Guarding against intrusion attempts
Customize Intrusion Detection
120
If you have excluded attack signatures that you want to
monitor again, you can include them in the list of active
signatures.
To include attack signatures
1
In the main window, double-click
Intrusion
Detection
.
2
In the Intrusion Detection window, click
Advanced
.
3
In the Excluded Signatures list, select the attack
signature that you want to monitor.
4
Click
Include
.
5
When you are done including signatures, click
OK
.
6
In the Intrusion Detection window, click
OK
.
Enable or disable AutoBlock
When Norton Internet Security detects an attack, it
automatically blocks the connection to ensure that your
computer is safe. The program can also activate
AutoBlock, which automatically blocks all incoming
communication from the attacking computer for a set
period of time, even if the incoming communication does
not match an attack signature.
If AutoBlock is blocking a computer or computers you
need to access, you can turn off AutoBlock. Make sure to
turn AutoBlock back on when you are done.
To turn AutoBlock on and off
1
In the main window, double-click
Intrusion
Detection
.
2
In the Intrusion Detection window, check or uncheck
Turn on AutoBlock
.
3
Click
OK
.
By default, AutoBlock blocks each computer for 30
minutes. Use the drop-down menu to choose how long
you want to block attacking computers.
Summary of Contents for NORTON INTERNET SECURITY 2004
Page 1: ...User s Guide ...
Page 6: ......
Page 22: ...Responding to emergencies Prepare for emergencies 22 ...
Page 48: ...Installing Norton Internet Security If you need to uninstall Norton Internet Security 48 ...
Page 94: ...Options Password protect Norton AntiVirus options 94 ...
Page 104: ...Keeping current with LiveUpdate About your subscription 104 ...
Page 138: ...Protecting disks files and data from viruses Schedule scans 138 ...
Page 158: ...Creating accounts for multiple users Customize Norton Internet Security accounts 158 ...
Page 178: ...Blocking unwanted email messages Customize Norton AntiSpam 178 ...
Page 190: ...Monitoring Norton Internet Security About the Log Viewer 190 ...
Page 206: ...Troubleshooting Troubleshoot Rescue Disks 206 ...
Page 220: ...Glossary 220 ...