Symantec Norton 360 Multi-Device, 5U Manuál

Procházejte online nebo si stáhněte Manuál pro Antivirový bezpečnostní software Symantec Norton 360 Multi-Device, 5U. Symantec Norton 360 Premier Edition 2013 Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 618
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
Norton 360
TM
Product Manual
Care for our Environment; It's the right thing to do.
Symantec has removed the cover from this manual to reduce the Environmental Footprint of our
products. This manual is made from recycled materials.
Zobrazit stránku 0
1 2 3 4 5 6 ... 617 618

Shrnutí obsahu

Strany 1 - Norton 360

Norton 360TMProduct ManualCare for our Environment; ‘It's the right thing to do.’Symantec has removed the cover from this manual to reduce the En

Strany 2 - Norton 360™ Product Manual

Lets you open thePerformance window inNorton 360.The Performance windowchronicles all installs,downloads, optimizations,detections, alerts, andinstanc

Strany 3 - Contents

Performs backgroundmaintenance tasks related tolicensing.Licensing MaintenancePerforms backgroundmaintenance tasks related toNorton Insight. Tasks inc

Strany 4 - Contents4

To monitor background jobs1In the Norton 360 main window, click Performance.2In the Performance window, click Norton Tasks.3In the Norton Tasks window

Strany 5 - 5Contents

You can select one of the following options:Allows the Norton Tasks torun only when your computeruses external power.If you choose this option,Norton

Strany 6 - Contents6

3In the Norton Tasks window, under the PowerSource column, click the Configure link for theNorton Task that you want to configure the powersource.4In

Strany 7

A Norton 360 scan can identify threats on yourcomputer in the following ways:At regular intervals, Norton 360obtains definition updates fromSymantec.

Strany 8 - About Norton 360 main window

Norton 360 obtains specificinformation about the Files ofInterest and submits theinformation to Symantec duringidle time. The informationincludes thin

Strany 9

Symantec assigns the following confidence levels toFiles of Interest:Symantec analyzes the file astrusted based on the statisticalevaluation that is d

Strany 10 - About Norton 360

Norton 360 also provides different profiles to configureyour scan performance. When you use the Full Scanprofile, Norton 360 follows the Blacklist tec

Strany 11

The drop-down list that is available in the NortonInsight - Application Ratings window provides youthe following options:Lists the processes that runo

Strany 12

Lists the Files of Interest thatyou manually trusted in theFile Insight window.This category does not listthe files that do not belongto the File of I

Strany 13 - 13Getting Started

When your system status is At Risk or Attention, thissection automatically provides you the FixNow optionto fix all the issues at once.The right side

Strany 14

To view the files using Norton Insight1In the Norton 360 main window, click Security, andthen click Run Norton Insight.2In the Norton Insight - Applic

Strany 15 - 15Getting Started

window to update the trust value of a file. You can alsomanually trust any well-known files. You can changethe trust level of any file to User Trusted

Strany 16

To manually trust the file4In the File Insight window, in the Details tab, clickTrust Now.You can manually trust the files that are poor,unproven, or

Strany 17 - 17Getting Started

Norton 360 scans the files that have a confidencelevel other than Norton Trusted.1 Configure to High Trust to perform a scan thatexcludes the files th

Strany 18 - Activation protects you

2In the Norton Insight - Application Ratingswindow, move the ScanPerformance Profiles sliderto one of the settings. Your options are:1 Full Scan1 Stan

Strany 19 - Activating Norton 360

Norton 360 provides reports based on the followingcategories:Lets you view the details ofthe various attacks your PCis protected from.For example, you

Strany 20

Viewing the Monthly ReportThe Monthly Report lets you view how Norton 360protected you for the past 30 days. This report includesdifferent activities

Strany 21

This chapter includes the following topics:1 About total protection1 About keeping your computer secure1 About solving connection problems1 About resp

Strany 22

Norton 360 is grouped into the following fourcategories of protection:Blocks and removes virusesand spyware from email anddownloaded sites, protectsag

Strany 23 - About your Norton Account

1 Delete all unwanted messages without openingthem.1 Do not respond to email that you suspect is spam.Delete it.1 Be wary of any email that requests c

Strany 24

Lets you access NortonManagement.Norton Management lets youmanage your Norton productsinstalled on all of yourdevices from one location. Tosign up or

Strany 25 - 25Getting Started

About solving connection problemsNorton 360 uses an Internet connection to supportseveral of its protection features. If you use a proxyserver to conn

Strany 26

Checks all boot records, files,and running programs to protectyour computer from viruses andspywareIt also runs other tasks (such asLiveUpdate, Regist

Strany 27 - Creating a Norton Account

When you right-click a folder, the shortcut menudisplays Norton 360 and then Scan Now option. Youcan use this command to scan any particular folder.Wh

Strany 28 - Accessing your Norton Account

window. For example, the security items that arerelated to the Quarantine feature appear under theQuarantine category. In addition, the Security Histo

Strany 29

1 Email Errors1 Norton Community Watch1 Registry Cleanup1 File Cleanup1 Disk Optimization1 Silent Mode1 LiveUpdateYou can view the security items base

Strany 30 - About Norton Management

History logs for that day. You can later import the fileinto Security History and analyze the data.Viewing items in Security HistorySecurity History p

Strany 31

2In the Tasks window, under General Tasks, clickCheck Security History.Maintaining total protectionAbout monitoring protection features126

Strany 32

3In Security History window, in the Show drop-downlist, select the category of items that you want toview. Your options are:The Recent History view in

Strany 33

The security risks include thesuspicious programs that cancompromise the security ofyour computer.The Resolved Security Risksview in the Security Hist

Strany 34 - About managing devices

The Security HistoryQuarantine provides a safelocation on your computerwhere you can isolate itemswhile you decide an action totake on them.The Quaran

Strany 35 - About the supported devices

Lets you download theNorton Mobile Security forAndroid.Norton Mobile Security helpsprotect your mobile devicesagainst loss, theft, viruses,and other m

Strany 36

The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.The Firewall - Network andConnections category in theS

Strany 37

The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.The firewall maintains rulesto control Internet access

Strany 38

Download Insight processesany executable file that youdownload for analysis of itsreputation level. It theninforms you about theprocessing results bas

Strany 39

Norton Product TamperProtection lets you protectyour Norton product from anyattack or modification byunknown, suspicious, ormalicious applications.The

Strany 40

Network Cost Awareness letsyou set up policies andrestrict the Internet usage ofNorton 360. You can definethe amount of networkbandwidth that Norton 3

Strany 41

Norton 360 may generateerrors in some cases. Forexample, an error can occurwhen you run LiveUpdate orscan a folder. Engine errors,timeout errors, and

Strany 42

The Norton CommunityWatch feature lets yousubmit any suspicioussecurity or suspiciousapplication data to Symantecfor analysis. Symantecassesses the da

Strany 43

The File Cleanup featureremoves unwanted temporaryfiles including leftoverInternet browser files,Internet search words, andother temporary files.The F

Strany 44

Silent Mode suppresses alertsand notifications andtemporarily suspends mostof the background activities.The Silent Mode view in theSecurity History wi

Strany 45

4Click a row to view details for that item.If you want to view additional information about anitem, click the More Details option in the Detailspane o

Strany 46

Online FamilyGetting StartedAbout Norton 36014

Strany 47

The following table lists the categories that providethe advanced details about the Security History items:Displays the followinginformation about the

Strany 48

Actions141Maintaining total protectionAbout monitoring protection features

Strany 49

Displays the actions that areavailable for the selected itemThe options in the Actions viewvary depending on the optionsthat are available in the Show

Strany 50

This action removes therestricted status from theselected computer or fromall of the unclassifiedcomputers on the selectednetwork.This option is avail

Strany 51

1 Stop Notifying MeThis action prevents Norton360 from notifying you whenit blocks the selected attacksignature in the future.This option is available

Strany 52 - About Norton Power Eraser

events that are related to Security Risks, DownloadInsight, and Performance.The File Insight window lets you view more details ofevents that belong to

Strany 53 - About updating Norton 360

Lets you view the detailedinformation about theunresolved security risks in anorganized way.The Unresolved Security Riskscategory includes the infecte

Strany 54 - About LiveUpdate

Lets you view the performancedetails of any File of Interest thatis available on your computer.The information includes thegeneral details, the origin

Strany 55

Provides the lineage details of afile.You can view the file name andthe URL of the source fromwhere the file was downloaded.The lineage details of a f

Strany 56

Let you return the securityrisk that is quarantined to theoriginal location on yourcomputer.Returns the selectedQuarantine item to itsoriginal locatio

Strany 57 - About Smart Definitions

Lets you monitor your child’sactivities on the Internet.wNorton Online Familymay not be available withsome versions of Norton 360.In such case, you ma

Strany 58

This category includes thesecurity risks or the infectedfiles that Norton 360 was notable to repair, remove, orquarantine.Unresolved SecurityRisksThis

Strany 59

Takes you to the SymantecSecurity Response Web siteGet helpSends the security risk toSymantecSubmit to SymantecSearching in Security HistoryYou can se

Strany 60 - Checking for updates manually

option to save the list in the Security History log. Youcan later import the log file and analyze the data.Security History stores the information in

Strany 61

5In the Save As dialog box that appears, navigate toa location and specify the name for the file.The category name in the Show drop-down listappears a

Strany 62

The Security History Quarantine includes the followinggroups of items:Includes the items suchas spyware and adwarethat are generally low riskand that

Strany 63 - About Pulse Updates

3In the Threat Detected window, select the actionthat you want to perform. Some of the options are:Returns the security risk thatis quarantined to the

Strany 64

Adding an item to the QuarantineSecurity History Quarantine provides a safe locationon your computer in which you can isolate items whileyou decide on

Strany 65 - About Network Proxy Settings

functionality of a program that requires the riskprogram to run.For example, a shareware or freeware program thatyou download may use adware to keep i

Strany 66

to remove the security risk and places it in the SecurityHistory Quarantine. Some programs may rely on thesecurity risk item that you quarantine to fu

Strany 67

volume. These items appear as Not Submitted inSecurity History.To manually submit an item to Symantec1In the Security History window, in the Quarantin

Strany 68 - About Norton 360 status

Details option in the Norton360 main window to viewmore details on the NortonOnline Family Web site.Getting StartedAbout Norton 36016

Strany 69

attacks. It also provides information about the knownattacks that they are protected from.Vulnerabilities are flaws in your programs or youroperating

Strany 70 - About the Norton 360 icon

For each program, you can view details such as thename of the program, its vendor, and the number ofvulnerabilities that the program contains. You can

Strany 71

To view details about a vulnerable application1In the Norton 360 main window, click Tasks.2In the Tasks window, under General Tasks, clickCheck Vulner

Strany 72

This chapter includes the following topics:1 About the Norton 360 scans1 About Computer Scan1 About Insight Network scan1 About Reputation Scan1 About

Strany 73

Norton 360 automatically performs different types ofscans to secure your computer from latest threats. Italso lets you run different types of scans ma

Strany 74

Reputation Scan displays thereputation information of thefiles on your computer. Itdisplays the reputationinformation such as trust level,prevalence,

Strany 75 - Monitoring your

Scan Facebook Wall lets youscan the links and URLs that areavailable on your Facebookprofile.When you click the ScanFacebook Wall option, Norton360 ta

