Basics
Check your computer’s vulnerability to attack
58
Check your computer’s vulnerability to
attack
Use Security Check to test your computer’s vulnerability
to security intrusions. The Security Check link in Norton
Internet Security connects you to the Symantec Web site,
where you can scan for vulnerabilities and get detailed
information about Security Check scans.
w
You must be connected to the Internet to check your
computer’s vulnerability.
To check your computer’s vulnerability to attack
1
In the main window, click
Security
.
2
Click
Check Security
.
3
On the Security Check Web page, click
Scan for
Security Risks
.
4
To learn more about the Security Check tests, click
About Scan for Security Risks
.
When the scan is complete, the results page lists all of
the areas that were checked and your level of
vulnerability in each one. For any area marked as at risk,
you can get more details about the problem and how to
fix it.
To get more information about an at-risk area
4
On the results page, next to the scan name, click
Show Details
.
Identify the source of Internet traffic
Visual Tracking helps you learn more about computers
that attempt to connect to your computer. Using Visual
Tracking, you can identify the location of the
IP address
used and contact information for the owner of the
address. You can use this information to identify the
origin of an attack and to learn more about intrusion
attempts.
Summary of Contents for NORTON INTERNET SECURITY 2004
Page 1: ...User s Guide ...
Page 6: ......
Page 22: ...Responding to emergencies Prepare for emergencies 22 ...
Page 48: ...Installing Norton Internet Security If you need to uninstall Norton Internet Security 48 ...
Page 94: ...Options Password protect Norton AntiVirus options 94 ...
Page 104: ...Keeping current with LiveUpdate About your subscription 104 ...
Page 138: ...Protecting disks files and data from viruses Schedule scans 138 ...
Page 158: ...Creating accounts for multiple users Customize Norton Internet Security accounts 158 ...
Page 178: ...Blocking unwanted email messages Customize Norton AntiSpam 178 ...
Page 190: ...Monitoring Norton Internet Security About the Log Viewer 190 ...
Page 206: ...Troubleshooting Troubleshoot Rescue Disks 206 ...
Page 220: ...Glossary 220 ...