background image

User’s Guide

Summary of Contents for NORTON INTERNET SECURITY 2004

Page 1: ...User s Guide ...

Page 2: ...granted without fee provided that the above copyright notice appears in all copies and that both that copyright notice and this permission notice appear in supporting documentation Silicon Graphics makes no representations about the suitability of this software for any purpose It is provided as is without express or implied warranty Copyright 1994 Hewlett Packard Company Permission to use copy mod...

Page 3: ... on a network provided that You have a licensed copy of the Software for each computer that can access the Software over that network D after written notice to Symantec transfer the Software on a permanent basis to another person or entity provided that You retain no copies of the Software and the transferee agrees to the terms of this license and E use the Software in accordance with any addition...

Page 4: ...lace any defective media returned to Symantec within the warranty period or refund the money You paid for the Software Symantec does not warrant that the Software will meet Your requirements or that operation of the Software will be uninterrupted or that the Software will be error free TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL OTHER WARRAN...

Page 5: ...g or additional terms of any quote order acknowledgment or similar communications between the parties This Agreement shall terminate upon Your breach of any term contained herein and You shall cease use of and destroy all copies of the Software The disclaimers of warranties and damages and limitations on liability shall survive termination Software and documentation is delivered Ex Works Californi...

Page 6: ......

Page 7: ...mary Activation protects you 24 When to activate your product 24 Locate the product key 24 Security protection features 25 Norton AntiSpam features 27 Virus and threat protection features 29 Chapter 3 Installing Norton Internet Security System requirements 31 Supported email and instant messenger programs 33 Compatibility with other software and hardware 33 Before installation 35 Prepare your comp...

Page 8: ... product 55 Respond to Norton Internet Security alerts 56 Learn more with the Alert Assistant 56 Use Web assistant 57 Check your computer s vulnerability to attack 58 Identify the source of Internet traffic 58 Stop all Internet communication 59 Manage how Norton AntiSpam detects spam 61 Adjust the email filter 61 Identify authorized senders 62 Identify senders of spam email messages 63 Teach Norto...

Page 9: ...Chapter 5 Options Set Norton Internet Security options 84 About General options 85 About LiveUpdate options 85 About Firewall options 85 About Email options 86 Password protect Norton Internet Security options 86 Reset options password 86 Customize Norton AntiVirus 88 About System options 89 About Internet options 90 About Other options 90 Set Norton AntiVirus options 92 If you need to restore def...

Page 10: ...uter 108 Customize firewall rules 109 How firewall rules are processed 109 Create new firewall rules 110 Manually add a firewall rule 113 Change an existing firewall rule 114 Identify computers to Norton Internet Security 115 Specify an individual computer 115 Specify a range of computers 116 Specify computers using a network address 116 About Intrusion Detection 117 Customize Intrusion Detection ...

Page 11: ...re found during a scan 132 Create and use custom scans 132 Run a custom scan 134 Delete a custom scan 134 Schedule scans 134 Schedule a custom scan 135 Edit scheduled scans 136 Delete a scan schedule 137 Chapter 10 What to do if a virus is found If a virus is found during a scan 140 Review the repair details 140 Use the Repair Wizard 140 If a virus is found by Auto Protect 142 If you are using Win...

Page 12: ...160 Customize Parental Control 161 Restrict Web site access 161 Restrict programs that access the Internet 165 Restrict newsgroup access 166 Chapter 13 Protecting your privacy Identify private information to protect 169 Add private information 170 Modify or remove private information 170 Customize Privacy Control 171 Set the Privacy Level 171 Adjust individual Privacy Control settings 172 Chapter ...

Page 13: ...ion online 194 Why did an email message I sent never arrive 194 Why doesn t Norton Internet Security notify me before letting programs access the Internet 194 Why can t I print to a shared printer or connect to a computer on my local network 194 How can a Web site get my browser information 195 Troubleshoot Norton AntiSpam 196 Why do I still receive spam 196 How will email messages from addresses ...

Page 14: ...n AntiVirus 199 Auto Protect does not load when I start my computer 199 I have scanned and removed a virus but it keeps infecting my files 200 Norton AntiVirus cannot repair my infected files 201 I can t receive email messages 201 I can t send email messages 202 Troubleshoot Rescue Disks 203 My Rescue Disk does not work 203 I cannot start from drive A 204 I get an error when testing basic Rescue D...

Page 15: ...Common problems include 1 Virus threats 1 Trouble restarting your computer 1 Lost or missing files 1 Possible disk damage w If you purchased this product to address any of the problems listed above read these sections first Immediate installation of the product may not always provide the best solution to your problem ...

Page 16: ...on t start on page 17 If you can t start your computer you need to start from an uninfected disk and scan for viruses Once the virus has been repaired delete the installation files that were left behind in the temporary folder after you tried to install the first time To delete remaining installation files 1 On the Windows taskbar click Start Run 2 In the Run dialog box type TEMP 3 Click OK 4 In t...

Page 17: ... drive 2 Restart your computer Your computer displays the following information 2 1 Boot from Hard Drive 2 2 Boot from CD ROM 3 Press 2 Boot from CD ROM to restart from the CD After the computer restarts the Emergency program automatically begins to scan for and remove viruses 4 When Norton AntiVirus has finished scanning remove the CD from your CD ROM drive Suggestion For more information Restart...

Page 18: ...ions to create Emergency Disks on another computer or go to http www symantec com techsupp ebd html and download the Emergency Disk program Follow the instructions included in the download to create the Emergency Disks w You will need several formatted 1 44 MB disks To create Emergency Disks from the CD 1 Insert the CD into the CD ROM drive 2 Click Browse CD 3 Double click the Support folder 4 Dou...

Page 19: ...run DOS based recovery utilities To use Emergency Disks 1 Insert Emergency Disk 1 into drive A and restart your computer The Emergency program runs in DOS 2 Select the program that you want to run For DOS program help press the F1 key while you are running the program 3 Follow the on screen instructions for inserting and removing the Emergency Disks 4 When the Emergency program is done remove the ...

Page 20: ... Web site http securityresponse symantec com where there is extensive frequently updated information on viruses and automatic virus protection See Keeping current with LiveUpdate on page 95 1 Keep LiveUpdate turned on at all times to continually update your virus definitions files 1 Run LiveUpdate regularly to receive new program updates 1 Keep Auto Protect turned on at all times to prevent viruse...

Page 21: ...st the most recent backup 1 If you are using a computer that cannot start from a CD create a set of Emergency Disks from which you can start your computer and scan for viruses See Create and use Rescue Disks on page 71 1 If you are using Windows 98 Me create a set of Rescue Disks and keep them updated You can use them to start your computer in DOS mode and use Norton AntiVirus to fix virus related...

Page 22: ...Responding to emergencies Prepare for emergencies 22 ...

Page 23: ...f with the product This section includes 1 A list of all of the features in the product 1 A brief description of each feature The feature summary can help you determine which feature to use to solve a problem Read the feature descriptions to locate the correct component to use ...

Page 24: ... to the Symantec servers You can activate your product by clicking Activate Now in the Configuration Wizard that runs immediately after installation If you choose not to activate at that time you will receive alerts that will remind you to activate the product You can click Activate Now in the alerts to activate the product Activation should take just a few minutes w If you do not activate the pro...

Page 25: ... page 117 Network Detector Network Detector lets you customize security settings for different networks This makes it easy for mobile users who connect to the Internet from the road to stay protected at all times See Customizing protection for different locations on page 123 Web assistant Web assistant lets you customize security settings for individual Web sites without leaving your browser See U...

Page 26: ...age 56 Norton AntiSpam Norton AntiSpam helps reduce the amount of unwanted email messages that you receive by intelligently filtering incoming messages and clearly marking potential spam See Blocking unwanted email messages on page 175 Parental Control Parental Control lets parents choose the Web sites and newsgroups that their children can visit and the types of Internet programs that children ca...

Page 27: ... cause software conflicts or use HTML tricks to open additional browser windows Norton AntiSpam incorporates several powerful features to reduce your exposure to unwanted online content Automatic integration with email programs Automatically creates a toolbar in supported email programs See Use your email program toolbar on page 52 Allowed and Blocked lists 1 Uses user defined address list to expe...

Page 28: ...d blocking Blocks ads based on user defined criteria See Blocking Internet advertisements on page 179 Popup blocking Blocks pop up windows based on user defined criteria See Enable or disable Popup Window Blocking on page 67 Live update of spam definitions Updates copies of Symantec spam definition files automatically subscription required See Keeping current with LiveUpdate on page 95 ...

Page 29: ...uter at risk Norton AntiVirus also scans files inside of compressed files As always Norton AntiVirus features continually monitor your computer and protect it from known and unknown threats Feature Description Auto Protect 1 Loads into memory when Windows starts providing constant protection while you work 1 Checks for viruses every time that you use software programs on your computer insert flopp...

Page 30: ...nt messenger attachments See What to do if a virus is found on page 139 Bloodhound technology Detects new and unknown viruses by analyzing an executable file s structure behavior and other attributes such as programming logic computer instructions and any data that is contained in the file See What to do if a virus is found on page 139 Password protection Protects Norton AntiVirus options from una...

Page 31: ...4 MB disks available to make Rescue Disks System requirements To use Norton Internet Security your computer must have one of the following Windows operating systems installed 1 Windows 98 98SE 1 Windows Me 1 Windows 2000 Professional 1 Windows XP Professional Home Edition Windows 95 and NT the server editions of Windows 2000 XP and the Windows XP 64 bit edition are not supported ...

Page 32: ...rocessor 1 96 MB of RAM 1 200 MB of available hard disk space 1 Internet Explorer 5 01 with Service Pack 2 or later 5 5 recommended 1 CD ROM or DVD ROM drive Windows 2000 Professional 1 133 MHz or higher processor 1 96 MB of RAM 1 200 MB of available hard disk space 1 Internet Explorer 5 01 with Service Pack 2 or later 5 5 recommended 1 CD ROM or DVD ROM drive Windows XP Professional or Home Editi...

Page 33: ...ou run a Symantec pcAnywhere host edit the rule to limit its use Feature Supported programs Norton AntiSpam integration 1 Microsoft Outlook Express 5 5 and later 1 Microsoft Outlook 2000 XP 1 Eudora 5 0 and later Email scanning Any POP3 compatible program including 1 Microsoft Outlook Express 4 0 5 X 1 Microsoft Outlook 97 98 2000 XP 1 Netscape Messenger 4 X Netscape Mail 6 0 1 Eudora Light 3 0 Eu...

Page 34: ...ng programs For basic protection install Norton Internet Security on the gateway computer For maximum protection against Trojan horses or other problem programs that initiate outbound communications install Norton Internet Security on all computers that share the connection You must have a license for each copy of Norton Internet Security you install Virtual Private Networks Norton Internet Securi...

Page 35: ... you have installed Norton AntiVirus you must also turn off incoming and outgoing email protection To send email through SSL 1 In the main window click Privacy Control 2 In the lower right corner of the window click Turn Off 3 Repeat steps 1 and 2 selecting Norton AntiSpam in step 1 4 In the Security Center click Options Norton AntiVirus w If you set a password for Options Norton Internet Security...

Page 36: ...For more information see the user documentation that came with the programs If you re using Windows XP Windows XP includes a firewall that can interfere with Norton Internet Security protection features You must disable the Windows XP firewall before installing Norton Internet Security To disable the Windows XP firewall 1 On the Windows XP taskbar click Start Control Panel 2 In the Control Panel w...

Page 37: ...om a CD insert the CD into the CD ROM drive 2 If you downloaded your copy of Norton Internet Security double click the file you downloaded then click Install 2 In the Norton Internet Security window click Install Norton Internet Security 3 In the Scan for Viruses dialog box click Yes to scan your computer before installing 4 In the Symantec Pre Install Scanner window review the progress of the sca...

Page 38: ...t Security 38 7 After you review the results close the scanresults Notepad window then click Next to continue with the installation 8 Read the License Agreement then click I accept the License Agreement If you decline you cannot continue with the installation ...

Page 39: ...Installing Norton Internet Security Install Norton Internet Security 39 9 Click Next See When to activate your product on page 24 10 In the text boxes type the product key for activation 11 Click Next ...

Page 40: ... Next to install Norton Internet Security The Norton Internet Security Setup window displays installation progress Depending on your computer system speed this can take a few minutes 16 After Norton Internet Security is installed read the readme text then click Next Install Now Install using the most common settings This is the best choice for most users Custom View a list of the components and pr...

Page 41: ...ing installation if you select the Custom installation type you can select the component programs that you want to install To customize your installation See Install Norton Internet Security on page 37 1 Start the Norton Internet Security installation procedure 2 To install Norton AntiVirus check Install Norton AntiVirus on your computer then click Browse to specify the location in which you want ...

Page 42: ...e accounts or use Parental Control See Install Norton Internet Security on page 37 5 Click Next to continue the installation at the confirm the installation location step If the opening screen does not appear Sometimes a computer s CD ROM drive does not automatically run a CD To start the installation from the Norton Internet Security CD 1 On your desktop double click My Computer 2 In the My Compu...

Page 43: ...o the Products page for the registration link To use the Information Wizard 1 In the welcome window click Next w You must activate the software within 15 days See When to activate your product on page 24 2 On the Product Activation window click Activate and register your product now 3 Click Next 4 Make sure that your computer is connected to the Internet then click Next 5 If you purchased your com...

Page 44: ...t your email address book Quickly add the people in your email address book to your Allowed List See Identify authorized senders on page 62 Scan for Viruses Perform a full system scan See Manually scan disks folders and files on page 130 Set up Privacy Control Identify the information you want Privacy Control to protect See Identify private information to protect on page 169 Set up Parental Contro...

Page 45: ...lation 45 14 Review the post installation tasks and configuration settings for Norton Internet Security If you want to change any of the settings do so using Options 15 Click Finish If you selected any post installation tasks they start automatically ...

Page 46: ...the following 2 On the Windows taskbar click Start Settings Control Panel 2 On the Windows XP taskbar click Start Control Panel 2 In the Control Panel double click Add Remove Programs 3 In the list of currently installed programs click Norton Internet Security 4 Do one of the following 2 In Windows 2000 Me click Change Remove 2 In Windows 98 click Add Remove 2 In Windows XP click Change 5 Do one o...

Page 47: ...rnet Security has been successfully removed window do one of the following 2 To restart your computer now click Restart Now recommended 2 To restart your computer later click Restart Later Norton Internet Security is not fully uninstalled until you restart your computer 11 Click Finish Yes Deletes the quarantined files from your computer No Leaves the quarantined files on your computer but makes t...

Page 48: ...Installing Norton Internet Security If you need to uninstall Norton Internet Security 48 ...

Page 49: ... more information Check the version number You can check the version number of your product on your computer Use the version number to help you find more information about your product on the Symantec Web site To check the version number 1 Start your product 2 Click Help and Support 3 On the Help menu click About your product name 4 In the About dialog box select your product name ...

Page 50: ... Internet Security Norton Internet Security 2 On the Windows XP taskbar click Start All Programs Norton Internet Security Norton Internet Security 2 On the Windows desktop double click Norton Internet Security Use the Norton Internet Security tray icon Norton Internet Security adds an icon to the Windows system tray at the end of the Windows taskbar Use this icon as a shortcut to open Norton Inter...

Page 51: ...nt from the Internet Explorer toolbar See Use Web assistant on page 57 Norton Internet Security now includes Web assistant which lets you quickly access security settings without leaving your Web browser Norton Internet Security Opens the Norton Internet Security main window Block Traffic Immediately stops all Internet communication Log Off Logs off the current user About Norton Internet Security ...

Page 52: ...Spam button is added it drops down an abbreviated Norton AntiSpam menu The buttons or menu options added are as follows This is Spam Marks the selected email as spam This is not Spam Marks the selected email as allowed not spam Empty The Spam Folder Removes all email that has been placed in the Norton AntiSpam folder Open Norton AntiSpam Displays the Norton AntiSpam main window ...

Page 53: ...2004 2 On the desktop double click the Norton Internet Security icon Use the Norton AntiVirus icon in the Windows system tray See Customize Norton AntiVirus on page 88 Norton AntiVirus adds an icon to the Windows system tray at the end of the Windows taskbar Use the icon in the Windows system tray to open Norton AntiVirus and to enable or disable Auto Protect To use the Norton AntiVirus Windows sy...

Page 54: ... View Status Launches Norton AntiVirus and displays the Status window with system status See Check Norton AntiVirus configuration status on page 68 View Quarantine Displays the Quarantine area and the files currently stored there See If Norton AntiVirus places files in Quarantine on page 146 View Activity Log Displays the Log Viewer which shows you various Norton AntiVirus activities such as scans...

Page 55: ...ay until you activate the product You can activate your product from the Activation Needed alert or from the Activation option on the Help menu Activation should take just a few minutes To activate your product from the Activation Needed alert 1 In the alert click Activate Now 2 Click OK 3 On the Activation screen click Next 4 On the Activation Successful screen click Finish To activate your produ...

Page 56: ...page 123 The first alert most people will receive is a New Location Alert This alert appears every time your computer joins a network that Network Detector does not recognize You will likely receive a New Location Alert the first time you go online after installing Norton Internet Security Learn more with the Alert Assistant Each Norton Internet Security alert includes a link to the Alert Assistan...

Page 57: ...he Web assistant button appears in your Internet Explorer toolbar If you have locked your toolbars the Web assistant button may be hidden To view or hide Web assistant 4 In Microsoft Internet Explorer right click the toolbar then click Web assistant Block cookies on this site Prevents this site from setting or reading cookie files Block ads on this site Removes ad images from pages on this site Bl...

Page 58: ...for Security Risks 4 To learn more about the Security Check tests click About Scan for Security Risks When the scan is complete the results page lists all of the areas that were checked and your level of vulnerability in each one For any area marked as at risk you can get more details about the problem and how to fix it To get more information about an at risk area 4 On the results page next to th...

Page 59: ...n window under AutoBlock select a connection you want to trace 3 Click Attacker Details Your browser opens the Visual Tracking Web page To trace a connection attempt from the Alert Assistant 1 In a security alert click Alert Assistant 2 Click the IP address of the attacking computer Your browser opens the Visual Tracking Web page Stop all Internet communication Block Traffic lets you immediately h...

Page 60: ...thout any input from the user so a malicious program could reconnect when you are away from the computer w Block Traffic is meant to be used as a temporary measure while you address a security problem If you restart your computer Norton Internet Security automatically allows all incoming and outgoing communication To stop all Internet communication using Block Traffic 1 In the main window click Bl...

Page 61: ... program after installation Adjust the email filter You can determine how strictly Norton AntiSpam filters your email Adjust the Norton AntiSpam parameters from the main window To adjust the email filter 1 In the main window double click AntiSpam 2 In the Norton AntiSpam window in the Norton AntiSpam settings for drop down list select the account that you want to change 3 In the General window ens...

Page 62: ...ames to the Allowed list individually To import your existing address book 1 In the main window double click Allowed List 2 In the Allowed List window click Import Address Book 3 In the Import Address Book window uncheck any addresses that you do not want to add to your Allowed list 4 Click OK 5 Click OK to close the Allowed List window High Maximum filtering Most spam is correctly identified More...

Page 63: ... email address you want to allow and optionally the first and last name of the sender 4 Click OK to close the Add Address to Allowed List dialog box 5 Click OK to close the Allowed List window Identify senders of spam email messages When you know that you do not want to receive any email messages from a specific address you can add it to the Blocked List Norton AntiSpam will mark all email message...

Page 64: ... optionally the first and last name of the sender 4 Click OK to close the Add Address to Blocked List dialog box 5 Click OK to close the Blocked List window Teach Norton AntiSpam your email preferences Norton AntiSpam s filtering engine attempts to identify spam automatically by using your outgoing email to determine your usual email correspondents Over time you can train Norton AntiSpam to reflec...

Page 65: ...s is Spam 4 If you have set your options to ask before adding senders to the Blocked List answer the prompt accordingly 5 Open the Norton AntiSpam folder 6 Select each item that should not have been marked as spam 7 Using the buttons added to your email program by Norton AntiSpam click This is not Spam 8 If you have set your options to ask before adding senders to the Allowed List answer the promp...

Page 66: ...ger users cannot make any changes to Ad Blocking Enable or disable Ad Blocking Ad Blocking compares the addresses of ads that are being downloaded by your browser with its own list of ads to block If it finds a match it removes the ad so that it does not appear in your browser leaving the rest of the Web page intact Sometimes you may want to view ads that have been blocked In this case you can tem...

Page 67: ...When Popup Window Blocking is enabled Ad Blocking automatically blocks the programming code Web sites use to open secondary windows without your knowledge Sites that open secondary windows when you click a link or perform other actions are not affected In some cases you may want to view pop up windows on a site In this case you can temporarily disable Popup Window Blocking To enable or disable Pop...

Page 68: ... attention If you see an exclamation point it indicates that your subscription is either expired or your virus definitions are more than two weeks old If your subscription is expired renew it to maintain your protection If your subscription is current then you need to update your virus definitions See Customize Norton AntiVirus on page 88 If you need to adjust any settings use Options To check sys...

Page 69: ...n a Microsoft Office program Office Plug in is enabled in Options w If you have set a password for Options Norton AntiVirus asks you for the password before you can view or adjust the settings To check Office Plug in status 1 At the top of the main window click Options If a menu appears click Norton AntiVirus 2 In the left pane of the Options window under Other click Miscellaneous 3 Verify that Of...

Page 70: ...sable any portion of Norton Internet Security Disabling Norton Internet Security also disables all of the individual features To temporarily disable Norton Internet Security 1 In the main window click Security 2 In the lower right corner of the window click Turn Off Norton Internet Security is automatically turned back on the next time that you start your computer You can also disable individual s...

Page 71: ...loppy disks If you have Norton Utilities installed you can also have two Norton Utilities floppy disks in your Rescue Disk set With a Rescue Disk set you can start your computer in DOS mode and use Norton AntiVirus to fix virus related problems w Rescue Disks contain information specific to the computer on which they were made If you are using Rescue Disks for recovery you must use the disks made ...

Page 72: ...r other files necessary to start your computer and access the drive on which you placed your Rescue Disk set Creating a Rescue Disk set on a startup hard disk for example drive C is not recommended because you will not be able to access the rescue programs and configuration files if your hard disk is damaged and unable to start To create Rescue Disks 1 In the main window click Rescue 2 In the Resc...

Page 73: ...a Rescue Folder drive location 7 Insert the disks as requested 8 When you have finished creating the basic Rescue Disk set in the Rescue Disk window click Close Test your Rescue Disks After you have created the Rescue Disk set you are prompted to test your disks This requires that you restart your computer using the Rescue Disks w If you created Rescue Disks on a network drive a second physical ha...

Page 74: ... Destination Drive click drive A then click Update A message prompts you to insert the disk labeled Basic Rescue Boot Floppy Disk into drive A 3 Insert the Basic Rescue Boot Floppy Disk into drive A then click OK 4 Insert the remaining disks in your set as requested See Test your Rescue Disks on page 73 Make sure to test your newly updated Rescue Disk set when prompted Rescue Disk options Rescue D...

Page 75: ... Basic Rescue Boot Floppy Files Files that Rescue Disk stores on the floppy disk that you use to start your system Rescue DOS Utility Programs DOS based emergency programs that Rescue Disk stores on the Rescue Disk set You can use these DOS based utilities to recover your system Norton AntiVirus Program Norton AntiVirus program files Definitions Disks Virus definitions files used by Norton AntiVir...

Page 76: ...r removed internal hardware 1 Added modified or removed hard disk partitions 1 Upgraded your operating system 1 Updated virus definitions If your Rescue Disks are not current you can still use them to remove viruses from your computer When the Rescue Disk screen appears use only the Norton AntiVirus task To use your Rescue Disks 1 Insert the Basic Rescue Boot Floppy Disk into drive A and restart y...

Page 77: ...to use Rescue Disks to restore your system 77 4 Follow the on screen instructions for inserting and removing the Rescue Disks 5 When the Rescue program is done remove the Rescue Disk from drive A and restart your computer ...

Page 78: ... to its definition Use online Help Help is available throughout your Symantec product Help buttons or links to more information provide information that is specific to the task that you are completing The Help menu provides a comprehensive guide to all of the product features and tasks that you can complete To use online Help 1 At the top of the main window click Help Support Norton Internet Secur...

Page 79: ...ss It is installed on your hard disk in the same location as the product files To read the Readme file 1 In Windows Explorer double click My Computer 2 Double click the hard disk on which you installed Norton Internet Security In most cases this will be drive C 3 Click Program Files Norton Internet Security 4 Double click Readme txt The file opens in Notepad or your default word processing program...

Page 80: ...you do not have a CD you can download the PDF from the Symantec Service Support Web site To read the User s Guide PDF from the CD 1 Insert the CD into the CD ROM drive 2 Click Browse CD 3 Double click the Manual folder 4 Double click NIS pdf You can also copy a User s Guide to your hard disk and read it from there To read a User s Guide from your hard disk 1 Open the location into which you copied...

Page 81: ...te from Windows Explorer 1 Open Windows Explorer 2 On the toolbar on the Norton AntiVirus menu click View Virus Encyclopedia This option connects you to the Symantec Security Response Web page from which you can search for information on all types of viruses To access the Symantec Web site in your browser 4 On the Internet go to www symantec com Symantec Security Response Takes you to the Security...

Page 82: ...ruses trends in virus workings virus outbreak warnings and special virus definitions releases To subscribe to the Symantec Security Response newsletter 1 On the Internet go to securityresponse symantec com 2 On the security response Web page scroll down to the reference area of the page then click Newsletter 3 On the security response newsletter Web page select the language in which you want to re...

Page 83: ...m performance or disable options that do not apply You can change the product s settings to fit your work environment If you are using Windows 2000 XP you will need administrator access to change options If you are an administrator and share your computer with others keep in mind that the changes that you make apply to everyone using the computer ...

Page 84: ...indow do one of the following 2 Double click a feature you want to customize 2 Select a feature then in the lower right corner of the window click Customize 2 Configure the feature 3 When you are done making changes click OK If you have installed accounts you can customize some Norton Internet Security features for individual users Other settings apply to all users To change settings for individua...

Page 85: ... let you enable and disable Automatic LiveUpdate which automatically checks for updates when you are connected to the Internet For maximum security you should leave this option checked You can choose the components you want Automatic LiveUpdate to monitor You can also choose whether Automatic LiveUpdate updates the components in the background or alerts you that there are updates available About F...

Page 86: ... users each user will share a single options password To protect security options with a password 1 At the top of the main window click Options If a menu appears click Norton Internet Security 2 On the General tab check Turn on Password Protection 3 In the Password and Confirm Password text boxes type a password 4 Click OK Reset options password If you forget your options password you can reset it...

Page 87: ... In the Remove Application window click Reset Password 6 In the password reset dialog box in the Reset Password Key text box type the Reset Password Key that appears above the text box The Reset Password Key is case sensitive 7 In the New Password and Confirm New Password text boxes type a new password 8 Click OK 9 In the Remove Application window click Cancel 10 In the Exit alert click Yes ...

Page 88: ...t a password so that unauthorized users cannot tamper with your settings All of the options are organized into three main categories The options contained under each category are as follows This section does not describe how to change the individual options but gives a general description of what they do and how you can find them For specific information about a particular option check the online ...

Page 89: ...r what it looks for while monitoring your computer and what to do when a virus is found Auto Protect options also include Bloodhound Advanced and Exclusions subcategories 1 Bloodhound is the scanning technology that protects against unknown viruses Use these options to set its level of sensitivity in Auto Protect 1 Advanced options determine the activities to be monitored when scanning for virus l...

Page 90: ...w Norton AntiVirus should behave while scanning email messages Scanning incoming email messages protects your computer against viruses sent by others Scanning outgoing email messages prevents you from inadvertently transmitting viruses or worms to others You can choose to scan incoming or outgoing email messages or both and to display an icon or progress indicator while scanning You can set option...

Page 91: ...culation and if a system file changes choose to update the Inoculation snapshot or repair the file by restoring it to its original values Inoculation options are available only on Windows 98 98SE Me Miscellaneous Back up file in Quarantine before attempting a repair This option is automatically set to On Enable Office Plug in If you upgrade to Microsoft Office 2000 or later after Norton AntiVirus ...

Page 92: ...on appear in the right pane 3 Select any settings that you want to change 4 Click OK These settings now take precedence over the preset options The changes take effect immediately If you need to restore default Norton AntiVirus settings You can change any or all of the options listed If you have made a number of changes that have unwanted results you can restore all options to the default settings...

Page 93: ...hat you view the Options window or temporarily enable or disable Auto Protect If you forget your password you can reset it from the Help button in the Norton AntiVirus main window See the online Help for more information about resetting your password To specify or remove a password 1 At the top of the main window click Options If a menu appears click Norton AntiVirus 2 In the Options window under ...

Page 94: ...Options Password protect Norton AntiVirus options 94 ...

Page 95: ...e Administrator access privileges to run LiveUpdate About program updates Program updates are minor improvements to your installed product These differ from product upgrades which are newer versions of entire products Program updates that have self installers to replace existing software code are called patches Patches are usually created to extend operating system or hardware compatibility adjust...

Page 96: ...pdates users of Norton Internet Security products also receive protection updates for Web filtering intrusion detection and Norton AntiSpam The Web filtering protection updates provide the latest lists of Web site addresses and Web site categories that are used to identify inappropriate Web content The intrusion detection updates provide the latest predefined firewall rules and updated lists of ap...

Page 97: ...eUpdate 2 In the LiveUpdate window click Next to locate updates 3 If updates are available click Next to download and install them 4 When the installation is complete click Finish w Some program updates may require that you restart your computer after you install them When you should update Run LiveUpdate as soon as you have installed your product Once you know that your files are up to date run L...

Page 98: ...In Interactive mode the default LiveUpdate downloads a list of updates that are available for your Symantec products that are supported by LiveUpdate technology You can then choose which updates you want to install In Express mode LiveUpdate automatically installs all available updates for your Symantec products To set LiveUpdate to Interactive or Express mode 1 At the top of the main window click...

Page 99: ...xpress mode you can no longer access the LiveUpdate Configuration dialog box directly from LiveUpdate You must use the Symantec LiveUpdate control panel To turn off Express mode 1 On the Windows taskbar click Start Settings Control Panel 2 In the Control Panel window double click Symantec LiveUpdate 3 In the LiveUpdate Configuration dialog box on the General tab click Interactive Mode 4 Click OK I...

Page 100: ...ou run LiveUpdate on a computer that is connected to a network that is behind a company firewall your network administrator might set up an internal LiveUpdate server on the network LiveUpdate should find this location automatically If you have trouble connecting to an internal LiveUpdate server contact your network administrator ...

Page 101: ...ny connections will be made with connection and phone charges possibly being incurred for each connection If this is a problem you can set your ISDN router to not automatically connect to the ISP or disable Automatic LiveUpdate To enable Automatic LiveUpdate 1 At the top of the main window click Options If a menu appears click Norton Internet Security If you set a password for Options you must pro...

Page 102: ... menu appears click Norton Internet Security If you set a password for Options you must provide the password before you can continue 2 In the Options dialog box on the LiveUpdate tab uncheck Enable Automatic LiveUpdate 3 Click OK Automatically update my protection LiveUpdate checks for and installs protection updates without prompting you LiveUpdate displays an alert when a protection update has b...

Page 103: ...is due to expire you are prompted to renew your subscription If you do not renew your subscription you can still use LiveUpdate to obtain program updates However you cannot obtain protection updates through LiveUpdate or from the Symantec Web site and will not be protected against newly discovered threats Also whenever you use LiveUpdate you will receive a warning that your subscription has expire...

Page 104: ...Keeping current with LiveUpdate About your subscription 104 ...

Page 105: ...rotection on page 106 You can control the level of protection that the Personal Firewall provides by using the Security Level slider You can also control how the Personal Firewall reacts to Improper connection attempts Warns you of any connection attempts from other computers and attempts by programs on your computer to connect to other computers Security and privacy incursions by malicious Web co...

Page 106: ...n level changes Changing the Security Level does not affect the protection provided by Intrusion Detection See About Norton Internet Security accounts on page 149 You can set individual Security Level settings for each Norton Internet Security user To change the Security Level 1 In the main window double click Personal Firewall 2 In the Personal Firewall window in the Choose a security level for d...

Page 107: ...at you want to change 3 Click Custom Level 4 Do one or more of the following 2 In the Personal Firewall drop down list select a level 2 In the Java Applet Security or ActiveX Control Security drop down list select a level 2 To be notified whenever unknown programs access the Internet check Enable Access Control Alerts 2 To be notified whenever a remote computer attempts to connect to a port no pro...

Page 108: ...work Wizard is the fastest way to organize computers into zones You can also manually add individual computers to zones To categorize computers with the Home Network Wizard 1 In the main window double click Personal Firewall 2 In the Personal Firewall window on the Networking tab click Wizard 3 In the Home Network Wizard opening window click Next 4 In the resulting list check the network adapters ...

Page 109: ...ve 6 When you have finished removing computers click OK Customize firewall rules Firewall rules control how the Personal Firewall protects your computer from malicious incoming traffic programs and Trojan horses The firewall automatically checks all data coming in or out of your computer against these rules How firewall rules are processed Firewall rules are processed in a set order based on their...

Page 110: ...fied as safe When Automatic Program Control configures access for a new program Norton Internet Security displays a message above the Windows toolbar If an unknown program or an unknown version of a known program attempts to access the Internet you receive an alert You can then choose to allow or block Internet access for the program Enable Automatic Program Control Automatically configures access...

Page 111: ...rograms 1 In the main window double click Personal Firewall 2 In the Personal Firewall window on the Programs tab click Program Scan 3 Select the disk or disks on your computer that you want to scan 4 Click Next 5 In the Program Scan window review the list of Internet enabled programs that Program Scan identified 6 Do one of the following 2 Check the boxes next to the programs you want to configur...

Page 112: ... file Executable file names typically end in exe 5 Click Open 6 In the Program Control alert select the access level you want this program to have 7 To see risks that this program could pose to your computer click Show Details 8 Click OK Customize Program Control After using Norton Internet Security for a while you may find that you need to change access settings for certain programs To customize ...

Page 113: ...Firewall window on the Advanced tab click General 3 Follow the on screen instructions To add a Trojan Horse Rule 1 In the main window double click Personal Firewall 2 In the Personal Firewall window on the Advanced tab click Trojan Horse 3 Follow the on screen instructions To add a Program Rule 1 In the main window double click Personal Firewall 2 In the Personal Firewall window on the Programs ta...

Page 114: ...le 4 When you have finished changing rules click OK Change the order of firewall rules See How firewall rules are processed on page 109 Each list of firewall rules is processed from the top down You can adjust how firewall rules are processed by changing their order To change the order of a firewall rule 1 In the General Rules Trojan Horse Rules or Program Rules window select the rule that you wan...

Page 115: ...mputer There are three ways to identify computers Each uses IP addresses Specify an individual computer The computer name that you type can be an IP address a URL such as service symantec com or a Microsoft Network computer name such as Mojave You can find the names of computers on your local network in Network Neighborhood or Network Places on your Windows desktop To specify an individual compute...

Page 116: ...rting Internet Address text box type the starting lowest numerically IP address 3 In the Ending Internet Address text box type the ending highest numerically IP address 4 Click OK Specify computers using a network address You can identify all of the computers on a single subnet by specifying an IP address and a subnet mask The IP address that you specify can be any address in the subnet that you a...

Page 117: ...mmon Internet attacks including the following Intrusion Detection does not scan for intrusions by computers in your Trusted Zone However Intrusion Detection does monitor the information that you send to Trusted computers for signs of zombies and other remote control attacks See Keeping current with LiveUpdate on page 95 Intrusion Detection relies on an extensive list of attack signatures to detect...

Page 118: ...trusion Detection alerts on and off See Identify the source of Internet traffic on page 58 You can choose whether you want to receive alerts when Intrusion Detection blocks suspected attacks The alerts include more information about the attacking computer and information about the attack You can also trace the connection attempt using Visual Tracking To turn Intrusion Detection alerts on and off 1...

Page 119: ...sion for the attack signature that matches the benign activity w Each exclusion that you create leaves your computer vulnerable to attacks Be very selective when excluding attacks Only exclude behavior that is always benign To exclude attack signatures from being monitored 1 In the main window double click Intrusion Detection 2 In the Intrusion Detection window click Advanced 3 In the Signatures l...

Page 120: ...et Security detects an attack it automatically blocks the connection to ensure that your computer is safe The program can also activate AutoBlock which automatically blocks all incoming communication from the attacking computer for a set period of time even if the incoming communication does not match an attack signature If AutoBlock is blocking a computer or computers you need to access you can t...

Page 121: ...locked by AutoBlock unblock it If you have changed your protection settings and want to reset your AutoBlock list you can unblock all of the computers on the AutoBlock list at once To unblock computers currently blocked by AutoBlock 1 In the main window double click Intrusion Detection 2 In the Intrusion Detection window do one of the following 2 To unblock one computer select its IP address then ...

Page 122: ...window click OK Restrict a blocked computer You can add a blocked computer to your Restricted Zone to permanently prevent that computer from accessing your computer Computers in the Restricted Zone do not appear on the blocked list because all communication with restricted computers is blocked To restrict a blocked computer 1 In the main window double click Intrusion Detection 2 In the list of com...

Page 123: ...can contain one or more networks Whenever your computer connects to a network in one of these locations Norton Internet Security automatically switches to the security settings that are associated with that location For example if you use your laptop to connect to the Internet from home from work and from a neighborhood coffeehouse you are actually connecting to at least three different networks I...

Page 124: ...s you more control over your protection You can create a new location from a Network Detector alert and from the main Norton Internet Security window To create a new location from a Network Detector alert 1 In the Network Detector alert on the Which location do you want to use menu select Use custom settings 2 In the Use Custom Settings window click Create new location 3 Click Next 4 In the Setup ...

Page 125: ...settings 9 Click Finish To create a new location from the main window 1 In the main window double click Personal Firewall 2 In the Personal Firewall window on the Locations tab click Wizard 3 In the Setup Program Control window do one of the following 2 Click Yes recommended to turn on Automatic Program Control This reduces the number of alerts that you receive 2 Click No to turn off Automatic Pro...

Page 126: ...24 2 Use the Network Detector Wizard to create a new location To add a new network to a custom location that you have created 1 In the Network Detector alert on the Which location do you want to use menu click Use custom settings 2 In the Use custom settings window on the Choose a location drop down menu select the location that you want to use 3 Click Finish Learn more about networks Network Dete...

Page 127: ...o change Automatic Program Control settings click the Programs tab 2 To change Trusted Zone settings click the Networking tab 3 In the Settings for menu select the location you want to customize 4 When you are finished making changes click OK Remove networks from a location If you ve added a network to a location you will not be alerted the next time your computer joins that network If you want to...

Page 128: ...f you no longer need a location or if you want to reassign the networks in a location delete the location The next time that you use a network that had been in this location Network Detector will ask you to choose a new location w You cannot delete the preconfigured Home Office Away or Default locations To delete a location 1 In the main window double click Personal Firewall 2 In the Personal Fire...

Page 129: ... system file changes Ensure that protection settings are enabled Norton AntiVirus is configured to provide you with complete protection against viruses It is unlikely that you need to change any settings However for maximum protection you should ensure that your protection features are enabled w For specific information about a particular option and its protection settings see the online Help This...

Page 130: ...r files Email scanning Options Norton AntiVirus Email 1 Scan incoming Email 1 Scan outgoing Email If your email program uses one of the supported communications protocols both options are selected by default Timeout protection Options Norton AntiVirus Email Protect against timeouts when scanning Email To prevent connection timeouts while receiving large attachments enable timeout protection Instan...

Page 131: ... information about manual scanning options see the online Help Perform a full system scan A full system scan scans all boot records and files on your computer To perform a full system scan 1 On the left side of the main window under Norton AntiVirus click Scan for Viruses 2 In the Scan for Viruses pane under Task click Scan my computer 3 Under Actions click Scan When the scan is complete a scan su...

Page 132: ...loppy disk the scan starts automatically If you choose to scan drives folders or files a dialog box appears in which you choose which drives folders or files to scan 4 In the dialog box make your selection then click Scan When the scan is complete a scan summary appears 5 When you are done reviewing the summary click Finished If problems are found during a scan See What to do if a virus is found o...

Page 133: ... 3 In the opening window of the Norton AntiVirus Scan Wizard click Next 4 Select the items that you want to scan Your options are You can use both options to select the combination of items that you want 5 In the resulting dialog box select the items that you want to scan If you select a folder all files in that folder are included If you select a drive all folders and files on that drive are incl...

Page 134: ...can is complete a scan summary appears 4 When you are done reviewing the summary click Finished Delete a custom scan You can delete custom scans if they are no longer needed To delete a custom scan 1 On the left side of the main window under Norton AntiVirus click Scan for Viruses 2 In the Scan for Viruses pane under Task select the custom scan that you want to delete w If you click the button nex...

Page 135: ...y scan then schedule it to occur every two days or every three days instead To schedule a custom scan 1 On the left side of the main window under Norton AntiVirus click Scan for Viruses 2 In the Scan for Viruses pane under Task select the custom scan that you want to schedule w If you click the button next to the scan name the scan runs 3 Under Schedule Task click Schedule 4 In the Schedule dialog...

Page 136: ...k New 6 Set the frequency and time at which you want the scan to run Most of the frequency options include additional options that let you further refine the schedule Set the additional options as necessary 7 When you are done click OK Edit scheduled scans You can change the schedule of any scheduled scan including the weekly full system scan To edit a scheduled scan 1 On the left side of the main...

Page 137: ...t side of the main window under Norton AntiVirus click Scan for Viruses 2 In the Scan for Viruses pane under Task select the scan whose schedule you want to delete w If you click the button next to the scan name the scan runs 3 Under Schedule Task click Schedule 4 In the Schedule dialog box check Show multiple schedules 5 Select the schedule or schedules that you want to delete 6 Click Delete 7 Cl...

Page 138: ...Protecting disks files and data from viruses Schedule scans 138 ...

Page 139: ...n page 146 1 Quarantine infection Makes the file inaccessible by any programs other than a Symantec antivirus program You cannot accidentally open the file and spread the virus but you can still evaluate it for possible submission to Symantec 1 Delete the file Removes the virus from your computer by deleting the file that contains the virus worm or Trojan horse It should be used only if the file c...

Page 140: ... infected files could be repaired or deleted the scan summary lists the number of files found infected and repaired or deleted This information is presented for status purposes only you don t need to take further action to protect your computer If you want to know more you can check the repair details to see which files were infected and with which threats To review the repair details 1 In the sca...

Page 141: ...te window uncheck any files that you do not want to delete w If you do not delete the infected files the virus or file at risk remains on your computer and can cause damage or be transmitted to others 6 Click Delete If any files could not be deleted the Exclude At risk Files window opens to allow you to exclude files considered to be at risk from future scans 7 In the Exclude At risk Files window ...

Page 142: ...Windows 98 98SE Me If a virus or threat is found and repaired by Auto Protect in Windows 98 98SE Me you receive an alert telling you which file was repaired or deleted To close the alert 4 Click Finish If you have set your options so that Auto Protect asks you what to do when it finds a virus the alert asks you to choose one of the following actions The recommended action is always preselected Act...

Page 143: ... threat and the infected file Select Delete if Repair is not successful Replace the deleted file with the original program file or backup copy If the virus Trojan horse or worm is detected again your original copy is infected Do not open the file but leave the problem alone Stops the current operation to prevent you from using an infected file This action does not solve the problem You will receiv...

Page 144: ...ther files are infected See If a virus is found during a scan on page 140 2 Follow the recommended actions in the Repair Wizard to protect your computer from the infected files If a threat is found by Worm Blocking See Ensure that protection settings are enabled on page 129 If a program tries to email itself or email a copy of itself it could be a worm trying to spread via email A worm can send it...

Page 145: ...k or you could have a virus Norton AntiVirus alerts you when a change occurs in your system files If you get an alert about a change in your system files you have two options You can update your Inoculation snapshot or repair the file Before you repair the file be sure that your virus definitions are up to date and run a scan Procedure For more information Run LiveUpdate to ensure that you have th...

Page 146: ... of my Master Boot Record Use if the alert appears after a legitimate change in system files Restore my Master Boot Record Use if you are certain the system did not change for legitimate reasons Add Item Adds files to Quarantine Use this action to quarantine a file that you suspect is infected This action has no effect on files that are already in Quarantine Properties Provides detailed informatio...

Page 147: ... file See Keeping current with LiveUpdate on page 95 One of the most common reasons that Norton AntiVirus cannot automatically repair or delete an infected file is that you do not have the most up to date virus definitions Update your virus definitions with LiveUpdate and scan again If that does not work read the information in the report window to identify the types of items that cannot be Submit...

Page 148: ...click Reports 2 In the Reports pane on the Online Virus Encyclopedia line click View Report The Symantec Web site opens in your Internet browser 3 Use the links on the Web page to access the virus information for which you are looking File type Action Infected files with exe doc dot or xls file name extensions any file can be infected Use the Repair Wizard to solve the problem For more information...

Page 149: ...counts that are specific to the needs of each user About Norton Internet Security accounts Your computer can host several accounts but all accounts fall within one of the following four access levels Child Cannot make any changes to Norton Internet Security protection Has limited access to Internet programs and Web site categories Teenager Cannot make any changes to Norton Internet Security protec...

Page 150: ...ypes of accounts is that the Windows accounts are tied to the operating system If you log in to Windows using a Windows account you will also be logged in to Norton Internet Security with that account Create Norton Internet Security accounts Supervisor and Adult users can create new accounts and customize settings for other users They can also create new user accounts with the Security Assistant A...

Page 151: ...t Security accounts 4 Click Next 5 In the Create accounts screen type one or more account names 6 On the account level menus select an appropriate account level for each account 7 Click Next See Set or change account passwords on page 154 8 In the Choose passwords screen in the Password and Confirm Password text boxes type a password for this user ...

Page 152: ... you have created more than one account repeat the previous two steps with each account See Set the startup account on page 154 10 In the Set startup account screen select the account that Norton Internet Security automatically logs on to when you restart the computer 11 Click Next 12 Click Finish ...

Page 153: ...creen 1 In the main window click User Accounts 2 In the User Accounts screen click Create Account 3 In the Create Account dialog box in the Account Name text box type a name for this account 4 In the Password and Confirm Password text boxes type a password for this account Passwords are case sensitive 5 On the Account Type menu select an account type ...

Page 154: ...Properties 4 In the Account Properties dialog box check Make this the startup account 5 Click OK Set or change account passwords For maximum security you should protect each account with a password This ensures that only approved users can access the Internet and your network To set or change your own password 1 In the main window click User Accounts 2 In the User Accounts screen select your accou...

Page 155: ...ypes to Windows accounts If you have created Windows accounts for multiple users you can use these accounts instead of creating new Norton Internet Security accounts Your Norton Internet Security accounts use the same names as your Windows accounts To assign Norton Internet Security account types to Windows accounts 1 In the main window click User Accounts 2 In the User Accounts window do one of t...

Page 156: ...you start Norton Internet Security it uses the settings from the account that you designated as the startup account To use a different account you must log off of the current account and log on to another account If you are not sure which account is active you can check the active account To find out which account is active 4 Open Norton Internet Security The active account is listed in the middle...

Page 157: ...he password if required 6 Click OK As soon as you change an account Norton Internet Security begins using the settings associated with that account The Accounts window shows the account that is currently active Customize Norton Internet Security accounts Each Norton Internet Security account can have personalized settings for the following features Feature More information Parental Control See Con...

Page 158: ...Creating accounts for multiple users Customize Norton Internet Security accounts 158 ...

Page 159: ... It also blocks all outgoing information from restricted Internet programs Parental Control settings are linked to user accounts When users log on to their accounts Parental Control uses the settings associated with the accounts until the users log off Web sites Block access to sexually explicit violent or otherwise inappropriate Web pages Programs Block categories of Internet programs that are no...

Page 160: ...nager and Child users cannot make any changes to Parental Control To enable or disable Parental Control 1 In the main window double click Parental Control 2 In the Parental Control window in the Parental Control settings for drop down list select the account that you want to change 3 Check or uncheck Turn on Parental Control See Review log information on page 186 Parental Control tracks its activi...

Page 161: ...ic types of Web sites but to allow everything else 1 Create a list of Web sites that can be visited Specify the Web sites that all users can visit Use this option to strictly control users Internet activities as all Web sites not on the list are blocked regardless of users account types Block Web sites by category Parental Control includes an extensive list of categorized Web sites You can select ...

Page 162: ... click OK Block additional sites Parental Control lets you restrict access to specific Web sites or domains that are not included in one of the categories of blocked sites If you block a domain all Web sites within the domain are included For example if you block the domain uninvitedads com Parental Control will block all Web sites at that domain including www uninvitedads com and images uninvited...

Page 163: ...f a site you need to view belongs to a blocked category you can create an exception for this site This allows you to permit access to specific Web sites that belong to blocked categories while still blocking other sites of this type To create exceptions for specific sites 1 In the main window double click Parental Control 2 In the Parental Control window in the Parental Control settings for drop d...

Page 164: ...s this computer can visit approved sites only regardless of their account types To create a list of permitted Web sites 1 In the main window double click Parental Control 2 In the Parental Control window in the Parental Control settings for drop down list select the account that you want to change 3 Click Sites 4 In the Sites window click Specify permitted sites 5 Click Add to create a new entry i...

Page 165: ...ow programs access the Internet Parental Control can block categories of Internet programs and limit how certain groups of Internet programs can be used w Program limitations are intended for use with Child and Teenager accounts Users with Adult accounts will be able to override program restrictions on a per program basis Block and permit categories of Internet programs Parental Control organizes ...

Page 166: ...ict newsgroup access Parental Control blocks newsgroups based on text strings which are groups of letters found in the names of the newsgroups When users access newsgroups Parental Control compares the names of the newsgroups that they attempt to view with a list of text strings you create Parental Control then blocks or permits access to newsgroups containing those text strings When newsgroups ar...

Page 167: ...e main window double click Parental Control 2 In the Parental Control window on the Settings For menu select the account that you want to change 3 Click Newsgroups 4 In the Specify Newsgroups window select the action that you want to take Your options are 5 Click Add 6 Type a text string to block or permit 7 Click OK Create exceptions to blocked newsgroups If you create a list of blocked sites you...

Page 168: ...ntal Control window on the Settings For menu select the account that you want to change 3 Click Newsgroups 4 In the Specify Newsgroups window click Specify Blocked Newsgroups 5 Click Exceptions 6 Click Add 7 In the Add Newsgroup to Exceptions List window type the complete name of the newsgroup that you want to unblock 8 Click OK 9 When you are done adding exceptions click OK ...

Page 169: ...f control over cookies and other information that your browser sends to Web sites Identify private information to protect Many Web sites ask for your name email address and other personal information While it is generally safe to provide this information to large reputable sites malicious sites can use this information to invade your privacy It is also possible for people to intercept information ...

Page 170: ... help you remember why you are protecting this information 5 In the Information To Protect text box type the information that you want to block from being sent over insecure Internet connections 6 Under Secure this private information in select the Internet programs in which Privacy Control should block this information Your options are 2 Web browsers 2 Instant messengers 2 Email programs 7 Click ...

Page 171: ...ustomize your protection by manually adjusting individual settings You can set individual Privacy Control settings for each user Set the Privacy Level Privacy Control offers pre set security levels that help you set several options at one time The Privacy Level slider lets you select minimal medium or high protection Private Information Blocks specific text that you do not want sent over the Inter...

Page 172: ...our browser information Change the Private Information setting Change the Private Information setting to control how Privacy Control handles attempts to send information on the Private Information list over the Internet To change the Private Information setting 1 In the main window double click Privacy Control 2 In the Privacy Control window in the Privacy Control settings for drop down list selec...

Page 173: ... 5 Click OK See Use Web assistant on page 57 You can also customize cookie blocking for individual sites using Web assistant Enable or disable Browser Privacy Browser Privacy prevents Web sites from learning the type of computer and browser that you are using the Web site that you last visited and other information about your browsing habits Some Web sites that depend on JavaScript may not work co...

Page 174: ...s w If you disable secure Web connections your browser will not encrypt any information that it sends You should only disable secure Web connections if you are protecting your personal data in the Private Information list To disable or enable secure Web connections 1 In the main window double click Privacy Control 2 In the Privacy Control window in the Privacy Control settings for drop down list s...

Page 175: ...pam is set to Low messages must contain many spam characteristics before they are flagged as spam If Norton AntiSpam is set to High messages that contain only a few spam characteristics are flagged w Some email servers use SSL Secure Sockets Layer connections to encrypt connections between your computer and the server Norton AntiSpam cannot scan email messages received via SSL connections Customiz...

Page 176: ...r text box type an address or a text string 6 Click Next 7 Select where in incoming email messages Norton AntiSpam should search for the text Your options are 2 Entire email 2 From sender s name 2 Recipient 2 Subject line 2 Body text 8 Click Next 9 Under Classify matching messages as choose whether messages that include this text are spam or not spam 10 Click Next 11 Click Finish 12 Click OK to cl...

Page 177: ... the rule at the top of the list then continues down the list until it finds a match When a match is found Norton AntiSpam categorizes the email message accordingly and moves to the next message If you find that the spam email messages you receive tend to match one rule more than the others you may want to move that rule to the top of the list To change the priority of a spam rule 1 In the main wi...

Page 178: ...Blocking unwanted email messages Customize Norton AntiSpam 178 ...

Page 179: ...rashcan to add these to your personal list of blocked ads To use the Ad Trashcan 1 Open your Web browser and view the page containing the advertisement that you want to block 2 Open Norton Internet Security 3 In the main window double click Ad Blocking 4 In the Ad Blocking window ensure that Enable Ad Blocking is checked 5 Click Ad Trashcan The Ad Trashcan window appears 6 With the windows arrange...

Page 180: ...mberone gif you could change it to http www uninvitedads org annoying ads to block everything in the ads directory 8 Click Close 9 Click OK to close the Ad Blocking window Use text strings to identify ads to block or permit You can control whether Ad Blocking displays specific ads by creating a list of text strings that identify individual ad banners Ad Blocking strings are sections of HTML addres...

Page 181: ...ced window do one of the following 2 To block a string on all Web sites click Defaults 2 To block a string on a Web site in the list select the site s name 2 To block a string on a Web site not in the list click Add Site then in the New Site Domain dialog box type the site s address 4 On the Ad Blocking tab click Add 5 In the Add New HTML String dialog box select the action that you want to take 6...

Page 182: ...in the Defaults list click Defaults 2 To modify or remove a site specific string click the site s name 4 In the HTML string list select the string that you want to change 5 Do one of the following 2 To modify a string click Modify then type your changes 2 To remove a string click Remove 6 When you are done click OK to close the Advanced window 7 Click OK to close the Ad Blocking window ...

Page 183: ...ur computer s network activity since the last time you started Windows Use this information to identify ongoing attack attempts and review how your Privacy Control and Parental Control settings affect your protection Status Settings window Basic information about which protection features are active Statistics window Recent information about firewall and content blocking activities Detailed statis...

Page 184: ... window 1 In the main window click Statistics 2 In the Statistics window click Clear Statistics Review detailed statistics Along with the overall statistics in the Statistics window Norton Internet Security maintains real time network counters that track users Internet usage and any actions that the program takes Personal Firewall Any recent attacks on this computer including the time of the most ...

Page 185: ...the highest number of simultaneous open network connections since the program started Online content The number of graphics cookies spam and private information that have been blocked and the number of open HTTP connections Firewall TCP Connections The number of blocked and permitted TCP connections Firewall UDP Datagrams The number of blocked and permitted UDP connections Firewall Rules All of th...

Page 186: ...his computer including the date and time of the connection the address of the computer to which you connected the service or port number used the amount of information transferred and the total time the connection was active Firewall Communication intercepted by the firewall including rules that were processed alerts displayed unused ports blocked and AutoBlock events Intrusion Detection Whether I...

Page 187: ...m errors the current status of IP filtering if the logged program started as a Windows service and information about programs that are using too many resources or otherwise operating under less than optimum conditions Web History URLs visited by the computer providing a history of Web activity Alerts Any security alerts triggered by possible attacks on your computer Restrictions The Internet progr...

Page 188: ...lerts application activities and errors Using the information in the Log Viewer you can 1 View detailed information recorded in each log by selecting the log in the left column and viewing the the details in the right pane 1 Delete the activity entries for a log by selecting the log then clicking Clear If you never clear the entries for a category it expands until it reaches the maximum size Then ...

Page 189: ... of the log 4 When you are finished viewing the information click File Exit Threat alerts A history of threat alerts such as the ID and type of threat date and time when it occurred the action taken and the version of the virus definitions used Application activities A history of scanning activities such as when scanning occurred and with what results Errors Detailed information about any problems...

Page 190: ...Monitoring Norton Internet Security About the Log Viewer 190 ...

Page 191: ...otection and program updates patches online tutorials Knowledge Base articles and virus removal tools To explore the Symantec service and support Web site 1 On the Internet go to www symantec com techsupp 2 On the service and support Web page under the heading home home office small business click Continue 3 On the home home office small business page click start online support 4 Follow the links ...

Page 192: ...to find all occurrences of any of the words For example type virus definitions to find articles that include virus or definitions or both 2 Type a phrase enclosed in quotation marks to find articles that include this exact phrase 2 Type a plus sign in front of all of the search terms to retrieve documents containing all of the words For example Internet Security finds articles containing both word...

Page 193: ...arental Control If you have set up Parental Control to block certain categories of Web sites it may be blocking the site that you are attempting to view When Parental Control blocks a site it always displays a message telling you that the site is blocked See Restrict Web site access on page 161 It could be a firewall rule A firewall rule might be blocking the Web site When this happens you will us...

Page 194: ...f your email program maintains copies of sent messages in its Sent or Out folder you can reopen the email message remove the private information and send the message again Why doesn t Norton Internet Security notify me before letting programs access the Internet See Enable Automatic Program Control on page 110 If Automatic Program Control is on Norton Internet Security creates rules for programs t...

Page 195: ...w can a Web site get my browser information The Browser Privacy settings prevent your browser from sending browser information However some diagnostic sites on the Internet might report browser information even though the Browser Privacy settings are blocking it ...

Page 196: ...n my Blocked list be handled Norton AntiSpam moves email messages from these addresses to the Norton AntiSpam folder and marks them in the subject line as spam What if I mistakenly put an address on the Blocked list The only result will be that you will not see any email messages from this address in your main list But if you periodically review the contents of your spam folder you will be able to...

Page 197: ...to this service You can then choose to have these definitions updated automatically Why do I need a subscription to spam definitions Though the product is self training local spam definitions are developed only by the criteria you input and from the sample of email messages you process Symantec spam definitions are developed from a much larger set of information and can prevent you from seeing man...

Page 198: ... might want to disable Popup Window Blocking while viewing that site Are there security issues associated with advertisements While clicking on an ad should only display more information or direct you to another site some advertisers will use ads to entice you into installing new functionality on your system These may range from adding new menus to installing spyware You should be especially wary ...

Page 199: ...previous shutdown did not complete successfully For example you may have turned off the power without choosing Shut Down on the Windows Start menu To restart Windows 1 On the Windows taskbar click Start Shut Down 2 In the Shut Down Windows dialog box click Restart 3 Click OK Norton AntiVirus may not be configured to start Auto Protect automatically To set Auto Protect to start automatically 1 At t...

Page 200: ...rs click Norton AntiVirus 2 In the Options window under System click Manual Scan 3 Under Which file types to scan for viruses click Comprehensive file scanning 4 Click Manual Scan Bloodhound 5 Ensure that Enable Bloodhound heuristics is checked then click Highest level of protection 6 Click OK 7 Scan all of the disks that you use and repair all infected files The source of the infection could also...

Page 201: ...c 1 If you don t need the file or a non infected copy of the file exists delete the infected file and replace it with the non infected file I can t receive email messages There are several possible solutions to this problem If you are using a firewall it may block access to the Internet features of Norton AntiVirus Temporarily disable email protection This might allow the problem email messages to...

Page 202: ...nnected your email client may be set to automatically disconnect after sending and receiving mail If you are using a firewall it may block access to the Internet features of Norton AntiVirus For Norton AntiVirus to scan outgoing email messages for viruses it intercepts and scans the messages before they are sent to your email provider To resolve this issue turn off this option within your email cl...

Page 203: ...disk for your computer add it to your Rescue Disk set In an emergency start from that disk Remove the disk and insert your Rescue Boot Disk At the DOS prompt type A RSHELL press Enter then follow the on screen instructions 1 Use the Disk Manager or similarly named program that came with your computer to make your Rescue Boot Disk bootable Make sure to test your modified Rescue Boot Disk Sometimes ...

Page 204: ...nd Setup programs vary from one manufacturer to the next If you cannot find the Boot Sequence option use the Setup program s Help system refer to the documentation that came with your system or contact your system s manufacturer 4 Save the changes then exit the Setup program You may need to use a special boot disk rather than the Rescue Boot Disk In this case use the boot disk or startup disk that...

Page 205: ...Disk without having to reformat the disk and create a new Rescue Disk set 1 Remove the Rescue Boot Disk and restart your computer 2 Insert the Rescue Boot Disk into the floppy disk drive 3 On the Windows taskbar click Start Run 4 In the Run dialog box type SYS A 5 Click OK ...

Page 206: ...Troubleshooting Troubleshoot Rescue Disks 206 ...

Page 207: ...ion check the appropriate Web site listed in the sections that follow If you received this product when you purchased your computer your computer manufacturer may be responsible for providing your support Customer service The Service Support Web site at http service symantec com tells you how to 1 Subscribe to Symantec newsletters 1 Locate resellers and consultants in your area 1 Replace defective...

Page 208: ...rt This fee based in most areas telephone support is available to all registered customers Find the phone number for your product at the Service Support Web site You ll be led through the online options first and then to the telephone contact options Support for old and discontinued versions When Symantec announces that a product will no longer be marketed or sold telephone support is discontinued...

Page 209: ...rompted to subscribe for a nominal charge Simply follow the instructions on the screen Worldwide service and support Technical support and customer service solutions vary by country For Symantec and International Partner locations outside of the United States contact one of the service and support offices listed below or connect to http service symantec com and select your region under Global Serv...

Page 210: ...gion reg_ap 61 2 8879 1000 Fax 61 2 8879 1001 Europe Middle East and Africa Symantec Authorized Service Center Postbus 1029 3600 BA Maarssen The Netherlands http www symantec com region reg_eu 353 1 811 8032 Latin America Symantec Brasil Market Place Tower Av Dr Chucri Zaidan 920 12 andar São Paulo SP CEP 04583 904 Brasil SA Portuguese http www service symantec com br Spanish http www service syma...

Page 211: ...t A message that appears to signal that an error has occurred or that there is a task that requires immediate attention such as a system crash or a Virus Alert alias A shortcut icon that points to an original object such as a file folder or disk AppleTalk A protocol that is used by some network devices such as printers and servers to communicate attack signature A data pattern that is characterist...

Page 212: ...before information packets are transmitted connectionless protocol A protocol that sends a transmission to a destination address on a network without establishing a connection cookie A file that some Web servers put on your disk when you view pages from those servers Cookies store preferences create online shopping carts and identify repeat visitors denial of service attack A user or program that ...

Page 213: ...ams through the Windows graphical environment download To transfer a copy of a file or program from the Internet a server or computer system to another server or computer driver Software instructions for interpreting commands for transfer to and from peripheral devices and a computer encryption Encoding data in such a way that only a person with the correct password or cryptographic key can read i...

Page 214: ... the pattern is found fragmented When the data that makes up a file is stored in noncontiguous clusters across a disk A fragmented file takes longer to read from the disk than an unfragmented file fragmented IP packet An IP packet that has been split into parts Packets are fragmented if they exceed a network s maximum packet size but malicious users also fragment them to hide Internet attacks FTP ...

Page 215: ...tion port on a handheld device for interfacing with an infrared capable device Infrared ports do not use cables IP Internet Protocol The protocol that underlies most Internet traffic IP determines how data flows from one computer to another Computers on the Internet have IP addresses that uniquely identify them IP address Internet Protocol address A numeric identifier that uniquely identifies a co...

Page 216: ...twork or subnet For example 10 0 1 1 and 10 0 1 8 are part of the network address 10 0 1 0 NTFS NTFS file system A system table used primarily by Windows 2000 XP that organizes the exact location of all the files on the hard drive packet The basic unit of data on the Internet Along with the data each packet includes a header that describes the packet s destination and how the data should be proces...

Page 217: ...try A category of data stored in the Windows registry that describes user preferences hardware settings and other configuration information Registry data is accessed using registry keys removable media Disks that can be removed as opposed to those that cannot Some examples of removable media are floppy disks CDs DVDs and Zip disks router A device that forwards information between computers and net...

Page 218: ...ission Control Protocol Internet Protocol Standard protocols used for most Internet communication TCP establishes connections between computers and verifies that data is properly received IP determines how the data is routed threat A program with the potential to cause damage to a computer by destruction disclosure modification of data or denial of service Trojan horse A program containing malicio...

Page 219: ...lders for one or more characters Wildcards let you match several items with a single specification worm A program that replicates without infecting other programs Some worms spread by copying themselves from disk to disk while others replicate only in memory to slow a computer down ...

Page 220: ...Glossary 220 ...

Page 221: ...bout 25 enabling and disabling 66 identifying ads to block 180 Ad Blocking 180 continued modifying text strings 182 Ad Trashcan 179 adding files to Quarantine 146 addresses adding allowed 62 adding blocked 63 importing allowed 62 Adobe Acrobat Reader installing 79 using to view PDF 79 advertisements Ad Trashcan 179 blocking 180 filters 180 Alert Assistant 26 56 alerts Alert Assistant 56 Inoculatio...

Page 222: ...hnology description 30 options 89 booting Auto Protect failure to load 199 booting continued changing boot sequence 204 floppy disk drive fails 204 Rescue Disks fail 203 browser information 195 privacy 173 C CD ROM drive starting from 17 changing feature settings 85 firewall rules 114 individual security settings 106 options 84 order of firewall rules 114 scan schedules 136 Security Level 106 chec...

Page 223: ...ing Automatic LiveUpdate 102 Norton Internet Security 51 70 Windows XP firewall 36 disks manually scanning 130 protecting 129 scanning for viruses 130 displaying the Norton AntiVirus toolbar 54 drive A boot sequence 204 using for Emergency Disks 18 using for Rescue Disks 72 76 E electronic newsletter 82 email menu 52 options 90 program toolbar 52 protection 90 spam 175 supported clients 33 emergen...

Page 224: ...figuration 108 zones 108 109 I ignoring files 143 infected files cannot repair 201 reinfected 200 Information Wizard features 43 how to use 43 Inoculation alerts 145 options 91 responding to alerts 146 installing 37 components 41 if problems are found 16 your product with a virus 16 instant messenger and Privacy Control 170 options 90 protecting private information 170 scanning transferred files 1...

Page 225: ...Detector 123 128 continued locations 124 continued Network Detector alert 126 removing networks from 127 networks configuring with Home Networking Wizard 108 internal LiveUpdate server 100 troubleshooting 194 using LiveUpdate 100 new features in Norton AntiVirus 29 newsgroups exceptions 167 newsletters 82 Norton AntiSpam 175 about 26 Allowed and Blocked lists 27 and SSL 175 customizing 175 enablin...

Page 226: ...85 General 85 LiveUpdate 85 options 83 continued Other 90 password protection in Norton AntiVirus 30 protecting with password 86 resetting defaults 92 resetting password 86 Threat Categories 91 Worm Blocking 90 Other options 90 P Parental Control about 26 creating accounts 150 154 Wizard 150 password protection option 91 passwords changing 154 resetting 86 setting 154 Personal Firewall about 25 10...

Page 227: ...rnet access 113 protection downloading from Symantec Web site 98 maintaining 20 maximum 129 protection continued preparing for emergencies 21 system scans 131 updating 101 protection updates defined 96 proxy servers 193 Q Quarantine actions in 146 adding files to 146 files in 146 infected files in 142 options 146 restoring items 146 R Readme file 79 register your software 43 removing Ad Blocking s...

Page 228: ...l system 131 hard drive 132 removable drive 132 running custom 134 scans continued using custom 132 scheduling custom scans 135 multiple schedules for a scan 135 virus scans 134 secure Web connections disabling and enabling 174 security attacks 117 122 levels 106 Security Check 58 Security Level changing 106 changing individual settings 106 Security Response Web page 81 security risks attacks 105 ...

Page 229: ... 68 T Technical Support 80 207 threats attacks 117 avoiding 20 categories of 91 expanded detection of 29 threats continued found by manual scan 139 protection from 105 timeout protection 130 toolbar displaying Norton AntiVirus from 54 training Norton AntiSpam 64 Trashcan See Ad Trashcan tray icon 50 Trojan horses found during a scan 140 troubleshooting 191 ActiveX and Java 193 Ad Blocking 198 brow...

Page 230: ...from Statistics 59 VPN virtual private network 34 W Web filtering service 96 sites blocking 161 submitting to Symantec 165 Symantec 80 98 191 troubleshooting 193 Web assistant about 25 57 using 57 viewing 57 Windows operating systems 31 safe mode 199 Windows 2000 system requirements 32 Windows 98 98SE Me system requirements 32 Windows Explorer toolbar displaying Norton AntiVirus 53 Windows Me syst...

Reviews: