center checks and lets you download the latest version of your Norton product Norton Update Center If you forget your Norton Account password you can get a tempora...

Page 20: ...oxy settings of your network go to the Norton AntiVirus main window and then click Settings Network Network Security Settings Proxy Server Configure You can also create a Norton Account when you activ...

Page 21: ...ext Your product information gets saved in your Norton Account only after you log in to your Norton Account 4 In the window that appears click Done To log in to your Norton Account and access your pro...

Page 22: ...ace You can access the main features and monitor the performance of your computer from the main window You can find the following items in the main window Lets you view the overall protection status o...

Page 23: ...PU and memory usage by your Norton product Performance Lets you provide feedback on the product on a Symantec Web page w This feature may not be available in some versions of Norton AntiVirus Feedback...

Page 24: ...elp from the Support drop down menu Help provides links to information that assists you with the specific tasks that you want to complete The online Help guides you to configure all of the product fea...

Page 25: ...em Scan and Custom Scan 1 Reputation Scan Lets you run different reputation scans including Quick Scan Full System Scan and Custom Scan 1 Scan Facebook Wall Lets you scan News Feeds on your Facebook W...

Page 26: ...your computer and find how Norton protects you from the program vulnerabilities 1 View and configure Network Security Map In addition you can choose to turn on or turn off the protection features fro...

Page 27: ...a Symantec server on a regular basis Your computer must be connected to the Internet to receive the activity map updates You can view the date and time that the Activity Map was last updated You can a...

Page 28: ...u want to add to Norton Management You can use your existing Norton Account login information to access Norton Management w Norton Management may not be available in some versions of Norton AntiVirus...

Page 29: ...main window the bottom section displays Norton Online Backup options Norton Online Backup provides a secure online backup solution that safeguards your important data against system crash accidental...

Page 30: ...Safe Web Lite Getting started About Norton AntiVirus main window 30...

Page 31: ...wnload Norton Safe Web Lite option to access the Symantec Web page and download Norton Safe Web Lite After you install Norton Safe Web Lite you can view the Norton Safe Web Lite Toolbar on your Web br...

Page 32: ...ssified in different panes Each pane contains the important features that you can easily access or configure from this window The panes are Provides you the essential computer protection options It al...

Page 33: ...Responding to System Status indicators Norton AntiVirus displays the overall protection status of your computer as System Status at the top of the main window When the SystemStatus needs attention or...

Page 34: ...tion for a particular purpose But by doing so the status of your system changes to Attention or AtRisk In such cases you can ignore the protection status of a particular feature to maintain a healthy...

Page 35: ...identifying new security risks by submitting selected security and application data to Symantec for analysis Symantec assesses the data to determine the new threats and their sources The collective ef...

Page 36: ...on security products Symantec maintains an adequate level of protection for the collected information To allow or deny the detailed data submissions you must configure the Detailed Error Data Collecti...

Page 37: ...Bootable Recovery Tool only from a CD DVD or USB key You must use Norton Bootable Recovery Tool Wizard to create the Norton Bootable Recovery Tool CD DVD or USB key w You cannot run Norton Bootable Re...

Page 38: ...ame or utility Trojan horses Tools that are used by a hacker to gain unauthorized access to your computer One type of hacking tool a keystroke logger tracks and records your individual keystrokes and...

Page 39: ...ble Recovery Tool on a CD DVD or USB key You can use Norton Bootable Recovery Tool to scan your computer and remove any security threats that prevent successful installation It is recommended that you...

Page 40: ...load the Norton Bootable Recovery Tool Wizard from the Internet 1 Open your Web browser and go to the following URL http www norton com recoverytool 2 Follow the on screen instructions To download the...

Page 41: ...at you purchased If you use a trial version of Norton AntiVirus you need to create a Norton Account to receive a product key to use Norton Bootable Recovery Tool To use the Norton Bootable Recovery To...

Page 42: ...AntiVirus 1 In 64 bit version of Windows Norton AntiVirus and the executable are located at the following path Program Files x86 Norton AntiVirus Engine version Uistub exe Where version represents the...

Page 43: ...sues against your computer protection that require your attention Icon with an orange badge Represents that there are some urgent issues against your computer protection that require immediate resolut...

Page 44: ...any further details You can right click the Norton AntiVirus icon to access specific Norton AntiVirus activities Depending on the current activities your options include the following Lets you launch...

Page 45: ...ucts help you to obtain and install these updates LiveUpdate takes little time to download and process the definition updates and program updates You can choose Smart Definitions to minimize download...

Page 46: ...vements to your installed product These differ from product upgrades which are newer versions of the entire product Program updates are usually created to extend the operating system or hardware compa...

Page 47: ...ucts receive definition updates for security protection For the products that contain protection against phishing users receive definition updates against phishing The security definition updates prov...

Page 48: ...ats In addition users of these products receive Symantecspamdefinition files and definition updates against phishing Norton Security Suite Norton Business Suite About Smart Definitions Norton AntiViru...

Page 49: ...se between Core Set virus definitions and Complete Set virus definitions for LiveUpdate sessions To access the Smart Definitions option go to the Norton AntiVirus main window and then click Settings U...

Page 50: ...ow click Settings 2 In the Settings window in the left pane click Updates 3 In the Smart Definitions row do one of the following 1 To turn off Smart Definitions move the On Off switch to the right to...

Page 51: ...e Smart Definitions option is turned on As Smart Definitions are only a subset of all the virus definitions you can minimize download time installation time and memory consumption However if you want...

Page 52: ...hen click Settings Network NetworkSecuritySettings ProxyServer Configure When the LiveUpdate session is complete you can use the View Summary link to view the summary of the updates that are installed...

Page 53: ...retail product If you do not activate your service or renew your subscription you cannot obtain updates of any kind and the software no longer functions If you purchased a product as a service or it c...

Page 54: ...iveUpdate 1 In the Norton AntiVirus main window click Settings 2 In the Settings window in the left pane click Updates 3 In the AutomaticLiveUpdate row move the On Off switch to the right to the Off p...

Page 55: ...es in between the full updates which Automatic LiveUpdate downloads automatically every hour Norton AntiVirus merges the new stream that is downloaded with the last updates that are installed The Puls...

Page 56: ...server to connect to the Internet you can provide proxy server details to Norton AntiVirus You can use the Network Proxy Settings window to specify the automatic configuration URL the proxy settings...

Page 57: ...he automatic configuration URL or script to manage Internet access You have the following options 1 Automatically detect settings Lets your browser detect the network settings automatically If you do...

Page 58: ...Configuring Network Proxy Settings When you use a proxy server to connect to the Internet you must specify the proxy server details The Network Proxy Settings window lets you enter automatic configur...

Page 59: ...our network uses a proxy server under Proxy Settings check Use a proxy server for your HTTPconnections In the Address box type the URL or IP address of your proxy server and in the Port box type the p...

Page 60: ...Getting started About Network Proxy settings 60...

Page 61: ...orms on your computer do not degrade the overall performance of your computer System Insight provides you a centralized location where you can view and monitor the activities that you perform on your...

Page 62: ...em 1 To view and analyze the effect of Norton AntiVirus on the performance of your computer The Performance graph that appears at the bottom of the window provides a graphical representation of your C...

Page 63: ...PerformanceMonitoring option go to the Norton AntiVirus main window click Settings General PerformanceMonitoring PerformanceMonitoring You can also use the Learn More link in the Performance window t...

Page 64: ...he details about the installation activities that you performed on your system over a period of the last three months The details include the application that you installed the date on which you insta...

Page 65: ...details about the risk such as the risk impact and the origin of the risk The details also include the action that a threat has performed on your system and the action that Symantec recommends you to...

Page 66: ...on downloads disk optimizations threat detections performance alerts or Quick Scans You can use the tabs at the top of the Events graph to obtain details for the current month and for the last two mon...

Page 67: ...the program uses excessively The Details Settings link in the performance notification alert lets you view additional details about the resource consumption by the program The File Insight window ope...

Page 68: ...program to the Program Exclusions list Norton AntiVirus does not alert you when the program exceeds the resource consumption threshold limit You can view all the performance related logs under the Per...

Page 69: ...ge of every program or process running on your computer When a program or process exceeds the system resource usage threshold limit Norton AntiVirus records these details in the Security History windo...

Page 70: ...his switch is turned on 1 If you want Norton AntiVirus to monitor the disk usage move the Disk switch to the On position By default this switch is turned on 1 If you want Norton AntiVirus to monitor t...

Page 71: ...a medium threshold limit for alerting By default the threshold limit is set to medium Medium Configures a high threshold limit for alerting If you choose this option Norton AntiVirus notifies you with...

Page 72: ...ofile On Battery Power option turned on To turn off the Use Low Resource Profile On Battery Power option 1 In the Norton AntiVirus main window click Settings 2 In the Settings window click the General...

Page 73: ...g in the Program Exclusions row click Configure 5 In the Program Exclusions window click Add 6 In the Select a program dialog box browse to the executable file for the program that you want to add 7 C...

Page 74: ...the information at an interval of every 15 seconds The graphs progress from right to left and the most recent data appear on the far right of the graph The blue pattern in the graphs depicts the over...

Page 75: ...ion the File Insight window displays the CPU graph and the resource usage details for the running processes The graph shows the breakdown of overall system CPU usage and the CPU usage by the process V...

Page 76: ...al data of the CPU graph and memory graph For example if you select the 1d option Norton AntiVirus displays the data of CPU graph or memory graph for the last one day To view historical data of your C...

Page 77: ...obtain additional information about the process in the File Insight window About optimization The data storage space on a disk is divided into discrete units These units are called clusters When file...

Page 78: ...nfigure Norton AntiVirus to defragment your boot volume or the local disk that contains boot volume when your computer is idle Norton AntiVirus automatically schedules the optimization when it detects...

Page 79: ...zation process You can view details such as timestamp duration and status of the background job To optimize your boot volume from the Performance window 1 In the Norton AntiVirus main window click Per...

Page 80: ...to optimize the boot volume during the idle time To access the IdleTimeOptimizer option go to the Norton AntiVirus main window and then click Settings General Norton Tasks Idle Time Optimizer Turning...

Page 81: ...of the Norton task You can use the icon that appears before the name of a background job to start or stop a background task You can start or stop a background task at any time 1 The timestamp of the...

Page 82: ...e Norton Tasks window provides the details of the background tasks that Norton AntiVirus performs and lets you view and monitor the background tasks Norton AntiVirus runs most of the background tasks...

Page 83: ...System Scan Insight Optimizer and Pulse Updates Norton AntiVirus consumes more power when it runs Norton Tasks By default Norton AntiVirus performs these tasks only when your computer is connected to...

Page 84: ...when the computer is idle Norton Tasks are background tasks that Norton AntiVirus performs when your computer is idle By default Norton AntiVirus performs these tasks only when your computer is conne...

Page 85: ...t scanning of files on your computer It improves the performance of Norton AntiVirus scans by letting you scan fewer files without compromising the security of your computer A Norton AntiVirus scan ca...

Page 86: ...s of the Files of Interest The server provides the details immediately after you open the Norton Insight Application Ratings window Even the slightest modification of the file causes a change in the h...

Page 87: ...mouse pointer over the green bars 1 If the file has two green bars Symantec rates the file as Good 1 If the file has one green bar Symantec rates the file as Favorable Good Symantec does not have enou...

Page 88: ...c detection threshold However keeping a low detection threshold does not provide a complete heuristic protection against malicious applications Norton AntiVirus uses the Whitelist technique that helps...

Page 89: ...of your computer Norton AntiVirus displays a list of top 10 resources that highly affect the performance of your computer Highest Performance Impact Lists the files that have the maximum community us...

Page 90: ...Lists the files that are not Norton Trusted You can manually trust all the files that are not trusted by clicking the Trust All Files option next to the drop down list Untrusted Files You can view fil...

Page 91: ...You can also view details such as the trust level stability details community usage resource usage and the source of the file You can use the Locate option to find the location of the file on your co...

Page 92: ...indow click Advanced 2 In the window that appears in the Computer Protection pane click Application Ratings 3 In the Norton Insight Application Ratings window click a file for which you want to check...

Page 93: ...formance Alert to view the performance alert related details of the process 1 Select Network to view the network activities of the process 1 Select Run Key change to include registry changes Configuri...

Page 94: ...idence level from the scan It scans the files with confidence levels as Poor Trust Unproven Trust Bad Trust and the files without a class 3 digital signature You must configure the Scan Performance Pr...

Page 95: ...of installation Norton AntiVirus displays the Monthly Report automatically If you do not want Norton AntiVirus to display the Monthly Report automatically you can select the Do not display monthly rep...

Page 96: ...ecurity and also provides information on how to stay safe while you are online You can click Read More in the Norton Monthly Report window to view more information on how to stay safe online Viewing t...

Page 97: ...ted program You can do several things to avoid security risks Practicing regular file maintenance and keeping your security protection up to date helps in protecting your computer To avoid security ri...