Strany 76

of the Computer Scan displays the threat as Trojan.Foo.You can click the Run Scans option available in theTasks window to access the different types o

Strany 77

Runs LiveUpdate, backup, anddisk optimization tasks.Runs LiveUpdate, backs up yourdata, frees disk space, andoptimizes your disk volume.Custom TaskCom

Strany 78

3Click Go.You can use the following options:Suspends the scan temporarily.Click Resume to continue thescan.PauseSkips the current scan.SkipTerminates

Strany 79

Lets you check the safety ofa Web site.You can also perform a safesearch.wThis option may not beavailable with some versionsof Norton 360. In such cas

Strany 80

3Click Go.4After the scan is complete, in the Scans window,click Close.Scanning selected drives, folders, or filesOccasionally, you might want to scan

Strany 81 - About performance alerting

4In the Scans window, do one of the following:1 To scan specific drives, click Run next to DriveScan, select the drives that you want to scan,and then

Strany 82 - Select this option if you do

computer. Viruses, spyware, and other risks oftentarget these areas.If your most recent scan was a Full System Scan, thiswindow shows the results of a

Strany 83

About custom scansYou can create a custom scan if you regularly scan aparticular segment of your computer. This custom scanlets you scan the segment f

Strany 84

5In the New Scan window, in the Scan Name box,type a name for the scan.You cannot specify a scan name that is already inuse.6On the Scan Items tab, ad

Strany 85 - Battery Power option

5In the window that appears, on the Scan Items tab,do the following:1 To add drives, click Add Drives, in the ScanDrives dialog box, select the drives

Strany 86

5In the Edit Scan window, on the Scan Options tab,configure the scan options as required.6Click Save.Editing a custom scanYou can edit a custom scan t

Strany 87

To run a custom scan1In the Norton 360 main window, click Security, andthen click Run Scans.2In the Scans window, under Computer Scans, clickCustom Sc

Strany 88

4In the Scans window, in the Delete column, clickthe delete icon next to the custom scan that youwant to delete.5Click Yes to confirm that you want to

Strany 89

wNorton 360 lets you select multiple dates if youschedule a monthly scan.To schedule a custom scan1In the Norton 360 main window, click Security, andt

Strany 90

Lets you access NortonStudio.Norton Studio is a Windows8 app that lets you manageyour Norton products andNorton product keys from onelocation. You can

Strany 91 - About optimization

7Under After scan completion:, select the state atwhich your computer should be after the scan iscomplete. Your options are:1 Stay On1 Turn Off1 Sleep

Strany 92 - Optimizing your boot volume

5In the Edit Scan window, under When do you wantthe scan to run?, set the frequency and time atwhich you want the scan to run.Most of the frequency op

Strany 93 - About the Idle Time Optimizer

Editing a scheduled scanYou can change the schedule of any scheduled customscan, Quick Scan, or Full System Scan from the Scanswindow.To edit a schedu

Strany 94 - About the Norton Tasks

When the Insight Protection option is turned on,Norton 360 performs a traditional scan and an InsightNetwork scan simultaneously. The traditional scan

Strany 95

When you right-click a file, the shortcut menudisplays Norton 360 and then Insight NetworkScan. You can use this command to scan a file usingboth loca

Strany 96

4In the Insight Protection row, do one of thefollowing:1 To turn off Insight Protection, move the On/Offswitch to the right to the Off position.1 To t

Strany 97

Computer Scan. Norton 360 uses the Computer Scanto perform the signature-based threat detection. Itcompares the signature of the filtered reputation f

Strany 98

This category includesWindows System files (.sys),dynamic link library files(.dll), and device driver files(.drv).System filesThis category includesAc

Strany 99

Scans all the Files of Interestthat are available on yourcomputer.When you perform a FullSystem Scan, Norton 360searches for Files of Intereston all t

Strany 100

Symantec has a fewindications that the file is nottrusted.This file is suspicious and canharm your computer.PoorSymantec has a highindication that the

Strany 101 - About Power Source

If you are not connected to the Internet, you can clickTry Later in the Activation not complete window tostart your product. The Activation window rea

Strany 102 - Configuring the Power Source

4If there is a file with Poor or Bad trust level, underthe Trust Level column, click the red cross (x) icon.5In the Quarantine File window, click Quar

Strany 103 - About Norton Insight

check the trust level of a specific file, you can scan theparticular file.To run a Reputation custom scan1In the Norton 360 main window, click Securit

Strany 104 - About System Insight

When you run a Reputation Quick Scan, Norton 360considers the Files of Interest which include runningprocesses and loaded programs. When you run aRepu

Strany 105

You can view the number of trusted files that areon your computer. You can also view the totalnumber of files that Symantec analyzes within theNorton

Strany 106 - Files of Interest:

Indicates the trust level thatis assigned to a file.Symantec analyzes specificinformation about a file suchas the digital signature andthe hash value

Strany 107

Indicates the communityusage level of the file.The search results aregrouped in to the followingcategories:1 Very Few Users: Showsthe files that have

Strany 108

Indicates the system resourceusage level of the file.The usage levels are asfollows:1 Low: Indicates that thefile consumes minimumsystem resources.1 M

Strany 109

Indicates the stability ratingof the file.The stability rating dependson how frequently theprogram crashes. Thedifferent stability ratings areas follo

Strany 110

you are not only protected from unsafe sites but youcan also let other Facebook users know the securitystatus of any Web site.However, Norton Safe Web

Strany 111

The following are the safety states that Norton SafeWeb provides after it scans the links on your FacebookWall:Indicates that the site is safe tovisit

Strany 112

Norton 360™ Product ManualThe software described in this book is furnished under a licenseagreement and may be used only in accordance with the terms

Strany 113 - 1 Full Scan

You can activate your product directly from theactivation alert. You can also activate your productfrom the Trial Period Status link in the main windo

Strany 114

To enable your Facebook Wall1In the Norton 360 main window, click Security, andthen click Run Scans.2In the Scans window, under Scan Facebook Wall,cli

Strany 115

suppress the SONAR notifications by disabling theShow SONAR Block Notifications option.The View Details link in the notification alert lets youview th

Strany 116 - Viewing the Monthly Report

and proactively detects unknown security risks on yourcomputer. SONAR identifies emerging threats basedon the behavior of applications. SONAR identifi

Strany 117 - Maintaining total

To exclude high-risk security threats from scanning1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,cli

Strany 118

window. The Signature Exclusions window containsthe list of all security risks that can be excluded fromNorton 360 scans. For each security risk, you

Strany 119

About clearing file IDs that are excluded during scansWhen you run a Reputation Scan, Norton 360 providesinformation on the trust-worthiness of all pr

Strany 120

again. This can improve the scan performance ofNorton 360 on your computer.However, if you want Norton 360 to scan all the filesin your computer, you

Strany 121

Microsoft Excelexcel.exeMicrosoft PowerPointpowerpnt.exeMicrosoft Visiovisio.exeMicrosoft Accessmsaccess.exeMicrosoft Projectwinproj.exeNorton 360 sca

Strany 122 - About Security History

4In the Microsoft Office Automatic Scan row, do oneof the following:1 To turn on Microsoft Office Automatic Scan,move the On/Off switch to the left to

Strany 123

Norton 360 turns on this optionautomatically when it detects adisk burning task or a MediaCenter TV recording task. Norton360 also turns on Quiet Mode

Strany 124

To activate your product from the main window1In the Norton 360 main window, do one of thefollowing:1 If you purchased a subscription version of areta

Strany 125

About the Silent Mode that you turn on manuallyNorton 360 lets you manually turn on Silent Mode fora specified duration. When Silent Mode is turned on

Strany 126

To turn on Silent Mode from the Administrative Settingswindow1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Se

Strany 127

2In the Performance window, click Norton Tasks.3In the Norton Tasks window, under Silent Mode,move the On/Off switch to the right to the Offposition.4

Strany 128 - Maintaining total protection

ensure high performance of your computer. Theactivities that are suspended run after you finish usingthe application in the full-screen mode.Silent Mo

Strany 129

3In the Full Screen Detection row, move the On/Offswitch to the left to the On position.4In the Settings window, click Apply.5Click Close.About Quiet

Strany 130

The following table explains about the various options:When you use a Media Centerapplication to burn a CD or aDVD, Norton 360 automaticallyenables Qu

Strany 131

When you use a Media Centerapplication to record a TVprogram, Norton 360automatically enables QuietMode, if the Media Center TVRecording option is tur

Strany 132

Norton 360 automatically turnson Quiet Mode when it detects aTV program recording session ora disk-burning session. Inaddition, you can manually addth

Strany 133

To turn off or turn on IMAPI 2.0 Disk Burn1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Admini

Strany 134

turn on Quiet Mode to the Quiet Mode Programs list.When Norton 360 detects a running instance of aprogram that you added in the list, it automatically

Strany 135

The product key is providedas part of the activationprocess. Be sure to save yourproduct key by creating orsigning in to your NortonAccount, or by pri

Strany 136

To add a program1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Administrative Settings.3In the

Strany 137

5In the confirmation dialog box, click Yes.6In the Quiet Mode Programs window, click Applyand then click OK.About boot time protectionThe boot time pr

Strany 138

Configuring boot time protectionThe boot time protection feature provides enhancedsecurity level from the time you start your computer.As soon as you

Strany 139

Turning on or turning off Early Launch Anti-MalwareProtectionThe Early Launch Anti-Malware Protection featureprovides enhanced security level during t

Strany 140

to scan or customize the scan by adding a specificcommand. The following commands are available:NAVW32 launches helpand terminates./?Scans all drives/

Strany 141

Scans the specifieddrive, folder, or file[drive|folder|file]Performs Quick Scan inthe background.wNorton 360displays the scanswindow only when athreat

Strany 142

Scanning your computerRunning a scan at the command prompt226

Strany 143 - 1 Norton File Insight

This chapter includes the following topics:1 What to do if a security risk is foundWhat to do if a security risk is foundYour product provides many so

Strany 144

In some cases, Norton 360 might not identify an itemas a security threat, but you might suspect that theitem is infected. In such cases, you can submi

Strany 145

Security History also includes information aboutspyware, adware, and other security risks.Reviewing Auto-Protect notificationsAuto-Protect scans files

Strany 146

activation procedure. You need to log in to yourparental control software or to the Internet throughyour ISP as an administrator to change yourconfigu

Strany 147

3In the Show drop-down list, select the category forwhich you want to review Auto-Protect alerts.Your options are:Review Auto-Protectnotifications tha

Strany 148

4In the right pane, click the Options link.The option name appears as Restore & Options forfew items.If one or more security risks such as spyware

Strany 149

5In the Threat Detected window, select theappropriate action on the risk.The following are some of the options that areavailable in the Threat Detecte

Strany 150

Removes the selectedsecurity risk from thecomputer andquarantines it.This option is availablefor the security risks thatrequire your attention formanu

Strany 151 - Searching in Security History

Sends the security risk toSymantec.In some cases, Norton360 might not identify anitem as a security threat,but you might suspectthat the item is infec

Strany 152 - 1 Text Files (.txt)

checks for the infections that have processes runningin memory. It also checks for the infections that thestart-up files and folders refer.If that doe

Strany 153

Responding to security issuesWhat to do if a security risk is found236

Strany 154

This chapter includes the following topics:1 About Norton 360 alerts and messages1 About managing messages and alerts1 Types of risks1 Types of threat

Strany 155

You might see messages in the following locations:Several types of Norton 360messages appear in thenotification area, at the farright of the taskbar.

