Guarding against intrusion attempts
Allow or block access to your computer
108
Allow or block access to your computer
Norton Internet Security allows you to organize
computers on your home network and the Internet into
Trusted and Restricted Zones. Zones allow you to grant
trusted computers more access to your computer while
blocking malicious users.
Computers in the Trusted Zone are not regulated by the
Personal Firewall. They have as much access to your
computer as they would have if you did not have a
firewall. Computers in the Restricted Zone cannot
communicate with your computer at all.
The Home Network Wizard is the fastest way to organize
computers into zones. You can also manually add
individual computers to zones.
To categorize computers with the Home Network
Wizard
1
In the main window, double-click
Personal Firewall
.
2
In the Personal Firewall window, on the Networking
tab, click
Wizard
.
3
In the Home Network Wizard opening window, click
Next
.
4
In the resulting list, check the network adapters that
you want to configure automatically and add to your
Trusted Zone.
5
Click
Next
.
6
Click
Finish
to close the wizard.
To manually add computers to zones
1
In the main window, double-click
Personal Firewall
.
2
In the Personal Firewall window, on the Networking
tab, select the zone to which you want to add a
computer.
3
If you have turned on Network Detector, select the
Location you want to customize.
4
Click
Add
.
Summary of Contents for NORTON INTERNET SECURITY 2004
Page 1: ...User s Guide ...
Page 6: ......
Page 22: ...Responding to emergencies Prepare for emergencies 22 ...
Page 48: ...Installing Norton Internet Security If you need to uninstall Norton Internet Security 48 ...
Page 94: ...Options Password protect Norton AntiVirus options 94 ...
Page 104: ...Keeping current with LiveUpdate About your subscription 104 ...
Page 138: ...Protecting disks files and data from viruses Schedule scans 138 ...
Page 158: ...Creating accounts for multiple users Customize Norton Internet Security accounts 158 ...
Page 178: ...Blocking unwanted email messages Customize Norton AntiSpam 178 ...
Page 190: ...Monitoring Norton Internet Security About the Log Viewer 190 ...
Page 206: ...Troubleshooting Troubleshoot Rescue Disks 206 ...
Page 220: ...Glossary 220 ...