Page 98: ...s You should be always prepared in case a virus infects your computer Ensuring that protection settings are turned on Norton AntiVirus is configured to provide your computer with complete protection a...

Page 99: ...h Items Scan 1 Network Drives Scan Real Time Protection provides the following options Real Time Protection 1 Antispyware 1 Auto Protect 1 Caching 1 Removable Media Scan 1 SONAR Protection Updates pro...

Page 100: ...Virus Instant Messenger Scan 1 Select the instant messenger clients that you want to protect 6 In the Settings window click the General tab 7 In the left pane click Other Settings 8 In the Insight Pro...

Page 101: ...available under Computer Scan are Quick Scan Full System Scan and Custom Scan Computer Scan Insight Network Scan uses the virus definitions that are available locally and hosted in the Cloud Insight...

Page 102: ...nd the number of bad files that have been detected or removed Reputation Scan also internally performs Computer Scan and Insight Network Scan to detect the threats The different types of scans that ar...

Page 103: ...ys the security status of the scanned URLs Scan Facebook Wall Norton AntiVirus also performs Idle Time Scans Idle Time Scans detect the time when you are not using your computer and intelligently run...

Page 104: ...main window or the Norton AntiVirus icon on the taskbar You can also scan any particular folder using the context scan feature The context menu scan is available when you right click the folder that...

Page 105: ...ton AntiVirus Scan Now To scan a particular file 4 Right click the file and click Norton AntiVirus Insight Network Scan The Insight Network Scan option is available only if the Insight Protection opti...

Page 106: ...m Scan because this scan does not scan your entire computer Quick Scan Scans your computer for all types of viruses and security threats Full System Scan performs a deep scan of your computer to remov...

Page 107: ...ides you the different ways to resolve any items that were not automatically resolved during the scan You can also view the severity of the risk the name of the risk and the status of the risk about t...

Page 108: ...he Threats Detected window Running a Quick Scan QuickScan is a fast scan of the areas of your computer that the viruses and other security risks often target Because this scan does not scan your entir...

Page 109: ...w Scanning selected drives folders or files Occasionally you might want to scan a particular file removable drives any of your computer s drives or any folders or files on your computer For example wh...

Page 110: ...pend a scan Suspends a custom scan temporarily Click Resume to continue the scan Pause Terminates the scan Click Yes to confirm Stop 4 In the Results Summary window do one of the following 1 If no ite...

Page 111: ...at were not automatically resolved during the scan TheThreatsDetectedwindowprovidestheinformation such as the severity of the risk the name of the risk and the status of the risk It also provides the...

Page 112: ...efore using them When the project is done you can delete the custom scan for that folder Creating a custom scan Instead of running the default scans that are listed in the Scans pane you can create yo...

Page 113: ...can also exclude items from the scan w When you select a drive all the items in the drive including the files and folders are automatically added to the scan When you select a folder all of the files...

Page 114: ...efault the scan options reflect the current Computer Scan settings in the Settings window The changes that you make are applicable to the current scan only Any change that is made to the ComputerScan...

Page 115: ...mn click the edit icon next to the custom scan that you want to modify 4 In the Edit Scan window on the Scan Items tab select the items that you want to scan See Selecting the scan items on page 113 5...

Page 116: ...ention click Finish 1 If any items require attention review the risks on the Threats Detected window Deleting a custom scan You can delete custom scans if they are no longer needed You can delete a cu...

Page 117: ...ick Scan and custom virus scans However you cannot schedule the Drive Scan Folder Scan and File Scan You can also set up Norton AntiVirus to turn off your computer automatically when the scheduled sca...

Page 118: ...the scan on a specific day on a month select Monthly These frequency options include the additional options that you can use to refine the schedule Set the additional options as required 5 Under Run t...

Page 119: ...an when your computer is idle Symantec recommends you not to turn off the Idle Time Scans option To schedule a Full System Scan 1 In the Norton AntiVirus main window click Scan Now 2 In the Computer S...

Page 120: ...ional options that you can use to refine the schedule Set the additional options as required 5 Click Save Editing a scheduled scan You can change the schedule of any scheduled custom scan QuickScan or...

Page 121: ...g commands are available NAVW32 launches help and terminates Scans all drives A Scans the local drives L Enables or disables subfolders scanning S Enables or disables boot record scanning and master b...

Page 122: ...tems to scan Task file path should follow the for example TASK C Documents and Settings All Users Application Data Symantec Norton AntiVirus Tasks Full sca w Assumes the task file as a temporary file...

Page 123: ...ton AntiVirus Engine version NAVW32 path file_name Where version represents the version number of Norton AntiVirus and path file_name represents the location name and extension of the file 2 Press Ent...

Page 124: ...onal data about the threats that it detects which indicates that it has been obtained from the Internet Definitions in the Cloud provide a generic name for the risk detected but the local definitions...

Page 125: ...or turning on Insight Protection Insight Protection option lets Norton AntiVirus perform an Insight Network scan on your computer When the Insight Protection option is turned on Norton AntiVirus perfo...

Page 126: ...on Scan filters the files as reputation files It filters exe files scr files sys files dll files drv files ocx files loc files and msi files and analyzes these files When you perform a Reputation Quic...

Page 127: ...signs Bad or Poor trust level Apart from reputation information Norton AntiVirus also checks for the latest virus definitions on the Cloud w Your computer must be connected to the Internet to access t...

Page 128: ...tiVirus considers the Files of Interest that related to loaded programs and the running processes Quick Scan Scans all the Files of Interest that are available on your computer When you perform a Full...

Page 129: ...is not trusted This file is suspicious and can harm your computer Poor Symantec has a high indication that the file is not trusted This file is suspicious and can harm your computer Bad When the Repu...

Page 130: ...lity of the scanned items 4 If there is a file with Poor or Bad trust level under the Trust Level column click the red cross x icon 5 In the Quarantine File window click Quarantine this file 6 In the...

Page 131: ...if you want to check the trust level of a specific file you can scan the particular file To run a Reputation custom scan 1 In the Norton AntiVirus main window click Scan Now 2 In the window that appea...

Page 132: ...n AntiVirus considers all the Files of Interest that are available on your computer When you run a Reputation custom scan Norton AntiVirus lets you select the drive folder or file that you want to sca...

Page 133: ...our operating system 1 The Norton Network graph displays the details about the known good files and bad files You can view the number of trusted files that are on your computer You can also view the t...

Page 134: ...Trust Level Protecting your files and data About the Norton AntiVirus scans 134...

Page 135: ...ymantec has a high indication that the file is trusted 1 Good Symantec has a high indication that the file is trusted 1 Unproven Symantecdoes not have enough information about the file to assign a tru...

