Guarding against intrusion attempts
Customize Intrusion Detection
119
3
Click
OK
.
Exclude specific network activity from being
monitored
In some cases, benign network activity may appear
similar to an attack signature. If you receive repeated
warnings about possible attacks, and you know that
these warnings are being triggered by safe behavior, you
can create an exclusion for the attack signature that
matches the benign activity.
w
Each exclusion that you create leaves your computer
vulnerable to attacks. Be very selective when excluding
attacks. Only exclude behavior that is always benign.
To exclude attack signatures from being monitored
1
In the main window, double-click
Intrusion
Detection
.
2
In the Intrusion Detection window, click
Advanced
.
3
In the Signatures list, select the attack signature that
you want to exclude.
4
Click
Exclude
.
5
When you are done excluding signatures, click
OK
.
6
In the Intrusion Detection window, click
OK
.
Summary of Contents for NORTON INTERNET SECURITY 2004
Page 1: ...User s Guide ...
Page 6: ......
Page 22: ...Responding to emergencies Prepare for emergencies 22 ...
Page 48: ...Installing Norton Internet Security If you need to uninstall Norton Internet Security 48 ...
Page 94: ...Options Password protect Norton AntiVirus options 94 ...
Page 104: ...Keeping current with LiveUpdate About your subscription 104 ...
Page 138: ...Protecting disks files and data from viruses Schedule scans 138 ...
Page 158: ...Creating accounts for multiple users Customize Norton Internet Security accounts 158 ...
Page 178: ...Blocking unwanted email messages Customize Norton AntiSpam 178 ...
Page 190: ...Monitoring Norton Internet Security About the Log Viewer 190 ...
Page 206: ...Troubleshooting Troubleshoot Rescue Disks 206 ...
Page 220: ...Glossary 220 ...