Strany 156

Norton 360 displaysindividual status areas foreach protection feature, suchas Security, Identity, Backup,and Tuneup. The status areasshow how many iss

Strany 157

After you log in to your Norton Account, you canmanage your product information with the followingoptions:Saves the information for all ofthe Norton p

Strany 158

These risks consist of flawsin legitimate software thatcan be exploited, either tocause damage, block data, orsteal information.Vulnerabilities are us

Strany 159

Types of virusesA virus is a small program that is designed to alter theway your PC operates, without your knowledge orpermission.To be a virus, a pro

Strany 160

These viruses use thetechniques of both boot andfile infector viruses. Norton360 scans for such virusesand eliminates them.Multipartite virusesThese v

Strany 161

This chapter includes the following topics:1 Turning on or turning off automatic tasks1 About custom task1 About scheduling automatic tasks1 About sch

Strany 162

see the results of the latest Norton 360 activities thenext time you open the Norton 360 main window. Tosee a current report of Norton 360 activities,

Strany 163 - Scanning your

Deletes the temporary filesthat are left behind on yourPC's hard disk after Internetbrowsing.Internet Explorer TemporaryFilesDeletes the unnecess

Strany 164

Norton 360 lets you choose your own combination oftasks for a one-time scan. You can run LiveUpdate,back up your data, free disk space by cleaning up

Strany 165 - About the Norton 360 scans

Examine your PC one or moretimes each week for securityand performance issues.You can pick the days of theweek and the time of day onwhich the scan pe

Strany 166 - About Computer Scan

3On the Scheduling tab, under Schedule, select anoption.When you click Weekly or Monthly, you must selectthe time and day to run the automatic tasks.

Strany 167

Does not perform anyscheduled backups ofchanged filesIf you choose this option, youshould manually back up yourchanged files regularly.Manual Schedule

Strany 168 - Running a Quick Scan

Saves your account informationand your billing details.The Profile options are:1 Account InformationYou can update your NortonAccount information andy

Strany 169 - Running a Full System Scan

Doing routine tasksSpecifying Idle Time Out duration250

Strany 170

This chapter includes the following topics:1 About the Smart Firewall1 About Intrusion Prevention1 About Download Insight1 About Norton AntiSpam1 Abou

Strany 171

Cloaks the inactive portson your computer therebyproviding protectionagainst attacks throughhacking techniques suchas port scanningPort scansMonitors

Strany 172 - 1 Total items scanned

3On the General Settings tab, in the Smart Firewallrow, move the On/Off switch to the right to the Offposition.4Click Apply.5In the Security Request w

Strany 173

To turn on Smart Firewall from the notification area4In the notification area on the taskbar, right-clickthe Norton 360 icon, and then click Enable Sm

Strany 174 - Selecting the scan items

pcAnywhere with that specific computer. It thenprocesses the original rule and prevents its use withany other computer.About Traffic rulesNorton 360 i

Strany 175 - Configuring the scan options

Permit the use of theNetBIOS name serviceand the NetBIOSdatagram service that theMicrosoft Network usesin file and printer sharing.NetBIOS is an acron

Strany 176 - Running a custom scan

You can add a new Traffic rule on this tab. You can alsodo the following activities:You can change the settings ofa Traffic rule that does notfunction

Strany 177 - Deleting a custom scan

1 Rename a program.1 Modify the rules for a program.1 Add a rule for a program.1 Modify the access settings of a program rule.1 Modify the priority of

Strany 178 - About scheduling scans

Lets the firewall notifyyou when a programattempts to access theInternet. You can thenallow or block Internetaccess for the program.In some instances,

Strany 179

Norton Online Backupprovides a secure andeasy-to-use online backupsolution that safeguards yourimportant data againstsystem crash, accidentaldeleting,

Strany 180 - Scheduling a Full System Scan

To add a program to Firewall settings1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Firewall.3O

Strany 181 - Scheduling a Quick Scan

7In the Options drop-down list, select the access levelthat you want this program to have.Your options are:Allow all access attemptsby this program.Al

Strany 182 - About Insight Network scan

3On the Program Rules tab, in the Program column,select the program that you want to change.4In the drop-down list next to the program that youwant to

Strany 183 - 1 Insight Network Quick Scan

6Click Apply.Adding Traffic rules and Program rulesFirewall settings automatically create most of thefirewall rules that you need. You can add custom

Strany 184

To use the Add Rule Wizard1Open the Add Rule Wizard by creating a Trafficrule or a Program rule.Keeping secure on the InternetAbout the Smart Firewall

Strany 185 - About Reputation Scan

2In the first panel of the AddRule Wizard, select theaction that you want for this rule. Your options are:Allow communication ofthis type.AllowFor exa

Strany 186 - Executable files

MonitorKeeping secure on the InternetAbout the Smart Firewall266

Strany 187

Update the Firewall –Activities category in theevent log each time thatcommunication of thistype takes place. Thisoption lets you monitorhow often thi

Strany 188

Security History logentry option in the AddRule Wizard or theModify Rule Wizard.3Click Next.4Select the type of connection for the rule. Youroptions a

Strany 189

5Click Next, and then select the computers that applyto the rule. Your options are:The rule applies to allcomputers.Any computerThis rule applies only

Strany 190

Creating a Norton AccountYour Norton Account stores the product key and thebilling information of your product. You can alsoregister your product with

Strany 191

The rule applies only tothe computers, sites, ordomains that you specify.You can specify thenames and addresses ofcomputers that apply tothe rule. The

Strany 192

6Click Next, and then select the protocols for therule. Your options are:The rule applies to TCP(Transmission ControlTCPProtocol)communications.The ru

Strany 193

The rule applies to allsupported protocols.When you select thisoption, you cannotspecify the types ofcommunications or portsthat apply to the rule.All

Strany 194 - Scanning your computer

8Click Next.9Check Create a Security History log entry if youwant Norton 360 to create an entry in the firewallevent log.Norton 360 creates an entry w

Strany 195 - 195Scanning your computer

5In the Modify Rule window, make the necessarychanges to modify any aspect of the rule.6When you have finished changing the rule, clickOK.To modify a

Strany 196

3On the Traffic Rules tab, select the rule that youwant to move.4Do one of the following:1 To move this rule before the rule above it, clickMove Up.1

Strany 197 - About Scan Facebook Wall

To turn off a Traffic rule temporarily1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Firewall.3

Strany 198

6In the SecurityHistory-Advanced Details window,under Actions, click Allow.Removing a firewall ruleYou can remove some of the firewall rules if necess

Strany 199

About Norton Firewall DiagnosisThere may be times when firewall may block thenetwork traffic that you want to allow based on itsconfiguration settings

Strany 200 - About SONAR Protection

For each case of network block, the Wizard containsthe firewall’s analysis of the cause and the possiblesolutions to fix the block.Norton 360 recommen

Strany 201 - About Real Time Exclusions

To create a Norton Account from the Norton AccountWeb page1In the Norton 360 main window, click Account.2In the My Account window, click Access Norton

Strany 202

wAutomatic Program Control configures network accessonly for the versions of programs that Symantecrecognizes as safe. Norton 360 blocks any infectedp

Strany 203 - About Signature Exclusions

suspicious or vulnerable, Norton 360 assigns Poor orBad trust level.wYour computer must be connected to the Internet toaccess the latest reputation in

Strany 204

In the left pane of the firewall alerts, you can find thefollowing reputation information:Shows the stability rating ofthe file on your computer.The s

Strany 205

Shows the user prevalence ofthe file. This data is based onthe information that millionsof Norton Community Watchcustomers shared andSymantec's r

Strany 206 - Microsoft Wordwinword.exe

Shows the trust level of thefile.Symantec assigns thefollowing trust levels:1 Norton Trusted -Indicates the file that isNorton Trusted.1 Good - Symant

Strany 207 - Microsoft Projectwinproj.exe

About Intrusion PreventionIntrusion Prevention scans all the network traffic thatenters and exits your computer and compares thisinformation against a

Strany 208 - About Silent Mode

Turning off or turning on Intrusion PreventionnotificationsYou can choose whether you want to receivenotifications when Intrusion Prevention blockssus

Strany 209

6Click OK.7In the Intrusion Signatures window, click OK.8In the Settings window, click Apply.Excluding or including attack signatures in monitoringIn

Strany 210

5Click OK.Turning off or turning on AutoBlockWhen an attack is detected from a computer, the attackis automatically blocked to ensure that your comput

Strany 211

Unblocking AutoBlocked computersIn some cases, benign network activity can appear tobe similar to an attack and AutoBlock blocks thenetwork activity a

Strany 212

You can also change your Norton Account password,if required. Your computer must be connected to theInternet to access your Norton Account.wSymantec p

Strany 213

To permanently block a computer that has been blockedby AutoBlock1In the Norton 360 main window, click Settings.2In the Settings window, under Detaile

Strany 214 - About Quiet Mode

3On the Intrusion and Browser Protection tab, inthe Browser Protection row, do one of the following:1 To turn off Browser Protection, move the On/Offs

Strany 215 - 215Scanning your computer

When a device on your network attempts to infect yourcomputer, AutoBlock stops all access requests fromthis device. If you add this device to the Intr

Strany 216

1 Your home network is infected.When a device on your network attempts to infect yourcomputer, AutoBlock stops all the access requests fromthis device

Strany 217

1 Yahoo (Browser)1 MSN Explorer (Browser, E-mail & Chat)1 QQ (Chat)1 ICQ (Chat)1 Skype (Chat)1 MSN Messenger (Chat)1 Yahoo Messenger (Chat)1 Limew

Strany 218 - About User-Specified Programs

and poor. Based on the reputation levels, the files canbe broadly classified as follows:Includes the files that are eitherNorton trusted or User trust

Strany 219

By default, Download Insight lets you install safe files.For files of unknown reputation levels, DownloadInsight prompts you to select an action that

Strany 220 - Programs

Turning off or turning on Download IntelligenceDownload Insight protects your computer against anyunsafe file that you may run or execute after youdow

Strany 221 - About boot time protection

3On the Intrusion and Browser Protection tab, inthe Download Intelligence row, move the On/Offswitch to the left to the On position.4In the Settings w

Strany 222 - Protection

3On the Intrusion and BrowserProtection tab, underDownload Intelligence, in the Download InsightNotifications row, do one of the following:1 To receiv

Strany 223

Chapter 1 Getting Started ... ... . ... . ... . ... 7About Norton 360 ... ... ... . ... . ... 7Activation pr

Strany 224

About Norton ManagementNorton Management lets you manage all of your Nortonproducts and Norton product keys from one location.You can add your devices

Strany 225 - 1 "\Program Files\Norton

You can use the following options to configureDownload Insight Full Report:When you set the DownloadInsight Full Report option toAlways, Download Insi

Strany 226

When you set the DownloadInsight Full Report option toUnproven Only, DownloadInsight prompts you to select asuitable action for unknown filesonly. In

Strany 227 - Responding to

When you set the DownloadInsight Full Report option toNever, Download Insight doesnot prompt you to select asuitable action for any type offile that y

Strany 228

4In the Settings window, click Apply, and then clickClose.Turning on or turning off Alert on Poor StabilityWhen you turn on the Alert on Poor Stabilit

Strany 229

email into the Inbox folder and spam email into theJunk folder or the Norton AntiSpam folder.Norton AntiSpam uses Symantec enterprise-class,spam-filte

Strany 230

the addresses from your Outlook address book orWindows address book, it also imports the addressesthat are available in the Safe Sender and the Blocke

Strany 231

1 Uses a user-defined address listto expedite the scanning of email.1 Accepts all email messages fromsenders in the Allowed List.1 Treats all email me

Strany 232

the Norton AntiSpam drop-down list or the options toclassify the email messages as spam or legitimate. Youcan also use these options to empty the spam

Strany 233

the initial client integration. It helps you keep your listof allowed and blocked email senders in sync with yourcurrent address books. When Norton An

Strany 234

You can use the following options:Marks the selected email as spam and movesthe email message into the Junk folder or theNorton AntiSpam folder.When y

Strany 235

Accessing Norton Management on WindowsYou can access Norton Management in one of thefollowing ways:1 Using a Web browser on any computer.1 From the ma

Strany 236 - Responding to security issues

Displays the Norton AntiSpam settings sectionof the Norton 360 Settings windowOpenNortonAntiSpamSetting Address Book ExclusionsWhen you add an email a

Strany 237 - Understanding

7Click OK to save and close the Address BookExclusions window.To edit or delete entries in the Address Book Exclusionslist1In the Norton 360 main wind

Strany 238

2In the Settings window, under Detailed Settings,click AntiSpam.3On the Filter tab, in the Allowed List row, clickConfigure.4In the Allowed List windo

Strany 239 - Types of risks

3On the Filter tab, in the Allowed List row, clickConfigure.4In the Allowed List window, select the item thatyou want to edit or delete.5Do one of the

Strany 240 - Types of threats

4In the Allowed List window, click Import.5In the Allowed List window, click Apply.6Click OK.To add entries to the Blocked List1In the Norton 360 main

Strany 241 - Types of viruses

5Do one of the following:1 To edit an entry, click Edit to open the EditEmail Address dialog box, edit the details, andthen click OK.1 To delete an en

Strany 242

3On the ClientIntegration tab, in the Feedback row,select any one from the following three options:Automatically sends themisclassified email message

Strany 243 - Doing routine

approach to filter spam email messages from legitimateemail messages.The email messages that you receive in your emailprogram undergo scanning through

Strany 244 - About custom task

Norton AntiSpam then sends the email message to youremail program. Based on predefined email rules, theemail program then moves the email message to t

Strany 245 - Running custom tasks

numbers for your email program. If the SMTP and POP3port numbers for your email program are differentfrom the default port numbers, you must configure

Strany 246

To access Norton Management from the Windowsnotification area1Go to the Windows device on which NortonManagement is installed.2In the notification are

Strany 247

5In the AddPort toprotect window, in the Port Typedrop-down list, do one of the following:1 To add the incoming email port, click POP3.1 To add the ou

Strany 248 - About scheduling backups

plan, you can set up NoLimit policy so that Norton 360connects to Symantec servers to ensure completeprotection. However, if you think that Norton 360

Strany 249

Turning off or turning on Network Cost AwarenessYou can set up policies to restrict the Internet usageof Norton 360. If you do not want to restrict th

Strany 250 - Doing routine tasks

The Network Cost Awareness Settings window listsall the network connections that your computer usesto connect to the Internet. You can view the status

Strany 251 - Keeping secure on

6Select one of the following:1 AutoAllows Norton 360 to receive all product andvirus definition updates based on the Windows8 cost awareness policy. B

Strany 252

This chapter includes the following topics:1 About securing your sensitive dataAbout securing your sensitive dataThe Internet provides the fastest and

Strany 253

window. The Norton Safe Web feature provides you asafe search environment in the Web by displaying thesite rating icons next to every search result.Wh

Strany 254 - About firewall rules

In addition, the Norton Site Safety pop-up windowincludes information about Symantec AuthenticatedWeb sites. Web site hackers often mimic company Webs

Strany 255 - About Traffic rules

the security level of all the Web sites that you visit anddisplays the results in the Norton Site Safety pop-upwindow. Antiphishing also blocks naviga

Strany 256

To report an incorrect evaluation of a suspicious Website1Open your browser and go to the Web site that youthink is suspicious.2On the Norton Toolbar,

Strany 257 - About Program rules

5In the confirmation window, click Yes to confirmthat you are already on the device you want tomanage.6In the window that appears, click Save File and

Strany 258

wThe Community Buzz option is available only inEnglish-language versions of Windows.For each Web site that you want to know the site safetystatus, Nor

Strany 259

Norton Safe Web provides the following Web site safetystates when you browse through the Internet:You can see Norton Secured iconnext to the search re

Strany 260

You can see a red cross (x) iconnext to the search results.When you visit a Web site withthis status, you can see a similarstatus icon on the NortonTo

Strany 261 - Customizing a program

Norton Safe Web does not havesufficient information about thisWeb site to provide a shoppingsafety rating.UntestedNorton Safe Web has analyzedthis Web

Strany 262 - Removing a program

let other Facebook users know about the security statusof any Web site.To scan your Facebook Wall using Norton Safe Web,use the ScanFacebookWall optio

Strany 263 - Using the Add Rule Wizard

Searching the Web using Norton Safe SearchNorton Safe Search enhances your Web searchexperience. When you search the Internet using NortonSafe Search,

Strany 264

Norton Safe Search enables youto erase all the data that arerelated to your search activitiesfrom the Ask.com server. ThePrivacy Safeguard feature ofN

Strany 265 - About the Smart Firewall

Turning off or turning on Scam InsightScam Insight prevents you from divulging yoursensitive information such as Social Security Numbersor credit card

Strany 266

The following features in Identity Safe provide securestorage of your sensitive information:Stores login information, suchas your login credentials fo

Strany 267

Norton 360 adds the Norton Toolbar to the InternetExplorer, Firefox, or Chrome Web browsers. TheNorton Toolbar has the following components:1 Norton m

Strany 268

4If you are prompted to provide your email address,in the Email Address box, type the email addressthat you use to log on to your Norton Account, andt

Strany 269

1 Personal information such as your address, date ofbirth, passport number, and social security number.1 Credit card details including card number and

Strany 270

Identity Safe to manage your personal data such asaddresses, date of birth and credit card information.The logins, cards, and notes help you store and

Strany 271

save in one Windows user account from anotherWindows user account. This way Identity Safe protectsyour sensitive data from misuse by multiple users of

Strany 272

1 Reset your Identity Safe.About creating Identity Safe vaultsIdentity Safe helps you manage your sensitiveinformation and provide additional security

Strany 273

In addition to the local vault on your Windows useraccount, you can save your Identity Safe data in onlinevault. The Identity Safe data is stored onli

Strany 274

Signing in to Norton AccountIdentity Safe lets you create a local vault and an onlinevault to save your Identity Safe data. You must log into your Nor

Strany 275

The following are the benefits of moving your IdentitySafe data online:1 Lets you access your Identity Safe data from anycomputer.wYour computer must

Strany 276 - Allowing a blocked program

passwords, and credit card details. You can sync youridentity safe data in the local vault into the online vault.When you save your data in online vau

Strany 277 - Removing a firewall rule

10In the Merge Identity Safe Data Online window,click Merge.Deleting local vault and online vaultIdentity Safe lets you create a local vault and an on

Strany 278

To merge the Identity Safe data from portable profileto local vault or online vault1On the Norton Toolbar, in the Identity Safe menu,click Merge Porta

Strany 279 - About Reputation Firewall

About the supported devicesTo install and use Norton 360, your device must meetthe following minimum system requirements:Hardware requirementWindows1

Strany 280

3Set up Identity Safe.4In the Identity Safe Setup Successful window, doone of the following:1 Check Importmy logins from Internet Explorerto import al

Strany 281

4In the Enter the Password box, type your IdentitySafe password.If you forget your password, Identity Safe lets youenter wrong password three times. I

Strany 282

wYou must be logged in to Identity Safe to access theIdentity Safe features. The Identity Safe features aresupported only in the Internet Explorer, Fi

Strany 283

Identity Safe automatically logs you out of the currentvault, when you are logged in to your local vault oronline vault and click Identity Safe Setup

Strany 284

To configure Identity Safe settings1In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.Securing your sensitive da

Strany 285 - About Intrusion Prevention

2Under Identity Safe, identify the feature that youwant to use, and click Configure. Your options are:Lets you set up Identity Safevault.Identity Safe

Strany 286

Lets you configure the way youwant Identity Safe to collect,store, and display the logininformation for the Web pagesyou visit.You can configure Ident

Strany 287

Lets you manage your personalinformation such as name, dateof birth, email address, andcredit card information in oneplace.You can use the information

Strany 288

Lets you store and managesensitive information.You can save social securitynumber, driver's license number,insurance policy number, andpassport n

Strany 289 - AutoBlock

Lets you move your Identity Safedata that you stored in your localvault to online vault.wWhen you sync yourIdentity Safe data from localvault to onlin

Strany 290

Service Pack 1 and232-bit and 64-bitversions1 MicrosoftWindows VistaHome Basic1 MicrosoftWindows VistaHome Premium1 MicrosoftWindows VistaUltimate1 Mi

Strany 291

1 Lets you quickly launch the Web site login page1 Fills in your login automatically when you revisitWeb pages1 Lets you manually add logins1 Lets you

Strany 292

appears on the top left corner of the Login Assistantwindow.Identity Safe automatically detects login fields whichare not auto filled or filled incorr

Strany 293 - About Download Insight

To save a login1Go to the Web site for which you want to save yourlogin.2Type your login details, and then click the optionor link that logs you in.No

Strany 294

1 Displays the login ID and lets you show or hide thepassword.1 Displays the strength of the password for each ofthe logins.1 Lets you quickly launch

Strany 295

6In the Username dialog box, in the Enter newusername box, type the user name of the login, andthen, click OK.7In the Information dialog box, click OK

Strany 296

To delete a login or a folder1In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.2Under Identity Safe, in the Edi

Strany 297

Ensure that the URL you change belongs to thesame domain as the current URL.1 View the details of the date and time when you lastmade to the Edit Logi

Strany 298

Changing the user name and passwordIdentity Safe lets you change the user name andpassword for the logins that you have saved in the EditLogins window

Strany 299

5In the Validate Password for Identity Safe windowdo the following:1 In the Enter the Password box, type yourIdentity Safe password.1 Click Validate.6

Strany 300 - Download Insight Full Report:

You can use the information that you store in the cardsto do the following:1 Automatically fill forms1 Provide sensitive information without having to

Strany 301

Supported Norton productsTo use all the features of Norton 360, you must use thefollowing versions of Norton security product:If you use an older vers

Strany 302

You can also copy and edit the required fields from theselected card in the Login Assistant window. Bydefault, the important data such as Passwords, C

Strany 303 - About Norton AntiSpam

4Use the following tabs to type your card details:Provide details such as cardname, name, gender, and dateof birth. You can set a passwordand provide

Strany 304

You can view a summary of the card that you created.You can select any of the cards that are present in thelist of cards at the left pane of the Edit

Strany 305 - About spam filtering features

3In the Edit Identity Cards window, select the cardthat you want to delete.4Click Delete Card.5In the Warning dialog box, click Yes.6Click Close.To du

Strany 306

identity numbers that you use when you browse theWeb. The Edit Notes option in Identity Safe stores allyour sensitive IDs in a very secure way and let

Strany 307 - 1 Windows Mail

4Click Edit Notes, and modify the information underDetails.You can change the category, modify the title, andedit the additional information that you

Strany 308

1 Merge the imported data in to the vault that youare currently logged in.1 Replace the existing Identity Safe data that youstored in your vault that

Strany 309

Importing your Identity Safe dataYou can import your Identity Safe data from the filethat you previously backed up. You can also import theIdentity Sa

Strany 310 - AntiSpam

3In the Import Identity Safe Data window, underImport my data from, select one of the followingoptions:1 Portable Profile (Drive: Drive:\)This option

Strany 311

You can configure the following options in theBrowsing Options window:Configures Identity Safe todisplay your logins each timeyou visit a Web site tha

Strany 312 - 1 Domain

1 Any Web site URL that your product identifies asfraudulent1 All the Web site URLs that you visited before thedetection of a risk1 The applications a

Strany 313

About Password & SecurityYou can use Password & Security to change yourIdentity Safe password. You can also use this option toset the level of

Strany 314

Password Security381Securing your sensitive dataAbout securing your sensitive data

Strany 315

Specify the Identity Safepassword security level.Identity Safe provides fourlevels of security to protectyour Identity Safe password.Choose one of the

Strany 316 - About Web Query

period. You can specifythe idle time-out periodas 15, 30, or 45 minutes.Use this option if otherpeople have access toyour computer.1 Ask for my passwo

Strany 317

the password by using the Password & Security optionin Settings window.If you want to change the Identity Safe password ofyour online vault, the p

Strany 318

You have the following options in the NortonToolbar:Lets you access IdentityProtection and other settings.The following options areavailable in the No

Strany 319

Lets you access the Identity Safedata stored in your online vault.You can add, edit or delete yourLogins, Cards, and Notes underthis section.You can u

Strany 320 - About Network Cost Awareness

Lets you view the logins andcards that you have saved inIdentity Safe.Some Web sites have forms tofill or require login information.You can use the Va

Strany 321 - 1 No Traffic

In Google Chrome Web browser, the Norton Toolbarcan be accessed as a Chrome Extension. In theExtensions page of the Chrome browser, you can enableor d

Strany 322

When you hide the toolbar, Norton 360 does not displaythe Norton Site Safety pop-up window. However,Norton 360 notifies you about suspicious andfraudu

Strany 323

option in the Administrative Settings window. Youcan also review the data, which Norton CommunityWatch collects and submits to Symantec, in theSecurit

Strany 324

2In the main menu that appears, click Tools >Extensions.3Under Extensions page, click Show button option.Accessing Identity Safe settings from the

Strany 325

2On the NortonToolbar, in the Norton menu, selectone of the following:Lets you report to Symantecabout the current Antiphishingevaluation.Report SiteL

Strany 326 - About Antiphishing

Lets you turn on the Norton SafeWeb feature which provides asafe online browsing experience.The following are the uniquefeatures of Norton Safe Web:1

Strany 327

Accessing the Vault Open/Vault Closed menuThe Vault Open/Vault Closed menu on the NortonToolbar lets you view and manage the logins, Identitycards, an

Strany 328

2On the Norton Toolbar, in the Vault Open/VaultClosed menu, select one of the following:Lets you merge the IdentitySafe data from your portableMerge P

Strany 329 - About Norton Safe Web

Settings395Securing your sensitive dataAbout securing your sensitive data

Strany 330

Lets you view the variousoptions that are available inIdentity Safe.The options are:1 Edit LoginsLets you open the EditLogins window.1 Edit Identity C

Strany 331

autofill the logininformation in the currentWeb page.Lets you open the NortonFeedback Web site.You can submit feedback onyour experience with Identity

Strany 332

Securing your sensitive dataAbout securing your sensitive data398

Strany 333

This chapter includes the following topics:1 About the Network Security MapAbout the Network Security MapA home network typically consists of the comp

Strany 334

Chapter 4 Scanning your computer ... . ... . 163About the Norton 360 scans ... . ... . ... 163About Computer Scan ... ...

Strany 335

computer. Your computer might be infected with avirus if you experience any of the following symptoms:1 You cannot install Norton 360.1 You cannot sta

Strany 336 - 1 Click Search

1 Subscription status and Norton product version ofthe computers that are connected to your network1 Status of your wireless network connection1 Conne

Strany 337

wNorton 360 requires you to configure the SymantecSecurity Driver to open the Network Security Map. Youcannot install the Symantec Security Driver whe

Strany 338

To view the details of a device on the Network SecurityMapProtecting your home networkAbout the Network Security Map402

Strany 339

4In the NetworkSecurityMap window, click a deviceicon.You can use the scroll arrows to view the devicesthat are listed in the network map.The device d

Strany 340

Shows the category to which thedevice belongsThe device category iconprovides details on theconnection status and securitystatus. Norton 360 labels al

Strany 341 - About Identity Safe vaults

Shows the access level that isgranted to a remote device toconnect to your computerThe initial trust level is set basedon the configuration of yourcom

Strany 342

You can click each of the features and read thesummary to learn more about using Network SecurityMap to manage your home network. By default, theNetwo

Strany 343 - 1 Reset your Identity Safe

wEnsure that the computers that you want to remotelymonitor have a version of a Norton product thatsupports Remote Monitoring.Norton 360 requires a Pa

Strany 344

Turning off Remote MonitoringWhen you turn off Remote Monitoring, you stop remotemonitoring of the computers that are connected toyour network.You can

Strany 345

You can add the following details when you add adevice:1 The name or description1 The IP address or physical addressThe Network Security Map finds any

Strany 346

Programs containingmalicious codes that aredisguised as or hiding insomething benign, such as agame or utility.Trojan horsesTools that are used by aha

Strany 347

6In the IP or Physical Address box, type the IPaddress or physical address of the device that youwant to add to the Network Security Map.You can use t

Strany 348

To find the IP address by using ipconfig on WindowsVista1On the computer you want to identify, on theWindows taskbar, click Start.2In the Start Search

Strany 349

help you identify the devices that are listed in thenetwork map.To edit the details of the device that is on your network1In the Norton 360 main windo

Strany 350 - Resetting Identity Safe

To edit the name of the device that you added manually1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,

Strany 351 - Accessing Identity Safe

network. The initial network trust level is set based onthe configuration of your computer.wEnsure that you change the trust level of a device toFull

Strany 352 - 1 The Norton Toolbar

To change the trust level of your network1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click My Netw

Strany 353

6To select a trust level for a network, in the EditNetwork Trust Level window, click one of thefollowing:Adds the network to the TrustedlistFULL TRUST

Strany 354

Adds the network to theRestricted listThe devices that are onRestricted network cannotcommunicate with yourcomputer. However, you can stilluse the net

Strany 355

6To select a trust level for a device, in the EditDeviceTrust Level window, click one of the following:Adds a device to the Full TrustlistFull Trust d

Strany 356 - Securing your sensitive data

computer increases the scan time which slows downthe network speed of your computer.If you know that a specific device on your network issafe, you can

Strany 357 - 1 Change your login settings

Programs that track systemactivity, gather systeminformation, or track userhabits, and relay thisinformation to third-partyorganizations. Theinformati

Strany 358

5In the Network Security Map window, do one ofthe following:1 To edit the trust level of a device that is on yournetwork, in the network map, click th

Strany 359 - About Edit logins

When you remove an individual device, the onlinedevices appear again the next time you open theNetwork Security Map. However, Norton 360permanently re

Strany 360

For more information on how to secure your wirelessnetwork, on the left side of the Network Security Mapwindow, click the Why is it not secure link. F

Strany 361 - Saving logins

To view the device details1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click My Network.3In the Net

Strany 362 - Editing logins

2In the Settings window, under Detailed Settings,click My Network.3In the Communication Port box, type a newcommunication port number.You must use the

Strany 363

This chapter includes the following topics:1 About Tuneup1 About disk and file fragmentation1 Optimizing your permanent disks manually1 About using op

Strany 364 - 1 Click Validate

Tuneup detects and fixes common computer problems,cleans up unwanted cookies and files, and defragmentsthe hard disk to optimize PC performance.About

Strany 365

wYou can run Disk optimization only when disk has morethan 15 percent of free space.Some programs, such as movie-editing programs orprograms that requ

Strany 366

Norton 360 automaticallyoptimizes the hard disk asneeded. You can also set aschedule for optimization.Set a schedule foroptimizationLarge files are of

Strany 367

When you browse a Webpage, your browserdownloads the text andgraphics that comprise thecontents of the page. Whenyou finish viewing the page,the brows

Strany 368 - About Edit Cards

You can download Norton Bootable Recovery ToolWizard in one of the following ways:1 From the Start menu.1 From the Norton Support Web site.To download

Strany 369 - 1 Automatically fill forms

2When the activity is complete, in the Tuneupwindow, click Close.Running Registry CleanupThe Windows registry can contain the entries that referto fil

Strany 370 - Adding cards

About Startup ManagerSome programs are configured to launch during startupof your computer. The number of startup itemsincreases as you install new ap

Strany 371

program and measure the performance of yourcomputer the next time you start your computer.Norton 360 delays the start of the delayed programsby five m

Strany 372

To disable startup items1In the Norton 360 main window, click Tuneup, andthen click Run Startup Manager.2In the On/Off column, uncheck a program that

Strany 373 - About Edit Notes

To run delayed startup items manually1In the Norton 360 main window, click Tuneup, andthen click Run Startup Manager.2In the Startup Manager window, c

Strany 374 - Editing Notes

This chapter includes the following topics:1 About Norton Backup and Restore1 About backups1 About backup preparation1 About backup set1 Backing up yo

Strany 375

About backupsOne of the most important ways to protect the valuableinformation on your PC is to back up your filesregularly. In case you lose your dat

Strany 376 - 1 Plain text

No matter which backup method you choose, you canalways add or remove items from the set of files thatyou select to back up. You can add or remove ani

Strany 377

You can choose from a varietyof file types, such as photos,documents, and music. Youcan also specify individualfiles.You have the followingoptions:1 S

Strany 378 - About Browsing Options

Where439Protecting your media and dataAbout backup preparation

Strany 379 - 1 Ask before saving

About locating your Norton Product Key or activationPINTo use Norton Bootable Recovery Tool, you must startthe computer from any of the following reco

Strany 380 - About Password & Security

You can choose any storagelocation that Norton 360offers for your backuplocation, depending on yourPC and the connecteddevices.You can choose to store

Strany 381 - Password Security

available in the Settingswindow.You can have Norton 360back up your files when yourcomputer is idle. You can alsoset a regular backup scheduleor manua

Strany 382

you can create a backup set to back up your picturefiles and music files to a CD. You can also createanother backup set to back up your Microsoft Offi

Strany 383 - 1 Ask for my password

set to back up your pictures to your local fixed disk.You can create another backup set to back up yourvideos to a CD. You can also configure differen

Strany 384

name does not describe the backup set after you modifythe configuration.wThe maximum character length of a backup set nameis 32 alphanumeric character

Strany 385

sorts them into various categories. It then backs up thefiles that fall into these categories.Norton 360 uses the following file categories:This categ

Strany 386

This category includes, but isnot limited to: MPEG AudioStream, Layer III files (.mp3);MPEG-4 Video files (.mp4);MPEG-4 Audio Layer files(.m4a); Apple

Strany 387

This category includes, but isnot limited to: MicrosoftMoney files (.mny, .mn1,.mn2, .mn3, .mn4, .mn5,.mn6, .mn7, .mn8, .mn9,.mn10, .mn11, .mn12, .mn1

Strany 388

This category includes, but isnot limited to: MicrosoftWindows Media files (.wmv);Apple QuickTime Video Clipfiles (.mov); MPEG 1 SystemStream files (.

Strany 389

This category includes, but isnot limited to: MicrosoftWord documents andtemplates (doc, .dot);Microsoft Excel Worksheetand templates (.xls, .xlt,.xla

Strany 390

1 If you received your Norton product preinstalledby the computer manufacturer, the Product Key isavailable on your Norton Account. When you areprompt

Strany 391

This category includes, but isnot limited to: MicrosoftOutlook Address Book files(.wab); Microsoft PersonalAddress Book files (.pab);Palm Address Book

Strany 392

.fm file extension in the Office Documents category,you can add the .fm file extension to the category.The Edit File Type option on the What tab of th

Strany 393

with the file extension that you added and backs themup to that file category. For example, if you want toback up the documents with a .fm file extens

Strany 394

Removing a file extension from a backup categoryEach backup file category contains a list of fileextensions. However, you can remove a default fileext

Strany 395 - Settings

4In the window that appears, click Reset Defaults.5Click Save.Deleting previously backed up filesYou can delete the files that you backed up previousl

Strany 396

2On the Summary tab, in the Backup set namedrop-down list, select the backup set that you wantto delete.3Under Things you can do, click Delete backup

Strany 397

Adding files and folders to a backup setYou are not limited to backing up the files that Norton360 automatically detects and places into its filecateg

Strany 398

4In the file selection window that appears, navigateto file that you want to add, click to select it, andthen click Open.5Click OK.6In the Manage Back

Strany 399 - Protecting your

You can exclude a file or folder from the backup setfrom Windows Explorer by using the shortcut menu.The shortcut menu is available after you configur

Strany 400

6In the Manage Backup Sets window, click SaveSettings to save the settings.To exclude a file or folder from a backup set in WindowsExplorer1In Windows

Strany 401

Creating Norton Bootable Recovery Tool on a CD orDVDNorton Bootable Recovery Tool is integrated withWindows Preinstallation Environment (WinPE).Theref

Strany 402 - Protecting your home network

following table to choose a location that best meetsyour needs for safety, speed, and storage capacity:Your subscription to Norton 360comes with an al

Strany 403 - 1 The device does not have a

This choice backs your files upto a special folder on drive C ofyour PC. Backing up to drive C isvery quick and convenient, andis only limited to the

Strany 404

CD, DVD, or Blu-ray discsProtecting your media and dataAbout backup set462

Strany 405

This choice requires that youhave recordable CDs, DVDs, orBlu-ray discs and an optical drivein your PC to record on thosediscs. You must be present to

Strany 406 - Setting up Remote Monitoring

location for the first time, Norton360 prompts you to configurethe optical backup drive on yourcomputer. Norton 360 lets youinstall the optical driver

Strany 407

Flash drives and the other datastorage devices that areattached to your PC can alsoserve as backup locations.Norton 360 displays suchdevices as extern

Strany 408 - Turning off Remote Monitoring

3On the Where tab, select the location and devicewhere you want your backups to be stored.If the device or location does not appear on the list,click

Strany 409 - 1 The name or description

Viewing or changing a backup scheduleNorton 360 lets you schedule backups when it isconvenient for you. You can schedule your backups torun late at ni

Strany 410

Choose this option to haveNorton 360 backup your filesonly when you start thebackup yourself.Manual ScheduleYour computer's performance is maximi

Strany 411 - Editing device details

To delete a backup set1In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.2On the Summary tab, in the Backup set namedrop-d

Strany 412

Creating Norton Bootable Recovery Tool ISO fileYou can create a Norton Bootable Recovery Tool ISOfile on your computer. You can burn this ISO file to

Strany 413 - Editing network details

Whether you have set Norton 360 to back up your PCautomatically or not, you can always run a backup. Forexample, you have added or modified important

Strany 414

When you restore files, you can change any of thefollowing settings:You can choose any of thebackup sets to restore thefiles.If you backed up your dat

Strany 415

You can restore to theoriginal locations of the files,or navigate to a new locationwhere you can restore yourfiles. Norton 360 displays thetotal numbe

Strany 416

Choosing where to restore files fromWhen Norton 360 restores files, it displays the backuplocation of the most recent backup set you ran. Youcan chang

Strany 417

Selecting files to restoreWhen you restore backed-up files with Norton 360, youmight not need to restore all the files from a backup.You can restore t

Strany 418

You can use any of the following methods, and you cancombine methods, to select files to restore:You can restore all thebacked-up files withoutexcludi

Strany 419

2Under Files, in the Search text box, type all or partof a file name, or the extension of the file.3Click Search.The window that appears displays the

Strany 420

wRestoring files to their original locations deletes newerversions of the same files that are stored in thoselocations. If you do not want to replace

Strany 421

When you insert an optical disc that contains thebacked-up files, the Autorun Restore featureautomatically opens the Portable Restore window.wIf you d

Strany 422 - Viewing the device details

To restore files using Norton 360 Autorun Restore1Insert an optical disc that contains the backed-upfiles.2Click the ARestore icon to launch the Autor

Strany 423 - Security Map

To create Norton Bootable Recovery Tool on a USB key1Insert the USB key into the USB port of yourcomputer.2In the Norton Bootable RecoveryTool Wizard

Strany 424

destinations where your files are backed up. Eachbackup destination contains the backup sets to whichthe backup destination is configured.Norton Backu

Strany 425 - Keeping your PC

Viewing backup files on the Norton Backup DriveYou can use the Norton Backup Drive to view the filesthat are backed up. You can view the Norton Backup

Strany 426

2Select the backup destination, and navigate to thebackup set destination that contains the file thatyou backed up.3Do one of the following:1 Right-cl

Strany 427

About solutions to the backup problemsThe following table provides some tips to help youavoid backup problems.The following tips apply to allbackups:1

Strany 428

The following tips apply tobackups to CDs or DVDs:1 Have extra discs on handwhen you back up. Thistip helps you to avoidoccasional disc flaws orsituat

Strany 429

The following tips apply tobackups to external drives:1 Some drives use olderWindows file systems,such as FAT-16 or FAT-32that cannot store fileslarge

Strany 430 - Running Diagnostic Report

The following tips apply tobackups to online storage:1 Make sure that your PCdoes not automaticallydisconnect from theInternet when it is not inuse.1

Strany 431 - About Startup Manager

and search the Symantec Knowledge Base for solutionsto your problem.To get additional help with backup problems1In the Norton 360 main window, click S

Strany 432

Although online backup is convenient and safe, beforechoosing it for your backup method, consider thefollowing limitations:Speed limitationsProtecting

Strany 433 - Managing startup items

The amount of time that it takesto transfer your backup to theSecure Online Storage dependson the speed of your Internetconnection. If you have manyfi

Strany 434

If you have a valid Norton product key or activationPIN, you can go to your Norton Account and access theNorton Bootable Recovery Tool download link.T

Strany 435

up your smaller files, such asyour financial documents andword-processing documents.If a backup is in progress, youshould leave your computerturned on

Strany 436 - About backups

1 The amount of online storage space that is availableto youYour product needs to be activated to use the onlinebackup feature. The first time you con

Strany 437 - About backup preparation

storage does not contain sufficient space for thebackup, Norton 360 notifies you and provides you anoption to buy more space.You do not have to wait u

Strany 438

all automatic backup of files. You can use the RunBackup Now option in the main window if you want toback up your files from all the backup sets.You c

Strany 439

Turning off or turning on backup settingoptionsNorton 360 provides you various options to manageyour backup settings. Norton 360 backup settings letyo

Strany 440

Indicates that the file has beenexcluded from backupNorton 360 displays a disabledbackup status on a file when youexclude the file from any of theback

Strany 441 - About backup set

3In the Backup Settings window, do one of thefollowing:1 To turn off icon overlays, in the Backup StatusOverlays row, move the On/Off switch to therig

Strany 442 - Creating a new backup set

This chapter includes the following topics:1 About Norton 360 Settings1 Customizing Norton 360 Settings1 Turning on or turning off Quick Controls serv

Strany 443

You can configure the following Detailed Settings inthe Settings window:Specify how certain types ofviruses and spyware, as well asother threats, are

Strany 444 - About backup file categories

View all the devices available inyour network and specify thetrust level of the devices that areconnected to your network.You can hide or show theNetw

Strany 445

About Download Insight .. . ... ... ... 293About Norton AntiSpam . . ... . ... ... 303About configuring POP3 and SMTPpor

Strany 446

Norton Bootable Recovery Tool automaticallydownloads the latest virus definitions from Symantecservers and uses these virus definitions to secure your

Strany 447

Configure Identity Safe to secureyour online identities andtransaction data.You can also configure SafeSurfing options.Identity ProtectionSpecify when

Strany 448

The Quick Controls in the Settings window let youturn on or turn off the following services:Turns on or turns off Silent ModeYou can turn on Silent Mo

Strany 449

Turns on or turns off SmartFirewallWhen you turn on SmartFirewall, it monitorscommunications between yourcomputer and the othercomputers on the Intern

Strany 450 - About backup file extensions

provides the slider setting for you to decide whetherto resolve security threats automatically or ask youbefore it takes an action.1 You can configure

Strany 451

1 Safe Surfing1 Identity Safe1 Backup1 Backup Status Overlays1 Automatic LiveUpdate1 Smart Firewall1 Norton Tamper ProtectionYou should leave all of t

Strany 452

You can use the following Antivirus settings:The Automatic Protectionsettings let you control thescanning and monitoring of yourcomputer.It protects y

Strany 453

Scans and RisksCustomizing settingsAbout Antivirus settings506

Strany 454 - 1 Where tab

Scans and Risks settings let youcustomize the scans that Norton360 performs on your computer.You can use the following Scansand Risks options:1 Comput

Strany 455

Norton 360 to protect theports.1 Email Antivirus ScanEmail Antivirus Scan protectsyou from the threats that aresent or received in emailattachments.Th

Strany 456

1 Exclusions / Low RisksExclusions options specifythe items such as folders,files, and drives that youexclude from Norton 360scans. Scans, signatures,

Strany 457

4Read the Norton License Agreement, type yourProduct Key, and then click I Agree.If you use a non-QWERTY keyboard, use the VirtualKeyboard option to e

Strany 458

Antispyware protects yourcomputer against the securityrisks that can compromise yourpersonal information andprivacy.Norton 360 protects yourcomputer f

Strany 459 - About backup locations

About Automatic Protection settingsThe Boot Time Protection option on the AutomaticProtection tab provides an enhanced security levelfrom the time you

Strany 460

You can use the following Real Time Protectionoptions:Auto-ProtectCustomizing settingsAbout Antivirus settings512

Strany 461

Auto-Protect loads intomemory and providesconstant protection while youwork. It checks for virusesand other security risks everytime that you run prog

Strany 462

boot virus infects yourremovable media, ensurethat Auto-Protect isturned on to rescan theremovable media. Youthen insert the removablemedia and open i

Strany 463

SONAR Protection515Customizing settingsAbout Antivirus settings

Strany 464

Symantec Online Network forAdvanced Response (SONAR)provides the real-timeprotection against threatsand proactively detectsunknown security risks onyo

Strany 465 - Choosing a backup location

360 to automaticallyremove low-certaintythreats if it does not getany response from youwhen SONAR AdvancedMode option is enabled.1 Show SONAR BlockNot

Strany 466

You can use the following Scans and Risks settings:Computer ScansCustomizing settingsAbout Antivirus settings518

Strany 467

Norton 360 lets you run differenttypes of scans to detect andprevent any virus infection onyour computer. The scans areQuick Scan, Full System Scan,an

Strany 468 - Deleting a backup set

To update Norton Bootable Recovery Tool virusdefinitions on a USB key1Insert your Norton Bootable Recovery Tool USB keyinto the USB port of your compu

Strany 469 - Backing up your files

Scans for rootkits and othersecurity risks that might behidden on your computer.1 Network Drives ScanScans the network drivesthat are connected to you

Strany 470 - Restoring files

1 Full System ScanScans your computer whenit is idle.When your computer is idle,Norton 360 runs a FullSystem Scan. After the scanis complete, you can

Strany 471

The Scan Performance Profilessettings let you configure howNorton 360 should scan yourcomputer based on the digitalsignature and trust level of thefil

Strany 472

Protected Ports settings protectthe POP3 and SMTP ports ofyour email program.You can use this option tomanually configure your POP3and SMTP email port

Strany 473

Exclusion / Low RisksCustomizing settingsAbout Antivirus settings524

Strany 474 - Selecting files to restore

Exclusions options specify theitems such as folders, files, anddrives that you exclude fromNorton 360 scans. Scans,signatures, and low-risk itemsare s

Strany 475

also remove items from theexcluded-items list.1 Signatures to Exclude fromAll DetectionsLets you select known risksby name and remove a riskname from

Strany 476

The Insight Network scan usesthe Cloud technology wherein aremote server on the Webcontains the latest virusdefinitions. Norton 360 scansyour computer

Strany 477

UpdatesCustomizing settingsAbout Antivirus settings528

Strany 478 - 1 The name of the backup set

Norton 360 protects yourcomputer from vulnerabilitiesthrough the latest program anddefinition updates. Definitionupdates contain the informationthat l

Strany 479

2In the page that appears, click Download NortonPower Eraser.3Save the NPE.exe file to your Desktop.4Double-click the NPE.exe file on your Desktop.5Re

Strany 480

Definitions are a subset ofvirus definitions.1 Apply updates only onrebootLets you choose how theprogram updates obtainedby Automatic LiveUpdateneed t

Strany 481 - Backup Drive

The following tabs are available in the Firewall settingswindow:Lets you activate the generalfirewall features andcustomize the ports that yourcompute

Strany 482

Prevents intrusion attemptsand protects your Webbrowser from attacks bymalicious Web sitesYou can use the DownloadIntelligence option that isavailable

Strany 483 - 1 Regularly check the

Lets you activate theadvanced protection featuresof Smart FirewallThe advanced settings let youturn on or turn off theAutomatic Program Controlfeature

Strany 484

About Firewall General settingsSmart Firewall General settings let you activate thegeneral firewall features and customize the ports thatyour computer

Strany 485 - 1 To avoid accidentally

Automatically allows the Internettraffic that matches theconnections that an applicationopens.Check this option to do thefollowing:1 Analyze the netwo

Strany 486

to date. If you do not use Automatic LiveUpdate, youshould run LiveUpdate once a week.Norton 360 also provides the Web Browser Protectionfeature to pr

Strany 487

when Automatic Program Control is set to Aggressiveor Automatic. You can use this option to specify howNorton 360 must control any network traffic tha

Strany 488 - Speed limitations

triggers the allowed event is added to the trusted listof its corresponding category in Advanced EventsMonitoring. You can remove the application from

Strany 489 - 1 Low usage

Monitors the Trojan horses andother malicious programs thatbypass network traffic.These programs penetrate theWindows TCP/IP layer to sendand receive

Strany 490

Automatic updates require an Internet connection. Ifyou use a proxy server to connect to the Internet, youmust configure the proxy settings in your pr

Strany 491

Norton AntiSpam settings help you configure thefollowing:1 The email client with which Norton AntiSpamshould integrate1 The list of allowed email send

Strany 492

The options on the ClientIntegration tab let you integrateNorton AntiSpam with youremail clients to keep you freefrom unsolicited emailmessages. You c

Strany 493

Lets you check the SymantecWeb servers to filter the spamemail messages which the localfilters classify as legitimate.Web QueryLets you configure your

Strany 494

Norton 360 supports NortonAntiSpam integration with theaddress books of email clientsfrom which you want NortonAntiSpam to import emailaddresses.You c

Strany 495

You can use the Configure option in the NetworkSecurity Map row to access Network Security Mapwindow. The Network Security Map window providesa pictor

Strany 496

Removes all of the devices that arelisted in Network Map.You can purge Network Map if youwant to create a new list of devices.For example, you can pur

Strany 497 - Customizing

Shows the communication port thatNorton products use to communicatewith each other over the network.If you change the communicationport number on your

Strany 498 - About Norton 360 Settings

1 Select the files that are required to be backed up.1 Choose the location to store the backed up files.1 Assign a schedule to run a backup.In additio

Strany 499 - 499Customizing settings

Lets you view the backup statusof a file by adding the statusoverlay to the file’s iconThe status overlays that appearsare:1 Green icon with a check m

Strany 500

Lets you add or exclude a file ora folder to a backup set by usingthe right-click shortcut menuYou can use this option after youconfigure Backup in th

Strany 501 - 501Customizing settings

wLiveUpdate does not download the latest definitionupdates and program updates, if the Network CostAwareness option in the Settings window is set to N

Strany 502

Lets you specify the amount oflocal disk space that you want toreserve.When you perform an onlinebackup, Norton 360 creates atemporary file in your lo

Strany 503

Antiphishing tells you the following things about theWeb pages that you visit:1 If it is safe to enter confidential information1 If the Web page is kn

Strany 504 - About Antivirus settings

log in to Identity Safe. The password protects you byrestricting unauthorized access to your data in IdentitySafe.The Identity Safe feature provides y

Strany 505 - 505Customizing settings

AdviceDescriptionFeatureYou can use theinformation thatyou store in thecards to do thefollowing:1 Automaticallyfill forms1 Providesensitiveinformation

Strany 506

AdviceDescriptionFeatureIt becomesdifficult tomanage variousidentitynumbers. EditNotes stores allof your sensitiveIDs in a verysecure way andlets you

Strany 507 - 507Customizing settings

Task Scheduling includes the following settings:Lets you specify the tasks thatshould run in the backgroundautomatically when yourcomputer is idleThes

Strany 508

SchedulingCustomizing settingsAbout Task Scheduling settings556

Strany 509 - 509Customizing settings

Lets you schedule PC Securityand PC Tuneup related activitiesYou can specify how oftenNorton 360 should scan yoursystem for security andperformance is

Strany 510

idle when there is no detectablemouse or keyboard activity for aperiod that you specify as idletimeout duration. When youschedule your scans weekly or

Strany 511

Lets you view how Norton 360has protected you for the past30 days.This report includes theactivities that Norton 360performed to protect yourcomputer.

Strany 512

The type of definition updates that each of theSymantec products receive are as follows:Users of these productsreceive the latest virusdefinitions fro

Strany 513 - 513Customizing settings

Lets you specify the automaticconfiguration details, proxysettings, and the authenticationdetails to connect to theInternet.Programs such as LiveUpdat

Strany 514

Lets you submit selectedsecurity and application data toSymantec for analysis.Norton Community Watchprotects you against newpotential risks. It collec

Strany 515 - 515Customizing settings

Lets you remotely view yourdevice’s security status and fixsome security issues by usingNorton Management, NortonOne, and Norton Studio. NortonStudio

Strany 516

Performance Monitoring563Customizing settingsAbout Administrative Settings

Strany 517 - 1 Show SONAR Block

Lets you monitor theperformance of your computer.When the PerformanceMonitoring option is turned on,Norton 360 monitors the CPUusage and memory usage

Strany 518

Norton 360 saves the eventin the Security History logbut does not alert you withthe notifications. You canalso turn off this option ifyou do not want

Strany 519 - 519Customizing settings

1 Use Low Resource Profile OnBattery PowerLets you configure Norton360 to change the resourcethreshold to low profile whenyour computer runs onbattery

Strany 520

1 High-Usage Alert for:2 CPUWhen this option isturned on, Norton 360detects and notifies youabout the increasedusage of the CPUresource by any program

Strany 521 - 521Customizing settings

1 Program ExclusionsLets you select specificprograms to exclude fromappearing in performancealerts.You can use the Configureoption to list the program

Strany 522

Lets you secure the product andprotect it from unauthorizedchanges.You have the following options:1 Non-Admins Access toSettingsLets you access andcon

Strany 523 - 523Customizing settings

Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.In addition, user

Strany 524

Silent Mode SettingsCustomizing settingsAbout Administrative Settings570

Strany 525 - 525Customizing settings

Lets you turn on or turn offSilent Mode.You have the following options:1 Silent ModeWhen you turn on the SilentMode option, you enableSilent Mode for

Strany 526

When you use a MediaCenter application torecord a TV program,Norton 360 detects theactivity, andautomatically turns onQuiet Mode. When QuietMode is tu

Strany 527

Lets you delay the automaticrunning of Norton-specificbackground tasks when youresume your computer fromhibernate mode or standbymode.Automatic Resume

Strany 528

Lets your PC run smoothly andefficiently by deleting theunused temporary files andbrowsing history if you useFirefox Web browser.Norton 360 automatica

Strany 529 - 529Customizing settings

If you want to temporarily turn off Norton ProductTamper Protection, you can turn it off for a specifiedduration.wYou cannot run System Restore on you

Strany 530 - About Firewall settings

To turn on Norton Product Tamper Protection1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Admin

Strany 531 - 531Customizing settings

You can turn off the Settings Password Protectionoption if you no longer require password protectionfor your Norton 360 Settings.Securing your Norton

Strany 532

Turning off Norton 360 Settings passwordYou can protect your Norton 360 Settings with apassword using the Settings Password Protectionoption. If the S

Strany 533 - 533Customizing settings

wThe reset settings password option appears in theSelect Uninstall Preference window only if theSettings Password Protection option is turned on. Tous

Strany 534

Contains the most importantvirus definitions that arerequired for latest securitythreats as viewed by Symantec.The Core Set is a subset of theComplete

Strany 535 - 1 Block the suspicious

About Remote ManagementThe Remote Management feature lets you remotelymanage Norton 360 using Norton Studio app, NortonManagement, and Norton One. It

Strany 536

By default, the Remote Management option is turnedoff. You can turn on this option if you want to remotelymanage Norton 360 on your device.In the Nort

Strany 537

2 Auto-Protect2 Scan incoming emails2 Scan outgoing emails2 Antispyware2 Intrusion Prevention2 SONAR2 Antiphishing2 Browser Protection1 Perform the fo

Strany 538

To turn on Remote Management1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Administrative Setti

Strany 539

Customizing settingsAbout Administrative Settings584

Strany 540

This chapter includes the following topics:1 Finding the version number of your product1 Finding the End-User License Agreement1 About upgrading your

Strany 541 - About Filter settings

Finding the End-User License AgreementEnd-User License Agreement (EULA) is a legaldocument that you agree to while installing theproduct. EULA contain

Strany 542

turn on the Automatic Download of New Versionoption. To turn on the Automatic Download of NewVersion option, go the Norton 360 main window, andthen cl

Strany 543 - About My Network settings

updates. You can use LiveUpdate to obtain the latestupdates.The upgrade process might not work if your Webbrowser is incompatible to communicate with

Strany 544

To check for a new version of the product1In the Norton 360 main window, click Support.2In the Support drop-down menu, click Check forNew Version.This

Strany 545 - 545Customizing settings

installation time, lesser boot time, and lesser memoryconsumption. It also occupies lesser amount of diskspace as compared to the full set of virus de

Strany 546 - About backup settings

configure the proxy settings of Norton 360. See“Configuring Network Proxy Settings” on page 67.If you do not know your proxy settings, contact yourInt

Strany 547

4In the Checking Your Connection window, clickRetry.5If you use a proxy server to connect to the Internet,you may be prompted to authenticate. If you

Strany 548

To stay informed about protection issues1Open your Web browser, and go to the followingURL:http://www.symantec.com2In the Symantec Web site, click Nor

Strany 549 - 549Customizing settings

wSupport offerings may vary based on the language orproduct.About Norton Support Web siteThe Norton Support Web site provides a full range ofself-help

Strany 550

contact the technical support team in the followingways:Chat in real time with asupport representative.For more complex technicalissues, chat offers t

Strany 551

also use the SearchSupport box to find solution usinga keyword.Norton Support Web site also contains useful links tothe product manual, the Norton Acc

Strany 552 - 1 Quickly

Getting support by phoneWhen you click the Get Support option in the Supportdrop-down menu, Norton Autofix performs a QuickScan and should repair your

Strany 553

Support policySymantec recommends that you have the latest versionof the product, as it contains new and enhancedfeatures for better protection agains

Strany 554

If you are a Norton One Premium Member, go to thefollowing Norton One support Web site for informationon this topic:https://one.norton.com/supportClub

Strany 555 - 555Customizing settings

Uninstalling Norton 360You can remove Norton 360 from your computer in thefollowing ways:1 From Windows Control Panel1 From the Start menuwYou should

Strany 556

Chapter 13 Customizing settings ... . ... . ... .. 497About Norton 360 Settings ... ... ... 497Customizing Norton 360 Se

Strany 557 - 557Customizing settings

turn off or turn on the Automatic LiveUpdate optionfrom Quick Controls in the Settings window.wIf you are connected to the Internet, AutomaticLiveUpda

Strany 558 - About Administrative Settings

To uninstall Norton 360 from Windows Control Panel1Do one of the following:1 On the Windows Taskbar, click Start > ControlPanel.1 In Windows 8, go

Strany 559 - 559Customizing settings

5To uninstall Norton 360, click Next.6If Norton 360 offers to install the Norton Toolbarafter uninstall, do one of the following:1 To keep the Norton

Strany 560

3To uninstall Norton 360, click Next.4If Norton 360 offers to install the Norton Toolbarafter uninstall, do one of the following:1 To keep the Norton

Strany 561 - 561Customizing settings

Aabout customer support 593Actions windowdeleting security risks 139performing actions 139restoring security risks 139submission, items toSymantec 139

Strany 562

attentioninfected files 234infected items 172resolve any items 172Attention Requiredabout 172resolving the risk 172Auto-Protectnotifications 229Automa

Strany 563 - 563Customizing settings

Browser Protectionturning on and turning off 290Browsingoptions 378Browsing Optionsabout 378Ccache files 428Cardsabout 368adding 370deleting 371duplic

Strany 564

detectingsecurity risks 228deviceadding 408editing details 411excluding from IntrusionPrevention scan 418purging from exclusion list 292remotely monit

Strany 565 - 565Customizing settings

firewall rules (continued)removing 277turning on and off 275Firewall settingsadding programs 259foldersscanning 245fragmentation 426Full Screen Detect

Strany 566

Internet (continued)temporary files 245, 428Intrusion AutoBlockblocking computerspermanently 289turning on and off 288unblocking computers 289Intrusio

Strany 567 - 567Customizing settings

multipartite viruses 241NNetworkchanging trust level 413discovering devices 406editing details 413forming 406joining 406managing 399Network Cost Aware

Strany 568

presence of a specific virus or security threat. Norton360 shows the date on which you last updated the virusand spyware definitions.You can also chec

Strany 569 - 569Customizing settings

Norton AntiSpam (continued)Feedback 315settings 539SSL 303Web Query 316Norton Autofixsupport assistants 589Norton Backup and Restore 435Norton Backup

Strany 570

Ppasswordchanging 383editing 362Norton Account 29saving 361updating 368PC securitycategories 117PC Tuneupcategories 117disk cleanup 429disk optimizati

Strany 571 - 571Customizing settings

Quarantine (continued)managing items 153opening 153removing items 157restoring items 156Quarantined Items viewadding items 125Quick Controlsturning on

Strany 572

Safe Webturning off 334turning on 334scan at the command promptcommand line scanning 223Scan Completeappearing after a scan 234Scan Complete windowapp

Strany 573 - 573Customizing settings

Settings 497Administrative Settings 558antivirus 504customizing 502firewall 276, 530, 534home network 543Identity Protection 550Quick Controls 503sett

Strany 574 - 1 Firefox History Cleanup

Symantec Web siteblogs and forums 591System Insightabout 75Events graph 75monitoring activities 78Performance graph 75system status graphactivity deta

Strany 575

Web Query (continued)turning off 317turning on 317Web sitescache files 428Windows temporary files 245wireless networkviewing status 421worms 240Index6

Strany 577

fooNorton from Symantec products protect consumers from traditional threats with antivirus, phishing protection, and spywareprotection. They also prot

Strany 578

If you do not activate your service orrenew your subscription, you cannotobtain updates of any kind and thesoftware no longer functions.If you purchas

Strany 579

that require system restart are automatically appliedthe next time you restart your computer.To turn on or turn off Apply updates only on reboot1In th

Strany 580 - About Remote Management

additional and fast protection for the latest threats inbetween the full updates without disrupting your onlineexperience.Even if you do not turn on P

Strany 581

About Network Proxy SettingsA proxy server regulates access to the Internet, andprevents external computers from accessing yournetwork. If you are on

Strany 582

Network Proxy Settings window lets you specify thefollowing settings:Lets you specify the automaticconfiguration URL or script tomanage Internet acces

Strany 583

Lets you connect to the Internetthrough a server that requiresauthentication.Use the Username box andPassword box to type theauthentication details.Au

Strany 584

4In the Network Proxy Settings window, do thefollowing:1 If you want your browser to automatically detectnetwork connection settings, under AutomaticC

Strany 585 - Finding additional

Indicates that your computerrequires attention.At the bottom section of theNorton 360 main window,click Fix Now to resolve thesecurity threats on your

Strany 586 - About upgrading your product

This chapter includes the following topics:1 About Norton 3601 Activation protects you1 About your Norton Account1 About Norton Management1 About Nort

Strany 587

When your system status or protection categoriesstatuses are marked as At Risk or Attention, you canresolve the security issues directly from the main

Strany 588

You can right-click the icon to see a shortcut menu forNorton 360. You can choose items on the shortcut menuto open the Norton 360 window, to fix any

Strany 589 - About Norton Autofix

Use this option to create abackup of your files.You can specify when andhow often Norton 360 backsup your files.Run Backup NowUse this option to revie

Strany 590

To view details of a protection feature1In the Norton 360 main window, click on aprotection feature, and then click View Details.In the window that ap

Strany 591

Getting StartedAbout Norton 360 status74

Strany 592 - About Support

This chapter includes the following topics:1 About System InsightAbout System InsightNorton 360 continuously monitors your computer tokeep it free of

Strany 593 - About Norton Support Web site

alerts, or Quick Scans. The graph displays theactivities as icon or stripe, and the description foreach icon or stripe is provided at the bottom of th

Strany 594

The Norton Tasks window provides the details suchas the timestamp, the duration, and the status ofthe background jobs. The details also include thetyp

Strany 595 - About phone support

About monitoring system activitiesSystem Insight provides information about theimportant system activities that you performed or thatoccurred over a p

Strany 596 - Getting support by phone

Indicates the optimizationactivities that you performed onyour system over a period of thelast three months.OptimizedProvides the details about thethr

Strany 597 - Worldwide service and support

Norton 360 is completely automated and easy to use.It works quietly in the background to maintain youroverall system integrity with minimal effect on

Strany 598 - ClubNorton

Provides the details about QuickScans that Norton 360performed on your system overa period of the last threemonths.The details include the date onwhic

Strany 599 - Uninstalling Norton 360

2In the Performance window, at the top of the Eventsgraph, click the tab for a month to view the details.3In the Events graph, move the mouse pointer

Strany 600

access the Resource Threshold Profile for Alertingoption, go to the Norton 360 main window, and thenclick Settings > Administrative Settings >Pe

Strany 601

Turns on performance alerts.Select this option if you wantNorton 360 to notify you withperformance alerts when aprogram or process exceedsthe threshol

Strany 602

3Under Performance Monitoring, in thePerformanceAlerting row, do one of the following:1 To turn off performance alerts, move thePerformanceAlerting sw

Strany 603

3Under Performance Monitoring, in the ResourceThreshold Profile for Alerting row, select one ofthe following options:Configures a low thresholdlimit f

Strany 604

the program or the process manually and free theresource.If the Use Low Resource Profile On Battery Poweroption is turned on, Norton 360 automatically

Strany 605

To exclude a program from performance alerts1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Admi

Strany 606

6Click OK.7In the Settings window, click Close.About CPU graph and memory graphNorton 360 monitors the overall system CPU usageand memory usage and th

Strany 607

1 The file name, version number, digital signature,the date on which the process was installed.1 The date on which the process was last used andwhethe

Strany 608

Includes the performancetuning features, such ascleaning up unwanted filesand performing RegistryCleanup.TuneupDepending on the security status of the

Strany 609

2In the Performance window, do one of the following:1 To view the CPU graph, click the CPU tab.1 To view the memory graph, click the Memorytab.1 To ma

Strany 610

2In the Performance window, do one of the following:1 To view the CPU graph, click the CPU tab.1 To view the memory graph, click the Memorytab.3Click

Strany 611

structures so that they can grow without immediatelybecoming fragmented again.You can optimize your boot volume manually by usingthe Optimize option i

Strany 612

can view details such as timestamp, duration, andstatus of the background job.To optimize your boot volume from the Performancewindow1In the Norton 36

Strany 613

to optimize the boot volume during idle time. Bydefault, this option is turned on.Turning off or turning on Idle Time OptimizerNorton 360 automaticall

Strany 614

You can use the icon that appears before the nameof a background job to start or stop a backgroundtask. You can start or stop a background task at any

Strany 615

The Norton Tasks window lets you monitor thefollowing Norton-specific tasks:Automatic LiveUpdateautomatically checks fordefinition updates andprogram

Strany 616

Deletes the unnecessary Webpage history that is leftbehind in your Internetbrowser's history folder.Removes the traces of anyInternet searches th

Strany 617

Allows the smart scanning offiles on your computer. Itimproves the performance ofNorton 360 scans by lettingyou scan fewer files withoutcompromising t

Strany 618

Scans the important locationsof your computer that theviruses and other securitythreats often target.Quick Scan takes less time toscan than a Full Sys

Komentáře k této Příručce

Žádné komentáře