Page 136: ...the files that have average user prevalence 1 Many Users Shows the files that have very high user prevalence You can also use the community usage of a file to determine the legitimacy of the file Syma...

Page 137: ...mes minimum system resources 1 Moderate Indicates that the file consumes moderate system resources 1 High Indicates that the file consumes maximum system resources 1 Unknown Indicates that the file ha...

Page 138: ...ogram frequently crashes 1 Unknown Indicates that the crash history of the program is not known w Stability ratings vary depending upon your operating system Stability About Scan Facebook Wall Norton...

Page 139: ...h a post on your Facebook Wall To activate Norton Auto Scan go to your NortonSafeWeb page on Facebook and click Enable Auto Scan To remove the malicious link from your Facebook Wall go to your profile...

Page 140: ...e Warning Indicates that Norton Safe Web has not yet tested this site and it does not have sufficient information about this site Untested Indicates that the site may have security threats Symantec re...

Page 141: ...About Idle Time Scans Norton AntiVirus keeps your computer secure from ongoing threats by automatically running scans on your computer by using the Idle Time Scans feature Idle Time Scans detect the t...

Page 142: ...Virus checks are CPU idle time disk usage and type of electric current you use to operate your computer For example you set the Idle Time Out duration as 10 minutes and watch an online video for 11 mi...

Page 143: ...the time when you do not use your computer Norton AntiVirus then intelligently runs a scan depending on the scan history of your computer However there may be times when you want to turn off Idle Time...

Page 144: ...ngs window 1 In the Norton AntiVirus main window click Settings 2 In the Settings window click the General tab 3 In the Idle Time Out row in the drop down list select the duration that you want to spe...

Page 145: ...on The View Details link in the notification alert lets you view the summary of the resolved high certainty threats You can also view the details under Resolved Security Risks category in the Security...

Page 146: ...protects you from malicious programs even before virus definitions are available through LiveUpdate SONARmonitorsyourcomputerformaliciousactivities using heuristic detections It automatically blocks a...

Page 147: ...viruses and other high risk security threats from scanning To exclude high risk security threats from scanning 1 In the Norton AntiVirus main window click Settings 2 In the Settings window in the lef...

Page 148: ...ons window The Signature Exclusions window contains the list of all security risks that can be excluded from Norton AntiVirus scans For each security risk you can view the risk details and the effect...

Page 149: ...nning Office documents Norton AntiVirus protects all Office documents that you receive through email messages through Internet download and through inserted floppy disks or other removable media By au...

Page 150: ...To Turn on or turn off Microsoft Office Automatic Scan 1 In the Norton AntiVirus main window click Settings 2 In the Settings window in the left pane click Computer Scan 3 In the MicrosoftOfficeAutoma...

Page 151: ...screen application Full Screen Detection The Silent Mode that Norton AntiVirus turns on automatically when it detects a disk burning task or a Media Center TV recording task Norton AntiVirus also turn...

Page 152: ...on Silent Mode for a specified duration When Silent Mode is turned on Norton AntiVirus suppresses alerts and suspends background activities for the duration that you specify You can verify the turn on...

Page 153: ...Settings section of the Settings window or from the NortonTasks window You can also turn on or turn off Silent Mode by using the Norton AntiVirus icon in the notification area To turn on Silent Mode f...

Page 154: ...window 1 In the Norton AntiVirus main window click Performance 2 In the Performance window click Norton Tasks 3 In the Norton Tasks window under Silent Mode move the On Off switch to the right to the...

Page 155: ...ded session of Media Center to an entertainment device such as a television The alerts and notifications that appear during a Media CenterExtendersessiondisconnectthesessionbetween the host computer a...

Page 156: ...In the Settings window click Apply 6 Click OK About Quiet Mode Norton AntiVirus automatically enables Quiet Mode when you perform a few tasks that require higher utilization of your system resources W...

Page 157: ...s to display alerts and notifications during the session Norton AntiVirus supports the following Media Center disk burner applications to turn on Quiet Mode 1 IMAPI 2 0 1 J River MEDIA CENTER version...

Page 158: ...e following Media Center applications to turn on Quiet Mode 1 Windows Media Center For Windows Media Center to enable Quiet Mode during TV program session you might need to restart your computer after...

Page 159: ...t Mode options You can turn off or turn on the Quiet Mode options such as IMAPI 2 0 Disk Burn or Media Center TV Recording in the Settings window By default the Quiet Mode options are turned on If you...

Page 160: ...itch to the left to the On position 5 In the Settings window click Apply 6 Click OK To turn off or turn on Media Center TV Recording 1 In the Norton AntiVirus main window click Settings 2 In the Setti...

Page 161: ...en you execute the program You can also remove a running program from the Quiet Mode Programs list However if Quiet Mode is turned on it turns off only after the running instances of all the programs...

Page 162: ...k Open 8 Click Apply 9 In the Quiet Mode Programs window click OK Removing programs from User Specified Programs You can remove a program from the Quiet Mode Programs list After you remove a program N...

Page 163: ...ion option To access the Enable Boot Time Protection option go to the Norton AntiVirus main window and then click Settings Computer Real Time Protection You can use the following options to configure...

Page 164: ...Auto Protect and all required drivers and plug ins start functioning This feature ensures higher level of security from the moment you turn on your computer To configure boot time protection 1 In the...

Page 165: ...Norton AntiVirus to perform on the risk By default Norton AntiVirus removes the security risk from your computer and quarantines it However you can restore the file from the Quarantine to its origina...

Page 166: ...an potentially infect your system when your computer first starts up are scanned first These files include the following 1 Files that are associated with the processes that are currently running in me...

Page 167: ...ity it logs a notification in Security History that tells you that a risk was found and resolved If Auto Protect detect one or more viruses it either repairs or deletes the viruses and notifies you Th...

Page 168: ...threats The Resolved Security Risks category includes the infected files that Norton AntiVirus repairs removes or quarantines Resolved Security Risks Review the list of unresolved security risks The...

Page 169: ...link The option name appears as Restore Options for few items If one or more security risks such as spyware are found you can take action on these items if required 169 Responding to security issues W...

Page 170: ...he future scans This option is available for the detected viral and non viral threats Excludes the security risk from future scan Exclude this program Norton AntiVirus adds the security risk to the ap...

Page 171: ...se browser to close Removes the selected security risk item from the Security History log Remove from history Takes you to the Symantec Security Response Web site This option is available for the secu...

Page 172: ...on with you Worm Blocking continually scans outgoing email attachments for worms If it detects a worm you receive an alert notifying you that a malicious worm was found Worm Blocking alert appears onl...

Page 173: ...ne Sends the email message for which you have received the worm blocking alert If you allow the email message it could infect the recipient s computer Select this option if you are sure that the email...

Page 174: ...to resolve any items that were not automatically resolved during the scan The Recommended Action section in the Security History window displays the action that you should take to resolve the security...

Page 175: ...If that does not work read the information on the ThreatsDetected window to identify the types of files 175 Responding to security issues What to do if a security risk is found...

Page 176: ...that cannot be repaired You can take one of the following actions depending on the file type Infected files Responding to security issues What to do if a security risk is found 176...

Page 177: ...can be taken depending on the file type For example you can view the infected files with the following file name extensions any file can be infected 1 exe 1 doc 1 dot 1 xls Use the Threats Detected w...

Page 178: ...a suspected security risk Norton AntiVirus needs to close a suspected security risk program to resolve it To resolve the suspected security risk 4 Save all open files and then click Go If you do not...

Page 179: ...nd Mode About Download Insight Download Insight provides information about the reputation of any executable file that you download from the supported portals The reputation details indicate whether th...

Page 180: ...Next Download Manager 1 FDM Download Manager 1 Adobe Acrobat Reader PDF viewer Based on the type of portal you use to download your file Norton AntiVirus does one of the following 1 Analyzes the file...

Page 181: ...oves them from your computer Unsafe Includes the files that are neither safe nor unsafe Unknown files have unproven reputation These files might harm your computer In the case of an unknown file Downl...

Page 182: ...ions that are available in this window Lets you install the executable program Run this program Lets you cancel the installation of the executable program Cancel installation Lets you remove the file...

Page 183: ...ile In this case you must turn off Download Insight so that Norton AntiVirus lets you download the file and does not remove it from your computer You can use the DownloadIntelligence option to turn of...

Page 184: ...d with a local virus identification If the file that you download is infected with a cloud virus identification Norton AntiVirus removes the file from your computer and notifies you with the threat de...

Page 185: ...t notifications for all files that you download move the Download Insight Notifications switch to the left to the On position 5 In the Settings window click Apply 6 Click OK Configuring the Show Repor...

Page 186: ...files In this case the Download Insight window appears whenever you try to launch any downloaded file that has a safe or an unknown reputation score In this window you can view details about the file...

Page 187: ...score In this window you can view details about the file and the options that let you select a suitable action for the file By default the Show Report on Launch of Files option is set to Unproven File...

Page 188: ...ht prompts you to select a suitable action when you try to download an unstable file In case of unsafe files Norton AntiVirus identifies them as threat and removes them The alert messages that you sup...

Page 189: ...ing on or turning off Alert on Poor Stability When you turn on the Alert on Poor Stability option Download Insight prompts you to select a suitable action when you try to download an unstable file Whe...

Page 190: ...ion that identifies an attacker s attempt to exploit a known operating system or program vulnerability Intrusion Prevention protects your computer against most common Internet attacks For more informa...

Page 191: ...ings 2 In the Settings window click the Network tab 3 In the left pane click Intrusion Prevention 4 Under Intrusion Prevention in the Notifications row do one of the following 1 To turn off notificati...

Page 192: ...tures that you want to monitor again you can include them in the list of active signatures To exclude attack signatures from being monitored 1 In the Norton AntiVirus main window click Settings 2 In t...

Page 193: ...ur computer and a specific computer If you want to stop all traffic to and from your computer you can use the Block All Network Traffic option If AutoBlock blocks a computer or computers that you need...

Page 194: ...ettings window click the Network tab 3 In the left pane click Intrusion Prevention 4 Under Intrusion Prevention in the Intrusion AutoBlock row click Configure 5 In the Intrusion AutoBlock window under...

Page 195: ...ograms The Intrusion Prevention feature of Norton AntiVirus uses an extensive list of attack signatures to detect and block suspicious network activity Vulnerability Protection lets you view the corre...

Page 196: ...hat Intrusion Prevention uses to detect any attempts to exploit the vulnerabilities in the program You can click an attack signature to get additional information about the signature in the Symantec S...

Page 197: ...h as spyware and adware can compromise your personal information and privacy Spyware and adware programs are closely related In some cases their functionalities might overlap but while they both colle...

Page 198: ...default You can change your settings in the Settings window so that Norton AntiVirus detects these security risks Checking Antispyware settings While the default settings provide maximum protection f...

Page 199: ...then click Settings Network Message Protection Protected Port Settings Configure If you do not want Norton AntiVirus to protect a port you can remove the port from the Protected Ports window w You ca...

Page 200: ...Ports window click Apply and then click OK 10 In the Settings window click OK Removing an email port from Protected Ports If you do not want Norton AntiVirus to protect a port you can remove the port...

Page 201: ...Ensure that the computers that you want to remotely monitor have a version of a Norton product that supports Remote Monitoring You can monitor the following items in the Network Security Map 1 Securit...

Page 202: ...ot affect the performance or security of your computer w You can also turn off the Network Security Overview window if you check Do not show this again option that is available at the bottom of the Ne...

Page 203: ...ton AntiVirus displays devices in the following order 1 MY PC 1 Devices with online connection status 1 Devices with offline connection status When you connect a new device to your network Norton Anti...

Page 204: ...erview window appears click OK The Network Security Overview window lets you view the summary of features of the Network Security Map The Network Security Overview window appears in the following inst...

Page 205: ...To view the details of a device on the Network Security Map 205 Protecting Internet activities About the Network Security Map...

Page 206: ...lt However the Network Security Map displays the name of the device as NEW if it meets the following conditions 1 The device does not have a NetBIOS name 1 The device has a firewall that is enabled Yo...

Page 207: ...can change the device category in the Edit Device Details window Category Shows how well your computer is protected from threats risks and damage w The security status appears only for MY PC and the...

Page 208: ...up Remote Monitoring by allowing computers on your network to communicate with your computer w Ensure that the computers that you want to remotely monitor have a version of a Norton product that supp...

Page 209: ...are connected to the network Computer Discovery always on Lets your computer discover other computers that are connected to the network when the Network Security Map window is open Computer Discovery...

Page 210: ...lick NetworkSecurity Map 3 In the Network Security Map window in the network map click the computer for which you want to disable Remote Monitoring 4 In the device details area next to Remote Monitori...

Page 211: ...in Network click the plus symbol 4 In the AddaDevice window in the Name box type the name of the device that you want to add to the Network Security Map The maximum character length of the device name...

Page 212: ...press Enter on your keyboard 5 Write down the IP address To find an IP address by using Ipconfig on Windows Vista 1 On the computer you want to identify on the Windows taskbar click Start 2 In the Sta...

Page 213: ...icons depending on the category that you select Icons help you identify the devices that are listed in the network map To edit the details of the device that is on your network 1 In the Norton AntiVi...

Page 214: ...vanced 2 Under NetworkProtection click NetworkSecurity Map 3 In the Network Security Map window in the NetworkDetailsdrop downlist clickTrustControl 4 In the network map select a device that you added...

Page 215: ...all the devices that were present in your previous network before you connect to a new network Ensure that you disable Remote Monitoring before you purge the network map Norton AntiVirus cannot purge...

Page 216: ...Map row click Purge 5 In the confirmation dialog box click Yes Viewing the status of your wireless network You can view the status of your wireless network in the Network Security Map window The Netwo...

Page 217: ...e details The Network Security Map lets you view the details of the computers that you remotely monitor You can view the following details 1 The configuration status of your protection features such a...

Page 218: ...use 31077 as the communication port number If you change the communication port number of your Norton product you must change it on every computer that is connected to your home network In addition wh...

Page 219: ...Internet connection you can restrict the Internet usage of Norton AntiVirus Metered Broadband Mode helps you manage the data transfer between Norton AntiVirus and your adapter To connect to the Intern...

Page 220: ...Norton AntiVirus you can turn off Metered Broadband Mode If you feel that Norton AntiVirus uses too much network bandwidth you can turn on Metered Broadband Mode Then you can set up policies to restri...

Page 221: ...t the Internet You can view the status of the adapters that are currently in use The network policy that you set up defines the amount of network bandwidth that Norton AntiVirus can use To define the...

Page 222: ...ed Internet connection you can select the Critical Updates Only option to ensure protection from different security threats 1 No Traffic LetsyoublockNortonAntiVirusfromconnecting to the Internet If yo...

Page 223: ...Security History lets you monitor the security tasks that your product performs in the background In addition the alerts that you receive can be reviewed at any time in Security History If you cannot...

Page 224: ...otection 1 Performance Alert 1 Metered Network 1 Norton Error Reporting 1 Email Errors 1 Norton Community Watch 1 Silent Mode 1 LiveUpdate You can view the security items based on the category of even...

Page 225: ...this file Remove from history and Submit to Symantec Norton AntiVirus also lets you save the security events history You can view the security event information whenever you want If you want to analyz...

Page 226: ...curity tasks that Norton AntiVirus performed in the background The items that are related to the various product features appear under their respective categories in the SecurityHistory window For exa...

Page 227: ...t lists the history of certain recent security events The Full History view in the Security History window Full History displays the complete Security History You can scan your computer to check if an...

Page 228: ...e view You can also view the quarantined items in the Quarantine view Resolved Security Risks The security risks include the suspicious programs that can compromise the security of your computer The U...

Page 229: ...ased on the suspicious behavior of applications SONAR detects and protects your computer against malicious code even before virus definitions are availablethroughLiveUpdate The SONAR Activity view in...

Page 230: ...rusion Prevention signature Intrusion Prevention Download Insight processes any executable file that you download for analysis of its reputation level It then informs you about the processing results...

Page 231: ...erformance alert feature lets you view monitor and analyze the impact of the system activities on your computer The Performance Alert view in the Security History window provides details about the imp...

Page 232: ...erformed to restrict the Internet usage of Norton AntiVirus Metered Network Norton AntiVirus may generate errors in some cases For example an error can occur when you run LiveUpdate or scan a folder E...

Page 233: ...ct sender address and the recipient address that are related to the email message in the alert Email Errors The Norton Community Watch feature lets you submit any suspicious security or suspicious app...

Page 234: ...User Specified program that turns on Silent Mode 1 Whether Silent Mode is turned on or turned off Silent Mode LiveUpdate obtains the latest virus definition updates and the program updates to all the...

Page 235: ...History event You must use the Options link in the Security History window to select an action that Norton AntiVirus must perform on any item in these categories The Options link is also available in...

Page 236: ...item as a security threat 1 Date Time This category displays the date and time of the activity 1 Status This category displays the status of the action that has been taken on the item 1 Recommended A...

Page 237: ...available in the Security History Intrusion Prevention view 1 Stop Notifying Me This action prevents Norton AntiVirus from notifying you when it blocks the selected attack signature in the future This...

Page 238: ...lysis is available for the files that you download scan or use to perform an activity You can access the File Insight window in different ways For example you can use the various notifications alerts...

Page 239: ...ides details about the risk level the origin and the activity report of the resolved security risks on your system Resolved Security Risks Lets you view the detailed information about the unresolved s...

Page 240: ...ile that you download You can use these details to determine the safety level of the file and then decide the action that you want to perform Download Insight Lets you view the performance details of...

Page 241: ...the signature and the date on which the file was created You can determine if a file is a startup file and the date on which the file was last used Details Provides the lineage details of a file You c...

Page 242: ...puter This option is available at the top of the window Locate Lets you copy the data from the File Insight window to the clipboard After you copy the content to the Clipboard you can open a document...

Page 243: ...ecurity Risks This category includes the security risks or the infected files that Norton AntiVirus was not able to repair remove or quarantine Unresolved Security Risks This category includes the sec...

Page 244: ...d items using a keyword or the name of a security risk If you want to view all of the Security History items that pertain to a particular security risk you can filter the items using QuickSearch For e...

Page 245: ...e file When the file size reaches its maximum size limit information that is related to new events overwrites the information that is related to older events You can export the log periodically if you...

Page 246: ...a file name of your choice 5 In the Save as type box select the format in which you want to save your log file 6 Click Save To import Security History information 1 In the Norton AntiVirus main window...

Page 247: ...uate the quarantined items for possible submission to Symantec The Security History Quarantine includes the following groups of items Includes the items such as spyware and adware that are generally l...

Page 248: ...n use the More Details link to view more details about the item before you select an action for it The link opens the File Insight window that contains more information about the risk Monitoring prote...

Page 249: ...ove from history Sends the selected item to Symantec for evaluation of the security risk Submit to Symantec In some cases Norton AntiVirus might not identify an item as a security threat but you might...

Page 250: ...uarantine option in the Quarantine view in the SecurityHistory window to quarantine the items that you suspect are infected This action has no effect on the items that are already quarantined w You ca...

Page 251: ...n AntiVirus rescans them You can also restore such items w If you restore an item to a directory other than its original location it may not function properly Therefore it is recommended that you rein...

Page 252: ...u can submit an item that has not been detected during scanning that you believe may be a security risk Symantec Security Response analyzes the file If it is identified as a security risk it is added...

Page 253: ...feature The feature summary can help you determine which feature to use to solve a problem Read the feature descriptions to locate the correct component to use For more information select one of the s...

Page 254: ...otect options let you customize the protection of your computer Auto Protect options are 1 Loads into memory when Windows starts providing constant protection while you work 1 Checks for viruses and s...

Page 255: ...or protection against viruses and other security threats Email Protection Lets Norton AntiVirus perform an Insight Network scan on your computer The Insight Network scan uses the virus definitions tha...

Page 256: ...tructure and behavior Also by analyzing other attributes such as programming the logic computer instructions and any data that is contained in the file Heuristic Protection Protects Norton AntiVirus S...

Page 257: ...de the following Auto Protect blocks the programs that have been identified as spyware or adware before they can be installed on your computer Auto Protect Spyware Blocking By default manual and sched...

Page 258: ...it process a security risk program Security risk assessment About turning off automatic features Your Symantec product is set by default to provide complete protection for your computer Many of these...

Page 259: ...like activity it alerts you In some cases Auto Protect might warn you about a virus like activity that you know are not the work of a virus If you perform such an activity and want to avoid the warni...

Page 260: ...ile to Symantec for analysis Symantec assesses the data to determine the new threats and their sources The Norton features such as Norton Insight and Insight Network use the Symantec assessed informat...

Page 261: ...your computer you need administrator authentication to change product settings If you are an administrator keep in mind that the changes that you make apply to everyone who uses the computer For more...

Page 262: ...r changes and close the Settings window click OK 1 To save your changes without closing the Settings window click Apply 1 To apply the default settings click Default All and then click OK or Apply 8 I...

Page 263: ...can also configure Norton AntiVirus to obtain regular updates for complete protection of your computer You can include additional protection to your computer by using the most recent definitions from...

Page 264: ...gram attachments You can also configure the communication port that Norton products use to communicate with each other In addition you can protect your computer against intrusion attempts Your options...

Page 265: ...ing 1 Product Security 1 Silent Mode Settings General If you set a password to access the Settings window you must enter the password to view or configure settings even if you are an administrator The...

Page 266: ...t Norton AntiVirus excludes from its scans Scans and signatures are some items that you can exclude from scanning AntiVirus and SONAR Exclusions options also let you choose which categories of risks y...

Page 267: ...also let you specify scans to detect rootkits other stealth items network drives tracking cookies and unknown security threats The Scan Performance Profiles option lets you configure a Norton AntiVir...

Page 268: ...Real Time Protection Customizing protection features About customizing settings and options 268...

Page 269: ...s of risk you want Norton AntiVirus to detect for manual email and instant messenger scanning 1 Auto Protect Auto Protect loads into memory when Windows starts providing constant protection while you...

Page 270: ...ques SONAR detects and protects you against malicious code even before virus definitions are available through LiveUpdate You can turn on this option to proactively detect unknown security risks on yo...

Page 271: ...Updates 271 Customizing protection features About customizing settings and options...

Page 272: ...ic LiveUpdate Automatic LiveUpdate automatically checks for definition updates and program updates to your virus protection when you are connected to the Internet 1 Pulse Updates In addition to the de...

Page 273: ...tallation time and system start time Therefore the Core Set results in faster performance of your computer About Network settings The options in the Network tab let you configure Norton AntiVirus to m...

Page 274: ...s feature Browser Protection Download Intelligence protects your computer against any unsafe file that you download from the supported portals The Download Intelligence options let you specify whether...

Page 275: ...sion Prevention options 1 View the list of Intrusion Prevention signatures 1 Exclude individual signatures from being monitored 1 Specify whether or not you must be notified when Intrusion Prevention...

Page 276: ...Message Protection Customizing protection features About customizing settings and options 276...

Page 277: ...scans email messages Based on the options you choose Norton AntiVirus automatically scans the email messages that you send or receive Instant Messenger Scan option lets you customize the scanning of t...

Page 278: ...lt POP3 port 110 If your email program is not configured with the default ports you can manually configure Norton AntiVirus to protect your POP3 and SMTP ports Customizing protection features About cu...

Page 279: ...Network Security Settings 279 Customizing protection features About customizing settings and options...

Page 280: ...re the communication port that Norton products use to communicate with each other The Welcome Screen option displays the Network Security Overview window when you open Network Security Map The Proxy S...

Page 281: ...tings You can access the General settings options under the Generaltab in the Settings window You can also configure the security settings of your product from General settings By using General settin...

Page 282: ...Your options are Norton Tasks Customizing protection features About customizing settings and options 282...

Page 283: ...atic Tasks Delay Lets you delay the start up of Norton specific programs on your computer that run automatically when you turn on your computer Automatic Tasks Delay does not delay Norton AntiVirus pr...

Page 284: ...le Time Out Lets you specify the Idle Time Out duration after Norton AntiVirus identifies your computer as idle You can specify the Idle Time Out for a period of one minute to 30 minutes The default d...

Page 285: ...Other Settings 285 Customizing protection features About customizing settings and options...

Page 286: ...to view Monthly Report 1 Special Offer Notification Lets you configure Norton AntiVirus to notify you about special offers on the latest Norton products add ons and other useful information from Syma...

Page 287: ...ou the useful statistical information about the applications The Detailed Error Data Collection option lets you allow or deny some of the detailed data submissions These detailed data may vary dependi...

Page 288: ...Performance Monitoring Customizing protection features About customizing settings and options 288...

Page 289: ...Virus notifies you with performance alerts when there is high usage of your system resources by a program or process Your options are 2 Performance Alerting Lets you configure Norton AntiVirus to dete...

Page 290: ...ce Threshold Profile for Alerting Lets you configure the resource threshold profile for displaying performance alerts 2 Use Low Resource Profile On Battery Power Lets you configure Norton AntiVirus to...

Page 291: ...ntiVirus detects and notifies you about the increased usage of memory by any program or process 2 Disk When this option is turned on Norton AntiVirus detects and notifies you about the increased usage...

Page 292: ...any program or process 2 Program Exclusions Lets you select specific programs to exclude from appearing in performance alerts Customizing protection features About customizing settings and options 29...

Page 293: ...Product Security 293 Customizing protection features About customizing settings and options...

Page 294: ...ings window if the Settings window is opened in some other user account on your computer 1 Norton Product Tamper Protection Lets you protect your Norton product from an attack or modification by unkno...

Page 295: ...that appears when you choose to uninstall Norton AntiVirus You do not need to uninstall the product to reset your password You can use the reset settings password option in the uninstall preference wi...

Page 296: ...Silent Mode Settings Customizing protection features About customizing settings and options 296...

Page 297: ...n AntiVirus automatically detects the applications that are run in full screen mode and enables Silent Mode Norton AntiVirus suppresses most of the alerts and suspends the backgroundactivities The onl...

Page 298: ...TV Recording When you use the Media Center application to record a TV program Norton AntiVirus detects the activity and automaticallyturnson Quiet Mode When Quiet Mode is turned on Norton AntiVirus su...

Page 299: ...ction prevents outside programs from making changes to the Norton product This security feature also prevent Windows System Restore from changing Norton files which results in the Restoration Incomple...

Page 300: ...rn it off for a specified duration w YoucannotrunSystemRestoreonyourcomputerwhen Norton Product Tamper Protection is turned on You must temporarily turn off Norton Product Tamper Protection to run a s...

Page 301: ...y setting up a password By default Settings Password Protection option is turned off You must turn on the Settings Password Protectionoption to set up a password for your product settings To use the S...

Page 302: ...Virus settings you must enter the password each time to view or configure your product settings By default the Settings Password Protection option is turned off You must turn on the SettingsPassword P...

Page 303: ...using the resetsettingspassword option in the Select Uninstall Preference window You can turn off the Settings Password Protection option if you do not require password protection for Norton AntiVirus...

Page 304: ...lowing 1 In Windows XP double click Add or Remove Programs 1 In Windows Vista click ProgramsandFeatures 1 In Windows 7 click Programs Programs and Features The Programs option in Windows 7 is availabl...

Page 305: ...7 In the Confirm New Password box type the new password again 8 Click OK 305 Customizing protection features About customizing settings and options...

Page 306: ...Customizing protection features About customizing settings and options 306...

Page 307: ...of your product If you want to upgrade your Norton product or want to reach the customer support for assistance you must know your product version number You can find the version number of your produc...

Page 308: ...reement and click Close About upgrading your product Norton AntiVirus helps you upgrade your product if you have an active subscription You can upgrade your current product to the latest version witho...

Page 309: ...n is not available the Web page informs you that no new version is available and your product is up to date Symantec recommends that you have the latest version of the product as it contains new and e...

Page 310: ...window and then click Settings Updates Automatic Download of New Version On The latest version of your product may contain new and enhanced features for better protection against security threats Whe...

Page 311: ...Norton AntiVirus main window Norton Autofix performs a Quick Scan of your computer and repairs problems without your intervention If the problem persists you can use the Open Support Web Site option...

Page 312: ...Autofix If you use a proxy server to connect to the Internet you must configure the proxy settings of Norton AntiVirus w If you do not want to proceed with the support session you can use the Skip op...

Page 313: ...lick the click here link Under SupportContactNumbers select the region and then your country to view the contact details You can use the contact details to contact the technical support team Staying i...

Page 314: ...rticipate in discussions You can create your own threads of topics or take help from the existing forum discussions Norton Forums Read the messages that prominent leaders post from inside and outside...

Page 315: ...rton Account 1 Search Norton Forum to find the additional product help about installing configuring and troubleshooting errors You can also post your questions in the forum and get answers from expert...

Page 316: ...ive in real time Phone Search for additional product help about installing configuring and troubleshooting errors Forum Using the Norton Support Web site Norton Support Web site contains answers to th...

Page 317: ...you cannot resolve using Norton Autofix use the click here link on the Norton Autofix window to get the phone number to contact a support representative w Support offerings may vary based on the lang...

Page 318: ...ion and then the location You can use the phone number to contact a support representative Support policy Symantec recommends that you have the latest version of the product as it contains new and enh...

Page 319: ...d Worldwide service and support Worldwide service and support solutions vary by country To contact one of our Support offices please go to the following Web site and select your language www symantec...

Page 320: ...ust restart your computer after uninstalling the product so ensure that you do not have any other programs running while you follow this procedure Uninstalling Norton AntiVirus You can remove Norton A...

Page 321: ...ams do one of the following 1 In Windows XP click Norton AntiVirus and then click Change Remove 1 In Windows Vista or Windows 7 click Norton AntiVirus and then click Uninstall Change 4 In the page tha...

Page 322: ...rograms Norton AntiVirus Uninstall 2 In the page that appears under Select Your Uninstall Preference click one of the following Lets you retain your settings passwords and preferences for Norton featu...

Page 323: ...lick RestartNow recommended to restart the computer 1 Click RestartLater to restart the computer later Norton AntiVirus is not fully uninstalled until you restart your computer 323 Finding additional...

Page 324: ...Finding additional solutions About uninstalling 324...

Page 325: ...197 found by Auto Protect 167 in freeware programs 197 protection features 257 Aggressive SONAR Protection 144 alerts Worm Blocking 172 Antispyware managing using the main window 198 Application Ratin...

Page 326: ...tom scans about 112 creating 112 deleting 116 editing 115 particular area 112 custom scans continued running a custom scan 115 scan frequently 112 schedule the custom scan 112 scheduling 117 120 custo...

Page 327: ...ud computing 123 Insight Network scan 123 Quick Scan 123 scan 123 shortcut menu scan 123 Insight Network continued Single File Scan 123 Insight Protection turning off 125 turning on 125 installation p...

Page 328: ...k Security Map about 201 adding devices 210 modifying communication port 218 Network Security Map continued purging 215 removing devices 215 turning off 209 turning off Network Security Overview 202 t...

Page 329: ...Interest 88 refreshing trust level 88 trusted files 85 viewing processes 88 Norton LiveUpdate about 45 obtaining updates 51 Norton Product Tamper Protection about 299 turning off 300 Norton Product Ta...

Page 330: ...y server configuring 58 settings 56 Pulse Updates about 55 using 55 Q Quarantine adding an item 250 Quarantine continued items submitting for analysis 252 managing items 247 opening 247 restoring item...

Page 331: ...line 121 Computer Scan 105 create a custom scan 112 Custom Scan 105 deleting custom scans 116 file 109 floppy disk 109 Scans continued folder 109 Full System Scan 105 hard drive 109 Insight Network 12...

Page 332: ...tion 155 Media Center Extender 155 turning off 153 155 turning on 153 155 281 turning on manually 152 Smart Definitions about 48 turning on or turning off 49 SONAR Protection about 144 emerging threat...

Page 333: ...s automatically 53 checking 51 obtaining 55 Pulse Updates 55 summary 46 upgrading new version 308 User Specified Programs about 161 adding programs 161 Quiet Mode 161 removing programs 162 V version n...

Page 334: ...es such as online backup and PC Tuneup and is a trusted source for family online safety For more information please click one of the following links Antivirus Antispam Spyware Protection Online Backup...

Reviews: