help

584
6.0 Product Manual Care for our Environment; It's the right thing to do.Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual is made from recycled materials.

Upload: shrirangkatti

Post on 20-Jan-2016

23 views

Category:

Documents


1 download

DESCRIPTION

Help

TRANSCRIPT

Page 1: Help

6.0

Product Manual

Care for our Environment; ‘It's the right thing to do.’Symantec has removed the cover from this manual to reduce the Environmental Footprint of ourproducts. This manual is made from recycled materials.

Page 2: Help

Norton 360™ Product Manual

The software described in this book is furnished under a licenseagreement and may be used only in accordance with the terms ofthe agreement.

Documentation version 6.0

Copyright © 2011 Symantec Corporation. All rights reserved.

Symantec, the Symantec Logo, LiveUpdate, Norton 360, and Nortonare trademarks or registered trademarks of Symantec Corporationor its affiliates in the U.S. and other countries. Portions of thisproduct Copyright 1996-2011 Glyph & Cog, LLC. Other names maybe trademarks of their respective owners.

The product described in this document is distributed under licensesrestricting its use, copying, distribution, and decompilation/reverseengineering. No part of this document may be reproduced in anyform by any means without prior written authorization of SymantecCorporation and its licensors, if any.

THE DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESSOR IMPLIED CONDITIONS, REPRESENTATIONS ANDWARRANTIES, INCLUDING ANY IMPLIED WARRANTY OFMERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE ORNON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENTTHAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.SYMANTEC CORPORATION SHALL NOT BE LIABLE FORINCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTIONWITH THE FURNISHING, PERFORMANCE, OR USE OF THISDOCUMENTATION. THE INFORMATION CONTAINED IN THISDOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.

The Licensed Software and Documentation are deemed to becommercial computer software as defined in FAR 12.212 and subjectto restricted rights as defined in FAR Section 52.227-19 "CommercialComputer Software - Restricted Rights" and DFARS 227.7202, etseq. “Commercial Computer Software and Commercial ComputerSoftware Documentation”, as applicable, and any successorregulations. Any use, modification, reproduction release,performance, display or disclosure of the Licensed Software andDocumentation by the U.S. Government shall be solely in accordancewith the terms of this Agreement.

Symantec Corporation350 Ellis Street,Mountain View, CA 94043

http://www.symantec.com

Page 3: Help

Chapter 1 Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7About Norton 360 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7Activation protects you . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20About your Norton Account . . . . . . . . . . . . . . . . . . . . . . . . 24About Norton Community Watch . . . . . . . . . . . . . . . . . 32About Norton Bootable Recovery

Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34About updating Norton 360 . . . . . . . . . . . . . . . . . . . . . . . 38About Network Proxy Settings . . . . . . . . . . . . . . . . . . . . 48About Norton 360 status . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

Chapter 2 Monitoring your system'sperformance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

About System Insight . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

Chapter 3 Maintaining total protection . . . . . . . . . . . . . . . . . . 103About total protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103About keeping your computer secure . . . . . . . . . . . 104About solving connection problems . . . . . . . . . . . . 106About responding to emergencies . . . . . . . . . . . . . . . 106About monitoring protection

features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108About viewing details of system

vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144

Chapter 4 Scanning your computer . . . . . . . . . . . . . . . . . . . . . . . 149About the Norton 360 scans . . . . . . . . . . . . . . . . . . . . . . 149About Computer Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152

Contents

Page 4: Help

About Insight Network scan . . . . . . . . . . . . . . . . . . . . . . 168About Reputation Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170About Scan Facebook Wall . . . . . . . . . . . . . . . . . . . . . . . . 182About SONAR Protection . . . . . . . . . . . . . . . . . . . . . . . . . . 185About scanning Office documents . . . . . . . . . . . . . . . 189About Silent Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191About boot time protection . . . . . . . . . . . . . . . . . . . . . . . 204Running a scan at the command

prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205

Chapter 5 Responding to security issues . . . . . . . . . . . . . . . . 209What to do if a security risk is found . . . . . . . . . . . 209

Chapter 6 Understanding alerts andmessages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219

About Norton 360 alerts andmessages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219

About managing messages andalerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219

Types of risks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221Types of threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222Types of viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223

Chapter 7 Doing routine tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225Turning on or turning off automatic

tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225About custom task . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226About scheduling automatic tasks . . . . . . . . . . . . . . 228About scheduling backups . . . . . . . . . . . . . . . . . . . . . . . . 230Specifying Idle Time Out duration . . . . . . . . . . . . . . 231

Chapter 8 Keeping secure on the Internet . . . . . . . . . . . . . . 233About the Smart Firewall . . . . . . . . . . . . . . . . . . . . . . . . . 233About Intrusion Prevention . . . . . . . . . . . . . . . . . . . . . . 260About Download Insight . . . . . . . . . . . . . . . . . . . . . . . . . . . 269About Norton AntiSpam .. . . . . . . . . . . . . . . . . . . . . . . . . . 279About configuring POP3 and SMTP

ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294About Metered Broadband Mode . . . . . . . . . . . . . . . . 296

Contents4

Page 5: Help

Chapter 9 Securing your sensitive data . . . . . . . . . . . . . . . . . . 301About securing your sensitive data . . . . . . . . . . . . . 301

Chapter 10 Protecting your home network . . . . . . . . . . . . . . . 375About the Network Security Map .. . . . . . . . . . . . . . . 375

Chapter 11 Keeping your PC tuned up . . . . . . . . . . . . . . . . . . . . . 401About PC Tuneup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401About disk and file fragmentation . . . . . . . . . . . . . . 402Optimizing your permanent disks

manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402About using optimization efficiently . . . . . . . . . . . 403About cleaning up disk clutter . . . . . . . . . . . . . . . . . . . 404Running a scan to clean up disk

clutter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405Running Registry Cleanup . . . . . . . . . . . . . . . . . . . . . . . . 406Running Diagnostic Report . . . . . . . . . . . . . . . . . . . . . . . 406About Startup Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407

Chapter 12 Protecting your media and data . . . . . . . . . . . . . 411About Norton Backup and Restore . . . . . . . . . . . . . . 411About backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412About backup preparation . . . . . . . . . . . . . . . . . . . . . . . . 413About backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417Backing up your files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446Restoring files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447About Norton Backup Drive . . . . . . . . . . . . . . . . . . . . . . 456About solutions to the backup

problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460About online backup considerations . . . . . . . . . . . . 464Turning off or turning on backup . . . . . . . . . . . . . . . 469Turning off or turning on backup setting

options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471

Chapter 13 Customizing settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475About Norton 360 Settings . . . . . . . . . . . . . . . . . . . . . . . . 475Customizing Norton 360 Settings . . . . . . . . . . . . . . . 480Turning on or turning off Quick Controls

services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481

5Contents

Page 6: Help

About Antivirus settings . . . . . . . . . . . . . . . . . . . . . . . . . . 482About Firewall settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506About Norton AntiSpam settings . . . . . . . . . . . . . . . . 515About My Network settings . . . . . . . . . . . . . . . . . . . . . . . 519About backup settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521About Identity Protection settings . . . . . . . . . . . . . . 524About Task Scheduling settings . . . . . . . . . . . . . . . . . 528About Administrative Settings . . . . . . . . . . . . . . . . . . . 532

Chapter 14 Finding additional solutions . . . . . . . . . . . . . . . . . . 553Finding the version number of your

product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553Finding the End-User License

Agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554About upgrading your product . . . . . . . . . . . . . . . . . . . 554About Norton Autofix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557Staying informed about protection

issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559About Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560Uninstalling Norton 360 . . . . . . . . . . . . . . . . . . . . . . . . . . 566

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 569

Contents6

Page 7: Help

This chapter includes the following topics:

1 About Norton 360

1 Activation protects you

1 About your Norton Account

1 About Norton Community Watch

1 About Norton Bootable Recovery Tool

1 About updating Norton 360

1 About Network Proxy Settings

1 About Norton 360 status

About Norton 360Norton 360 offers proven performance and deliverstoday’s fast and light all-in-one solution to protect yourPC and all your online activities. It protects againstviruses, worms, hackers, and botnet. With a singlesubscription, you can protect up to three PCs. Itsafeguards against online identity theft, protectsimportant files, and keeps your PC tuned and runningat peak performance.

Norton 360 is completely automated and easy to use.It works quietly in the background to maintain youroverall system integrity with minimal effect on PC

1Getting Started

Page 8: Help

performance. By offering an unmatched combinationof performance and protection, Norton 360 helps youget the most out of your PC and your online experience.

About Norton 360 main windowThe Norton 360 main window acts as a securitymanagement interface. You can access the mainfeatures and monitor the performance of yourcomputer from the main window.

As you use your computer, Norton 360 monitors howwell your computer and activities are protected fromthreats, risks, and damage. Norton 360 displays theprotection status of your computer in the main window.

Depending on the security status of your computer, atthe top left of the Norton 360 main window, Norton360 shows your System Status as Secure, Attention,or At Risk. If your system status is marked asAttention or At Risk, at the bottom of the mainwindow, click FixNow to resolve all the security threatson your computer.

The options that are available in the main windowsummarize the most essential security and theproductivity issues that challenge users. They are:

Includes all virus, spyware,firewall, and other securityfeatures.

PC Security

Includes the protectionagainst phishing andfraudulent Web sites.

Identity

Includes the automatic andthe customizable backupsand restore capability.

Backup

Getting StartedAbout Norton 360

8

Page 9: Help

Includes the performancetuning features, such ascleaning up unwanted filesand performing RegistryCleanup .

PC Tuneup

Depending on the security status of the differentcomponents of your computer, the status areas of thefour protection categories are marked as Protected,Attention, or At Risk.

When the System Status or protection categoriesstatuses are marked as At Risk or Attention, at thebottom of the main window, click Fix Now to resolveall the security threats on your computer.

Norton 360 also provides you easy links at the top ofthe main window to the most frequent tasks. They are:

Lets you access the Taskswindow to run general tasks,backup tasks, and PC Tuneuptasks.

Tasks

Lets you access the Settingswindow to configure settingssuch as Firewall, Antispam,and Backup.

Settings

9Getting StartedAbout Norton 360

Page 10: Help

Lets you open thePerformance window inNorton 360.

The Performance windowchronicles all installs,downloads, optimizations,detections, alerts, andinstances of Quick Scan thatoccurred on your computersince installing Norton 360.The window also displays adetailed graphicalrepresentation of the CPUand memory usage by yourNorton product.

Performance

Lets you give feedback aboutthe Norton product that youuse.

Feedback

Lets you access the MyAccount window to manageyour Norton Account.

Account

Lets you access supportoptions, product upgradeoptions, subscription status,and product version number.

You can also access theonline Help from theSupportdrop-down menu. Helpprovides links to informationthat assists you with thespecific tasks that you wantto complete. The online Helpguides you to configure all ofthe product features.

Support

The bottom section of the Norton 360 main windowprovides you up-to-date virus and threat information.

Getting StartedAbout Norton 360

10

Page 11: Help

When your system status is AtRisk or Attention, thissection automatically provides you the FixNow optionto fix all the issues at once.

11Getting StartedAbout Norton 360

Page 12: Help

The bottom section of the Norton 360 main windowhelps you do the following:

Activity Map

Getting StartedAbout Norton 360

12

Page 13: Help

Lets you access the worldmap with hotspots ofcybercrimes and the latestthreats.

The Activity Map shows thetop cities in the world wheremost of the cybercrimeactivities occur. These citiesare represented as yellowdots on the map. You canclick a continent in the worldmap to view its cities with thehighest number of threats.The details on the ActivityMap are updated from aSymantec server on a regularbasis. Your computer must beconnected to the Internet toreceive the activity mapupdates.

You can view the date andtime that the Activity Mapwas last updated. You canalso use theMap Details linkto get a brief idea of theActivity Map.

When you click Map Details,the Activity Map shows aseries of latest viruses andthreats that your productprotects your computer from.You can use the info link nextto each item to view itsdetails in an overlay window.You can also use the ViewDetails link in the overlaywindow to know more aboutthe threat in a Symantec Webpage.

13Getting StartedAbout Norton 360

Page 14: Help

Lets you access NortonManagement.

Norton Management lets youmanageyourNortonproductsinstalled on all of yourdevices from one location. Tosign up or to log into NortonManagement, click theManage icon at the bottomof the main window. You canuse your existing NortonAccount login information toaccess Norton Management.The Norton Managementagent should be installed oneach device that you want toadd to Norton Management.

w Norton Managementmay not be available in someversions of Norton 360.

Manage

Lets you download theNorton Mobile Security forAndroid.

Norton Mobile Security helpsprotect your mobile devicesagainst loss, theft, viruses,and other mobile threats. Youcan use Norton MobileSecurity on all your devicesthat use the Androidoperating system.

w Norton Mobile Securitymay not be available in someversions of Norton 360.

Mobile

Getting StartedAbout Norton 360

14

Page 15: Help

Online Family

15Getting StartedAbout Norton 360

Page 16: Help

Lets you monitor your child’sactivities on the Internet.

w Norton Online Familymay not be available withsome versions of Norton 360.In such case, you may not beable to access Norton OnlineFamily options.

When you clickOnline Familyicon on the main window, thebottom section of the Norton360 main window displaysNorton Online Family sign inoptions. Norton Online Familyprovides you advancedcontrols to monitor yourchild's online activities.

You can use the link on thebottom section of the Norton360 main window to set upyour account with NortonOnline Family.

Symantec recommends thatyou use your Norton Accountlogin credentials to sign in toNorton Online Family. If youregister your product withyour Norton Account, yourNorton Account emailaddress is auto-filled in theemail address text box.

After you set up youraccount, you can sign in toyour account on the bottomsection of the Norton 360main window and view yourchild’s Internet activities. Thebottom section of the Norton360 main window showsdetails such as your child’s

Getting StartedAbout Norton 360

16

Page 17: Help

latest search terms, and thelatest alerts. After you signin, you can use the GetDetails option in the bottomsection of the Norton 360main window to view moredetails on the Norton OnlineFamily Web site.

17Getting StartedAbout Norton 360

Page 18: Help

Safe Web

Getting StartedAbout Norton 360

18

Page 19: Help

Lets you check the safety ofa Web site.

You can also perform a safesearch.

w This option may not beavailable with some versionsof Norton 360. In such case,you may not be able to accessthis option.

When you clickSafeWeb iconon the main window, thebottom section of the Norton360 main window displaysNorton Safe Web options.

You can use the Check Siteoption in the bottom sectionof the Norton 360 mainwindow to analyze thesecurity levels of any Website that you want to visit.When you type a Web siteaddress in the text box andclick Check Site, it shows theSymantec’s ratings for theWeb site.

You can use the Safe Searchoption in the bottom sectionof the Norton 360 mainwindow to search forinformation on the Internet.The Norton Safe Search usesAsk.com to generate thesearch results. Norton SafeSearch provides a site safetystatus and a Norton rating foreach of the search resultsgenerated.

You can also use the Viewrecent Norton Safe Web

19Getting StartedAbout Norton 360

Page 20: Help

activity option in the bottomsection of the Norton 360main window to view therecent Norton Safe Webstatistics on malicious sitesand URLs. You can also viewthe list of new maliciousURLs.

Your activation status or subscription status appearsat the bottom of the main window. You can use theActivate Now option to activate or subscribe yourNorton product.

Activation protects youProduct activation protects users from pirated orcounterfeit software. It protects you by limiting theuse of a product to those users who have acquired theproduct legitimately. Product activation requires aproduct key for each installation of a product. You mustactivate the product within a limited time period afteryou install it.

If you are connected to the Internet, product activationtakes place automatically when you start the productfor the first time after installation. After activation,the Norton Account window appears. You can createyour Norton Account and register your product.

If you are not connected to the Internet, you can clickTry Later in the Activation not complete window tostart your product. The Activation window reappearsevery time you start your product until you activateyour product. If you choose not to activate at that time,you receive an alert that reminds you to activate theproduct. You can also activate your product by clickingthe Trial Period Status link in the Norton 360 mainwindow.

Getting StartedActivation protects you

20

Page 21: Help

w If you do not activate the product within the timeperiod that the alert specifies, the product stopsworking. You can activate it after the time period haselapsed, but you are not protected until you activatethe product.

Activating Norton 360To use all of the features in Norton 360, you must firstactivate your product. Product activation reducessoftware piracy and ensures that you have authenticSymantec software. You can renew your subscriptionafter the end of your subscription period.

If you are connected to the Internet, product activationtakes place automatically when you start the productfor the first time after installation. During activation,the Norton Account window appears. You can createyour Norton Account and register your product. Youcan also view details, such as your Product Key andrecent updates to the product. If you skip the NortonAccount window, the product is activated, but theProduct Key is not saved in the Norton Account. Youcan print the Product Key for the future, if you needto reinstall your product.

If you did not activate your product during installation,Norton 360 prompts for activation each time you startthe product. Also, you receive an activation alertregularly until you activate the product.

w You must activate your product within the time periodthat the alert specifies, or your product stops working.

You can activate your product directly from theactivation alert. You can also activate your productfrom the Trial Period Status link in the main windowor from the My Account window. In some cases, youmight need to enter your Product Key to activate yourproduct. You can activate or renew the subscription ofyour product from any non-admin user account as well.Activation should take only a few minutes.

21Getting StartedActivation protects you

Page 22: Help

To activate Norton 360, your computer must beconnected to the Internet. If you use a proxy server toconnect to the Internet, you must configure the proxysettings. To configure proxy settings, go to the Norton360 main window, and then click Settings >Administrative Settings > Network Proxy Settings >Configure.

To activate Norton 360 from the alert

1 In the alert, click Activate Now or Renew Now.

2 Click OK.

3 Follow the on-screen instructions.

4 In the window that appears, click Done.

To activate your Norton 360 from the My Accountwindow

1 In the Norton 360 main window, click Account.

2 In the My Account window, click Activate Norton360 or Renew Subscription.The Renew Subscription option is available if youhave already activated your product.

3 Follow the on-screen instructions.

4 In the window that appears, click Done.

To activate your product from the main window

1 In the Norton 360 main window, do one of thefollowing:

1 If you purchased a subscription version of aretail product, click Activate Now.

1 If the product came installed on your computer,click Activate Online Now.

1 If you want to renew the subscription of yourproduct, click Renew.

2 Follow the on-screen instructions to activate orsubscribe your product.

Where to find your product keyThe product key is a unique key that helps you to installand activate the Symantec product on your computer.

Getting StartedActivation protects you

22

Page 23: Help

The product key is a 25-character alphanumeric stringthat is shown in five groups of five characters each,separated by hyphens. The location of the product keyvaries depending on how you acquired the product.

The locations of the product key are as follows:

The product key is either ona sticker on the CD sleeve oron an insert in the productpackage.

If you purchased a retail copyof the product on CD

The product key is on theDVD package.

If you purchased the producton DVD

The product key is stored onyour computer as part of thedownload process and isincluded in the confirmationemail from the SymantecStore.

If you downloaded theproduct from the SymantecStore

The product key is providedas part of the activationprocess. Be sure to save yourproduct key by creating orsigning in to your NortonAccount, or by printing thekey. You may need theproduct key if you ever wantto reinstall your product.

If your computer came withthe product already installed

The product key is printed onthe card along withinstructions on how to use it.Be sure to save your productkey by creating or signing into your Norton Account. Youneed the product key if youever want to reinstall theproduct.

If you received a product keycard

23Getting StartedActivation protects you

Page 24: Help

To recover or access yourproduct key log on tohttps://account.norton.com.If you are not registered,register for Norton Account.You can find the product keyon the Products tab in theNorton Account page.

If you are still unable tolocate your product key, youcan recover it using NortonAccount

About problems during activationIf you cannot connect to the Symantec servers toactivate your product, first check your Internetconnection. You then need to see if you have parentalcontrol software, either installed or through your ISP,that might block the connection.

A connectivity problem can occur if you use parentalcontrol software. If you suspect that parental controlsmight block the connection, you can configure theparental controls so that they do not block theactivation procedure. You need to log in to yourparental control software or to the Internet throughyour ISP as an administrator to change yourconfiguration.

If you use a proxy server to connect to the Internet,you must configure the proxy settings. To configurethe proxy settings, go to the Norton 360 main window,and then click Settings > Administrative Settings >Network Proxy Settings > Configure.

About your Norton AccountWhen you create a Norton Account, you can manageall of your Norton products in one place. You can storeyour product keys in your Norton Account and alsobuy additional product keys. You can also register yourproduct with the Norton Account. It takes only a few

Getting StartedAbout your Norton Account

24

Page 25: Help

moments to create your Norton Account. You must beconnected to the Internet to create a Norton Account.

After you create a Norton Account, you can access andmanage your account information and productinformation from anywhere. It helps to reinstall yourproducts and download the latest version of theproducts. If you install your product on more than onePC, you can use the same Norton Account. To accessyour Norton Account, go to the following URL:

https://account.norton.com

You can create a Norton Account in the following ways:

1 During activation

You can create your Norton Account and registeryour product from the Norton Account windowthat appears when you activate the product. Youmust provide your account information in theNorton Account window that appears.

1 Any time after activation

You can create a Norton Account from the AccessNorton Account link available in the My Accountwindow.

25Getting StartedAbout your Norton Account

Page 26: Help

After you log in to your Norton Account, you canmanage your product information with the followingoptions:

Saves the information for all ofthe Norton products that youown.

The Products tab provides youthe information about theNorton products that you ownand the expiration date. You canclick the arrow icon against aproduct for more informationsuch as product key and theregistration date. You can alsobuy a new product key to protectadditional computers. You canuse the Update option to checkand download the latest productversion using Norton UpdateCenter.

Products

Contains order information ofthe Norton products you boughtfrom Norton online store.

Order History

Getting StartedAbout your Norton Account

26

Page 27: Help

Saves your account informationand your billing details.

The Profile options are:1 Account Information

You can update your NortonAccount information andyour shipping address on theAccount Information tab.After you update, clickUpdate to save the changes.

1 Billing Information

You can save your credit cardinformation and your billingaddress on the BillingInformation tab. It makes iteasier for saving onlineorders. After you update,click Update to save thechanges.

1 Change Password

You can change your currentNorton Account password onthe Change Password tab.

Profile

You can use the icons at the bottom of your NortonAccount Web page to access and use the following:

Norton Online Familymonitors and manages yourchild's Internet activities andcomputer usage.

Norton Online Family

27Getting StartedAbout your Norton Account

Page 28: Help

Norton Online Backupprovides a secure andeasy-to-use online backupsolution that safeguards yourimportant data againstsystem crash, accidentaldeleting, virus infection, andother disasters.

Norton Online Backup

Norton Safe Web checks thesafety of a Web site and letsyou perform a safe Websearch.

Norton Safe Web

The Symantec Web siteprovides more informationabout the various products ofSymantec, the latest updateson Internet security, andvarious support options.

Norton.com

Norton Update Center checksand lets you download thelatest version of your Nortonproduct.

Norton Update Center

If you forget your Norton Account password, you canget a temporary password by clicking the Forgot yourpassword link in the Norton Account sign-in Webpage. You need to provide your email address. You needto use the same email address that you provided whenyou created your Norton Account. Symantec sends atemporary password to your email address. You canuse the temporary password for a limited time period.You must reset your password after you log in to yourNorton Account.

Getting StartedAbout your Norton Account

28

Page 29: Help

Creating a Norton AccountYour Norton Account stores the product key and thebilling information of your product. You can alsoregister your product with the Norton Account.

In addition, Norton Account helps you to do thefollowing:

1 Access the product key and other productinformation when you need it.

1 Reinstall your Norton product.

1 Buy additional product keys for your home or office.

1 Check and download the latest version of theproduct by using Norton Update Center.

1 Save online orders and update billing information.

1 Manage your online backup.

Your computer must be connected to the Internet tocreate a Norton Account. If you use a proxy server toconnect to the Internet, you must configure the proxysettings. To configure the proxy settings, go to theNorton 360 main window, and then click Settings >Administrative Settings > Network Proxy Settings >Configure.

You can also create a Norton Account when youactivate your product. When you create your NortonAccount from the product, your product gets registeredin your account. If you have an existing NortonAccount, you can provide the same email address inthe NortonAccount window in your product. This way,you can register your current product and add it to thelist of Norton products in your existing NortonAccount. If you upgrade your registered product to thelatest available version, your product remainsregistered to the same Norton Account. In this case,you can continue using the same Norton Account logincredentials.

w Symantec products that are older than the 2006product year do not appear in your Norton Account.

29Getting StartedAbout your Norton Account

Page 30: Help

To create a Norton Account from the Norton AccountWeb page

1 In the Norton 360 main window, click Account.

2 In the My Account window, click Access NortonAccount.

3 In the Norton Account Web page that appears, clickSign up now.

4 In the Norton Account Sign Up Web page, providethe details about your account information, andthen click Sign Up.

To create a Norton Account and register your productafter activation

1 In the Norton 360 main window, click Account.

2 In the My Account window, click Access NortonAccount.

3 In the CompleteYourActivation window, type youremail address, and then click Next.

4 In the CreateyourNortonAccount window, provideyour account details, and then click Next.Your product information gets saved in your NortonAccount only after you log in to your NortonAccount.

5 In the window that appears, click Done.

To log in to your Norton Account and access yourproduct information, visit https://account.norton.com.

Accessing your Norton AccountThe product key for each Norton product isconveniently stored in your Norton Account. After youhave created your Norton Account successfully, youcan access your account from anywhere in the world.You can log in to your Norton Account any time byvisiting the following URL:

https://account.norton.com

You can easily find and update your account, product,and billing information from your Norton Account.

Getting StartedAbout your Norton Account

30

Page 31: Help

You can also change your Norton Account password,if required. Your computer must be connected to theInternet to access your Norton Account.

w Symantec products that are older than the 2006product year do not appear in your Norton Account.

To access Norton Account

1 In the Norton 360 main window, click Account.

2 In the My Account window, click Access NortonAccount.

3 In the Norton Account Web page that appears, typeyour email address and password, and click SignIn.

Creating a temporary password for Norton AccountIf you forget the password of your Norton Account, youcan create a temporary password to sign in to yourNorton Account. The temporary password is sent tothe email address that you provided when you createdyour Norton Account.

After you sign in to your Norton Account by using thetemporary password, you are prompted to change yourpassword.

To create a temporary password for Norton Account

1 In the Norton 360 main window, click Account.

2 In the My Account window, click Access NortonAccount.

3 In the Norton Account Web page that appears, underForgot your password?, click Recover it here.

4 In the Forgot your Password Web page, verify theemail address that is provided in the EmailAddresstext box, and then click Continue.A temporary password is sent to your email address.You can use this temporary password to sign in toyour Norton Account.

31Getting StartedAbout your Norton Account

Page 32: Help

About Norton Community WatchNorton Community Watch helps in identifying newsecurity risks by submitting selected security andapplication data to Symantec for analysis. Symantecassesses the data to determine the new threats andtheir sources. The collective efforts from Nortonsecurity product users help in quick identification ofsolutions for these threats and risks. NortonCommunity Watch improves user security and productfunctionality. In addition, it helps Symantec to analyzethe execution, schedule, and efficiency ofNorton-specific tasks and settings on your computer.

Norton Community Watch collects and submits thefollowing types of data:

1 Identified malicious software such as portableexecutable files and running processes

1 Any Web site URL that your product identifies asfraudulent

1 All the Web site URLs that you visited before thedetection of a risk

1 The applications and processes that run on yourcomputer regularly and during any security riskdetection

1 Response instances that your computer sends toany potential security risk

1 General system information and performanceattributes from the computer

1 General information about your computer such asidle time, standby, and screensaver settings

After the potential security risks are assessed from thesubmitted data, Symantec sends the information backto Norton 360. The Norton features such as NortonInsight and Insight Network use this information toidentify files and processes at risk.

You should participate in Norton Community Watchsubmissions to provide valuable contribution to theentire community that uses Norton security products.

Getting StartedAbout Norton Community Watch

32

Page 33: Help

No personally identifiable information is exposedduring data collection and submission. Symantecmaintains an adequate level of protection for thecollected information. The Detailed Error DataCollection option under Norton Community Watchin the AdministrativeSettings window lets you allowor deny the detailed data submissions. The detaileddata may vary depending on the Norton-specific errorsand components. You can configure the option tomanage the data submissions.

w Norton Community Watch collects and submits detaileddata about the Norton-specific errors and componentsonly. It does not collect or store any personalinformation of any user.

If you chose not to join Norton Community Watch whenyou installed your Norton product, you can turn it onlater. You can use the Norton Community Watchoption in the Administrative Settings window. Youcan also review the data, which Norton CommunityWatch collects and submits to Symantec, in theSecurity History window.

Turning off or turning on Norton Community WatchYou can use the Norton Community Watch option tosend information about a suspicious file to Symantecfor analysis. Symantec assesses the data to determinethe new threats and their sources. The Norton featuressuch as Norton Insight and Insight Network use theSymantec assessed information to detect the securitythreats.

w Norton Community Watch collects and submits detaileddata about the Norton-specific errors and componentsonly. It does not collect or store any personalinformation of any user.

You can use Security History to review the informationthat has been sent to Symantec.

To turn off or turn on Norton Community Watch

1 In the Norton 360 main window, click Settings.

33Getting StartedAbout Norton Community Watch

Page 34: Help

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Administrative Settings window, in theNorton Community Watch row, do one of thefollowing:

1 To turn off Norton Community Watch, move theOn/Off switch to the right to the Off position.

1 To turn on Norton Community Watch, move theOn/Off switch to the left to the On position.

4 Click Apply.

About Norton Bootable Recovery ToolNorton Bootable Recovery Tool scans and removesviruses, spyware, and other security risks from yourcomputer. Your computer might be infected with avirus if you experience any of the following symptoms:

1 You cannot install Norton 360.

1 You cannot start your computer.

1 Your computer is extremely slow.

Norton Bootable Recovery Tool is integrated withWindows Preinstallation Environment (WinPE).Therefore, you can run Norton Bootable Recovery Toolonly from a CD, DVD, or USB key. You must use NortonBootable Recovery Tool Wizard to create the NortonBootable Recovery Tool CD, DVD, or USB key.

w You cannot run Norton Bootable Recovery Tool inWinPE for more than 72 hours. If you run NortonBootable Recovery Tool for more than 72 hours, yourcomputer restarts without any notification.

You can use the Norton Bootable Recovery Tool CD,DVD, or USB key to recover a computer that is infectedwith viruses and other security threats. This securityprogram is not a replacement for continuous, real-timeprotection from viruses and latest security risks. Toprotect your computer from future infections, be sure

Getting StartedAbout Norton Bootable Recovery Tool

34

Page 35: Help

to install or continue using Norton 360 that you alreadypurchased.

Norton Bootable Recovery Tool detects and resolvesthe following security threats:

Programs that infect anotherprogram, boot sector,partition sector, or documentby inserting themselves orattaching themselves to thatmedium. Most viruses justreplicate; many also dodamage.

Viruses

Programs containingmalicious codes that aredisguised as or hiding insomething benign, such as agame or utility.

Trojan horses

Tools that are used by ahacker to gain unauthorizedaccess to your computer. Onetype of hacking tool, akeystroke logger, tracks andrecords your individualkeystrokes and can send thisinformation back to thehacker.

Hacking tools

Programs that can scansystems or monitor activityand relay the information toother computers or locationsin cyberspace.

Spyware

35Getting StartedAbout Norton Bootable Recovery Tool

Page 36: Help

Programs that facilitate thedelivery of advertisingcontent through their ownwindow, or by using anotherprogram's interface.

Adware

Programs that track systemactivity, gather systeminformation, or track userhabits, and relay thisinformation to third-partyorganizations. Theinformation that is gatheredby such programs is neitherpersonally identifiable norconfidential. Trackwareprograms are installed withthe user's consent, and mayalso be packaged as part ofother software that isinstalled by the user.

Trackware

Downloading the Norton Bootable Recovery ToolWizard

If your attempt to install a Norton product fails, youcan download the Norton Bootable Recovery ToolWizard. This easy-to-use wizard helps you createNorton Bootable Recovery Tool on a CD, DVD, or USBkey. You can use Norton Bootable Recovery Tool toscan your computer and remove any security threatsthat prevent successful installation.

It is recommended that you download and installNorton Bootable Recovery Tool Wizard on a computerthat does not have any security threats and createNorton Bootable Recovery Tool. If you create NortonBootable Recovery Tool on an infected computer, thereis a chance that the recovery CD, DVD, or USB keymight get infected.

Getting StartedAbout Norton Bootable Recovery Tool

36

Page 37: Help

w To use Norton Bootable Recovery Tool, you must usethe product key of the Norton product that youpurchased. If you use a trial version of Norton 360, youneed to create a Norton Account to receive a productkey to use Norton Bootable Recovery Tool.

You can download Norton Bootable Recovery ToolWizard in one of the following ways:

1 From the Start menu.

1 From the Norton Support Web site.

To download theNortonBootable Recovery ToolWizardfrom the Start menu

1 On the Windows taskbar, do one of the following:

1 In Windows XP, click Start>Programs>Norton360 > Norton Recovery Tools.

1 In Windows Vista or Windows 7, click Start >All Programs > Norton 360 > Norton RecoveryTools.

2 Follow the on-screen instructions.

To download theNortonBootable Recovery ToolWizardfrom the Internet

1 Open your Web browser, and go to the followingURL:http://www.norton.com/recoverytool_n360

2 Follow the on-screen instructions.

To download theNortonBootable Recovery ToolWizardfrom Norton 360

1 In the Norton 360 main window, click Scan Now.

2 In the ComputerScan pane, do one of the following:

1 Click Quick Scan.

1 Click Full System Scan.

3 At the bottom of the scan window, next to If youthink there are still risks, click click here.

4 In the Norton Rescue Tools Web page, clickDownload Norton Bootable Recovery Tool.

5 Follow the on-screen instructions.

37Getting StartedAbout Norton Bootable Recovery Tool

Page 38: Help

Using the Norton Bootable Recovery ToolIf the installation of your Norton product fails, you canuse the Norton Bootable Recovery Tool to scan andremove any security threats that prevent successfulinstallation. If your computer is infected and you arenot able to start your Windows operating system, youcan use Norton Bootable Recovery Tool to removethreats and recover your computer.

Norton Bootable Recovery Tool is available on theproduct CD that you purchased. You can use theproduct CD as a recovery media.

w To use Norton Bootable Recovery Tool, you must usethe product key of the Norton product that youpurchased. If you use a trial version of Norton 360, youneed to create a Norton Account to receive a productkey to use Norton Bootable Recovery Tool.

To use the Norton Bootable Recovery Tool

1 Insert the recovery media and start your computerfrom the recovery media.The recovery media can be a Norton BootableRecovery Tool CD, DVD, USB key, or the productCD.

2 Read the Norton License Agreement, type yourproduct key, and then click I Agree.If you use a non-QWERTY keyboard, use the VirtualKeyboard option to enter your product key.

3 In the Norton Bootable Recovery Tool window,click Norton Advanced Recovery Scan.

4 Click Start Scan.

5 After the scan is complete, remove the recoverymedia from the drive or USB port, and restart yourcomputer.

About updating Norton 360Norton 360 uses the Internet to automatically obtainupdates to its virus definition files and its program

Getting StartedAbout updating Norton 360

38

Page 39: Help

files. These updates continually enhance the technologythat Norton 360 uses to keep your PC protected.

Automatic updates require an Internet connection. Ifyou use a proxy server to connect to the Internet, youmust configure the proxy settings in your product. Ifyou do not normally keep your PC connected to theInternet, you can manually update Norton 360 afteryou connect to the Internet. Updating Norton 360 ona regular basis ensures that you have the latestdefinition updates and program updates.

About LiveUpdateSymantec products download the latest definitionupdates and program updates regularly from Symantecservers. The definition updates protect your computerfrom the latest viruses and unknown security threats.Using the LiveUpdate technology, Symantec productshelp you to obtain and install these updates.

LiveUpdate takes little time to download and processthe definition updates and program updates. You canchoose Smart Definitions to minimize download time,installation time, and memory consumption as SmartDefinitions are a subset of virus definitions. The SmartDefinitions option is available on the ScansandRiskstab in the Antivirus settings window. You can cancelthe LiveUpdate session at any time.

LiveUpdate obtains these updates for your computerby using your Internet connection. If your networkuses proxy servers to connect to Internet, LiveUpdateuses the proxy settings in your product to downloadthe latest updates. You can use the Network ProxySettings option in the AdministrativeSettings windowto configure the proxy settings of your network.

About Program and Definition Updates

LiveUpdate obtains program updates and definitionupdates for your computer by using your Internetconnection.

39Getting StartedAbout updating Norton 360

Page 40: Help

Program updates are minor improvements to yourinstalled product. These differ from product upgrades,which are newer versions of the entire product.Program updates are usually created to extend theoperating system or hardware compatibility, adjust aperformance issue, or fix program errors. Programupdates are released on an as-needed basis.

w Some program updates may require that you restartyour computer after you install them.

LiveUpdate automates the process of downloading andinstalling program updates. It locates and obtains filesfrom an Internet site, installs them, and then deletesthe older files and downloaded definitions from thetemporary folder after processing the updates.

Definition updates are the files that keep yourSymantec products up to date with the latest antithreattechnology. The definition updates that you receivedepend on which product you use.

The type of definition updates that each of theSymantec products receive are as follows:

Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.

Norton AntiVirus, NortonAntiVirus Online

Getting StartedAbout updating Norton 360

40

Page 41: Help

In addition to the virusand security risk updates,users of these productsreceive definition updatesfor security protection.For the products thatcontain protectionagainst phishing, usersreceive definition updatesagainst phishing.

The security definitionupdates provide the latestpredefined firewall rules,the updated lists ofapplications that accessthe Internet, IntrusionPrevention signatures,and Symantec spamdefinition files. Theselists are used to identifyunauthorized accessattempts to yourcomputer.

Norton Internet Security, NortonInternet Security Online

Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.

In addition, users of theseproducts receiveSymantec spamdefinitionfiles and definitionupdates against phishing.

Norton 360, Norton 360 Online

41Getting StartedAbout updating Norton 360

Page 42: Help

Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.

In addition, users of theseproducts receiveSymantec spamdefinitionfiles and definitionupdates against phishing.

Norton Security Suite, NortonBusiness Suite

About Smart Definitions

Norton 360 downloads and installs virus definitionsregularly to protect your computer from the latestsecurity threats. For faster downloads and installationpurpose, Norton 360 classifies these virus definitionsinto two sets.

The virus definitions are classified into the followingtwo sets:

Contains all the virus definitionsfor each threat that is known toSymantec.

Complete Set

Getting StartedAbout updating Norton 360

42

Page 43: Help

Contains the most importantvirus definitions that arerequired for latest securitythreats as viewed by Symantec.

The Core Set is a subset of theComplete Set, and it isapproximately 30 percentsmaller than the Complete Set.The Core Set minimizesdownload time, installation time,and system start time. It alsooccupies lesser amount of diskspace as compared to theComplete Set virus definitions.Therefore, the Core Set resultsin faster performance of yourcomputer.

Core Set

The Core Set virus definitions are called as SmartDefinitions. Norton 360 provides the SmartDefinitionsoption to choose between Core Set virus definitionsand Complete Set virus definitions for LiveUpdatesessions. The option is available on the ScansandRiskstab in the Antivirus settings window.

During Automatic LiveUpdate or each time that yourun LiveUpdate manually, Norton 360 checks if theSmart Definitions option is turned on or off. It thendownloads and installs the desired set of virusdefinitions based on the option settings. By default,the SmartDefinitions option is turned on, which meansthat the Core Set virus definitions are downloaded andinstalled.

Turning off or turning on Smart Definitions

Smart Definitions are a subset of virus definitions thatcontains most important definitions for the latestsecurity threats.

As the Smart Definitions are of considerably smallersize, it results in lesser download time, lesser

43Getting StartedAbout updating Norton 360

Page 44: Help

installation time, lesser boot time, and lesser memoryconsumption. It also occupies lesser amount of diskspace as compared to the full set of virus definitions.Therefore, Smart Definitions result in fasterperformance of your computer.

Norton 360 checks the Smart Definitions optionsettings during each LiveUpdate session. If the optionis turned on, the Smart Definitions are downloadedand installed. If the option is turned off, all of the virusdefinitions are downloaded and installed.

To turn off or turn on Smart Definitions

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.

3 In the Antivirus settings window, click the Scansand Risks tab.

4 In the Smart Definitions row, do one of thefollowing:

1 To turn off Smart Definitions, move the On/Offswitch to the right to the Off position.

1 To turn on Smart Definitions, move the On/Offswitch to the left to the On position.

5 In the Settings window, click Apply.

6 Click Close.

Turning off or turning on Automatic LiveUpdate

You can have LiveUpdate check for definition updatesand product updates automatically on a set schedule,by turning on the Automatic LiveUpdate option. Youcan also run LiveUpdate manually when the AutomaticLiveUpdate option is turned on. However, you mustrun LiveUpdate manually to obtain updates if you haveturned off the Automatic LiveUpdate option.

To access the Automatic LiveUpdate option, go theNorton 360 main window and then click Settings >Antivirus > Antispyware and Updates. You can also

Getting StartedAbout updating Norton 360

44

Page 45: Help

turn off or turn on the Automatic LiveUpdate optionfrom Quick Controls in the Settings window.

w If you are connected to the Internet, AutomaticLiveUpdate downloads product updates and definitionupdates every hour. If you have an Integrated ServicesDigital Network (ISDN) router that is set toautomatically connect to your Internet service provider(ISP), it may incur charges each time. If you do not wantthis setup, you can turn off the automatic connectionon your ISDN router, or turn off the AutomaticLiveUpdate option.

To turn on Automatic LiveUpdate from Quick Controls

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Quick Controls,check Automatic LiveUpdate.

To turn off Automatic LiveUpdate from Quick Controls

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Quick Controls,uncheck Automatic LiveUpdate.

3 In the Select the duration drop-down list, selecthow long you want to turn off AutomaticLiveUpdate, and then click OK.

Checking for updates manually

If you disconnect your PC from the Internet, Symantecrecommends that you check for Norton 360 updatesafter you reconnect.

To check for updates manually

1 In the Norton 360 main window, click PC Security,and then click Run LiveUpdate.

2 In the Norton LiveUpdate window, when theLiveUpdate is completed successfully, click Close.

Checking for the latest virus and spyware definitions date

Virus definition files contain the information thatallows Norton 360 to recognize and alert you to the

45Getting StartedAbout updating Norton 360

Page 46: Help

presence of a specific virus or security threat. Norton360 shows the date on which you last updated the virusand spyware definitions.

You can also check the latest virus definition date. TheDefinitionsUpdate section in the PCSecurityDetailswindow displays the status and date of the last virusdefinition updates.

To check for the latest virus and spyware definition date

1 In the Norton 360 main window, click PC Security,and then click View Details.

2 In the PC Security Details window, underDefinitionsUpdate, view the latest virus definitionsdetails.The Status column shows the date on which youlast downloaded and installed the latest definitionupdates.

About keeping your protection up to date

Definition updates are available to you as long as youmaintain an active product status. The ways in whichyou can acquire the product and maintain your statusare as follows:

The product includes a limited-timesubscription to definition updates. Whenthe subscription is due to expire, you areprompted to renew. Follow the on-screeninstructions to complete yoursubscription renewal.

After your product expires, you cannotobtain updates of any kind and all thesecurity features are turned off. If youdo not renew your product, you are nolonger protected against security threats.Though LiveUpdate continues to checkfor updates after expiration, you mustrenew your product to enable all thesecurity features.

If you purchaseda subscriptionversion of a retailproduct

Getting StartedAbout updating Norton 360

46

Page 47: Help

If you do not activate your service orrenew your subscription, you cannotobtain updates of any kind and thesoftware no longer functions.

If you purchaseda product as aservice, or it cameinstalled on yourcomputer

Your product status is always active aslong as your security service is activewith your service provider.

If your security service is not active, youcannot obtain updates of any kind andthe software no longer functions.

If you receive thisservice throughyour serviceprovider

About Pulse Updates

In addition to the definition updates that AutomaticLiveUpdate downloads, Norton 360 uses streamingtechnology to download the latest virus definitions.These downloads are called Pulse Updates. The PulseUpdates are lighter and faster than AutomaticLiveUpdate. They keep your computer secure from theongoing threats that exist on the Internet. PulseUpdates protect you against the rapidly-changingenvironment of security threats without compromisingyour computer's performance. Pulse Updates shouldalways be turned on to get the latest updates.

Pulse Updates checks for definition updates every 5minutes. If definition updates are available, LiveUpdatedownloads the streamed virus definitions. PulseUpdates provide the updates in between the fullupdates, which Automatic LiveUpdate downloadsautomatically every hour. Norton 360 merges the newstream that is downloaded with the last updates thatare installed. The Pulse Updates downloads provideadditional and fast protection for the latest threats inbetween the full updates without disrupting your onlineexperience.

47Getting StartedAbout updating Norton 360

Page 48: Help

Even if you do not turn on Pulse Updates, LiveUpdatecollects all the missed streams and, it updates yourcomputer during full definition updates.

Turning off or turning on Pulse Updates

Pulse Updates provide frequent, lightweight updatesevery 5 minutes in between the full updates. Alwaysensure that the Pulse Updates option is turned on. Itprotects you from the latest threats withoutcompromising your system performance or disruptingyour online experience.

You must be connected to the Internet to obtain latestdefinition updates by using Pulse Updates. You canturn on or turn off Pulse Updates only if AutomaticLiveUpdate is turned on.

To turn off or turn on Pulse Updates

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.

3 In the Antivirus settings window, clickAntispyware and Updates.

4 Under AutomaticLiveUpdate, in the PulseUpdatesrow, do one of the following:

1 To turn off Pulse Updates, move the On/Offswitch to the right to the Off position.

1 To turn on Pulse Updates, move the On/Offswitch to the left to the On position.

5 In the Settings window, click Apply.

6 Click Close.

About Network Proxy SettingsA proxy server regulates access to the Internet, andprevents external computers from accessing yournetwork. If you are on a network that uses a proxyserver to connect to the Internet, you can provide proxyserver details to Norton 360. You can use the Network

Getting StartedAbout Network Proxy Settings

48

Page 49: Help

Proxy Settings window to specify the automaticconfiguration URL, the proxy settings, and theauthentication details. Norton 360 uses the proxysettings and authentication details to connect to theInternet automatically, whenever required. Forexample, LiveUpdate uses the specified proxy serversettings to retrieve updates. You must ensure that youspecify the proxy server details for LiveUpdate to runsuccessfully.

In some cases, your network uses an automaticconfiguration URL or script for managing Internetaccess. In this case, you must provide the URL of therequired Proxy Automatic Configuration (PAC) file. APAC file contains the code that lets your browser knowabout the proxy settings for different Web sites overthe Internet. It also contains the words which you wantto filter and block while you access the Internet. Youcan also choose the option that lets your browser toautomatically detect the proxy settings. If you wantyour manual settings in the network, ensure that youdisable the Automatic Configuration options.

49Getting StartedAbout Network Proxy Settings

Page 50: Help

Network Proxy Settings window lets you specify thefollowing settings:

Lets you specify the automaticconfiguration URL or script tomanage Internet access.

You have the following options:1 Automatically detect

settings

Lets your browser detect thenetwork settingsautomatically.

If you do not want to overrideyour manual settings fornetwork connections, youmust disable this option.

1 Useautomatic configurationscript

Lets your browser use theautomatic configuration URLor script to manage Internetaccess.

Use the URL box to providethe HTTP URL or the script tothe required PAC file (suchas file://C:/Proxy.pac).

Automatic Configuration

Getting StartedAbout Network Proxy Settings

50

Page 51: Help

Lets you provide the details ofyour Proxy Settings.

UnderProxySettings, checkUsea proxy server for your HTTPconnections, and do thefollowing:

1 In the Address box, type theURL or IP address of yourproxy server.

1 In the Port box, type the portnumber of your proxy server.

You can specify a value from1 to 65535.

Proxy Settings

Lets you connect to the Internetthrough a server that requiresauthentication.

Use the Username box andPassword box to type theauthentication details.

Authentication

Configuring Network Proxy SettingsWhen you use a proxy server to connect to the Internet,you must specify the proxy server details. The NetworkProxy Settings window lets you enter automaticconfiguration settings, proxy settings, and proxy serverauthentication settings. The Network Proxy settingslet you connect to the Internet while you perform taskssuch as activating the product or accessing the supportoptions.

To configure Network Proxy Settings

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the NetworkProxySettings row, click Configure.

51Getting StartedAbout Network Proxy Settings

Page 52: Help

4 In the Network Proxy Settings window, do thefollowing:

1 If you want your browser to automatically detectnetwork connection settings, under AutomaticConfiguration, check Automatically detectsettings.

1 If the proxy server requires an automaticconfiguration URL, under AutomaticConfiguration, check Use automaticconfiguration script. Type the URL (such asfile://C:/Proxy.pac) in the URL box.

1 If your network uses a proxy server, under ProxySettings, check Use a proxy server for yourHTTPconnections. In the Address box, type theURL or IP address of your proxy server, and inthe Port box, type the port number of your proxyserver. You can specify a value from 1 to 65535.

1 If your proxy server requires a user name andpassword, under Authentication, check I needauthenticationtoconnect throughmyfirewallor proxy server. Type the user name in theUsername box and password in the Passwordbox.

5 In the NetworkProxySettings window, click Apply.

About Norton 360 statusNorton 360 displays the security status of yourcomputer at the top of the main window. Based on thesecurity status of your computer, Norton 360 showsyour system status as Protected, Attention, or AtRisk.

The system status indicator displays one of thefollowing statuses:

Indicates that your computeris protected from threats,risks, and damages.

Protected

Getting StartedAbout Norton 360 status

52

Page 53: Help

Indicates that your computerrequires attention.

At the bottom section of theNorton 360 main window,click Fix Now to resolve thesecurity threats on yourcomputer.

Attention

Indicates that your computeris at risk.

At the bottom section of theNorton 360 main window,click Fix Now to resolve thesecurity threats on yourcomputer.

At Risk

Norton 360 displays individual security status for eachprotection category, such as PC Security, Identity,Backup, and PC Tuneup. Based on the security statusof the different components of your computer, thestatus areas of the four protection categories aremarked as Protected, Attention, or At Risk.

See “Responding tosecurity statusindicators”on page 53.

When your system status or protection categoriesstatuses are marked as At Risk or Attention, at thebottom section of the Norton 360 main window, clickFix Now to resolve all the security threats on yourcomputer.

Responding to security status indicatorsWhen your system encounters a threat or a risk, theproduct displays the security status at the top of themain window. When a status indicator displays a status,you can take appropriate action to improve yourprotection status. Your protection is based on theprograms that are installed on your computer. Toimprove your protection status, ensure that yourinstalled programs are up to date.

53Getting StartedAbout Norton 360 status

Page 54: Help

When your system status or protection categoriesstatuses are marked as At Risk or Attention, you canresolve the security issues directly from the mainwindow.

To respond to security status indicators

1 In the Norton 360 main window, click Fix Now.

2 Follow the on-screen instructions.

About the Norton 360 iconWhen you install Norton 360, it places an icon in thenotification area at the far right of the taskbar. Thisicon indicates the current security status of yourcomputer. Norton 360 displays an animated icon whenit actively fixes any issues or wants to inform you aboutany warning or urgent issues.

You can see the following representations of Norton360 icon in the notification area:

Represents that your computeris fully protected

Icon with a green checkmark badge

Represents that there are someissues against your computerprotection that require yourattention

Icon with an orangeexclamation mark badge

Represents that there are someurgent issues against yourcomputer protection that requireimmediate resolution

Icon with a red cross markbadge

Represents that the Silent Modefeature is turned on

This icon also displays thecurrent protection status badge.

Icon with acrescent-shaped edge

Getting StartedAbout Norton 360 status

54

Page 55: Help

You can right-click the icon to see a shortcut menu forNorton 360. You can choose items on the shortcut menuto open the Norton 360 window, to fix any issues thatNorton 360 detects, or to get additional help.

About Norton 360 shortcut menuNorton 360 works in the background to keep your PCsecure. The Norton 360 icon is available in thenotification area at the far right of the taskbar. Theicon reassures you that your protection is up to date.It changes its color if any change in status occurs.

The messages that appear in the notification area mayrequire a response from you, such as opening a window.More often, messages inform you about currentactivities, and they disappear after a few seconds.

You can right-click the Norton 360 icon to accessspecific Norton 360 activities. Depending on the currentactivities, your options include the following:

Use this option to launch theNorton 360 main window tocomplete tasks, view currentstatus, or access otherfeatures.

Open Norton 360

Use this option to run a QuickScan to protect possiblevirus-infected areas of yourcomputer.

Run QuickScan

Use this option to runLiveUpdate to check fordefinition updates andprogram updates.

Run LiveUpdate

55Getting StartedAbout Norton 360 status

Page 56: Help

Use this option to create abackup of your files.

You can specify when andhow often Norton 360 backsup your files.

Run Backup Now

Use this option to review theinformation about thesecurity events for all of thecategories.

View Recent History

Use this option to resolveyour problem easily usingNorton Autofix.

Get Support

Use this option to turn on orturn off Silent Mode.

Turnon/Turnoff SilentMode

Use this option to turn on orturn off the firewall.

Enable/Disable SmartFirewall

Use this option to turn on orturn off AntivirusAuto-Protect.

Enable/Disable AntivirusAuto-Protect

Use this option to check anddownload the latest versionof the product.

Check for New Version

Viewing details of protection featuresIn the Norton 360 main window, you can see a summaryof each of the four protection features that Norton 360provides. You can view additional details about eachprotection feature.

Getting StartedAbout Norton 360 status

56

Page 57: Help

To view details of a protection feature

1 In the Norton 360 main window, click on aprotection feature, and then click View Details.In the window that appears, you can view thefollowing details:

1 The current status of the protection feature.

1 A list of the checks that the feature performs,and the results of each check. In some cases, theresults of a check can include a link that providesadditional information.

1 A list of actions that you can perform.

2 After you view details, click Close.

57Getting StartedAbout Norton 360 status

Page 58: Help

Getting StartedAbout Norton 360 status

58

Page 59: Help

This chapter includes the following topics:

1 About System Insight

About System InsightNorton 360 continuously monitors your computer tokeep it free of any problems and run at peak efficiency.Norton 360 constantly scans the vital areas of yourcomputer including memory, registry keys, and runningprocesses. It monitors the important activities such asgeneral file operation, network traffic, and Internetbrowsing. In addition, Norton 360 ensures that theactivities that it performs on your computer do notdegrade the overall performance of your computer.

System Insight provides you a centralized locationwhere you can view and monitor the activities that youperform on your system. System Insight displays suchinformation in the Performance window.

You can use the Performance window for the following:

1 To view monthly history of the important systemactivities that you performed or that occurred overa period of the last three months.

The Events graph that appears at the top of thewindow provides a pictorial representation ofimportant system activities. The activities includeapplication installations, application downloads,disk optimizations, threat detections, performance

2Monitoring yoursystem'sperformance

Page 60: Help

alerts, or Quick Scans. The graph displays theactivities as icon or stripe, and the description foreach icon or stripe is provided at the bottom of thegraph. The pop-up that appears when you move themouse pointer over an icon provides you the detailsabout the activity. The View Details link in thepop-up lets you view additional details about theactivity in the Security History window. You canuse the tabs at the top of the graph to obtain detailsfor the current month and details for the last twomonths.

1 To rearrange the organization of files on yourcomputer.

Optimizing your system helps you maximize theusable free space on a disk by grouping files basedon how they are accessed. The Optimize option atthe top of the Events graph lets you defragmentyour system.

1 To view and analyze the effect of Norton 360 on theperformance of your computer.

The Performance graph that appears at the bottomof the window provides a graphical representationof your CPU usage and memory usage. The CPU tabdisplays a graph that represents the overall systemCPU usage and Norton-specific CPU usage. Whenyou click at any point on the CPU graph andmemory graph, Norton 360 displays a list of theprocesses that consume maximum resources at thatpoint. It also displays the percentage of usage foreach process. You can click a process that isavailable in the list to get more information aboutthe process in the File Insight window. TheMemory tab displays a graph that representsoverall memory usage and Norton-specific memoryusage. You can select any of the Zoom options toobtain magnified view or historical data of thegraphs.

1 To view the details of Norton-specific jobs that arecurrently running in the background

Monitoring your system's performanceAbout System Insight

60

Page 61: Help

The NortonTasks window provides the details suchas the timestamp, the duration, and the status ofthe background jobs. The details also include thetype of power the job needs to run and if a job randuring idle time. You can select different powersources for the background jobs. You can also startor stop a background job at any time.

1 To view details about the known good files and theknown bad files

The NortonInsightNetwork window lets you viewthe total number of files that Symantec analyzeswithin the Norton Community. You can also viewthe total number of computers that are available inthe community to provide the data. You can viewthe number of trusted files that are available onyour computer.

1 To view the details of the Files of Interest

The Norton Insight -ApplicationRatings windowprovides details on the trust level, prevalence,resource usage, and stability ratings for the Filesof Interest.

You can use the Performance Monitoring option tomonitor the performance of your computer. To accessthe PerformanceMonitoring option, go to the Norton360 main window, click Settings > AdministrativeSettings > Performance Monitoring.

Accessing the Performance windowSystem Insight provides you a centralized locationwhere you can view and monitor your system activities.System Insight displays such information in thePerformance window. You can access the Performancewindow to view details about the important systemactivities, CPU usage and memory usage, andNorton-specific background jobs. You can also viewNorton Insight details and defragment your bootvolume.

61Monitoring your system's performanceAbout System Insight

Page 62: Help

To access the Performance window

4 In the Norton 360 main window, click Performance.

About monitoring system activitiesSystem Insight provides information about theimportant system activities that you performed or thatoccurred over a period of the last three months. SystemInsight displays the information in the Performancewindow. The Events graph at the top of thePerformance window displays each activity as icon orstripe. The description for each icon or stripe appearsat the bottom of the graph. You can use the tabs at thetop of the graph to obtain details for the current monthand for the last two months. The activities include:

Provides the details about theinstallation activities that youperformed on your system overa period of the last three months

The details include theapplication that you installed,the date on which you installedthe application, and the totalnumber of installations on thatdate.

Installs

Monitoring your system's performanceAbout System Insight

62

Page 63: Help

Provides the details about theapplication-download activitiesthat you performed on yoursystem over a period of the lastthree months

The details include the date onwhich you downloaded a file andthe total number of downloadson that date. You can click thefile name link to view additionaldetails about the downloadedfile such as the Download Insightreport, file name, reputationlevel, and recommended action.

Downloads

Indicates the optimizationactivities that you performed onyour system over a period of thelast three months

Optimized

Provides the details about thethreat detection activities thatNorton 360 performed on yoursystem over a period of the lastthree months

The details include the date onwhich Norton 360 detected athreat and the total number ofthreats that Norton 360 detectedon that date. The View Detailslink provides additional detailsabout the risk such as the riskimpact and the origin of the risk.The details also include theaction that a threat hasperformed on your system andthe action that Symantecrecommends you to resolve thethreat.

Detections

63Monitoring your system's performanceAbout System Insight

Page 64: Help

Provides the details about theperformance alerts that Norton360 displayed over a period ofthe last three months

The details include themonitored date and the numberof performance alerts generated.The View Details link providesadditional details aboutperformance-related activities,program name, programlocation, and system resourcesutilization.

Alerts

Provides the details about QuickScans that Norton 360performed on your system overa period of the last three months

The details include the date onwhich a Quick Scan wasperformed and the number ofQuick Scans that wereperformed on that date. TheView Details link providesadditional details such as thescan time, total items scanned,total risk detected, total risksresolved, and recommendedaction.

Quick Scans

Viewing details of your system activities

System Insight lets you view details of the systemactivities that you performed or that occurred over thelast three months in the Performance window. Theactivities include application installations, applicationdownloads, disk optimizations, threat detections,performance alerts, or Quick Scans. You can use thetabs at the top of the Events graph to obtain details forthe current month and for the last two months. The

Monitoring your system's performanceAbout System Insight

64

Page 65: Help

Events graph at the top of the Performance windowdisplays each activity as icon or stripe. The descriptionfor each icon or stripe appears at the bottom of thegraph. The pop-up that appears when you move themouse pointer over an icon provides you the detailsabout the activity. The details include the date on whichan activity was performed and the number of suchactivities that you performed on that date. The ViewDetails link provides additional details of the activityin the Security History window.

To view details of your system activities

1 In the Norton 360 main window, click Performance.

2 In the Performance window, at the top of the Eventsgraph, click the tab for a month to view the details.

3 In the Events graph, move the mouse pointer overthe icon or the stripe for an activity.

4 In the pop-up that appears, view the details of theactivity.

5 If the View Details option appears in the pop-up,click View Details to view additional details in theSecurity History window.

About performance alertingNorton 360 monitors your system performance. If itdetects an increased usage of system resources by anyprogram or process, it notifies you with performancealerts. Performance alerting works only when thePerformance Monitoring option and PerformanceAlerting option are turned on.

Performance alerting notifies you with informationabout the program name and resources that theprogram uses excessively. The Details & Settings linkin the performance notification alert lets you viewadditional details about the resource consumption bythe program. The File Insight window opens anddisplays the details of the file, the origin of the file, theprocess ID, and the complete resource usage list of theprogram. From the FileInsight window, you can choose

65Monitoring your system's performanceAbout System Insight

Page 66: Help

to exclude the program from being monitored. You canuse the Settings option in the File Insight window toturn off the Performance Alerting option.

w Performance alerts are not displayed when yourcomputer is idle or in Silent Mode.

For each system resource, such as CPU, memory, andhard disk, there is a resource consumption thresholddefined. When the resource consumption of a programexceeds the defined threshold limit, Norton 360 alertsyou with a performance alert.

You can use the Resource Threshold Profile forAlerting option to configure the threshold limit. Toaccess the Resource Threshold Profile for Alertingoption, go to the Norton 360 main window, and thenclick Settings > Administrative Settings >Performance Monitoring > Resource ThresholdProfile for Alerting.

You can use the UseLowResourceProfileOnBatteryPower option to let Norton 360 automatically changethe resource threshold profile to low when yourcomputer runs on battery power.

You can use High-Usage Alert for option to configureNorton 360 to alert for high usage of CPU, memory,disk, and handles.

In addition, you can add programs to the ProgramExclusions list using the Program Exclusions option.When you add a program to the Program Exclusionslist, Norton 360 does not alert you when the programexceeds the defined resource consumption thresholdlimit.

You can view all the performance-related logs underthe Performance Alert category in the SecurityHistory window.

Monitoring your system's performanceAbout System Insight

66

Page 67: Help

Configuring performance alerts

You can use the Performance Alerting option toreceive performance alerts when there is an increasedusage of system resources by any program or process.

You can use the following options to configureperformance alerts:

Turns off performance alerts.

Select this option if you donot want Norton 360 to notifyyou with performance alerts.

Off

Turns on performance alerts.

Select this option if you wantNorton 360 to notify you withperformance alerts when aprogram or process exceedsthe threshold limit of thesystem resource usage.

By default, the PerformanceAlerting option is turned on.

On

67Monitoring your system's performanceAbout System Insight

Page 68: Help

Monitors and records thesystem resource usage.

Select this option if you wantNorton 360 to only monitorthe system resource usage ofevery program or processrunning on your computer.

When a program or processexceeds the threshold limitof the system resource usage,Norton 360 records thesedetails in the SecurityHistorywindow. You can viewthe details that are related toperformance alerts underPerformance Alert categoryin the Security Historywindow.

Log Only

To configure performance alerts

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Performance Monitoring, in thePerformanceAlerting row, do one of the following:

1 To turn off performance alerts, move thePerformanceAlerting switch to the Off position.

1 To turn on performance alerts, move thePerformanceAlerting switch to the On position.

1 To suppress the performance alerts, move thePerformance Alerting switch to the Log Onlyposition.

Monitoring your system's performanceAbout System Insight

68

Page 69: Help

4 Under High-UsageAlertfor, do one of the following:

1 If you want Norton 360 to monitor the CPUusage, move the CPU switch to the left to the Onposition.

1 If you want Norton 360 to monitor the memoryusage, move the Memory switch to the left tothe On position.

1 If you want Norton 360 to monitor the diskusage, move the Disk switch to the left to the Onposition.

1 If you want Norton 360 to monitor the handlecount, move the Handles switch to the left tothe On position. By default, this option is turnedoff.

5 Click Apply, and then click Close.

Configuring the resource threshold profile

The threshold limit for the system resourcesdetermines at which point Norton 360 should notifyyou with performance alerts. When a specific programexceeds the threshold limit of using your systemresource, Norton 360 notifies you with a performancealert.

To configure the resource threshold profile

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

69Monitoring your system's performanceAbout System Insight

Page 70: Help

3 Under Performance Monitoring, in the ResourceThreshold Profile for Alerting row, select one ofthe following options:

Configures a low thresholdlimit for alerting.

Symantec recommends youto select this option whenyour computer runs onbattery power.

Low

Configures a mediumthreshold limit for alerting.

By default, the threshold limitis set to medium.

Medium

Configures a high thresholdlimit for alerting.

Symantec recommends youto select this option whenyour computer runs tasksthat require high resource.

High

4 Click Apply and then click Close.

Turning off or turning on the Use Low Resource Profile OnBattery Power option

When your computer runs on battery power, it isimportant that all active software programs consumeminimum resource usage. By reducing resource usage,your computer gains longer battery life and becomesmore energy efficient.

You can configure a low threshold profile and ensurethat all programs consume minimum resource usage.When the resource usage of a program or a processexceeds the low threshold limit, Norton 360 notifiesyou with a performance alert. You can choose to close

Monitoring your system's performanceAbout System Insight

70

Page 71: Help

the program or the process manually and free theresource.

If the Use Low Resource Profile On Battery Poweroption is turned on, Norton 360 automatically changesthe threshold profile to low when your computer runson battery power. By default, this option is turned on.

w Symantec recommends that you keep the Use LowResourceProfileOnBatteryPower option turned on.

To turn off the Use Low Resource Profile On BatteryPower option

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Performance Monitoring, in the Use LowResource Profile On Battery Power row, move theOn/Off switch to the right to the Off position.

4 Click Apply, and then click Close.

To turn on the Use Low Resource Profile On BatteryPower option

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Performance Monitoring, in the Use LowResource Profile On Battery Power row, move theOn/Off switch to the left to the On position.

4 Click Apply, and then click Close.

Excluding programs from performance alerts

Norton 360 lets you exclude programs fromperformance alerts. You can add the programs thatconsume high CPU, memory, or disk usage to theProgram Exclusions list. When you add a program tothe ProgramExclusions list, Norton 360 does not alertyou when the program exceeds the resourceconsumption threshold limit.

71Monitoring your system's performanceAbout System Insight

Page 72: Help

To exclude a program from performance alerts

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Performance Monitoring, in the ProgramExclusions row, click Configure.

4 In the Program Exclusions window, click Add.

5 In the Select a program dialog box, browse to theexecutable file for the program that you want toadd.

6 Click Open.

7 In the Program Exclusions window, click Apply.

8 Click OK.

9 In the Settings window, click Apply.

10 Click Close.

Removing programs from Program Exclusions

The ProgramExclusions window lists all the programsthat are excluded from performance alerts. If you want,you can remove any of the programs that you alreadyadded to the Program Exclusions window. When youremove a program, the program appears in theperformance alert the next time it crosses the definedthreshold limit for resource consumption.

To remove a program from Program Exclusions

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Performance Monitoring, in the ProgramExclusions row, click Configure.

4 In the Program Exclusions window, select theprogram that you want to delete, and then clickRemove.To remove all the programs available in theProgram Exclusions window, click Remove All.

5 In the Program Exclusions window, click Apply

Monitoring your system's performanceAbout System Insight

72

Page 73: Help

6 Click OK.

7 In the Settings window, click Close.

About CPU graph and memory graphNorton 360 monitors the overall system CPU usageand memory usage and the Norton-specific CPU usageand memory usage. Norton 360 displays the details inthe CPU graph and the memory graph. The CPU graphand memory graph are real-time graphs of CPUutilization and memory utilization.

The graphs display a performance time for the last 90minutes or for the duration since you started yourcomputer. The graphs update the information at aninterval of every 15 seconds. The graphs progress fromright to left, and the most recent data appear on thefar right of the graph. The blue pattern in the graphsdepicts the overall system usage, and the yellow patterndepicts the Norton-specific usage. The gray blocks thatare labeled as Idle indicate the idle period of yourcomputer. The gray blocks include the period whenyour computer is in shutdown, sleep, or log out state.

The graphs show a default performance time of 90minutes. However, you can use the Zoom options todefine a region of the graph that you are interested toview. You can select a Zoom option to obtain magnifiedview or historical data of the graphs. For example, ifyou select the 10min option, Norton 360 displays themagnified view of CPU graph or memory graph for thelast 10 minutes. If you select the 1D option, Norton 360displays a historical data of the last one day.

When you click at any point on the CPU graph ormemory graph, Norton 360 displays a list of theprocesses that consume maximum resources at thatpoint. It also displays the percentage of usage for eachprocess. You can click a process that is available in thelist to get more information in the FileInsight window.

The File Insight window provides information aboutthe process such as:

73Monitoring your system's performanceAbout System Insight

Page 74: Help

1 The file name, version number, digital signature,the date on which the process was installed.

1 The date on which the process was last used andwhether it is a startup file.

1 The stability details.

1 The confidence level.

1 The resource usage details.

1 The actions that the process performs on yoursystem.

In addition, the File Insight window displays the CPUgraph and the resource usage details for the runningprocesses. The graph shows the breakdown of overallsystem CPU usage and the CPU usage by the process.

Viewing the CPU graph and memory graph

Norton 360 monitors the overall system CPU usageand memory usage and the Norton-specific CPU usageand memory usage. The CPU tab and the Memory tabat the top of the Performance graph display the CPUgraph and the memory graph respectively.

The Zoom options provide you the magnified view ofthe CPU graph and memory graph. For example, if youselect the 10min option, Norton 360 displays themagnified view of CPU graph or memory graph for thelast 10 minutes. If you select the 1W option, Norton360 displays the CPU graph and memory graph for thelast one week.

w By default, the graphs display performance time forthe last 90 minutes.

To view CPU graph and memory graph

1 In the Norton 360 main window, click Performance.

Monitoring your system's performanceAbout System Insight

74

Page 75: Help

2 In the Performance window, do one of the following:

1 To view the CPU graph, click the CPU tab.

1 To view the memory graph, click the Memorytab.

1 To magnify or shrink the graph, click 10min,30min, 1D, 1W, or 1M next to the Zoom option.

Obtaining historical data of your CPU and memory usage

The Zoom options also provide you the historical dataof the CPU graph and memory graph. For example, ifyou select the 1D option, Norton 360 displays the dataof CPU graph or memory graph for the last one day.

To view historical data of your CPU or memory usage

1 In the Norton 360 main window, click Performance.

2 In the Performance window, do one of the following:

1 To view the CPU graph, click the CPU tab.

1 To view the memory graph, click the Memorytab.

3 Do one of the following:

1 To obtain historical data for the last one day,click 1D.

1 To obtain historical data for the last one week,click 1W.

1 To obtain historical data for the last one month,click 1M.

Identifying resource-consuming processes

You can click at any point on the CPU graph or memorygraph to obtain a list of top three processes thatconsume maximum resources of your computer at thatpoint. You can click a process that is available in thelist to get more information about the process in theFile Insight window.

To identify resource-consuming processes

1 In the Norton 360 main window, click Performance.

75Monitoring your system's performanceAbout System Insight

Page 76: Help

2 In the Performance window, do one of the following:

1 To view the CPU graph, click the CPU tab.

1 To view the memory graph, click the Memorytab.

3 Click at any point on the graph to obtain a list ofresource-consuming processes.

4 Click the name of a process to obtain additionalinformation about the process in the File Insightwindow.

About optimizationThe data storage space on a disk is divided into discreteunits. These units are called clusters. When files arewritten to the disk, they are broken up intocluster-sized pieces. When all of the file pieces arelocated in adjacent or contiguous clusters, the file canbe accessed quickly.

Your computer’s hard disk stores all of your files,applications, and the Windows operating system. Thebits of information that make up your files graduallyspread over the disk. This process is known asfragmentation. The more that you use your computer,the more fragmented the hard disk gets.

When a fragmented file is accessed, the diskperformance is slower. The performance is slowerbecause the drive head locates, loads, saves, and keepstrack of all of the fragments of the file. If free space isalso fragmented, the drive head might have to trackadequate free space to store temporary files or newlyadded files.

Optimization rearranges file fragments into adjacentor contiguous clusters. When the drive head accessesall of the file data in one location, the file is read intothe memory faster. Optimization also maximizes theusable free space on a disk by grouping most frequentlyused files and infrequently used files. Optimizationconsolidates free space to avoid fragmenting newlyadded files. It adds extra space after major data

Monitoring your system's performanceAbout System Insight

76

Page 77: Help

structures so that they can grow without immediatelybecoming fragmented again.

You can optimize your boot volume manually by usingthe Optimize option in the Performance window.

You can also configure Norton 360 to defragment yourboot volume or the local disk that contains boot volumewhen your computer is idle. Norton 360 automaticallyschedules the optimization when it detects theinstallation of an application on your computer. Theoptimization process starts next time when yourcomputer is idle.

You can use the Idle Time Optimizer option in theAdministrativeSettings window to optimize the bootvolume during idle time.

Optimizing your boot volume

The Optimize option lets you optimize your bootvolume to improve the boot time of your computer.Optimization of your boot volume maximizes the usablefree space by rearranging file fragments into adjacentand contiguous clusters. When the drive head of yourhard disk accesses all of the file data in one location,the file is read into the memory faster.

When you use the Optimize option in Windows XP,Norton 360 optimizes only the boot volume (forexample, C:\Windows). Therefore, it requires less timeto complete optimization. However, when you use theOptimize option in Windows Vista or Windows 7,Norton 360 optimizes the drive that contains the bootvolume. Therefore, it requires more time to completeoptimization.

You can access the Optimize option at the top of thesecurity status graph in the Performance window. Youcan also optimize your boot volume using the InsightOptimizer option in the Norton Tasks window. TheInsightOptimizer row in the background jobs list thatis available in the Norton Tasks window displays thedetails of the boot volume optimization process. You

77Monitoring your system's performanceAbout System Insight

Page 78: Help

can view details such as timestamp, duration, andstatus of the background job.

To optimize your boot volume from the Performancewindow

1 In the Norton 360 main window, click Performance.

2 In the Performance window, at the top of thesecurity status graph, click Optimize.

To optimize your boot volume from the Norton Taskswindow

1 In the Norton 360 main window, click Performance.

2 In the Performance window, click Norton Tasks.

3 In the Norton Tasks window, under the NortonTasks column, click the play icon that appearsbefore Insight Optimizer.

About the Idle Time Optimizer

Idle Time Optimizer lets you configure Norton 360 todefragment your boot volume or the local disk thatcontains boot volume when your computer is idle.Norton 360 automatically schedules the optimizationwhen it detects the installation of an application onyour computer and your computer is idle. If you startusing your computer again, Norton 360 stops theoptimization task, and starts optimizing the next timethat your computer is idle. This way, the backgroundjob of optimization does not affect the performance ofyour computer.

Optimization rearranges file fragments into adjacentor contiguous clusters in the hard disk. It improves thecomputer performance by reading the files into thememory faster. Optimization also maximizes the usablefree space on a disk by grouping most frequently usedfiles and infrequently used files. In addition, itconsolidates free space to avoid fragmenting newlyadded files.

You must turn on the Idle Time Optimizer optionunder AdministrativeSettings in the Settings window

Monitoring your system's performanceAbout System Insight

78

Page 79: Help

to optimize the boot volume during idle time. Bydefault, this option is turned on.

Turning off or turning on Idle Time Optimizer

Norton 360 automatically schedules the optimizationwhen it detects the installation of a new applicationon your computer. Norton 360 runs this optimizationonly when your computer is idle.

You can use the IdleTimeOptimizer option to optimizethe boot volume during idle time. By default, this optionis turned on.

To turn off Idle Time Optimizer

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Idle Time Optimizer row, move the On/Offswitch to the right to the Off position.

4 Click Apply, and then click Close.

To turn on Idle Time Optimizer

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Idle Time Optimizer row, move the On/Offswitch to the left to the On position.

4 Click Apply, and then click Close.

About the Norton TasksThe NortonTasks window provides an interface whereyou can view and monitor all Norton-specificbackground tasks. Norton 360 runs most of thebackground tasks when your computer is idle. TheNorton Tasks window provides the details of thebackground tasks that Norton 360 performs.

The details include:

1 The name of the Norton task

79Monitoring your system's performanceAbout System Insight

Page 80: Help

You can use the icon that appears before the nameof a background job to start or stop a backgroundtask. You can start or stop a background task at anytime.

1 The timestamp of the Norton task

You can view details such as the date on which thebackground job last ran and the time. These detailshelp you decide whether to start a background taskor wait for Norton 360 to run the job during idletime.

1 The duration of the Norton task

You can view the length of time that a Norton taskran the last time. The details also help youdetermine the length of time a background tasktakes to complete if you start it.

1 The background task has run during idle time ornot

This detail helps you determine if a task has alreadyrun during idle time or you should run it.

1 The status of the Norton task

You can view details about the completion of thetask.

1 The power source that the Norton Task uses.

You can specify the type of power source that eachof the Norton Tasks uses. Use the Configure linkthat is available next to the power source icon toconfigure the power source for the Norton Tasks.

Monitoring your system's performanceAbout System Insight

80

Page 81: Help

The Norton Tasks window lets you monitor thefollowing Norton-specific tasks:

Automatic LiveUpdateautomatically checks fordefinition updates andprogram updates when yourcomputer is connected to theInternet.

By default, AutomaticLiveUpdate checks forupdates every hour.

Automatic LiveUpdate

Performs a backup of the filesand data that are included inyour backup set.

If you created multiplebackup sets, all of the backupsets appear on the NortonTasks list. You can run aspecific backup from theNorton Tasks window.

Backing up DefaultSet

Eliminates the file clutter andrearrange the placement offiles on your computer disksto improve performance.

Disk Optimizer

Scans your entire computerfor viruses, spyware, anddifferent securityvulnerabilities.

It also runs other activitiessuch as LiveUpdate, Cleanup,Disk Optimization, andBackup.

Full System Scan

Optimizes the boot volume ofyour computer.

Insight Optimizer

81Monitoring your system's performanceAbout System Insight

Page 82: Help

Deletes the unnecessary Webpage history that is leftbehind in your Internetbrowser's history folder.

Removes the traces of anyInternet searches that areperformed on your PC.

Internet Explorer HistoryCleaner

Deletes the temporary filesthat are left behind on thehard disk after Internetbrowsing.

Internet Explorer TemporaryFiles

Norton Community Watchprotects your computeragainst potential risks. Itcollects the informationabout new security threatsfrom your computer andsubmits the information toSymantec for analysis.Symantec assesses the datato identify the new threatsand resolves it.

Norton Community Watch

Monitoring your system's performanceAbout System Insight

82

Page 83: Help

Allows the smart scanning offiles on your computer. Itimproves the performance ofNorton 360 scans by lettingyou scan fewer files withoutcompromising the security ofyour computer.

Norton Insight lets you checkthe details of the Files ofInterest that are available onyour computer. You can viewdetails such as signature ofthe file and the date on whichthe file was installed. You canalso view details such as thetrust level, community usage,resource usage, and thesource of the file.

Norton Insight

Pulse Updates check fordefinition updates every fiveminutes and downloads thestreamed virus definitions.Pulse Updates provide theupdates during the fullupdates, which LiveUpdatedownloads automaticallyevery few hours. Alwaysensure that the PulseUpdates option is turned on.It protects you from the latestthreats withoutcompromising your systemperformance or disruptingyour online experience.

Pulse Updates

83Monitoring your system's performanceAbout System Insight

Page 84: Help

Scans the important locationsof your computer that theviruses and other securitythreats often target.

Quick Scan takes less time toscan than a Full System Scanbecause this scan does notscan your entire computer.

Quick Scan

Deletes the inaccurate entriesand obsolete entries in theWindows registry that cancause errors.

Windows Registry Cleaner

Deletes the unnecessary filesthat are left in WindowsTemporary folders after aprogram is installed orupdated.

Windows Temporary FileCleaner

The following grayed out categories of jobs run in thebackground to improve your system performance andprotection. You can only view the last run details forthe following activities.

Performs backgroundmaintenance tasks related toIdentity Safe. Tasks includesending Identity Safe profilestatistics and downloadingthe favorite icons.

Identity Safe Maintenance

Performs backgroundmaintenance tasks related toAntiSpam. Tasks includeupdating contacts andAntiSpam filters.

AntiSpam Maintenance

Monitoring your system's performanceAbout System Insight

84

Page 85: Help

Performs backgroundmaintenance tasks related tolicensing.

Licensing Maintenance

Performs backgroundmaintenance tasks related toNorton Insight. Tasks includemaintaining details about thestability and trust level offiles in your computer.

Insight Maintenance

Performs backgroundmaintenance tasks related toNorton 360. Tasks includeclearing install logs andrescanning consolidatedfirewall rule.

Product Maintenance

You can also manually turn on Silent Mode for aspecified duration.

Monitoring background jobs of Norton 360

The Norton Tasks window provides the details of thebackground tasks that Norton 360 performs and letsyou view and monitor the background tasks. Norton360 runs most of the background tasks when yourcomputer is idle. Performing all background tasks whenyour computer is idle helps your computer to run atpeak efficiency when you use your computer. However,you can manually start or stop a task at any time. Youcan also specify the Idle Time Out duration. After theIdle Time Out duration is reached, Norton 360identifies the computer as idle and run the backgroundtasks. You can use the IdleCountdown bar to confirmthe idle state of your computer. You can also view theCPU graph and memory graph to obtain theperformance data of your computer.

85Monitoring your system's performanceAbout System Insight

Page 86: Help

To monitor background jobs

1 In the Norton 360 main window, click Performance.

2 In the Performance window, click Norton Tasks.

3 In the Norton Tasks window, view the details ofbackground jobs.

4 Do one of the following:

1 To run a background job, click the play icon thatappears before the name of the background job.

1 To stop a running background job, click the stopicon that appears before the name of thebackground job.

5 Click Close.

About Power Source

You can choose the power source for Norton 360 toperform the Norton Tasks when the computer is idle.Norton Tasks are background tasks that Norton 360performs when your computer is idle. Norton Tasksinclude Quick Scan, Automatic LiveUpdate, NortonCommunity Watch, Norton Insight, Full System Scan,Insight Optimizer, and Pulse Updates. Norton 360consumes more power when it runs Norton Tasks.

By default, Norton 360 performs these tasks only whenyour computer is connected to the external power. Forexample, if you are in an airport, and your computeris running on battery power, Norton 360 does notperform the Norton Tasks. In this way, you can extendthe battery power of your computer. However, you canchoose the power source for Norton 360 to perform theNorton Tasks.

Monitoring your system's performanceAbout System Insight

86

Page 87: Help

You can select one of the following options:

Allows the Norton Tasks torun only when your computeruses external power.

If you choose this option,Norton 360 performs theNorton Tasks when thecomputer is idle andconnected to external power.

External

Allows the Norton Tasks torun irrespective if thecomputer uses externalpower or battery power.

If you choose this option,Norton 360 performs theNorton Tasks when thecomputer is idle. It does notconsider the type of powersource the computer uses.

External and Battery

You can configure the power source for each of theNorton Tasks.

Configuring the Power Source

You can choose the power source for Norton 360 toperform the Norton Tasks when the computer is idle.Norton Tasks are background tasks that Norton 360performs when your computer is idle.

By default, Norton 360 performs these tasks only whenyour computer is connected to the external power. Youcan configure the power source for each of the NortonTasks.

To configure the power source

1 In the Norton 360 main window, click Performance.

2 In the Performance window, in the left pane, clickNorton Tasks.

87Monitoring your system's performanceAbout System Insight

Page 88: Help

3 In the Norton Tasks window, under the PowerSource column, click the Configure link for theNorton Task that you want to configure the powersource.

4 In the Power Source window, select one of thefollowing:

1 ExternalAllows the Norton Task to run only when yourcomputer uses external power.

1 External and BatteryAllows the Norton Task to run irrespective if thecomputer uses external power or battery power.

If you choose this option, Norton 360 performsthe Norton Task when the computer is idle. Itdoes not consider the type of power source thecomputer uses.

5 Click OK.

6 In the Norton Tasks window, click Close.

About Norton InsightNorton Insight allows the smart scanning of files onyour computer. It improves the performance of Norton360 scans by letting you scan fewer files withoutcompromising the security of your computer.

Monitoring your system's performanceAbout System Insight

88

Page 89: Help

A Norton 360 scan can identify threats on yourcomputer in the following ways:

At regular intervals, Norton 360obtains definition updates fromSymantec. These updatescontain signatures of knownthreats. Each time when Norton360 obtains the definitionupdates, it performs a scan of allof the files that are available onyour computer. It compares thesignature of the files against theknown threat signatures toidentify threats on yourcomputer.

The Blacklist technique

89Monitoring your system's performanceAbout System Insight

Page 90: Help

Norton 360 obtains specificinformation about the Files ofInterest and submits theinformation to Symantec duringidle time. The informationincludes things such as filename, file size, and hash key.Symantec analyzes theinformation of each File ofInterest and its unique hashvalue and provides a confidencelevel to the file. The Symantecserver stores the hash value andconfidence level details of theFiles of Interest. The serverprovides the details immediatelyafter you open the NortonInsight - Application Ratingswindow. Even the slightestmodification of the file causes achange in the hash value and theconfidence level of the file.Typically, most Files of Interestbelong to the operating systemor known applications, and theynever change. These files do notrequire repeated scanning ormonitoring. For example,Excel.exe is a file that neverchanges but you always scan itduring a normal security scan.

The Whitelist technique

Monitoring your system's performanceAbout System Insight

90

Page 91: Help

Symantec assigns the following confidence levels toFiles of Interest:

Symantec analyzes the file astrusted based on the statisticalevaluation that is done on thefiles that are available within theNorton Community.

If the file has three green bars,Symantec rates the file asNorton Trusted.

The files that have three greenbars display a Norton Trustedpop-up text when you move themouse pointer over the greenbars.

Trusted

Symantec analyzes the file asgood based on the statisticalevaluation that is done on thefiles that are available within theNorton Community.

Symantec rates the trusted filesas follows:

1 If the file has two green bars,Symantec rates the file asGood.

1 If the file has one green bar,Symantec rates the file asFavorable.

Good

Symantec does not have enoughinformation about the file toassign a trust level to the file.

Unproven

Symantec has only a fewindications that the file is nottrusted.

Poor

91Monitoring your system's performanceAbout System Insight

Page 92: Help

Norton 360 also provides different profiles to configureyour scan performance. When you use the Full Scanprofile, Norton 360 follows the Blacklist technique toscan your computer. It scans all of the files on yourcomputer against the signatures that it obtained duringdefinition updates. When you use the Standard Trustor HighTrust profile, Norton 360 follows the Whitelisttechnique to scan the files based on their confidencelevel. This way, Norton 360 significantly reduces thetime that is required to scan your computer completelyfor security threats.

The Whitelist technique that Norton Insight uses alsohelps in heuristic detection of suspicious applications.Normally, the execution behavior of well-knownapplications appears identical to the execution behaviorof unknown applications. Such behavior results in falseidentification of good applications as suspicious, andtherefore, necessitates security applications tomaintain a low heuristic detection threshold. However,keeping a low detection threshold does not provide acomplete heuristic protection against maliciousapplications. Norton 360 uses the Whitelist techniquethat helps maintain a high heuristic detectionthreshold. It excludes well-known applications fromheuristic detection to prevent false detection ofwell-known applications and to ensure a high detectionrate of malicious applications.

Viewing the files using Norton Insight

Norton Insight provides information about the Files ofInterest that are available on your computer. Norton360 lets you view specific categories of files based onthe option that you select in the Norton Insight -Application Ratings window.

Monitoring your system's performanceAbout System Insight

92

Page 93: Help

The drop-down list that is available in the NortonInsight - Application Ratings window provides youthe following options:

Lists the processes that runon your computer at thatpoint in time when youselected this option.

All Running Processes

Lists the Files of Interest.All Files

Lists the programs that startwhen you start yourcomputer.

Startup Items

Lists all the files andprograms that are currentlyloaded on to the programmemory space.

All Loaded Modules

Lists the programs thatconsumemaximumresourcesof your computer.

Norton 360 displays a list oftop 10 resources that highlyaffect the performance ofyour computer.

Highest Performance Impact

Lists the files that have themaximum community usage.

Highest Community Usage

93Monitoring your system's performanceAbout System Insight

Page 94: Help

Lists the Files of Interest thatyou manually trusted in theFile Insight window.

This category does not listthe files that do not belongto the File of Interest even ifyou manually trust the files.However, Norton 360excludes all of the manuallytrusted files from Norton 360scan when you configureScan Performance Profilesto High Trust.

You can also remove the usertrust from all of the Files ofInterest that you manuallytrusted. You can use theClear All User Trust optionnext to the drop-down list toremove the user trust.

User Trusted Files

Lists the files that are notNorton Trusted.

You can manually trust all thefiles that are not trusted byclicking the Trust All Filesoption next to the drop-downlist.

Untrusted Files

You can view file details such as file name, trust level,community usage, resource usage, and the stabilityrating. There may be instances when the trust level ofa file has changed or a process running might havestopped running. You can refresh the Norton Insight- Application Ratings window to update the file listand file details. The coverage meter provides agraphical representation of the percentage of theNorton Trusted Files and the total Files of Interest. Thehigher the percentage, the lesser time the scan takes.

Monitoring your system's performanceAbout System Insight

94

Page 95: Help

To view the files using Norton Insight

1 In the Norton 360 main window, click PC Security,and then click Run Norton Insight.

2 In the Norton Insight - Application Ratingswindow, select an option from the Show drop-downlist to view a category of files.You may need to scroll the window to view all thefiles that are listed in the details area.

3 Click Close.

To refresh the list of files

4 In the Norton Insight - Application Ratingswindow, at the top of the file icon, click the refreshicon.

Checking the trust level of a file

Norton Insight lets you check the details of the Filesof Interest that are available on your computer. Youcan view details such as signature of the file and thedate on which the file was installed. You can also viewdetails such as the trust level, stability details,community usage, resource usage, and the source ofthe file. You can use the Locate option to find thelocation of the file on your computer. When youright-click a file that is available on your computer, theshortcut menu displays Norton 360 option and thenNortonFile Insight option. You can use the options tocheck the details of a File of Interest.

w Norton 360 displays the Norton File Insight optiononly when you right-click a File of Interest. In WindowsSafe mode, you cannot access this option for any file.Norton 360 also categorizes any file for which you openthe File Insight window to view details as a File ofInterest.

The Symantec server stores the hash value and trustlevel details of the File of Interest. The server providesthe file details immediately after you open the NortonInsight - Application Ratings window. However, youcan use theCheckTrustNow option in the FileInsight

95Monitoring your system's performanceAbout System Insight

Page 96: Help

window to update the trust value of a file. You can alsomanually trust any well-known files. You can changethe trust level of any file to User Trusted other thanthe files that are Norton Trusted.

You can determine the resource usage of a file that isavailable on your computer. The File Insight windowdisplays the CPU graph and the system resource usagedetails for the running processes. The graph shows thebreakdown of overall system CPU usage and the CPUusage or memory usage by the process.

To check the trust level of a file

1 In the Norton 360 main window, click PC Security,and then click Run Norton Insight.

2 In the Norton Insight - Application Ratingswindow, click a file for which you want to check thedetails.

3 In the File Insight window, view the details of thefile.

4 In the File Insight window, click Close.

To check the trust level of a specific file

1 In the Norton 360 main window, click PC Security,and then click Run Norton Insight.

2 In the Norton Insight - Application Ratingswindow, click Check a Specific File.

3 Browse to the location of the file for which you wantto check the details.

4 Select the file, and then click Open.

5 In the File Insight window, view the details of thefile.

6 In the File Insight window, click Close.

To find the location of the file

4 In the File Insight window, click Locate.

To refresh the trust level of the file

4 In the File Insight window, click CheckTrustNow.

Monitoring your system's performanceAbout System Insight

96

Page 97: Help

To manually trust the file

4 In the File Insight window, in the Details tab, clickTrust Now.You can manually trust the files that are poor,unproven, or not Norton trusted.

To determine the resource usage of a running process

1 In the File Insight window, in the left pane, clickActivity.

2 In the Show drop-down list, do one of the following:

1 Select Performance to view the performancegraph of the process.

1 Select Performance Alert to view theperformance alert-related details of the process.

1 Select Network to view the network activitiesof the process.

1 Select Run Key change to include registrychanges.

Configuring the Scan Performance Profiles

The Scan Performance Profiles settings let youconfigure how Norton 360 should scan your computerbased on the digital signature and confidence level ofthe files. To make Norton 360 scans lighter, faster, andmore effective, you can exclude from scans the filesthat have known digital signatures or high confidencelevels.

You can configure the Scan Performance Profilessettings to do the following:

1 Configure to Full Scan to perform a complete scanof your computer.

The complete scan includes a scan of all files onyour computer irrespective of the confidence levelor digital signature of the files.

1 Configure to StandardTrust to perform a scan thatexcludes the files that are Norton Trusted.

97Monitoring your system's performanceAbout System Insight

Page 98: Help

Norton 360 scans the files that have a confidencelevel other than Norton Trusted.

1 Configure to High Trust to perform a scan thatexcludes the files that have known digital signaturesor high confidence levels.

Norton 360 does not scan the files that haveconfidence level as Norton Trusted or User Trusted.It also excludes the Good files with high confidencelevel from the scan. It scans the files withconfidence levels as Poor Trust, Unproven Trust,Bad Trust, and the files without a class 3 digitalsignature.

You must configure the Scan Performance Profilessettings before you run a scan or before a scan isscheduled to run. Norton 360 scans your computeraccording to the configuration you specified in theScan Performance Profiles settings.

To configure Scan Performance Profiles from theSettings window

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.On the ScansandRisk tab, in the ScanPerformanceProfiles row, click on one of the settings. Youroptions are:

1 Full Scan

1 Standard Trust

1 High Trust

3 Click Apply, and then click Close.

To configure ScanPerformanceProfiles from theNortonInsight - Application Ratings window

1 In the Norton 360 main window, click PC Security,and then click Run Norton Insight.

Monitoring your system's performanceAbout System Insight

98

Page 99: Help

2 In the Norton Insight - Application Ratingswindow, move the ScanPerformanceProfiles sliderto one of the settings. Your options are:

1 Full Scan

1 Standard Trust

1 High Trust

3 Click Close.

About Monthly ReportMonthly Report lets you view a summary of whatNorton 360 has done for you. Norton 360 displays themonthly report every 30 days after you install yourproduct. After 30 days of installation, Norton 360displays the Monthly Report automatically. If you donot want Norton 360 to display the Monthly Reportautomatically, you can select the Do not displaymonthly reports automatically option in the NortonMonthly Report window.

You can view the Monthly Report using the CheckMonthly Report option that is present in the MyAccount window.

Norton 360 lets you turn off or turn on Monthly Reportfrom the AdministrativeSettings window. The NortonMonthlyReport window displays the Tipofthemonthto recommend some of the product’s features andservices.

When your product expires after the trial period,Monthly Report displays the activation status of yourproduct. However, when your product expires after thesubscription period, Monthly Report displays thesubscription status of your product.

99Monitoring your system's performanceAbout System Insight

Page 100: Help

Norton 360 provides reports based on the followingcategories:

Lets you view the details ofthe various attacks your PCis protected from

For example, you can viewthe total number of virusesand spyware from whichyou are protected.

PC Security

Lets you view the details ofAntiphishing activities

For example, you can viewthe total number of knownauthenticated sites that youvisited.

Web

Lets you view the details ofBackup and PC Tuneupactivities. For example, youcan view the total numberof files that you backed upon drive C of yourcomputer.

For example, you can viewthe total number of filesthat you backed up on driveC of your computer.

Backup & Tuneup

Monthly Report lets you view the latest news onInternet security and also provides information on howto stay safe while you are online. You can click the ReadMore option in the Norton Monthly Report windowto view more information on how to stay safe online.

Monitoring your system's performanceAbout System Insight

100

Page 101: Help

Viewing the Monthly Report

The Monthly Report lets you view how Norton 360protected you for the past 30 days. This report includesdifferent activities that Norton 360 performed toprotect your computer.

The Monthly Report provides information about thefollowing activities:

1 The total number of threats that Norton 360detected on your computer.

1 The total number of phishing and authenticatedWeb sites that you visited.

1 The total number of files that you backed up.

1 The total number of unwanted files and the obsoleteWindows registry entries that are removed.

If you do not want Norton 360 to display the MonthlyReport automatically, you can do one of the following:

1 Select the Do not display monthly reportsautomatically option in the Norton MonthlyReport window.

1 Turn off the Monthly Report option in theAdministrative Settings window.

To view the Monthly Report

1 In the Norton 360 main window, click Account.

2 In the My Account window, click Check MonthlyReport.

3 Click Close.

101Monitoring your system's performanceAbout System Insight

Page 102: Help

Monitoring your system's performanceAbout System Insight

102

Page 103: Help

This chapter includes the following topics:

1 About total protection

1 About keeping your computer secure

1 About solving connection problems

1 About responding to emergencies

1 About monitoring protection features

1 About viewing details of system vulnerabilities

About total protectionNorton 360 offers total protection of your PC thatincludes Antivirus and Spyware Protection, onlineidentity theft protection, backup, and PC tuneupcapabilities. It provides a complete protection againsta wide range of threats, leaving you free to work andplay confidently on your PC.

After you install Norton 360 and set up a backupstorage destination, it then does all the rest. You donot have to do anything else to be protected. However,Norton 360 also lets you customize your firewallsettings or adware protection, or set your own schedulefor automatic activities.

3Maintaining totalprotection

Page 104: Help

Norton 360 is grouped into the following fourcategories of protection:

Blocks and removes virusesand spyware from email anddownloaded sites, protectsagainst emerging threats,scans, cleans emailattachments, and securesconnections and datatransmission between yourcomputer and the Internet.

PC Security

Helps to guard againstidentity theft, verifiesauthenticity of Web sites.

Identity Protection

Backs up all your importantfiles and data to a variety ofstorage locations.

Backup

Finds and fixes commoncomputer problems, cleansup unwanted cookies andfiles, and defragments thehard disk to optimize PCperformance.

PC Tuneup

About keeping your computer secureNorton 360 automatically protects your PC when youinstall it and updates itself regularly to maintainprotection. However, you can increase the security ofyour PC further by learning how to avoid threatsagainst your PC and your data.

To avoid email threats, do the following:

1 Open only those email attachments that come froma trusted source and that you expect to receive.

Maintaining total protectionAbout keeping your computer secure

104

Page 105: Help

1 Delete all unwanted messages without openingthem.

1 Do not respond to email that you suspect is spam.Delete it.

1 Be wary of any email that requests confidentialinformation, and confirm the authenticity of therequest before you reply.

To protect yourself from phishing attempts, do thefollowing:

1 When you visit a Web site, type the address directlyinto your browser rather than clicking a link.

1 Provide personal information only on trusted sites.Examples include the sites that have "https" in theWeb address or that have a lock icon at the bottomof the browser window.

1 Do not provide personal information to anyunsolicited requests for information.

To avoid viruses, worms, and Trojan horses, do thefollowing:

1 Transfer files to your PC only from a well-knownsource or a trusted source.

1 Do not send or receive files over instant messagingconnections.

1 Terminate an instant messaging connection if aperson on your buddy list sends strange messages,files, or Web links.

To avoid spyware, do the following:

1 Do not approve suspicious error messages fromwithin your Web browser.

1 Be suspicious of "free deal" offers because spywaremay come as part of such a deal.

1 Carefully read the End User License Agreement forthe programs that you install. Also, do not installa program if other programs are installed as partof the required program.

105Maintaining total protectionAbout keeping your computer secure

Page 106: Help

About solving connection problemsNorton 360 uses an Internet connection to supportseveral of its protection features. If you use a proxyserver to connect to the Internet, you must configurethe proxy settings of Norton 360. You can configureNetwork Proxy Settings in the AdministrativeSettingswindow.

If you cannot connect to the Internet after you installNorton 360, you can use the Support features to helpyou troubleshoot your connection problem.

About responding to emergenciesNorton 360 automatically downloads definition updatesregularly and secures your computer from latestviruses and unknown threats. In addition, Norton 360monitors your Internet activities to protect yourcomputer from the Internet-based threats that exploitsoftware vulnerabilities.

However, security issues can arise, and you need todecide which action to take.

If you think that your computer is infected with a virusor with destructive software, you can take the followingactions:

Helps you to scan the possiblevirus-infected areas of acomputer that the viruses andother security risks often target

Because this scan does not scanyour entire computer, it takeslesser time to run than a FullSystem Scan.

Quick Scan

Maintaining total protectionAbout solving connection problems

106

Page 107: Help

Checks all boot records, files,and running programs to protectyour computer from viruses andspyware

It also runs other tasks (such asLiveUpdate, Registry Cleanup,Disk Optimization, and Backup)to provide a high level ofprotection and improve theperformance of your computer.Consequently, when you run aFull System Scan withadministrator privileges, it scansmore files than when you run itwithout administrator privileges.This scan might take more timethan the other scans.

Full System Scan

Scans a specific file, folder,drive, or removable drive thatyou choose. You can also createyour own scan and schedule itto run at a specific time.

Custom Scan

Checks for vulnerabilities andrisks, and protects yourcomputer by running thefollowing checks:1 LiveUpdate

1 InternetExplorer TemporaryFiles

1 Windows Temporary Files

1 Internet Explorer History

1 Disk Optimization

1 Registry Cleanup

1 Backup

Custom Task

107Maintaining total protectionAbout responding to emergencies

Page 108: Help

When you right-click a folder, the shortcut menudisplays Norton 360 and then Scan Now option. Youcan use this command to scan any particular folder.

When you right-click a file, the shortcut menu displaysNorton 360 and then Insight Network Scan option.You can use this command to scan a file using bothlocal definitions and definitions that are hosted in theCloud.

About monitoring protection featuresYour Symantec product maintains records of allprotection-related actions that it takes and theactivities that it monitors. You can review the historyand the logs through Security History. You can viewsummary and results of activities and scans. You canalso monitor other security tasks.

About Security HistorySecurity History window lets you do the following:

1 View the summary of alerts and event messages.

1 View the results of scans that are run on yourcomputer.

1 View the items that you submitted to SymantecSecurity Response Web site.

1 Manage Quarantine items.

1 Monitor the security tasks that your productsperform in the background.

Security History lets you monitor the security tasksthat your product performs in the background. Inaddition, the alerts that you receive can be reviewedat any time in Security History. If you cannot reviewan alert when you receive it, you can review it later inSecurity History.

The alerts, scan results, and other security items thatare related to various product features appear undertheir respective categories in the Security History

Maintaining total protectionAbout monitoring protection features

108

Page 109: Help

window. For example, the security items that arerelated to the Quarantine feature appear under theQuarantine category. In addition, the SecurityHistorywindow displays details of each item in the Detailspane.

Based on their functionalities, Security History broadlyorganizes all categories into the following groups:

1 All Activity

1 Protection and Performance

1 Submissions and Errors

1 PC Tuneup

1 Informational

By default, the following information categories areavailable in the Security History window:

1 Recent History

1 Full History

1 Scan Results

1 Resolved Security Risks

1 Unresolved Security Risks

1 Quarantine

1 SONAR Activity

1 Firewall – Network and Connections

1 Firewall – Activities

1 Intrusion Prevention

1 Download Insight

1 AntiSpam

1 Identity

1 Norton Product Tamper Protection

1 Performance Alert

1 Metered Network

1 Backup

1 Sites reported to Symantec

1 Norton Error Reporting

109Maintaining total protectionAbout monitoring protection features

Page 110: Help

1 Email Errors

1 Norton Community Watch

1 Registry Cleanup

1 File Cleanup

1 Disk Optimization

1 Silent Mode

1 LiveUpdate

You can view the security items based on the categoryof events that you select and the search string that youprovide. Norton 360 restricts the number of searchresults that appear on each page in the SecurityHistory window. Therefore, Security History dividesthe items that are returned for any search criteria anddisplays them on separate pages. You can use thepagination scroll at the bottom of the window tonavigate to different pages sequentially. In case youwant to view a specific page, you can use the Gotopageoption to open the page. The maximum number ofitems that appear per page is 100.

Based on the security status of an item in aninformation category, you can take an appropriateaction to resolve a risk or a threat. The actions thatyou can perform include the following:

1 Restore and exclude a quarantined item.

1 Remove an item from Security History.

1 Submit an item to Symantec for further analysis.

1 Trust or restrict devices on a selected network.

1 Remove the trusted or restricted status of deviceson the selected network.

1 Allow a selected program to access the Internet.

1 Configure Norton 360 to notify you when it blocksa selected attack signature.

Norton 360 also lets you save the security eventshistory. You can view the security event informationwhenever you want. If you want to analyze the securityevents for a particular day, you can save the Security

Maintaining total protectionAbout monitoring protection features

110

Page 111: Help

History logs for that day. You can later import the fileinto Security History and analyze the data.

Viewing items in Security History

Security History provides a record of all the activitiesthat Norton 360 performed on your computer.

You can view details about all the activities including:

1 Security History alerts and event messages

1 Results of different scans

1 Information that you submitted to SymantecSecurity Response Web site

1 Quarantined items

1 Norton 360 firewall activities

1 Norton 360 PC Tuneup activities

1 Norton 360 backup and restore activities

1 Security tasks that Norton 360 performed in thebackground

Based on their functionalities, all Security Historycategories appear under the following groups in theShow drop-down list:

1 All Activity

1 Protection and Performance

1 Submissions and Errors

1 PC Tuneup

1 Informational

The items that are related to the various productfeatures appear under their respective categories inthe SecurityHistory window. For example, the securityitems that are related to the Quarantine feature appearunder Quarantine category in the Security Historywindow. In addition, the Security History windowdisplays details of each item in the Details pane.

To view items in Security History

1 In the Norton 360 main window, click Tasks.

111Maintaining total protectionAbout monitoring protection features

Page 112: Help

2 In the Tasks window, under General Tasks, clickCheck Security History.

Maintaining total protectionAbout monitoring protection features

112

Page 113: Help

3 In SecurityHistory window, in the Show drop-downlist, select the category of items that you want toview. Your options are:

The Recent History view inthe Security History window

Recent History

displays the alerts that youreceived during the last sevendays. It lists the history ofcertain recent securityevents.

The Full History view in theSecurity History window

Full History

displays the completeSecurity History.

You can scan your computerto check if any virus, spyware,

Scan Results

malware, or security risk hasinfected your computer.

The Scan Results view in theSecurity History windowdisplays the details about thescans that are run on yourcomputer.

113Maintaining total protectionAbout monitoring protection features

Page 114: Help

The security risks include thesuspicious programs that cancompromise the security ofyour computer.

The Resolved Security Risksview in the Security Historywindow displays a list ofsecurity risks that Norton 360has detected and thenrepaired, quarantined, orremoved. The quarantineditems are listed in theQuarantine view. You canalso view the quarantineditems in theQuarantine view.

Resolved Security Risks

The security risks include thesuspicious programs that cancompromise the security ofyour computer.

The Unresolved SecurityRisks view in the SecurityHistorywindow displays a listof security risks that Norton360 was not able to repair,remove, or quarantine.

Certain threats requiresystem restart, logs for suchthreats can be cleared onlyafter you restart your system.

Unresolved Security Risks

Maintaining total protectionAbout monitoring protection features

114

Page 115: Help

The Security HistoryQuarantine provides a safelocation on your computerwhere you can isolate itemswhile you decide an action totake on them.

The Quarantine view in theSecurity History windowdisplays all of the securityrisks that are isolated in theSecurity History Quarantine.

Quarantine

Symantec Online Network forAdvanced Response (SONAR)identifies new threats basedon the suspicious behavior ofapplications. SONAR detectsand protects your computeragainst malicious code evenbefore virus definitions areavailable throughLiveUpdate.

The SONAR Activity view inthe Security History windowdisplays details about thesecurity risks that SONARdetects. This category alsolists any activity thatmodifies the configuration orthe settings of yourcomputer.

The More Details option forthis category provides detailsabout the resources that thisactivity affects.

SONAR Activity

115Maintaining total protectionAbout monitoring protection features

Page 116: Help

The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.

The Firewall - Network andConnections category in theSecurity History windowdisplays information aboutthe networks that yourcomputer connects to. It alsodisplays the actions that youhave taken to trust or torestrict networks andcomputers.

This category also displays ahistory of all of the TCP/IPnetwork connections thatwere made with yourcomputer. Networkconnections are logged whenthe connection is closed.

The Security History -AdvancedDetailswindow forthis category lets you modifytrust or restrict settings forcomputers and networks.

Firewall - Network andConnections

Maintaining total protectionAbout monitoring protection features

116

Page 117: Help

The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.The firewall maintains rulesto control Internet access toand from your computer.

The Firewall - Activities viewin the Security Historywindow displays the rulesthat firewall creates. Therules that you create alsoappear in this view.

The Security History -AdvancedDetailswindow forthis category shows thecreated Program rules. It alsolets you allow a blockedprogram rule.

Firewall - Activities

Intrusion Prevention scans allthe network traffic thatenters and exits yourcomputer for known threats.

The Intrusion Preventionview in the Security Historywindow displays detailsabout recent IntrusionPrevention activities.

The Security History -AdvancedDetailswindow forthis category lets you controlwhether or not to be notifiedwhen Intrusion Preventiondetects an IntrusionPrevention signature.

Intrusion Prevention

117Maintaining total protectionAbout monitoring protection features

Page 118: Help

Download Insight processesany executable file that youdownload for analysis of itsreputation level. It theninforms you about theprocessing results based onthe Download Insightsettings.

The Download Insight viewin the Security Historywindow displays details of allevents that Download Insightprocesses and notifies. Thisview also containsinformation about the actionsthat you take based on thereputation data of the events.

Download Insight

Norton AntiSpam protectsyour computer from exposureto unsolicited email.

The AntiSpam view in theSecurity History windowdisplays details about theemail messages thatAntiSpam has processed.

AntiSpam

The various features ofIdentity Safe help youmanage your identities andprovide additional securitywhile you perform onlinetransactions.

The Identity view in theSecurity History windowdisplays the Antiphishingdefinitions that Norton 360downloads when you runLiveUpdate to obtain thelatest virus definitions.

Identity

Maintaining total protectionAbout monitoring protection features

118

Page 119: Help

Norton Product TamperProtection lets you protectyour Norton product from anyattack or modification byunknown, suspicious, ormalicious applications.

The Norton Product TamperProtection view in theSecurity History windowdisplays details aboutunauthorized attempts tomodify Symantec processes.The tasks that your Symantecproduct blocks also appear inthe list.

Norton Product TamperProtection

The performance alertfeature lets you view,monitor, and analyze theimpact of the systemactivities on your computer.

The Performance Alert viewin the Security Historywindow provides detailsabout the impact of theprocesses that run on yourcomputer. The details includethe process name, theresources used, the extent ofresource utilization, and theoverall impact of the processon your computer. Inaddition, logs related toperformance alerts and theprograms that you haveexcluded from performancealerts also appear in the list.

Performance Alert

119Maintaining total protectionAbout monitoring protection features

Page 120: Help

Metered Broadband Modelets you set up policies andrestrict the Internet usage ofNorton 360. You can definethe amount of networkbandwidth that Norton 360can use.

The Metered Network view inthe Security History windowprovides details about theactions that you performedto restrict the Internet usageof Norton 360.

Metered Network

TheBackup view displays thelist of the backup and restoreactivities that you performed.

Backup

In some cases, you mighthave submitted evaluation ofcertain Web pages toSymantec.

The Sites Reported toSymantec view in theSecurity History windowdisplays all the Web sites thatyou reported to Symantec toverify authenticity.

Sites reported to Symantec

Maintaining total protectionAbout monitoring protection features

120

Page 121: Help

Email errors include anyfailure that occurs whenNorton 360 tries to send,download, or scan an emailmessage that you send orreceive.

The Email Errors view in theSecurity History displaysdetails about any Email Erroralerts that you receive whenan Email error occurs. Detailsinclude the Error ID and theErrormessage. This view alsodisplays information aboutsubject, sender address, andthe recipient address that arerelated to the email messagein the alert.

Email Errors

The Norton CommunityWatch feature lets yousubmit any suspicioussecurity or suspiciousapplication data to Symantecfor analysis. Symantecassesses the data todetermine the new threats.

The Norton CommunityWatch view in the SecurityHistorywindow displays a listof files that you havesubmitted to Symantec foranalysis. Files, at variousstages of submission, alsoappear in the list.

Norton Community Watch

121Maintaining total protectionAbout monitoring protection features

Page 122: Help

The windows registry cancontain the entries that referto files that do not exist. Suchbroken registry items canslow down your computer.Registry Cleanup scans yourcomputer and cleans anybroken registry entries thatit finds.

TheRegistry Cleanup view inthe Security History windowdisplays the list of theRegistry Cleanup activitiesthat been performed in yourcomputer.

Registry Cleanup

The File Cleanup featureremovesunwanted temporaryfiles including leftoverInternet browser files,Internet search words, andother temporary files.

The File Cleanup view in theSecurity History windowshows the list of the FileCleanup activities that wereperformed on your computer.

File Cleanup

Disk optimization is a processin which the physicallocations of files arestreamlined. Files andmetadata are re-arranged toimprove data access time.

The disk optimization view inthe Security History windowshows the list of the diskoptimization activities thatwere performed on yourcomputer.

Disk Optimization

Maintaining total protectionAbout monitoring protection features

122

Page 123: Help

SilentMode suppresses alertsand notifications andtemporarily suspends mostof the background activities.

The Silent Mode view in theSecurity History windowdisplays the summary of theSilent Mode sessions.

The summary includes thefollowing information:1 The type of Silent Mode

such as Silent Mode orQuiet Mode

1 The type of program thatturns on Silent Mode suchas disk burning or TVrecording

1 The name ofUser-Specified programthat turns on Silent Mode

1 Whether Silent Mode isturned on or turned off

Silent Mode

LiveUpdate obtains the latestvirus definition updates andthe program updates to allthe Symantec products thatyou installed on yourcomputer. These updatesprotect your computer fromnewly discovered threats.

The LiveUpdate view in theSecurity History windowshows the details of theLiveUpdate activities on yourcomputer. The details includethe severity, the status, andthe duration of theLiveUpdate sessions on yourcomputer.

LiveUpdate

123Maintaining total protectionAbout monitoring protection features

Page 124: Help

4 Click a row to view details for that item.If you want to view additional information about anitem, click the More Details option in the Detailspane or double-click the particular row. You canview the advanced details about the item in theSecurity History-Advanced Details window andtake actions as needed. For some categories, theMoreDetails option opens the File Insight windowthat displays the details about the selected SecurityHistory event. You must use the Options link in theSecurity History window to select an action thatNorton 360 must perform on any item in thesecategories. The Options link is also available in theFile Insight window for certain items.

About the Security History - Advanced Details window

The SecurityHistory -AdvancedDetails window letsyou view more information about the items that youselect in the Show drop-down list in the SecurityHistory window. You can also perform any action thatis available for the selected item from this window.

Maintaining total protectionAbout monitoring protection features

124

Page 125: Help

The following table lists the categories that providethe advanced details about the Security History items:

Displays the followinginformation about the item:1 Severity

This category displays therisk level of the selecteditem. The various levels ofsecurity risks are High,Medium, Low, and Info.

1 Activity

This category displays theactivity that was performedby Norton 360.

1 Date & Time

This category displays thedate and time of the activity.

1 Status

This category displays thestatus of the action that hasbeen taken on the item.

1 Recommended Action

This category displays theactions that you might needto perform.

Alert Summary

Displays the detailedinformation of the item

You can view the details such ascategory, risk level, riskcategory, submission date of therisk, risk status, risk description,and recommended actions forthe items.

Advanced Details

125Maintaining total protectionAbout monitoring protection features

Page 126: Help

Actions

Maintaining total protectionAbout monitoring protection features

126

Page 127: Help

Displays the actions that areavailable for the selected item

The options in the Actions viewvary depending on the optionsthat are available in the Showdrop-down list in the SecurityHistory window.

The following are some of theActions options:1 Trust

This action allows access toor from the selectedcomputer or all of theunclassified computers onthe selected network.

This option is available in theSecurity History - Firewall -Network and Connectionsview.

1 Restrict

This action blocks access toor from the selectedcomputer or all of theunclassified computers onthe selected network.

This option is available in theSecurity History - Firewall -Network and Connectionsview.

1 Remove trust

Removes the trusted statusfrom the selected computeror from all of the unclassifiedcomputers on the selectednetwork.

This option is available in theSecurity History - Firewall -Network and Connectionsview.

1 Remove restriction

127Maintaining total protectionAbout monitoring protection features

Page 128: Help

This action removes therestricted status from theselected computer or fromall of the unclassifiedcomputers on the selectednetwork.

This option is available in theSecurity History - Firewall -Network and Connectionsview.

1 View Rule

This action shows thefirewall rule that is used tocontrol the Internet accessattempts by the selectedprogram in the ProgramControl window of Norton360.

This option is available in theSecurity History -Firewall-Activities view.

1 Allow

This action allows theselected program to accessthe Internet.

This option is available in theSecurity History - IntrusionPrevention view.

1 Stop Notifying Me

This action prevents Norton360 from notifying you whenit blocks the selected attacksignature in the future.

This option is available in theSecurity History - IntrusionPrevention view.

Maintaining total protectionAbout monitoring protection features

128

Page 129: Help

1 Notify Me

This action allows Norton360 to notify you when itblocks the selected attacksignature in the future.

This option is available in theSecurity History - IntrusionPrevention view.

Displays the links that providethe information that is relatedto the selected item

For some Security History items,this view lets you access therelevant settings pane of theNorton 360 window.

Risk Management

About the File Insight window

The File Insight window provides details about anyFile of Interest that is available on your computer. Thisoption of file analysis is available for the files that youdownload, scan, or use to perform an activity.

You can access the File Insight window in differentways. For example, you can use the variousnotifications, alerts, scan and performance-relatedwindows, and the shortcut menu of the various filesthat are present on your computer to open the window.Security History provides a centralized location whereyou can access the File Insight windows of the variousevents that are related to Security Risks, DownloadInsight, and Performance.

129Maintaining total protectionAbout monitoring protection features

Page 130: Help

The File Insight window lets you view more details ofevents that belong to some of the following categoriesin the Security History window:

Lets you view the detailedinformation about the resolvedsecurity risks in an organizedway.

The Resolved Security Riskscategory includes the infectedfiles that Norton 360 repairs,removes, or quarantines. Thiscategory mostly includes themedium-level or the high-levelrisks that are either quarantinedor blocked.

The File Insightwindow providesdetails about the risk level, theorigin, and the activity report ofthe resolved security risks onyour system.

Resolved Security Risks

Lets you view the detailedinformation about theunresolved security risks in anorganized way.

The Unresolved Security Riskscategory includes the infectedfiles for which Norton 360 wasnot able to take any action. Thiscategory mostly includes thelow-level risks that require yourattention for a suitable action.

The File Insightwindow providesdetails about the risk level, theorigin, and the activity report ofthe unresolved security risks onyour system.

Unresolved SecurityRisks

Maintaining total protectionAbout monitoring protection features

130

Page 131: Help

Lets you view the detailedinformation about quarantinedsecurity risks in an organizedway.

The Quarantine categoryincludes the infected files thatare isolated from the rest of yourcomputer while they await yourattention for a suitable action.

The File Insightwindow providesdetails about the risk level, theorigin, and the activity report ofquarantined security risks onyour system.

Quarantine

Lets you view the reputationdetails of a file that youdownload.

You can use these details todetermine the safety level of thefile and then decide the actionthat you want to perform.

Download Insight

Lets you view the performancedetails of any File of Interest thatis available on your computer.

The information includes thegeneral details, the origin andlineage information, theresource usage, and the actionsthat the file has performed onyour system.

Performance Alert

The FileInsight window provides various details aboutthe Security History item. These details are classifiedin different tabs in the File Insight window.

131Maintaining total protectionAbout monitoring protection features

Page 132: Help

You can select a tab to view more details about it. TheFile Insight window provides details about a file in thefollowing tabs:

Displays the information such asthe confidence level, communityusage of a file, how long ago thefile was released and how stablethe file is.

w Stability ratings of a filemay vary depending upon youroperating system.

You can view details such as thesignature and the date on whichthe file was created. You candetermine if a file is a startupfile and the date on which thefile was last used.

Details

Provides the lineage details of afile.

You can view the file name andthe URL of the source fromwhere the file was downloaded.The lineage details of a file areavailable only if you downloadedor created the file after youinstalled Norton 360.

w If the historical details ofa file are not available, Norton360 disables thisOrigin section.

Origin

Maintaining total protectionAbout monitoring protection features

132

Page 133: Help

Provides the details about thesuspicious actions performed bythe file on your computer. It alsoprovides information about theresource usage of a process andthe effect of the process on theoverall CPU utilization of yourcomputer.

Activity

Based on the severity of the security risks and the risktype, Norton 360 might display one or more of thefollowing options in the File Insight window:

Lets you locate the file onyour computer.

This option is available at thetop of the window.

Locate

Lets you copy the data fromthe File Insightwindow to theclipboard.

After you copy the content tothe Clipboard, you can opena document, paste the data,and save the document.

Copy to Clipboard

Lets you access the ThreatDetected window and viewmore details and performactions.

Options

Lets you access the onlinetutorial page to get moreinformation about the file.

Learn More

133Maintaining total protectionAbout monitoring protection features

Page 134: Help

About the Threat Detected window

The ThreatDetected window appears whenever Norton360 detects a security risk on your computer. You canuse this window to view details about the risk and selectan action for the risk. Sometimes, you may want toaccess the Threat Detected window for the same riskagain. In that case, the window can be opened at anytime from Security History. Security History is thecentralized location where you can access the ThreatDetected windows of risks that belong to some of thefollowing categories:

This category includes thesecurity risks or the infectedfiles that Norton 360 hasdetected and then repaired,quarantined, or removed.

Resolved Security Risks

This category includes thesecurity risks or the infectedfiles that Norton 360 was notable to repair, remove, orquarantine.

Unresolved SecurityRisks

This category includes thesecurity risk items that areisolated from the rest of yourcomputer while they await yourattention for a suitable action.

Quarantine

The action options in the ThreatDetected window fora risk vary depending on the risk type and its severitylevel. The following are some of the options that areavailable in this window:

Returns the security risk that isquarantined to the originallocation on your computer

Restore

Maintaining total protectionAbout monitoring protection features

134

Page 135: Help

Returns the selected Quarantineitem to its original locationwithout repairing it and excludesthe item from being detected inthe future scans

Removes the security risk fromyour computer and quarantinesit

Remove this file

Excludes the security risk fromfuture scan

Exclude this program

Removes the selected securityrisk item from the SecurityHistory log

Remove from history

Takes you to the SymantecSecurity Response Web site

Get help

Sends the security risk toSymantec

Submit to Symantec

Searching in Security History

You can search the items that are listed in SecurityHistory. You can use the Quick Search option to finditems using a keyword or the name of a security risk.If you want to view all of the Security History itemsthat pertain to a particular security risk, you can filterthe items using QuickSearch. For example, if you wantto view all of the alerts that Auto-Protect has generated,you can type Auto-Protect and filter the list.

You can clear the search results and return to thecurrent Security History list by clicking the black cross(x) icon in the Quick Search box.

The Quick Search option works on the current viewonly. If you want your search to include all of the items

135Maintaining total protectionAbout monitoring protection features

Page 136: Help

in Security History, you must select the Full Historyview.

To search in Security History

1 In the Security History window, in the QuickSearch text box, type the name of the item that youwant to search.

2 Click Go.

Exporting or Importing Security History information

Norton 360 lets you export the Security History eventsto a file. You can export and save the Security Historyevents and view them at your leisure.

For example, you can analyze the security events on aparticular day. You can use the Quick Search optionto obtain a list of all of the items that are related to aparticular security risk. You can then use the Exportoption to save the list in the Security History log. Youcan later import the log file and analyze the data.

Security History stores the information in a separatefile. When the file size reaches its maximum size limit,information that is related to new events overwritesthe information that is related to older events. You canexport the log periodically, if you want to keep theentire Security History information.

You can save your log file in one of the following fileformats:

1 Security History Log Files (.mcf)

The .mcf file format is the Security History Log Filesformat and is proprietary to Symantec.

When you use this file type option, you can viewthe file only in the Security History window.

1 Text Files (.txt)

The data is saved in a comma-separated text format.

When you use this file type option, you can openand view the file externally without using SecurityHistory.

Maintaining total protectionAbout monitoring protection features

136

Page 137: Help

You can import only the log files that have .mcf fileextension. When you import a log file, the exported listof Security History information in the log file appears.This list replaces the current security events list. Youcan select an option in the Show drop-down list to viewthe option-specific details that are saved in the log file.To revert to the current Security History list you mustclick the Close file: file_name.mcf link.

To export Security History information

1 In the Norton 360 main window, click Tasks.

2 In the Tasks window, under General Tasks, clickCheck Security History.

3 In the Security History window, in the Showdrop-down list, select an option.

4 Click Export.

5 In the Save As dialog box that appears, navigate toa location and specify the name for the file.The category name in the Show drop-down listappears as the default file name. You can provide afile name of your choice.

6 In the Save as type box, select the format in whichyou want to save your log file.

7 Click Save.

To import Security History information

1 In the Norton 360 main window, click Tasks.

2 In the Tasks window, under General Tasks, clickCheck Security History.

3 In the Security History window, click Import.

4 In the Open dialog box that appears, browse to thefolder that has the file you want to import.

137Maintaining total protectionAbout monitoring protection features

Page 138: Help

5 Select the .mcf file and click Open.You can only open log files of .mcf format in theSecurity History window. You can open and viewlog files of .txt file externally without using SecurityHistory.In the import mode, you cannot make modificationsto the information. For example, you cannot clearthe logs. You can revert to the current SecurityHistory list by closing the file.

Managing items in the Quarantine

The Security History Quarantine provides a safelocation on your computer where you can isolate itemswhile you decide on an action to take on them.Quarantined items are isolated from the rest of yourcomputer so that they cannot spread or reinfect yourcomputer. In some cases, you may have an item thatyou think is infected, but is not identified as a risk bythe Norton 360 scans. You can manually place suchitems in the Quarantine.

You cannot open quarantined items accidentally andspread the virus, but you can evaluate the quarantineditems for possible submission to Symantec.

The Security History Quarantine includes the followinggroups of items:

Includes the items suchas spyware and adwarethat are generally low riskand that another programrequires to functionproperly.

You can restore theseitems if necessary.

Security risks

Includes viruses andother high-risk items.

Security threats

Maintaining total protectionAbout monitoring protection features

138

Page 139: Help

Once an item has been quarantined, you have severaloptions. All of the actions that you take on quarantineditems must be performed in the Security HistoryQuarantine.

To perform an action on a quarantined item

1 In the SecurityHistory window, in the Quarantineview, select the item on which you want to performthe action.

2 In the Details pane, click Restore & Options.You can use the More Details link to view moredetails about the item before you select an actionfor it. The link opens the File Insight window thatcontains more information about the risk.

139Maintaining total protectionAbout monitoring protection features

Page 140: Help

3 In the Threat Detected window, select the actionthat you want to perform. Some of the options are:

Returns the security risk thatis quarantined to the originallocation on your computer

This option is available onlyfor the detected viral threats.

Restore

Returns the selectedQuarantine item to itsoriginal location withoutrepairing it and excludes theitem from being detected inthe future scans

This option is available forthe detected viral andnon-viral threats.

Restore & exclude this file

Removes the selected itemfrom the Security History log

Remove from history

Sends the selected item toSymantec for evaluation ofthe security risk

In some cases, Norton 360might not identify an item asa security threat, but youmight suspect that the itemis infected. In such cases, youcan use this option to submitthe item to Symantec forfurther analysis.

Submit to Symantec

You can also navigate to this window by using theOptions link in the File Insight window for somerisks.

4 Follow the on-screen instructions.

Maintaining total protectionAbout monitoring protection features

140

Page 141: Help

Adding an item to the Quarantine

Security History Quarantine provides a safe locationon your computer in which you can isolate items whileyou decide on an action to take on each item.

The Quarantine view in the SecurityHistory windowdisplays a list of quarantined items. You can view thename and the risk status of each quarantined item.

You can manually add an item to the Security HistoryQuarantine. You can use the AddtoQuarantine optionin the Quarantine view in the SecurityHistory windowto quarantine the items that you suspect are infected.This action has no effect on the items that are alreadyquarantined.

w You cannot add a known Good File to Quarantine.

To add an item to the Quarantine

1 In the SecurityHistory window, in the Quarantineview, click Add to Quarantine.

2 In the Manual Quarantine dialog box, in theDescription text box, type a short name for the itemthat you want to add.This text appears in the Quarantine, so you shoulduse a recognizable description.

3 Click Browse.

4 In the Select File toQuarantine dialog box, browseto the item that you want to add, select it, and thenclick Open.

5 Click Add.

6 Click Close.

Restoring an item from the Quarantine

Some programs rely on other programs that areclassified as security risks to function. The programmay not function if a particular security file is removed.All of the removed security risks are automaticallybacked up in the Security History Quarantine. Thisway, Norton 360 lets you restore any risk to regain the

141Maintaining total protectionAbout monitoring protection features

Page 142: Help

functionality of a program that requires the riskprogram to run.

For example, a shareware or freeware program thatyou download may use adware to keep its price low. Inthis case, you can allow the security risk program toremain on your computer or restore it if SpywareProtection has removed it.

Some quarantined items are successfully disinfectedafter Norton 360 rescans them. You can also restoresuch items.

w If you restore an item to a directory other than itsoriginal location, it may not function properly.Therefore, it is recommended that you reinstall theprogram.

To restore an item from the Quarantine

1 In the SecurityHistory window, in the Quarantineview, select the item that you want to restore.

2 In the Details pane, click Restore & Options.

3 In the Threat Detected window, click Restore &exclude this file.This option returns the selected Quarantine itemto its original location without repairing it andexcludes the item from being detected in the futurescans.

4 In the Quarantine Restore window, click Yes.In case of non-viral threats, you can use the optionthat is available in this window to exclude thesecurity risk. Norton 360 does not detect thesecurity risks that you exclude in the future scans.

5 In the Browse forFolder dialog, select the folder ordrive where you want to restore the file and thenclick OK.

6 Click Close.

Removing an item from the Quarantine

You can configure Norton 360 to remove a security riskfrom your computer. You can use the Restore option

Maintaining total protectionAbout monitoring protection features

142

Page 143: Help

to remove the security risk and places it in the SecurityHistory Quarantine. Some programs may rely on thesecurity risk item that you quarantine to function. Inthis case, you can restore the security risk to regainthe functionality of a program that requires the riskprogram to run.

w The Restore option is only available for the securityrisks that are manually quarantined.

To remove an item from the Quarantine

1 In the SecurityHistory window, in the Quarantineview, select the item that you want to remove.

2 Click Restore & Options.

3 In the Threat Detected window, click Restore.This option is available for the security risks thatare manually quarantined.

4 In the Quarantine Restore window, click Yes.

5 Click Close.

Manually submitting an item to Symantec

When a virus or other risk is detected, it isautomatically submitted to Symantec SecurityResponse Web site for analysis. If you have turned offthe option to submit risks automatically, you canmanually submit them from the Security HistoryQuarantine. You must have an Internet connection tosubmit an item.

When you submit files to Symantec automatically ormanually, you contribute to the effectiveness of yourSymantec product. For example, you can submit anitem that has not been detected during scanning thatyou believe may be a security risk. Symantec SecurityResponse analyzes the file. If it is identified as asecurity risk, it is added to a future definition update.

Personally identifiable information is never includedin submissions.

In some cases it is necessary for Symantec SecurityResponse to block submissions of a particular type or

143Maintaining total protectionAbout monitoring protection features

Page 144: Help

volume. These items appear as Not Submitted inSecurity History.

To manually submit an item to Symantec

1 In the SecurityHistory window, in the Quarantineview, select the item that you want to submit toSymantec.

2 In the Details pane, click Restore & Options.

3 In the Threat Detected window, click Submit toSymantec.

4 In the dialog box that appears, click OK.

About viewing details of systemvulnerabilities

The Intrusion Prevention feature of Norton 360provides a proactive solution to prevent the threatsthat might exploit the vulnerabilities of the programsor the operating system of your computer. Norton 360now provides the Vulnerability Protection featurethat enables you to view details of the protectionfeature against possible attacks on thesevulnerabilities. Vulnerability Protection displays anextensive list of the programs on your computer thatcontain vulnerabilities. In addition, it provides detailsabout the vulnerability and the solution that IntrusionPrevention provides to identify any attack on thevulnerability. You can use Vulnerability Protectionto view the correlation between the vulnerabilities thatyour computer is protected against and the programsthat may contain these vulnerabilities.

About Vulnerability ProtectionVulnerability Protection is a component of IntrusionPrevention System. Vulnerability Protection providesinformation about the susceptibility of the programsthat may be on your computer against malicious

Maintaining total protectionAbout viewing details of system vulnerabilities

144

Page 145: Help

attacks. It also provides information about the knownattacks that they are protected from.

Vulnerabilities are flaws in your programs or youroperating system that can create weaknesses in overallsecurity of your system. Improper computerconfigurations or security configurations also createvulnerabilities. External attackers exploit thesevulnerabilities and perform malicious actions on yourcomputer. Examples of such malicious attacks areactive desktop monitoring, keylogging, and hacking.Such attacks can slow down the performance of yourcomputer, cause program failure, or expose yourpersonal data and confidential information to thehackers.

Norton 360 provides the signature-based solutions toprotect your computer from the most common Internetattacks. Attack signatures contain the information thatidentifies an attacker’s attempt to exploit a knownvulnerability in your operating system or yourcomputer programs. The Intrusion Prevention featureof Norton 360 uses an extensive list of attack signaturesto detect and block suspicious network activity.

Vulnerability Protection lets you view the correlationbetween the vulnerabilities that your computer isprotected against and the programs that may containthese vulnerabilities. For example, if Internet Explorerdoes not handle certain HTTP responses, it can resultin a vulnerability that can be exploited. In this case,Vulnerability Protection lists Internet Explorer as avulnerable program. It also provides details about thesignatures that Intrusion Prevention uses to detect anyattempt to exploit this vulnerability.

Viewing the list of vulnerable programs

The Vulnerability Protection window lets you viewthe extensive list of programs with the knownvulnerabilities that Norton 360 protects you against.

For each program, you can view details such as thename of the program, its vendor, and the number of

145Maintaining total protectionAbout viewing details of system vulnerabilities

Page 146: Help

vulnerabilities that the program contains. You can alsoview more details about the vulnerabilities by clickingon the program name.

To view the list of vulnerable programs

1 In the Norton 360 main window, click Tasks.

2 In the Tasks window, under General Tasks, clickCheck Vulnerability Protection.

3 After you finish viewing the list, click Close.

Viewing details about a vulnerable application

The VulnerabilityProtection window displays the listof the programs on your computer that are susceptibleto malicious attacks. In addition, you can view detailsof the vulnerabilities that a program contains. TheProgram Vulnerability Details window displays thenames of the attack signatures that IntrusionPrevention uses to detect any attempts to exploit thevulnerabilities in the program.

You can click an attack signature to get additionalinformation about the signature in the SymantecSecurity Response Web site.

The Intrusion Signatures window of IntrusionPrevention lets you view a list of attack signatures.Intrusion Prevention relies on this list of attacksignatures to detect and block suspicious activity. Youcan uncheck a signature from the list, if you do notwant Norton 360 to monitor the signature. TheProgram Vulnerability Details list does not includeany signature that you disable in the IntrusionSignatures window. By default, all the signatures inthe IntrusionSignatures window are turned on. Unlessyou have a good reason to disable a signature, youshould leave the signatures turned on. If you disable asignature, your computer may be vulnerable to attack.

To view details about a vulnerable application

1 In the Norton 360 main window, click Tasks.

Maintaining total protectionAbout viewing details of system vulnerabilities

146

Page 147: Help

2 In the Tasks window, under General Tasks, clickCheck Vulnerability Protection.

3 In the Vulnerability Protection window, in theProgram column, click the program name for whichyou want to view the details.

4 In the ProgramVulnerabilityDetails window, viewthe signature details of the program.

5 If you want to view additional information aboutthe signature, then click the signature name.

6 After you finish viewing the vulnerability details,in the ProgramVulnerabilityDetails window, clickClose.

7 In the VulnerabilityProtection window, click Close.

147Maintaining total protectionAbout viewing details of system vulnerabilities

Page 148: Help

Maintaining total protectionAbout viewing details of system vulnerabilities

148

Page 149: Help

This chapter includes the following topics:

1 About the Norton 360 scans

1 About Computer Scan

1 About Insight Network scan

1 About Reputation Scan

1 About Scan Facebook Wall

1 About SONAR Protection

1 About scanning Office documents

1 About Silent Mode

1 About boot time protection

1 Running a scan at the command prompt

About the Norton 360 scansNorton 360 scans secure your computer from all typesof viruses and unknown threats using the latest virusdefinitions. It also scans all the Internet activities thatare performed on your computer to protect yourcomputer from the Internet-based threats that exploitsoftware vulnerabilities.

4Scanning yourcomputer

Page 150: Help

Norton 360 automatically performs different types ofscans to secure your computer from latest threats. Italso lets you run different types of scans manually tosecure your computer.

By using Norton 360, you can run the following typesof scans:

Computer Scan uses the latestvirus definitions that areavailable locally in the computer.

If you suspect that yourcomputer is infected, you canrun three types of computerscans manually to prevent virusinfections on your computer. Thethree types of scans that areavailable under Computer Scanare Quick Scan, Full SystemScan, and Custom Scan.

Computer Scan

Insight Network Scan uses thevirus definitions that areavailable locally and hosted inthe Cloud. InsightNetwork Scandetects the files that aresuspicious or vulnerable on yourcomputer using thereputation-based threatdetection. Norton 360 performsan Insight Network Scan onlywhen the Insight Protectionoption is turned on. By default,the Insight Protection option isturned on.

You can see this InsightProtection option under Scansand Risks tab in the Antivirussettings window.

Insight Network Scan

Scanning your computerAbout the Norton 360 scans

150

Page 151: Help

Reputation Scan displays thereputation information of thefiles on your computer. Itdisplays the reputationinformation such as trust level,prevalence, stability rating, andresource usage. ReputationScan displays the detailedreputation information of thegood files and the number of badfiles that have been detected orremoved.

Reputation Scan also internallyperforms Computer Scan andInsight Network Scan to detectthe threats. The different typesof scans that are available underReputation Scan areQuick Scan,Full System Scan, and CustomScan.

w Norton 360 ReputationScan is applicable only for theexecutable files and the installerfiles.

Reputation Scan

151Scanning your computerAbout the Norton 360 scans

Page 152: Help

Scan Facebook Wall lets youscan the links and URLs that areavailable on your Facebookprofile.

When you click the ScanFacebook Wall option, Norton360 takes you to the Facebooklogin Web page. After you log into your Facebook profile, NortonSafe Web asks you to grantpermission to access yourFacebook wall. To do so, use thegrant us permission to accessyour stream option available onthe Facebook Web page, andthen follow the on-screeninstructions. After you grantpermission, Norton safe Webscans all the available links onyour Facebook wall each timeyou use Scan Facebook Walloption. It then displays thesecurity status of the scannedURLs.

Scan Facebook Wall

Norton 360 keeps your computer secure from latestthreats by automatically running Full System Scanwhen your computer is in the idle state.

About Computer ScanNorton 360 automatically downloads latest virusdefinition regularly and secures your computer fromall types of viruses and unknown threats. When Norton360 performs a Computer Scan, it uses the latest virusdefinitions that Symantec provides.

The threat detections that are based on the localdefinition are specified with a specific name. Forexample, if a Trojan horse is detected, the scan results

Scanning your computerAbout Computer Scan

152

Page 153: Help

of the Computer Scan displays the threat as Trojan.Foo.You can click the Run Scans option available in theTasks window to access the different types of computerscans.

If you suspect that your computer is infected, you canrun three types of computer scans manually to preventvirus infections on your computer.

You can run the following types of computer scans:

Scans the important locations ofyour computer that the virusesand other security threats oftentarget.

Quick Scan takes less time toscan than a Full System Scanbecause this scan does not scanyour entire computer.

Quick Scan

Scans your computer for alltypes of viruses and securitythreats.

Full System Scan thoroughlyexamines your entire computerfor viruses, spyware, anddifferent security vulnerabilities.It also runs LiveUpdate, Virusand Spyware Scan , diskoptimization, and backup. Inaddition, it cleans up theInternet Explorer temporary filesand Windows temporary files.

Norton 360 automatically runsa Full System Scan when yourcomputer is in idle state.

Full System Scan

Scans a specific file, folder,drive, or removable drive thatyou choose.

Custom Scan

153Scanning your computerAbout Computer Scan

Page 154: Help

Runs LiveUpdate, backup, anddisk optimization tasks.

Runs LiveUpdate, backs up yourdata, frees disk space, andoptimizes your disk volume.

Custom Task

Computer Scan provides details about the scanneditems. You can view the details such as total numberof files scanned, security risks detected, security risksresolved, and the total items that require attention. Italso provides you the different ways to resolve anyitems that were not automatically resolved during thescan. You can also view the severity of the risk, thename of the risk, and the status of the risk about theresolved items.

Running a Quick ScanA Quick Scan helps you to scan the possiblevirus-infected areas of a computer that the viruses andother security risks often targets. Because this scandoes not scan your entire computer, it takes less timeto run than a Full System Scan.

When Norton 360 performs Quick Scan for the firsttime, it automatically runs LiveUpdate, and cleans upthe Internet Explorer temporary files and Windowstemporary files.

When the Insight Protection option is turned on,Norton 360 simultaneously performs a traditionalQuick Scan and an Insight Network Quick Scan. Bydefault, the Insight Protection option is turned on.

During idle time, Norton 360 runs a Quick Scan whenthere is a definition update.

To run a Quick Scan

1 In the Norton 360 main window, click PC Security,and then click Run Scans.

2 In the Scans window, under Computer Scan, clickQuick Scan.

Scanning your computerAbout Computer Scan

154

Page 155: Help

3 Click Go.You can use the following options:

Suspends the scan temporarily.

Click Resume to continue thescan.

Pause

Skips the current scan.Skip

Terminates a Quick Scan.Cancel

4 On the Results Summary window, do one of thefollowing:

1 If no items require attention, click Finish.

1 If there are items require attention, review therisks in the Threats Detected window.

Running a Full System ScanA Full System Scan thoroughly examines your entirecomputer for viruses, spyware, and different securityvulnerabilities. A Full System Scan runs LiveUpdate,virus and spyware scan, disk optimization, and backup.

A Full System Scan helps you to do the following:

1 Obtain latest protection and program updates.

1 Scan your computer for threats.

1 Optimize disks to improve the performance of yourcomputer.

1 Back up your data.

You can back up your files regularly to protect thevaluable information on your computer.

To run a Full System Scan

1 In the Norton 360 main window, click PC Security,and then click Run Scans.

2 In the Scans window, under Computer Scan, clickFull System Scan.

155Scanning your computerAbout Computer Scan

Page 156: Help

3 Click Go.

4 After the scan is complete, in the Scans window,click Close.

Scanning selected drives, folders, or filesOccasionally, you might want to scan a particular file,removable drives, any of your computer's drives, orany folders or files on your computer. For example,when you work with removable media and suspect avirus, you can scan that particular disk. Also, if youhave received a compressed file in an email messageand you suspect a virus, you can scan that individualelement.

To scan individual elements

1 In the Norton 360 main window, click PC Security,and then click Run Scans.

2 In the Scans window, under ComputerScans, clickCustom Scan.

3 Click Go.

Scanning your computerAbout Computer Scan

156

Page 157: Help

4 In the Scans window, do one of the following:

1 To scan specific drives, click Run next to DriveScan, select the drives that you want to scan,and then click Scan.

1 To scan specific folders, click Run next to FolderScan, select the folders that you want to scan,and then click Scan.

1 To scan specific files, click Run next to FileScan,select the files that you want to scan, and thenclick Add.

You can also press Ctrl, and select multiple filesto scan.

You can use the following options to suspend ascan:

Suspends a custom scantemporarily.

Click Resume to continue thescan.

Pause

Terminates the scan.

Click Yes to confirm.

Stop

5 In the Results Summary window, do one of thefollowing:

1 If no items require attention, click Finish.

1 If any items require attention, review them onthe Threats Detected window.

About the Results Summary windowNorton 360 displays the ResultSummary window whenyou run a manual scan. At the end of a scan, the ResultsSummary window provides the summary of the scanresults.

If your most recent scan was a Quick Scan, this windowshows the results of a fast scan of the areas of your

157Scanning your computerAbout Computer Scan

Page 158: Help

computer. Viruses, spyware, and other risks oftentarget these areas.

If your most recent scan was a Full System Scan, thiswindow shows the results of a comprehensive scan ofyour entire computer.

The Result Summary window displays the followinginformation:

1 Total items scanned

1 Total security risks detected

1 Total security risks resolved

1 Total items that require your attention

About the Threats Detected windowNorton 360 displays the Threats Detected windowwhen it detects threats. At the end of a scan, theThreatsDetected window provides you different waysto resolve any items that were not automaticallyresolved during the scan.

The ThreatsDetected window provides the informationsuch as the severity of the risk, the name of the risk,and the status of the risk. It also provides the actionthat you can take to resolve the item. The ThreatsDetected window provides you the different optionssuch as Fix, Manual Fix, Exclude, Get Help, andRescan to resolve the item.

It also provides the Ignore option only once during thefirst-time detection of low-risk items.

Ignore option is available once until you do not changethe default settings for the Low Risks option underComputer Scan.

The options in the ThreatsDetected window vary basedon the types of files that Norton 360 identified asinfected during the scan.

Scanning your computerAbout Computer Scan

158

Page 159: Help

About custom scansYou can create a custom scan if you regularly scan aparticular segment of your computer. This custom scanlets you scan the segment frequently without havingto specify it every time. You can also schedule thecustom scan to run automatically on specific dates andtimes or at periodic intervals. You can schedule a scanaccording to your preferences. If the scheduled scanbegins when you use your computer, you can run thescan in the background instead of stopping your work.

You can delete the scan when it is no longer necessary.For example, if you work on a project for which youneed to swap files frequently with others. In this case,you might want to create a folder into which you copyand scan those files before using them. When theproject is done, you can delete the custom scan for thatfolder.

Creating a custom scan

Instead of running the default scans that are listed inthe Scans pane, you can create your own scans thatmeet your specific requirements. For example, you cancreate a scan that checks a folder in which you storeall the downloaded files.

You can create a custom scan in the Scans window.

When you create custom scans, you can also schedulethem to run automatically on specific dates and timesor at periodic intervals.

To create a custom scan

1 In the Norton 360 main window, click PC Security,and then click Run Scans.

2 In the Scans window, under ComputerScans, clickCustom Scan.

3 Click Go.

4 In the Scans window, click Create Scan.

159Scanning your computerAbout Computer Scan

Page 160: Help

5 In the New Scan window, in the Scan Name box,type a name for the scan.You cannot specify a scan name that is already inuse.

6 On the Scan Items tab, add the items that you wantto scan. See “Selecting the scan items” on page 160.

7 On the Scan Schedule tab, set the frequency andtime at which you want to perform the scan. See“Scheduling a scan” on page 164.

8 On the ScanOptions tab, configure the scan optionsas required. See “Configuring the scan options”on page 161.

9 Click OK.

Selecting the scan items

When you configure a custom scan, you must selectthe items that you want to include in the scan. You caninclude individual files, folders, or drives. You caninclude multiple drives, folders, and files to add to thescan. You can also exclude items from the scan.

w When you select a drive, all the items in the driveincluding the files and folders are automatically addedto the scan. When you select a folder, all of the files infolder are added to the scan.

To select the scan items

1 In the Norton 360 main window, click PC Security,and then click Run Scans.

2 In the Scans window, under ComputerScans, clickCustom Scan.

3 Click Go.

4 In the Scans window, do one of the following:

1 To add items for a new scan, click Create Scan.

You must provide a name for the scan in theScan Name box.

1 To add items for an existing scan, in the EditScan column, click the edit icon for the scan thatyou want to modify.

Scanning your computerAbout Computer Scan

160

Page 161: Help

5 In the window that appears, on the Scan Items tab,do the following:

1 To add drives, click Add Drives, in the ScanDrives dialog box, select the drives to bescanned, and click Add.

1 To add folders, click Add Folders, in the ScanFolders dialog box, select the folders to bescanned, and click Add.

1 To add files, click AddFiles, in the Files toScandialog box, select the files to be scanned, andthen click Add.

If you need to remove an item from the list, selectthe item, and then click Remove.

6 Click OK.

Configuring the scan options

Norton 360 lets you configure scan options for eachscan that you customize. By default, the scan optionsreflect the current Computer Scans settings in theSettings window. The changes that you make areapplicable to the current scan only.

In addition to the custom scans that you create, youcan configure the scan options for the default scans.You can configure scan options for Full System Scan,Quick Scan, Drive Scan, Folder Scan, and File Scan.

To configure the scan options

1 In the Norton 360 main window, click PC Security,and then click Run Scans.

2 In the Scans window, under ComputerScans, clickCustom Scan.

3 Click Go.

4 In the Scans window, in the EditScan column, clickthe edit icon next to the scan that you want toschedule.

5 In the Edit Scan window, on the Scan Options tab,configure the scan options as required.

6 Click OK.

161Scanning your computerAbout Computer Scan

Page 162: Help

Editing a custom scan

You can edit a custom scan that you created. You caninclude additional files or folders to the scan or removethe files and folders that you do not want to scan. Youcan also change the name of the scan.

You can edit a custom scan in the Scans window.

To edit a custom scan

1 In the Norton 360 main window, click PC Security,and then click Run Scans.

2 In the Scans window, under ComputerScans, clickCustom Scan.

3 Click Go.

4 In the Scans window, in the EditScan column, clickthe edit icon next to the custom scan that you wantto modify.

5 In the Edit Scan window, on the Scan Items tab,select the items that you want to scan. See“Selecting the scan items” on page 160.

6 On the Scan Schedule tab, set the frequency andtime at which you want to perform the scan. See“Scheduling a scan” on page 164.

7 On the ScanOptions tab, configure the scan optionsas required. See “Configuring the scan options”on page 161.

8 Click OK.

Running a custom scan

When you run a custom scan, you do not have toredefine what you want to scan.

You can run a custom scan from the Scans window.

To run a custom scan

1 In the Norton 360 main window, click PC Security,and then click Run Scans.

2 In the Scans window, under ComputerScans, clickCustom Scan.

Scanning your computerAbout Computer Scan

162

Page 163: Help

3 Click Go.

4 In the Scans window, click Run next to the customscan that you want to run.You can use the following options to suspend acustom scan:

Suspends a custom scantemporarily.

Click Resume to continue thescan.

Pause

Terminates a custom scan.

Click Yes to confirm.

Stop

5 In the Results Summary window, do one of thefollowing:

1 If no items require attention, click Finish.

1 If any items require attention, review the riskson the Threats Detected window.

Deleting a custom scan

You can delete custom scans if they are no longerneeded.

You can delete a custom scan in the Scans window.

To delete a custom scan

1 In the Norton 360 main window, click PC Security,and then click Run Scans.

2 In the Scans window, under ComputerScans, clickCustom Scan.

3 Click Go.

4 In the Scans window, in the Delete column, clickthe delete icon next to the custom scan that youwant to delete.

5 Click Yes to confirm that you want to delete thescan.

163Scanning your computerAbout Computer Scan

Page 164: Help

About scheduling scans

Norton 360 automatically detects the idle state of yourcomputer and runs a Full System Scan. However, youcan schedule a Full System Scan according to yourpreferences. You can also set up a schedule for a QuickScan and custom virus scans that you create.

You can schedule scans to run automatically on specificdates and times or at periodic intervals. If the scheduledscan begins when you use your computer, you can runthe scan in the background instead of stopping yourwork. Norton 360 lets you schedule the Full SystemScan, Quick Scan, and custom virus scans. However,you cannot schedule the Drive Scan, Folder Scan, andFile Scan.

You can also set up Norton 360 to turn off yourcomputer or move it to sleep mode or hibernate modeautomatically when the scheduled scan is complete.

Scheduling a scan

You have complete flexibility in scheduling customscans. When you select how frequently you want a scanto run (daily, weekly, or monthly), you are presentedwith additional options. For example, you can requesta monthly scan, and then schedule it to occur onmultiple days instead.

In addition to the custom scans that you create, Norton360 lets you schedule the Full System Scan and QuickScan.

You can also schedule the scan to run in specific timeintervals (hours or days). You can schedule a customscan in the Scans window.

w Norton 360 lets you select multiple dates if youschedule a monthly scan.

To schedule a custom scan

1 In the Norton 360 main window, click PC Security,and then click Run Scans.

Scanning your computerAbout Computer Scan

164

Page 165: Help

2 In the Scans window, under ComputerScans, clickCustom Scan.

3 Click Go.

4 In the Scans window, in the EditScan column, clickthe edit icon next to the custom scan that you wantto schedule.

5 In the EditScan window, on the ScanSchedule tab,do one of the following:

1 If you do not want to run the scan at anyparticular time, but want to keep the scanoptions and scan items saved, select Do notschedule this scan.

1 To run the scan at specific time intervals, selectRun at specific time interval.

1 To run the scan at specific time every day, selectDaily.

1 To run the scan on a specific day on a week,select Weekly.

1 To run the scan on a specific day on a month,select Monthly.

These frequency options include the additionaloptions that you can use to refine the schedule. Setthe additional options as required.

6 Under Run the scan, do the following:

1 To run the scan only at idle time, check Only atidle time.

1 To run the scan only when your computer isconnected with external power source, checkOnly on AC power.

1 To prevent your computer from going to a Sleepor Standby mode, check Prevent standby.

165Scanning your computerAbout Computer Scan

Page 166: Help

7 Under After scan completion:, select the state atwhich your computer should be after the scan iscomplete. Your options are:

1 Stay On

1 Turn Off

1 Sleep

1 Hibernate

8 Click OK.

Scheduling a Full System Scan

Norton 360 automatically detects the idle state of yourcomputer and runs a Full System Scan. Full SystemScan protects your computer against infection withoutcompromising the performance of your computer. Youcan schedule a Full System Scan on specific dates andtimes or at periodic intervals.

You can schedule a Full System Scan in the Scanswindow.

To schedule a Full System Scan

1 In the Norton 360 main window, click PC Security,and then click Run Scans.

2 In the Scans window, under ComputerScans, clickCustom Scan.

3 Click Go.

4 In the Scans window, in the EditScan column, clickthe edit icon next to Full System Scan.

5 In the Edit Scan window, under Whendoyouwantthe scan to run?, set the frequency and time atwhich you want the scan to run.Most of the frequency options include the additionaloptions that you can use to refine the schedule. Setthe additional options as required.

6 Click OK.

Scanning your computerAbout Computer Scan

166

Page 167: Help

Scheduling a Quick Scan

Quick Scan scans the important locations of yourcomputer that the viruses and other security threatsoften target. When you perform a Quick Scan, Norton360 scans only the running processes and the loadedprograms. Quick Scan takes less time to scan than aFull System Scan because this scan does not scan yourentire computer.

Norton 360 lets you schedule a Quick Scan. You canschedule a Quick Scan in the Scans window.

To schedule a Quick Scan

1 In the Norton 360 main window, click PC Security,and then click Run Scans.

2 In the Scans window, under ComputerScans, clickCustom Scan.

3 Click Go.

4 In the Scans window, in the EditScan column, clickthe edit icon next to Quick Scan.

5 In the Edit Scan window, under Whendoyouwantthe scan to run?, set the frequency and time atwhich you want the scan to run.Most of the frequency options include the additionaloptions that you can use to refine the schedule. Setthe additional options as required.

6 Click OK.

Editing a scheduled scan

You can change the schedule of any scheduled customscan, QuickScan, or Full SystemScan from the Scanswindow.

To edit a scheduled scan from Norton 360 Scans dialogbox

1 In the Norton 360 main window, click PC Security,and then click Run Scans.

2 In the Scans window, under ComputerScans, clickCustom Scan.

167Scanning your computerAbout Computer Scan

Page 168: Help

3 Click Go.

4 In the Scans window, in the EditScan column, clickthe edit icon next to the scan that you want to edit.

5 In the EditScan window, on the ScanSchedule tab,change the schedule as required.Most of the frequency options include the additionaloptions that you can use to refine the schedule. Setthe additional options as required.

6 Click OK.

About Insight Network scanThe Insight Network scan uses the Cloud technologywherein a remote server on the Web contains the latestvirus definitions. Norton 360 scans your computer forthe latest security threats. When Norton 360 performsthe Insight Network scan, it uses the virus definitionsthat are available locally and in the Cloud. Norton 360provides additional protection by using the most recentdefinitions in the Cloud, apart from the definitions thatare available locally on your computer.

Norton 360 performs an Insight Network scan onlywhen the Insight Protection option is turned on. Bydefault, the Insight Protection option is turned on.You can see this InsightProtection option under Scansand Risks tab in the Antivirus settings window.

When the Insight Protection option is turned on,Norton 360 performs a traditional scan and an InsightNetwork scan simultaneously. The traditional scanuses the definitions from the local system, and theInsight Network scan uses the definitions that arehosted in the Cloud.

Threat detection based on the Cloud definitions isidentical to the threat detection that is based on thelocal definitions. However, the Cloud definitions arespecified with additional data about the threats that itdetects which indicates that it has been obtained fromthe Internet. Definitions in the Cloud provide a generic

Scanning your computerAbout Insight Network scan

168

Page 169: Help

name for the risk detected, but the local definitionsprovide the specific name for the risk detected. Forexample, if a Trojan horse is detected, the scan resultsof the Insight Network might display Cloud.Trojan.However, the scan results of the local definition mightdisplay Trojan.Foo.

If the traditional scan completes while the InsightNetwork scan is still running, you can view the InsightNetwork Scan progress status.

The Insight Network scan supports Quick Scan, InsightNetwork context-menu scan, Instant Messenger Scan,and Download Insight scan. It does not support EmailScan, Full System Scan, and Auto-Protect scan.

If the Insight Protection option is turned on, you canmanually run the following types of Insight Networkscans:

1 Insight Network Quick Scan

Norton 360 simultaneously performs a traditionalQuick Scan and an Insight Network Quick Scan toscan the areas of your computer that the virusesoften target. Norton 360 also performs an InsightNetwork Quick Scan simultaneously with an IdleQuick Scan.

w The Insight Network scan does not support a QuickScan that runs as a part of an Idle Full System Scan.

1 Insight Network context-menu scan

When you right-click a file, the shortcut menudisplays Norton 360 and then Insight NetworkScan. You can use this command to scan a file usingboth local definitions and definitions that arehosted in the Cloud.

w This Insight Network Scan command is availableonly for single file.

Turning off or turning on Insight ProtectionInsightProtection option lets Norton 360 perform anInsight Network scan on your computer

169Scanning your computerAbout Insight Network scan

Page 170: Help

When the Insight Protection option is turned on,Norton 360 performs a traditional scan and an InsightNetwork scan simultaneously. The traditional scanuses the definitions from the local system, and theInsight Network scan uses the definitions that arehosted in the Cloud. Norton 360 performs only atraditional scan if the Insight Protection option isturned off.

Norton 360 performs an Insight Network scan onlywhen the Insight Protection option is turned on. Bydefault, the Insight Protection option is turned on.

The Insight Network scan supports only InsightNetwork Quick Scan, and Insight Networkcontext-menu scan. Insight Network scan does notsupport a Quick Scan that runs as a part of an Idle FullSystem Scan. It also does not support Full System Scan,Email Scan, single file Office document scan, andAuto-Protect scan.

To turn off or turn on the Insight Protection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.

3 In the Antivirus settings window, click the Scansand Risks tab.

4 In the Insight Protection row, do one of thefollowing:

1 To turn off Insight Protection, move the On/Offswitch to the right to the Off position.

1 To turn on Insight Protection, move the On/Offswitch to the left to the On position.

5 In the Settings window, click Apply.

About Reputation ScanReputation Scan provides information on thetrust-worthiness of all programs and running processeson your computer. It helps you detect the files that are

Scanning your computerAbout Reputation Scan

170

Page 171: Help

suspicious or vulnerable on your computer using thereputation-based threat detection. Norton 360 lets yourun different types of Reputation Scan and detectsuspicious programs on your computer.

Reputation Scan filters the files on the basis of certainfiltering criteria and performs an Insight NetworkScan on the filtered files. Reputation Scan filters thefiles as reputation files. It filters .exe files, .scr files,.sys files, .dll files, .drv files, .ocx files, .loc files, and.msi files and analyzes these files.

When you perform a Reputation Quick Scan or FullSystem Scan, Norton 360 considers the Files of Interestthat are available on your computer.

After it has filtered the reputation files, Norton 360performs an InsightNetworkScan. When Norton 360performs an Insight Network Scan, it also performs aComputer Scan. Norton 360 uses the Computer Scanto perform the signature-based threat detection. Itcompares the signature of the filtered reputation filesagainst the known threat signatures to identify threatson your computer. If a security threat is detected,Norton 360 automatically removes the threat fromyour computer.

Norton 360 uses the Insight Network Scan to detectsuspicious or vulnerable files on your computer usingthe reputation-based threat detection. The InsightNetwork Scan uses the Cloud technology wherein aremote Symantec server on the Web stores the latestreputation information. It checks the Cloud for thereputation information on the filtered files.

Norton 360 obtains specific information such as filename and hash key about the filtered reputation filesand sends this information to the Cloud. The Cloudanalyzes the file information and provides a trust levelfor each file. The Symantec server sends back thereputation information to your computer. If any of thefiltered files is suspicious or vulnerable, Norton 360assigns Bad or Poor trust level. Apart from reputation

171Scanning your computerAbout Reputation Scan

Page 172: Help

information, Norton 360 also checks for the latest virusdefinitions on the Cloud.

w Your computer must be connected to the Internet toaccess the latest reputation information and virusdefinitions from the Cloud. If your computer is notconnected to the Internet, Norton 360 uses thereputation information that is available locally.

When you perform a Reputation Scan, Norton 360considers only the following categories of files:

This category includesWindows executable files(.exe) and script files (.scr).

Executable files

This category includesWindows System files (.sys),dynamic link library files(.dll), and device driver files(.drv).

System files

This category includesActiveX control files (.ocx).

Developer files

This category includesWindows Installer Packagefiles (.msi) and resource-onlyDLL files (.loc).

Miscellaneous files

Norton 360 lets you scan specific areas of yourcomputer based on the type of Reputation Scan that

Scanning your computerAbout Reputation Scan

172

Page 173: Help

you select. You can manually run the following typesof Reputation Scan:

Scans the important locationsof your computer that theviruses and other securitythreats often target.

When you perform a QuickScan, Norton 360 considersthe Files of Interest thatrelated to loaded programsand the running processes.

Quick Scan

Scans all the Files of Interestthat are available on yourcomputer.

When you perform a FullSystem Scan, Norton 360searches for Files of Intereston all the locations on yourcomputer. The locationsinclude all drives, runningprocesses, loaded programs,and startup files.

Full System Scan

Scans a specific file, folder,drive, or removable drive.

When you perform a customscan, Norton 360 considersonly the filtered reputationfiles.

Custom Scan

Symantec rates a file based on the statistical evaluationthat is done on the file using the Norton Community

173Scanning your computerAbout Reputation Scan

Page 174: Help

Watch data and Symantec’s analysis. Symantec assignsthe following confidence levels to reputation files:

Symantec has a highindication that the file istrusted.

Trusted

Symantec has a highindication that the file istrusted.

Good

Symantec does not haveenough information aboutthe file to assign a trust levelto the file.

The file is neither safe norunsafe.

Unproven

Symantec has a fewindications that the file is nottrusted.

This file is suspicious and canharm your computer.

Poor

Symantec has a highindication that the file is nottrusted.

This file is suspicious and canharm your computer.

Bad

When the Reputation Scan is complete, you can viewthe summary of the scan results in the NortonReputationScan window. You can view the reputationinformation such as the file name, trust level, age ofthe file, stability rating, and community usage for eachfile. The trust level determines whether a file is safeor unsafe. If a file has Poor or Bad trust level, Norton360 lets you quarantine the file.

Scanning your computerAbout Reputation Scan

174

Page 175: Help

Running a Reputation Full System ScanWhen you perform a Full System Scan, Norton 360scans all the Files of Interest that are available on yourcomputer. This fileset includes the files that relate tothe running processes, startup files, and loadedprograms.

To run a Reputation Full System Scan

1 In the Norton 360 main window, click PC Security,and then click Run Scans.

2 In the Scans window, under ReputationScan, clickFull System Scan.

3 Click Go.In the Reputation Scan window, you can analyzethe trust level, prevalence, resource usage, andstability of the scanned items.

4 If there is a file with Poor or Bad trust level, underthe TrustLevel column, click the red cross (x) icon.

5 In the Quarantine File window, click Quarantinethis file.

6 In the Manual Quarantine window, click Add.

7 Click Close.

8 In the NortonReputationScan window, click Close.

Running a Reputation Quick ScanWhen you perform a Quick Scan, Norton 360 scansonly the running processes and the loaded programs.Reputation Quick Scan does not scan your entirecomputer and it takes lesser time to run than aReputation Full System Scan.

To run a Reputation Quick Scan

1 In the Norton 360 main window, click PC Security,and then click Run Scans.

2 In the Scans window, under ReputationScan, clickQuick Scan.

175Scanning your computerAbout Reputation Scan

Page 176: Help

3 Click Go.In the Norton Reputation Scan window, you cananalyze the trust level, prevalence, resource usage,and stability of the scanned items.

4 If there is a file with Poor or Bad trust level, underthe TrustLevel column, click the red cross (x) icon.

5 In the Quarantine File window, click Quarantinethis file.

6 In the Manual Quarantine window, click Add.

7 Click Close.

8 In the NortonReputationScan window, click Close.

Running a Reputation custom scanNorton 360 lets you scan specific areas on yourcomputer by using the Reputation custom scan. Youcan scan any of your computer's drives, removabledrives, folders or files. For example, if you want tocheck the trust level of a specific file, you can scan theparticular file.

To run a Reputation custom scan

1 In the Norton 360 main window, click PC Security,and then click Run Scans.

2 In the Scans window, under ReputationScan, clickCustom Scan.

3 Click Go.

4 In the Reputation Custom Scan window, do one ofthe following:

1 Click Drive Scan, select the drive that you wantto scan, and then click Scan.

1 Click FolderScan, select the folder that you wantto scan, and then click OK.

1 Click File Scan, select the file that you want toscan, and then click Open.

In the Reputation Scan window, you can analyzethe trust level, prevalence, resource usage, andstability of the scanned items.

Scanning your computerAbout Reputation Scan

176

Page 177: Help

5 If there is a file with Poor or Bad trust level, underthe TrustLevel column, click the red cross (x) icon.

6 In the Quarantine File window, click Quarantinethis file.

7 In the Manual Quarantine window, click Add.

8 Click Close.

9 In the NortonReputationScan window, click Close.

About the Reputation Scan resultsNorton 360 lets you run different Reputation Scans todetect any suspicious programs or vulnerable programson your computer. Norton 360 lets you manually runthe following types of Reputation Scan:

1 Reputation Quick Scan

1 Reputation Full System Scan

1 Reputation custom scan

When you run a Reputation Quick Scan, Norton 360considers the Files of Interest which include runningprocesses and loaded programs. When you run aReputation Full System Scan, Norton 360 considers allthe Files of Interest that are available on yourcomputer. When you run a Reputation custom scan,Norton 360 lets you select the drive, folder, or file thatyou want to scan.

Reputation Scan filters the files on the basis of certainfiltering criteria and performs an Insight NetworkScan on the filtered files. Reputation Scan filters .exefiles, .scr files, .sys files, .dll files, .drv files, .ocx files,and .msi files and analyzes these files.

Norton 360 displays the reputation information of thescanned files in the NortonReputationScan window.

Norton 360 consolidates the reputation informationof your most recent scan and presents the reputationinformation using different graphical formats.

The top of the Norton Reputation Scan windowdisplays the following statistics:

177Scanning your computerAbout Reputation Scan

Page 178: Help

1 The Trust Level graph displays the average trustlevel of files on your computer. It also displays theaverage trust level of the files that Symantecanalyzes within the Norton Community.

1 The Prevalence graph displays the average highuser prevalence of files on your computer. It alsodisplays the average high user prevalence of thefiles that Symantec analyzes within the NortonCommunity.

1 The Stability graph displays the average reliablefiles on your computer. It also displays the averagereliable files that Symantec analyzes within theNorton Community.

w Stability ratings vary depending upon youroperating system.

1 The Norton Network graph displays the detailsabout the known good files and bad files.

You can view the number of trusted files that areon your computer. You can also view the totalnumber of files that Symantec analyzes within theNorton Community.

w Your computer must be connected to the Internet toview these details. Norton 360 connects to theSymantec servers to collect the reputation information.

The bottom of the Norton Reputation Scan windowdisplays the reputation information of each scanneditem. For each scanned item, you can view the followingdetails:

Indicates the file name andfile type.

You can click a file name toview additional details aboutthe file in the File Insightwindow.

File Name

Scanning your computerAbout Reputation Scan

178

Page 179: Help

Indicates the trust level thatis assigned to a file.

Symantec analyzes specificinformation about a file suchas the digital signature andthe hash value to determinethe trust level of a file.Symantec rates a file basedon the statistical evaluationthat is done on the file usingtheNortonCommunityWatchdata and Symantec’sanalysis.

Symantec assigns thefollowing trust levels toreputation files:

1 Trusted: Symantec has ahigh indication that thefile is trusted.

1 Good: Symantec has ahigh indication that thefile is trusted.

1 Unproven: Symantecdoesnot have enoughinformation about the fileto assign a trust level tothe file.

1 Poor: Symantec has a fewindications that the file isnot trusted.

1 Bad: Symantec has a highindication that the file isnot trusted.

If you have a file that hasPoor or Bad trust level,Norton 360 displays a redcross (x) icon next to the trustlevel. You can click on the redcross (x) icon and quarantinethe suspicious file.

Trust Level

179Scanning your computerAbout Reputation Scan

Page 180: Help

Indicates the communityusage level of the file.

The search results aregrouped in to the followingcategories:

1 Very Few Users: Showsthe files that have verylow user prevalence.

1 Few Users: Shows thefiles that have averageuser prevalence.

1 Many Users: Shows thefiles that have very highuser prevalence.

You can also use thecommunity usage of a file todetermine the legitimacy ofthe file. Symantec uses astringent statistical methodto evaluate thetrustworthiness of a file andto classify the file as a Goodfile.

Prevalence

Scanning your computerAbout Reputation Scan

180

Page 181: Help

Indicates the system resourceusage level of the file.

The usage levels are asfollows:

1 Low: Indicates that thefile consumes minimumsystem resources.

1 Moderate: Indicates thatthe file consumesmoderate systemresources.

1 High: Indicates that thefile consumes maximumsystem resources.

1 Unknown: Indicates thatthe file has performed noaction in your computer.

Resource Usage

181Scanning your computerAbout Reputation Scan

Page 182: Help

Indicates the stability ratingof the file.

The stability rating dependson how frequently theprogram crashes. Thedifferent stability ratings areas follows:

1 Reliable: Indicates thatthe program is reliable.

1 Stable: Indicates that theprogram is comparativelystable. However, itcrashes sometimes.

1 Slightly Unstable:Indicates that theprogram is slightlyunstable.

1 Unstable: Indicates thatthe program is unstable.

1 Very Unstable: Indicatesthat the programfrequently crashes.

1 Unknown: Indicates thatthe crash history of theprogram is not known.

w Stability ratings varydepending upon youroperating system.

Stability

About Scan Facebook WallNorton Safe Web protects your computer while youuse Facebook. It scans each URL that is available onyour Facebook Wall and displays the Norton ratingicons for the scanned URLs.

You can also check if a URL is safe or unsafe and thenshare the URL with your friends on Facebook. NortonSafe Web scans the URL that you post on Facebook and

Scanning your computerAbout Scan Facebook Wall

182

Page 183: Help

gives you the safety status for the URL. This way, youare not only protected from unsafe sites but you alsolet other Facebook users know the security status ofany Web site.

However, Norton Safe Web requires your permissionto scan the URLs that are available on your FacebookWall. When you log in to Facebook, Norton Safe Webasks for your permission to access your Facebook Wall.You can choose to allow or deny permission to letNorton Safe Web access your Facebook Wall.

The auto-scan feature in Norton Safe Web applicationpage helps you protect your Facebook Wall. NortonSafe Web scans the News Feed on your Facebook Wallperiodically and protects you from malicious links.When Norton Safe Web detects a malicious link, itnotifies you with a post on your Facebook Wall. Toactivate Norton Auto-Scan, go to your NortonSafeWebpage on Facebook and click Enable Auto-Scan.

To remove the malicious link from your Facebook Wall,go to your profile and remove the malicious link. Ifyour friend has posted the malicious link, you can usethe WARN YOUR FRIENDS option in the message toalert your Facebook friend. You can also click SeeNorton Safe Web Report to view Norton ratings andother details about this malicious link. When nomalicious activity is detected on your Facebook Wall,Norton Safe Web posts a message notifying that yourFacebook Wall is safe. Norton Safe Web posts thismessage on your Facebook Wall once in every 30 days.

If you later decide to remove Norton Safe Web fromyour Facebook profile, you can use the ApplicationSettings option of Facebook.

183Scanning your computerAbout Scan Facebook Wall

Page 184: Help

The following are the safety states that Norton SafeWeb provides after it scans the links on your FacebookWall:

Indicates that the site is safe tovisit and Norton Trusted.

The sites with this rating do notharm your computer and so youcan visit this site.

Safe

Indicates that the site hassecurity risks.

The sites with this rating mayinstall malicious software onyour computer. Symantecrecommends that you do notvisit this site.

Warning

Indicates that Norton Safe Webhas not yet tested this site andit does not have sufficientinformation about this site.

Untested

Indicates that the site may havesecurity threats. Symantecrecommends you to be cautiouswhile you visit such Web sites.

Caution

Scanning your Facebook WallThe Norton Safe Web feature scans your Facebook Walland analyzes the security levels of all the availablelinks on your Facebook Wall. It then displays thesecurity status of the scanned URLs. However, NortonSafe Web requires your permission to scan yourFacebook Wall.

Scanning your computerAbout Scan Facebook Wall

184

Page 185: Help

To scan your Facebook Wall

1 In the Norton 360 main window, click PC Security,and then click Run Scans.

2 In the Scans window, under Scan Facebook Wall,click Scan Facebook Wall.

3 Click Go.

4 In the Facebook login Web page, log in to yourFacebook profile.

5 In the Request for permission page, click Allow.

6 In the Web page that appears, click Pleasegrantuspermission to access your News Feed and Wall.

7 Follow the on-screen instructions to let Norton SafeWeb access your Facebook Wall.

About SONAR ProtectionSymantec Online Network for Advanced Response(SONAR) provides real-time protection against threatsand proactively detects unknown security risks on yourcomputer. SONAR identifies emerging threats basedon the behavior of applications. SONAR identifiesthreats quicker than the traditional signature-basedthreat detection techniques. SONAR detects andprotects you against malicious code even before virusdefinitions are available through LiveUpdate.

SONAR monitors your computer for malicious activitiesthrough heuristic detections.

SONAR automatically blocks and removeshigh-certainty threats. Norton 360 notifies you whenhigh-certainty threats are detected and removed.SONAR provides you the greatest control whenlow-certainty threats are detected. You can alsosuppress the SONAR notifications by disabling theShow SONAR Block Notifications option.

The ViewDetails link in the notification alert lets youview the summary of the resolved high-certaintythreats. You can also view the details under Resolved

185Scanning your computerAbout SONAR Protection

Page 186: Help

Security Risks category in the Security Historywindow.

Turning off or turning on SONAR ProtectionSONAR protects you against malicious code even beforevirus definitions are available through LiveUpdate. Bydefault, SONAR Protection is turned on to proactivelydetect unknown security risks on your computer.

When you turn off SONAR Protection, you areprompted with a protection alert. This protection alertlets you specify the amount of time for which you wantSONAR Protection to be turned off.

w When Auto-Protect is turned off, SONAR Protection isalso disabled. In this case, your computer is notprotected against emerging threats.

To turn off or turn on SONAR Protection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.

3 On the AutomaticProtection tab, under RealTimeProtection, in the SONAR Protection row, do oneof the following:

1 To turn off SONAR Protection, move the On/Offswitch to the right to the Off position.

1 To turn on SONAR Protection, move the On/Offswitch to the left to the On position.

4 In the Settings window, click Apply.

About Real Time ExclusionsSymantec Online Network for Advanced Response(SONAR) provides real-time protection against threatsand proactively detects unknown security risks on yourcomputer. SONAR identifies emerging threats basedon the behavior of applications. SONAR identifiesthreats quickly compared to the traditionalsignature-based threat detection techniques. SONAR

Scanning your computerAbout SONAR Protection

186

Page 187: Help

detects and protects you from malicious programs evenbefore virus definitions are available throughLiveUpdate.

SONAR monitors your computer for malicious activitiesusing heuristic detections. It automatically blocks andremoves high-certainty threats. Norton 360 notifiesyou when high-certainty threats are detected andremoved.

However, you can configure Norton 360 to excludecertain programs from the Norton 360 Auto-Protectscans and SONAR scans. You should exclude programsonly if you are confident that they are not infected.You can exclude the programs from the Auto-Protectscans and SONAR scans by adding them to the RealTimeExclusions window. When you add a program tothe RealTimeExclusions window, Norton 360 ignoresthe file when it performs Auto-Protect scan and SONARscan. This option also excludes subfolders within afolder.

w Exclude a program from Norton 360 scans only if youare confident that the program is safe. For example, ifanother program relies on a security risk program tofunction, you might decide to keep the program onyour computer.

To add programs to the RealTimeExclusions window,go to the Norton 360 main window, and then clickSettings > Antivirus > Scans and Risks > Items toExclude from Auto-Protect, SONAR and DownloadIntelligence Detection > Configure.

Excluding security threats from scanning

You can use Scan Exclusions window and Real TimeExclusions window to exclude viruses and otherhigh-risk security threats from scanning.

To exclude high-risk security threats from scanning

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.

187Scanning your computerAbout SONAR Protection

Page 188: Help

3 In the Antivirus settings window, click the Scansand Risks tab.

4 Under Exclusions / Low Risks, do one of thefollowing:

1 In the Items to Exclude from Scans row, clickConfigure.

1 In the Items to Exclude from Auto-Protect,SONAR and Download Intelligence Detectionrow, click Configure.

5 In the window that appears, click Add.

6 In the Add Item dialog box, click the browse icon.

7 In the dialog box that appears, select the item thatyou want to exclude from the scan.

8 Click OK.

9 In the Add Item dialog box, click OK.

10 In the window that appears, click Apply, and thenclick OK.

About Signature ExclusionsNorton 360 lets you select specific known security risksand exclude them from Norton 360 scans. Exclude arisk from Norton 360 scans only if you have a specificneed. For example, if another program relies on asecurity risk program to function, you might decide tokeep the program on your computer. You might alsodecide not to be notified about the program in futurescans.

w When you exclude a known security risk from Norton360 scans, the protection level of your computerreduces. You should exclude items only if you areconfident that they are not infected.

To exclude a security risk from scans, you need to addthe specific security risk to the Signature Exclusionswindow. The Signature Exclusions window containsthe list of all security risks that can be excluded fromNorton 360 scans. For each security risk, you can view

Scanning your computerAbout SONAR Protection

188

Page 189: Help

the risk details and the effect of the risk on yourcomputer.

To add security risks to the Signature Exclusionswindow, go to the Norton 360 main window, and thenclick Settings > Antivirus > Scans and Risks >Exclusions / Low Risks > Signatures to Exclude fromAll Detections > Configure.

Adding items to the Signature Exclusions

To exclude a security risk from scans, you must addthe specific security risk to the Signature Exclusionswindow. You can select a known risk by name and addit to the list.

w When you exclude a known security risk from Norton360 scans, the protection level of your computerreduces. You should exclude items only if you areconfident that they are not infected.

To add a signature to the Signature Exclusions

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.

3 In the Antivirus settings window, click the Scansand Risks tab.

4 Under Exclusions /LowRisks, in the Signatures toExclude from All Detections row, click Configure.

5 In the Signature Exclusions window, click Add.

6 In the Security Risks window, click on a securityrisk that you want to exclude and then click Add.

7 In the Signature Exclusions window, click Apply,and then click OK.

8 In the Settings window, click Close.

About scanning Office documentsNorton 360 protects all Office documents that youreceive through email messages, through Internet

189Scanning your computerAbout scanning Office documents

Page 190: Help

download, and through inserted floppy disks or otherremovable media. By automatically scanning all Officefiles, Norton 360 maintains a higher level of security.Norton 360 scans the Office document when you openthem.

You can use the Microsoft Office Automatic Scanoption in the Settings window to scan documents ofthe following Microsoft Office applications:

Microsoft Wordwinword.exe

Microsoft Excelexcel.exe

Microsoft PowerPointpowerpnt.exe

Microsoft Visiovisio.exe

Microsoft Accessmsaccess.exe

Microsoft Projectwinproj.exe

Norton 360 scans the Office documents and protectagainst threats, including virus macros and infectedembedded objects.

By default, Microsoft Office Automatic Scan option,under Computer Scans, in the Antivirus settingswindow is turned off. Turn on this option to scanMicrosoft Office files automatically.

Turning on or turning off Microsoft Office AutomaticScan

Norton 360 maintains a higher level of security byautomatically scanning all Office files. You can turnon the Microsoft Office Automatic Scan option toprotect your computer against the virus macros andembedded objects.

Scanning your computerAbout scanning Office documents

190

Page 191: Help

To Turn on or turn off Microsoft Office Automatic Scan

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.

3 In the Antivirus settings window, click the Scansand Risks tab.

4 In the MicrosoftOfficeAutomaticScan row, do oneof the following:

1 To turn on Microsoft Office Automatic Scan,move the On/Off switch to the left to the Onposition.

1 To turn off Microsoft Office Automatic Scan,move the On/Off switch to the right to the Offposition.

5 In the Settings window, click Apply, and then clickClose.

About Silent ModeNorton 360 provides many solutions and features tohandle viruses and other security threats. Norton 360displays alerts and notifications to inform you howviruses and other security threats are detected andresolved. When you perform important tasks on yourcomputer, you likely prefer not to receive any alertmessages. Norton 360 suppresses alerts andnotifications and temporarily suspends most of thebackground activities based on the Silent ModeSettings that are turned on.

Norton 360 provides the following options under SilentMode Settings:

Norton 360 allows you tomanually turn on for a specifiedduration using Silent Modeoption.

Silent Mode

191Scanning your computerAbout Silent Mode

Page 192: Help

Norton 360 turns on this optionautomatically when it detects afull-screen application and turnsoff when you stop using thefull-screen application.

Full Screen Detection

Norton 360 turns on this optionautomatically when it detects adisk burning task or a MediaCenter TV recording task. Norton360 also turns on Quiet Modeautomatically when you run aprogram that you included in theQuiet Mode Programs list.Norton 360 turns off Quiet Modewhen the disk burning sessionor TV program recording sessionis complete. Norton 360 alsoturns off Quiet Mode when itstops detecting runninginstances of the programs thatyou included in the Quiet ModePrograms list.

Quiet Mode

The Norton 360 icon displays the turn-on status ofSilent Mode in the notification area, at the far right ofthe taskbar. The icon changes to a crescent-patternedicon when Silent Mode is turned on. Norton 360 alsonotifies you after Silent Mode is turned off.

You can view the summary of the Silent Mode sessionsunder the Recent History, Full History, and SilentMode categories in the drop-down list of the Showoption in the Security History window.

The summary includes the following information:

1 The turn-on or turn-off status of Silent Mode

1 Usage of Silent Mode Settings, such as Silent Modeor Quiet Mode

1 The type of program that turns on Silent Mode,such as disk burning or TV recording

Scanning your computerAbout Silent Mode

192

Page 193: Help

1 The name of a user-specified program that turnson Silent Mode

1 The time and date when Silent Mode is turned onor turned off

1 The severity displays the risk level of the selecteditem

About the Silent Mode that you turn on manuallyNorton 360 lets you manually turn on Silent Mode fora specified duration. When Silent Mode is turned on,Norton 360 suppresses alerts and suspends backgroundactivities for the duration that you specify. You canverify the turn-on status of Silent Mode in thenotification area, at the far right of the taskbar. TheNorton 360 icon in the notification area changes to acrescent-patterned icon to display the turn-on statusof Silent Mode. Turning on Silent Mode manuallybefore you perform your tasks helps you prevent alerts,notifications, or background activities interruptingyou for the specified duration.

You can turn on Silent Mode for a period of one hour,two hours, four hours, six hours, or one day. After thespecified duration, Norton 360 turns off Silent Mode.You can also manually turn off Silent Mode at any time.Norton 360 notifies you after Silent Mode is turned off.The activities that are suspended when Silent Mode isturned on, run after Silent Mode is turned off.

Turning on or turning off Silent Mode manually

You can manually turn on Silent Mode for a specifiedduration before you perform any important task onyour computer. You can turn on Silent Mode for aperiod of one hour, two hours, four hours, six hours,or one day. The Norton 360 icon displays the turn-onstatus of Silent Mode in the notification area, at thefar right of the taskbar. Norton 360 notifies you afterSilent Mode is turned off. After Silent Mode is turnedoff, Norton 360 also displays alerts if it detected any

193Scanning your computerAbout Silent Mode

Page 194: Help

security activities that occurred during the Silent Modesession.

You can turn on or turn off Silent Mode from theAdministrative Settings window, Quick Controls inthe Settings window, or from the Norton Taskswindow. You can also turn on or turn off Silent Modeby using the Norton 360 icon in the notification area.

To turn onSilentMode from theAdministrative Settingswindow

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Silent Mode Settings, in the Silent Moderow, move the On/Off switch to the left to the Onposition.

4 In the Settings window, click Apply.

5 In the TurnonSilentMode dialog box, in the Selectthe duration drop-down list, select how long youwant to turn on Silent Mode, and then click OK.

6 Click Close.

To turn off SilentMode from theAdministrative Settingswindow

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Silent Mode Settings, in the Silent Moderow, move the On/Off switch to the right to the Offposition.

4 In the Settings window, click Apply.

5 Click Close.

To turn on Silent Mode from the Norton Tasks window

1 In the Norton 360 main window, click Performance.

2 In the Performance window, click Norton Tasks.

3 In the Norton Tasks window, under Silent Mode,move the On/Off switch to the left to the Onposition.

Scanning your computerAbout Silent Mode

194

Page 195: Help

4 In the TurnonSilentMode dialog box, in the Selectthe duration drop-down list, select how long youwant to turn on Silent Mode, and then click OK.

5 Click Close in the Norton Tasks window.

To turn off Silent Mode from the Norton Tasks window

1 In the Norton 360 main window, click Performance.

2 In the Performance window, click Norton Tasks.

3 In the Norton Tasks window, under Silent Mode,move the On/Off switch to the right to the Offposition.

4 Click Close in the Norton Tasks window.

To turn on Silent Mode from the notification area

1 In the notification area on the Windows taskbar,right-click the Norton 360 icon, and then click Turnon Silent Mode.

2 In the TurnonSilentMode dialog box, in the Selectthe duration drop-down list, select how long youwant to turn on Silent Mode, and then click OK.

To turn off Silent Mode from the notification area

4 In the notification area on the Windows taskbar,right-click the Norton 360 icon, and then click Turnoff Silent Mode.

To turn off or turn on Silent Mode from Quick Controls

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Quick Controls, doone of the following:

1 To turn off Silent Mode, uncheck Silent Mode.

1 To turn on Silent Mode, check SilentMode, andselect the duration for which you want SilentMode to be turned on from the Turn on SilentMode dialog box, and click OK.

About the Silent Mode that turns on automaticallyWhen you watch a movie, play games, or make apresentation, you run the application in the full-screen

195Scanning your computerAbout Silent Mode

Page 196: Help

mode. Norton 360 detects the application that you runin the full-screen mode and automatically enablesSilent Mode. When Silent Mode is enabled, Norton 360suppresses most of the alerts and suspends backgroundactivities. Only those activities run that are involvedin protecting your computer from viruses and othersecurity threats. Minimum background activities alsoensure high performance of your computer. Theactivities that are suspended run after you finish usingthe application in the full-screen mode.

Silent Mode also helps you maintain an uninterruptedMedia Center Extender session. A Media CenterExtender session is an extended session of Media Centerto an entertainment device, such as a television. Thealerts and notifications that appear during a MediaCenter Extender session disconnect the session betweenthe host computer and the entertainment device.Norton 360 identifies a Media Center Extender sessionas an active full-screen application and turns on SilentMode. When Silent Mode is enabled, Norton 360suppresses alerts and notifications and suspendsbackground activities to provide uninterrupted sessionsfor Silent Mode options such as Full Screen Detectionor Media Center applications.

Turning off or turning on Full Screen Detection

You can use the Full Screen Detection option in theSettings window to turn on or turn off Silent Modeautomatically when Norton 360 detects a full-screenapplication. By default, the Full Screen Detectionoption remains turned on after you install Norton 360.

To turn off Full Screen Detection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Full ScreenDetection row, move the On/Offswitch to the right to the Off position.

4 In the Settings window, click Apply.

Scanning your computerAbout Silent Mode

196

Page 197: Help

5 Click Close.

To turn on Full Screen Detection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Full ScreenDetection row, move the On/Offswitch to the left to the On position.

4 In the Settings window, click Apply.

5 Click Close.

About Quiet ModeNorton 360 automatically enables Quiet Mode whenyou perform tasks that require higher utilization ofyour system resources. When Quiet Mode is turned on,Norton 360 suspends the background activities andlets the task use the maximum resources for betterperformance.

You can choose to set Norton 360 to automaticallyenable Quiet Mode when you do the following tasks:

1 IMAPI 2.0 Disk Burn

1 Media Center TV Recording

1 User-Specified Programs

197Scanning your computerAbout Silent Mode

Page 198: Help

The following table explains about the various options:

When you use a Media Centerapplication to burn a CD or aDVD, Norton 360 automaticallyenables Quiet Mode, if the IMAPI2.0 Disk Burn option is turnedon. By default, the IMAPI 2.0Disk Burn option is turned on.When Quiet Mode is enabled,Norton 360 suspendsbackground activities to improvethe performance of yourdisk-burning session. However,Norton 360 continues to displayalerts and notifications duringthe session.

Norton 360 supports thefollowing Media Centerdisk-burner applications to turnon Quiet Mode:1 IMAPI 2.0

1 J. River MEDIA CENTER(version 13.0.125 and later)

Norton 360 turns on Quiet Modeas soon as you start burning aCD or a DVD using a MediaCenter application. Norton 360turns off Quiet Mode after thedisk-burning session iscomplete. You cannot turn offQuiet Mode during thedisk-burning session by turningoff the IMAPI 2.0 Disk Burnoption in the Settings window.

IMAPI 2.0 Disk Burn

Scanning your computerAbout Silent Mode

198

Page 199: Help

When you use a Media Centerapplication to record a TVprogram, Norton 360automatically enables QuietMode, if the Media Center TVRecording option is turned on.By default, theMedia Center TVRecording option is turned on.When Quiet Mode is enabled,Norton 360 suspendsbackground activities to improvethe performance of your TVprogram recording session.However, Norton 360 continuesto display alerts andnotifications during the session.

Norton 360 supports thefollowing Media Centerapplications to turn on QuietMode:1 Windows Media Center

For Windows Media Centerto enable Quiet Mode duringTV program session, youmight need to restart yourcomputer after you installNorton 360.

1 J. River MEDIA CENTER(version 13.0.125 and later)

Norton 360 turns on Quiet Modeas soon as you start recording aTV program. After Quiet Mode isturned on, it turns off after therecording session is complete.You cannot turn off Quiet Modeduring the TV program recordingsession by turning off theMediaCenter TV Recording option inthe Settings window.

Media Center TVRecording

199Scanning your computerAbout Silent Mode

Page 200: Help

Norton 360 automatically turnson Quiet Mode when it detects aTV program recording session ora disk-burning session. Inaddition, you can manually addthe programs for which you wantNorton 360 to turn on QuietMode to the Quiet ModePrograms list. When Norton 360detects a running instance of aprogram that you added in thelist, it automatically turns onQuiet Mode. When Quiet Modeis turned on, Norton 360suspends the backgroundactivities but does not suppressalerts and notifications.

You can also add or remove arunning program to the QuietMode Programs list.

User-Specified Programs

Turning off or turning on the Quiet Mode options

You can turn off or turn on the Quiet Mode options,such as IMAPI 2.0 Disk Burn and Media Center TVRecording in the Settings window. By default, the QuietMode options are turned on. If you perform a task foran option that you turned on, Norton 360 detects thetask and automatically turns on Silent Mode. Forexample, you turn on the IMAPI2.0DiskBurn optionand start burning a disk using a Media Centerapplication. In this case, Norton 360 detects thedisk-burning session and turns on Quiet Mode.

Norton 360 turns on Quiet Mode as soon as you startrecording a TV program or burning a CD or a DVD.Once Quiet Mode is turned on, it turns off only afterthe TV program recording session or disk-burningsession is complete. You cannot turn off Quiet Modeduring the sessions by using the options in the Settingswindow.

Scanning your computerAbout Silent Mode

200

Page 201: Help

To turn off or turn on IMAPI 2.0 Disk Burn

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Silent Mode Settings, under Quiet Mode onDetection of, do one of the following:

1 To turn off detection of a disk burning session,in the IMAPI 2.0 Disk Burn row, move theOn/Off switch to the right to the Off position.

1 To turn on detection of a disk burning session,in the IMAPI 2.0 Disk Burn row, move theOn/Off switch to the left to the On position.

4 In the Settings window, click Apply.

5 Click Close.

To turn off or turn on Media Center TV Recording

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Silent Mode Settings, under Quiet Mode onDetection of, do one of the following:

1 To turn off detection of a TV program recordingsession, in the MediaCenterTVRecording row,move the On/Off switch to the right to the Offposition.

1 To turn on detection of a TV program recordingsession, in the MediaCenterTVRecording row,move the On/Off switch to the left to the Onposition.

4 In the Settings window, click Apply.

5 Click Close.

About User-Specified Programs

Norton 360 automatically turns on Quiet Mode whenit detects a TV program recording session or adisk-burning session. In addition, you can manuallyadd the programs for which you want Norton 360 to

201Scanning your computerAbout Silent Mode

Page 202: Help

turn on Quiet Mode to the Quiet Mode Programs list.When Norton 360 detects a running instance of aprogram that you added in the list, it automaticallyturns on Quiet Mode. When Quiet Mode is turned on,Norton 360 suspends the background activities butdoes not suppress alerts and notifications.

You can also add a running program to the Quiet ModePrograms list. However, when you add a runningprogram, Norton 360 does not detect the currentrunning instance of the program to turn on Quiet Mode.Norton 360 turns on Quiet Mode the next time whenyou execute the program.

You can also remove a running program from the QuietMode Programs list. However, if Quiet Mode is turnedon, it turns off only after the running instances of allthe programs in the list are complete. You cannot turnoff Quiet Mode by removing a program from the listwhen it runs.

You can view the details of the programs that you addto the Quiet Mode Programs list or remove from thelist in the Security History window.

Adding programs to User-Specified Programs

You can manually add the programs for which you wantNorton 360 to turn on Quiet Mode to the Quiet ModePrograms list. When you execute the program that youadded to the list, Norton 360 detects the program andturns on Quiet Mode.

You can also add a running program to the QuietModePrograms list. However, when you add a runningprogram, Norton 360 does not detect the currentrunning instance of the program to turn on Quiet Mode.Norton 360 turns on Quiet Mode the next time whenyou execute the program.

You can only add the programs that have .exe fileextension to the Quiet Mode Programs list.

Scanning your computerAbout Silent Mode

202

Page 203: Help

To add a program

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Silent Mode Settings, under Quiet Mode onDetectionof, in the User-SpecifiedPrograms row,click Configure.

4 In the Quiet Mode Programs window, click Add.

5 In the Add Program dialog box, navigate to thelocation of the file that you want to add to the QuietMode Programs list.

6 Select the file, and then click Open.

7 In the Quiet Mode Programs window, click OK.

Removing programs from User-SpecifiedPrograms

You can remove a program from the Quiet ModePrograms list. After you remove a program, Norton360 does not turn on Quiet Mode the next time whenit detects a running instance of the program.

You can also remove a running program from the QuietModePrograms list. However, if Quiet Mode is turnedon, it turns off only after the running instances of allthe programs in the list are complete. You cannot turnoff Quiet Mode by removing a program from the listwhen it runs.

To remove a program

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Silent Mode Settings section, under QuietMode on Detection of, in the User-SpecifiedPrograms row, click Configure.

4 In the Quiet Mode Programs window, select theprogram that you want to delete, and then clickRemove.

203Scanning your computerAbout Silent Mode

Page 204: Help

5 In the confirmation dialog box, click Yes.

6 In the Quiet Mode Programs window, click Applyand then click OK.

About boot time protectionThe boot time protection feature provides enhancedsecurity level from the time you start your computer.It ensures better security by running all the necessarycomponents that are required for computer protectionas soon as you start your computer.

To protect your computer during boot time, you mustconfigure the Boot Time Protection option. To accessthe BootTimeProtection option, go to the Norton 360main window, and then click Settings > Antivirus >Automatic Protection.

You can use the following options to configure BootTime Protection:

1 AggressiveProvides maximum protection during yourcomputer start time.

This option ensures complete protection during theboot time as Auto-Protect starts functioning as soonas you start your computer.

1 NormalProvides enhanced protection during your computerstart time without compromising your computer'sboot performance.

When you select this option, the drivers andplug-ins start functioning during the computer starttime before their specified time delay. This optionensures better boot performance along with goodsecurity levels.

1 OffTurns off boot time protection.

If you turn off the Boot Time Protection option,the protection level of your computer reduces.

Scanning your computerAbout boot time protection

204

Page 205: Help

Configuring boot time protectionThe boot time protection feature provides enhancedsecurity level from the time you start your computer.As soon as you start your computer, Norton 360 startsAuto-Protect and all required drivers and plug-ins startfunctioning. This feature ensures higher level ofsecurity from the moment you turn on your computer.

To configure boot time protection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.

3 In the BootTimeProtection row, click on one of thesettings. Your options are:

1 Aggressive

1 Normal

1 Off

4 Click Apply, and then click Close.

Running a scan at the command promptYou can scan with Norton 360 from the commandprompt without opening the Norton 360 main window.You type the path and name of the file that you wantto scan or customize the scan by adding a specificcommand. The following commands are available:

NAVW32 launches helpand terminates.

/?

Scans all drives/A

Scans the local drives/L

Enables (+) or disables(-) subfolders scanning

/S[+|-]

205Scanning your computerRunning a scan at the command prompt

Page 206: Help

Enables (+) or disables(-) boot recordscanning and masterboot record scanning(for example, NAVW32C: /B+ or NAVW32 C:/B-)

/B[+|-]

Scans only the bootrecords

/BOOT

Runs a Quick Scan/QUICK

Enables (+) or disables(-) a Quick Scan

/SE[+|-]

Enables (+) or disables(-) scanning of stealthitems

/ST[+|-]

Scans the files thatmatches specified wildcard

[folder_path]\*[?]

Scans the specifieddrive, folder, or file

[drive|folder|file]

Performs Quick Scan inthe background.

w Norton 360displays the scanswindow only when athreat is detected.

/SESCAN

Scanning your computerRunning a scan at the command prompt

206

Page 207: Help

To run a scan from the command prompt

1 At the command prompt, type the path in whichNorton 360 is located and the executable's file name.The following examples show the syntax of a scancommand:

1 "\Program Files\Norton360\Engine\version\NAVW32"/command_name

Where version represents the version numberof Norton 360 and command_name representsthe command.

1 "\Program Files\Norton360\Engine\version\NAVW32"[path]file_name

Where version represents the version numberof Norton 360 and [path] file_name representsthe location, name, and extension of the file.

2 Press Enter.

207Scanning your computerRunning a scan at the command prompt

Page 208: Help

Scanning your computerRunning a scan at the command prompt

208

Page 209: Help

This chapter includes the following topics:

1 What to do if a security risk is found

What to do if a security risk is foundYour product provides many solutions and features forhandling viruses and other security threats that itdetects.

When Norton 360 detects a security risk on yourcomputer, you must take appropriate action on therisk. Norton 360 notifies you when it detects a securityrisk. You can view details about the risk in the windowthat appears and select an action that you want Norton360 to perform on the risk.

By default, Norton 360 removes the security risk fromyour computer and quarantines it. However, you canrestore the file from the Quarantine to its originallocation and exclude it from future scans.

w Exclude a program from Norton 360 scans only if youare confident that the program is safe. For example, ifanother program relies on a security risk program tofunction, you might decide to keep the program onyour computer.

In some cases, Norton 360 requires your attention tomanually resolve the detected security risk. You canaccess the Symantec Security Response Web site andrefer the manual removal instructions.

5Responding tosecurity issues

Page 210: Help

In some cases, Norton 360 might not identify an itemas a security threat, but you might suspect that theitem is infected. In such cases, you can submit the itemto Symantec for further analysis.

In addition, your product provides solutions forsecurity risks, such as spyware and adware.

About detecting viruses, spyware, and other risksViruses and other security threats can be detectedduring a manual or customized scan. Auto-Protectdetects these threats when you perform an action withan infected file. Threats can also appear during aninstant messenger session, when you send an emailmessage, or during a manual or customized scan.

Security risks, such as spyware and adware, can alsobe detected when these activities are performed.

The files that can potentially infect your system whenyour computer first starts up are scanned first.

These files include the following:

1 Files that are associated with the processes that arecurrently running in memory

1 Files with startup folder entries

1 Files with system start INI file entries

1 Files with system start batch file entries

1 Files that the system start registry keys refers

If an infected file is detected during this portion of themanual scan, it is repaired or removed. Anyunnecessary references are also removed from yourcomputer. Before attempting to repair, quarantine, ordelete any infected file that has a process running inmemory, your product attempts to terminate theprocess. You are alerted and prompted to close allunnecessary programs before the process is terminated.

You can view information about detected viruses andother security threats in Security History.

Responding to security issuesWhat to do if a security risk is found

210

Page 211: Help

Security History also includes information aboutspyware, adware, and other security risks.

Reviewing Auto-Protect notificationsAuto-Protect scans files for viruses, worms, and Trojanhorses when you perform an action with them, suchas moving them, copying them, or opening them.

It also scans for spyware, adware, and other securityrisks.

If Auto-Protect detects suspicious activity, it logs anotification in Security History that tells you that arisk was found and resolved.

If Auto-Protect detect one or more viruses it eitherrepairs or deletes the viruses and notifies you. Thenotification provides information on which file wasrepaired or deleted and which virus, Trojan horse, orworm infected the file. No further action is necessary.

To review Auto-Protect notifications

1 In the Norton 360 main window, click Tasks.

2 In the Tasks window, under General Tasks, clickCheck Security History.

211Responding to security issuesWhat to do if a security risk is found

Page 212: Help

3 In the Show drop-down list, select the category forwhich you want to review Auto-Protect alerts.Your options are:

Review Auto-Protectnotifications that youreceived in the last sevendays.

Recent History

Review all of theAuto-Protect notificationsthat you have received.

Full History

Review all of the resolvedsecurity threats.

The Resolved SecurityRisks category includesthe infected files thatNorton 360 repairs,removes, or quarantines.

Resolved Security Risks

Review the list ofunresolved security risks.

The Unresolved SecurityRisks category includesthe infected files forwhich Norton 360 wasnot able to take anyaction. This categorymostly includes thelow-level risks thatrequire your attention fora suitable action.

Unresolved Security Risks

Responding to security issuesWhat to do if a security risk is found

212

Page 213: Help

4 In the right pane, click the Options link.The option name appears as Restore & Options forfew items.If one or more security risks such as spyware arefound, you can take action on these items, ifrequired.

213Responding to security issuesWhat to do if a security risk is found

Page 214: Help

5 In the Threat Detected window, select theappropriate action on the risk.The following are some of the options that areavailable in the Threat Detected window:

Returns the selectedQuarantine item to its

Restore & Exclude this file

original location andexcludes the item frombeing detected in thefuture scans.

This option is availablefor the detected viral andnon-viral threats.

Excludes the security riskfrom future scan.

Exclude this program

Norton 360 adds thesecurity risk to theappropriate exclusionslist.

Lets you resolve the riskusing a manual fix tool.

Manual Fix (recommended)

If you resolve a threatmanually, you mustremove the threatinformation from theSecurity Historywindow.

Removes the security riskfrom your computer andquarantines it.

Remove this file (may causebrowser to close)(recommended)

This option is availablefor the security risks thatrequire your attention.

Responding to security issuesWhat to do if a security risk is found

214

Page 215: Help

Removes the selectedsecurity risk from thecomputer andquarantines it.

This option is availablefor the security risks thatrequire your attention formanual removal.

This option is alsoavailable for the securityrisks that are manuallyquarantined.

Remove this file (may causebrowser to close)

Removes the selectedsecurity risk item fromthe Security History log.

Remove from history

Takes you to theSymantec SecurityResponse Web site.

This option is availablefor the security risks thatrequire your attention formanual removal. You canrefer the SymantecSecurity Response Website for manual removalinstructions or otherinformation about therisk.

Get help (recommended)

215Responding to security issuesWhat to do if a security risk is found

Page 216: Help

Sends the security risk toSymantec.

In some cases, Norton360 might not identify anitem as a security threat,but you might suspectthat the item is infected.In such cases, you canuse this option to submitthe item to Symantec forfurther analysis.

Submit to Symantec

About responding to risks detected during a scanAt the end of a scan, the Results Summary windowprovides the summary of the scan results. You can usethe ThreatsDetected window to resolve any items thatwere not automatically resolved during the scan.

You can use the Show drop-down list that is availablein the Security History window to resolve any itemsthat were not automatically resolved during the scan.The Recommended Action section in the SecurityHistory window displays the action that you shouldtake to resolve the security threat.

If you have run a Full System Scan, Norton 360 displaysthe Scans window at the end of the scan. The Scanswindow lists each activity and status of the scan results.

About actions when Norton 360 cannot repair a fileOne of the common reasons that Norton 360 cannotautomatically repair or delete an infected file is thatyou do not have the current definition updates. RunLiveUpdate, and then scan again.

Before running LiveUpdate to receive protectionupdates, ensure that Quick Scan is turned on (it isturned on by default). After LiveUpdate retrieves thelatest definition updates, Quick Scan automatically

Responding to security issuesWhat to do if a security risk is found

216

Page 217: Help

checks for the infections that have processes runningin memory. It also checks for the infections that thestart-up files and folders refer.

If that does not work, read the information on theSecurity History - Advanced Details window toidentify the types of files that cannot be repaired. Youcan take one of the following actions, depending on thefile type:

You can view the file type ofthe detected risk. Thisinformation helps you todecide the action that can betaken depending on the filetype.

For example, you can view theinfected files with thefollowing file nameextensions (any file can beinfected):1 .exe

1 .doc

1 .dot

1 .xls

Infected files

Replace using your operatingsystem disks.

Hard disk master boot record,boot record, or system files(such as IO.SYS orMSDOS.SYS) and floppy diskboot record and system files

217Responding to security issuesWhat to do if a security risk is found

Page 218: Help

Responding to security issuesWhat to do if a security risk is found

218

Page 219: Help

This chapter includes the following topics:

1 About Norton 360 alerts and messages

1 About managing messages and alerts

1 Types of risks

1 Types of threats

1 Types of viruses

About Norton 360 alerts and messagesMost of the time, Norton 360 quietly protects yourcomputer from viruses and other risks and threats sothat you can use your PC with confidence. The greenbadge on the Norton 360 status icon in the lower-rightcorner of your computer screen indicates that yourprotection is up to date. You can use your computerwith confidence. If the badge color changes to orangeor red, it means you should open Norton 360 to learnabout the problems that Norton 360 has encountered.

About managing messages and alertsNorton 360 displays messages in several ways and inseveral locations.

6Understandingalerts andmessages

Page 220: Help

You might see messages in the following locations:

Several types of Norton 360messages appear in thenotification area, at the farright of the taskbar. Forexample, your PC was turnedoff, or it has not beenconnected to the Internet fora while. In this case, you seea message that yourprotection may not be up todate.

A different alert appears if asecurity setting was turnedoff. This message warns youthat your PC might not besecure and helps you to turnon the setting.

In most cases you can clickthe alert to open Norton 360and fix the problems.

Notification area on yourWindows desktop

Alerts and other messagesappear at the middle of themain window. The color ofthe message indicates itsurgency. If the message coloris green, your computer isprotected. If the messagecolor is orange or red, youmust take appropriate actionto ensure that you stayprotected.

Norton 360 main windowoverall status

Understanding alerts and messagesAbout managing messages and alerts

220

Page 221: Help

Norton 360 displaysindividual status areas foreach protection feature, suchas PC Security, Identity,Backup, and PC Tuneup. Thestatus areas show how manyissues need to be resolved foreach feature. You can useView Details under eachstatus area for moreinformation about thoseissues. You can use the FixNow option to fix all theissues that need to beresolved to secure yourcomputer.

Norton 360 protectioncategories and details

In Windows Vista andWindows 7, Norton 360displays the security statusof your computer in theNorton 360 gadget in theWindows sidebar.

Norton 360 gadget in theWindows sidebar

Types of risksA risk is anything that can be exploited to harm yourPC and its data, or that can be used to steal your data.Norton 360 protects your system from a variety ofrisks.

Risks fall into several categories:

These programs aredeliberately designed tocause damage to your PC.They include threats such asviruses, worms, and Trojanhorses. Malicious software issometimes called malware.

Malicious software

221Understanding alerts and messagesTypes of risks

Page 222: Help

These programs concealthemselves on your PC. Theymonitor what you do, or lookthrough the information thatis stored on your PC, andsend the information back totheir creators.

Spyware

These risks consist of flawsin legitimate software thatcan be exploited, either tocause damage, block data, orsteal information.Vulnerabilities are usuallyexploited through networkconnections.

Vulnerabilities

Types of threatsThreats consist of the software that has beendeliberately designed to destroy, modify, disclose, orblock your data.

Threats fall into the following categories:

Viruses are the smallprograms that attachthemselves tootherprogramsand replicate themselves.

Viruses

Worms are like viruses in thatthey copy themselves fromPC to PC, but they do notattach themselves to otherprograms.

Worms

Understanding alerts and messagesTypes of threats

222

Page 223: Help

These destructive programsclaim to be some other typeof program, but they causedamage when they run.

Trojan horses

Norton 360 scans your PC for viruses, worms, Trojanhorses, and other software that is intentionallydestructive. It also monitors your Internet connectionto protect you from the Internet-based threats thatexploit software vulnerabilities.

Types of virusesA virus is a small program that is designed to alter theway your PC operates, without your knowledge orpermission.

To be a virus, a program must do the following:

1 Run on its own, without you having to take anyaction

1 Make copies of itself so that it can spread to otherPCs

Although not all viruses are intended to cause damage,even harmless viruses can affect the performance andstability of your PC. Norton 360 attempts to removeall viruses from your PC.

Viruses fall into the following recognized categories:

These viruses infect programfiles. When infected files run,they can attach the virusesthat they carry to otherprogram files. Norton 360scans all program files onyour PC to find and eliminatefile infectors.

File infectors

223Understanding alerts and messagesTypes of viruses

Page 224: Help

These viruses attachthemselves to the systemareas of your PC and becomeactive as soon as your PCstarts. They can attachthemselves to disks or otherstorage devices that isconnected to your PC. Norton360 scans the system areasof your PC to find and removeboot viruses.

Boot viruses

These viruses use thetechniques of both boot andfile infector viruses. Norton360 scans for such virusesand eliminates them.

Multipartite viruses

These viruses attachthemselves to the data filesthat contain executablecomponents, such as somespreadsheet, presentation,and word-processing files.These viruses that are spreadwhen a program runs theexecutable portion of a datafile. Norton 360 scans datafiles for macro viruses andremoves them.

Macro viruses

Norton 360 scans your PC for both known viruses andunknown viruses.

Known viruses are automatically detected and repaired.Unknown viruses are detected by analyzing eachexecutable file for various characteristics common toviruses. In addition, Norton 360 automatically updatesitself over the Internet to expand and refine its list ofknown viruses.

Understanding alerts and messagesTypes of viruses

224

Page 225: Help

This chapter includes the following topics:

1 Turning on or turning off automatic tasks

1 About custom task

1 About scheduling automatic tasks

1 About scheduling backups

1 Specifying Idle Time Out duration

Turning on or turning off automatic tasksNorton 360 runs automatic tasks as it quietly works toprotect your PC. These automatic tasks includescanning for viruses, monitoring your Internetconnection, updating backups, and downloadingprotection updates. These activities run in thebackground when your PC is turned on.

If any item needs your attention, Norton 360 displaysa message that tells you the current status or asks youto do something. If you do not see any messages, thenNorton 360 is doing its job and your PC is protected.

You can open Norton 360 at any time to see the statusof your PC at a glance or to view protection details.

When a background activity is in progress, Norton 360notifies you with a message in the notification areathat is located at the far-right of the task bar. You can

7Doing routinetasks

Page 226: Help

see the results of the latest Norton 360 activities thenext time you open the Norton 360 main window. Tosee a current report of Norton 360 activities, you canview the summary in the Monthly Report window.

To turn on or turn off automatic tasks

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Tasks Scheduling.

3 In the TaskScheduling window, on the AutomaticTasks tab, do the following:

1 Check the feature that you want to runautomatically.

Check the Tasks check box to check all thefeatures at once.

1 Uncheck the feature that you do not want to runautomatically.

Uncheck the Tasks check box to uncheck all thefeatures at once.

4 Click Apply.

5 Click Close.

About custom taskNorton 360 lets you choose your own combination oftasks for a one-time scan. You can run LiveUpdate,back up your data, remove temporary files, free diskspace by cleaning up disk clutter, and optimize yourdisks.

You can select and run the following tasks:

Downloads the latestprotection and programupdates.

LiveUpdate

Doing routine tasksAbout custom task

226

Page 227: Help

Deletes the temporary filesthat are left behind on yourPC's hard disk after Internetbrowsing.

Internet Explorer TemporaryFiles

Deletes the unnecessary filesthat are left in WindowsTemporary folders after aprogram has been installedor updated.

Windows Temporary Files

Deletes the unnecessary Webpage history that is leftbehind in your Internetbrowser's history folder.

Internet Explorer History

Defragments your hard diskand free space.

Disk Optimization

Deletes the inaccurate entriesand obsolete entries in theWindows registry that cancause errors.

Registry Cleanup

Runs backup.

The files to be backed up andthe backup location are theones you specified when youconfigured your backupsettings.

Backup

Running custom tasksNorton 360 automatically checks your system andchooses the best settings to keep your system secure.However, you can run some specific tasks. You canchoose the specific tasks that you want to run by usingthe options available in the Custom Tasks window.

227Doing routine tasksAbout custom task

Page 228: Help

Norton 360 lets you choose your own combination oftasks for a one-time scan. You can run LiveUpdate,back up your data, free disk space by cleaning up diskclutter, and optimize your disks.

To run custom tasks

1 In the Norton 360 main window, click PC Security,and then click Run Scans.

2 In the Scans window, under Computer Scan, clickCustom Task, and then click Go.

3 In the Custom Tasks window, check the tasks thatyou want to run.To select all the tasks, check the Tasks option.

4 Click Go.

About scheduling automatic tasksYou can use the Task Scheduling settings to specifyhow often Norton 360 scans your system for securityand performance issues. You can also access backupscheduling options from Task Scheduling settings.

Scheduling security and performance scansUse the Task Scheduling settings to have Norton 360examine your system automatically for security andperformance issues. You can specify when and howoften Norton 360 performs those examinations.

You have the following options for scheduling securityand performance scans:

Examine your PC for securityand performance issueswhenever your PC is idle.

This setting provides themaximum protection.

Automatic (Recommended)

Doing routine tasksAbout scheduling automatic tasks

228

Page 229: Help

Examine your PC one or moretimes each week for securityand performance issues.

You can pick the days of theweek and the time of day onwhich the scan performs.

Weekly

Examine your PC once eachmonth for security andperformance issues.

You can pick the day of themonth and the time of day onwhich the scan performs.

Monthly

Do not perform a scheduledsecurity or performance scanof your PC.

If you choose this option, youshould perform manualsecurity and performancescans of your PC periodicallyto maintain protection.

Manual Schedule

Your computer's performance is maximized if youschedule your critical operations to occur when yourcomputer is idle. When you schedule your scans weeklyor monthly and check the Runonlyatidletime option,Norton 360 scans your computer when it is idle.Symantec recommends that you check Runonlyatidletime to experience better performance of yourcomputer.

To schedule security and performance scans

1 In the Norton 360 main window, click Settings.

2 In the Settings window, click Tasks Scheduling.

229Doing routine tasksAbout scheduling automatic tasks

Page 230: Help

3 On the Scheduling tab, under Schedule, select anoption.When you click Weekly or Monthly, you must selectthe time and day to run the automatic tasks. Youalso have the option of specifying that the automatictasks must run only when the PC is idle.

4 Click Apply.

5 Click Close.

About scheduling backupsYou can configure backup scheduling on the When tabin the Manage Backup Sets window to specify whenand how often should Norton 360 back up your files.

You have the following backup scheduling options:

Backs up the changed fileswhenever your PC is idle

This setting provides the bestbackup protection.

Automatic (Recommended)

Backs up the changed filesone or more times each week

You can pick the days of theweek and the time of day onwhich Norton 360 shouldperform backups.

Weekly

Backs up the changed filesonce each month

You can pick the day of themonth and the time of day onwhich Norton 360 shouldperform backups.

Monthly

Doing routine tasksAbout scheduling backups

230

Page 231: Help

Does not perform anyscheduled backups ofchanged files

If you choose this option, youshould manually back up yourchanged files regularly.

Manual Schedule

Your computer's performance is maximized if youschedule your critical operations to occur when yourcomputer is idle. When you schedule backup weeklyor monthly and check Run only at idle time, Norton360 backs up your files when your computer is idle.Symantec recommends that you check Runonlyatidletime to experience better performance of yourcomputer.

Specifying Idle Time Out durationYou can set the duration after which Norton 360 shouldidentify your computer as idle. You can select a value(in minutes) between 1 minute and 30 minutes. Whenyou do not use your computer for the specifiedduration, Norton 360 identifies your computer as idle.Norton 360 then runs the activities that are scheduledto run at idle time.

To specify Idle Time Out duration from the Settingswindow

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Idle Time Out row, in the drop-down list,select the duration that you want to specify.You might need to scroll the window to view theoption.

4 In the Settings window, click Apply.

231Doing routine tasksSpecifying Idle Time Out duration

Page 232: Help

Doing routine tasksSpecifying Idle Time Out duration

232

Page 233: Help

This chapter includes the following topics:

1 About the Smart Firewall

1 About Intrusion Prevention

1 About Download Insight

1 About Norton AntiSpam

1 About configuring POP3 and SMTP ports

1 About Metered Broadband Mode

About the Smart FirewallThe Smart Firewall monitors the communicationsbetween your computer and other computers on theInternet. It also protects your computer from suchcommon security problems as the following:

Warns you of connectionattempts from othercomputers and ofattempts by programs onyour computer to connectto other computers

Improper connection attempts

8Keeping secure onthe Internet

Page 234: Help

Cloaks the inactive portson your computer therebyproviding protectionagainst attacks throughhacking techniques suchas port scanning

Port scans

Monitors the networktraffic to or from yourcomputer for suspiciousbehavior and stops anyattack before theythreaten your system

Intrusions

A firewall blocks hackers and other unauthorizedtraffic, while it allows authorized traffic to pass.Turning off Smart Firewall reduces your systemprotection. Always ensure that the Smart Firewall isturned on.

Turning off or turning on Smart FirewallSmart Firewall monitors communications betweenyour computer and the other computers on theInternet. It also protects your computer from commonsecurity problems.

If you must turn off the Smart Firewall, you shouldturn it off temporarily to ensure that it is turned onagain automatically. To ensure that your computerremains protected, you can turn on the Smart Firewallmanually before the time that you specify concludes.

When the Smart Firewall is turned off, your computeris not protected from Internet threats and securityrisks.

To turn off Smart Firewall

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

Keeping secure on the InternetAbout the Smart Firewall

234

Page 235: Help

3 On the General Settings tab, in the SmartFirewallrow, move the On/Off switch to the right to the Offposition.

4 Click Apply.

5 In the Security Request window, in the Select theduration drop-down list, select the duration forwhich you want to turn off Smart Firewall.

6 Click OK.

7 Click Close.

To turn on Smart Firewall

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the General Settings tab, in the SmartFirewallrow, move the On/Off switch to the left to the Onposition.

4 Click Apply.

5 Click Close.

To turn off Smart Firewall from Quick Controls

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Quick Controls,uncheck Smart Firewall.

To turn on Smart Firewall from Quick Controls

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Quick Controls,check Smart Firewall.

To turn off Smart Firewall from the notification area

1 In the notification area on the taskbar, right-clickthe Norton 360 icon, and then click Disable SmartFirewall.

2 In the Security Request window, in the Select theduration drop-down list, select the duration forwhich you want to turn off Smart Firewall.

3 Click OK.

235Keeping secure on the InternetAbout the Smart Firewall

Page 236: Help

To turn on Smart Firewall from the notification area

4 In the notification area on the taskbar, right-clickthe Norton 360 icon, and then click Enable SmartFirewall.

About firewall rulesA firewall is a security system that uses rules to blockor allow connections and data transmission betweenyour computer and the Internet. Firewall rules controlhow the Smart Firewall protects your computer frommalicious programs and unauthorized access. Thefirewall automatically checks all traffic that comes inor out of your computer against these rules.

The Smart Firewall uses two kinds of firewall rules:

Control network access forprograms on your computer.

Program rules

Control all the incoming and theoutgoing network traffic.

Traffic rules

About the order in which firewall rules are processed

The Smart Firewall processes Traffic rules before itprocesses Program rules. For example, when there isa Program rule that allows Internet Explorer to accessInternet using port 80 with TCP protocol and a Trafficrule that blocks TCP communication through port 80for all applications. The Internet Explorer applicationcannot access the Internet as Norton 360 givesprecedence to Traffic rules over the Program rules.

For example, you have a Program rule for the SymantecpcAnywhere application that blocks the use of theapplication with any other computer. You add anotherrule for the same application that allows its use witha specific computer. You then move the new rule beforethe original rule in the program rule list. Norton 360processes the new rule first and lets you use Symantec

Keeping secure on the InternetAbout the Smart Firewall

236

Page 237: Help

pcAnywhere with that specific computer. It thenprocesses the original rule and prevents its use withany other computer.

About Traffic rules

Norton 360 includes a number of predefined Trafficrules. These rules provide network functionality andprotection from known Internet risks. Examples ofdefault Traffic rules include the following:

Permit all types ofoutbound and safe typesof inbound ICMP (InternetControl MessageProtocol) messaging.

ICMP messages providestatus and controlinformation.

Default Allow Specific InboundICMP

Default Allow Specific OutboundICMP

237Keeping secure on the InternetAbout the Smart Firewall

Page 238: Help

Permit the use of theNetBIOS name serviceand the NetBIOSdatagram service that theMicrosoft Network usesin file and printer sharing.

NetBIOS is an acronymfor Network BasicInput/Output System.NetBIOS provides nameservice, session service,and datagram service.Name service providesresolution of names,Session service managessessions forconnection-orientedservices, and Datagramservice distributesdatagrams forconnection-orientedservices.

Default Allow Inbound NetBIOSName (Shared Networks)

Default Allow Inbound NetBIOS(Shared Networks)

Permit the use of theBootp service.

Bootp is short forBootstrap Protocol, whichenables a computer todiscover its own IPaddress.

Default Allow Inbound Bootp

Default Allow Outbound Bootp

The Traffic Rules tab displays a list of predefinedtraffic rules. Some of the default Traffic rules areread-only and are locked. You cannot modify theserules.

The rules appear in the order of their priority levels.Rules that appear higher in the list override the rulesthat appear lower in the list.

Keeping secure on the InternetAbout the Smart Firewall

238

Page 239: Help

You can add a new Traffic rule on this tab. You can alsodo the following activities:

You can change the settings ofa Traffic rule that does notfunction the way you want.

However, you cannot modifysome of the default rules thatare read-only.

See “Modifying Traffic rules andProgram rules” on page 254.

Modify a Traffic rule

You can disable a Traffic rule.

However, you cannot turn offsome of the default rules thatare read-only.

See “Turning off a Traffic ruletemporarily” on page 256.

Turn off a Traffic rule

You can change the priority of aTraffic rule by changing where itappears in the list.

w Only advanced users ornovice users at the direction oftechnical support, shouldperform this action.

See “Changing the order offirewall rules” on page 255.

Change the priority of aTraffic rule

About Program rules

Program rules control network access for the programsthat are on your computer. You can use the Firewallsettings to create and modify rules for programs.

On the Program Rules tab, you can do the following:

1 Add a program.

1 Rename a program.

239Keeping secure on the InternetAbout the Smart Firewall

Page 240: Help

1 Modify the rules for a program.

1 Add a rule for a program.

1 Modify the access settings of a program rule.

1 Modify the priority of rules for a program bychanging the sequence of rules in the list.

1 Remove a program rule.

1 Remove a program.

You can create Program rules in the following ways:

Lets the firewallautomatically configureaccess for programs thefirst time that users runthem. This method is theeasiest way to createfirewall rules.

Automatically customize Internetaccess settings

Manages the list ofprograms that can accessthe Internet.

Use Firewall settings

Keeping secure on the InternetAbout the Smart Firewall

240

Page 241: Help

Lets the firewall notifyyou when a programattempts to access theInternet. You can thenallow or block Internetaccess for the program.

In some instances, suchas when you watch amovie, you might prefernot to be alerted with anymessages. In such cases,you can turn onAutomatic ProgramControl. Norton 360 doesnot prompt you with anyfirewall alerts in thisstate.

The firewall notifies youonly if you have changedthe General Settingsoptions of Smart Firewallfrom their default,recommended settings.

Respond to alerts

Adding a program to Firewall settings

You can add programs to Firewall settings to controltheir ability to access the Internet. Manually configuredFirewall settings for programs override any settingsthat Automatic Program Control makes. However,Symantec recommends you to retain the settings thatAutomatic Program Control makes as and when yourun your programs.

w Firewall settings for programs are not migrated fromprevious versions of Norton 360. If you want to restoreany programs that you manually added in the previousversion, you must add them again in the currentversion.

241Keeping secure on the InternetAbout the Smart Firewall

Page 242: Help

To add a program to Firewall settings

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the Program Rules tab, click Add.

4 In the Select a program dialog box, browse to theexecutable file for the program that you want toadd.

5 Click Open.

6 In the SecurityRequest-ProgramControl window,in the What do you want to do? drop-down list,select the access level that you want this programto have. Your options are:

Allow all access attemptsby this program.

Allow

Deny all access attemptsby this program.

Block

Create the rules thatcontrol how this programaccesses the Internet.

You can set the followingcriteria for a rule:

Manually configure Internetaccess (Recommended)

1 Action

1 Connections

1 Computers

1 Communications

1 Advanced

1 Description

If you select this option,you must follow theinstructions in the wizardthat appears andconfigure the rule.

Keeping secure on the InternetAbout the Smart Firewall

242

Page 243: Help

7 Click OK.

Customizing a program

After you use Norton 360 for a while, you might needto change the access settings for certain programs.

To customize a program

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the ProgramRules tab, in the Program column,select the program that you want to change.

4 In the drop-down list next to the program that youwant to change, select the access level that you wantthis program to have. Your options are:

Allow all access attemptsby this program.

Allow

Deny all access attemptsby this program.

Block

Create the rules thatcontrol how this programaccesses the Internet.

Custom

The Auto option is the default option that isassigned automatically to a program whenAutomatic Program Control is turned on.

5 Click Apply.

Removing a program

You can remove programs from Firewall settings ifnecessary.

The firewall settings for the programs are not migratedfrom previous versions of Norton 360. If you removedany programs in the previous version and do not want

243Keeping secure on the InternetAbout the Smart Firewall

Page 244: Help

them in the current version, you must remove themagain.

To remove a program from Firewall settings

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the ProgramRules tab, in the Program column,select the program that you want to remove.

4 Click Remove.

5 In the Confirmation dialog box, click Yes.The confirmation dialog box appears only when theAutomatic Program Control option is turned off.

6 Click Apply.

Adding Traffic rules and Program rulesFirewall settings automatically create most of thefirewall rules that you need. You can add custom rulesif necessary.

w Only experienced users should create their own firewallrules.

You can add the following types of firewall rules:

1 Traffic rules

1 Program rules

To add a Traffic rule

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the Traffic Rules tab, click Add.

4 Follow the instructions in the Add Rule wizard.

To add a Program rule

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

Keeping secure on the InternetAbout the Smart Firewall

244

Page 245: Help

3 On the ProgramRules tab, in the Program column,select the program to which you want to add a rule.

4 Click Modify.You can also use the Access drop-down list next tothe program to modify the access level for theprogram. Accordingly, Smart Firewall modifies orcreates the relevant rule for the program.

5 In the Rules window, click Add.

6 Follow the instructions in the Add Rule wizard.

7 In the Rules window, click OK.

Using the Add Rule Wizard

The AddRule Wizard leads you through the steps thatare necessary to create firewall rules.

To use the Add Rule Wizard

1 Open the Add Rule Wizard by creating a Trafficrule or a Program rule.

245Keeping secure on the InternetAbout the Smart Firewall

Page 246: Help

2 In the first panel of the AddRuleWizard, select theaction that you want for this rule. Your options are:

Allow communication ofthis type.

Allow

For example, consider aTraffic rule with thefollowing criteria: allinbound connectionsfrom Internet address192.168.1.1 through port8080. When you selectAllow, Smart Firewallallows all connectionsthat satisfy the criteria ofthis Traffic rule.

Prevent communicationof this type.

Block

For example, consider aTraffic rule with thefollowing criteria: allinbound connectionsfrom Internet address192.168.1.1 through port8080. When you selectBlock, Smart Firewallblocks all connectionsthat satisfy the criteria ofthis Traffic rule.

Keeping secure on the InternetAbout the Smart Firewall

246

Page 247: Help

Monitor

247Keeping secure on the InternetAbout the Smart Firewall

Page 248: Help

Update the Firewall –Activities category in theevent log each time thatcommunication of thistype takes place. Thisoption lets you monitorhow often this firewallrule is used. Norton 360notifies you every timethat the traffic matchingthe monitor rule criteriapasses through yourcomputer. You can usethe links in thesenotifications to view thelogs. You can view theevent log under Firewall– Activities category inthe Security Historywindow.

Norton 360 createsseparate action rules toallow or block theprograms that have onlyaMonitor rule associatedwith them. The Monitorrule must be of higherorder than the action rulefor successful log entry ofthe network event that isrelated to the program.

The monitor rule only logsthe traffic events in theSecurity Historywindow.You need to createanother Allow or Blockrule to handle thenetwork traffic.

You can monitor andallow or block the trafficby enabling the Create a

Keeping secure on the InternetAbout the Smart Firewall

248

Page 249: Help

Security History logentry option in the AddRule Wizard or theModify Rule Wizard.

3 Click Next.

4 Select the type of connection for the rule. Youroptions are:

The rule applies tooutbound connectionsfrom your computer toanother computer.

Connections to other computers

The rule applies toinbound connectionsfrom another computer toyour computer.

Connections from othercomputers

The rule applies toinbound and to outboundconnections.

Connections to and from othercomputers

249Keeping secure on the InternetAbout the Smart Firewall

Page 250: Help

5 Click Next, and then select the computers that applyto the rule. Your options are:

The rule applies to allcomputers.

Any computer

This rule applies only tocomputers in the localsubnet.

Any computer in the localsubnet

Anorganization’snetworkis divided into subnets tofacilitate efficientInternet communications.A subnet represents all ofthe computers in thesame LAN.

Keeping secure on the InternetAbout the Smart Firewall

250

Page 251: Help

The rule applies only tothe computers, sites, ordomains that you specify.

You can specify thenames and addresses ofcomputers that apply tothe rule. The details ofthe specified computersappear in the list. You canalso remove computersfrom the list.

When you select thisoption, the Add optionbecomes available. Whenyou clickAdd, Norton 360displays the Networkingdialog box in which youcan specify individualcomputers, a range ofcomputers, or specify allcomputers on a subnet ornetwork.

You can use the Addoption or the Removeoption to add or removea computer.

Only the computers and siteslisted below

251Keeping secure on the InternetAbout the Smart Firewall

Page 252: Help

6 Click Next, and then select the protocols for therule. Your options are:

The rule applies to TCP(Transmission Control

TCP

Protocol)communications.

The rule applies to UDP(User Datagram Protocol)communications.

UDP

The rule applies to TCPand to UDPcommunications.

TCP and UDP

The rule applies to ICMP(InternetControlMessage

ICMP

Protocol)communications.

This option is availableonly when you add aTraffic rule, modify aTraffic rule, or modify aProgramrule that handlesICMP traffic.

The rule applies toICMPv6 (Internet Control

ICMPv6

Message Protocol forInternet Protocol version6) communications.

This option is availableonly when you add aTraffic rule, modify aTraffic rule, or modify aProgramrule that handlesICMPv6 traffic.

Keeping secure on the InternetAbout the Smart Firewall

252

Page 253: Help

The rule applies to allsupported protocols.

When you select thisoption, you cannotspecify the types ofcommunications or portsthat apply to the rule.

All

7 Select the ports for the rule. Your options are:

The rule applies tocommunications that useany port.

All types of communication (allports, local and remote)

The rule applies to theports that you specify.You can specify the portsby selecting from thelisted ports or by addingspecific ports or portranges.

Only communications thatmatch all types and ports listedbelow

w If you select ICMPor ICMPv6 protocol, youcan specify thecommands. To do so,select a command fromthe list of knowncommandsor add specificcommands or commandranges.

When you select thisoption, the Add optionbecomes available. Youcan use theAdd option orthe Remove option tospecify or remove a portor a command.

253Keeping secure on the InternetAbout the Smart Firewall

Page 254: Help

8 Click Next.

9 Check Create a Security History log entry if youwant Norton 360 to create an entry in the firewallevent log.Norton 360 creates an entry when a networkcommunication event matches this rule. You canview the event log in the Security History windowunder Firewall – Activities. If you selected theMonitor option in the Action window, then theCreate a Security History log entry option isautomatically checked. You cannot uncheck the boxto turn off this option as it is the default setting.

10 Check Apply this rule if you want to apply this ruleto IPv6 NAT Traversal traffic.

11 Click Next, and then, in the text box, type a namefor this rule.

12 Click Next, and then review the new rule settings.

13 Click Finish.

14 When you have finished adding rules, click OK.

Modifying Traffic rules and Program rulesYou can change an existing firewall rule if it does notfunction the way that you want. You can use the Modifyoption to change the settings of an existing firewallrule. When you change a rule, the firewall uses the newcriteria of the modified rule to control network traffic.

You cannot modify some of the default rules that areread-only. However, you can view the settings of theserules by using the View option.

To modify a Traffic rule

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the Traffic Rules tab, select the rule that youwant to change.

4 Click Modify.

Keeping secure on the InternetAbout the Smart Firewall

254

Page 255: Help

5 In the Modify Rule window, make the necessarychanges to modify any aspect of the rule.

6 When you have finished changing the rule, clickOK.

To modify a Program rule

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the ProgramRules tab, select the program thatyou want to change.

4 Click Modify.You can also use the Access drop-down list next tothe program to modify the access level for theprogram. Accordingly, Smart Firewall modifies orcreates the relevant rule for the program.

5 In the Rules window, select the rule that you wantto change.

6 Click Modify.

7 In the Modify Rule window, make the necessarychanges to modify to change any aspect of the rule.

8 When you have finished changing the rule, clickOK.

9 In the Rules window, click OK.

Changing the order of firewall rulesEach list of firewall rules is processed from the topdown. You can adjust how the firewall rules areprocessed by changing their order.

w Do not change the order of the default Traffic rulesunless you are an advanced user. Changing the orderof default Traffic rules can affect firewall functionalityand reduce the security of your computer.

To change the order of Traffic rules

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

255Keeping secure on the InternetAbout the Smart Firewall

Page 256: Help

3 On the Traffic Rules tab, select the rule that youwant to move.

4 Do one of the following:

1 To move this rule before the rule above it, clickMove Up.

1 To move this rule after the rule below it, clickMove Down.

5 When you are done moving the rules, click Apply.

To change the order of Program rules

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the ProgramRules tab, select the program thatcontains the rule that you want to move.

4 Click Modify.

5 In the Rules window, select the rule that you wantto move.

6 Do one of the following:

1 To move this rule before the rule above it, clickMove Up.

1 To move this rule after the rule below it, clickMove Down.

7 When you are done moving the rules, click OK.

8 In the Firewall settings window, click Apply.

Turning off a Traffic rule temporarilyYou can temporarily turn off a Traffic rule if you wantto allow specific access to a computer or a program.You must remember to turn on the rule again whenyou are done working with the program or computerthat required the change.

w You cannot turn off some of the default firewall rulesthat appear in the list. You can only view the settingsof these rules by using the View option.

Keeping secure on the InternetAbout the Smart Firewall

256

Page 257: Help

To turn off a Traffic rule temporarily

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the Traffic Rules tab, uncheck the box next tothe rule that you want to turn off.

4 Click Apply.

Allowing a blocked programSometimes the Norton 360 firewall blocks certainprograms from accessing the Internet. Such programsmight include certain streaming-media programs,network games, or custom business applications thatare provided by your employer. If you know that theprogram's Internet activity is not a threat to yoursecurity, you can unblock the program's Internetaccess.

To allow a blocked program

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the ProgramRules tab, select the program thatyou want to allow access to the Internet.

4 In the Access drop-down list for the program entry,click Allow.

5 Click Apply.

To allow a blocked program from the Security Historywindow

1 In the Norton 360 main window, click Tasks.

2 In the Tasks window, under General Tasks, clickCheck Security History.

3 In the Security History window, in the Showdrop-down list, select Firewall - Activities.

4 Select the firewall activity that is associated withthe blocked program.

5 Click More Details.

257Keeping secure on the InternetAbout the Smart Firewall

Page 258: Help

6 In the SecurityHistory-AdvancedDetails window,under Actions, click Allow.

Removing a firewall ruleYou can remove some of the firewall rules if necessary.However, you cannot modify some of the default Trafficrules that appear in the list. You can view the settingsof these rules by using the View option.

w Do not remove a default firewall rule unless you are anadvanced user. Removing a default firewall rule canaffect firewall functionality and reduce the security ofyour computer.

To remove a Traffic rule

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the Traffic Rules tab, select the rule that youwant to remove.

4 Click Remove.

5 In the Confirmation dialog box, click Yes.

To remove a Program rule

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the ProgramRules tab, in the Program column,select the program that contains the rule that youwant to remove.

4 Click Modify.To remove all the program rules that are associatedwith the program, click Remove.

5 In the Rules window, select the rule that you wantto remove.

6 Click Remove.

7 In the Confirmation dialog box, click Yes.

8 Click OK.

Keeping secure on the InternetAbout the Smart Firewall

258

Page 259: Help

About Norton Firewall DiagnosisThere may be times when firewall may block thenetwork traffic that you want to allow based on itsconfiguration settings. In such cases, you may haveissues in accessing the Internet, the Network, oranother computer to perform tasks such as sharingresources.

When you experience network connection problems,Norton Firewall acts quickly in identifying the causeof failure and provides its diagnosis. Norton 360displays the Firewall Diagnostics Wizard when youencounter network connection problems.

w Norton Firewall Diagnosis is available only in Windows7.

The Wizard contains the problem diagnosis report thatis unique for different cases of network blocks. Forinstance, a network block can occur in any of thefollowing cases:

1 The one click option to stop all network traffic isactive

1 The uncommon protocol that is handling the trafficis blocked

1 The currently active firewall rule is conditioned toblock the traffic that you want to allow

1 The traffic has violated the process policy of thefirewall

1 The traffic has violated the traffic policy of thefirewall

1 The traffic comes from the restricted zone ofnetworks or computers

1 The traffic matches an Intrusion Prevention attacksignature

You can use the FirewallDiagnosticsWizard as a guideto troubleshoot the network connection problem byyourself.

259Keeping secure on the InternetAbout the Smart Firewall

Page 260: Help

For each case of network block, the Wizard containsthe firewall’s analysis of the cause and the possiblesolutions to fix the block.

Norton 360 recommends that you use the FirewallDiagnostics Wizard to remove any type of block. Thesolutions in the Wizard let you analyze the issue andtake a suitable action to resolve the problem.

Using the Wizard to troubleshoot the problem has thefollowing advantages:

1 It automatically tries to fix the problem by itself

1 It lets you modify the settings that are related tothe block

1 It lets you view the log details related to the networkblock event

1 It provides you the option to turn off firewall as thelast means to resolve the issue

About Intrusion PreventionIntrusion Prevention scans all the network traffic thatenters and exits your computer and compares thisinformation against a set of attack signatures. Attacksignatures contain the information that identifies anattacker's attempt to exploit a known operating systemor program vulnerability. Intrusion Prevention protectsyour computer against most common Internet attacks.

For more information about the attacks that IntrusionPrevention blocks, go to the following URL:

http://www.symantec.com/business/security_response/attacksignatures

If the information matches an attack signature,Intrusion Prevention automatically discards the packetand breaks the connection with the computer that sentthe data. This action protects your computer from beingaffected in any way.

Intrusion Prevention scanning of every request fromall the devices that access your computer increases the

Keeping secure on the InternetAbout Intrusion Prevention

260

Page 261: Help

scan time which slows down the network speed of yourcomputer. You can reduce the scan time and improvethe network speed of your computer by excluding thetrusted devices from Intrusion Prevention scanning.If you are sure that a device on your network is safe,you use the EditDeviceTrustLevel window to changethe trust level of the device to FullTrust. You can thenselect the ExcludefromIPSscanning option to excludethese trusted devices from Intrusion Prevention scan.

Intrusion Prevention relies on an extensive list ofattack signatures to detect and block suspiciousnetwork activity. Norton 360 runs LiveUpdateautomatically to keep your list of attack signatures upto date. If you do not use Automatic LiveUpdate, youshould manually run LiveUpdate once a week.

Turning off or turning on Intrusion Preventionnotifications

You can choose whether you want to receivenotifications when Intrusion Prevention blockssuspected attacks. Whether or not you receivenotifications, Intrusion Prevention activities arerecorded in Security History. The Security Historyentries include information about the attackingcomputer and information about the attack.

You can choose whether you want to receivenotifications when Intrusion Prevention blockssuspected attacks based on a particular signature.

To turn off or turn on Intrusion Prevention notifications

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

261Keeping secure on the InternetAbout Intrusion Prevention

Page 262: Help

3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the Notifications row, doone of the following:

1 Move the On/Off switch to the right to the Offposition.

1 Move the On/Off switch to the left to the Onposition.

4 In the Settings window, click Apply.

To turn off or turn on an individual Intrusion Preventionnotification

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionSignaturesrow, click Configure.

4 In the IntrusionSignatures window, click an attacksignature, and then click Properties.

5 In the Signature Properties window, uncheck orcheck Notify me when this signature is detected.

6 Click OK.

7 In the Intrusion Signatures window, click OK.

8 In the Settings window, click Apply.

Excluding or including attack signatures in monitoringIn some cases, benign network activity may appearsimilar to an attack signature. You may receiverepeated notifications about possible attacks. If youknow that the attacks that trigger these notificationsare safe, you can create exclusion for the attacksignature that matches the benign activity.

Each exclusion that you create leaves your computervulnerable to attacks.

If you have excluded the attack signatures that youwant to monitor again, you can include them in the listof active signatures.

Keeping secure on the InternetAbout Intrusion Prevention

262

Page 263: Help

To exclude attack signatures from being monitored

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionSignaturesrow, click Configure.

4 In the Intrusion Signatures window, uncheck theattack signatures that you want to exclude.

5 Click OK.

To include the attack signatures that were previouslyexcluded

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionSignaturesrow, click Configure.

4 In the Intrusion Signatures window, check theattack signatures that you want to include.

5 Click OK.

Turning off or turning on AutoBlockWhen an attack is detected from a computer, the attackis automatically blocked to ensure that your computeris safe. If a different attack signature is detected fromthe same computer, Norton 360 activates AutoBlock.The AutoBlock feature blocks all traffic between yourcomputer and the attacking computer for a specifictime period. During this period, AutoBlock also blocksthe traffic that does not match an attack signature.

w You can specify the period for which you want Norton360 to block the connections from attacking computers.By default Norton 360 blocks all traffic between yourcomputer and the attacking computer for a period of30 minutes.

263Keeping secure on the InternetAbout Intrusion Prevention

Page 264: Help

AutoBlock stops traffic between your computer and aspecific computer. If you want to stop all traffic to andfrom your computer, you can use the Block AllNetwork Traffic option.

If AutoBlock blocks a computer or computers that youneed to access, you can turn off AutoBlock.

To turn off or turn on AutoBlock

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionAutoBlockrow, click Configure.

4 In the Intrusion AutoBlock window, underAutoBlock, do one of the following:

1 To turn off Intrusion AutoBlock, click Off.

1 To turn on Intrusion AutoBlock, click On(Recommended), and then in the AutoBlockattacking computers for drop-down list, selecthow long you want to turn on AutoBlock.

5 Click OK.

Unblocking AutoBlocked computers

In some cases, benign network activity can appear tobe similar to an attack and AutoBlock blocks thenetwork activity automatically to ensure that yourcomputer is safe. The list of computers that AutoBlockhas currently blocked may include the computer thatyou should be able to communicate with.

If a computer that you need to access appears on thelist of blocked computers, you can unblock it. You maywant to reset your AutoBlock list if you have changedyour protection settings. To reset the AutoBlock list,you can unblock all of the computers that are on thelist at one time.

Keeping secure on the InternetAbout Intrusion Prevention

264

Page 265: Help

To unblock AutoBlocked computers

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionAutoBlockrow, click Configure.

4 In the Intrusion AutoBlock window, underComputers currently blocked by AutoBlock, doone of the following:

1 To unblock one computer, select its IP address,and then click Unblock.

1 To unblock all computers on the AutoBlock list,click Unblock All.

5 Click OK.

Permanently blocking a computer that has been blocked byAutoBlock

You can permanently block a computer that has beenblocked by AutoBlock. The permanently blockedcomputer is removed from the AutoBlock list and addedas a Restricted computer in the Network Security Mapof Home Networking.

To permanently block a computer that has been blockedby AutoBlock

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionAutoBlockrow, click Configure.

4 In the Intrusion AutoBlock window, underComputers currently blockedbyAutoBlock, clickthe computer that you want to block permanently.

5 Under the Action column, select Restrict.

6 Click OK.

265Keeping secure on the InternetAbout Intrusion Prevention

Page 266: Help

Turning off and turning on Browser ProtectionYou can choose whether you want to protect your Webbrowser by allowing Norton 360 to block unknownprograms from accessing your computer.

By default, the Browser Protection option is turnedon. In this case, Norton 360 proactively blocks new orunknown malware programs before they attack yourcomputer. By protecting your Web browser, Norton360 secures your sensitive information and preventsthe attackers from controlling your system remotely.This feature checks for browser vulnerabilities inInternet Explorer 6.0 or later, Chrome 10.0 or later, orFirefox 3.6 or later browsers.

w Always keep the Browser Protection setting turned onto protect your Web browser against attacks bymalicious Web sites.

To turn off or turn on Browser Protection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the Intrusion and Browser Protection tab, inthe BrowserProtection row, do one of the following:

1 To turn off Browser Protection, move the On/Offswitch to the right to the Off position.

1 To turn on Browser Protection, move the On/Offswitch to the left to the On position.

4 Click Apply.

5 If you turned off Browser Protection, in theProtection Alert dialog box, in the Select theduration drop-down list, select how long you wantto turn off Browser Protection.

6 Click OK.

About Intrusion Prevention exclusion listThe Intrusion Prevention System in Norton 360 scansall the network traffic that enters and exits your

Keeping secure on the InternetAbout Intrusion Prevention

266

Page 267: Help

computer. When a device on your network requestsaccess to your computer, Intrusion Prevention scansthis request to ensure that it is not a virus attack. Ifthe information matches an attack signature, IntrusionPrevention blocks the traffic from the suspicious deviceand protects your computer. Scanning every requestfrom all the devices that access your computerincreases the scan time which slows down the networkspeed of your computer.

If you are sure that a device on your network is safe,you can change the trust level of the device to FullTrust. You can configure the trust level of a deviceusing the Network Security Map. You can exclude thesetrusted devices from Intrusion Prevention scan.Excluding Full Trust devices from the IntrusionPrevention scan saves the scan time and improves thenetwork speed of your computer. When you exclude adevice that is set to Full Trust, Norton 360 does notscan any information that is received from this device.The Full Trust devices that are excluded from IntrusionPrevention scan are added to Intrusion Preventionexclusion list.

When a device on your network attempts to infect yourcomputer, AutoBlock stops all access requests fromthis device. If you add this device to the IntrusionPrevention exclusion list, Norton 360 removes thedevice from the exclusion list.

w Ensure that the IP address of the devices that are addedto Intrusion Prevention exclusion list never changes.

If you find that any of the devices that you excludedfrom the Intrusion Prevention scan is infected, you canpurge the saved exclusion list. When you purge theexclusion list, Norton 360 removes all the trusteddevices from the exclusion list.

267Keeping secure on the InternetAbout Intrusion Prevention

Page 268: Help

Removing all devices from Intrusion Preventionexclusion list

If you are sure that a device on your network is safe,you can change the trust level of the device to FullTrust. These trusted devices can be excluded fromIntrusion Prevention scan. Excluding Full Trust devicesfrom Intrusion Prevention scan saves the scan timeand improves the network speed of your computer.When you exclude a Full Trust device from IntrusionPrevention scan, Norton 360 does not scan anyinformation that is received from this device. The FullTrust devices that are excluded from IntrusionPrevention scan are added to Intrusion Preventionexclusion list.

If you find that any of the devices that you excludedfrom Intrusion Prevention scan is infected, you canpurge the saved exclusion list and remove all thedevices.

You can purge the saved exclusion list under thefollowing circumstances:

1 Any of the devices that you excluded from IntrusionPrevention scan is infected.

1 Any of the devices that you excluded from IntrusionPrevention scan attempts to infect your computer.

1 Your home network is infected.

When a device on your network attempts to infect yourcomputer, AutoBlock stops all the access requests fromthis device. If you add this device to the IntrusionPrevention exclusion list, Norton 360 removes thedevice from the exclusion list.

When you remove all the devices from the savedexclusion list, Intrusion Prevention scans every requestfrom all the devices that access your computer.

To remove all the devices from the Intrusion Preventionexclusion list

1 In the Norton 360 main window, click Settings.

Keeping secure on the InternetAbout Intrusion Prevention

268

Page 269: Help

2 In the Settings window, under Detailed Settings,click Firewall.

3 Click the Intrusion and Browser Protection tab.

4 Under Intrusion Prevention, in the Exclusion Listrow, click Purge.

5 In the confirmation dialog box, click Yes.

6 In the Firewall settings window, click Apply.

About Download InsightDownload Insight provides information about thereputation of any executable file that you downloadfrom the supported portals. The reputation detailsindicate whether the downloaded file is safe to install.You can use these details to decide the action that youwant to take on the file.

Some of the supported portals are:

1 Internet Explorer (Browser)

1 Opera (Browser)

1 Firefox (Browser)

1 Chrome (Browser)

1 AOL (Browser)

1 Safari (Browser)

1 Yahoo (Browser)

1 MSN Explorer (Browser, E-mail & Chat)

1 QQ (Chat)

1 ICQ (Chat)

1 Skype (Chat)

1 MSN Messenger (Chat)

1 Yahoo Messenger (Chat)

1 Limewire (P2P)

1 BitTorrent (P2P)

1 Thunder (P2P)

1 Vuze (P2P)

269Keeping secure on the InternetAbout Download Insight

Page 270: Help

1 Bitcomet (P2P)

1 uTorrent (P2P)

1 Outlook (E-mail)

1 Thunderbird (E-mail)

1 Windows Mail (E-mail)

1 Outlook Express (E-mail)

1 FileZilla (File Manager)

1 UseNext (Download Manager)

1 FDM (Download Manager)

1 Adobe Acrobat Reader (PDF viewer)

Based on the type of portal you use to download yourfile, Norton 360 does one of the following:

1 Analyzes the file based on its reputation detailswhen the download is complete.

1 Analyzes the file based on its reputation detailswhen the file is accessed.

Download Insight uses the file analysis results toprovide you the reputation details of the file. The basicreputation levels of the files are good, bad, unproven,and poor. Based on the reputation levels, the files canbe broadly classified as follows:

Includes the files that are eitherNorton trusted or User trusted.

Safe files have good reputationlevels. These files do not harmyour computer. By default,Auto-Protect allows theexecution of the safe files.

Safe

Keeping secure on the InternetAbout Download Insight

270

Page 271: Help

Includes the files that Norton360 identifies as a security riskor a threat.

Unsafe files are characterized bybad or poor reputation levelsand Norton 360 removes themfrom your computer.

Unsafe

Includes the files that areneither safe nor unsafe.

Unknown files have unprovenreputation. These files mightharm your computer. In the caseof an unknown file, DownloadInsight notifies you that it isunsure of the reputation level ofthe file. You can use the ViewDetails link in the notificationsto view more details of the file.

For unknown files, Norton 360lets you decide the action thatyou want to perform on the file.For example, you can run a file,stop the file from running, orremove the file from yourcomputer.

Unknown

By default, Download Insight lets you install safe files.For files of unknown reputation levels, DownloadInsight prompts you to select an action that you wantto perform on the file. In case of an unsafe file,Download Insight informs you that Norton 360 hasdetected the file as a threat and has removed the file.

Based on the reputation details that the DownloadInsight notifications provide for the files that needattention, you can take an action on the file. TheDownloadInsight window provides the various optionsthat let you select an action. The options that appearin the window vary depending on the reputation level

271Keeping secure on the InternetAbout Download Insight

Page 272: Help

of the downloaded file. The following are some of theoptions that are available in this window:

Lets you install the executableprogram.

Run this program

Lets you cancel the installationof the executable program.

Cancel run

Lets you remove the file fromyour computer.

Remove this file frommysystem

Security History logs details of all events thatDownload Insight processes and notifies. It alsocontains information about the safety level of the fileand the action that you take on the file, if any. You canview these details in the Download Insight categoryin Security History.

When you turn off Auto-Protect, Norton 360automatically turns off Download Insight. In this case,your computer is not adequately protected fromInternet threats and security risks. Therefore, ensurethat you always keep Auto-Protect turned on to protectyour computer from security risks.

When Silent Mode is turned on, Norton 360 suppressesthe Download Insight notifications.

Turning off or turning on Download IntelligenceDownload Insight protects your computer against anyunsafe file that you may run or execute after youdownload it using a supported Web browser. By default,the DownloadIntelligence option is turned on. In thiscase, Download Insight notifies you about thereputation levels of any executable file that youdownload. The reputation details that Download Insightprovides indicate whether the downloaded file is safeto install.

Keeping secure on the InternetAbout Download Insight

272

Page 273: Help

There may be times when you want to turn offDownload Insight. For example, if you want todownload an unsafe file. In this case, you must turn offDownload Insight so that Norton 360 lets you downloadthe file and does not remove it from your computer.

You can use the DownloadIntelligence option to turnoff or turn on Download Insight.

To turn off Download Intelligence

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the Intrusion and Browser Protection tab, inthe Download Intelligence row, move the On/Offswitch to the right to the Off position.

4 In the Settings window, click Apply.

5 In the Security Request dialog box, in the Selectthe duration drop-down list, select how long youwant to turn off Download Insight, and then clickOK.

6 In the Settings window, click Apply, and then clickClose.

To turn on Download Intelligence

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the Intrusion and Browser Protection tab, inthe Download Intelligence row, move the On/Offswitch to the left to the On position.

4 In the Settings window, click Apply, and then clickClose.

Configuring the Download Insight Notifications optionYou can use the DownloadInsightNotifications optionto choose when you want Download Insight to displaynotifications.

273Keeping secure on the InternetAbout Download Insight

Page 274: Help

By default, the DownloadInsightNotifications optionis set to On. Based on the type of portal you use todownload your file, Norton 360 does one of thefollowing:

1 Notifies you each time when you download anexecutable file.

1 Notifies you only when you download a file that isinfected with a local virus identification. If the filethat you download is infected with a cloud virusidentification, Norton 360 removes the file fromyour computer and notifies you with the threatdetails.

When the Download Insight Notifications option isset to RisksOnly, Download Insight notifies only whenyou download an infected or a suspicious executablefile.

Setting the Download Insight Notifications to RisksOnly does not turn off analysis of all the otherexecutable files that you download. Whether or notyou receive notifications of all files, Security Historykeeps a record of all the Download Insight activities.You can review the summary of the Download Insightalerts and notifications in Security History.

To configure the Download Insight Notifications option

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

Keeping secure on the InternetAbout Download Insight

274

Page 275: Help

3 On the IntrusionandBrowserProtection tab, underDownload Intelligence, in the Download InsightNotifications row, do one of the following:

1 To receive Download Insight notifications onlyfor the infected or the suspicious executable filesthat you download, move the DownloadInsightNotifications switch to the right to the RisksOnly position.

1 To receive Download Insight notifications forall files that you download, move the DownloadInsight Notifications switch to the left to theOn position.

4 In the Settings window, click Apply, and then clickClose.

Configuring the Download Insight Full Report optionThe Download Insight Full Report option lets youspecify when and for what type of file you want to beprompted to select a suitable action. For example, youcan specify the type of downloaded files for whichDownload Insight asks you to decide what to do withthe file and how frequently these prompts for a suitableaction must appear.

275Keeping secure on the InternetAbout Download Insight

Page 276: Help

You can use the following options to configureDownload Insight Full Report:

When you set the DownloadInsight Full Report option toAlways, Download Insightprompts you for a suitable actionin case of safe and unknownfiles. In this case, the DownloadInsight window appearswhenever you try to launch anydownloaded file that has a safeor an unknown reputation score.In this window, you can viewdetails about the file and theoptions that let you select asuitable action for the file.

In the case of unsafe files,Norton 360 identifies them asthreats and removes them.

Always

Keeping secure on the InternetAbout Download Insight

276

Page 277: Help

When you set the DownloadInsight Full Report option toUnproven Only, DownloadInsight prompts you to select asuitable action for unknown filesonly. In this case, the DownloadInsight window appearswhenever you try to launch anydownloaded file that has anunknown reputation score. Inthis window, you can viewdetails about the file and theoptions that let you select asuitable action for the file.

By default, theDownload InsightFull Report option is set toUnproven Only. In this case,Norton 360 allows the executionof the safe files withoutprompting you for a suitableaction. In the case of unsafefiles, Norton 360 identifies themas threat and removes them.

Unproven Only

277Keeping secure on the InternetAbout Download Insight

Page 278: Help

When you set the DownloadInsight Full Report option toNever, Download Insight doesnot prompt you to select asuitable action for any type offile that you download. In thiscase, the Download Insightwindow does not appearwhenever you try to launch anydownloaded file.

In case of unsafe files, Norton360 identifies them as threatand removes them.

The alert messages that yousuppress and the activity detailscan be reviewed at any time inSecurity History.

Never

To configure the Download Insight Full Report option

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the IntrusionandBrowserProtection tab, underDownload Intelligence, in the Download InsightFull Report row, do one of the following:

1 If you want Download Insight to prompt you fora suitable action in case of safe and unknownfiles, move the Download Insight Full Reportswitch to the Always position.

1 If you want Download Insight to prompts you toselect a suitable action for unknown files only,move the Download InsightFullReport switchto the Unproven Only position.

1 If you do not want Download Insight to promptyou to select a suitable action for any type of file,move the Download InsightFullReport switchto the Never position.

Keeping secure on the InternetAbout Download Insight

278

Page 279: Help

4 In the Settings window, click Apply, and then clickClose.

Turning on or turning off Alert on Poor StabilityWhen you turn on the Alert on Poor Stability option,Download Insight prompts you to select a suitableaction when you try to download an unstable file.

When you set the DownloadInsightFullReport optionto Never, Download Insight does one of the following:

1 Does not prompt you to select a suitable action forany type of file that you download if the Alert onPoor Stability option is turned off. The DownloadInsight window does not appear whenever you tryto open any downloaded file.

1 Prompts you to select a suitable action when youtry to download an unstable file if the AlertonPoorStability option is turned on. Norton 360 identifiesunsafe files as security threat and removes them.

By default, the AlertonPoorStability option is turnedoff.

To turn on or turn off Alert on Poor Stability

1 In the Norton 360 main window, click Settings.

2 On the IntrusionandBrowserProtection tab, underDownload Intelligence, in the Alert on PoorStability row, do one of the following:

1 To turn on Alert on Poor Stability, move theOn/Off switch to the left to the On position.

1 To turn off Alert on Poor Stability, move theOn/Off switch to the right to the Off position.

3 Click Apply, and then click Close.

About Norton AntiSpamNorton AntiSpam lets you categorize the emailmessages that you receive in your email programs intospam email and legitimate email. It filters legitimate

279Keeping secure on the InternetAbout Norton AntiSpam

Page 280: Help

email into the Inbox folder and spam email into theJunk folder or the Norton AntiSpam folder.

Norton AntiSpam uses Symantec enterprise-class,spam-filtering technology to classify the spam emailmessages from legitimate email messages. NortonAntiSpam uses a real-time filter delivery mechanismand filters email messages using various local filtersat different levels. The local filters classify the emailmessages as spam or legitimate. If the local filtersclassify the email message as legitimate, NortonAntiSpam collects information such as signature andURL hashes of the email message. Norton AntiSpamthen sends this information to the Symantec Webserver for additional analysis.

When the email message is classified as spam, NortonAntiSpam changes the subject of the email messageand sends it to your email client. The email clientidentifies the change in the subject of the emailmessage and moves it to the Junk folder or the NortonAntiSpam folder.

The Norton AntiSpam local filters use Whitelisttechnique, Blacklist technique, and patented filteringtechnology to classify email messages as spam orlegitimate. For these filters to work efficiently, NortonAntiSpam requires antispam definition updates atregular intervals through LiveUpdate. These updatescontain signature information of spam and legitimateemail messages. The updates also contain any new rulethat Symantec creates to filter spam email messages.

Norton AntiSpam uses predefined email rules and theuser-defined Allowed List and Blocked List, to expeditethe scanning of email. It accepts email messages fromthe list of allowed email senders and blocks emailmessages from the list of blocked email senders.

Norton AntiSpam also automatically imports the listsof addresses from supported email programs duringthe initial integration. It helps you keep your list ofallowed and blocked email senders in sync with yourcurrent address books. When Norton AntiSpam imports

Keeping secure on the InternetAbout Norton AntiSpam

280

Page 281: Help

the addresses from your Outlook address book orWindows address book, it also imports the addressesthat are available in the Safe Sender and the BlockedSender lists.

w Turning off Norton AntiSpam increases your exposureto receive unsolicited email messages. Always ensurethat Norton AntiSpam is turned on. It secures youremail client from unwanted online content.

You can review all the antispam statistics under theAntiSpam category in the Security History window.

About spam filtering featuresWith the increase in usage of email, many users receivea number of unwanted and unsolicited commercialemail messages that are known as spam. Not only doesspam make it difficult to identify valid email messages,but some spam contains offensive messages andimages.

Norton 360 provides several powerful features toreduce your exposure to unwanted online content.

Adds several options to the toolbar insupported email programs.

See “About your email programtoolbar” on page 284.

Integration withemail programs

281Keeping secure on the InternetAbout Norton AntiSpam

Page 282: Help

1 Uses a user-defined address listto expedite the scanning of email.

1 Accepts all email messages fromsenders in the Allowed List.

1 Treats all email messages fromsenders in the Blocked List asspam.

1 Allows and blocks email messagesfrom entire domains as well asindividual email addresses.

See “About Norton AntiSpam settings”on page 515.

Allowed and BlockedLists

Automatically imports lists ofaddresses from supported emailprograms to keep your list of allowedemail senders and blocked emailsenders in sync.

See “Identifying authorized senders”on page 287.

Automatic import ofaddresses

Lets you query the Symantec Webservers to filter the spam emailmessages which the local filters failto classify as spam.

See “About Web Query” on page 292.

Web Query

Updates the copies of Symantec spamdefinition files automatically.

Automatedupdateofspam definitions

Configuring Client IntegrationThe Client Integration tab lists the supported emailprograms, or clients, that are installed on yourcomputer and their associated address books. Whenyou select an email program, Norton 360 adds a NortonAntiSpam drop-down list or a few options to thetoolbar of the supported email program. You can use

Keeping secure on the InternetAbout Norton AntiSpam

282

Page 283: Help

the NortonAntiSpam drop-down list or the options toclassify the email messages as spam or legitimate. Youcan also use these options to empty the spam folderand to open the Settings window to configure theNorton AntiSpam settings. If your email program doesnot have a Junk folder, it also adds a Norton AntiSpamfolder in the folders area. You can use the NortonAntiSpam folder to sort and store spam messages.However, if your email client has a Norton AntiSpamfolder from the previous version of Norton 360, NortonAntiSpam uses the Norton AntiSpam folder and notthe Junk folder.

w The following email clients do not support clientintegration:

1 Outlook 2010 64-bit

1 Thunderbird

1 Windows Mail

When you classify an email message as spam orlegitimate, Norton AntiSpam lets you send themisclassified email message as feedback to Symantec.You can use the Feedback option to send themisclassified email message to Symantec for analysis.

You can also import the list of addresses that arepresent in the supported email program into the NortonAntiSpam Allowed List and Blocked List. NortonAntiSpam automatically adds the new email addressesfrom the address book of your supported email programonce in a day when your computer is idle. However, ifyou want to manually import addresses, use the Importoption in the Allowed List window.

When you open your email client, the welcome screenappears. If you do not want the welcome screen toappear in the future, check the Don't show this againoption before you click Close. Norton 360 notifies thesuccessful integration of Norton AntiSpam with youremail client.

Norton AntiSpam also automatically imports the listsof addresses from the supported email programs during

283Keeping secure on the InternetAbout Norton AntiSpam

Page 284: Help

the initial client integration. It helps you keep your listof allowed and blocked email senders in sync with yourcurrent address books. When Norton AntiSpam importsthe addresses from your Outlook address book orWindows address book, it also imports the addressesthat are available in the Safe Sender and the BlockedSender lists.

Norton 360 supports Norton AntiSpam integrationwith the following email programs:

1 Microsoft Outlook 2002/2003/2007/2010

1 Outlook Express 6.0 or later

w Norton 360 supports only the 32-bit version ofMicrosoft Outlook 2010.

w After successful integration, Outlook Express restartsautomatically.

To configure Client Integration

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Client Integration tab, turn on or turn offthe programs with which you want NortonAntiSpam to integrate.

4 Select one or more address books to be importedautomatically into your Allowed List.

5 Click Apply to save the changes.

About your email program toolbar

Norton AntiSpam adds a drop-down list or a fewoptions to the toolbar of supported email programs.

Keeping secure on the InternetAbout Norton AntiSpam

284

Page 285: Help

You can use the following options:

Marks the selected email as spam and movesthe email message into the Junk folder or theNorton AntiSpam folder.

When you reclassify an email message as spam,Norton 360 provides you the option to send themisclassified email message as feedback toSymantec. This option appears only if theFeedback option on the Client Integration tab,in the AntiSpam settings window, is set as AskMe.

When you reclassify an email message as spam,Norton 360 displays a message whether or notto add the sender's email address to the BlockedList. This message appears depending on theoption that you select in the drop-down listpresent at the bottom of the Blocked Listwindow.

This isSpam

Marks the selected email as allowed (not spam)and moves the email message into the Inbox.

When you reclassify an email message aslegitimate, Norton 360 provides you the optionto send the misclassified email message asfeedback to Symantec. This option appears onlyif the Feedback option on theClient Integrationtab, in the AntiSpam settings window, is set asAsk Me.

When you reclassify an email message aslegitimate, Norton 360 displays a messagewhether or not to add the sender's email addressto the Allowed List. This message appearsdepending on the option that you select in thedrop-down list present at the bottom of theAllowed List window.

This isnot Spam

Removes all email that has been placed in theJunk folder or the Norton AntiSpam folder.

EmptySpamFolder

285Keeping secure on the InternetAbout Norton AntiSpam

Page 286: Help

Displays the Norton AntiSpam settings sectionof the Norton 360 Settings window

OpenNortonAntiSpam

Setting Address Book ExclusionsWhen you add an email address to the Address BookExclusions list, Norton AntiSpam does not import theaddress into the Allowed List and Blocked List. If youdelete an email address from the Allowed List orBlocked List, Norton AntiSpam automatically adds theaddress to the Address Book Exclusions list. However,when you delete an email address that you manuallyadded to the Allowed List or Blocked List, NortonAntiSpam does not add the address to the Address BookExclusions list.

You cannot add a domain name to the Address BookExclusions list. When you delete a domain name fromthe Allowed List or Blocked List, Norton AntiSpam doesnot add the domain name to the Address BookExclusions list.

w You can specify Address Book Exclusions before youimport the address book. Add all email addresses tothe Address Book Exclusions list that you do not wantto import from the address book of your email program.

To add entries to the Address Book Exclusions list

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Filter tab, in the Address Book Exclusionsrow, click Configure.

4 In the AddressBookExclusions window, click Add.

5 In the AddEmailAddress dialog box, type the emailaddress.Optionally, type the name that corresponds to theemail address for easy identification.

6 Click OK to close the AddEmailAddress dialog box.

Keeping secure on the InternetAbout Norton AntiSpam

286

Page 287: Help

7 Click OK to save and close the Address BookExclusions window.

To edit or delete entries in the Address Book Exclusionslist

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Filter tab, in the Address Book Exclusionsrow, click Configure.

4 In the AddressBookExclusions window, select theitem with which you want to work.

5 Do one of the following:

1 To edit an entry, click Edit to open the EditEmailAddress window, edit the details, and thenclick OK.

1 To delete an entry, click Remove.

6 Click OK to save and close the Address BookExclusions window.

Identifying authorized sendersIf you are sure that an email address or domain is safeand do not want Norton AntiSpam to block them, youcan add them to the Allowed List

When your computer is idle, Norton AntiSpamautomatically imports the address book entries andSafe Sender List entries once in a day.

If you have added a new supported email program, youcan import its address book manually to your AllowedList immediately or at any time. You can also addnames and domains to the Allowed List individually.

w Before you import the address book, you can specifyyour Address Book Exclusions. Norton AntiSpam doesnot import the email addresses that you add to theAddress Book Exclusions list.

To import an address book

1 In the Norton 360 main window, click Settings.

287Keeping secure on the InternetAbout Norton AntiSpam

Page 288: Help

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Filter tab, in the Allowed List row, clickConfigure.

4 In the Allowed List window, click Import.

5 In the Allowed List window, click Apply.

6 Click OK.

To add entries to your Allowed List

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Filter tab, in the Allowed List row, clickConfigure.

4 In the Allowed List window, click Add.

5 In the Add Email Address dialog box, in theAddress Type drop-down list, select the addresstype.You can select one the following options.

1 Email

1 Domain

6 Do one of the following:

1 To add an email address, type the email addressthat you want to allow, and optionally, the nameof the sender.

1 To add a domain name, type the address of thedomain (for example, symantec.com), andoptionally, the name of the domain.

7 Click OK.

8 In the Allowed List window, click Apply.

9 Click OK

To edit or delete entries in the Allowed List

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

Keeping secure on the InternetAbout Norton AntiSpam

288

Page 289: Help

3 On the Filter tab, in the Allowed List row, clickConfigure.

4 In the Allowed List window, select the item thatyou want to edit or delete.

5 Do one of the following:

1 To edit an entry, click Edit to open the EditEmail Address dialog box, edit the details, andclick OK.

1 To delete an entry, click Remove.

When you delete an entry that was imported,Norton AntiSpam automatically adds it to theAddress Book Exclusions list.

6 In the Allowed List window, click Apply.

7 Click OK.

Identifying senders of spamIf you do not want to receive any email messages froma specific address or domain, you can add it to theBlocked List. Norton AntiSpam marks all emailmessages from this address or domain as spam.

w Norton AntiSpam also automatically imports the listsof addresses that are available in the Blocked Senderlists of your email program into the Blocked List duringthe initial client integration or address book import.

Norton AntiSpam lets you type invalid email addressesto the Blocked List.

w Always add suspicious email addresses and domainsto the Blocked List, so that you do not receiveunsolicited email messages from such addresses ordomains.

To import addresses to the Blocked List

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Filter tab, in the Allowed List row, clickConfigure.

289Keeping secure on the InternetAbout Norton AntiSpam

Page 290: Help

4 In the Allowed List window, click Import.

5 In the Allowed List window, click Apply.

6 Click OK.

To add entries to the Blocked List

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Filter tab, in the Blocked List row, clickConfigure.

4 In the Blocked List window, click Add.

5 In the Add Email Address dialog box, in theAddress Type drop-down list, select the addresstype.You can select one of the following:

1 Email

1 Domain

6 Do one of the following:

1 To add an email address, type the email addressthat you want to block, and the name of thesender.

1 To add a domain, enter the address of the domain(for example, symantec.com), and the name ofthe domain.

7 Click OK.

8 In the Blocked List window, click Apply.

9 Click OK.

To edit or delete entries in the Blocked List

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Filter tab, in the Blocked List row, clickConfigure.

4 In the Blocked List window, select the item withwhich you want to work.

Keeping secure on the InternetAbout Norton AntiSpam

290

Page 291: Help

5 Do one of the following:

1 To edit an entry, click Edit to open the EditEmail Address dialog box, edit the details, andthen click OK.

1 To delete an entry, click Remove.

When you delete an entry that was imported,Norton AntiSpam automatically adds it to theAddress Book Exclusions list.

6 In the Blocked List window, click Apply.

7 Click OK.

Setting the Feedback optionEmail messages in the email client might sometimesget wrongly classified as spam or legitimate. TheFeedback option lets you send the misclassified emailmessage as feedback to Symantec for analysis.

w The Feedback option is available only when MicrosoftOutlook or Outlook Express is installed on yourcomputer.

To set the Feedback option

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

291Keeping secure on the InternetAbout Norton AntiSpam

Page 292: Help

3 On the ClientIntegration tab, in the Feedback row,select any one from the following three options:

Automatically sends themisclassified email message toSymantec when you classify anemail message as spam orlegitimate

On

Prompts you before NortonAntiSpam sends themisclassified email message toSymantec when you classify anemail message as spam orlegitimate

Ask Me

Does not send the misclassifiedemail message to Symantec

Off

4 Click Apply.

5 Click Close.

About Web QueryWith the increase in usage of email, many users receivea number of unwanted and unsolicited commercialemail messages that are known as spam. Not only doesspam make it difficult to identify valid email messages,but some spam contains offensive messages andimages. The Web Query is a feature of Norton AntiSpamthat Norton 360 uses to classify the email messagesmore effectively.

An effective spam filtration is possible when each emailmessage that you receive is scanned through differentfilters. With only one or two levels of email filters, ahigh percentage of legitimate emails are misclassifiedas spam or spam is misclassified as legitimate. To avoidsuch misclassification, Norton AntiSpam employsdifferent filters. Each email filter uses a unique

Keeping secure on the InternetAbout Norton AntiSpam

292

Page 293: Help

approach to filter spam email messages from legitimateemail messages.

The email messages that you receive in your emailprogram undergo scanning through different localfilters of Norton AntiSpam. The local filters useWhitelist technique, Blacklist technique, and patentedfiltering technology to classify email messages aslegitimate or spam. If the local filters classify an emailmessage as spam, Norton AntiSpam changes the subjectof the email message. Norton AntiSpam then sends theemail message to your email client. If the local filtersfail to classify the email message as spam, NortonAntiSpam collects information such as signature andURL hashes of the email message. Norton AntiSpamthen sends this information to the Web Query filterfor additional analysis.

The Web Query filter analyzes the signature and URLhashes of the email message and then sends theanalysis report to Norton AntiSpam. If the emailmessage is identified as spam, Norton AntiSpam altersthe subject of the email message and sends it to youremail program. Based on predefined email rules, theemail program then moves the email message to theJunk folder or the Norton AntiSpam folder.

w Symantec recommends that you keep the Web Queryoption turned on. Turning off the Web Query optionincreases your exposure to the spam email messagesthat contain phishing or spam URLs.

Turning off or turning on Web Query

Norton AntiSpam uses local filters to identify spamemail messages. The email messages that the localfilters do not identify as spam are then scannedadditionally through the Web Query filter. Web Queryfilter analyzes the signature and URL hashes of theemail messages to classify them as legitimate email orspam email.

If the email message is identified as spam, then NortonAntiSpam alters the subject of the email message.

293Keeping secure on the InternetAbout Norton AntiSpam

Page 294: Help

Norton AntiSpam then sends the email message to youremail program. Based on predefined email rules, theemail program then moves the email message to theJunk folder or the Norton AntiSpam folder.

w Symantec recommends you to keep the Web Queryoption turned on. Turning off the Web Query optionincreases your exposure to the spam email messagesthat contain phishing or spam URLs.

To turn off the Web Query filter

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Filter tab, in the Web Query row, move theOn/Off switch to the right to the Off position.

4 Click Apply.

5 Click Close.

To turn on the Web Query filter

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Filter tab, in the Web Query row, move theOn/Off switch to the left to the On position.

4 Click Apply.

5 Click OK

About configuring POP3 and SMTP portsNorton 360 automatically configures your emailprogram to protect it from viruses and other securitythreats. Norton 360 supports all email accounts thatuse non-SSL POP3 and SMTP communication protocols.Norton 360 also scans all incoming and outgoing emailmessages.

Norton 360 lets you manually configure your POP3 andSMTP email ports for email protection. Typically, yourInternet service provider (ISP) provides you the port

Keeping secure on the InternetAbout configuring POP3 and SMTP ports

294

Page 295: Help

numbers for your email program. If the SMTP and POP3port numbers for your email program are differentfrom the default port numbers, you must configureNorton 360.

To ensure email protection, Symantec recommendsthat you check the POP3 and SMTP port numbers foryour email program. If they are not the default ports,add them to the ProtectedPorts window. To configurethe ProtectedPorts option, go to the Norton 360 mainwindow, and then click Settings > AntiSpam > Filter> Protected Ports > Configure.

If you do not want Norton 360 to protect a port, youcan remove the port from the ProtectedPortswindow.

w You cannot remove the default SMTP port 25 and POP3port 110. Norton 360 automatically protects thesedefault ports.

Adding POP3 and SMTP ports to Protected PortsNorton 360 supports all email programs that use POP3and SMTP communication protocols with default ports.However, if your email program is not configured withthe default ports, you can manually configure yourPOP3 and SMTP email ports.

To ensure email protection, the POP3 and SMTP portnumbers must be protected. If the POP3 and SMTP portnumbers are not the default ports, Symantecrecommends that you add the port numbers to theProtected Ports window.

To add POP3 and SMTP ports to Protected Ports

1 In the Norton 360 main window, click Settings.

2 In the Settings window, click AntiSpam.

3 On the Filter tab, in the Protected Ports row, clickConfigure.

4 In the Protected Ports window, click Add.

295Keeping secure on the InternetAbout configuring POP3 and SMTP ports

Page 296: Help

5 In the AddPorttoprotect window, in the PortTypedrop-down list, do one of the following:

1 To add the incoming email port, click POP3.

1 To add the outgoing email port, click SMTP.

6 In the Port box, type the port number.The port number must be between 1 and 65535.

7 Click OK.

8 In the Protected Ports window, click Apply, andthen click OK.

9 In the Settings window, click Close.

Removing an email port from Protected PortsIf you do not want Norton 360 to protect a port, youcan remove the port from the ProtectedPorts window.

w Norton 360 automatically protects the default SMTPport 25 and the default POP3 port 110. You cannotremove these default ports.

To remove an email port from Protected Ports

1 In the Norton 360 main window, click Settings.

2 In the Settings window, click AntiSpam.

3 On the Filter tab, in the Protected Ports row, clickConfigure.

4 In the Protected Ports window, click the port thatyou want to remove, and then click Remove.

5 Click Apply and then click OK.

6 In the Settings window, click Close.

About Metered Broadband ModeThe Metered Broadband Mode feature lets you set uppolicies to restrict the Internet usage of Norton 360.You can define the amount of network bandwidth thatNorton 360 can use.

You can choose a communication policy that suits yourInternet connection. If you have unlimited Internet

Keeping secure on the InternetAbout Metered Broadband Mode

296

Page 297: Help

plan, you can set up NoLimit policy so that Norton 360connects to Symantec servers to ensure completeprotection. However, if you think that Norton 360 usestoo much of your Internet connection, you can restrictthe Internet usage of Norton 360. Metered BroadbandMode helps you manage the data transfer betweenNorton 360 and your adapter.

To connect to the Internet, Norton 360 accesses thegateway through an adapter. The adapter is presenteither on your computer or on a connecting device. Theconnecting device can be a 3G phone, an Internet datacard, or a wireless network card. Metered BroadbandMode lets you set up a policy for each adapter thatNorton 360 uses to connect to the Internet.

You can set up one of the following policies for each ofthe adapter that Norton 360 uses to connect to theInternet:

1 No LimitLets Norton 360 use the network bandwidth that isrequired to ensure complete protection. Symantecrecommends that you apply this policy.

1 Critical Updates OnlyLets Norton 360 access the Internet only to receivecritical product updates or virus definitions. If youhave a limited Internet connection, you can selectthe Critical Updates Only option to ensureprotection from different security threats.

1 No TrafficLets you block Norton 360 from connecting to theInternet. If you choose this policy, Norton 360cannot receive critical virus definitions andprogram updates, which can lead to potentialdangers and virus attacks.

Turning off or turning on Metered Broadband ModeYou can set up policies to restrict the Internet usageof Norton 360. If you do not want to restrict the

297Keeping secure on the InternetAbout Metered Broadband Mode

Page 298: Help

Internet usage of Norton 360, you can turn off MeteredBroadband Mode.

If you feel that Norton 360 uses too much networkbandwidth, you can turn on MeteredBroadbandMode.Then, you can set up policies to restrict the Internetusage of Norton 360. Norton 360 connects to theInternet based on the policy that you set up in theMetered Network Settings window. By default,Metered Broadband Mode is turned on.

To turn off Metered Broadband Mode

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the Metered Broadband Mode row, move theOn/Off switch to the right to the Off position.

4 Click Apply.

5 Click Close.

To turn on Metered Broadband Mode

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the Metered Broadband Mode row, move theOn/Off switch to the left to the On position.

4 Click Apply.

5 Click Close.

Defining the Internet usage of Norton 360If you think that Norton 360 uses too much of yournetwork bandwidth, you can restrict the Internet usageof Norton 360. You can set up policy for each adapterthat Norton 360 uses to connect to the Internet.

The Metered Network Settings window lists all theadapters that your computer uses to connect theInternet. You can view the status of the adapters thatare currently in use. The network policy that you set

Keeping secure on the InternetAbout Metered Broadband Mode

298

Page 299: Help

up defines the amount of network bandwidth thatNorton 360 can use.

To define the Internet usage of Norton 360

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the Metered Broadband Mode row, move theOn/Off switch to the left to the On position.

4 Click Configure.The MeteredNetworkSettings window lists all theadapters that Norton 360 uses to connect to theInternet.

5 Under the Policy column, click the drop-down listnext to the adapter for which you want to set up apolicy.

6 Select one of the following:

1 No LimitLets Norton 360 use the network bandwidth thatis required to ensure complete protection.

1 Critical Updates OnlyLets Norton 360 access the Internet only toreceive critical product updates or virusdefinitions.

If you have a limited Internet connection, youcan select the Critical Updates Only option toensure protection from different securitythreats.

1 No TrafficLets you block Norton 360 from connecting tothe Internet. If you choose this policy, Norton360 cannot receive critical virus definitions andprogram updates, which can lead to potentialdangers and virus attacks.

7 Click Apply, and then click OK.

8 In the My Network settings window, Click Close.

299Keeping secure on the InternetAbout Metered Broadband Mode

Page 300: Help

Keeping secure on the InternetAbout Metered Broadband Mode

300

Page 301: Help

This chapter includes the following topics:

1 About securing your sensitive data

About securing your sensitive dataThe Internet provides the fastest and the easiest wayto exchange information. In spite of the manyadvantages that the Internet provides, you arevulnerable to information theft and identity theft.Information can be stolen and misused in several ways.

Following are a few of the most common methods ofinformation theft:

1 Online financial transactions

1 Unsafe online storage of sensitive information

1 Misuse of your identity while you communicateonline

The Identity Safe feature in Norton 360 offers severalpowerful ways to tackle identity theft. Identity Safe isthe best tool that you can use to safeguard your identitywhile you are online.

About Safe SurfingSafe Surfing comprises of the Antiphishing and theNorton Safe Web features. Antiphishing analyzes thesecurity level of the Web sites that you visit anddisplays the results in the Norton Site Safety pop-up

9Securing yoursensitive data

Page 302: Help

window. The Norton Safe Web feature provides you asafe search environment in the Web by displaying thesite rating icons next to every search result.

When you install Norton 360, it adds the NortonToolbar to the Internet Explorer, Firefox, or Chromebrowsers. Norton 360 protects your Web browsers whenyou turn on the Antiphishing and Norton Safe Weboptions in the SafeSurfing section under Identity Safeoption of the Norton 360 Settings window.

w The Antiphishing and Norton Safe Web features aresupported in the Internet Explorer, Firefox, or ChromeWeb browsers.

When you turn off Antiphishing and Norton Safe Web,Identity Safe may autofill fraudulent Web sites withyour confidential information. Symantec recommendsthat you do not browse the Web when Antiphishingand Norton Safe Web features are turned off.

About Antiphishing

Antiphishing protects you from visiting unsafe Websites. When Antiphishing is turned on, the Antiphishingcomponent analyzes the security level of the Web sitesthat you visit. It then displays the results in the NortonSite Safety pop-up window. Antiphishing also blocksnavigation to the Web sites that are confirmed to befraudulent.

Antiphishing provides you the following informationabout the Web sites you visit:

1 If the Web site is safe to enter confidentialinformation

1 If the Web site is fraudulent

1 If the Web site is suspicious

1 If the Web site is known to give annoying results

The Norton Site Safety pop-up window in InternetExplorer, Firefox, or Chrome Web browsers lets youview more details about the safety status of the Websites you visit.

Securing your sensitive dataAbout securing your sensitive data

302

Page 303: Help

In addition, the Norton Site Safety pop-up windowincludes information about Symantec AuthenticatedWeb sites. Web site hackers often mimic company Websites to create fraudulent Web sites. Norton 360identifies the fraudulent Web sites.

Symantec analyzes the pages of these sites and verifiesif they belong to the company that it represents. Youcan be confident that the information that you providegoes to the company with which you want to dobusiness.

You can report the evaluation of a Web site you suspectto be fraudulent to Symantec for further evaluation.Use the Report Site option from Norton Toolbar toreport a Web site. You can also report the evaluationof a Web site that you suspect to be fraudulent butAntiphishing reports as safe.

Even when you turn off the Antiphishing option,Norton 360 protects you from Internet threats throughits Norton Safe Web features. When Antiphishing isturned off, you cannot use the Report Site option inthe Norton menu to submit the evaluation of the Website to Symantec.

The Norton Site Safety pop-up window displays thefollowing messages:

1 Site is Safe

1 Site is Unsafe

1 Site Untested

1 Norton Secured

1 Caution

1 Fraudulent Site

1 Suspicious Site

1 Page Not Analyzed

Turning off or turning on Antiphishing

Antiphishing protects you from visiting unsafe Websites. The Antiphishing feature in Norton 360 analyzes

303Securing your sensitive dataAbout securing your sensitive data

Page 304: Help

the security level of all the Web sites that you visit anddisplays the results in the Norton Site Safety pop-upwindow. Antiphishing also blocks navigation to theWeb sites that are confirmed to be fraudulent.

The Norton Site Safety pop-up window helps youunderstand if the Web site that you visit is safe orunsafe.

You can turn off or turn on Antiphishing in the SafeSurfing section of the Identity Protection settingswindow.

To turn off or turn on Antiphishing

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Identity Protection.

3 In the Antiphishing row, do one of the following:

1 To turn off Antiphishing, in the Antiphishingrow, move the On/Off switch to the right to theOff position.

1 To turn on Antiphishing, in the Antiphishingrow, move the On/Off switch to the left to theOn position.

4 In the Settings window, click Apply.

5 Click Close.

Reporting an incorrect evaluation of a Web site

On rare occasions, Antiphishing may report incorrectevaluation of a Web site. For example, you might visita site that you shop with regularly and Antiphishingreports that the site is fraudulent. On the contrary, youmight visit a Web site that you suspect is a phishingsite, but Antiphishing reports that no fraud wasdetected. In either case, you can report the Web site toSymantec for further evaluation.

w The Web site you want to report to Symantec forfurther evaluation must be kept open in your Webbrowser.

Securing your sensitive dataAbout securing your sensitive data

304

Page 305: Help

To report an incorrect evaluation of a suspicious Website

1 Open your browser and go to the Web site that youthink is suspicious.

2 On the Norton Toolbar, in the Norton menu, clickReport site.

3 In the dialog box that appears, verify that the Website address and click Submit.

4 In the confirmation dialog box, click Close.

To report an incorrect evaluation of a safe Web site

1 Open your browser and go to the Web site that youthink is safe.

2 On the Norton Toolbar, in the Norton menu, clickReport site.

3 In the dialog box that appears, verify that the Website address and click Submit.

4 In the confirmation dialog box, click Close.

About Norton Safe Web

Norton Safe Web helps you surf, search, and shop moresafely on the Internet. By using Norton Safe Web, youcan check if a Web site is malicious or not even beforeyou visit it. Norton Safe Web analyzes the Web sitesyou visit and detects if there are any viruses, spyware,malware, or other security threats that exist on theWeb sites. Based on the analysis, Norton Safe Webprovides safety ratings for all the Web sites.

In addition, Norton Safe Web lets you view thecommunity rating and user reviews of the Web sitesyou visit.

w Norton Safe Web supports Internet Explorer, Firefox,or Chrome Web browsers.

You can view the site safety status of any Web siteusing the FullReport option on the NortonSiteSafetypop-up window. You can also use the CommunityBuzzoption on the Norton menu to view the safety statusof the Web sites.

305Securing your sensitive dataAbout securing your sensitive data

Page 306: Help

w The Community Buzz option is available only inEnglish-language versions of Windows.

For each Web site that you want to know the site safetystatus, Norton Safe Web lets you do the following:

1 View the Norton rating.

1 View the community rating.

1 Add your reviews.

1 View the user reviews.

1 View a list of keywords that are tagged to the Website.

1 View the threat information and the generalinformation about the Web site.

If you use a proxy server to connect to the Internet,you must configure the Network Proxy Settings ofNorton 360.

When you search the Internet using Google, Yahoo, orBing search engines, Norton Safe Web displays siterating icons next to the search results. As you movethe mouse pointer over the Norton icon, a pop-upappears with site safety and shopping safetyinformation. The pop-up displays brief informationabout the safety of the site. Norton Safe Web alsoprovides a detailed report about the safety of the WebSites you visit.

You can click the icon next to the search results or theFull Report option in the Norton Site Safety pop-upwindow to view the detailed report. The report isdisplayed on the Norton Safe Web site.

Securing your sensitive dataAbout securing your sensitive data

306

Page 307: Help

Norton Safe Web provides the following Web site safetystates when you browse through the Internet:

You can see Norton Secured iconnext to the search results.

Symantec has analyzed this pageand determined that the Website is VeriSign trusted and issafe to visit.

Norton Secured

You can see a green OK icon nextto the search results.

When you visit a Web site withthis status, you can see a similarstatus icon on the NortonToolbar. Norton Safe Web hasanalyzed this Web site anddetermined that it is safe to visit.

Site is Safe

You can see a gray questionmark icon next to the searchresults.

When you visit this Web site, theNorton Toolbar shows a greenOK icon. Norton Safe Web hasnot analyzed this Web site andit does not have sufficientinformation about this web site.As Symantec has not tested theWeb site, it is recommended thatyou do not visit this Webs site.

Site Untested

307Securing your sensitive dataAbout securing your sensitive data

Page 308: Help

You can see a red cross (x) iconnext to the search results.

When you visit a Web site withthis status, you can see a similarstatus icon on the NortonToolbar. Norton Safe Web hasanalyzed this Web site anddetermined that the Web site isunsafe to visit. This Web sitemay attempt to install malicioussoftware on your computer.

Site is Unsafe

You can see a yellow exclamationmark icon next to the searchresults.

When you visit a Web site withthis status, you can see a similarstatus icon on the NortonToolbar. Norton Safe Web hasanalyzed this Web site anddetermined that this web sitehas some threats that areclassified asAnnoyance Factors.These annoyance factors are notdangerous, but it can installunwanted applications on yourcomputer without yourpermission.

Caution

In addition to the site safety information, Norton SafeWeb provides the following shopping safetyinformation:

Norton Safe Web has analyzedthis Web site and determinedthat you can have a safeshopping experience.

Safe

Securing your sensitive dataAbout securing your sensitive data

308

Page 309: Help

Norton Safe Web does not havesufficient information about thisWeb site to provide a shoppingsafety rating.

Untested

Norton Safe Web has analyzedthis Web site and determinedthat the site has shopping risks.

Symantec recommends that youdo not visit this page. The Website may sell counterfeit itemswithout proper indication.

Risky

Norton Safe Web has analyzedthis Web site and has only someinformation about the Web siteto provide shopping safetyinformation.

The information is not sufficientto declare that the Web site issafe to shop.

Limited

When you visit any Web site that has an unsafe status,Norton Safe Web blocks that Web page. If you still wantto view the site, use the Continuetositeanyway optionthat appears on the blocked page. You can use theMalicious Site Warning Page option under SafeSurfing section of the Identity Protection settings toturn off or turn on this setting. If you turn off thisoption, Norton Safe Web does not block the unsafe Websites. However, NortonToolbar still displays the statusof these sites as unsafe even when the option is turnedoff.

In addition, Norton Safe Web protects your computerwhile you use Facebook. It scans each URL that isavailable on your Facebook Wall and displays theNorton rating icons for the scanned URLs. You can alsolet other Facebook users know about the security statusof any Web site.

309Securing your sensitive dataAbout securing your sensitive data

Page 310: Help

To scan your Facebook Wall using Norton Safe Web,use the ScanFacebookWall option. The option appearswhen you click the Run Scans option in the Taskswindow.

Turning off or turning on Norton Safe Web

Norton Safe Web protects your computer while youbrowse the Internet using Internet Explorer, Firefox,or Chrome Web browsers. It analyzes the security levelsof the Web sites that you visit and indicates if the Websites are free from threats. It provides you a safeenvironment on the Web by displaying the site ratingicons next to each search result. The site rating iconslets you know if a Web site is malicious or not evenbefore you visit it.

You can turn off or turn on Norton Safe Web in theSafe Surfing section under Identity Protectionsettings window.

To turn off or turn on Norton Safe Web

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Identity Protection.

3 In the NortonSafeWeb row, do one of the following:

1 To turn off Norton Safe Web, in the NortonSafeWeb row, move the On/Off switch to the rightto the Off position.

1 To turn on Norton Safe Web, in the NortonSafeWeb row, move the On/Off switch to the left tothe On position.

4 In the Settings window, click Apply.

5 Click Close.

Searching the Web using Norton Safe Search

Norton Safe Search enhances your Web searchexperience. When you search the Internet using NortonSafe Search, it uses Ask.com to generate the searchresults. Norton Safe Search provides the site safety

Securing your sensitive dataAbout securing your sensitive data

310

Page 311: Help

status and Norton rating for each of the search resultsgenerated.

By default, the Norton Safe Search box is disabled.After you install Norton 360 and open InternetExplorer, Firefox, or Chrome Web browsers for the firsttime, an alert message is displayed. The alert messageprompts you to enable Norton Safe Search. You canchoose to enable or disable Norton Safe Search.

Norton Safe Search provides you the intelligentsearch-as-you-type feature that displays searchsuggestions when you type a few letters of the searchphrase.

In addition, Norton Safe Search provides the followingfeatures:

When you search the Internetusing Norton Safe Search, itanalyzes the security levels ofthe Web sites and displays thesearch results.

You can use the Filter OutUnsafe Sites option in theNorton Safe Search Web site tofilter the unsafe Web sites fromthe search results. When youclick the Filter Out Unsafe Sitesoption the Unsafe Site Filteroption is turned on. By defaultthis option is turned off.

Unsafe Site Filter

311Securing your sensitive dataAbout securing your sensitive data

Page 312: Help

Norton Safe Search enables youto erase all the data that arerelated to your search activitiesfrom the Ask.com server. ThePrivacy Safeguard feature ofNorton Safe Search removes thesearch data, such as your IPaddress, user identifier, andsession identifier from theAsk.com server.

You can turn on or turn offPrivacy Safeguard using theTurnOn Privacy Safeguard and TurnOff Privacy Safeguard optionsrespectively.

Erase Search History

w Norton Safe Search feature is available only for someregions including the United States, the UnitedKingdom, Canada, Australia, and Germany. The PrivacySafeguard feature is available only for the UnitedStates, the United Kingdom, and Canada.

You can use Norton Safe Search even when you turnoff the Identity Safe features.

w Norton Safe Search is supported only in the InternetExplorer, Firefox, or Chrome Web browsers.

To search the Web using Norton Safe Search

1 Start your Web browser.

2 On the Norton Toolbar, in the Norton Safe Searchbox, type the search string that you want to search.

3 Do one of the following:

1 Click Search.

1 In the pop-up window that appears, select asearch suggestion that matches your searchstring.

Securing your sensitive dataAbout securing your sensitive data

312

Page 313: Help

About Identity SafeIdentity Safe helps you manage your identities andprovides additional security while you perform onlinetransactions.

The following features in Identity Safe provide securestorage of your sensitive information:

Stores login information, suchas your login credentials for youronline bank account, email userID, and password.

Edit Logins

Stores your personalinformation, such as addresses,date of birth, and credit cardinformation.

Edit Cards

Stores the details, such aspassport numbers and socialsecurity numbers.

Edit Notes

In addition to being a depository of sensitiveinformation, Identity Safe provides the followingfeatures:

1 Protects you from identity theft when you performonline transactions

Antiphishing also helps to protect you frommalicious Web sites when you perform onlinetransactions.

1 Manages your card information when you havemultiple credit cards to maintain

1 Safeguards the data that you save on your computer

By saving your data with a local vault, you canprevent your sensitive Identity Safe data on yourcomputer from being misused. A local vault isspecific to each of the Windows user accountspresent on your computer.

313Securing your sensitive dataAbout securing your sensitive data

Page 314: Help

1 Provides you the ease of carrying and using yourIdentity Safe data when you are on the move

By saving your data using an online vault, you canaccess your sensitive Identity Safe data from anycomputer that has Norton 360 installed.

Norton 360 adds the Norton Toolbar to the InternetExplorer, Firefox, or Chrome Web browsers. TheNorton Toolbar has the following components:

1 Norton menu

1 Norton Safe Search

1 Safe Web indicator

1 Identity Safe menu

When you have cards or logins in Identity Safe, theIdentitySafe menu displays the list of cards and logins.

w Norton 360 supports Google Chrome version 10.0 orlater.

If you turn off Identity Safe, you cannot access yourlogins and Identity Safe features from the NortonToolbar.

Norton 360 lets you view and access some of theIdentity Safe features even after the product expires.This way, you can still view your login details evenafter Norton 360 expires. However, it is not safe tobrowse the Internet after Norton 360 expires as youare vulnerable to online thefts and phishing attacks.

When your product expires, you cannot access theIdentity Safe features from the Identity Protectionsection of the Settings window. You can view andaccess these features using the Identity Safe menu orthe Norton menu that is available on the NortonToolbar.

The following are the activities that you can performafter the product expires:

1 Back up your Identity Safe data and save it as a .DATor .CSV files.

Securing your sensitive dataAbout securing your sensitive data

314

Page 315: Help

1 Open the Edit Logins window and view the loginsthat you saved.

About setting up Identity Safe

Identity Safe helps you manage your sensitiveinformation and provide additional security while youperform online transactions. The features in IdentitySafe provide a secure storage for your personalinformation such as your address, login information,passwords, and credit card details.

Identity Safe provides a secure storage for thefollowing:

1 Login information such as user IDs and passwordsof your email accounts

1 Personal information such as your address, date ofbirth, passport number, and social security number.

1 Credit card details including card number and cardexpiry date.

w You can view all the options that are available inIdentity Safe only after you set up Identity Safe.

For each Windows user account, Identity Safe lets youcreate a local vault and save your Identity Safe data.The data that you save and any of the Identity Safesettings that you configure are specific to that localvault. You cannot access the data that you save in oneWindows user account from another user account. Thisway Identity Safe protects your sensitive data frombeing misused even when you share your computerwith others.

In addition to the local vault that you create on aWindows user account, you can save your Identity Safedata in online vault.

You can access the Identity Safe data that you storedonline from any computer that meets the followingcriteria:

1 The latest version of Norton 360 must be installed.

1 The computer must be connected to the Internet.

315Securing your sensitive dataAbout securing your sensitive data

Page 316: Help

The Identity Safe data is stored online using yourNorton Account. You can create only one online vaultfor a Norton Account.

w If you have Identity Safe data that is stored on anyexternal drives from the older versions of Norton 360,you can convert that portable profile to local vault oronline vault. When you connect your external drive toyour computer, the Identity Safe menu in the NortonToolbar provides option to merge or delete the IdentitySafe data from your portable profile. You can mergethe data from the portable profile to local vault oronline vault.

Turning off or turning on Identity Safe

Identity Safe helps you manage your identity andprovides additional security while you perform onlinetransactions. You can use the various features inIdentity Safe to manage your personal data such asaddresses, date of birth and credit card information.The logins, cards, and notes help you store and useyour personal information in a secure way.

You can turn off or turn on the Identity Safe from theQuick Controls in the Settings window or from theSettings window for Identity Protection.

w After you turn on Identity Safe, you must log in toIdentity Safe to access the various features.

To turn off or turn on Identity Safe from Quick Controls

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Quick Controls, doone of the following:

1 To turn off Identity Safe, uncheck IdentitySafe.

1 To turn on Identity Safe, check Identity Safe.

To turn off Identity Safe from Settings window

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

Securing your sensitive dataAbout securing your sensitive data

316

Page 317: Help

2 In the Identity Protection settings window, in theIdentity Safe row, move the On/Off switch to theright to the Off position.

3 Click Apply.

To turn on Identity Safe from Settings window

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 In the Identity Protection settings window, in theIdentity Safe row, move the On/Off switch to theleft to the On position.

3 Click Apply.

About Identity Safe vaults

You can create one local vault for each Windows useraccount on your computer. The data that you save andthe Identity Safe settings that you make are specific tothat local vault. You cannot access the data that yousave in one Windows user account from anotherWindows user account. This way Identity Safe protectsyour sensitive data from misuse by multiple users ofyour computer.

Symantec recommends that you create separatepassword-protected Windows user accounts if you wantto share your computer with multiple users.

In addition to the local vault that you create on aWindows user account, you can save your Identity Safedata in online vault. When you move your Identity Safedata from local vault to online vault, the data in yourlocal vault is permanently removed. The Identity Safedata is stored online using your Norton Account.

You can access the Identity Safe data that you storedonline from any computer that meets the followingcriteria:

1 The latest version of Norton 360 must be installed.

1 The computer must be connected to the Internet.

You can create only one online vault for a NortonAccount.

317Securing your sensitive dataAbout securing your sensitive data

Page 318: Help

w If you have Identity Safe data that is stored on anyexternal drives from the older versions of Norton 360,you can convert that portable profile to local vault oronline vault. When you connect your external drive toyour computer, the Identity Safe menu in the NortonToolbar provides option to merge the Identity Safedata from your portable profile. You can merge thedata from the portable profile to your local vault oronline vault.

In addition to the features such as saving logins, cards,and notes, you can do the following using your IdentitySafe vault:

1 Import your Identity Safe data from the file youalready backed up. You can also import the datathat you stored in portable profile from an olderversion of the product to the current version.

1 Export your Identity Safe data to .DAT file.

1 Reset your Identity Safe.

About creating Identity Safe vaults

Identity Safe helps you manage your sensitiveinformation and provide additional security while youperform online transactions. The various features inIdentity Safe provide a secure storage for your personalinformation such as your address, login information,passwords, and credit card details.

Identity Safe lets you create one local vault perWindows user account.

In addition to the local vault, you can save your IdentitySafe data in online vault. When you move your IdentitySafe data from local vault to online vault, the data inyour local vault is permanently removed.

You can access the Identity Safe data that you storedonline from any computer that meets the followingcriteria:

1 The latest version of Norton 360 must be installed.

1 The computer must be connected to the Internet.

Securing your sensitive dataAbout securing your sensitive data

318

Page 319: Help

w You can create only one online vault for a NortonAccount. You must log in to your Norton Account tomove Identity Safe data from the local vault to theonline vault.

You can create Identity Safe vaults from the IdentitySafe section under IdentityProtectionof the Settingswindow.

Creating local vault and online vault

Identity Safe lets you create a local vault and save yourIdentity Safe data. You can create one local vault foreach Windows user account.

In addition to the local vault that you create on aWindows user account, you can save your Identity Safedata in online vault. The Identity Safe data is storedonline vault using your Norton Account.

You can access the Identity Safe data that you storedonline from any computer that meets the followingcriteria:

1 The latest version of Norton 360 must be installed.

1 The computer must be connected to the Internet.

w You can create only one online vault for a NortonAccount.

To create local vault

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Identity Protection.

3 Under IdentitySafe, in the IdentitySafeSetup row,click Configure.

4 In the Set Up Identity Safe window, in the CreatePassword box, type your password.

5 In the Confirm Password box, type the passwordagain to confirm.

6 In the Password Hint box, type a hint for thepassword.

319Securing your sensitive dataAbout securing your sensitive data

Page 320: Help

7 Uncheck Store information online through yourNorton Account.This option appears only if you log in to your NortonAccount.

8 Click Create.

9 In the IdentitySafeSetupSuccessful window, clickDone.

To create online vault

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Identity Protection.

3 Under IdentitySafe, in the IdentitySafeSetup row,click Configure.

4 Click Login to Norton Account, and enter yourNorton Account credentials. If you do not have aNorton Account, you can create a new NortonAccount usingCreateNortonAccount option in theLogin to Norton Account window.

5 In the Set Up Identity Safe window, in the CreatePassword box, type the password.You must provide a strong password to create onlinevault. You can click How to create a strongpassword? link to know more about creating strongpasswords.

6 In the Confirm Password box, type the passwordagain to confirm.

7 In the Password Hint box, type a hint for thepassword.

8 Check Store information online through yourNorton Account.This option appears only if you log in to your NortonAccount.

9 Click Create.

10 In the IdentitySafeSetupSuccessful window, clickDone.

Securing your sensitive dataAbout securing your sensitive data

320

Page 321: Help

Logging in to Norton Account

Identity Safe lets you create a local vault and an onlinevault to save your Identity Safe data. You must log into your Norton Account to create an online vault. TheIdentity Safe data is stored online using your NortonAccount.

You can access the Identity Safe data that you storedonline from any computer that meets the followingcriteria:

1 The latest version of Norton 360 must be installed.

1 The computer must be connected to the Internet.

w You can create only one online vault per NortonAccount. If you already have a Norton Account, youcan log in with your credentials or create a newaccount.

To log in to Norton Account

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Identity Protection.

3 Under IdentitySafe, in the IdentitySafeSetup row,click Configure.

4 At the bottom of the Set Up Identity Safe window,click Login to Norton Account.

5 In the Login toNortonAccount window, type yourE-mail Address and Password.

6 Click Log In.

Moving local vault to online vault

You can move the Identity Safe data from your localvault to the online vault. When you move the data fromyour local vault to online vault, all the data in yourlocal vault is removed permanently.

The MoveIdentitySafeOnline option in Identity Safehelps you to save your data online.

321Securing your sensitive dataAbout securing your sensitive data

Page 322: Help

The following are the benefits of moving your IdentitySafe data online:

1 Lets you access your Identity Safe data from anycomputer.

w Your computer must have the latest version Norton360 installed and must be connected to the Internet.

1 Lets you access your Identity Safe data from onlinevault without depending on any external drive.

1 Provides a convenient means to automaticallysynchronize Identity Safe data across differentcomputers using your Norton Account.

w You must log in to your Norton Account to move theIdentity Safe data from your local vault to online vault.

To move local vault to online vault

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Identity Protection.

3 Under IdentitySafe, in the MoveDataOnline row,click Configure.

4 In the Move Identity Safe Data Online window, inthe Enter thePassword box, type the password foryour local vault.

5 Click Login to Norton Account.

6 In the Login toNortonAccount window, type yourNorton Account user name and password, and clickLog In.

7 Click Validate.

8 In the Move Identity Safe Data Online window,click Move Data.

9 In the Move Identity Safe Data Online window,click Done.

Merging local vault to online vault

Identity Safe lets you store and manage your sensitiveinformation including your address, login information,passwords, and credit card details. You can create a

Securing your sensitive dataAbout securing your sensitive data

322

Page 323: Help

local vault and save your Identity Safe data in yourlocal computer.

In addition to the local vault that you create, you cansave your Identity Safe data in an online vault. Whenyou save your data in online vault, you can access yourIdentity Safe data from any computer that has Norton360 installed.

You can merge the Identity Safe data from your localprofile that you have created into your online vault.

w When you merge the data from local vault to onlinevault, the data from the local vault is permanentlymoved to the online vault. You can access the data fromthe online vault.

To merge local vault to online vault

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Identity Protection.

3 Under IdentitySafe, in the MoveDataOnline row,click Configure.

4 In the Move Identity Safe Data Online window, inthe Enter thePassword box, type the password foryour local vault.

5 Click LogintoNortonAccount option at the bottomof the Move Identity Safe Data Online window.

6 In the Login toNortonAccount window, type yourNorton Account user name and password, and clickLog In.

7 Click Validate.If you already have an online vault, Norton 360automatically takes you to Merge Identity SafeOnline window to merge your local vault with youronline vault.

8 In the Warning dialog box, click Yes.This window appears only if your Norton Accountalready has an online vault associated with it.

323Securing your sensitive dataAbout securing your sensitive data

Page 324: Help

9 In the Merge Identity Safe Data Online window,type your online vault password associated withyour Norton Account in the Enter the Passwordbox.

10 In the Merge Identity Safe Data Online window,click Merge.

Deleting local vault and online vault

Identity Safe lets you create a local vault and an onlinevault to save your Identity Safe data. If you no longerrequire your Identity Safe data that is stored in yourlocal vault and online vault, you can delete the vaults.When you delete the local vault and online vault, allthe Identity Safe data is permanently removed.

To delete the local vault and online vault

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Identity Protection.

3 Under Identity Safe, in the Delete Data row, clickConfigure.

4 In the Warning window, click Yes.

5 In the Settings window, click Apply.

6 Click Close.

Merging portable profile to local vault or online vault

If you have Identity Safe data that is stored on anyexternal drives from the older versions of Norton 360,you can merge that portable profile to local vault oronline vault. When you connect your external drive toyour computer, the Identity Safe menu in the NortonToolbar provides option to merge the Identity Safedata from your portable profile. You can merge thedata from the portable profile to local vault or onlinevault.

w You can merge the Identity Safe data from the portableprofile to the vault that you are currently logged in.

Securing your sensitive dataAbout securing your sensitive data

324

Page 325: Help

To merge the Identity Safe data from portable profileto local vault or online vault

1 On the Norton Toolbar, in the Identity Safe menu,click Merge Portable Data (Drive:\).This option appears only if you connect an externaldrive with portable profile.

2 In the dialog box that appears, click Yes.

3 In the Import Identity Safe Data window, underImport my data from, click Portable Profile(Drive:\).

4 In the Password box, type the password.

5 Do one of the following:

1 If you want to delete the data from the portableprofile after import, check Delete original dataonce merged.

1 If you do not want to delete the data from theportable profile after import, uncheck Deleteoriginal data once merged.

Importing logins

Identity Safe lets you import the logins that you havesaved in Internet Explorer. After you set up IdentitySafe vaults, the IdentitySafeSetupSuccessful windowappears.

You can use this window to import your logins. Theimported logins appear in the Identity Safe menu onthe Norton Toolbar and in the Edit Logins window.You can use the imported logins the same way that youuse the logins that you create.

To import logins

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under IdentitySafe, in the IdentitySafeSetup row,click Configure.

3 Set up Identity Safe.

325Securing your sensitive dataAbout securing your sensitive data

Page 326: Help

4 In the Identity Safe Setup Successful window, doone of the following:

1 Check ImportmyloginsfromInternetExplorerto import all the logins that you saved in yourWeb browser.

1 Uncheck Import my logins from InternetExplorer, if you do not want to import all thelogins that you saved in your Web browser.

5 In the IdentitySafeSetupSuccessful window, clickDone.

Resetting Identity Safe

There may be instances when you need to reset yourIdentity Safe.

You may need to reset your Identity Safe in thefollowing occasions:

1 You experience a computer failure.

1 You forget your Identity Safe password.

w If you forget your Identity Safe password, you cannotrestore it. You can only reset your Identity Safe andstore all your data again.

Norton 360 lets you enter an incorrect password threetimes. If your attempts are unsuccessful, Norton 360provides you an option to reset your Identity Safe. Ifyou reset the Identity Safe, you lose all the IdentitySafe data that you stored, such as your logininformation, cards, and notes.

To reset your Identity Safe

1 In the Norton 360 main window, click Settings.

2 In the Settings window, click Identity Protection.

3 Under Identity Safe, in the Log in to Identity Saferow, click Configure.

Securing your sensitive dataAbout securing your sensitive data

326

Page 327: Help

4 In the Enter the Password box, type your IdentitySafe password.If you forget your password, Identity Safe lets youenter wrong password three times. If your attemptsare unsuccessful, the Trouble Logging In? windowappears.

5 In the Trouble Logging In? window, click ResetIdentity Safe.If you forget the Identity Safe password of youronline vault, you need to provide your NortonAccount credentials to reset your Identity Safe.

6 In the confirmation dialog box, click Yes.

Accessing Identity Safe

You can access the Identity Safe settings from thefollowing sections of Norton 360:

1 From the Identity Safe section in the IdentityProtection settings window

1 From the Norton Toolbar

1 From the IdentityProtection section in the Norton360 main window

With Norton 360, you can access and configure someof the Identity Safe features even after the productexpires. The following are the features that you canview or access after the product expires:

You can view the Edit Loginswindow using the Identity Safemenu on the Norton Toolbar.

Although the product is expired,you can still view all the loginsthat you saved for a Web site.However, you cannot save, add,or update that logins after theproduct expires.

Edit Logins

327Securing your sensitive dataAbout securing your sensitive data

Page 328: Help

You can use this feature to takea backup of your Identity Safedata.

The data that you back up arestored as .DAT file.

Export Data

w You must be logged in to Identity Safe to access theIdentity Safe features. The Identity Safe features aresupported only in the Internet Explorer, Firefox, orChrome Web browsers.

To access Identity Safe settings from the main window

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, for the Identity Safe featurethat you want to open, click Configure.

To access Identity Safe settings from the Settingswindow

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Identity Protection.

3 Under Identity Safe, for the Identity Safe featurethat you want to open, click Configure.

To access Identity Safe settings from theNorton Toolbar

1 Start your Web browser.

2 On the Norton Toolbar, in the Norton menu, clickSettings.

3 For the Identity Safe feature that you want to open,click Configure.

Logging in to and logging out of Identity Safe

You can log in to or log out of Identity Safe from thefollowing areas of Norton 360:

1 The Identity Safe section in the Settings windowfor Identity Protection

Securing your sensitive dataAbout securing your sensitive data

328

Page 329: Help

1 The Identity section in the Norton 360 mainwindow

1 The Norton Toolbar

To secure your Identity Safe data from others, log outof Identity Safe whenever you are away from yourcomputer.

Identity Safe automatically logs you out of the currentvault, when you are logged in to your local vault oronline vault and click Identity Safe Setup to create anew vault

To view or edit your confidential data, you must belogged in to Identity Safe.

To log in to Identity Safe

1 In the Norton 360 main window, click Identity, andthen click Log in to Identity Safe.

2 In the Log in to Identity Safe window, in the Enterthe Password box, type the password of the vaultyou want to log in.

3 Click Log In.

To log out of Identity Safe

4 In the Norton 360 main window, click Identity, andthen click Logoutof IdentitySafe. You can also logout from the Settings window for IdentityProtection.

To log in to Identity Safe from the Norton Toolbar

1 Start your Web browser.

2 On the Norton Toolbar, click Identity Safe.

3 Under Identity Safe menu, click Log in to IdentitySafe.

4 In the Log in to Identity Safe window, in the Enterthe Password box, type the password of the vaultyou want to log in.

5 Click Log In.

To log out of Identity Safe from the Norton Toolbar

1 Start your Web browser.

329Securing your sensitive dataAbout securing your sensitive data

Page 330: Help

2 On the Norton Toolbar, click Identity Safe, andthen click Log out of Identity Safe.

Configuring Identity Safe settings

You can use the various features in Identity Safe tomanage your personal sensitive information. Thelogins, cards, and notes help you store and use yourinformation in a secure way.

To configure Identity Safe settings

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

Securing your sensitive dataAbout securing your sensitive data

330

Page 331: Help

2 Under Identity Safe, identify the feature that youwant to use, and click Configure. Your options are:

Lets you set up Identity Safevault.

Identity Safe Setup

You can create a local vault oran online vault and store yourIdentity Safe data.

w You must log in to yourNorton Account to create anonline vault.

331Securing your sensitive dataAbout securing your sensitive data

Page 332: Help

Lets you configure the way youwant Identity Safe to collect,store, and display the logininformation for the Web pagesyou visit.

You can configure Identity Safeto display your cards that youcreated for the Web sites thathave forms. You can alsoconfigure the autofill settings forthe Web sites that containsecurity threats.

In addition, you can do thefollowing activities:1 Configure the region for your

card information.1 Specify how you want Norton

Identity Safe to use theautofill feature.

1 Set the options that makeIdentity Safe to display amessage to notify you thatyou have inserted an externaldrive.

1 Set the options that makeIdentity Safe to warn youabout the unsafe removal ofexternal drives.

1 Turn off the browser’spassword manager

Browsing Options

Lets you change the passwordsettings and the security level ofyour Identity Safe password.

w You should change yourIdentity Safe passwordfrequently to keep your IdentitySafe data from being misused.

Password & Security

Securing your sensitive dataAbout securing your sensitive data

332

Page 333: Help

Lets you manage your personalinformation such as name, dateof birth, email address, andcredit card information in oneplace.

You can use the information thatyou store to automatically fillforms. This feature lets youprovide sensitive informationwithout typing it when you areonline. In this way, Identity Safeprotects you from keyloggersthat steal and misuse youridentity.

Edit Cards

Lets you manage your variouslogin information.

Logins include information suchas your email login credentialsand Internet bankingcredentials.

When you save all of your logininformation in the Identity Safe,you can do the following:1 Easily track all your logins

1 Quickly launch your loginWeb sites

1 View or update yourpassword for the Web site

1 Use folders to organize yourlogins

1 Change your login settings

Edit Logins

333Securing your sensitive dataAbout securing your sensitive data

Page 334: Help

Lets you store and managesensitive information.

You can save social securitynumber, driver's license number,insurance policy number, andpassport number. You can alsosave private accounts, lockcombinations, documents, notes,frequent flier numbers, bankaccount number, securitychallenge questions, and legaland financial information.

Edit Notes

Lets you back up the IdentitySafe data in .DAT or .CSV fileformats.

w You should back up all ofyour Identity Safe dataperiodically.

Export Data

Lets you import the Identity Safedata from the backed up file orfrom the portable profile thatyou have from the older versionsof Norton 360.

When you import the IdentitySafe data you have the followingoptions:

1 Merge the imported data into the vault that you arecurrently logged in.

1 Replace the existing IdentitySafe data that you stored inyour vault that you arelogged in with the importeddata.

Import Data

Securing your sensitive dataAbout securing your sensitive data

334

Page 335: Help

Lets you move your Identity Safedata that you stored in your localvault to online vault.

w When you move yourIdentity Safe data from localvault to online vault, the data inthe local vault is permanentlyremoved.

Move Data Online

Lets you permanently removethe Identity Safe vault.

Delete Data

About Edit logins

The Edit Logins feature in Identity Safe lets you viewall the logins that you want Identity Safe to manage.Login information includes information such as youremail login credentials and Internet bankingcredentials.

Identity Safe provides you the option to save yourlogins when you enter your login information in a Website's login page. You can instantly save your logininformation in Identity Safe.

w To manage your logins, you must be logged in toIdentity Safe.

Identity Safe offers the following features:

1 Safely stores Web site login information

1 Lets you save multiple IDs or accounts andpasswords for a Web site

1 Lets you organize your logins under various folders

1 Intelligently searches for a particular login

1 Lets you save the Web site name with a name otherthan the default name

1 Displays the login ID and lets you show or hide thepassword

1 Displays the strength of the password for your login

335Securing your sensitive dataAbout securing your sensitive data

Page 336: Help

1 Lets you quickly launch the Web site login page

1 Fills in your login automatically when you revisitWeb pages

1 Lets you manually add logins

1 Lets you change the URL of your saved logins

1 Lets you view the last time you made changes tothe settings of your saved logins

1 Lets you view and fill the login details that yousaved for a Web site even after Norton 360 expires.To do so, use the IdentitySafe menu on the NortonToolbar in the Web browser.

The Identity Safe features are supported in the InternetExplorer, Firefox, or Chrome Web browsers.

w Norton 360 supports Google Chrome version 10.0 orlater.

Saving logins

Logins are saved when you enter them for the firsttime. You can save multiple logins for the same Webpage. You can also save the same login for differentWeb pages.

When you provide your login credentials on a Web site,Identity Safe displays Saveyour login for this site? onthe Norton Toolbar. You can provide a name for yourlogin and select the folder in which you want to saveyour login. The folders that you create appear in theFolder drop-down list in the Save login for site dialogbox.

After Identity Safe saves a login, it automatically fillsthe login details next time you visit the Web site.

You must be logged in to Identity Safe to save and useautofill passwords. If the password or user name fieldis blank, Identity Safe does not prompt you to save thelogin.

Identity Safe lets you view and fill the login informationthat you saved for a Web site even after the product

Securing your sensitive dataAbout securing your sensitive data

336

Page 337: Help

expires. You can use the Identity Safe menu on theNorton Toolbar to view the logins.

w You can only view your saved logins after Norton 360expires, you cannot save or add any new logins.

When you try to save a login after the product expires,a pop-up window appears and suggests you to renewthe subscription of the product. You can use the pop-upto renew the subscription.

To save a login

1 Go to the Web site for which you want to save yourlogin.

2 Type your login details, and then click the optionor link that logs you in.

3 On the Norton Toolbar, in the Save your login forthis site? row, do one of the following:

1 If you want to save your login, click Save. In theSave Login for Site dialog box, type a name foryour login in the Name box, select the folder inwhich you want to save your login from theFolder drop-down list, and then click Save.

1 If you do not want to save your login this time,click Don’t Save.

1 If you never want to save your login, click Never.

To save additional logins for a Web site

1 Go to the Web page for which you want to saveanother login.Your login credentials automatically appear on theWeb page.

2 Clear the login credentials that appear on the Webpage.

3 Type the new login, and then click the option or linkthat logs you in.

4 On the Norton Toolbar, in the Save your login forthis site? row, click Save.

337Securing your sensitive dataAbout securing your sensitive data

Page 338: Help

5 In the Save Login for Site dialog box, type a namefor your login in the Name box, select the folder inwhich you want to save your login from the Folderdrop-down list.

6 Click Save.

Editing logins

Edit Logins lets you view all of the logins that you wantIdentity Safe to manage.

Edit Logins provides the following features:

1 Lets you safely store Web site login information.

1 Lets you save multiple IDs or accounts andpasswords for a Web site.

1 Lets you organize your logins under various folders.

1 Intelligently searches for a particular login.

1 Lets you save the Web site name with a name otherthan the default name.

1 Displays the login ID and lets you show or hide thepassword.

1 Displays the strength of the password for each ofthe logins.

1 Lets you quickly launch the Web site login page.

1 Fills in your login automatically when you revisitWeb pages.

1 Lets you manually add logins.

1 Lets you change the URL of your saved logins.

1 Lets you view the last time you made changes tothe settings of your saved logins.

w Edit Logins also lets you view and fill the login detailsthat you saved for a Web site even after Norton 360expires. To do so, use the Identity Safe menu on theNorton Toolbar.

To create a new folder

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

Securing your sensitive dataAbout securing your sensitive data

338

Page 339: Help

2 Under Identity Safe, in the Edit Logins row, clickConfigure.

3 In the EditLogins window, click CreateNewFolder.

4 In the New Folder dialog box, in the Enter newfolder name box, type a folder name.

5 Click OK.

6 Click Close.

To add a login manually

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Logins row, clickConfigure.

3 In the EditLogins window, click CreateNewLogin.

4 In the New Login dialog box, type the URL of theWeb site or a name for which you want to use thislogin.If it is a URL, ensure that you prefix it with HTTP.

5 Click OK.

6 In the Username dialog box, in the Enter newusername box, type the user name of the login, andthen, click OK.

7 In the Information dialog box, click OK.The Information dialog box prompts you to set apassword for the login that you created.

8 In the Edit logins window, in the Password box,type the password of your login.

9 Click Close.

10 In the Save dialog box, click Yes to save the changes.The Save dialog box appears only if you set apassword for the login that you created.

To set a password for the login that you addedmanually

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Logins row, clickConfigure.

339Securing your sensitive dataAbout securing your sensitive data

Page 340: Help

3 In the EditLogins window, under Logins, select thelogin for which you want to set a password.

4 Under Details, next to Password box, click Show.The Validate Password for Identity Safe windowappears. This window appears only if you havechanged the Identity Safe password security levelto Ask for my password before filling out a loginor form in the Password & Security window.

5 In the ValidatePasswordforIdentitySafe window,do the following:

1 In the Enter the Password box, type yourIdentity Safe password.

1 Click Validate.

6 In the Edit Logins window, in the Password box,type your Identity Safe password.

7 Click Close.

8 In the confirmation dialog box, click Yes to save thechanges.

To delete a login or a folder

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Logins row, clickConfigure.

3 In the EditLogins window, under Logins, select theWeb site name or the folder that you want to delete.

4 Click Delete.

5 In the Warning dialog box, click Yes.

6 Click Close.

Managing your URL details

Edit Logins lets you view the URL of the logins thatyou saved. You can view the URL of the Web site loginsthat you save in Edit Logins.

When you save a login, you can do the following:

1 Quickly launch the Web site login page using theURL

Securing your sensitive dataAbout securing your sensitive data

340

Page 341: Help

1 Change the URL of the login manually

Ensure that the URL you change belongs to thesame domain as the current URL.

1 View the details of the date and time when you lastmade to the Edit Logins settings

To quick-launch a login Web page

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Logins row, clickConfigure.

3 In the EditLogins window, under Logins, select thelogin for which you want to launch the Web site.If you have saved your login in a folder, double-clickthe folder and select the login.

4 Under Details, click the URL that is available nextto the Address option to launch the Web site.

5 Click Close.

To change the URL of your login

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Logins row, clickConfigure.

3 In the EditLogins window, under Logins, select thelogin for which you want to launch the Web site.

4 Under Details, click Change that is available nextto the Address option.

5 In the Update URL window, in the Enter the newURL here box, type the new URL.Ensure that the URL you modify is valid and isprefixed with HTTP.

6 Click OK.

7 In the Edit Logins window, click Close.

Changing the user name and password

Identity Safe lets you change the user name andpassword for the logins that you have saved in the Edit

341Securing your sensitive dataAbout securing your sensitive data

Page 342: Help

Logins window. The updated information isautomatically filled the next time you visit that Webpage.

To change the user name

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Logins row, clickConfigure.

3 In the EditLogins window, under Logins, select theWeb site name for which you want to change theuser name.

4 Under Details, next to Username box, clickChange.

5 In the Username dialog box, in the Enter newusername box, type the new user name.

6 Click OK.

7 In the Edit Logins window, click Close.

To change the password

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Logins row, clickConfigure.

3 In the EditLogins window, under Logins, select theWeb site name for which you want to change thepassword.

4 Under Details, next to the Password box, clickShow.The Validate Password for Identity Safe windowappears. This window appears only if you havechanged the security level of the Identity Safepassword to Askformypasswordbeforefillingoutaloginorform in the Password&Security window.

5 In the ValidatePasswordforIdentitySafe windowdo the following:

1 In the Enter the Password box, type yourIdentity Safe password.

1 Click Validate.

Securing your sensitive dataAbout securing your sensitive data

342

Page 343: Help

6 In the Edit Logins window, in the Password box,type the new password.

7 Click Close.

8 In the confirmation dialog box, click Yes to save thechanges.

Updating the password for a login

Good security practice requires that you regularlychange the password for a login. You can keep yourlogin credentials in Identity Safe updated every timeyou change your password for a Web page. The updatedinformation is automatically filled the next time youvisit that login's associated Web page.

You can also update your new login information inIdentity Safe when you are on the Web page. IdentitySafe asks you if you want to update your logins.

To update the password for a login

1 Go to the Web page for which you want to changethe password information.

2 Clear the password entry that Identity Safeautofilled.

3 Type the new password, and then click the buttonor link that logs you in.

4 In the Savenewpasswordforlogin? menu bar, clickSave.

About Edit Cards

The EditCards option in Identity Safe lets you manageyour personal information such as name, date of birth,email address, and credit card information in one place.

You can use the information that you store in the cardsto do the following:

1 Automatically fill forms

1 Provide sensitive information without having totype it while you are online

343Securing your sensitive dataAbout securing your sensitive data

Page 344: Help

In this way, Identity Safe protects you from keyloggersthat steal and misuse your identity.

w Some Web sites have forms with fields for credit cardsor other personal information. The IdentitySafe menuon the NortonToolbar lists the cards that you createdfor autofill. You can choose a card from the list to fillthe forms automatically.

You can add, view, edit, and duplicate the details of anycard that you create. You can also delete a card if it isno longer needed.

In addition, Edit Cards provides you the followingfeatures:

1 Lets you password-protect the card to protectyourself from misuse of your sensitive informationand personal information

1 Recognizes the Web pages that have forms andimmediately displays a pop-up window with the listof cards

1 Provides you a quick view of any of your cards thatis not password-protected

Identity Safe provides additional security for yourpassword-protected cards by not displaying thesummary of the card

When you are on a Web page that has forms, the Fillfields on this page? menu bar in the Norton Toolbardisplays the cards that you saved. You can click the FillForm option in the Fill fields on this page? menu barand select the card that you want to use to fill the Website. You can also use the FillwithIdentityCard optionin Identity Safe menu to select the cards.

Adding cards

The cards in the Edit Identity Cards window help youto automatically fill forms on Web sites with a singleclick. You can create cards to store information, suchas personal details, contact details, and credit carddetails. You can provide a card name to help youidentify a specific card.

Securing your sensitive dataAbout securing your sensitive data

344

Page 345: Help

If you have more than one credit card, you can createmultiple cards with different sets of information. Whenyou visit a transactional Web site, you can provide thecredit card details that are present in any of the cardsthat you created.

You can also create anonymous cards for use onunfamiliar Web sites where you may be uncomfortableproviding your personal information. You canautomatically fill online forms when you visit a Website.

To add a card

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Cards row, clickConfigure.

3 In the Edit IdentityCards window, click AddCard.

345Securing your sensitive dataAbout securing your sensitive data

Page 346: Help

4 Use the following tabs to type your card details:

Provide details such as cardname, name, gender, and dateof birth. You can set a passwordand provide additional securityfor your card.

Online form filling islanguage-specific. In theCountry/Regionbox, the countryUnited States is selected bydefault. You should change yourregion and create a new cardbefore you fill online forms forany other language.

General

Provide your contact informationin this section. Contactinformation includes your emailaddress, postal address, andphone numbers.

Contact

Provide your credit card detailssuch as the type of the card,expiration date, and cardnumber in this section. Youcannot enter a credit cardnumber of more than 16 digits.

Credit Card

5 Click Save.

6 Click Close.

Editing, deleting, or duplicating cards

All the cards that you have saved in Identity Safe arelisted in the Edit Identity Cards window. You canselect, view, duplicate, and edit the details of any cardthat you created. You can delete a card if it is no longerneeded. You can also duplicate a saved card and changeonly the fields that you want to change.

Securing your sensitive dataAbout securing your sensitive data

346

Page 347: Help

You can view a summary of the card that you created.You can select any of the cards that are present in thelist of cards at the left pane of the Edit Identity Cardswindow. When you select a card, you can view asummary of the card.

w When you lock your card with a password, IdentitySafe provides additional security to your card. Youcannot view the summary of the locked card. Youcannot edit, delete, or duplicate a card unless youprovide the password.

If you have multiple cards, use the scroll arrows tobrowse the list.

When you create, duplicate, or edit a card, the card'sregion is set to the user's default region. If you browseto a Web site other than the default region and use thecard to fill the form on that Web site, the fields maynot fill correctly. For example, your card has a defaultUnited States region but you are on a France Web page.In this case, you must use the card with France as theregion to fill the Web page form.

To edit a card

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Cards row, clickConfigure.

3 In the Edit Identity Cards window, select the cardthat you want to edit.

4 Click Edit Card.

5 Modify the required details that you want to change.

6 Click Save.

7 Click Close.

To delete a card

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Cards row, clickConfigure.

347Securing your sensitive dataAbout securing your sensitive data

Page 348: Help

3 In the Edit Identity Cards window, select the cardthat you want to delete.

4 Click Delete Card.

5 In the Warning dialog box, click Yes.

6 Click Close.

To duplicate a card

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Cards row, clickConfigure.

3 In the Edit Identity Cards window, select the cardthat you want to duplicate.

4 Click Duplicate Card.

5 Modify the details that you want to change.

6 Click Save.

7 Click Close.

About Edit Notes

Identity Safe stores and manages your sensitiveinformation. It becomes difficult to manage all of theidentity numbers that you use when you browse theWeb. The Edit Notes option in Identity Safe stores allyour sensitive IDs in a very secure way and lets youuse them easily when you are online. You can use EditNotes to save information such as social securitynumber, driver's license number, insurance policynumber, and legal and financial information.

Editing Notes

You can use the Edit Notes option in Identity Safe tostore your personal information, which you can retrieveand use when needed. You can use this information tofill out Web site registration forms. You can also view,edit, and delete the notes that you have saved.

Securing your sensitive dataAbout securing your sensitive data

348

Page 349: Help

To create Notes

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Notes row, clickConfigure.

3 In the EditNotes window, under Details, in the Titlebox, type a title for the note you want to save.If a note already exists, click CreateNewNotes, andthen under Details, in the Title box, type a title forthe note you want to save.

4 Type any additional information in the Informationbox.

5 Click Save.

6 In the Edit Notes window, click OK.

To edit Notes

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Notes row, clickConfigure.

3 In the Edit Notes window, under Title, select thetitle of the note that you want to edit.

4 Click EditNotes, and modify the information underDetails.You can change the category, modify the title, andedit the additional information that you haveprovided.

5 Click Save.

6 In the Edit Notes window, click OK.

To delete Notes

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Notes row, clickConfigure.

3 In the Edit Notes window, under Title, select thetitle of the note that you want to delete.

4 Click Delete Notes.

349Securing your sensitive dataAbout securing your sensitive data

Page 350: Help

5 In the Warning dialog box, click Yes.

6 In the Edit Notes window, click OK.

About exporting and importing Identity Safe data

You can export your Identity Safe data for securitypurposes, data recovery, or when you transfer yourIdentity Safe data to a new computer. The backup filesare saved as .DAT files.

You can protect the files that you backed up with apassword. Symantec recommends that you use apassword to keep your Identity Safe data more secure.The backup password does not need to be the same asyour Identity Safe password. You must provide thepassword when you restore the Identity Safe data thatyou backed up.

You can import your Identity Safe data from the filethat you previously backed up. You can also import theIdentity Safe data from the portable profile.

When you import the Identity Safe data you have thefollowing options:

1 Merge the imported data in to the vault that youare currently logged in.

1 Replace the existing Identity Safe data that youstored in your vault that you are logged in with theimported data.

w You can also delete the data once the import iscomplete.

Exporting your Identity Safe data

You can export your Identity Safe data for securitypurposes, data recovery, or when you transfer yourIdentity Safe data to a new computer.

You can retrieve Identity Safe data when your productexpires.

Securing your sensitive dataAbout securing your sensitive data

350

Page 351: Help

To export your Identity Safe data

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Export Data row, clickConfigure.

3 In the ExportIdentitySafeData window, select theFile Format.You can select one of the following:

1 Identity Safe Backup Format

1 Plain text

4 In the Exportmydata to box, type or browse to thelocation to which you want your data saved.

5 Type the name that you want to assign to the file.

6 If you want to back up your data with a passwordfor more security, type and confirm the password.

7 Click OK.

8 In the confirmation dialog box, click OK.

Importing your Identity Safe data

You can import your Identity Safe data from the filethat you previously backed up. You can also import theIdentity Safe data from the portable profile that yousaved in the older version of Norton 360.

You can merge the imported data in to the vault thatyou are currently logged in or replace the existingIdentity Safe data that you stored in your vault thatyou are logged in with the imported data.

w The Merge with existing data and Replace existingdata options appear only when you import IdentitySafe data from a backup file.

When you import Identity Safe data from local orportable profile, you can only merge the data. TheDeleteOriginaldataoncemerged option appears whenyou import the data from local or portable profile. Bydefault, this option is enabled.

351Securing your sensitive dataAbout securing your sensitive data

Page 352: Help

To restore your data

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Import Data row, clickConfigure.

3 In the Import Identity Safe Data window, underImport my data from, select one of the followingoptions:

1 Portable Profile (Drive: Drive:\)This option appears only if you connect anexternal drive with a portable profile.

1 Local ProfileSelect this option if you want to import theIdentity Safe data from your local vault to onlinevault. This option appears only if you are loggedin to your online vault.

1 Backup FileIf you select this option, you must type or browseto the location of the file from which you wantto import the data.

4 If you backed up your data with a password, in thePassword box, type the password.

5 If you want to import the data from a backup file,under While importing data, select one of thefollowing options:

1 Merge with existing data

1 Replace existing data

6 Click OK.

7 In the confirmation dialog box, click OK.

About Browsing Options

Browsing Options lets you configure the way you wantIdentity Safe to collect, store, and display the logininformation for the Web pages you visit. You canconfigure Identity Safe to display your cards that youcreated for the Web sites that have forms. You can also

Securing your sensitive dataAbout securing your sensitive data

352

Page 353: Help

configure the autofill settings for the Web sites thatcontain security threats.

You can configure the following options in theBrowsing Options window:

Prompts you to save the logincredentials for the Web sitesthat you visit.

Offer to savemy credentialswhen I log in to web sites

Configures Identity Safe todisplay your logins each timeyou visit a Web site that hasmultiple logins.

Displaymy Logins each timeI visit a page with multipleLogins

Autofills your login detailswhen you visit a Web site.

Autofill my logins when Ivisit websites

Displays your Identity Cardseach time you visit a Webpage with forms to fill yourpersonal details.

Display my Identity Cardseach time I visit a page withfillable form

In addition, you can use the Autofill sites containingsecurity threats option to specify how you wantIdentity Safe to respond to the Web sites that havesecurity threats. You can also turn off the browser’spassword manager using the Turn off the browser’spassword manager option.

About Password & Security

You can use Password & Security to change yourIdentity Safe password. You can also use this option toset the level of security that you want for Identity Safepassword usage.

353Securing your sensitive dataAbout securing your sensitive data

Page 354: Help

The following sections let you change the Identity Safepassword and set security levels for your password:

Change your Identity Safepassword and set a newpassword hint using theChange Password option.

Identity Safe Password

Securing your sensitive dataAbout securing your sensitive data

354

Page 355: Help

Password Security

355Securing your sensitive dataAbout securing your sensitive data

Page 356: Help

Specify the Identity Safepassword security level.

Identity Safe provides fourlevels of security to protectyour Identity Safe password.Choose one of the followingoptions:1 Ask for my password at

the beginning of eachlogin session

Prompts for your IdentitySafe password the firsttime you access IdentitySafe.

If you are logged in toWindows, you do not needto provide the passwordagain.

You should use thisoption to make your logincredentials more secure.

1 Ask for my passwordbefore filling out a loginor form

Prompts for your IdentitySafe password with everyonline form before itautofills any login.

You can specify thatindividual logins requireyour Identity Safepassword before autofilloccurs.

1 Automatically log out ofIdentity Safe if computeris inactive for

Automatically logs youout of Identity Safe whenyour computer is idle forthe time that you specify.

Securing your sensitive dataAbout securing your sensitive data

356

Page 357: Help

You can select 15, 30, or45 minutes.

Use this option if otherpeople have access toyour computer.

1 No password needed.Automatically log me inwhenWindows is started

Set this option if you wantto automatically log in toIdentity Safe whenWindows is launched.Symantec recommendsthat you do not choosethis option.

Setting this option isspecific to Windows useraccount.

1 Ask for my passwordupon resuming fromsuspend

Prompts you for yourIdentity Safe passwordwhen your systemrestores from suspendedstate.

This option preventsmisuse of your IdentitySafe data by validatingyour Identity Safepassword each time yoursystem restores fromsuspended state.w Norton360promptsyou to enter your IdentitySafe password only if youhad logged into yourIdentity Safe vault whenthe system moved to thesuspended state.

357Securing your sensitive dataAbout securing your sensitive data

Page 358: Help

w You must validate yourIdentity Safe password eachtime you change the securitylevel of the vault to a settingthat is less secure than thecurrent security level.

Changing the Identity Safe password

You should change your Identity Safe Passwordregularly to prevent unauthorized access to yourpersonal information in Identity Safe. You can changethe password by using the Password&Security optionin Settings window.

If you want to change the Identity Safe password ofyour online vault, the password you provide must havethe following characteristics:

1 At least eight characters

1 At least one capital letter

1 At least two numerals (0 through 9)

1 At least one symbol (for example, * > & $ %)

1 The password must not match with your NortonAccount user name or password.

w You can set your password hint here if you did notprovide it when you configured Identity Safe.

To change the Identity Safe password

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Password & Securityrow, click Configure.

3 In the Password & Security window, click ChangePassword.

4 In the ChangeIdentitySafePassword window, typethe current password and the new password, andconfirm the new password.

5 Click OK.

Securing your sensitive dataAbout securing your sensitive data

358

Page 359: Help

6 In the confirmation dialog box, click OK.

About Norton ToolbarWhen you install Norton 360, it adds Norton Toolbarto Internet Explorer, Firefox, and Chrome Webbrowsers.

You have the following options in the NortonToolbar:

Lets you access IdentityProtection and other settings.

The following options areavailable in the Norton menu:1 Report Site

1 Minimize Toolbar

1 Settings

1 Community Buzz

1 Go to Norton Safe Webwebsite

1 Enable Norton Safe Web

1 Enable Norton SafeSearch/DisableNortonSafeSearch

1 My Norton Account

1 Launch Tutorial

1 Help

w The Minimize Toolbaroption appears only in theInternet Explorer browser. Also,the Community Buzz option isavailable only inEnglish-language versions ofWindows.

Norton menu

359Securing your sensitive dataAbout securing your sensitive data

Page 360: Help

Lets you perform an enhancedInternet search using NortonSafe Search.

You can type a search string intheNorton Safe Search box andperform a search. When yousearch using the search box, apop-up window appears anddisplays the relevant searchresults.

Norton 360 uses the Ask.com todisplay the search results. Bydefault, theNorton Safe Searchbox is hidden. After you installNorton 360 and connect toInternet, an alert message isdisplayed. The alert messageprompts you to enable NortonSafe Search. You can choose toenable or disable Norton SafeSearch.

Norton Safe Search

Lets you know if the Web siteyou visit is safe or unsafe.

The Antiphishing and NortonSafe Web options under theSafeSurfing section on the Settingswindow of the IdentityProtection option in the mainSettings window, analyze thesecurity level of the Web sitesyou visit. It then displays theresults in theNorton Site Safetypop-up window.

Safe Web indicator

Securing your sensitive dataAbout securing your sensitive data

360

Page 361: Help

Lets you view the logins andcards that you have saved inIdentity Safe.

Some Web sites have forms tofill or require login information.You can use the Identity Safemenu to fill the details in thoseWeb sites. The Identity Safemenu displays the list of alllogins and cards that you saved.You can select a login from thelist and a use it to log in to theWeb site. You can also select acard from the list and use to fillforms.

You can use theOption submenuto manage your logins, cards,and notes and to access theIdentity Protection settingswindow. In addition, you can editand delete a login using theIdentity Safe menu.

w You should be logged in toany of the Identity Safe vault toaccess the Identity Safe menu.

Identity Safe menu

In Google Chrome Web browser, the Norton Toolbarcan be accessed as a Chrome Extension. In theExtensions page of the Chrome browser, you can enableor disable the Norton Toolbar, and uninstall theNorton Toolbar from your Chrome browser.

If the Norton Toolbar is enabled, you can access thefollowing options:

Lets you browse internet instealth mode without storingdata of your browsing sessionin browsing or downloadhistories.

Allow in incognito

361Securing your sensitive dataAbout securing your sensitive data

Page 362: Help

Lets you view the URLlocation of the downloadedfile.

Allow access to file URLs

w If you have uninstalled the NortonToolbar from yourChrome browser, you must reinstall Norton 360 toaccess the Norton Toolbar on your Chrome browseragain.

Norton 360 lets you install the NortonToolbar for freeeven after you uninstall the product. When youuninstall Norton 360, it offers to leave the NortonToolbar without any cost to search and browse safelyover the Internet. However, when you choose to installthe Norton Toolbar, the only features that you haveare Norton Safe Search and Norton Safe Web.

w Your computer must be connected to the Internet toavail this option. Norton 360 does not offer to leavethe NortonToolbar if you upgrade your product to thelatest version or choose to reinstall another Nortonproduct.

Hiding and showing the Norton Toolbar

You can hide the NortonToolbar if you do not want tosee the evaluation of every Web site that you visit.When you hide the toolbar, Norton 360 does not displaythe Norton Site Safety pop-up window. However,Norton 360 notifies you about suspicious andfraudulent Web sites or if an error needs yourattention.

To hide or show the Norton Toolbar in the InternetExplorer and FireFox Web browsers

1 At the top of your browser window, click View.

2 On the Toolbars submenu, do one of the following:

1 Uncheck Norton Toolbar to hide the toolbar.

1 Check Norton Toolbar to show the toolbar.

Securing your sensitive dataAbout securing your sensitive data

362

Page 363: Help

To hide or show the Norton Toolbar in the ChromeWebbrowser

1 At the top-right corner of your Web browser, clickthe Wrench icon.

2 In the main menu that appears, click Tools >Extensions.

3 In the Web page that appears, under Extensions, doone of the following:

1 Click Disable to hide the toolbar.

w You can also hide the Norton Toolbar byright-clicking the NortonToolbar icon near theWrench icon. However, you cannot enable theNortonToolbar using the NortonToolbar icon.

1 Click Enable to show the toolbar.

To hide the Norton Toolbar button in the Chrome Webbrowser

4 At the top-right corner of your Web browser,right-click the NortonToolbar icon, and then clickHide option.

To show the Norton Toolbar button in the Chrome Webbrowser

1 At the top-right corner of your Web browser, clickthe Wrench icon.

2 In the main menu that appears, click Tools >Extensions.

3 Under Extensions page, click Show option.

Accessing Identity Safe settings from the Norton Toolbar

When you install Norton 360, it adds the NortonToolbar to the Internet Explorer, Firefox, and ChromeWeb browsers. The IdentitySafe menu on the NortonToolbar provides quick links to access the optionsunder Identity Safe.

363Securing your sensitive dataAbout securing your sensitive data

Page 364: Help

To access the Identity Safe settings from the Nortonmenu

1 Start your Web browser.

Securing your sensitive dataAbout securing your sensitive data

364

Page 365: Help

2 On the NortonToolbar, in the Norton menu, selectone of the following:

Lets you report to Symantecabout the current Antiphishingevaluation.

Report Site

Lets you minimize the NortonToolbar.

Minimize Toolbar

When you check this option, theIdentity Safe phrase and theSafe Web phrase disappear andonly the Identity Safe and SafeWeb indicators remain.

In addition, the size of theNorton Safe Search box isreduced.

w The Minimize Toolbaroption appears only in theInternet Explorer browser.

Lets you open theIdentityProtection settings window and

Settings

configure the Identity Safeoptions.

365Securing your sensitive dataAbout securing your sensitive data

Page 366: Help

Lets you view the communitysite rating of the Web sites youvisit.

You can click Community Buzzto know further details about theWeb sites. Norton Safe Webrates the sites and providesdetailed reports. In addition, youcan see user reviews and postyour reviews about the Websites.

When you have not opened anyWeb site, you can clickCommunity Buzz to visit theNorton Safe Web site. You canprovide the address of any Website and find the security details,Norton rating, and communityreviews of the Web site.

w The Community Buzzoption is available only inEnglish-language versions ofWindows.

Community Buzz

Lets you open the Norton SafeWeb sitehttp://www.safeweb.norton.com.

Go to Norton Safe Webwebsite

Lets you turn on the Norton SafeWeb feature which provides asafe online browsing experience.

The following are the uniquefeatures of Norton Safe Web:

1 Displays the site safetyrating icons next to thesearch results

1 Displays the site safetyrating icons when you are ona Web site

Enable Norton Safe Web

Securing your sensitive dataAbout securing your sensitive data

366

Page 367: Help

Lets you view the Norton SafeSearch box.

You can type a search string inthe Norton Safe Search box andperform a search. The search boxdisplays relevant searchsuggestions in a pop-up window.

By default, the Norton SafeSearch box is hidden. After youinstall Norton 360 and openInternet Explorer, Firefox orChrome browser, an alertmessage is displayed. The alertmessage prompts you to enableNorton Safe Search. You canchoose to enable or disableNorton Safe Search. If you wantto disable Norton Safe Search,you can use the Disable NortonSafe Search option.

Enable Norton SafeSearch/ Disable NortonSafe Search

Lets you open the Web sitehttps://account.norton.com.

Norton Account lets you registeryour product with Symantec andmanage all of your Nortonproducts in one place.

My Norton Account

Lets you view the online tutorialto learn more about IdentitySafe.

Launch Tutorial

Lets you view the Norton menuhelp page.

Help

367Securing your sensitive dataAbout securing your sensitive data

Page 368: Help

Accessing the Identity Safe menu

The Identity Safe menu on the NortonToolbar lets youview and manage the logins, Identity cards, and notesthat you saved.

You can also access the Identity Protection of theSettings window using the Identity Safe menu

In addition, you can do the following:

1 Navigate to any Web site for which you have savedthe login credentials.

1 Submit feedback about your experience withIdentity Safe.

1 Export your Identity Safe data.

1 Import your Identity Safe data from the file youbacked up or from the portable profile.

1 Convert your local vault to online vault.

When you visit any login Web page without setting upyour Identity Safe, a menu bar appears in the NortonToolbar. You can use the Setup option that is availablein the menu bar to set up Identity Safe.

Identity Safe menu lets you view the logins that yousaved even after the product expires. You can use thisoption to autofill the login details of the saved login.As Antiphishing is disabled when the product isexpired, it is not recommended to autofill the logindetails. In addition, you can view the IdentityProtection settings window. However, you cannot view,access, or configure all the features in the IdentityProtection settings after Norton 360 expires.

To access your logins from the Identity Safe menu

1 Start your Web browser.

Securing your sensitive dataAbout securing your sensitive data

368

Page 369: Help

2 On the Norton Toolbar, in the Identity Safe menu,select one of the following:

Lets you merge the IdentitySafe data from your portable

Merge Portable Data(Drive:\)

profile that you have createdfrom the previous versions ofNorton 360.

w This option appears inthe Identity Safe menu onlyif you have connected anexternal drive with portableprofile.

You can select this option ifyou want to autofill the login

Stop ignoring this page

information in the currentWeb page.

w This option appears inthe Identity Safe menu onlyif you select Ignore this pageoption under Options.

Lets you view the list oflogins that you used recentlyin that computer.

Recently Used Logins

w You can view only thelatest five logins that youused.

Lets you view the list of allthe logins you have stored inIdentity Safe.

All Logins

369Securing your sensitive dataAbout securing your sensitive data

Page 370: Help

Options

Securing your sensitive dataAbout securing your sensitive data

370

Page 371: Help

Lets you view the variousoptions that are available inIdentity Safe.

The options are:1 Edit Logins

Lets you open the EditLogins window.

1 Edit Identity Cards

Lets you open the EditIdentity Cards window.

1 Edit Notes

Lets you open the EditNotes window.

1 Settings

Lets you open IdentityProtectionof theSettingswindow.

1 Export

Lets you open the ExportIdentity Safe Datawindow.

1 Import

Lets you open the ImportIdentity Safe Datawindow.

1 Move to Online

Lets you open the MoveIdentity Safe DataOnlinewindow.

You can move yourIdentity Safe data thatyou stored in your localvault to online vault. Youmust log in to your NortonAccount to move yourdata online.w This option appearsin the Identity Safemenuonly when you are logged

371Securing your sensitive dataAbout securing your sensitive data

Page 372: Help

in to your local vault.

1 Ignore this page

You can select this optionif you do not want toautofill the logininformation in the currentWeb page.

Lets you open the NortonFeedback Web site.

You can submit feedback onyour experience with IdentitySafe. You can also submit theproblems that youencountered with IdentitySafe. You can select from thelist of problems or you candescribe your problem.

Report Issue

Lets you view the logininformation that you havesaved for that Web site.

Fill Login Fields

Lets you use a card while youare on a Web page that hasforms. The option displaysthe cards that you saved fromwhich you can choose the oneyou want to use to fill theform.

w The option appears onlywhen you are on a Web sitethat has forms.

Fill with Identity Card

Securing your sensitive dataAbout securing your sensitive data

372

Page 373: Help

Lets you log out of or log into Identity Safe.

You should log out of IdentitySafe to secure your IdentitySafe data when you are awayfrom your computer.

Log in to Identity Safe/Logout of Identity Safe

373Securing your sensitive dataAbout securing your sensitive data

Page 374: Help

Securing your sensitive dataAbout securing your sensitive data

374

Page 375: Help

This chapter includes the following topics:

1 About the Network Security Map

About the Network Security MapA home network typically consists of the computersand other devices that share your Internet connection.The Network Security Map helps you view and manageyour network.

After you configure Network Security Map, Norton 360automatically detects the devices that are connectedto your network and lists them in the Network SecurityMap. You can view devices and customize the NetworkSecurity Map to remotely monitor the computers onwhich a Norton product is installed.

w Ensure that the computers that you want to remotelymonitor have a version of a Norton product thatsupports Remote Monitoring.

You can access the Network Security Map from the MyNetwork settings window.

You can monitor the following items in the NetworkSecurity Map:

1 Security status of the computers that are connectedto the network

1 Status of the protection features of the computersthat are connected to the network

10Protecting yourhome network

Page 376: Help

1 Subscription status and Norton product version ofthe computers that are connected to your network

1 Status of your wireless network connection

1 Connection status of the devices that are on thenetwork

1 The known, unknown, or intruder devices that areon your network

You can grant or deny permission to the networkeddevices to access your computer.

You can also modify details about a computer or devicethat is connected to your network.

Viewing devices on the Network Security MapThe NetworkSecurityMap window provides a pictorialrepresentation of the devices on the network to whichyour computer is connected. You can view the detailsof each device, such as device name, security status,and IP address.

The Network Security Map window also provides thesecurity status of the following computers:

1 The computer on which you view the remotemonitoring status (MY PC)

1 The computers that are remotely monitored

The trust level of the device appears at the bottom ofthe icon in the network map.

Norton 360 displays devices in the following order:

1 MY PC

1 Devices with online connection status

1 Devices with offline connection status

When you connect a new device to your network,Norton 360 automatically refreshes the NetworkSecurity Map window and displays the device.

Protecting your home networkAbout the Network Security Map

376

Page 377: Help

w Norton 360 requires you to configure the SymantecSecurity Driver to open the Network Security Map. Youcannot install the Symantec Security Driver when yourun LiveUpdate. You can either allow the NortonLiveUpdate to complete or close the Norton LiveUpdatesession before you install the Symantec Security Driver.

To view devices on the Network Security Map

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 If the Product Configuration panel appears, clickContinue.The Product Configuration panel appears whenyou click Network Security Map for the first time.The ProductConfiguration panel helps you installSymantec Security Driver that is required to viewthe NetworkSecurityMap window. The process ofinstallation of the Symantec Security Driverdisrupts your network connection temporarily.

4 Under Network Security Map, click Configure.The Network Security Overview window lets youview the summary of features of the NetworkSecurity Map. The Network Security Overviewwindow appears in the following instances:

1 When you open the Network Security Mapwindow for the first time.

1 When you turn on Welcome Screen at Startupin the Settings window.

5 If the NetworkSecurityOverview window appears,click OK.If you do not want to view the Network SecurityOverview window in the future, check Donotshowthis again before you click OK.

6 In the Network Details drop-down list, select thenetwork that lists the device for which you want tosee the details.

377Protecting your home networkAbout the Network Security Map

Page 378: Help

To view the details of a device on the Network SecurityMap

Protecting your home networkAbout the Network Security Map

378

Page 379: Help

4 In the NetworkSecurityMap window, click a deviceicon.You can use the scroll arrows to view the devicesthat are listed in the network map.The device details section that is located below thenetwork map displays the following details:

Shows the name of the deviceDevice Name

For a computer, the NetworkSecurity Map displays theNetBIOS name by default.However, the Network SecurityMap displays the name of thedevice as NEW if it meets thefollowing conditions:

1 The device does not have aNetBIOS name

1 The device has a firewall thatis enabled

You can change the device namein the Edit Device Detailswindow.

Shows the name of the networkadapter manufacturer of thedevice

Adapter Manufacturer

The adapter manufacturer'sname is based on the physicaladdress (also known as MediaControl Access address or MACaddress) of the device.

379Protecting your home networkAbout the Network Security Map

Page 380: Help

Shows the category to which thedevice belongs

The device category iconprovides details on theconnection status and securitystatus. Norton 360 labels allunknown devices as NEW andsets the category as GENERICDEVICE.

This category may includecomputer-related devices, suchas printers, media devices, andgame consoles.

You can change the devicecategory in the Edit DeviceDetails window.

Category

Shows how well your computeris protected from threats, risks,and damage

w The security statusappears only for MY PC and thecomputers that are remotelymonitored.

Security Status

Shows the connection status ofRemote Monitoring

The statuses are:

1 ON

1 OFF

You can turn off RemoteMonitoring for an individualcomputer or for all thecomputers that you remotelymonitor.

Remote Monitoring

Protecting your home networkAbout the Network Security Map

380

Page 381: Help

Shows the access level that isgranted to a remote device toconnect to your computer

The initial trust level is set basedon the configuration of yourcomputer. You can set trust levelfor all devices other thanMYPC.

Trust Level

Shows the status of theconnection

The statuses are:

1 ONLINE

1 OFFLINE

Connection

Shows the physical address (alsoknown as the Media AccessControl address or MAC address)of the computer or device

Physical Address

Shows the IP address of thecomputer or device

If you change the IP address ofa device, the updated IP addressappears in theNetwork SecurityMap window when you refreshthe list.

IP Address

Turning off or turning on Network Security OverviewThe Network Security Overview window provides abrief summary about the following features:

1 Wireless Security

1 Remote Monitoring

1 Network Map

1 Trust Controls

381Protecting your home networkAbout the Network Security Map

Page 382: Help

You can click each of the features and read thesummary to learn more about using Network SecurityMap to manage your home network. By default, theNetworkSecurityOverview window appears each timeyou open Network Security Map.

If you do not want to view the Network SecurityOverview window, you can turn it off. Turning off theNetwork Security Overview window does not affectthe performance or security of your computer.

w You can also turn off the NetworkSecurityOverviewwindow if you check Do not show this again optionthat is available at the bottom of the NetworkSecurityOverview window.

To turn off Network Security Overview

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 Under Network Security Map, in the WelcomeScreen at Startup row, move the On/Off switch tothe right to the Off position.

4 Click Apply.

5 Click Close.

To turn on Network Security Overview

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 Under Network Security Map, in the WelcomeScreen at Startup row, move the On/Off switch tothe left to the On position.

4 Click Apply.

5 Click Close.

Setting up Remote MonitoringYou can set up Remote Monitoring by allowingcomputers on your network to communicate with yourcomputer.

Protecting your home networkAbout the Network Security Map

382

Page 383: Help

w Ensure that the computers that you want to remotelymonitor have a version of a Norton product thatsupports Remote Monitoring.

Norton 360 requires a Passkey to set up RemoteMonitoring. You must type the same Passkey for allthe computers that you want to remotely monitor.

After you set up Remote Monitoring, you can connectany computer to your network and enter the samePasskey. Norton 360 automatically identifies thecomputer and connects it to the Network Security Map.

To set up Remote Monitoring

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 On the left side of the Network Security Mapwindow, under Remote Monitoring, click Setup.

5 In the Remote Monitoring Setup window, type aPasskey.The Passkey should be between 6 and 20 charactersin length. The Passkey is case sensitive.

6 Under Choose the default mode for ComputerDiscovery, select one of the following options:

Lets your computer alwaysdiscover other computers thatare connected to the network

Computer Discoveryalways on

Lets your computer discoverother computers that areconnected to the network whenthe Network Security Mapwindow is open

Computer Discovery ononly when NetworkSecurity Map screen isdisplayed

7 Click OK.

8 Set up Remote Monitoring for all other computersthat you want to monitor remotely.

383Protecting your home networkAbout the Network Security Map

Page 384: Help

Turning off Remote MonitoringWhen you turn off Remote Monitoring, you stop remotemonitoring of the computers that are connected toyour network.

You can turn off Remote Monitoring for the following:

1 All of the computers that you remotely monitor

1 An individual computer that you remotely monitor

w You can turn off Remote Monitoring only after youcomplete the Remote Monitoring Setup process.

To turn off Remote Monitoring for all computers

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 On the left side of the Network Security Mapwindow, under Remote Monitoring, click Disable.

5 In the confirmation dialog box, click Yes.

To turn off Remote Monitoring for an individualcomputer

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 In the Network Security Map window, in thenetwork map, click the computer for which you wantto disable Remote Monitoring.

5 In the device details area, next to RemoteMonitoring, click Disable.

6 In the confirmation dialog box, click Yes.

Adding a device to the Network Security MapYou can manually add a computer or device to theNetwork Security Map.

Protecting your home networkAbout the Network Security Map

384

Page 385: Help

You can add the following details when you add adevice:

1 The name or description

1 The IP address or physical address

The Network Security Map finds any computers thatare connected to your network. However, you can addthe computers and the devices that are currently notconnected.

Norton 360 adds to the Trust Control network all thedevices that you manually add to Network SecurityMap. You can select the Trust Control network in theNetwork Details drop-down list to view the devicesthat you added. You can also edit the name of thedevice.

w You cannot edit the Trust Control network details.

The default trust level of the devices that you add tothe Network Security Map is Protected. However, youcan change the trust level of the devices.

w If you trust a device that is not on your network, youcan expose your computer to potential security risks.

To add a device to the Network Security Map

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 On the left side of the Network Security Mapwindow, under Total in Network, click the plussymbol.

5 In the AddaDevice window, in the Name box, typethe name of the device that you want to add to theNetwork Security Map.The maximum character length of the device nameis 15 characters.

385Protecting your home networkAbout the Network Security Map

Page 386: Help

6 In the IP or Physical Address box, type the IPaddress or physical address of the device that youwant to add to the Network Security Map.You can use the following formats in the IP orPhysical Address box:

172.16.0.0IPv4 address

fe80::12ac:fe44:192a:14ccIPv6 address

11-22-c3-5a-fe-a4Physical address

ftp.myfiles.comResolvable host

The address that you provide is not verified untilthe device is physically found on the network.

7 Click Add Device.

Finding a computer's IP addressYou can find a computer's IP address in various ways.On Windows 2000/XP, Windows Vista, and Windows7 computers, you can use Ipconfig to find the IP addressof a computer.

Ipconfig reports the IP address of its local computeronly. You must run this program on the computer thatyou want to identify.

To find an IP address by using Ipconfig on Windows2000/XP

1 On the computer you want to identify, on theWindows taskbar, click Start > Run.

2 In the Run dialog box, type cmd.

3 Click OK.

4 At the command prompt, type ipconfig, and thenpress Enter on your keyboard.

5 Write down the IP address.

Protecting your home networkAbout the Network Security Map

386

Page 387: Help

To find an IP address by using Ipconfig onWindowsVista

1 On the computer you want to identify, on theWindows taskbar, click Start.

2 In the Start Search text box, type cmd, and thenpress Enter on your keyboard.

3 At the command prompt, type ipconfig, and thenpress Enter on your keyboard.

4 Write down the IP address.

To find an IP address by using Ipconfig on Windows 7

1 On the computer you want to identify, on theWindows taskbar, click Start.

2 In the Searchprogramsandfiles text box, typecmd,and then press Enter on your keyboard.

3 At the command prompt, type ipconfig, and thenpress Enter on your keyboard.

4 Write down the IP address.

Editing device detailsYou can change the name and category of a device thatis available on the Network Security Map. You canselect the categories such as Generic Device, Laptop,Media Device, or Game Console.

You cannot change the category of the device that youadded manually. By default, Norton 360 displays thecategory of the manually added device as USERDEFINED.

The NetworkSecurityMap window displays differenticons, depending on the category that you select. Iconshelp you identify the devices that are listed in thenetwork map.

To edit the details of the device that is on your network

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

387Protecting your home networkAbout the Network Security Map

Page 388: Help

4 In the Network Security Map window, in thenetwork map, click a device icon.

5 In the device details section, next to Device Name,click Edit.

6 In the EditDeviceDetails window, in the Name box,type a new name.The maximum character length of the device nameis 15 characters.

7 In the Category drop-down list, click one of thefollowing device categories:

1 GENERIC DEVICE

1 DESKTOP PC

1 LAPTOP

1 SERVER PC

1 NETWORK PRINTER

1 ROUTER/SWITCH

1 CABLE/DSL MODEM

1 MEDIA DEVICE

1 GAME CONSOLE

1 PDA/MOBILE PHONE

1 NETWORK STORAGE DEVICE

1 WEB CAMERA

1 TABLET

1 MUSIC PLAYER

1 TV

8 Click OK.

To edit the name of the device that you addedmanually

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 In the Network Security Map window, in theNetworkDetails drop-down list, click TrustControl.

5 In the network map, select a device that you added.

Protecting your home networkAbout the Network Security Map

388

Page 389: Help

6 In the device details area, next to DeviceName, clickEdit.

7 In the Edit Device Details dialog box, in the Namebox, type a new name.

8 Click OK.

Editing network detailsYou can view the details and change the name of yournetwork in the Edit Network Details window.

w You cannot edit the Trust Control network details.

To edit network details

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 In the NetworkSecurityMap window, on the rightside of Network Details, click Edit.

5 In the Edit Network Details dialog box, in theNetwork Name box, type a new name.

6 Click OK.

Changing the trust level of your network and devicesThe trust level determines the default level of accessthat devices on your network have to your computer.Any device on your network that is not explicitlyTrusted or Restricted uses the trust level of yournetwork. The initial network trust level is set based onthe configuration of your computer.

w Ensure that you change the trust level of a device toFull Trust, if it is a known device, and is connected toyour network.

The following conditions are necessary for the trustlevel of a device to be Shared:

1 The computer should not have a public IP address.

389Protecting your home networkAbout the Network Security Map

Page 390: Help

Your computer does not have a public IP address ifit is not directly connected to the Internet.

1 The computer should be connected to a LANthrough a secure connection.

1 The network category should be private in WindowsVista.

In addition, the trust level of a device is Shared in anyof the following cases:

1 When the computer on the network has one or morefolders or printers that are shared

1 When the computer is Media Center compatible (forexample, if you have Windows XP Media CenterEdition, Windows Vista Home Premium, WindowsVista Ultimate, Windows 7 Home Premium,Windows 7 Professional, or Windows 7 Ultimate)

w If you use a wireless network that is not secure, thedefault trust level of all the devices that are on thenetwork is Protected.

The trust level of a device also depends on the trustlevel of its network. When you change the trust levelof a network, Norton 360 assigns the same trust levelto all the devices that are connected to that network.However, Norton 360 does not change the trust levelof the devices that you individually trust or restrict.

You can modify these settings if you want to changethe trust level for the following:

1 Your network

1 Devices that are connected to the Network SecurityMap

To change the trust level of your network

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 In the NetworkSecurityMap window, on the rightside of Network Details, click Edit.

Protecting your home networkAbout the Network Security Map

390

Page 391: Help

5 In the Edit Network Details window, next to TrustLevel, click Edit.You can view the details of the network in the EditNetwork Details window before you change thetrust level.

391Protecting your home networkAbout the Network Security Map

Page 392: Help

6 To select a trust level for a network, in the EditNetwork Trust Level window, click one of thefollowing:

Adds the network to the Trustedlist

FULL TRUST

All the network traffic that yourcomputer receives from aTrusted network is filtered andallowed through firewall.However, known attacks andinfections are still monitored.You should select this settingonly when you are sure that thenetwork is completely safe.

Adds the network to the Sharedlist

SHARED

All the network traffic that yourcomputer receives from a Sharednetwork is filtered. Only sharedresources on your computer,such as files, folders, andprinters are allowed. You shouldselect this setting if you want thefirewall to protect you from alltraffic except those that pertainto file and printer sharing.

Adds the network to theProtected list

PROTECTED

A network is in the ProtectedTrust Level when it has not beenclassified as Trusted, Shared, orRestricted. You remain protectedfrom known attacks and allunexpected traffic.

Protecting your home networkAbout the Network Security Map

392

Page 393: Help

Adds the network to theRestricted list

The devices that are onRestricted network cannotcommunicate with yourcomputer. However, you can stilluse the network to browse Websites, send email messages, ortransmit other communications.

RESTRICTED

7 Click OK.

To change the trust level of a device

1 In the Norton 360 main window, click Settings.

2 In the Settings window, click My Network.

3 Under NetworkSecurityMap, in the TrustControlrow, click Configure.

4 In the Network Security Map window, do one ofthe following:

1 To edit the trust level of a device that youmanually added, in the network map, click thedevice.

1 To edit the trust level of a device that is on yournetwork, in the NetworkDetails drop-down list,click LocalAreaConnection, and then click thedevice.

5 In the device details section, next to Trust Level,click Edit.

393Protecting your home networkAbout the Network Security Map

Page 394: Help

6 To select a trust level for a device, in the EditDeviceTrust Level window, click one of the following:

Adds a device to the Full Trustlist

Full Trust devices are monitoredonly for known attacks andinfections. You should select thissetting only when you are surethat the device is completelysafe.

FULL TRUST

Adds a device to the Restrictedlist

Restricted devices do not haveaccess to your computer.

RESTRICTED

Adds a device to a default trustlevel

The devices that are removedfrom the Full Trust level orRestricted trust level take thedefault trust level of thenetwork. The trust level of thenetwork can be Full Trust,Restricted, Protected, or Shared.

USE NETWORK TRUST(trust level)

7 Click OK.Norton 360 displays the trust level status of eachrestricted device on the icon of the device.

Excluding a device from Intrusion Prevention scanThe Intrusion Prevention System in Norton 360 scansall the network traffic that enters and exits yourcomputer. When a device on your network requestsaccess your computer, Intrusion Prevention scans thisrequest to ensure that it is not a virus attack. Scanningevery request from all the devices that access your

Protecting your home networkAbout the Network Security Map

394

Page 395: Help

computer increases the scan time which slows downthe network speed of your computer.

If you know that a specific device on your network issafe, you can apply Full Trust level to this device. Inaddition, you can exclude this specific device fromIntrusion Prevention scan. When you exclude a devicefrom Intrusion Prevention scan, Norton 360 trusts thisdevice and does not scan any information that isreceived from this device. This improves the networkspeed of your computer and helps the trusted deviceto access your device quickly.

w You can exclude only full trusted devices that are onthe local subnet.

To exclude a device from Intrusion Prevention scan,you must ensure that the IP address of the device neverchanges. Norton 360 uses IP addresses to identifydevices on your home network. If the IP address of thedevice changes, Norton 360 cannot identify the trusteddevice that should be excluded from IntrusionPrevention scan.

w You can exclude a trusted device from IntrusionPrevention scan only if you are sure that the devicedoes not have any security threats.

When you apply Full Trust to a device and exclude itfrom Intrusion Prevention scan, the IP address andMAC address of the device are added to the TrustControl.

To exclude a device from Intrusion Prevention scan

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 Under My Network, in the Network Security Maprow, click Configure.

4 If the NetworkSecurityOverview window appears,click OK.

395Protecting your home networkAbout the Network Security Map

Page 396: Help

5 In the Network Security Map window, do one ofthe following:

1 To edit the trust level of a device that is on yournetwork, in the network map, click the device.

1 To edit the trust level of a device that youmanually added, in the Network Detailsdrop-down list, click Trust Control, and thenclick the device.

6 In the device details section, in the TrustLevel row,click Edit.

7 In the Edit Device Trust Level window, click FULLTRUST.

8 At the bottom of the Edit Device Trust Levelwindow, check Exclude from IPS scanning.

9 In the Exclude fromIPSScanning dialog box, clickYes to confirm.

10 Click OK.

Removing devices from the Network Security MapThe Network Security Map window lists the devicesthat are connected to your network. You can remove adevice or a computer from the Network Security Map.You can purge all devices from the network map andcreate a new list of devices. For example, you can purgeall the devices that were present in your previousnetwork before you connect to a new network. Ensurethat you disable Remote Monitoring before you purgethe network map. Norton 360 cannot purge the networkmap when the Remote Monitoring is turned on. Also,ensure that you close the Network Security Mapwindow before you purge the network map. You cannotpurge the network map when the Network SecurityMap window is open.

w Norton 360 purges the devices that you add manuallyin the Trust Control network depending upon theirtrust level. It does not purge the devices that have atrust level as Full Trust or Restricted.

Protecting your home networkAbout the Network Security Map

396

Page 397: Help

When you remove an individual device, the onlinedevices appear again the next time you open theNetwork Security Map. However, Norton 360permanently removes the offline devices.

To remove an individual device

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 In the Network Security Map window, do one ofthe following:

1 To remove a device that is on your network, inthe network map, click the device.

1 To remove a device that you manually added, inthe NetworkDetails drop-down list, select TrustControl, and then click the device.

5 On the left side of the Network Security Mapwindow, under Total in Network, click the minussymbol.

6 In the confirmation dialog box, click Yes.

To purge the Network Security Map

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 Under NetworkSecurityMap, in the NetworkMaprow, click Purge.

4 In the confirmation dialog box, click Yes.

Viewing the status of your wireless networkYou can view the status of your wireless network inthe Network Security Map window. The NetworkSecurity Map displays the status of your wirelessnetwork as secure or not secure. A secure networkrequires a strong wireless encryption. If your wirelessnetwork is not secure, you can turn on encryption onyour wireless router.

397Protecting your home networkAbout the Network Security Map

Page 398: Help

For more information on how to secure your wirelessnetwork, on the left side of the NetworkSecurityMapwindow, click the Why is it not secure link. Follow theinstructions.

w You should only trust a wireless connection that issecure. Trusting a wireless connection that is notsecure puts all of the devices on your network at risk.

To view the status of your wireless network

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the Network Security Map row, click Configure4 On the left side of the Network Security Map

window, view the status of your wireless network.Your wireless network statuses are:

Indicates that your wirelessnetwork is secure

WirelessNetwork Secure

Indicates that your wirelessnetwork is not secure

Wireless Network NotSecure

Viewing the device detailsThe Network Security Map lets you view the details ofthe computers that you remotely monitor. You canview the following details:

1 The configuration status of your protectionfeatures, such as Auto-Protect, IntrusionPrevention, and Email Scanning

1 The configuration status of your definition updates,such as Automatic LiveUpdate and Pulse Updates

1 The version number of your Norton product

1 The subscription status of your Norton product

1 The configuration status of your transactionsecurity, such as Identity Safe and Antiphishing

Protecting your home networkAbout the Network Security Map

398

Page 399: Help

1 The last five AntiVirus threats that are detected

To view the device details

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the Network Security Map row, click Configure4 In the Network Security Map window, in the

network map, click the device for which you wantto see the details.You can view the details of only the computers thatyou remotely monitor.

5 In the device details section, next to Category, clickDetails.

6 In the Device Details window, view the details ofthe device.

7 Click Close.

Modifying the communication port for NetworkSecurity Map

The Network Security Map settings lets you configurethe communication port number that Norton productsuse to communicate with each other over a network.By default, Norton products use 31077 as thecommunication port number.

If you change the communication port number of yourNorton product, you must change it on every computerthat is connected to your home network. In addition,when you find more computers that use the RemoteMonitoring Setup process, ensure that the same portnumber is used on every computer.

w Though you can modify the communication portnumber, it is recommended that you do not change thisport number. If you change the communication portnumber, you must use a port number in the range of1-65535.

399Protecting your home networkAbout the Network Security Map

Page 400: Help

Tomodify the communication port forNetwork SecurityMap

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the Communication Port box, type a newcommunication port number.You must use the same port number for each of thedevice that is connected to your Network SecurityMap.

4 Click Apply.

5 Click Close.

Protecting your home networkAbout the Network Security Map

400

Page 401: Help

This chapter includes the following topics:

1 About PC Tuneup

1 About disk and file fragmentation

1 Optimizing your permanent disks manually

1 About using optimization efficiently

1 About cleaning up disk clutter

1 Running a scan to clean up disk clutter

1 Running Registry Cleanup

1 Running Diagnostic Report

1 About Startup Manager

About PC TuneupNorton 360 offers total protection of your PC thatincludes PC Tuneup capability, which increases yourPC performance. PC Tuneup keeps your computer tunedup for peak performance.

Norton 360 keeps your PC tuned up and runningsmoothly by using various techniques, such asoptimizing your hard disk and deleting unusedtemporary files.

11Keeping your PCtuned up

Page 402: Help

PC Tuneup detects and fixes common computerproblems, cleans up unwanted cookies and files, anddefragments the hard disk to optimize PC performance.

About disk and file fragmentationYour PC's hard disk stores all of your files, applications,and the Windows operating system. Over time, the bitsof information that make up your files gradually spreadover the disk. This process is known as fragmentation.The more you use your computer, the more fragmentedyour disks become.

When a fragmented file is accessed, the diskperformance is slower. The performance is slowerbecause the drive head locates, loads, saves, and keepstrack of all of the fragments of the file. If free space isalso fragmented, the drive head might have to trackadequate free space to store temporary files or newlyadded files.

Norton 360 optimizes your permanent disks to improveyour PC's efficiency and speed. The optimizationprocess rearranges the scattered file fragments intoadjacent or contiguous clusters. When the drive headaccesses all of the file data in one location, the file isread into the memory faster. Optimization alsoconsolidates free space to avoid fragmenting newlyadded files. It adds extra space after major datastructures so that they can grow without immediatelybecoming fragmented again.

Optimizing your permanent disks manuallyOptimizing your PC's permanent disks can improveperformance and reliability. Norton 360 automaticallychecks your permanent disks for fragmentation andoptimizes them if they are more than 10 percentfragmented. You can always check the latest reportsto see if optimization is necessary.

Keeping your PC tuned upAbout disk and file fragmentation

402

Page 403: Help

w You can run Disk optimization only when disk has morethan 15 percent of free space.

Some programs, such as movie-editing programs orprograms that require large amounts of disk space, canwork more efficiently if your disks are optimized. Ifyou prefer not to wait until Norton 360 performsautomatic optimization, you can optimize your disksmanually.

w Disk optimization does not run on PC with solid statehard drive.

To optimize your permanent disks manually

1 In the Norton 360 main window, click PC Tuneup,and then click Run Disk Optimization.

2 When the activity is complete, in the Tuneupwindow, click Close.

About using optimization efficientlyNorton 360 automatically optimizes the permanentdisk in your PC as necessary and does not require youto take any action to accomplish that task. You can,however, adopt some practices that help Norton 360perform automatic optimization more efficiently.

The following practices can help make automaticoptimization more efficient:

Norton 360 performs diskoptimization when your PC isidle. If you turn off your PCwhenever you finish yourwork, Norton 360 cannotperform automaticoptimization. If you turn offyour PC during optimization,Norton 360 restarts theoptimization process whenyou turn on your PC again.

Occasionally leave your PCturned on when you do notuse the PC

403Keeping your PC tuned upAbout using optimization efficiently

Page 404: Help

Norton 360 automaticallyoptimizes the hard disk asneeded. You can also set aschedule for optimization.

Set a schedule foroptimization

Large files are often morefragmented than the smallerfiles. These fragmented filesaffect the performance ofyour computer.

Remove the large files thatyou no longer need

About cleaning up disk clutterOver time, the permanent disk in your PC canaccumulate many temporary and unneeded files.Eventually, these files can significantly reduce theavailable disk storage space and affect the performanceof your PC. Norton 360 automatically cleans upaccumulated disk clutter.

The temporary files that clutter your PC can come fromthe following sources:

When you install software onyour PC, the installationprocess creates temporaryfiles as part of theinstallation process. In somecases, the installer might notclean up these temporaryfiles when the installationfinishes.

Software installations

Keeping your PC tuned upAbout cleaning up disk clutter

404

Page 405: Help

When you browse a Webpage, your browserdownloads the text andgraphics that comprise thecontents of the page. Whenyou finish viewing the page,the browser can leave thedownloaded contents on yourPC. The downloaded contentshelp to display the Web pagemore quickly if you view thepage again. These browserfiles accumulate over time.

Web browsing

During normal operation,some programs createtemporary files to improveefficiency while you work. Ifa program ends unexpectedlybecause of a software error,those temporary files can beleft behind.

Program errors

Running a scan to clean up disk clutterA cleanup scan searches your PC's permanent disk fortemporary and unused files to improve performanceand increase available disk space. Norton 360automatically removes the temporary and the unusedfiles from your PC.

Various activities, such as extensive Web browsing ora series of software installations produce temporaryfiles. You can run a manual cleanup scan to remove thetemporary files immediately.

To clean up your disk clutter

1 In the Norton 360 main window, click PC Tuneup,and then click Run File Cleanup.

405Keeping your PC tuned upRunning a scan to clean up disk clutter

Page 406: Help

2 When the activity is complete, in the Tuneupwindow, click Close.

Running Registry CleanupThe Windows registry can contain the entries that referto files that do not exist. Such broken registry itemscan slow down your computer. Registry Cleanup scansyour computer and cleans any broken registry entriesthat it finds.

To run Registry Cleanup

1 In the Norton 360 main window, click Tasks.

2 In the Tasks window, under PCTuneupTasks, clickRun Registry Cleanup.

3 When the activity is complete, in the Tuneupwindow, click Close.

Running Diagnostic ReportNorton 360 Diagnostic Report gathers informationabout your computer, which includes the operatingsystem, programs, and hardware. You can use thisreport to find and fix the issues.

Norton 360 Diagnostic Report is a real-time report witha timestamp. Norton 360 does not generate this reportautomatically. You need to use the Run DiagnosticReport option and manually generate the report.

If Norton 360 finds any issues on your computer, youcan use the Fix Now option to resolve the issues.

You can save, email, or print the report when neededfor review.

To run Diagnostic Report

1 In the Norton 360 main window, click PC Tuneup,and then click Run Diagnostic Report.

2 When the activity is complete, view the details inDiagnostic Report window, and then click Close.

Keeping your PC tuned upRunning Registry Cleanup

406

Page 407: Help

About Startup ManagerSome programs are configured to launch during startupof your computer. The number of startup itemsincreases as you install new applications, and the timethat is required to start your computer increases as aresult. Startup Manager helps to manage the startupitems on your computer. For any startup program thatthe Startup Manager lists, you can view the detailedinformation such as CommunityUsage and ResourceUsage. You can also click the application name andview the File Insight details. These details would helpyou determine whether or not to enable an applicationduring startup.

You can use Startup Manager to manage programs withthe following extensions:

1 Windows executable files (.exe)

1 Windows System files (.sys)

1 Dynamic link library files (.dll)

1 ActiveX control files (.ocx)

Norton 360 displays the community usage details underthe following conditions:

1 When the Norton Community Watch option isturned on.

See “Turning off or turning on Norton CommunityWatch” on page 33.

1 When the Metered Broadband Mode option isconfigured to No Limit or Critical Updates Only.

See “Defining the Internet usage of Norton 360”on page 298.

Startup Manager lets you view the list of programs thatare included to the startup items. You can configureStartup Manager to run or not run these programswhen your computer starts. You can also choose todelay the start of the programs and run them manuallyfrom the Startup Manager. This way, you can enhancethe performance of your computer. You can disable a

407Keeping your PC tuned upAbout Startup Manager

Page 408: Help

program and measure the performance of yourcomputer the next time you start your computer.

Norton 360 delays the start of the delayed programsby five minutes. The first delayed program in theStartup Manager window, starts five minutes afteryou start your computer. Every subsequent delayedprogram starts with a further delay of 10 seconds.

When you uninstall or if your Norton 360 expires, theprograms that you had added to the Startup Managerare reset to their default startup setting.

Sometimes, you may see some startup programsmissing from the startup list. Norton 360 removes astartup program from the list for the following reasons:

1 When you disable a program that has a startupsetting.

1 When you update a program that can possibly resetall startup settings to default.

1 When you use another program to manage yourstartup programs.

1 When you edit the registry keys manually.

w To add a startup item, you can open your Startup folderthat is available in your Windows Start menu and addprograms as required. For more information on addingprograms in Windows Startup, go to MicrosoftTechnical Support Web site or Windows online Help.

Disabling or enabling startup itemsWhenever you start your computer, there are someprograms that automatically start and run in parallel.These programs are called startup items. The startupitems increase the start time of your computer.

Startup Manager helps you manage the startup itemsof your computer efficiently. If you do not want aprogram to automatically start when you turn on yourcomputer, you can disable the program using StartupManager. You can also delay a startup item that youwant to start at a later time.

Keeping your PC tuned upAbout Startup Manager

408

Page 409: Help

To disable startup items

1 In the Norton 360 main window, click PC Tuneup,and then click Run Startup Manager.

2 In the On/Off column, uncheck a program that youdo not want to automatically start when you turnon your computer.

3 Click Apply to save the changes.

4 Click Close.

To enable startup items

1 In the Norton 360 main window, click PC Tuneup,and then click Run Startup Manager.

2 In the On/Off column, check a program that youwant to automatically start when you turn on yourcomputer.

3 Click Apply to save the changes.

4 Click Close.

Managing startup itemsNorton 360 Startup Manager monitors and lists theprograms that automatically start when you turn onyour computer. To reduce the start time of yourcomputer and improve the performance, you can delaythe start of some of the programs when you turn onyour computer.

Norton 360 delays the start of the delayed programsby five minutes. The first delayed program in theStartup Manager window, starts five minutes afteryou start your computer. Every subsequent delayedprogram starts with a further delay of 10 seconds.

To delay startup items

1 In the Norton 360 main window, click PC Tuneup,and then click Run Startup Manager.

2 In the Delay Start column, check a program thatyou want to delay.

3 Click Apply to save the changes.

4 Click Close.

409Keeping your PC tuned upAbout Startup Manager

Page 410: Help

To run delayed startup items manually

1 In the Norton 360 main window, click PC Tuneup,and then click Run Startup Manager.

2 In the StartupManager window, click RunDelayedItems Now.

3 Wait for the program to start, and then in theStartup Manager window, click Close.

Keeping your PC tuned upAbout Startup Manager

410

Page 411: Help

This chapter includes the following topics:

1 About Norton Backup and Restore

1 About backups

1 About backup preparation

1 About backup set

1 Backing up your files

1 Restoring files

1 About Norton Backup Drive

1 About solutions to the backup problems

1 About online backup considerations

1 Turning off or turning on backup

1 Turning off or turning on backup setting options

About Norton Backup and RestoreThe Norton Backup and Restore feature protects yourimportant data and media files by regularly backingup the files. If something catastrophic happens to yourPC, you can restore your valuable information fromthe backups that Norton 360 has made.

12Protecting yourmedia and data

Page 412: Help

About backupsOne of the most important ways to protect the valuableinformation on your PC is to back up your filesregularly. In case you lose your data, Norton 360 letsyou restore them later. For example, you accidentallyerase an important file or your PC has a hardwaremalfunction that destroys some files. In this case, youcan restore your lost files from your backup.

You can also use backup to keep your PC's permanentdisk from becoming filled with old and seldom-usedfiles. After you have backed up such files, you canremove them from your PC and restore them later ifyou need to use them again.

Norton 360 lets you to conveniently back up your filesto any media that Windows recognizes as a storagedrive. The backup destination may include externaldrive, network storage folders, CD, DVD, Blu-ray disc,iPod, flash drive, cameras, smart-phones, or a host ofother devices.

For any file that you have backed up, Norton 360 letsyou view the status through the icon overlays and theBackup tab in Properties page. The icon overlays ona file show the backup status of your protected files.You can view details such as the last backup time ofeach backup set in the Backup tab of the file Propertiespage. You can turn off these options if you do not wantto view these icon overlays and the Backup details.

Norton 360 also provides a safe and a private onlinestorage environment to which you can back up yourfiles. The online storage location is different from thelocation where you normally store files in your PC.Disasters that damage or destroy your PC cannot harmyour backups because they are stored in a differentlocation. In addition, when you use the Norton 360online backup, you can restore your files from anycomputer at any time. Norton 360 must be installed inthe PC to access your Norton Account.

Protecting your media and dataAbout backups

412

Page 413: Help

No matter which backup method you choose, you canalways add or remove items from the set of files thatyou select to back up. You can add or remove anindividual file from the backup sets by using theshortcut menu that appears when you right-click a file.

About backup preparationAfter you install Norton 360, you must configureNorton 360 backup to back up your important files onyour computer. You can back up your important fileswith Norton 360 either automatically or at a time thatyou specify. You can always change the backup settingsyou initially make.

Choose the following settings when you make a backup:

You can perform the varioustasks that are related to thebackup sets such as creating,deleting, and renamingbackup sets.

You can also preview thedetails that are related to anyparticular backup set such asthe size and the availablefiles.

Summary

413Protecting your media and dataAbout backup preparation

Page 414: Help

You can choose from a varietyof file types, such as photos,documents, and music. Youcan also specify individualfiles.

You have the followingoptions:1 Sources

Lets you select a sourcefrom which you want toback up your files.

Norton Backup iscomprehensive or shortdepending on thelocations that you select.

1 File Types

Lets you include orexclude a backup filecategory.

You can add a file or afolder to the backup orexclude a file or a folderfrom the backup. You canalso use Add or excludefiles and folders optionto view the added andexcluded files and folders.In addition, you can usethe Edit File Type optionto edit file extensionswithin each file category.When you check Edit FileType, you can add, edit,or remove the fileextensions in eachBackup category by usingthe Configure option.

What

Protecting your media and dataAbout backup preparation

414

Page 415: Help

Where

415Protecting your media and dataAbout backup preparation

Page 416: Help

You can choose any storagelocation that Norton 360offers for your backuplocation, depending on yourPC and the connecteddevices.

You can choose to store yourbackups on external media,such as CD, DVD, Blu-raydisc, or iPod. You can alsostore your backups on anetwork drive, removableflash memory drive, orpermanent disk in your PC.

w Backing up your files toa location where your sourcefiles are available is not safe.You may lose your dataduring hardwaremalfunctions.

You can delete the previouslybacked-up files. You can alsodecide if you want to verifyyour backups by checking theVerify backup option.

Norton 360 also provides asecure online backup servicethat you can use to store yourbacked-up files in a safelocation on the Internet. Thisservice protects yourinformation even ifsomething catastrophichappens to your computer.

w To use the SecureOnline Storage option, youmust configure the MeteredBroadband Mode option inthe My Network window toNo Limit. The My Network

Protecting your media and dataAbout backup preparation

416

Page 417: Help

option is available in theSettings window.

You can have Norton 360back up your files when yourcomputer is idle. You can alsoset a regular backup scheduleor manually back up yourfiles.

When

When you use the Secure Online Storage option forthe first time, Norton 360 needs to be activated. Toactivate the Secure Online Storage, click the ClickheretoactivateyourSecureOnlineStorage link. The onlinebackup service that is provided with the Norton 360requires you to create a Norton Account. When youback up files online, Norton 360 requests your NortonAccount name and password, which preventsunauthorized access to your backed-up files.

Before Norton 360 runs a backup, it examines the fileson your computer so that it can back up your files moreefficiently. During this initial examination, Norton 360counts the number of files that may need to be backedup. Norton 360 also records the types and sizes of thosefiles. This process usually takes no more than a fewminutes the first time you run a backup.

About backup setNorton 360 lets you create multiple sets of backupconfigurations. The configuration is a set of rules andis called a backup set. You can specify the files that youintend to back up, the backup destination, and the timewhen you want to back up your files. You can usemultiple backup sets to back up different combinationsof files or file categories to different locations.

Multiple backup set creation helps you to use yourlimited Secure Online Storage judiciously. For example,

417Protecting your media and dataAbout backup set

Page 418: Help

you can create a backup set to back up your picturefiles and music files to a CD. You can also createanother backup set to back up your Microsoft Officedocuments and your financial files to your SecureOnline Storage.

w To use Secure Online Storage option, you mustconfigure the MeteredBroadbandMode option in theMy Network window to No Limit. The My Networkoption is available in the Settings window.

You can do the following tasks:

1 You can create multiple backup sets with differentset of rules. For example, you can create a backupset to back up your pictures to your local fixed disk.You can also create another backup set to back upyour videos to a CD. You can configure differentschedules for each backup set.

1 You can modify a backup set to include or excludefiles or file categories or to use another backupdestination to back up your files. You can changethe schedule of a backup set. You can also renamea backup set if the name does not describe thebackup set after you modify the rules.

1 You can delete a backup set if it is no longer needed.You can create a new backup set to start backingup your files from the beginning.

The Summary tab of the ManageBackupSets windowdisplays the set of rules that you have configured foreach backup set. You can select a backup set from theBackupsetname drop-down list to view the rules. Thisway, you can keep a record of the files or file categoriesthat Norton 360 backs up to different destinations. Youcan also modify the rules if required. In addition, youcan view the date and time of the last backup activityfor a backup set.

Creating a new backup setYou can create multiple backup sets with differentconfigurations. For example, you can create a backup

Protecting your media and dataAbout backup set

418

Page 419: Help

set to back up your pictures to your local fixed disk.You can create another backup set to back up yourvideos to a CD. You can also configure differentschedules for each backup set.

When you create a new backup set, Norton 360 appliesthe default configuration for the backup set. You canchange the configuration if the default configurationdoes not meet your needs.

You can identify each backup set with a backup setname. The default name of a backup set is DefaultSet.You can save a backup set with the default name aswell. But, whenever you create a new backup set, youmust provide a name for the backup set. The maximumcharacter length of a backup set name is 32alphanumeric characters. You cannot create more than10 backup sets.

To create a new backup set

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the Summary tab, under Things you can do,click Create new backup set.

3 In the window that appears, type a name for yourbackup set, and then click OK.

4 On the What tab, under File Types, select a filecategory.

5 In the Manage Backup Sets window, click SaveSettings.

Modifying or renaming a backup setWhen you create a new backup set, Norton 360 appliesthe default configuration for the backup set. You canchange the configuration if the default configurationdoes not meet your needs.

You can modify a backup set to include or exclude filesor file categories or choose another backup destinationto back up your files. You can change the schedule ofa backup set. You can also rename a backup set if the

419Protecting your media and dataAbout backup set

Page 420: Help

name does not describe the backup set after you modifythe configuration.

w The maximum character length of a backup set nameis 32 alphanumeric characters.

To modify a backup set

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the Summary tab, in the Backup set namedrop-down list, select the backup set that you wantto modify.

3 Under BackupSetSummary, view the details of thebackup set, and do the following:

1 To include or exclude files or file categories in abackup set, click What, and change the settings.

1 To change the backup destination, click Where,and change the settings.

1 To change the backup schedule, click When, andchange the settings.

4 In the Manage Backup Sets window, click SaveSettings.

To rename a backup set

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Set.

2 On the Summary tab, in the Backup set namedrop-down list, select the backup set that you wantto rename.

3 Under Thingsyoucando, click Renamebackupset.

4 In the window that appears, change the name of thebackup set, and then click OK.

5 In the Manage Backup Sets window, click SaveSettings.

About backup file categories

When Norton 360 performs a backup, it first examinesthe permanent disk of your PC for files to back up and

Protecting your media and dataAbout backup set

420

Page 421: Help

sorts them into various categories. It then backs up thefiles that fall into these categories.

Norton 360 uses the following file categories:

This category includes, but isnot limited to: PhotographicJPEG and JIFF images (.jpg,.jpeg, .jpe, .jP2, .j2k, .j2c,.jpf); Graphic InterchangeFormat image files (.gif);Bitmap Graphics files (.bmp,.pct); Tagged Image Formatfiles (.tif, .tiff); AdobePhotoDeluxe images (.pdd);Windows Metafile (.wmf);Portable (Public) NetworkGraphic files (.png);Photoshop files (.psd);Macintosh Quickdraw/PICTDrawing files (.pict);Encapsulated PostScript files(.eps); MS Foxpro Screen files(.sct); Run Length EncodedBitmap files (.rle);Device-Independent BitmapGraphic files (.dib); BorlandJBuilder Project files (.jpx);Japan Picture Format files(.jpc); Image Alchemy HSITemporary Raw Bitmap files(.raw); Pixar Picture files(.pxr); CAD files (.vda); PixarPicture File (.pxr); TARGA File(.tga); Adobe IllustratorVector Graphic (.ai); KodakPhoto CD (.pcd); Kodak RAWBitmap Image (.kdc); AdobeInDesign Document (.indd);Paint Shop Pro Image (.psp);Corel Vector Graphic Drawing(.cdr); and Targa Bitmap files(.icb, .vst).

Pictures

421Protecting your media and dataAbout backup set

Page 422: Help

This category includes, but isnot limited to: MPEG AudioStream, Layer III files (.mp3);MPEG-4 Video files (.mp4);MPEG-4 Audio Layer files(.m4a); Apple Protected AACfiles (.m4p); Real NetworksRealMedia Streaming Mediafiles (.ra); RealMediaStreaming Media files (.rm);RealMedia Metafile files(.ram); MIDI files (.rmi); MSWindows Media Audio files(.wma); MPEG-2 AdvancedAudio Coding files (.aac);Monkey's Audio LosslessAudio Compression Formatfiles (.ape); Free LosslessAudio Codec files (.flac);Waveform Audio files (.wav);MP3 Playlist files (.m3u);Musical Instrument DigitalInterface MIDI Sound files(.mid; .midi); Fast Tracker 2Extended Module files (.xm);ScreamTracker v3 Sound files(.s3m); MPEG Audio Stream,Layer I (.mp1); WindowsMedia Player Playlist (.wpl);Playlist (.pls); Audio Codec 3File (.a3c); Audio InterchangeFile Format (.aif, .aifc, .aiff);and MPEG Audio Stream,Layer II (.mp2).

Music

Protecting your media and dataAbout backup set

422

Page 423: Help

This category includes, but isnot limited to: MicrosoftMoney files (.mny, .mn1,.mn2, .mn3, .mn4, .mn5,.mn6, .mn7, .mn8, .mn9,.mn10, .mn11, .mn12, .mn13,.mn14, .mn15, .mbf);TurboTax Tax Return files(.tax); H&R Tax Return files(.t01, .t02, .t03, .t04, .t05,.t06); TaxACT files (.ta0, .ta1,.ta2, .ta3, .ta4, .ta5, .ta8,.ta9); QuickBooks files (.qba,.qbb, .qbi, .qbw, .qbx, .qph,.qdf, .qdb, .qif, .qsd, .qel,.qph, q00, q01, .q02, .q03,.q04, .q05, .Q98); Olicom Faxfiles (.ofx); Quicken Data File(.qdt); Simply Accounting File(.sdb); and Open FinancialConnectivity files (.ofc).

Financial Files

423Protecting your media and dataAbout backup set

Page 424: Help

This category includes, but isnot limited to: MicrosoftWindows Media files (.wmv);Apple QuickTime Video Clipfiles (.mov); MPEG 1 SystemStream files (.mpg, .mpeg);Macromedia Flash Formatfiles (.swf); Audio VideoInterleave files (.avi); MSAdvanced Streaming Formatfiles (.asf); Beijer E-Designerfiles (.mpa); MPEG Movie Clipfiles (.mpe); MPEG-4 Videofiles (.m4v); Digital Video File(.dv); Ogg Vorbis CompressedVideo File (.ogm); Open MediaFormat File (.omf) MPEG-1Video File (.m1v); MPEG-2Program Stream Format File(.m2p); MPEG-2 Video OnlyFile (.m2v); QuickTime Movie(.moov); MPEG-1 Video File(.mpv); QuickTime Movie (.qt);VDOScript File (.vdo); andDVD Video Movie File (.vob).

Video

Protecting your media and dataAbout backup set

424

Page 425: Help

This category includes, but isnot limited to: MicrosoftWord documents andtemplates (doc, .dot);Microsoft Excel Worksheetand templates (.xls, .xlt,.xlam); Microsoft PowerPointPresentation and Slideshowfiles (.ppt, .pps); MicrosoftProject files (.mpp); AdobeAcrobat files (.pdf); Text files(.txt); PostScript files (.ps);HyperText Markup Languagefiles (.htm, .html); MicrosoftHTML documents (.mht);WildTangent Branded .PNGfiles (.wpg);Comma-Separated Variablestext files (.csv); andWordPerfect PC Suitedocuments (.wpd).

Office Documents

This category includes, but isnot limited to: MicrosoftOutlook Personal Folder files(.pst); Microsoft ExchangeMail messages (.msg);Microsoft Outlook ExpressE-mail or Windows Mail(.dbx); Netscape Mail E-mailMessage files (.snm); MediaStream Broadcast (.msb);Mailbox Message File (.mbx);Microsoft Outlook RulesWizard File (.rwz); MicrosoftOutlook Express ElectronicMail (.eml); First ReaderSaved Message Folder (.fol);and (.MsMessageStore).

Email

425Protecting your media and dataAbout backup set

Page 426: Help

This category includes, but isnot limited to: MicrosoftOutlook Address Book files(.wab); Microsoft PersonalAddress Book files (.pab);Palm Address Book files(.aba); Beijer E-Designer files(.mpa); Palm Date Book files(.tda); vCard files (.vcf);Microsoft Outlook AddressBook (.oab); MicrosoftPhonebook (.pbk); PalmDateBook File (.dba); andSharp Organizer TelephoneBank (.ozp).

Contacts

This category includes, but isnot limited to: InternetLocation files (.url) thatappear on the InternetExplorer Favorites menu.

Internet Favorites

This category includes thefiles that you specifically addto the backup. The categoryalso includes the files thatNorton 360 cannot add to anyof its file categories.

Other File Types

About backup file extensions

A file extension is a string of characters that isappended to the name of a file and is used to identifythe file format. Norton 360 uses the file extension toback up the files that are present on your computerinto different categories. Each backup file categorycontains a list of default file extensions. When you runa backup, Norton 360 identifies the files that are basedon the file extensions and backup file categories. Forexample, if you want to back up the documents with a

Protecting your media and dataAbout backup set

426

Page 427: Help

.fm file extension in the Office Documents category,you can add the .fm file extension to the category.

The Edit File Type option on the What tab of theManage Backup Sets window lets you add, edit, orremove file extensions in each backup category. Whenyou check Edit File Type, the Configure option thatappears next to each backup category lets you edit fileextensions in that category.

You can use the EditFileType option on the What tabof the ManageBackupSets window to do the following:

1 You can view the file extensions that are alreadylisted in a backup file category.

This option helps to ensure that the list has theextensions of files that you intended to back up.

1 You can add a file extension to the list or edit a fileextension that is present in the list.

This option helps to ensure that the next time whenyou run backup, Norton 360 must back up the fileswith the extensions that you added.

1 You can remove a file extension from the existinglist or a file extension that you added.

This option helps to ensure that Norton 360 doesnot back up the unintended files, the next time yourun backup.

1 You can reset a file category to its default fileextensions.

This option helps to restore the changes you madeto a backup file category.

w The file extensions are independent of a backup set. Ifyou change a file extension in a backup file category,the change applies to all backup sets.

Adding or editing a file extension in a backup filecategory

Each backup file category contains a list of fileextensions. However, you can add a file extension to abackup file category. Norton 360 identifies the files

427Protecting your media and dataAbout backup set

Page 428: Help

with the file extension that you added and backs themup to that file category. For example, if you want toback up the documents with a .fm file extension in theOffice Documents category, you can add the .fm fileextension to that category.

You can also edit an existing file extension or a fileextension that you added.

The maximum character length of a file extension is10 characters.

To add a file extension to a backup file category

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the What tab, next to FileTypes, check EditFileType.

3 Under File Types, next to a file category, clickConfigure.

4 In the window that appears, click Add New.

5 Type the file extension that you want to add.

6 Click OK.

7 Click Save.

To edit a file extension in a backup file category

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the What tab, next to FileTypes, check EditFileType.

3 Under File Types, next to a file category, clickConfigure.

4 In the window that appears, select the file extensionthat you want to edit, and then click Edit.

5 Edit the file extension.

6 Click OK.

7 Click Save.

Protecting your media and dataAbout backup set

428

Page 429: Help

Removing a file extension fromabackup category

Each backup file category contains a list of fileextensions. However, you can remove a default fileextension or a file extension that you added to a backupfile category. Norton 360 identifies the files with thefile extension that you removed and does not back themup the next time that you run backup. For example,you do not want to back up the documents with a .rtffile extension in the Office Documents category. Inthis case, you can remove the .rtf file extension fromthat category.

To remove a file extension from a backup category

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the What tab, next to FileTypes, check EditFileType.

3 Under File Types, next to a file category, clickConfigure.

4 In the window that appears, select the file extension,and then click Remove.

5 Click Save.

Resetting a backup category to default fileextensions

You can reset a file category to its default list of fileextension. When you reset a file category, Norton 360restores the default file extension that you removedpreviously and remove the file extensions that youadded.

To reset a backup category to default file extensions

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the What tab, next to FileTypes, check EditFileType.

3 Under File Types, next to a file category, clickConfigure.

429Protecting your media and dataAbout backup set

Page 430: Help

4 In the window that appears, click Reset Defaults.

5 Click Save.

Deleting previously backed up files

You can delete the files that you backed up previouslyfrom your backup location. You can also delete the filesif the files are no longer useful for you and you have alimited space on your backup location. You can alsodelete backed up files if you changed the file categoryfor a backup set. You may want to delete previouslybacked up files before you run a backup.

You can delete the previously backed up files from thefollowing locations:

1 Summary tab

1 Where tab

When the backed up files are deleted, the backup detailsof the files that belong to the backup set that you deletealso changes. For example, the icon overlays and theBackup tab in the file properties of the file no longerappear.

w You cannot delete a backup set if only one backup setis available.

You can also uncheck the backup category if you nolonger want to back up the files that you deleted.

Deleting previously backed up files is particularlyhelpful if you want to free some space on your SecureOnline Storage.

w To delete files from your online backup, you mustconfigure the MeteredBroadbandMode option in theMy Network window to No Limit. The My Networkoption is available in the Settings window.

To delete previously backed up files from the Summarytab

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

Protecting your media and dataAbout backup set

430

Page 431: Help

2 On the Summary tab, in the Backup set namedrop-down list, select the backup set that you wantto delete.

3 Under Things you can do, click Delete backup set.

4 In the Delete Backup Set window, select one of thefollowing:

Lets you remove the backupset.

Delete backup set

Lets you remove the backupset and the files that areavailable in the backup set.

Delete backup set and files

5 Click Yes to confirm.

Todelete previously backedup files from theWhere tab

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the Where tab, click Delete Backed up Files.

3 In the window that appears, in the drop-down list,select the backup set from which you want to deletethe previously backed up files.This window appears when you have more than onebackup set.

4 Click OK.

5 In the window that appears, in the left pane, selectthe file category that contains the files.You can also select the Folders category to selectthe folders that you want to delete.

6 Check the files that you want to delete.

7 To view the files that you selected, on the left pane,click Selected Files.

8 Click Delete Selected.

9 In the confirmation dialog box, click Yes.

10 Click Close.

431Protecting your media and dataAbout backup set

Page 432: Help

Adding files and folders to a backup set

You are not limited to backing up the files that Norton360 automatically detects and places into its filecategories. You can add files to the set of files to bebacked up, and you can exclude files from being backedup as well.

Norton 360 lets you select a file or folder from yourcomputer that you want to include in your backup. TheAdd or exclude files and folders option on the Whattab in the Manage Backup Sets window provides youthe options to add files and folders to a backup set.

You can also right-click a file or a folder and add it toa backup set using the Norton 360 option on theshortcut menu. The shortcut menu is available afteryou configure your backup and when the ManageBackupSets window and the RestoreFiles window areclosed. When you add a file to the backup set, Norton360 lists the information in the window that appearswhen you click Addorexcludefilesandfolders option.You can view all the files and folders that you addedto the backup.

You can also remove an addition from the list of itemsthat is included or excluded from backup by using theRemove from list option. This option is available inthe window that appears when you click Addorexcludefiles and folders.

w To add files to your online backup, you must configurethe Metered Broadband Mode option in the MyNetwork window to NoLimit. The MyNetwork optionis available in the Settings window.

To add a file to a backup set

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the What tab, click Add or exclude files andfolders.

3 In the window that appears, click Include File.

Protecting your media and dataAbout backup set

432

Page 433: Help

4 In the file selection window that appears, navigateto file that you want to add, click to select it, andthen click Open.

5 Click OK.

6 In the Manage Backup Sets window, click SaveSettings to save the settings.

To add a folder to a backup set

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the What tab, click Add or exclude files andfolders.

3 In the window that appears, click Include Folder.

4 In the folder selection window that appears,navigate to the folder that you want to add, and thenclick OK.

5 Click OK.

6 In the Manage Backup Sets window, click SaveSettings to save the settings.

To add a file or folder to a backup set in WindowsExplorer

1 In Windows Explorer, right-click the file or folder,select Norton 360 > Add to Backup.The Add to Backup option in the shortcut menu isenabled only after you configure your backup andwhen the ManageBackupSets window and RestoreFiles window are closed.

2 Click the backup set to which you want to add thefile or the folder.

Excluding files and folders from a backup set

Norton 360 lets you exclude backing up the files thatNorton 360 automatically detects and places into itsfile categories or a complete file category. The Add orexcludefilesandfolders option on the What tab in theManageBackupSets window provides you the optionsto exclude files and folders to a backup set.

433Protecting your media and dataAbout backup set

Page 434: Help

You can exclude a file or folder from the backup setfrom Windows Explorer by using the shortcut menu.The shortcut menu is available after you configure yourbackup and when the Manage Backup Sets windowand the Restore Files window are closed. When youexclude a file from the backup set, Norton 360 lists theinformation in the window that appears when you clickAdd or exclude files and folders option. You can viewall the files that you excluded from the backup.

You can also remove an exclusion from the list of itemsthat is included or excluded from backup by using theRemove from list option. This option is available inthe window that appears when you click Addorexcludefiles and folders.

To exclude a file from a backup set

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the What tab, click Add or exclude files andfolders.

3 In the window that appears, click Exclude File.

4 In the file selection window that appears, navigateto the file that you want to exclude, and then clickOpen.

5 Click OK.

6 In the Manage Backup Sets window, click SaveSettings to save the settings.

To exclude a folder from a backup set

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the What tab, click Add or exclude files andfolders.

3 In the window that appears, click Exclude Folder.

4 In the folder selection window that appears,navigate to the folder that you want to exclude, andthen click OK.

5 Click OK.

Protecting your media and dataAbout backup set

434

Page 435: Help

6 In the Manage Backup Sets window, click SaveSettings to save the settings.

To exclude a file or folder fromabackup set inWindowsExplorer

1 In Windows Explorer, right-click the file, clickNorton 360 > Exclude from Backup.The Exclude from Backup option in the shortcutmenu is enabled only after you configure yourbackup and when the ManageBackupSets and theRestore Files windows are closed.

2 Click the backup set from which you want to excludethe file or the folder.

About backup locations

Norton 360 can back up your files to several kinds ofstorage locations. The speed, safety, and quantity ofyour backup depend on the choice of your location. Noone backup location is the best in all situations and forall users.

You can choose any storage location that Norton 360offers for your backup location, depending on your PCand the connected devices. Use the information in the

435Protecting your media and dataAbout backup set

Page 436: Help

following table to choose a location that best meetsyour needs for safety, speed, and storage capacity:

Secure Online Storage

Protecting your media and dataAbout backup set

436

Page 437: Help

Your subscription to Norton 360comes with an allocation ofstorage space on a secure serverthat is located on the Internet.This location is the safest, mostsecure backup choice availablebecause it stores yourinformation in a remote location.As a consequence, even thedisasters that might damage ordestroy your PC cannot affectyour backups. Online backupscan take place automatically, aslong as your PC has an activeInternet connection. However,you require a reasonably fastInternet connection.

You can configure the Internetbandwidth that backup uses toback up your files usingBandwidth Throttle on theWhere tab of the ManageBackup Sets window.

You can alter the followingbandwidth throttle states:1 Fastest (recommended)

1 High usage

1 Moderate usage

1 Low usage

You can buy more online storagespace whenever you want.

w To use the Secure OnlineStorage option, you mustconfigure the MeteredBroadband Mode option in theMyNetworkwindow toNoLimit.The My Network option isavailable in theSettingswindow.

437Protecting your media and dataAbout backup set

Page 438: Help

This choice backs your files upto a special folder on drive C ofyour PC. Backing up to drive C isvery quick and convenient, andis only limited to the amount offree space available on yourdrive. You can run automaticbackups with this choice.

Backing up to drive C is aconvenient but an unsafe backupmethod. Any mechanicalproblem that the drive mightexperience can damage bothyour original files and yourbackups.

If you use drive C for quick andautomatic backups, you mustback up your files occasionallyto a different drive or anotherlocation.

C: (Local Fixed Disk)

This choice provides for fast,convenient backups. You can runautomatic backups and alwayshave access to your backed upfiles as long as the drive isconnected to your PC.

Although using another drive issafer than using drive C, doingso still leaves your data at riskfrom any PC hardwaremalfunctions.

If you choose to back up toanother drive, you should alsoback up your files occasionallyto some other location.

Other internal or externaldrive

Protecting your media and dataAbout backup set

438

Page 439: Help

CD, DVD, or Blu-ray discs

439Protecting your media and dataAbout backup set

Page 440: Help

This choice requires that youhave recordable CDs, DVDs, orBlu-ray discs and an optical drivein your PC to record on thosediscs. You must be present toinsert and remove discs whenrequested. Therefore, you cannotselect automatic scheduling ofbackups when you back up toCDs, DVDs, or Blu-ray discs.

Backing up to CDs, DVDs, orBlu-ray discs is slower thanbacking up to other media.Backing up to CDs, DVDs, orBlu-ray discs is also lessconvenient because you must bepresent during the backup.

By using Norton 360, you canback up your data to any of thefollowing optical media types ifyour optical drive supports them:1 CD-R

1 CD-RW

1 DVD+R

1 DVD-R

1 DVD+R DL

1 DVD-R DL

1 DVD+RW

1 DVD-RW

1 DVD RAM

1 BD-R

1 BD-RE

You should store your backupdiscs in a safe place elsewhereto provide protection against adisaster that occurs at yourcomputer's location.

w When you select the CD orthe DVD Drive as the backup

Protecting your media and dataAbout backup set

440

Page 441: Help

location for the first time, Norton360 prompts you to configurethe optical backup drive on yourcomputer. Norton 360 lets youinstall the optical driver.

You can use this choice if yourPC is connected to a localnetwork that offers a storagelocation to which you haveaccess. Depending on the speedof your network, this choice canbe almost as fast as backing upto an internal drive or externaldrive.

This choice does not appear ifyour PC is not connected to anetwork that offers a storagedevice to which you have access.

To back up your data to anexternal network drive, you mustmap the external network driveto your computer. When you mapa drive, you must also specify adrive letter for the connection.

Network drive

441Protecting your media and dataAbout backup set

Page 442: Help

Flash drives and the other datastorage devices that areattached to your PC can alsoserve as backup locations.Norton 360 displays suchdevices as external disk drives.If such a device is alwaysattached to your PC, you can useit for automatic backups.

The amount of storage spacethat is available on these devicescan be less than on hard disks.If you use a flash drive forbackups, you should also backup your files occasionally toanother storage location.

Flash drive andremovable storagedevices, including iPod

Choosing a backup location

Norton 360 provides several kinds of storage locationsfor backups. You can choose a different location if yourbackup needs change or if you want to store yourbackups in several locations for added security.

When you select Secure Online Storage as the backuplocation, Norton 360 prompts you to register to yourNorton Account. You must be connected to the Internetto register to your Norton Account.

To use Secure Online Storage as a backup location, youmust configure the Metered Broadband Mode optionin the My Network window to No Limit. The MyNetwork option is available in the Settings window.

w You must activate your Norton 360 with a valid licensekey to use the online storage space.

To choose a backup location

1 Make sure that the device to which you want to backup your data is connected to your PC and turned on.

2 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

Protecting your media and dataAbout backup set

442

Page 443: Help

3 On the Where tab, select the location and devicewhere you want your backups to be stored.If the device or location does not appear on the list,click Refresh List.

4 Click Save Settings.

Installing optical backup driver

Norton 360 offers several storage location options forbackups. You can choose a different location if yourbackup needs change or if you want to store yourbackups in several locations for added security.

If you want to back up your important files and datato a CD or DVD Drive, you must configure the opticalbackup drive on your computer. The optical backupdrive helps you read or write data on optical discs.

When you select CD or DVD Drive as the backuplocation for the first time, Norton 360 prompts you toconfigure the optical backup drive on your computer.Norton 360 lets you install the optical driver.

When you install optical backup driver, you must insertand remove discs when prompted. Therefore, youcannot select automatic scheduling of backups whenyou back up to CDs, DVDs, or Blu-ray discs for the firsttime. When the backup is complete, you can click ViewDetails in the Backup window to view the status ofyour last backup.

To install optical backup driver

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the Where tab, select the CD or DVD Driveoption, and then click Run Backup.

3 In the dialog that appears, click OK.

4 When you are prompted, insert a blank CD or DVDinto the CD-ROM drive and click OK.You can view the progress of the backup in theBackup window.

5 When the backup is complete, click Close.

443Protecting your media and dataAbout backup set

Page 444: Help

Viewing or changing a backup schedule

Norton 360 lets you schedule backups when it isconvenient for you. You can schedule your backups torun late at night or whenever you know that yourcomputer is not needed for any other activity.

You have the following backup schedule choices:

Choose this option to back upyour computer when it isturned on but not otherwisein use. This choice is therecommended choice formost users. Norton 360checks your computer to beidle every four hours to runan automatic backup. Notethat the backup location mustbe available at the time thatthe automatic backup takesplace.

w You cannot back upyour data to a CD or DVD ifyou select this option.

Automatic (Recommended)

Choose this option to pickone or more days of the week,and the time of day, for yourbackups to occur.

Weekly

Choose a specific day of themonth, and specific time of aday, for your backups tooccur.

Check Run only at idle timeto run an automatic backuponly at idle time. Norton 360checks to see if yourcomputer is idle every fourhours.

Monthly

Protecting your media and dataAbout backup set

444

Page 445: Help

Choose this option to haveNorton 360 backup your filesonly when you start thebackup yourself.

Manual Schedule

Your computer's performance is maximized if youschedule to perform your critical operations when yourcomputer is idle. When you schedule backup weeklyor monthly and check the Runonlyatidletime option,Norton 360 backs up your files when your computer isidle. Symantec recommends you to check the Runonlyat idle time option to experience better performanceof your computer.

To view or change a backup schedule

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the When tab, under Schedule, select an optionto view or change the backup schedule.

3 Click Save Settings.

Deleting a backup setYou can delete a backup set if it is no longer needed.You cannot delete a backup set if only one backup setis available. However, you can create a new backup setbefore you delete the old backup set.

When a backup set is deleted, the Backup details of thefiles that are included in that backup set also change.For example, the icon overlays and the Backup tab inthe file properties of the file no longer appear.

Deleting a backup set is particularly helpful if you wantto free some space on your Secure Online Storage.

w To delete a backup set from your online backup, youmust configure the Metered Broadband Mode optionin the My Network window to No Limit. The MyNetwork option is available in the Settings window.

445Protecting your media and dataAbout backup set

Page 446: Help

To delete a backup set

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the Summary tab, in the Backup set namedrop-down list, select the backup set that you wantto delete.

3 Under Things you can do, click Delete backup set.

4 In the Delete Backup Set window, select Deletebackup set option.

5 In the confirmation dialog box, click Yes.

To delete a backup set and files

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the Summary tab, in the Backup set namedrop-down list, select the backup set that you wantto delete.

3 Under Things you can do, click Delete backup set.

4 In the Delete Backup Set window, select Deletebackup set and files option.The ManageBackupSet window shows the progressof the backed files that are being deleted from yourselected backup set.

5 Click Yes to confirm.

Backing up your filesAfter you provide Norton 360 with your preferredbackup settings, running a backup is very easy. In fact,if you scheduled all backup sets to run backupsautomatically, you do not need to do anything at all.Norton 360 performs automatic backups for all backupsets when your PC is turned on but not engaged inperforming any other tasks. However, Norton 360 doesnot back up your files automatically if the backupdestination is a CD, DVD, or Blu-ray disc. Backing upto these destinations needs your intervention.

Protecting your media and dataBacking up your files

446

Page 447: Help

Whether you have set Norton 360 to back up your PCautomatically or not, you can always run a backup. Forexample, you have added or modified important filesand you want to be sure they are safe. In this case, youcan run a backup manually. You can also run a backupat the end of the day if you do not want to wait for anautomatic backup to occur.

You can view the details of your backup activity underthe backup category in the Security History window.

To back up your files

1 In the Norton 360 main window, click Backup, andthen click Run Backup Now.

2 Follow any instructions for performing the backupthat Norton 360 provides.For example, if you choose to back up your files toCDs, then Norton 360 asks you to insert a recordableCD.

3 In the Backup window, click Close.

Restoring filesThe reason to have a good backup is to restore yourfiles from the backup if the need arises. Norton 360provides an easy method to restore your backed-upfiles.

By default, Norton 360 displays the backup location ofthe most recent backup set you ran and the originallocations of the files.

w To restore files from online backup, you must configurethe Metered Broadband Mode option in the MyNetwork window to NoLimit. The MyNetwork optionis available in the Settings window.

447Protecting your media and dataRestoring files

Page 448: Help

When you restore files, you can change any of thefollowing settings:

You can choose any of thebackup sets to restore thefiles.

If you backed up your data inan external media, you mustconnect it to your computerto restore those files. Norton360 lists all the backup setsthat you ran backup for andthat your PC can currentlydetect.

Restore From

You can restore the backedup files in a backup set thatyou selected. You can use theSearch option to search forfiles by name and add theselected file to restore. Youcan also check the RestoreAll Files and Categoriesoption next to the Filesheading to select all filecategories. In addition, youcan browse for backed upfiles based on file categoriesand folders by using theBrowse for Files and Foldersoption.

You can filter the backed upfiles in a backup set by thebackup file categories.

Files

Protecting your media and dataRestoring files

448

Page 449: Help

You can restore to theoriginal locations of the files,or navigate to a new locationwhere you can restore yourfiles. Norton 360 displays thetotal number of files and thetotal size of the files that youhave selected for restoration.

If files with the same nameare present at the originallocation, the files that yourestore replace those files.

Restore To

w If you backed up files to CDs or DVDs, do not restorefiles by copying them directly to your PC from thebackup disks. When Norton 360 backs files up to CDsor DVDs, it sometimes has to split files between twodiscs. Directly copying a file back from a disc, therefore,may only copy part of the file. Such a file appears tobe damaged when you try to use it. Instead, let Norton360 restore your files for you.

To restore files

1 In the Norton 360 main window, click Backup, andthen click Restore Files.

2 In the Restore Files window, do one or more of thefollowing:

1 Under Restore From, change where to restorefrom.

1 Under Files, specify what to restore.

1 Under Restore To, change where to restore thefiles to.

3 Click Restore Files.

4 Follow the on-screen instructions to finish restoringyour files.

449Protecting your media and dataRestoring files

Page 450: Help

Choosing where to restore files fromWhen Norton 360 restores files, it displays the backuplocation of the most recent backup set you ran. Youcan change the location to restore files from a differentbackup location. For example, you have backed up filesto drive C and then later backed up files to CDs. Youcan then choose to restore files from either drive C orfrom the CDs.

w To restore files from online backup, you must configurethe Metered Broadband Mode option in the MyNetwork window to NoLimit. The MyNetwork optionis available in the Settings window.

To choose where to restore files from

1 In the Norton 360 main window, click Backup, andthen click Restore Files.

2 In the Restore Files window, under Restore From,click View All.

3 In the window that appears, click the backup setthat you want to restore, and then click OK.If the backup set is not visible, make sure that themedia in which you had backed up your files isconnected, and click Refresh List.If you have activated online backup, the windowalso contains the backup set that contains the filesthat you backed up online from another computer.For example, you can view the backup set containingthe files that you backed up from your homecomputer. However, the other computer must haveNorton 360 registered with the same NortonAccount.

4 Make any other necessary changes to your restoresettings, and click Restore Files.

5 Follow the on-screen instructions to finish restoringyour files.

Protecting your media and dataRestoring files

450

Page 451: Help

Selecting files to restoreWhen you restore backed-up files with Norton 360, youmight not need to restore all the files from a backup.You can restore the files that may have been damaged,accidentally erased, or modified incorrectly. Norton360 provides several ways for you to select only thefiles that you need to restore.

When you click the Browse for Files and Foldersoption, you can view a list of all the backed-up files.You can easily select the files that you want to restoreby checking them. You can filter the files by itscategories available in the left pane in the RestoreFileswindow.

The various options that are available under Categoryin the left pane of the window are:

You can view all the backed-upfiles in a backup set.

All file types

You can view all the filecategories in the left pane thatyou have previously backed up.When you click a file category,you can view all the backed-upfiles of that file category in theright pane.

File Categories

You can view all the backed-upfolders containing files availablein a backup set.

Folders

You can view all the files andfolders that you select to restore.

Selected Files

You can also search for a particular file by using theSearch option. You can exclude each item in the rightpane if you want to exclude it from restoration byunchecking it.

451Protecting your media and dataRestoring files

Page 452: Help

You can use any of the following methods, and you cancombine methods, to select files to restore:

You can restore all thebacked-up files withoutexcluding any file within abackup set.

Restore all files andcategories

You can search by file name,or by part of a file name fromthe list of backed up files andrestore them. You can alsouse wildcard characters, suchas asterisks (*) or questionmarks (?) to search file namesor folder names. For example,you can type *.doc to searchall the Microsoft Worddocuments.

Restore files by searching

You can see a list of the filesthat are included in each filecategory, and choose whichof those files to restore.

Restore individual files withina file category

You can select the files and the file categories that youwant to restore in the Restore Files window.

To select all the backed-up files to restore

1 In the Norton 360 main window, click Backup, andthen click Restore Files.

2 In the Restore Files window, next to Files, checkRestore All Files and Categories.All of the backed-up files and folders in the backupset get selected for restore.

To select files to restore by searching

1 In the Norton 360 main window, click Backup, andthen click Restore Files.

Protecting your media and dataRestoring files

452

Page 453: Help

2 Under Files, in the Search text box, type all or partof a file name, or the extension of the file.

3 Click Search.The window that appears displays the file namesthat contain the text that you typed.

4 Check the files that you want to restore, and thenclick OK.

5 Repeat steps 2 through 4 to add more files to thelist of those that Norton 360 restores.

To select an individual file within a file category torestore

1 In the Norton 360 main window, click Backup, andthen click Restore Files.

2 In the Restore Files window, under Files, clickBrowse for Files and Folders.

3 In the left pane, under ShowResults for, click a filecategory from which you want to restore files.

4 In the right pane, do one of the following:

1 Check the files that you want to restore.

1 If you want to restore all the files in thatcategory or folder, check the check box in theheader close to Backup Item.

5 Repeat steps 3 through 4 to add more files to thelist of those that Norton 360 restores.You can use the Selected Files option in the leftpane under ShowResultsfor to view all the selectedfiles that you want to restore.

6 Click OK.

Choosing a restore destinationWhen you restore files from a backup, you can choosewhere Norton 360 places the restored files. You canrestore the files to a separate folder of your choice ortheir original location. By default, Norton 360 selectsthe original locations of the files.

453Protecting your media and dataRestoring files

Page 454: Help

w Restoring files to their original locations deletes newerversions of the same files that are stored in thoselocations. If you do not want to replace those files withthe restored files, you must move the newer versionssomewhere else before you restore. You can also restorethem to a different location.

You can change the restore destination from anycomputer at any time.

w Some drives use older Windows file systems, such asFAT-16 or FAT-32, which cannot store files larger than4 GB. For such large files to restore, make sure thatyour restore destination is formatted with a file systemthat supports large files, such as NTFS.

To change a restore destination

1 In the Norton 360 main window, click Backup, andthen click Restore Files.

2 In the RestoreFiles window, under RestoreTo, clickChange.

3 In the window, click New Location.

4 Do one of the following:

1 Type a restore location in the space provided.

1 Click Browse, use the browse window to navigateto the location to which you want to restore files,and then click OK.

5 Make any other necessary changes to your restoresettings, and then click Restore Files.

6 Follow the on-screen instructions to finish restoringyour files.

About Norton 360 Autorun RestoreNorton 360 Autorun Restore helps you restore the filesthat are backed up on an optical disc. You can also usethis feature to restore your backed up files to acomputer that does not have Norton 360 installed.

Protecting your media and dataRestoring files

454

Page 455: Help

When you insert an optical disc that contains thebacked-up files, the Autorun Restore featureautomatically opens the Portable Restore window.

w If you disable Windows auto-run option, you mustmanually launch the Autorun Restore feature.

The Portable Restore window provides you thefollowing information:

1 The name of the backup set

1 The size of the backed-up files

1 The date and time you backed up the files

You can select the files that you want to restore. Youcan restore the files to their original location. Bydefault, Autorun restores the files you select toC:\Restored Files\. You can customize the locationwhere you want to restore the selected files.

You can also launch the Norton 360 main window ifNorton 360 version 3.0 or later is installed on yourcomputer. If Norton 360 version 3.0 or later is notinstalled on your computer, Autorun tells you that theproduct is not installed on your computer.

You can also use the following link to obtain moreinformation:

http://www.symantec.com/norton/360

Restoring files by using Norton 360 Autorun Restore

Norton 360 Autorun Restore lets you restore your filesbacked-up on an optical disk. Autorun can restore yourbacked-up files to a computer that does not haveNorton 360 installed on it.

You can restore your backed-up files to their originallocations or custom locations. You can also use theLaunch Norton 360 option in the Portable Restorewindow to open the Norton 360 main window. Norton360 version 3.0 or later must be installed on yourcomputer to open Norton 360.

455Protecting your media and dataRestoring files

Page 456: Help

To restore files using Norton 360 Autorun Restore

1 Insert an optical disc that contains the backed-upfiles.

2 Click the ARestore icon to launch the AutorunRestore feature.If the Windows AutoPlay option is disabled,navigate to the optical disk that has your backup,and double click the ARestore icon to launch theAutorun Restore feature.

3 In the Portable Restore window, click Select Filesto Restore option.

4 In the window that appears, in the left pane, underCategory, click a file category from which you wantto restore files.

5 In the right pane, check the files that you want torestore.If you want to restore all the files, in the left pane,under Category, click All file types, and then checkthe check box in the header close to Backup Item.

6 Under Restore to, click one of the following:

1 Original LocationChoose this option if you want to restore the filesto the original location.

1 Custom LocationChoose this option if you want to restore the filesto a new location. By default, Autorun restoresthe files you select to C:\Restored Files\.

7 Click Restore Selected.

8 Follow the on-screen instructions to finish restoringyour files.

About Norton Backup DriveNorton 360 provides the Norton Backup Drive in yourWindows Explorer after you configure your backup.Norton Backup Drive contains a list of backupdestinations where your files are backed up. Each

Protecting your media and dataAbout Norton Backup Drive

456

Page 457: Help

backup destination contains the backup sets to whichthe backup destination is configured.

Norton Backup Drive displays the files that you backedup to a media device. You must connect and turn onthe media device before you view your files.

You can also view the files that you backed up to SecureOnline Storage. You must be connected to the Internetand logged in to Norton Account.

To view the files in your online backup, you mustconfigure the MeteredBroadbandMode option in theMy Network window to No Limit. The My Networkoption is available in the Settings window.

w The Norton Backup Drive is accessible only to systemadministrator.

You can do the following with Norton Backup Drive:

1 View the files that are backed up in different backupdestinations.

To view the files that you backed up to a mediadevice, you must connect the device to yourcomputer.

1 Restore a file from a backup set on the NortonBackup Drive to restore to your computer.

1 Select and delete a file from a backup set on theNorton Backup Drive.

Norton 360 does not back up the file you deletedthe next time you run backup.

1 Open a file to view the content of the file before yourestore or delete it on the Norton Backup Drive.

1 Use the Search command on the Start menu or theSearchToolbar option to locate files in the NortonBackup Drive.

w Norton Backup Drive appears in Windows Exploreronly when the Backup option in the Backup Settingswindow is turned on.

457Protecting your media and dataAbout Norton Backup Drive

Page 458: Help

Viewing backup files on the Norton Backup DriveYou can use the Norton Backup Drive to view the filesthat are backed up. You can view the Norton BackupDrive after you configure backup.

If you backed up your files to a media device, ensurethat the device is connected to your PC and turned on.You can then view the files on the Norton Backup Drive.

If you backed up your files to Secure Online Storage,you must be connected to the Internet. You must alsobe logged in to Norton Account to view the files on theNorton Backup Drive.

w To view the files in your online backup, you mustconfigure the MeteredBroadbandMode option in theMy Network window to No Limit. The My Networkoption is available in the Settings window

To view backup files on the Norton Backup Drive

1 In Windows Explorer, click Norton Backup Drive.

2 Select the backup destination, and navigate to thebackup set that contains the files that you backedup.

Restoring a file from a backup set on the NortonBackup Drive

To restore a file, you can drag it from a backup set onthe Norton Backup Drive to your computer. You canalso click to open and view the contents of the filebefore you restore it.

Right-click to select the files to restore in the NortonBackup Drive, and then click Restore to. You canrestore your backed-up files to their original locationsor custom locations.

To restore a file fromabackup set on theNortonBackupDrive

1 In Windows Explorer, click Norton Backup Drive.

Protecting your media and dataAbout Norton Backup Drive

458

Page 459: Help

2 Select the backup destination, and navigate to thebackup set destination that contains the file thatyou backed up.

3 Do one of the following:

1 Right-click to select the files to restore in NortonBackup Drive, and then click Restore.

The files are restored to the original location byoverwriting the existing files.

1 Right-click to select the files to restore in theNorton Backup Drive, and then click Restoreto.

You can choose to restore your files to theOriginal Location or to a New Location.

4 Click OK.

Deleting a file from a backup set on the NortonBackup Drive

You can select and delete a file from a backup set onthe Norton Backup Drive. Norton 360 does not back upthe deleted file the next time you run a backup. Youcan also click the file to open and view the file contentbefore you restore it.

To delete a file from a backup set on the Norton BackupDrive

1 In Windows Explorer, click Norton Backup Drive.

2 Select the backup destination, and navigate to thebackup set destination that contains the file thatyou backed up.

3 Do one of the following:

1 Right-click to select the files to delete, and thenclick Delete.

1 Select the file, and then press Delete.

459Protecting your media and dataAbout Norton Backup Drive

Page 460: Help

About solutions to the backup problemsThe following table provides some tips to help youavoid backup problems.

The following tips apply to allbackups:1 Perform backups

regularly. The more oftenyou back up, the lesschance there is that youcan lose importantinformation.Anautomaticbackup schedule isrecommended, since thattends to back up thosefiles that have mostrecently changed. Ascheduled weekly backupis a good second choice.

1 If you use automaticbackups, leave your PCturned on when not inuse. Automatic backupstake place when your PCis turned on but not inuse.

1 Regularly check thebackup results thatNorton 360 provides toensure that all of the filesthat should be backed upare backed up.

All backups

Protecting your media and dataAbout solutions to the backup problems

460

Page 461: Help

The following tips apply tobackups to CDs or DVDs:1 Have extra discs on hand

when you back up. Thistip helps you to avoidoccasional disc flaws orsituations where theamount of backed up datais more than youanticipated.

1 Label your backup discswith the complete details,so that you can find theright disc when you needto restore files.

1 Do not copy files directlyfrom the backup discs toyour PC. You mayinadvertently copy onlypart. Instead, use theNorton 360 restorefeature or use the Norton360 Autorun Restorefeature.

Backing up to CDs or DVDs

461Protecting your media and dataAbout solutions to the backup problems

Page 462: Help

The following tips apply tobackups to external drives:1 Some drives use older

Windows file systems,such as FAT-16 or FAT-32that cannot store fileslarger than 4 GB. For suchlarge files to back up,ensure that your backupdrive is formatted with afile system that supportslarge files, such as NTFS.

1 If you use automatic orscheduled backups, makesure that the externaldrives are connected andturned on.

1 To avoid accidentallycorrupting your backedup files, do not use abackup drive for purposesother than for backing up.

Backing up to external drives,including flash drives

Protecting your media and dataAbout solutions to the backup problems

462

Page 463: Help

The following tips apply tobackups to online storage:1 Make sure that your PC

does not automaticallydisconnect from theInternet when it is not inuse.

1 Regularly check theamount of space that youhave left in your SecureOnline Storage, andconsider purchasing morestorage space before youneed it.

1 Online backups work bestwith a fast Internetconnection. If yourbackups take too long,consider backing up onlythe files that you regularlywork. Then periodicallyback up to CDs, DVDs,Blu-ray discs, or externaldrives to back up yourlarger, seldom-used files.

1 If you back up more thanone PC to your onlinestorage, give each PC adifferent nickname.Giving a differentnickname to each PChelps you identify the PCand the backups thatcorresponds to each PC.

Backing up to your SecureOnline Storage

Getting additional help with backup problemsIf you run into problems with your Symantec productthat you cannot solve, or have questions about theproduct, additional help is available. You can use theNorton Autofix window to open the support Web site

463Protecting your media and dataAbout solutions to the backup problems

Page 464: Help

and search the Symantec Knowledge Base for solutionsto your problem.

To get additional help with backup problems

1 In the Norton 360 main window, click Support, andthen click Get Support.

2 In the NortonAutofix window, click OpenSupportWeb Site to launch the support Web site.

About online backup considerationsNorton 360 provides you with secure backup storagespace on a server that is accessible to your computerthrough its Internet connection. When your backuplocation is distant from your computer, your data issafe from local disasters, such as a fire, flood, orearthquake.

w To use online backup, you must configure the MeteredBroadband Mode option in the My Network windowto NoLimit. The MyNetwork option is available in theSettings window.

Protecting your media and dataAbout online backup considerations

464

Page 465: Help

Although online backup is convenient and safe, beforechoosing it for your backup method, consider thefollowing limitations:

Speed limitations

465Protecting your media and dataAbout online backup considerations

Page 466: Help

The amount of time that it takesto transfer your backup to theSecure Online Storage dependson the speed of your Internetconnection. If you have manyfiles to back up, the first backupcan take hours or days,depending on the speed of yourInternet connection.

You can configure the Internetbandwidth that backup uses toback up your files using theBandwidth Throttle option. Thisoption is available on theWheretab of the Manage Backup Setswindow.

You can alter the followingbandwidth throttle states:1 Fastest (recommended)

1 High usage

1 Moderate usage

1 Low usage

Furthermore, many home andsmall business Internetconnections are asymmetrical,meaning that their uploadspeeds are slower than theirdownload speeds. A single largefile, such as a high-qualityphotograph, may take severalminutes or longer to upload toyour Secure Online Storage.

If you have many large files andasymmetrical or slow Internetconnection, consider the use ofone of the other backuplocations that Norton 360provides. You can then use yourSecure Online Storage to back

Protecting your media and dataAbout online backup considerations

466

Page 467: Help

up your smaller files, such asyour financial documents andword-processing documents.

If a backup is in progress, youshould leave your computerturned on, so that the backupcan finish. However, if a backupis interrupted, then the next timeit starts, it resumes where it leftoff and continues until itfinishes.

Norton 360 provides sufficientonline storage to handle manyof your backup needs, and youcan purchase more storage whenyou need it. Nonetheless, theamount of space in your SecureOnline Storage is much smallerthan the typical permanent diskthat most recent computershave. Online backups are idealfor the files that you regularlywork on. You can back up largefiles and the files that seldomchange to a different location.

In addition, you shouldperiodically look over the filesthat you have in your SecureOnline Storage. Eliminate thosefiles that you no longer need, tomake additional storage spaceavailable.

Storage limitations

About online backup activationNorton 360 uses your Norton Account to keep track ofthe following:

1 The computers that you back up to online storage

467Protecting your media and dataAbout online backup considerations

Page 468: Help

1 The amount of online storage space that is availableto you

Your product needs to be activated to use the onlinebackup feature. The first time you configure onlinebackup, Norton 360 connects to your Norton Accountand requests that you sign in to the account. You mayhave established a Norton Account when you installedNorton 360 or when you installed another Nortonproduct.

To sign in to your Norton Account, you use the emailaddress and the password that you supplied when youcreated your Norton Account. You only need to sign into your Norton Account the first time that youconfigure online backup. Norton 360 retains youraccount information so you do not have to sign in again.If you do not have a Norton Account when youconfigure online backup for the first time, Norton 360lets you create one.

Symantec provides 2 GB of online storage for eachNorton 360 product key. You can share the onlinestorage space that is allocated to you using your NortonAccount among your computers. For example, you havetwo computers having Norton 360 installed on it andregistered with the same Norton Account. You canshare the storage space among your two computers.You use 1 GB of online storage space for your firstcomputer. When you activate the online storage foryour second computer using the same Norton Account,that computer can use the remaining 1 GB of space.

w To use online backup, you must configure the MeteredBroadband Mode option in the My Network windowto NoLimit. The MyNetwork option is available in theSettings window.

Purchasing more online storage spaceYour Norton 360 subscription comes with an allotmentof secure online storage space. When Norton 360performs an online backup, it calculates the amountof space that it needs for the backup. If your online

Protecting your media and dataAbout online backup considerations

468

Page 469: Help

storage does not contain sufficient space for thebackup, Norton 360 notifies you and provides you anoption to buy more space.

You do not have to wait until Norton 360 tells you thatyou need more online storage space. You can purchaseadditional space at any time.

You must be connected to the Internet to purchasemore online storage space.

It can take about 30 seconds for the status on the MyAccount page to display the amount of space that youpurchased.

To purchase additional online storage space whenbacking up

1 When Norton 360 notifies you that it needs moreonline storage space, click Buy More Storage.Your Web browser opens to a secure page, on whichyou can purchase additional online storage space.

2 Follow the instructions on the secure Web page topurchase additional online storage space.

To purchase additional online storage space at othertimes

1 In the Norton 360 main window, click Backup, andthen click Buy More Storage.Your Web browser opens to a secure page, on whichyou can purchase additional online storage space.

2 Follow the instructions on the Web page to purchaseadditional online storage space.

Turning off or turning on backupWhen the Backup option is turned on, Norton 360automatically backs up your files when your computeris idle. However, if you want to temporarily disablebackup, you can turn it off from within the program.

When you turn off backup, the backup status in theNorton 360 main window changes from Protected toDisabled. In the Disabled state, Norton 360 disables

469Protecting your media and dataTurning off or turning on backup

Page 470: Help

all automatic backup of files. You can use the RunBackupNow option in the main window if you want toback up your files from all the backup sets.

You can turn off or turn on backup from the Settingswindow, BackupSettings window, or from the BackupDetails window.

To turn off or turn on backup from the Settings window

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Quick Controls, doone of the following:

1 To turn off backup, uncheck Backup.

1 To turn on backup, check Backup.

To turn off or turn on backup from the Backup Settingswindow

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Backup Settings.

3 In the Backup Settings window, do one of thefollowing:

1 To turn off backup, move the On/Off switch tothe right to the Off position.

1 To turn on backup, move the On/Off switch tothe left to the On position.

4 In the Settings window, click Apply.

To turn off or turn on backup from the Backup Detailswindow

1 In the Norton 360 main window, click Backup, andthen click View Details.

2 In the Backup Details window, under Things YouCan Do, do one of the following:

1 To turn off backup, click Turn Off Backup.

1 To turn on backup, click Turn On Backup.

Protecting your media and dataTurning off or turning on backup

470

Page 471: Help

Turning off or turning on backup settingoptions

Norton 360 provides you various options to manageyour backup settings. Norton 360 backup settings letyou access the backup details of a particular file bystatus icon overlays without opening the product. Youcan use the icon overlays to view the backup status ofa file or folder. You can also use the Properties pageof a file to know the backup status of your backup sets.

When the Backup Status Overlays option is turnedon, Norton 360 adds a backup status icon to the files,based on the following conditions:

1 The files belong to a backup file category that youincluded in any of the backup sets.

1 The files are located at a source that you includedin any of the backup sets.

The following table lists the backup status overlay iconsfor the files on your computer:

Indicates that the file has beenbacked up

This icon changes to blue iconwith arrows if you modify thefile.

Green icon with a checkmark

Indicates that the file has notbeen backed up

This icon changes to green whenNorton 360 automatically backsup the file during idle time.

Blue icon with arrows

471Protecting your media and dataTurning off or turning on backup setting options

Page 472: Help

Indicates that the file has beenexcluded from backup

Norton 360 displays a disabledbackup status on a file when youexclude the file from any of thebackup sets.

Gray icon with a slashmark

Norton 360 Backup provides the Norton Backup Drivein your Windows Explorer after you configure yourbackup. Norton Backup Drive contains a list of backupdestinations where your files are backed up.

You can use the ContextMenu option to add or excludea file or a folder to your backup sets when youright-click it. You can use this option after youconfigure Backup in the ManageBackupSets window.

You can use the Property Page option to view moredetails about the backup status icons. When youright-click a file that you backed up and view the FileProperties, you can see its backup details on theBackup tab. The Backup tab lists the state of the filefor each backup set and the last backup time.

You can turn off these options if you do not want tosee the icons and backup statuses.

To turn off backup setting options

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Backup Settings.

Protecting your media and dataTurning off or turning on backup setting options

472

Page 473: Help

3 In the Backup Settings window, do one of thefollowing:

1 To turn off icon overlays, in the Backup StatusOverlays row, move the On/Off switch to theright to the Off position.

1 To turn off NortonBackupDrive, in the NortonBackup Drive row, move the On/Off switch tothe right to the Off position.

1 To turn off right-click backup menu, in theContext Menu row, move the On/Off switch tothe right to the Off position.

1 To turn off Backup tab in the Properties page,in the Property Page row, move the On/Offswitch to the right to the Off position.

4 In the Settings window, click Apply.

To turn on backup setting options

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Backup Settings.

3 In the Backup Settings window, do one of thefollowing:

1 To turn on icon overlays, in the Backup StatusOverlays row, move the On/Off switch to theleft to the On position.

1 To turn on NortonBackupDrive, in the NortonBackup Drive row, move the On/Off switch tothe left to the On position.

1 To turn on right-click backup menu, in theContext Menu row, move the On/Off switch tothe left to the On position.

1 To turn on Backup tab in the Properties page,in the Property Page row, move the On/Offswitch to the left to the On position.

4 In the Settings window, click Apply.

473Protecting your media and dataTurning off or turning on backup setting options

Page 474: Help

Protecting your media and dataTurning off or turning on backup setting options

474

Page 475: Help

This chapter includes the following topics:

1 About Norton 360 Settings

1 Customizing Norton 360 Settings

1 Turning on or turning off Quick Controls services

1 About Antivirus settings

1 About Firewall settings

1 About Norton AntiSpam settings

1 About My Network settings

1 About backup settings

1 About Identity Protection settings

1 About Task Scheduling settings

1 About Administrative Settings

About Norton 360 SettingsThe Detailed Settings in the Settings window let youadjust protection settings and network settings. Youcan also customize schedules for security scans andbackups.

13Customizingsettings

Page 476: Help

You can configure the following Detailed Settings inthe Settings window:

Specify how certain types ofviruses and spyware, as well asother threats, are handled inNorton 360.

You can specify whetherincoming emails are checked andinstant messenger is scanned.You can also specify which filesand signatures are excludedfrom scans, and how low-riskthreats are handled. In addition,you can configure Real TimeProtection, Antispyware, andLiveUpdate.

Antivirus

Specify in detail how to handleincoming and outgoingconnections for your PC.

You can specify Traffic rules andrules for specific programs. Youcan also specify how you wantNorton 360 to handle intrusionattempts and browserprotection.

Firewall

Secure your email client fromunwanted online content.

You can configure NortonAntiSpam to define which clientit should integrate with and howit should handle the email thatit scans on those clients. You canspecify if you want NortonAntiSpam to check the Symantecservers to filter the spam emailmessages which the local filtersclassify as legitimate.

AntiSpam

Customizing settingsAbout Norton 360 Settings

476

Page 477: Help

View all the devices available inyour network and specify thetrust level of the devices that areconnected to your network.

You can hide or show theNetwork Security Overviewwindow at startup and configurethe communication port thatNorton products use tocommunicate with each other.You can also purge the NetworkSecurity Map.

My Network

Lets you download and installNorton Safety Minder andconfigure Norton Online Family.

Norton Online Family is aparental control application thatprovides a smart way to keepyour children safe when they areonline. Norton Safety Minder isan application that needs to beinstalled on each computer thatyour child uses to monitor theInternet activities. You can usethe Parental Controls link tovisit Norton Online Family Webpage to download Norton SafetyMinder. Click Download NortonSafety Minder to downloadNorton Safety Minder. Follow theon-screen instructions tocomplete the installation.

If you have already installedNorton Safety Minder, you canclick Parental Control to openthe Parental Control settingswindow.

Parental Controls

477Customizing settingsAbout Norton 360 Settings

Page 478: Help

Configure Identity Safe to secureyour online identities andtransaction data.

You can also configure SafeSurfing options.

Identity Protection

Specify when and how oftenNorton 360 examines yourcomputer for viruses and otherrisks.

Tasks Scheduling

Use the options in this windowto configure the security of yourproduct.

You can specify your proxysettings in Norton 360. You canalso configure Idle TimeOptimizer, PerformanceMonitoring, and Power SavingMode. In addition, you canconfigure Silent Mode, Idle TimeOut duration, Automatic TasksDelay duration, NortonCommunity Watch, and FirefoxCleanup.

Administrative Settings

Specify the files and folders thatyou want to back up, the backuplocation, and the backupschedule.

You can also turn off or turn onoptions such as Backup StatusOverlays,Norton Backup Drive,Context Menu, and PropertyPage.

Backup Settings

Customizing settingsAbout Norton 360 Settings

478

Page 479: Help

The Quick Controls in the Settings window let youturn on or turn off the following services:

Turns on or turns off Silent Mode

You can turn on Silent Mode fora period of one hour, two hours,four hours, six hours, or one day.

Silent Mode

Turns on or turns offAntiphishing and Norton SafeWeb features

When you turn on Safe Surfing,it protects your computer whileyou browse with InternetExplorer or Firefox.

Safe Surfing

Turns on or turns off IdentitySafe

When you turn off Identity Safe,Norton 360 no longer lets youmanage your logins, cards, andnotes.

Identity Safe

Turns on or turns off Backup

When you turn on Backup, yourcomputer starts backing up withyour specified settings.

Backup

Turns on or turns off iconoverlays on files

Icon overlays show the backupstatus of your files.

Backup Status Overlays

Turns on or turns off theautomatic updates that guardagainst new and emergingthreats

Automatic LiveUpdate

479Customizing settingsAbout Norton 360 Settings

Page 480: Help

Turns on or turns off SmartFirewall

When you turn on SmartFirewall, it monitorscommunications between yourcomputer and the othercomputers on the Internet. Italso protects your computerfromcommonsecurity problems.

Smart Firewall

Turns on or turns off NortonTamper Protection

When you turn on NortonTamper Protection, it protectsNorton 360 from attacks ormodifications by unknown,suspicious, or threateningapplications.

Norton TamperProtection

Customizing Norton 360 SettingsThe default Norton 360 settings provide a safe,automatic, and efficient way to protect your computer.However, if you want to change or customize yourprotection settings, you can access most features fromthe Settings window.

You can configure Norton 360 settings in the followingways:

1 You can use the On/Off switch to turn on or turnoff a feature. When you turn off a feature, the colorof the On/Off switch turns red, which indicates thatyour computer is vulnerable to security threats.When you turn on a feature, the color of the On/Offswitch turns green, which indicates that yourcomputer is protected against security threats.

1 You can drag the slider of a protection feature toyour preferred setting. Most often, Norton 360

Customizing settingsCustomizing Norton 360 Settings

480

Page 481: Help

provides the slider setting for you to decide whetherto resolve security threats automatically or ask youbefore it takes an action.

1 You can configure a protection feature by eitherselecting the options that are provided for theconfiguration or by providing the requiredinformation. Most of these options are available ascheck boxes for you to check or uncheck.

You can also use the DefaultAll option to reset theconfiguration to the default level.

1 You can select a preferred option from thedrop-down list.

1 You can check or uncheck the Quick Controlsoptions to turn on or turn off a feature.

Norton 360 also provides the Use Defaults option inmost of the Settings window. You can use this optionto reset the configuration to the default level.

To customize Norton 360 settings

1 In the Norton 360 main window, click Settings.

2 In the Settings window, click the protection featurethat you want to customize.

3 In the window that appears, set the option to yourpreferred settings.You may need to click a tab to access the settingsthat are listed under that tab.

4 In the Settings window, do one of the following:

1 To save the changes, click Apply.

1 To close the window without saving the changes,click Close.

Turning on or turning off Quick Controlsservices

In the Settings window, you can turn on or turn off thefollowing Quick Controls services:

1 Silent Mode

481Customizing settingsTurning on or turning off Quick Controls services

Page 482: Help

1 Safe Surfing

1 Identity Safe

1 Backup

1 Backup Status Overlays

1 Automatic LiveUpdate

1 Smart Firewall

1 Norton Tamper Protection

You can move the mouse pointer over a service nameto see a description of that service. You should leaveall of the services turned on except Silent Mode.

To turn on or turn off Quick Controls services

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Quick Controls, doone of the following:

1 To turn on a service, check its check box.

1 To turn off a service, uncheck its check box.

If an alert or a message appears, select theduration from the drop-down menu, and thenclick OK.

About Antivirus settingsNorton 360 always protects you from known virusesand the latest virus outbreak. The Antivirus settingsmonitor your PC for the presence of viruses andspyware, as well as other threats, and eitherquarantines or remove them.

The Antivirus settings protect your computer againstthe security risks that can compromise your personalinformation and privacy. The different type of scans,such as Computer Scans, Email Antivirus Scan, andInstant Messenger scan detects and prevents from anyvirus infection on your computer.

Customizing settingsAbout Antivirus settings

482

Page 483: Help

The Antivirus settings obtain the latest virusdefinitions through definition updates and keep yourcomputer secure from the latest security threats.

You can use the following Antivirus settings:

The Automatic Protectionsettings let you control thescanning and monitoring of yourcomputer.

It protects your computer bycontinuously checking forviruses and other security risks.Your options are:1 Real Time Protection

You can use the Real TimeProtectionoptions to protectyour computer bycontinuously checking forviruses and other securityrisks.

1 Boot Time Protection

You can use the Boot TimeProtection option to providean enhanced security levelfrom the time you start yourcomputer. This optionensures better security byrunning all the necessarycomponents that arerequired for computerprotection as soon as yourestart your computer.

Automatic Protection

483Customizing settingsAbout Antivirus settings

Page 484: Help

Scans and Risks

Customizing settingsAbout Antivirus settings

484

Page 485: Help

Scans and Risks settings let youcustomize the scans that Norton360 performs on your computer.

You can use the following Scansand Risks options:1 Computer Scans

Norton 360 lets you rundifferent types of scans todetect and prevent any virusinfection on your computer.

You can use the variousComputer Scans options tocustomize the scans thatNorton 360 performs on yourcomputer. You can alsospecify scanning ofcompressed files andMicrosoft Office documents.

1 Scan Performance Profiles

Scan Performance Profilessettings let you configurehow Norton 360 should scanyour computer based on thedigital signature and trustlevel of the files.

1 Protected Ports

Norton 360 protects thePOP3 and SMTP ports of youremail program.

You can use this option tomanually configure yourPOP3 and SMTP email portsfor email protection. If theSMTP and POP3 portnumbers that your Internetservice provider (ISP) hasprovided for your emailprogram is different from thedefault SMTP and POP3 portnumbers, you must configure

485Customizing settingsAbout Antivirus settings

Page 486: Help

Norton 360 to protect theports.

1 Email Antivirus Scan

Email Antivirus Scan protectsyou from the threats that aresent or received in emailattachments.

This option lets you definehow Norton 360 shouldbehave when it scans emailmessages. Based on theoptions you choose, Norton360 automatically scans theemail messages that yousend or receive.

1 Instant Messenger Scan

The Instant Messenger Scanoption lets you customizescanning of the files that youreceive from instantmessenger programs.

You can select the supportedinstant messenger programsfrom which you may receivefiles. Norton 360 scans thefiles that you receive fromthe selected instantmessenger programs.

Customizing settingsAbout Antivirus settings

486

Page 487: Help

1 Exclusions / Low Risks

Exclusions options specifythe items such as folders,files, and drives that youexclude from Norton 360scans. Scans, signatures, andlow-risk items are someitems that you can excludefrom scanning

Exclusions options let youchoose which categories ofrisks you want Norton 360 todetect.w Exclusions reduce yourlevel of protection andshould be used only if youhave a specific need.

1 Insight Protection

The Insight Network scanuses the Cloud technologywherein a remote server onthe web contains the latestvirus definitions. Norton 360scans your computer for thelatest security threats. WhenNorton 360 performs theInsight Network scan, it usesthe virus definitions that areavailable locally and in theCloud. Norton 360 providesadditional protection byusing the most recentdefinitions in the Cloud,apart from the definitionsthat are available locally onyour computer.

487Customizing settingsAbout Antivirus settings

Page 488: Help

Antispyware protects yourcomputer against the securityrisks that can compromise yourpersonal information andprivacy.

Norton 360 protects yourcomputer from vulnerabilitiesthrough the latest definition andprotection updates. Your optionsare:1 Antispyware

Antispyware protects yourcomputer against thesecurity risks that cancompromise your personalinformation and privacy

This option lets you choosewhich categories of risk youwant Norton 360 to detectfor manual, email, andinstant messenger scanning.

1 Updates

Norton 360 protects yourcomputer fromvulnerabilities through thelatest definition andprotection updates.Definition updates containthe information that letsNorton 360 to recognize andalert you to the presence ofa specific virus or securitythreat

You can use the Updatesoptions to obtain the latestvirus definitions throughdefinition updates and keepyour computer secure fromthe latest security threats.

Antispyware andUpdates

Customizing settingsAbout Antivirus settings

488

Page 489: Help

About Automatic Protection settingsThe Boot Time Protection option on the AutomaticProtection tab provides an enhanced security levelfrom the time you start your computer. This optionensures better security by running all the necessarycomponents that are required for computer protectionas soon as you start your computer.

The Real Time Protection settings on the AutomaticProtection tab let you control the scanning andmonitoring of your computer. It protects your computerby continuously checking for viruses and other securityrisks.

You can use the Real Time Protection options todetermine what gets scanned and what the scan looksfor. It also provides you with advanced protection byproactively detecting unknown security risks on yourcomputer. You can determine what happens when asecurity risk or risk-like activity is encountered.

489Customizing settingsAbout Antivirus settings

Page 490: Help

You can use the following Real Time Protectionoptions:

Auto-Protect

Customizing settingsAbout Antivirus settings

490

Page 491: Help

Auto-Protect loads intomemory and providesconstant protection while youwork. It checks for virusesand other security risks everytime that you run programson your computer.

Auto-Protect checks forviruses when you insert anyremovable media, access theInternet, or use the documentfiles that you receive orcreate. It also monitors yourcomputer for any unusualsymptoms thatmight indicatean active threat.

You can stay protected byusing the following options:1 Caching

Improves theperformance of yourcomputer

If you turn on this option,Norton 360 keeps arecord of the files that areaccessed often. Norton360 does not scan thoserecorded files, even whenyou restart yourcomputer.

1 Removable Media Scan

Checks for boot viruseswhen you accessremovable media

After the removablemedia has been scannedfor boot viruses, it is notscanned again until it isreinserted or formatted.If you still suspect that a

491Customizing settingsAbout Antivirus settings

Page 492: Help

boot virus infects yourremovable media, ensurethat Auto-Protect isturned on to rescan theremovable media. Youthen insert the removablemedia and open it fromMy Computer forAuto-Protect to rescan it.You can also scan itmanually to verify that itis not infected.

Customizing settingsAbout Antivirus settings

492

Page 493: Help

SONAR Protection

493Customizing settingsAbout Antivirus settings

Page 494: Help

Symantec Online Network forAdvanced Response (SONAR)provides the real-timeprotection against threatsand proactively detectsunknown security risks onyour computer.

SONAR identifies theemerging threats that arebased on the behavior ofapplications. SONAR isquicker than the traditionalsignature-based threatdetection techniques. It alsodetects and protects yourcomputer against maliciouscode even before virusdefinitions are availablethrough LiveUpdate.

SONAR Protection includesthe following options:1 SONAR Advanced Mode

Norton 360 provides youthe greatest control overlow-certainty threats onlyif this option is turned on.

1 Remove RisksAutomatically

This option lets thelow-certainty threatsbehave as high-certaintythreats when SONARAdvancedMode option isenabled. In this case,Norton 360 automaticallyremoves the threats andnotifies you.

1 Remove Risks if I AmAway

This option lets Norton

Customizing settingsAbout Antivirus settings

494

Page 495: Help

360 to automaticallyremove low-certaintythreats if it does not getany response from youwhen SONAR AdvancedMode option is enabled.

1 Show SONAR BlockNotifications

This option lets youenable or disable SONARBlock notifications.Norton 360 suppressesthe SONAR Blocknotifications when you setthe Show SONAR BlockNotifications option toLog Only.

About Scans and Risks settingsScans and Risks settings let you customize the scansthat Norton 360 performs on your computer. You canconfigure a Norton 360 scan based on the digitalsignature and trust level of the files on your computer.You can define how Norton 360 should behave whenit scans email messages and customize scanning of thefiles that you receive from instant messenger programs.

495Customizing settingsAbout Antivirus settings

Page 496: Help

You can use the following Scans and Risks settings:

Computer Scans

Customizing settingsAbout Antivirus settings

496

Page 497: Help

Norton 360 lets you run differenttypes of scans to detect andprevent any virus infection onyour computer. The scans areQuick Scan, Full System Scan,and Customized Scan. You canuse the various Computer Scansoptions to customize the scansthat Norton 360 performs onyour computer. You can alsospecify scanning of compressedfiles and Microsoft Officedocuments.

The Computer Scans optionsalso let you specify scans todetect rootkits, other stealthitems, tracking cookies, andunknown security threats. Youroptions are:1 Smart Definitions

Lets you install only the CoreSet virus definitions.

You can choose SmartDefinitions to minimizedownload time, installationtime, and memoryconsumption as SmartDefinitions are a subset ofvirus definitions.

1 Compressed File Scan

Scans and repairs the filesinside compressed files.

When you turn on thisfeature, Norton 360 scansand detects viruses andother security risks in thefiles within compressed filesand removes the compressedfiles.

1 Microsoft Office AutomaticScan

497Customizing settingsAbout Antivirus settings

Page 498: Help

Scans the Microsoft Officefiles when you open them.

If you install Microsoft Office2000 or later after Norton360 is installed, you mustturn on this option to scanMicrosoft Office filesautomatically.

1 Rootkits and Stealth ItemsScan

Scans for rootkits and othersecurity risks that might behidden on your computer.

1 Network Drives Scan

Scans the network drivesthat are connected to yourcomputer.

Norton 360 performs aNetwork Drives Scan duringFull System Scan andCustomScan. By default, theNetwork Drives Scan optionis turned on. If you turn offthis option, Norton 360 doesnot scan network drives.

1 Heuristic Protection

Scans your computer toprotect against unknownsecurity threats.

Norton 360 uses heuristictechnology to checksuspicious characteristics ofa file to categorize it asinfected. It compares thecharacteristics of a file to aknown infected file. If the filehas sufficient suspiciouscharacteristics, then Norton360 identifies the file asinfected with a threat.

Customizing settingsAbout Antivirus settings

498

Page 499: Help

1 Tracking Cookies Scan

Scans for the small files thatprograms might place onyour computer to track yourcomputing activities.

1 Full System Scan

Scans your computer whenit is idle.

When your computer is idle,Norton 360 runs a FullSystem Scan. After the scanis complete, you can view thesummary of the scan resultsand take appropriate actionwhen you start using yourcomputer again. You can usethe Configure option toschedule the Full SystemScan.

1 Number of Threads forManual Scan

Lets you select the numberof threads that Norton 360uses for manual scanThreads are subsets of aprocess that share theprocess resources butexecute independently ofeach other. Threads help inparallel execution of aprogram to allow theprogram to operate faster ina multiprocessorenvironment.

499Customizing settingsAbout Antivirus settings

Page 500: Help

The Scan Performance Profilessettings let you configure howNorton 360 should scan yourcomputer based on the digitalsignature and trust level of thefiles.

w You must configure theScan Performance Profilessettings before you run a scanor before a scan is scheduled torun. Norton 360 scans yourcomputer according to theconfiguration you specified inthe Scan Performance Profilessettings.

You can configure the followingScan Performance Profilessettings:1 Full Scan

Configure a complete scan ofyour computer.

1 Standard Trust

Configure a scan thatexcludes the files that areNorton Trusted.

1 High Trust

Configure a scan thatexcludes the Norton andCommunity Trusted files andthe files that have knowndigital signatures.

Scan PerformanceProfiles

Customizing settingsAbout Antivirus settings

500

Page 501: Help

Protected Ports settings protectthe POP3 and SMTP ports ofyour email program.

You can use this option tomanually configure your POP3and SMTP email ports for emailprotection. If the SMTP andPOP3 port numbers that yourInternet service provider (ISP)has provided for your emailprogram is different from thedefault SMTP and POP3 portnumbers, you must configureNorton 360 to protect the ports.

Protected Ports

Email Antivirus Scan protectsyou from the threats that aresent or received in emailattachments.

You can use the Email AntivirusScan options to define howNorton 360 should behave whenit scans email messages. Basedon the options you choose,Norton 360 automatically scansthe email messages that yousend or receive.

Email Antivirus Scan

Instant Messenger Scan optionslet you customize the scanningof the files that you receive frominstant messenger programs.

You can select the supportedinstant messenger programsfrom which you may receive files.Norton 360 scans the files thatyou receive from the selectedinstant messenger programs.

Instant Messenger Scan

501Customizing settingsAbout Antivirus settings

Page 502: Help

Exclusion / Low Risks

Customizing settingsAbout Antivirus settings

502

Page 503: Help

Exclusions options specify theitems such as folders, files, anddrives that you exclude fromNorton 360 scans. Scans,signatures, and low-risk itemsare some items that you canexclude from scanning.

Exclusions options also let youchoose which categories of risksyou want Norton 360 to detect.Your options are:1 Low Risks

Lets you manage the low-riskitems that are found in yourcomputer.

You can specify how youwant Norton 360 to respondto low-risk items.

1 Items to Exclude fromScans

Lets you determine whichdisks, folders, or files youwant to exclude from riskscanning.

You can add new exclusionitems or edit the added itemsin the excluded-items list.You can also remove itemsfrom the excluded-items list.

1 Items to Exclude fromAuto-Protect and SONARDetection

Lets you determine whichdisks, folders, or files youwant to exclude fromAuto-Protect scans andSONAR scans.

You can add the new itemsthat need to be excluded ormodify the items that youalready excluded. You can

503Customizing settingsAbout Antivirus settings

Page 504: Help

also remove items from theexcluded-items list.

1 Signatures to Exclude fromAll Detections

Lets you select known risksby name and remove a riskname from theexcluded-items list

You can also view the riskimpact that is based on theperformance, privacy,removal, and stealth impact.

w Exclusions reduce yourlevel of protection and should beused only if you have a specificneed.

The Insight Network scan usesthe Cloud technology wherein aremote server on the Webcontains the latest virusdefinitions. Norton 360 scansyour computer for the latestsecurity threats. When Norton360 performs the InsightNetwork scan, it uses the virusdefinitions that are availablelocally and in the Cloud. Norton360 provides additionalprotection by using the mostrecent definitions in the Cloud,apart from the definitions thatare available locally on yourcomputer.

Insight Protection

About Antispyware and Updates settingsAntispyware protects your computer against thesecurity risks that can compromise your personalinformation and privacy.

Customizing settingsAbout Antivirus settings

504

Page 505: Help

Security risks, such as spyware and adware, cancompromise your personal information and privacy.Spyware and adware programs are closely related. Insome cases, their functionalities may overlap; but whilethey both collect information about you, the types ofinformation that they collect can differ.

Norton 360 protects your computer from vulnerabilitiesthrough the latest program updates and definitionupdates. Automatic LiveUpdate and Pulse Updatesobtain the latest virus definitions through definitionupdates and keep your computer secure from the latestsecurity threats.

You can use the following Antispyware and Updatessettings:

Antispyware options let youchoose which categories of riskyou want Norton 360 to detectfor Auto-Protect, manual, email,and instant messenger scans.

Antispyware

505Customizing settingsAbout Antivirus settings

Page 506: Help

Norton 360 protects yourcomputer from vulnerabilitiesthrough the latest program anddefinition updates. Definitionupdates contain the informationthat lets Norton 360 recognizeand alert you to the presence ofa specific virus or securitythreat. You can use the Updatesoptions to obtain the latest virusdefinitions through definitionupdates and keep your computersecure from the latest securitythreats. Your options are:

1 Automatic LiveUpdate

Automatic LiveUpdateautomatically checks fordefinition and programupdates when you areconnected to the Internet.

1 Pulse Updates

In addition to the definitionupdates that AutomaticLiveUpdate downloads,Norton 360 uses streamingtechnology to download thelatest virus definitions. Thesedownloads are called PulseUpdates. The Pulse Updatesare lighter and faster, andkeep your computer securefrom the ongoing threats onthe Internet.

Updates

About Firewall settingsFirewall settings in Norton 360 check your PC's Internetconnection to protect it from unwanted communicationactivity and Internet intrusions.

Customizing settingsAbout Firewall settings

506

Page 507: Help

The following tabs are available in the Firewall settingswindow:

Lets you activate the generalfirewall features andcustomize the ports that yourcomputer uses to access Webpages

The general settings let youcontrol how firewall handlesthe uncommon protocols andthe network traffic to andfrom your computer.According to the generalsettings, the firewall allowsor blocks the incoming or theoutgoing connectionattempts and the sharing ofresources with yourcomputer. You can also usethe general settings to let thefirewall control connectionattempts to or from theblocked and the inactiveports in your computer.

General Settings

Lets you control settings forthe programs that access theInternet

Program Rules

Lets you determine how thefirewall handles incomingandoutgoing networkconnections of various kinds

You can change the settingsto allow or deny specifictypes of connections withyour PC.

Traffic Rules

507Customizing settingsAbout Firewall settings

Page 508: Help

Prevents intrusion attemptsand protects your Webbrowser from attacks bymalicious Web sites

You can use the DownloadIntelligence option that isavailable on this tab toprotect your computeragainst any unsafe file thatyou download. This featuresupports only downloadsusing the HTTP protocol andInternet Explorer and Firefoxbrowsers.

Intrusion and BrowserProtection

Customizing settingsAbout Firewall settings

508

Page 509: Help

Lets you activate theadvanced protection featuresof Smart Firewall

The advanced settings let youturn on or turn off theAutomatic Program Controlfeature. Automatic ProgramControl automaticallyconfigures Internet accesssettings for the Web-enabledprograms that you run for thefirst time.

The Automatic Learn IPv6NAT Traversal Traffic optionis available only whenAutomatic Program Controlis turned on. Norton 360provides the Automatic LearnIPv6 NAT Traversal Trafficoption to control the networktraffic that uses Teredo tocommunicate with yourcomputer.

When you turn off AutomaticProgram control, you can turnon Advanced EventsMonitoring. You can use theAdvancedEventsMonitoringoptions to configure theInternet access settings forInternet-enabled programsthe first time that they run.

Advanced Settings

About Firewall General settingsSmart Firewall General settings let you activate thegeneral firewall features and customize the ports that

509Customizing settingsAbout Firewall settings

Page 510: Help

your computer uses to access Web pages. Your optionsare:

Determines how the SmartFirewall handles uncommonprotocols.

Uncommon Protocols

Returns the Smart Firewall to itsdefault state.

You can use the Reset option toensure that all recommendedfirewall rules and settings areconfigured.

w If you reset the firewall,you remove any custom rules orsettings that you haveconfigured. Therefore, Norton360 prompts you with aconfirmation dialog box whenyou reset firewall.

Firewall Reset

Ensures that blocked andinactive ports do not respond toconnection attempts.

Active ports are prevented fromresponding to connectionattempts that have incorrectsource or destinationinformation.

Stealth Blocked Ports

Customizing settingsAbout Firewall settings

510

Page 511: Help

Automatically allows the Internettraffic that matches theconnections that an applicationopens.

Check this option to do thefollowing:1 Analyze the network traffic

that enters your computer.1 Block the suspicious

applications that try toconnect to your computer.

Stateful Protocol Filter

Allows the computers on thenetwork to share resources suchas files, folders, and printers(that are locally attached).

Automatic File/PrinterSharing Control

Blocks all networkcommunications to and fromyour computer.

Block All Network Traffic

About the Intrusion and Browser Protection settingsIntrusion Prevention scans all the network traffic thatenters and exits your computer and compares thisinformation against a set of attack signatures. Attacksignatures contain the information that identifies anattacker's attempt to exploit a known operating systemor program vulnerability. Intrusion Prevention protectsyour computer against most common Internet attacks.

If the information matches an attack signature,Intrusion Prevention automatically discards the packetand breaks the connection with the computer that sentthe data. This action protects your computer from beingaffected in any way.

Intrusion Prevention relies on an extensive list ofattack signatures to detect and block suspiciousnetwork activity. Norton 360 runs LiveUpdateautomatically to keep your list of attack signatures up

511Customizing settingsAbout Firewall settings

Page 512: Help

to date. If you do not use Automatic LiveUpdate, youshould run LiveUpdate once a week.

Norton 360 also provides the Web Browser Protectionfeature to protect your Web browser from maliciousprograms.

w The Browser Protection feature is available for InternetExplorer 6.0 or later, Chrome 10.0 or later, and Firefox3.6 or later.

With increasing Internet use, your Web browser isprone to attack by malicious Web sites. These Web sitesdetect and exploit the vulnerability of your Webbrowser to download malware programs to your systemwithout your consent or knowledge. These malwareprograms are also called drive-by downloads. Norton360 protects your Web browser against drive-bydownloads from malicious Web sites.

The Intrusion and Browser Protection settings alsoinclude the Download Intelligence option to protectyour computer against any unsafe file that youdownload. Download Intelligence provides informationabout the reputation level of any executable file thatyou download using the Web browser. DownloadIntelligence supports only downloads using the HTTPprotocol, Internet Explorer 6 browser or later, Chrome10.0 browser or later, and Firefox 3.6 browser or later.The reputation details that Download Intelligenceprovides indicate whether the downloaded file is safeto install. You can use these details to decide whetheryou want to install the executable file.

About Smart Firewall Advanced settingsSmart Firewall Advanced settings let you activate theadvanced protection features of Smart Firewall byturning off Automatic Program Control.

Automatic Program Control automatically configuresInternet access settings for the Web-enabled programsthat are run for the first time. The Automatic LearnIPv6 NAT Traversal Traffic option is available only

Customizing settingsAbout Firewall settings

512

Page 513: Help

when Automatic Program Control is turned on. Youcan use this option to specify how Norton 360 mustcontrol any network traffic that uses Teredo tocommunicate with your computer.

When you turn off Automatic Program control, youcan turn on Advanced Events Monitoring. You can usethe AdvancedEventsMonitoring options, to configurethe Internet access settings for Internet-enabledprograms the first time that they run. When you turnon the Advanced Events Monitoring feature, you areprompted with numerous firewall alerts. You can allowor deny any of the events that may harm yourcomputer. When the event occurs for the first time, afirewall alert appears and you can allow or block theevent. When you allow the event, the event detailsappear under the relevant category that is available inAdvanced Events Monitoring. The application thattriggers the allowed event is added to the Trusted listof its corresponding category in Advanced EventsMonitoring. You can remove the application from thelist. In this case, firewall alert appears when theapplication triggers the event next time.

The Advanced Events Monitoring settings consist ofthe following categories that provides your computerwith advanced protection:

Monitors themaliciousprogramsthat launch Internet-enabledprograms.

Program Component

Monitors themaliciousprogramsthat attach to safe programswithout being detected.

Program Launch

Monitors the Trojan horses ormalicious programs that launchtrusted applications in hiddenmode through command-lineparameters.

CommandLine Execution

513Customizing settingsAbout Firewall settings

Page 514: Help

Monitors the Trojan horses ormalicious programs that injectcode into an application'sprocess without triggeringfirewall alerts.

Code Injection

Monitors the Trojan horses andother malicious programs thatmanipulate an application'sbehavior to connect to theInternet without triggeringfirewall alerts.

Window Messages

Monitors the Trojan horses andother malicious programs thatbypass network traffic.

These programs penetrate theWindows TCP/IP layer to sendand receive data withouttriggering firewall alerts.

Direct Network Access

Monitors themaliciousprogramsthat use the documentedinterfaces that the trustedapplications provide to transmitdata outside the networkwithout triggering firewall alerts

Active Desktop Change

Monitors themalicious keyloggerprograms that access personalinformation of a user on aparticular computer bymonitoring their keystrokeactivities.

Key Logger Monitor

Monitors themaliciousprogramsthat manipulate an application'sbehavior by instantiatingcontrolled COM objects.

COM Control

Customizing settingsAbout Firewall settings

514

Page 515: Help

About Norton AntiSpam settingsWith the increase in usage of email, many users receivea number of unwanted and unsolicited commercialemail messages that are known as spam. Not only doesspam make it difficult to identify valid email messages,but some spam contains offensive messages andimages.

Norton AntiSpam incorporates several powerfulfeatures to reduce your exposure to unwanted onlinecontent.

Norton AntiSpam settings help you configure thefollowing:

1 The email client with which Norton AntiSpamshould integrate

1 The list of allowed email senders

1 The list of blocked email senders

1 The email addresses and domains that NortonAntiSpam should not import into the list of allowedand blocked email senders

1 The option to send feedback to Symantec aboutmisclassified email

1 The option to filter email messages through WebQuery to maintain high spam detection efficiency

515Customizing settingsAbout Norton AntiSpam settings

Page 516: Help

You can configure Norton AntiSpam settings on thefollowing tabs:

The options on the Filter tab letyou configure the list of allowedand blocked email senders. Youcan also configure the option tofilter the email messagesthrough the Web Query filter.You can define whether feedbackabout a misclassified emailmessage should be sent toSymantec. In addition, you canconfigure the Address BookExclusions list.

Filter

The options on the ClientIntegration tab let you integrateNorton AntiSpam with youremail clients to keep you freefrom unsolicited emailmessages. You can also specifywhether or not to display a briefintroduction of Norton AntiSpameach time you start your emailprogram. In addition, you canspecify which address book youwant Norton AntiSpam tointegrate with.

Client Integration

About Filter settingsThe Filter tab in the AntiSpam settings windowprovides options to configure AntiSpam settings.

You can use the following options on the Filter tab:

Lets you exclude the emailaddresses that must not beautomatically added from youraddress book to the Allowed List.

Address Book Exclusions

Customizing settingsAbout Norton AntiSpam settings

516

Page 517: Help

Lets you add specific addressesand domains (for example,@symantec.com) fromwhichyouwant to receive email messages.

Allowed List

Lets you add specific addressesand domains from which you donot want to receive emailmessages.

Norton AntiSpam marks all emailmessages from these addressesor domains as spam.

Blocked List

Lets you check the SymantecWeb servers to filter the spamemail messages which the localfilters classify as legitimate.

Web Query

Lets you configure your POP3and SMTP email ports for emailprotection.

Protected Ports

About Client Integration settingsThe Client Integration tab in the AntiSpam settingswindow lists the supported email programs, or clients,that are installed on your computer and theirassociated address books.

517Customizing settingsAbout Norton AntiSpam settings

Page 518: Help

You have the following options on the ClientIntegration tab:

Norton 360 supports NortonAntiSpam integration withMicrosoft Outlook and OutlookExpress. In Windows Vista,Norton 360 also supports NortonAntiSpam integration withWindows Mail.

When you turn on an emailclient, Norton AntiSpamintegrates with the email client.

Email Clients

Norton 360 supports NortonAntiSpam integration with theaddress books of email clientsfrom which you want NortonAntiSpam to import emailaddresses.

You can also import into theAllowed List the list of addressesthat are present in an emailprogram. You do not have tointegrate Norton AntiSpam withyour email clients to import theaddresses into the Allowed List.

Address Books

The Feedback option under the Miscellaneous rowlets you send feedback about the misclassified emailmessage to Symantec.

w The option is available only when Microsoft Outlookor Outlook Express is installed on your computer.

The WelcomeScreen option under the Miscellaneousrow provides a brief introduction of Norton AntiSpameach time you start your email program. You can turnoff the Welcome Screen option if you do not want thewelcome screen to appear.

Customizing settingsAbout Norton AntiSpam settings

518

Page 519: Help

The following email clients do not support clientintegration:

1 Outlook 2010 64-bit

1 Thunderbird

1 Windows Mail

About My Network settingsThe Network Security Map settings let you configurethe communication port that Norton products use tocommunicate with each other. You can also specifywhether to display the Network Security Overviewwindow when you open Network Security Map.

You can use the Configure option in the NetworkSecurity Map row to access Network Security Mapwindow. The NetworkSecurityMap window providesa pictorial representation of the devices on the networkto which your computer is connected. You can view thedetails of each device before you set up RemoteMonitoring. The ProductConfiguration panel appearswhen you click the Configure option for the first time.The ProductConfiguration panel helps you install thecomponent that is required to view Network SecurityMap.

519Customizing settingsAbout My Network settings

Page 520: Help

You have the following options:

Manages the trust level of the devicesthat you manually add to your homenetwork.

Trust Control is a special networkthat lists all the devices that youmanually add to the Network SecurityMap, irrespective of their connectionstatus. You can select the TrustControl network in the NetworkDetails drop-down list to view thedevices that you added. You can alsoreclassify the devices that you addedto the Network Security Map astrusted or restricted. You cannot editthe details of Trust Control network.

Trust Control

Removes all of the devices that arelisted in Network Map.

You can purge Network Map if youwant to create a new list of devices.For example, you can purge all of thedevices that were present on yourprevious network before you connectto a new network. Ensure that youdisable Remote Monitoring beforeyou purge the Network Map. Norton360 cannot purge the Network Mapwhen the Remote Monitoring isturned on.

w Norton 360 purges the devicesthat you add manually in the TrustControl network depending upontheir trust level. It does not purge thedevices that have a trust level of FullTrust or Restricted.

Network Map

Customizing settingsAbout My Network settings

520

Page 521: Help

Shows the communication port thatNorton products use to communicatewith each other over the network.

If you change the communicationport number on your computer, youmust change it on each computerthat is connected to your NetworkSecurity Map. In addition, when youfind more computers that use theRemote Monitoring Setup process,ensure that the same port number isused on every computer.

w Though this communicationport is configurable, Symantecrecommends that you do not changethe port number to avoid potentialconflicts with other well-knownnetworking ports. If you change thecommunication port number, youmust use a port number in the range1-65535.

CommunicationsPort

Displays the Network SecurityOverview window when you openNetwork Security Map.

Welcome Screen atStartup

About backup settingsYou can use the backup settings in Norton 360 toconfigure your system backup.

Norton 360 Backup lets you perform the followingtasks:

1 Select the files that are required to be backed up.

1 Choose the location to store the backed up files.

1 Assign a schedule to run a backup.

In addition to the backup tasks, Norton 360 backupsettings let you easily access the backup status of a

521Customizing settingsAbout backup settings

Page 522: Help

particular file without opening the product. TheBackup Settings window provides you the option toturn off or turn on the Backup.

Under Backup, you have the following options:

Lets you configure what, where,and when to back up yourimportant files

You can use the Configureoption to specify the source,destination, and schedule of thebackup.

Manage Backup

Lets you view the backup statusof a file by adding the statusoverlay to the file’s icon

The status overlays that appearsare:1 Green icon with a check mark

Indicates that the file hasbeen backed up

This icon changes to blueicon with arrows if youmodify the file.

1 Blue icon with arrows

Indicates that the file has notbeen backed up

This icon changes to greenwhen Norton 360automatically backs up thefile during idle time.

1 Gray icon with a slash mark

Indicates that the file hasbeen excluded from backup

Norton 360 displays adisabled backup status on afile when you exclude the filefrom any of the backup sets.

Backup Status Overlays

Customizing settingsAbout backup settings

522

Page 523: Help

Lets you view the list of backupdestinations where your files arebacked up in the WindowsExplorer

You can also add a file to abackup set and delete a file froma backup set. In addition, youcan restore a file from a backupset on the Norton Backup Driveto your customized location.

Norton Backup Drive

Lets you add or exclude a file ora folder to a backup set by usingthe right-click shortcut menu

You can use this option after youconfigure Backup in theManageBackup Sets window. It listsdown all the available backupsets for easy backups.

Context Menu

Lets you view the backup statusof each backup set on theBackup tab in the file Propertiespage that you included in yourbackup

It lists down all the availablebackup sets along with the dateand time that it was last backedup. It also shows thecorresponding icon overlay thatindicates if the file is included orexcluded in a particular backupset.

Property Page

523Customizing settingsAbout backup settings

Page 524: Help

Lets you specify the amount oflocal disk space that you want toreserve.

When you perform an onlinebackup, Norton 360 creates atemporary file in your local diskfor file transfer. At times, thisfile becomes large and consumesa large amount of free spaceavailable on your local drive.

When the available free diskspace on your computer reachesthe specified limit, Norton 360notifies you and does notperform an online backup. Youmust free some disk space andthen perform an online backup.By default, Norton 360 reserves2048 MB (2 GB) of your localdisk space.

Reserved FreeDisk SpaceDuring Online Backup (inMB)

About Identity Protection settingsIdentity thieves often use fraudulent Web sites toattempt to trick you into divulging private information.These sites may be disguised as shopping sites orfinancial transaction sites. Norton 360 helps guardagainst identity theft by verifying the Web sites youvisit.

Antiphishing, Norton Safe Web, and Identity Safefeatures in Norton 360 let you safely browse theInternet and securely perform online transactions.

When you install Norton 360, it adds the NortonToolbar to Internet Explorer, Chrome and Firefox.Norton 360 protects your Internet Explorer browser,Chrome browser, and Firefox browser when you turnon the Safe Surfing option.

Customizing settingsAbout Identity Protection settings

524

Page 525: Help

Antiphishing tells you the following things about theWeb pages that you visit:

1 If it is safe to enter confidential information

1 If the Web page is known to be fraudulent

1 If the Web page is approved by Symantec

1 If the Web page is known to belong to a suspicioussite

1 If the Web page is known to give annoying results

Norton Safe Web lets you know that a Web site ismalicious before you visit it. It provides you a safe Websearch environment by displaying the site rating iconsnext to every search result.

When you turn on Norton Safe Web, you can see thefollowing site rating icons next to the search results:

Indicates the site is VeriSigntrusted

Norton Secured icon

Indicates that the site is safe tovisit

Green OK

Indicates that the site mayattempt to install malicioussoftware in your computer andis unsafe to visit

Red cross (x) mark

Indicates that the site mayprovide annoying results

Yellow exclamation mark

Indicates that Norton Safe Webhas not analyzed the site and itdoes not have sufficientinformation

Grey question mark

The Identity Safe feature in Norton 360 lets you saveand protect your logins. However, the feature remainsinactive until you create an Identity Safe password and

525Customizing settingsAbout Identity Protection settings

Page 526: Help

log in to Identity Safe. The password protects you byrestricting unauthorized access to your data in IdentitySafe.

The Identity Safe feature provides you the ease of usingyour Identity Safe data when you are on the move. Youcan create an online vault and save your data in theonline vault. You access your sensitive Identity Safedata from any computer that is connected to theInternet.

You can set up Identity Safe in the following areas ofNorton 360:

1 The IdentitySafe section under IdentityProtectionoption in the Settings window

1 The Identity Protection section in the Norton 360main window

Identity Safe provides you the following features for asecure online transaction experience:

Table 13-1 Identity Safe features

AdviceDescriptionFeature

When you saveall of your logininformation inIdentity Safe, youcan do thefollowing:1 Easily track

all of yourlogins

1 Quicklylaunch yourlogin Webpages

Lets youmanageyourlogininformation

Thisinformationincludessuch thingsas youremail logincredentialsand Internetbankingcredentials.

Edit Logins

Customizing settingsAbout Identity Protection settings

526

Page 527: Help

AdviceDescriptionFeature

You can use theinformation thatyou store in thecards to do thefollowing:1 Automatically

fill forms1 Provide

sensitiveinformationwithouthaving totype it whileyou areonline

In this way,Identity Safeprotects youfrom keyloggersthat steal andmisuse youridentity.

Lets youmanageyourpersonalinformationin one place

Edit Cards

527Customizing settingsAbout Identity Protection settings

Page 528: Help

AdviceDescriptionFeature

It becomesdifficult tomanage variousidentitynumbers. EditNotes stores allof your sensitiveIDs in a verysecure way andlets you easilyuse them whileyou are online.

Lets youstore andmanagesensitiveinformation

In EditNotes, youcan includeinformationsuch asSocialSecuritynumber,driverlicensenumber,insurancepolicynumber, andlegal andfinancialinformation.

Edit Notes

About Task Scheduling settingsThe Task Scheduling settings let you specify the tasksthat Norton 360 should run automatically when yourcomputer is idle. They also help you to schedule youractivities that are related to security, performance, andbackup.

Customizing settingsAbout Task Scheduling settings

528

Page 529: Help

Task Scheduling includes the following settings:

Lets you specify the tasks thatshould run in the backgroundautomatically when yourcomputer is idle

These automatic tasks includeactivities that are related to PCSecurity and PC Tuneup.

Your options are:1 InternetExplorer Temporary

Files1 Windows Temporary Files

1 Internet Explorer History

1 Disk Optimization

1 Registry Cleanup

Automatic Tasks

529Customizing settingsAbout Task Scheduling settings

Page 530: Help

Scheduling

Customizing settingsAbout Task Scheduling settings

530

Page 531: Help

Lets you schedule PC Securityand PC Tuneup related activities

You can specify how oftenNorton 360 should scan yoursystem for security andperformance issues and when itshould perform backups.

You have the following optionsfor scheduling custom PCSecurity and PC Tuneupactivities:1 Automatic (Recommended)

This option is therecommendedoption.Norton360 detects the time your PCis idle and then automaticallyruns the tasks.

1 Weekly

You can schedule to run yourtasks on a weekly basis. Youmust specify the day andtime. You can also specifythat the schedule must runonly when the PC is idle.

1 Monthly

You can schedule to run yourtasks on a monthly basis. Youmust specify the time andthe day of the month. Youcan also specify that theschedule must run only whenthe PC is idle.

1 Manual Schedule

You can run the tasksmanually.

Your computer's performance ismaximized if you schedule yourcritical operations to occur whenyour computer is idle. Norton360 identifies your computer as

531Customizing settingsAbout Task Scheduling settings

Page 532: Help

idle when there is no detectablemouse or keyboard activity for aperiod that you specify as idletimeout duration. When youschedule your scans weekly ormonthly and check the Run onlyat idle time option, Norton 360scans your computer when it isidle. Symantec recommends youto check the Run only at idletime option to experience betterperformance of your computer.

You can use the Click here toschedule backup option tonavigate to the Manage BackupSets window. You can scheduleyour backup set in theWhen tab.

About Administrative SettingsYou can use Administrative Settings window toconfigure various important options of Norton 360.

You have the following options:

Lets you configure Norton 360to defragment your boot volumeor the local disk that containsthe boot volume when yourcomputer is idle.

When the option is turned on,Norton 360 automaticallyschedules the optimization afteryou install an application onyour computer. Optimizationspeeds up your computer’sperformance by defragmentingthe fragmented parts of the disk.

Idle Time Optimizer

Customizing settingsAbout Administrative Settings

532

Page 533: Help

Lets you view how Norton 360has protected you for the past30 days.

This report includes theactivities that Norton 360performed to protect yourcomputer. You can turn on theMonthly Report option to letNorton 360 automaticallydisplay the Monthly Report oncein every 30 days.

Monthly Report

Lets you automatically downloadthe latest version of the Norton360.

You can easily upgrade to thelatest version of Norton 360when prompted. By default, thisoption is turned on. Symantecrecommends you to install thelatest product version as it mightcontain new features, and itensures better protectionagainst security threats.

w This feature may not workin some versions of Norton 360.

Automatic Download ofNew Version

533Customizing settingsAbout Administrative Settings

Page 534: Help

Lets you specify the automaticconfiguration details, proxysettings, and the authenticationdetails to connect to theInternet.

Programs such as LiveUpdateand Norton Insight use thespecified proxy server settingsto connect to the Symantecserver over the Internet.LiveUpdate uses proxy settingsto retrieve updates. NortonInsight uses proxy settings toobtain specific informationabout the files such as trust levelor digital signature.

Network Proxy Settings

Customizing settingsAbout Administrative Settings

534

Page 535: Help

Lets you submit selectedsecurity and application data toSymantec for analysis.

Norton Community Watchprotects you against newpotential risks. It collects theinformation about new securitythreats from your computer andsubmits the information toSymantec for analysis. Symantecassesses the data to identify thenew threats and resolves it.

The Detailed Error DataCollection option is availablewhen the Norton CommunityWatch option is turned on.

Detailed Error Data Collectionlets you allow or deny some ofthe detailed data submissions.These detailed data may varydepending on theNorton-specific errors andcomponents. You can use theAlways, Never and Ask Meoptions to configure thesubmissions.

NortonCommunityWatch

Lets you configure Norton 360to show or hide the notificationsthat appear whenNorton-specific automaticbackground tasks are run.

Norton Task Notification

535Customizing settingsAbout Administrative Settings

Page 536: Help

Performance Monitoring

Customizing settingsAbout Administrative Settings

536

Page 537: Help

Lets you monitor theperformance of your computer.

When the PerformanceMonitoring option is turned on,Norton 360 monitors the CPUusage and memory usage of yourcomputer. It also records theimportant system activities thatyou performed over the periodof the last three months.

In addition, Norton 360 notifiesyou with performance alertswhen there is a high usage ofyour system resource by aprogram or process.

You have the following optionswhen the PerformanceMonitoring option is turned on:1 Performance Alerting

Lets you configure Norton360 to detect and notify youabout the increased usage ofyour computer resources byany program or process.

Norton 360 alerts you withthe information about theprogram name and theresources that the programuses. The Details & Settingslink in the notification alertlets you view additionaldetails about the resourceconsumption by the programin the File Insight window.

When this option is set toOn,Norton 360 notifies you withthe performance alerts andsaves the event in theSecurity History log. Whenthis option is set to LogOnly,

537Customizing settingsAbout Administrative Settings

Page 538: Help

Norton 360 saves the eventin the Security History logbut does not alert you withthe notifications. You canalso turn off this option ifyou do not want to viewperformance alerts. Bydefault, this option is turnedon.

1 Resource Threshold Profilefor Alerting

Lets you configure theresource threshold profile fordisplaying performancealerts.

When the resourceconsumption of a programexceeds the definedthreshold limit, Norton 360notifies you with aperformance alert.

You can set your thresholdlevel to Low, Medium, orHigh. Medium is the defaultsetting.

Customizing settingsAbout Administrative Settings

538

Page 539: Help

1 UseLowResourceProfileOnBattery Power

Lets you configure Norton360 to change the resourcethreshold to low profile whenyour computer runs onbattery power.

It ensures betterperformance of yourcomputer on battery power.When this option is turnedoff, Norton 360 uses thethreshold level that you setin the Resource ThresholdProfile For Alerting option.By default, this option isturned on.

539Customizing settingsAbout Administrative Settings

Page 540: Help

1 High-Usage Alert for:2 CPU

When this option isturned on, Norton 360detects and notifies youabout the increasedusage of the CPUresource by any programor process. By default,this option is turned on.

2 Memory

When this option isturned on, Norton 360detects and notifies youabout the increasedusage of memory by anyprogram or process. Bydefault, this option isturned on.

2 Disk

When this option isturned on, Norton 360detects and notifies youabout the increasedusage of your disk by anyprogram or process. Bydefault, this option isturned off.

2 Handles

When this option isturned on, Norton 360detects and notifies youabout the increasedusage of handles by anyprogram or process. Ahandle is a pointer thatenables a program toaccess or identify aresource. By default, thisoption is turned off.

Customizing settingsAbout Administrative Settings

540

Page 541: Help

1 Program Exclusions

Lets you select specificprograms to exclude fromappearing in performancealerts.

You can use the Configureoption to list the programsfor which you do not want toget performance alerts.

Lets you save your battery powerby suspending a list ofbackground jobs when yourcomputer is on battery power.

By default, this option is turnedon.

Power Saving Mode

541Customizing settingsAbout Administrative Settings

Page 542: Help

Lets you secure the product andprotect it from unauthorizedchanges.

You have the following options:1 Non-Admins Access to

Settings

Lets you access andconfigure all the options inthe Settings window from anon-admin user account aswell

By default, this option isturned off. You need to log into your computer as anadministrator to turn on thisoption. You cannot accessthe Settings window if theSettings window is openedin some other user accounton your computer.

1 Norton Product TamperProtection

Lets you protect your Nortonproduct from an attack ormodification by unknown,suspicious, or threateningapplications

1 Settings PasswordProtection

Lets you protect Norton 360settings with a password. Itprotects the product settingsfrom unauthorized access

1 Product State Monitoring

Lets you monitor or ignorethe protection status ofAntivirus, Firewall, IdentityProtection, andMiscellaneous features ofNorton 360

Product Security

Customizing settingsAbout Administrative Settings

542

Page 543: Help

Silent Mode Settings

543Customizing settingsAbout Administrative Settings

Page 544: Help

Lets you turn on or turn offSilent Mode.

You have the following options:1 Silent Mode

When you turn on the SilentMode option, you enableSilent Mode for a specifiedduration. Norton 360suppresses all alerts andsuspends the backgroundactivities for the durationthat you specify.

1 Full Screen Detection

When you turn on the FullScreen Detection option,Norton 360 automaticallydetects the applications thatyou run in full-screen modeand enables Silent Mode.Norton 360 suppresses mostof the alerts and suspendsthe background activities.The only activities that runare those that protect yourcomputer from viruses andother security threats.

1 QuietModeonDetection of:2 IMAPI 2.0 Disk Burn

When you use a MediaCenter application toburn a CD or DVD, Norton360 detects the activity,and automatically turnson Quiet Mode. WhenQuiet Mode is turned on,Norton 360 suppressesthe background activitiesbut continues to displayalerts and notifications.

2 Media Center TVRecording

Customizing settingsAbout Administrative Settings

544

Page 545: Help

When you use a MediaCenter application torecord a TV program,Norton 360 detects theactivity, andautomatically turns onQuiet Mode. When QuietMode is turned on,Norton 360 suppressesthe background activitiesbut continues to displayalerts and notifications.

2 User-SpecifiedPrograms

When you run anapplication that is listedin the User-SpecifiedPrograms list, Norton360 detects the activity,and automatically turnson Quiet Mode. WhenQuiet Mode is turned on,Norton 360 suppressesthe background activitiesbut continues to displayalerts and notifications.

You can configure the listof programs for whichyou want to turn on QuietMode.

Lets you configure Norton 360to notify you about special offerson the latest Norton products,add-ons, and other usefulinformation from Symantec.

Special OfferNotification

545Customizing settingsAbout Administrative Settings

Page 546: Help

Lets you delay the automaticrunning of Norton-specificbackground tasks when youresume your computer fromhibernate mode or standbymode.

Automatic ResumeDelay

Lets you specify duration forrunning Norton-specificprograms on your computer thatrun automatically when you turnon your computer.

It does not delay Norton 360protection. You can specifyAutomatic Tasks Delay durationfor a period of 1 minute to 20minutes. The default duration is20 minutes.

Automatic Tasks Delay

Lets you specify the Idle Timeoutduration after Norton 360identifies your computer as idle.

You can specify Idle Timeout fora period of 1 minute to 30minutes. The default duration is10 minutes.

Idle Time Out

Customizing settingsAbout Administrative Settings

546

Page 547: Help

Lets your PC run smoothly andefficiently by deleting theunused temporary files andbrowsing history if you useFirefox Web browser.

Norton 360 automatically cleansup Internet Explorer temporaryfiles, history, and bookmarks asa background activity.

You have the following options:1 Firefox Temporary File

Cleanup

Lets you clean up thetemporary files that getaccumulated when you visitWeb pages in the Firefox Webbrowser.

1 Firefox History Cleanup

Lets you clean up the historyand bookmarks that getaccumulated when you visitWeb pages on the FirefoxWeb browser.

Firefox Cleanup

About Norton Product Tamper ProtectionNorton Product Tamper Protection prevents outsideprograms from making changes to the Norton product.This security feature also prevents Windows SystemRestore from changing Norton files, which results inthe Restoration Incomplete message.

Norton Product Tamper Protection protects Norton360 from an attack or modification by any virus orother unknown threat. You can protect your productfrom accidental modification or deletion by keepingthe NortonProductTamperProtection option turnedon.

547Customizing settingsAbout Administrative Settings

Page 548: Help

If you want to temporarily turn off Norton ProductTamper Protection, you can turn it off for a specifiedduration.

w You cannot run System Restore on your computer whenNortonProductTamperProtection is turned on. Youmust temporarily turn off Norton Product TamperProtection to run a successful System Restore.

Turning off or turning on Norton Product Tamper Protection

Norton Product Tamper Protection protects the Norton360 files from an attack or modification by any virusor other unknown threat. You can protect your productfrom accidental modification or deletion by keepingthe NortonProductTamperProtection option turnedon.

If you want to temporarily turn off Norton ProductTamper Protection, you can turn it off for a specifiedduration.

w You cannot run System Restore on your computer whenNortonProductTamperProtection is turned on. Youmust temporarily turn off Norton Product TamperProtection to run a successful System Restore.

To turn off Norton Product Tamper Protection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Product Security, in the Norton ProductTamper Protection row, move the On/Off switchto the right to the Off position.

4 Click Apply.

5 In the Security Request dialog box, in the Selectthe duration drop-down list, select how long youwant to turn off Norton Product Tamper Protection.

6 Click OK.

7 In the Settings window, click Close.

Customizing settingsAbout Administrative Settings

548

Page 549: Help

To turn on Norton Product Tamper Protection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Product Security, in the Norton ProductTamper Protection row, move the On/Off switchto the left to the On position.

4 Click Apply, and then click Close.

About securing Norton 360 Settings using a passwordYou can configure Norton 360 to prevent unauthorizedaccess to your product settings. If you share yourcomputer with others and do not want them to modifyyour Norton 360 Settings, you can secure Norton 360Settings using a password. The Settings PasswordProtection option lets you secure your Norton 360Settings by setting up a password.

By default, Settings Password Protection option isturned off. You must turn on the Settings PasswordProtectionoption to set up a password for your productsettings. You can access the Settings PasswordProtection option under Product Security, in theAdministrativeSettings window. The password mustbe between 8 and 256 characters in length.

After you set up a password for Norton 360 Settings,you must enter the password each time to access orconfigure your product settings. If you forget yoursettings password, you can reset the password in thewindow that appears when you choose to uninstallNorton 360. You do not need to uninstall the productto reset your password. You can use the reset settingspassword option in the Select your UninstallPreference window to reset your password.

w The reset settings password option appears in theSelect your Uninstall Preference window only whenthe SettingsPasswordProtection option is turned on.

549Customizing settingsAbout Administrative Settings

Page 550: Help

You can turn off the Settings Password Protectionoption if you no longer require password protectionfor your Norton 360 Settings.

Securing your Norton 360 Settings using a password

You can secure your Norton 360 Settings fromunauthorized access by setting up a password for yourproduct settings. The Settings Password Protectionoption in the AdministrativeSettings window lets yousecure your Norton 360 Settings using a password.

After you set up a password for Norton 360 settingsyou must enter the password each time to view orconfigure your product settings.

By default, the Settings Password Protection optionis turned off. You must turn on the SettingsPasswordProtection option to set up a password for your productsettings.

w The password must be between 8 and 256 charactersin length.

To secure your Norton 360 Settings using a password

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under ProductSecurity, in the SettingsPasswordProtection row, move the On/Off switch to the leftto the On position.

4 Do one of the following:

1 In the Settings Password Protection row, clickConfigure.

1 In the Settings window, click Apply.

5 In the dialog box that appears, in the Password box,type a password.

6 In the Confirm Password box, type the passwordagain.

7 Click OK.

8 In the Settings window, click Close.

Customizing settingsAbout Administrative Settings

550

Page 551: Help

Turning off Norton 360 Settings password

You can protect your Norton 360 Settings with apassword using the Settings Password Protectionoption. If the Settings Password Protection option isturned on, you need to enter the Settings passwordeach time to view or configure your Norton 360settings. You cannot access the product settingswithout providing your Settings password.

w In case you forget your Settings password, you canreset it using the resetsettingspassword option in theSelect Uninstall Preference window.

You can turn off the Settings Password Protectionoption if you do not require password protection forNorton 360 settings.

To turn off Norton 360 Settings password

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the dialog box that appears, in the Password box,type your Settings password, and then click OK.

4 In the SettingsPasswordProtection row, move theOn/Off switch to the right to the Off position.

5 In the Settings window, under Product Security,in the SettingsPasswordProtection row, move theOn/Off switch to the right to the Off position.

6 Click Apply, and then click Close.

Resetting your Norton 360 Settings password

If you forget your Norton 360 Settings password, youcan reset the password. You can reset your Norton 360Settings password using the reset settings passwordoption in the Select Uninstall Preference window.

To access the SelectUninstallPreference window, youmust choose to uninstall Norton 360. However, youneed not uninstall the product to reset your Settingspassword.

551Customizing settingsAbout Administrative Settings

Page 552: Help

w The reset settings password option appears in theSelect Uninstall Preference window only if theSettings Password Protection option is turned on. Touse the SettingsPasswordProtection option, go to theNorton 360 main window, and then click Settings>General >Product Security .

To reset your Norton 360 Settings password

1 On the Windows taskbar, click Start > ControlPanel.

2 In WindowsControlPanel, do one of the following:

1 In Windows XP, double-click Add or RemovePrograms.

1 In Windows Vista, click ProgramsandFeatures.

1 In Windows 7, click Programs > Programs andFeatures.

The Programs option in Windows 7 is availablewhen you select the Category option in the Viewby drop-down list.

3 In the list of currently installed programs, do oneof the following:

1 In Windows XP, click Norton360, and then clickChange/Remove.

1 In Windows Vista or Windows 7, click Norton360, and then click Uninstall/Change.

4 At the bottom of the Select Your UninstallPreference window, click reset settingspassword.

5 In the dialog box that appears, in the ResetPassword Key box, type the randomly generatedkey that is displayed against Reset Password Key.

6 In the New Password box, type the new password.

7 In the Confirm New Password box, type the newpassword again.

8 Click OK.

Customizing settingsAbout Administrative Settings

552

Page 553: Help

This chapter includes the following topics:

1 Finding the version number of your product

1 Finding the End-User License Agreement

1 About upgrading your product

1 About Norton Autofix

1 Staying informed about protection issues

1 About Support

1 Uninstalling Norton 360

Finding the version number of your productIf you want to upgrade your Norton product or wantto reach the customer support for assistance, you mustknow your product version number. You can find theversion number of your product on your computer.

To find the version number of your product

1 In the Norton 360 main window, click Support.

2 In the Support drop-down menu, click About.You can note the version number of your productin the window that appears.

14Finding additionalsolutions

Page 554: Help

Finding the End-User License AgreementEnd-User License Agreement (EULA) is a legaldocument that you agree to while installing theproduct. EULA contains information such as therestriction on sharing or usage of the software, theuser rights on the software, and the supportinformation.

You can read the EULA to learn more about thefollowing information:

1 The usage policies of Norton 360.

1 The terms and conditions for using Norton 360.

To find the End-User License Agreement

1 In Windows Explorer, double-click the drive whereNorton 360 is located.

2 Double-click Program Files > Norton 360 > MUI >version > 09 > 01.Where version represents the version number ofinstalled Norton 360.

3 Do one of the following:

1 If you are a North American user, double-clickEULA_NorthAmerica.htm.

1 If you are an International user, double-clickEULA_ International.htm.

About upgrading your productNorton 360 helps you upgrade your product if you havean active subscription. You can upgrade your currentproduct to the latest version without any cost as longas you have an active subscription with the currentproduct. If a new version of your product is available,Norton 360 lets you download the new version.

The Automatic Download of New Version optionautomatically downloads the latest available versionof Norton 360 and prompts you for free installation.To get the latest version of Norton 360, you need to

Finding additional solutionsFinding the End-User License Agreement

554

Page 555: Help

turn on the Automatic Download of New Versionoption. To turn on the Automatic Download of NewVersion option, go the Norton 360 main window, andthen click Settings > Administrative Settings >Automatic Download of New Version > On.

If you choose to install the latest version of the product,Norton 360 downloads and seamlessly installs the latestversion. Ensure that you have saved all your importantdata such as pictures and financial records before youinstall the new version of the product.

If you download and install the latest version of yourproduct, your subscription status remains the same asyour previous version of product. For example, youhave 200 days of subscription left with your currentversion of product and you upgrade your product tothe latest version. In this case, the subscription statusof your upgraded product remains 200 days only.

If a new version is not available, the Web page informsyou that no new version is available and your productis up to date. Symantec recommends that you have thelatest version of the product, as it contains new andenhanced features for better protection against securitythreats.

Product upgrade is different from the program updatesand the definition updates that are minorimprovements to your installed product. The maindifferences are as follows:

1 Product upgrade lets you download and install anew version of the entire product.

1 Definition updates are the files that keep yourSymantec products up to date with the latestantithreat technology.

1 Program updates are enhancements to Norton 360that Symantec issues periodically.

If a new version of the product is not available, ensurethat you have all the latest program updates anddefinition updates. LiveUpdate automates the processof obtaining and installing program and definition

555Finding additional solutionsAbout upgrading your product

Page 556: Help

updates. You can use LiveUpdate to obtain the latestupdates.

The upgrade process might not work if your Webbrowser is incompatible to communicate with theSymantec servers.

w Your product must be activated and you need anInternet connection to check and install new productversion.

Checking for a new version of the productYou can upgrade your product to the latest version ifyou have an active subscription. If you have a newversion available, you can download and install thenew version of your product. You can also let Norton360 notify you when a new version of your product isavailable. You can do so by turning on the AutomaticDownload of New Version option in theAdministrative Settings window. The latest versionof your product may contain new and enhancedfeatures for better protection against security threats.

When you check for a new version, details about yourproduct such as product name and version are sent toSymantec servers. The servers then check whether anew version of the specified product is available or not.

If a new version is available, you can download andinstall it from the Web page. If a new version is notavailable, the Web page informs you about it. In suchcase, you can run LiveUpdate to obtain latest programand definition updates and keep the existing versionof your product up to date.

The upgrade process might not work if your Webbrowser is incompatible to communicate with theSymantec servers. You can use Internet Explorerversion 6.0 or later, Chrome version 10.0 or later, andFirefox version 3.6 or later.

w Your product must be activated and you need anInternet connection to check if a new version isavailable and install new version of the product.

Finding additional solutionsAbout upgrading your product

556

Page 557: Help

To check for a new version of the product

1 In the Norton 360 main window, click Support.

2 In the Support drop-down menu, click Check forNew Version.This option is available only if your product isactivated. The Web page that appears displayswhether a new version of the product is availableor not.

3 Follow the on-screen instructions to download thenew product.

About Norton AutofixNorton Autofix provides additional product supportwith one-click access from the Norton 360 mainwindow. Norton Autofix performs a Quick Scan of yourcomputer and repairs problems without yourintervention. If the problem persists, you can use theOpen Support Web Site option to go to the NortonSupport Web site for help using our online forum, chat,email, or telephone.

In addition, the Norton Support Web site providesaccess to the knowledge base articles. By using thesearticles, you can easily find solutions to your technicalproblems.

The support technicians can help you solve morecomplex problems by using remote-assistancetechnology. The remote-assistance technology allowsSymantec support technicians to access your computeras remote users so that they can perform maintenanceor service.

w Support offerings can vary based on the language orproduct.

When you click the GetSupport option in the Supportdrop-down menu, Norton 360 checks your Internetconnection. To access Norton Autofix, ensure that yourcomputer is connected to the Internet. If you use aproxy server to connect to the Internet, you must

557Finding additional solutionsAbout Norton Autofix

Page 558: Help

configure the proxy settings of Norton 360. See“Configuring Network Proxy Settings” on page 51.

If you do not know your proxy settings, contact yourInternet service provider or network administrator forassistance.

Solving a problem using Norton AutofixNorton Autofix performs a Quick Scan of yourcomputer and repairs problems without yourintervention. If a problem persists, you can use theNorton Support Web site for additional online supportand contact options.

Your computer must be connected to the Internet toaccess Norton Autofix. If you use a proxy server toconnect to the Internet, you must configure the proxysettings of Norton 360.

w If you do not want to proceed with the support session,you can use the Cancel option to bypass the scan.

To solve a problem if your computer is connected to theInternet

1 In the Norton 360 main window, click Support.

2 In the Support drop-down menu, click GetSupport.

3 In the Norton Autofix window, do one of thefollowing:

1 If the problem is not fixed automatically, clickOpen Support Web Site, and follow theon-screen instructions to find additional support.

1 If the problem is fixed, click Close.

To solve a problem if your computer is unable to connectto the Internet

1 In the Norton 360 main window, click Support.

2 In the Support drop-down menu, click GetSupport.

3 Follow the on-screen instructions in the CheckingYourConnection window to attempt to correct yourconnection issue.

Finding additional solutionsAbout Norton Autofix

558

Page 559: Help

4 In the Checking Your Connection window, clickRetry.

5 If you use a proxy server to connect to the Internet,you may be prompted to authenticate. If you areprompted, then in the Proxy Settings Detectedwindow, do the following:

1 In the Username box, type the user name thatyou provided when you configured your NetworkProxy settings.

1 In the Password box, type the password that youprovided when you configured your NetworkProxy settings.

1 Click OK.

6 If the problem still persists, in the Norton Autofixwindow, click the click here link.Under SupportContactNumbers, select the region,and then your country to view the contact details.You can use the contact details to contact thetechnical support team.

Staying informed about protection issuesIf you need help using Norton 360, you can find helpfulinformation on the Symantec Web site. It containsmany useful and informative features that areespecially designed to complement Norton 360,including the following:

1 Detailed background information about currentthreats and outbreaks.

1 Newsletter to which you can subscribe.

1 Protection blog that lets you post your owncomments and view comments from experts.

w The Symantec Web site is constantly updated andenhanced, so the available resources may vary.

559Finding additional solutionsStaying informed about protection issues

Page 560: Help

To stay informed about protection issues

1 Open your Web browser, and go to the followingURL:http://www.symantec.com

2 In the Symantec Web site, click Norton.

3 In the menu bar that appears, do the following:

1 Click the Viruses&Risks tab, and then click anyitem on the left pane to find out more detailsabout it.

1 Click the Community tab, and then use one ofthe following:

Register as a user andparticipate in discussions.

You can create your own threadsof topics or take help from theexisting forum discussions.

Norton Forums

Read the messages thatprominent leaders post frominside and outside Symantec andobtain information straight fromthe source.

You can add comments or askquestions on the blogs that youare interested in.

Norton Blogs

Check about Norton in otherWeb sites and social networksthat are available.

Other NortonCommunities

About SupportIf you have purchased Norton 360, you can accessSupport from the product.

Finding additional solutionsAbout Support

560

Page 561: Help

w Support offerings may vary based on the language orproduct.

About Norton Support Web siteThe Norton Support Web site provides a full range ofself-help options.

By using Norton Support Web site, you can do thefollowing:

1 Find help with your product download, productsubscription, product activation, productinstallation, and other issues.

1 Find and download the latest product manual.

1 Manage your products and services using NortonAccount.

1 Search Norton Forum to find the additional producthelp about installing, configuring, andtroubleshooting errors. You can also post yourquestions in the forum and get answers fromexperts. To post your questions, you need to firstregister for Norton Forum.

1 Find information about the latest virus threats andremoval tools.

w Availability of support varies by region, language, orproduct. For additional support, go to the followingURL:

http://www.norton.com/support

In addition to the self-help options, you can use theContact Us option at the bottom of the Web page to

561Finding additional solutionsAbout Support

Page 562: Help

contact the technical support team in the followingways:

Chat in real time with asupport representative.

For more complex technicalissues, chat offers the optionto allow a supportrepresentative to connectremotely to your computerand resolve your problem.

Live Chat

Submit your question on ourWeb site and receive aresponse by email.

Email support has a slowerresponse time than chat orphone.

Email

Speak to a supportrepresentative in real time.

Phone

Search for additional producthelp about installing,configuring, andtroubleshooting errors.

Norton Forums

Using the Norton Support Web site

Norton Support Web site contains answers to the mostcommon customer questions. You can find the latestproduct manual, knowledge base articles, and virusremoval tools.

Norton Support Web site contains problem-solvingarticles that are presented in an easy step-by-stepformat. The articles are categorized and listed on theleft side of the Web page. Using the categories, you canbrowse through the available support topics. You can

Finding additional solutionsAbout Support

562

Page 563: Help

also use the SearchSupport box to find solution usinga keyword.

Norton Support Web site also contains useful links tothe product manual, the Norton Account, the NortonForum, and the spyware help under AdditionalResources.

To use the Norton Support Web site

1 In the Norton 360 main window, click Support.

2 In the Support drop-down menu, click GetSupport.

3 Follow the on-screen instructions.

4 In the NortonAutofix window, click OpenSupportWeb Site.The Norton Support Web page appears.

5 Follow the on-screen instructions.

About phone supportIf you have a problem that you cannot resolve usingNorton Autofix, use the click here link on the NortonAutofix window to get the phone number to contact asupport representative.

w Support offerings may vary based on the language orproduct.

If you cannot access phone support by using NortonAutofix, then you can access the phone support optionsat the following URL:

http://www.norton.com/support

Getting support by phone

When you click the GetSupport option in the Supportdrop-down menu, Norton Autofix performs a QuickScan of your computer and should repair yourcomputer problems. However, if the problem persists,you can use the Open Support Web Site option to goto the Norton Support Web site for help by telephone,email, chat, or forum.

563Finding additional solutionsAbout Support

Page 564: Help

You can also use the click here link at the bottom ofthe Norton Autofix window to contact a supportrepresentative.

w Availability of support varies by region. Regulartelephone and Internet connection fees apply in certaincountries.

To get support by phone

1 In the Norton 360 main window, click Support.

2 In the Support drop-down menu, click GetSupport.

3 Follow the on-screen instructions.

4 At the bottom of the Norton Autofix window, clickthe click here link.

5 In the Norton Autofix window, under SupportContact Numbers, select the region, and then thelocation.You can use the phone number to contact a supportrepresentative.

Support policySymantec recommends that you have the latest versionof the product, as it contains new and enhancedfeatures for better protection against security threats.Current help and support for your Norton product canbe found at the following URL:

www.norton.com/support

Symantec reserves the right to change its supportpolicies at any time without notice. You can view thelatest version of the support policy at the followingURL:

www.symantec.com/supportpolicy

About keeping your subscription currentSubscription period lengths vary by Symantec product.To maintain uninterrupted protection, you must keepyour subscription up to date. If you do not renew your

Finding additional solutionsAbout Support

564

Page 565: Help

subscription, you cannot obtain updates of any kindand the software no longer functions.

When you run LiveUpdate near the end of yoursubscription period, you are prompted to subscribe fora nominal charge. Follow the on-screen instructionsto renew your subscription.

When you renew your subscription, the definitionupdates and new product features are availablethroughout the subscription period. Please note thatfeatures may be added, modified, or removed duringthis period.

Worldwide service and supportWorldwide service and support solutions vary bycountry. To contact one of our Support offices, pleasego to the following Web site and select your language.

www.norton.com/support

If you are a Norton One Premium Member, go to thefollowing Norton One support Web site for informationon this topic:

https://one.norton.com/support

ClubNortonClubNorton is your one-stop resource center forInternet security. As a Norton customer, Symantecwants to make your experience with your computersafe, enjoyable, and productive. Whether you use yourcomputer to manage your personal finances, shoponline, or share your latest digital photos with friendsand family, ClubNorton makes your experience a goodone. Our goal is to consistently provide the proper toolsand information to keep you up to date.

For more information, go to the following URL andselect your country or region in the Select YourCountry/Region drop-down menu:

www.clubnorton.com

565Finding additional solutionsAbout Support

Page 566: Help

The ClubNorton Web page includes a regularly updatedarticle library, a glossary, the Norton Forums, and theNorton Update Center. You can also find the followinguseful links in the Web page:

1 Symantec Security Check

1 Subscription Troubleshooter

1 Home & Home Office Security

1 Product Manuals

1 Product Updates

1 Product Reviews

1 Order Status

1 Returns

1 Rebates

Uninstalling Norton 360You can remove Norton 360 from your computer in thefollowing ways:

1 From Windows Control Panel

1 From the Start menu

w You should print out the Uninstalling Norton 360 Helptopic before continuing with the uninstallation. Youcannot access online Help during uninstallation.

If you want to reinstall Norton 360 on your computer,you must uninstall Norton 360 from your computer.You can reinstall the product using the installation filethat you downloaded from Symantec Web site or fromthe product disc. To reinstall Norton 360, follow theinstallation procedures that are available in the userguide.

To uninstall Norton 360 from Windows Control Panel

1 On the Windows Taskbar, click Start > ControlPanel.

Finding additional solutionsUninstalling Norton 360

566

Page 567: Help

2 In Windows ControlPanel, do one of the following:

1 In Windows XP, click AddorRemovePrograms.

1 In Windows Vista, click ProgramsandFeatures.

1 In Windows 7, click Programs > Programs andFeatures.

The Programs option in Windows 7 is availablewhen you select the Category option in the Viewby drop-down list.

3 In the list of currently installed programs, do oneof the following:

1 In Windows XP, click Norton360, and then clickChange/Remove.

1 In Windows Vista or Windows 7, click Norton360, and then click Uninstall/Change.

4 In the page that appears, under Select YourUninstall Preference, click one of the following:

Lets you retain your settings,passwords, and preferences forNorton features before youuninstall Norton 360

Select this option if you want toreinstall Norton 360 or anotherNorton product.

I plan to reinstall aNorton product. Pleaseleavemy settings behind.

Lets you completely removeNorton 360 without saving yoursettings, passwords, andpreferences

Please remove all userdata.

5 To uninstall Norton 360, click Next.

567Finding additional solutionsUninstalling Norton 360

Page 568: Help

6 Do one of the following:

1 Click Restart Now (recommended) to restartyour computer.

1 Click Restart Later to restart your computerlater.

Norton 360 is not fully uninstalled until you restartyour computer.

To uninstall Norton 360 from the Start menu

1 On the Windows taskbar, click Start>AllPrograms> Norton 360 > Uninstall Norton 360.

2 In the page that appears, under Select YourUninstall Preference, click one of the following:

Lets you retain your settings,passwords, and preferences forNorton features before youuninstall Norton 360

Select this option if you want toreinstall Norton 360 or anotherNorton product.

I plan to reinstall aNorton product. Pleaseleavemy settings behind.

Lets you completely removeNorton 360 without saving yoursettings, passwords, andpreferences

Please remove all userdata.

3 To uninstall Norton 360, click Next.

4 Do one of the following:

1 Click Restart Now (recommended) to restartyour computer.

1 Click Restart Later to restart your computerlater.

Norton 360 is not fully uninstalled until you restartyour computer.

Finding additional solutionsUninstalling Norton 360

568

Page 569: Help

Aabout customer support 561Actions window

deleting security risks 124performing actions 124restoring security risks 124submission, items to

Symantec 124activation 21

about 20Norton Account 24online backups 467problems 24troubleshooting 24

Add Rule Wizardopening 244using 245

Address Book Exclusionssetting 286

addressesadding allowed 287adding blocked 289importing allowed 287settings 516

Administrative Settingsabout 532

Advanced Modeallow an event 185

adwarefound by Auto-Protect 211

adware protection settings 482Aggressive

SONAR Protection 185alerts 219

responding to 239Allowed List 287Antiphishing

about 302hiding the toolbar 362showing the toolbar 362turning off 303turning on 303

AntiSpamabout 279Address Book Exclusions 286Allowed List 287Blocked List 289Client Integration 282configure 515Feedback 291settings 515Web Query 292

antivirus settings 482Application Ratings

check trust level 95Scan Performance Profiles 97

attack signatures 260attacks

network 234

Index

Page 570: Help

attentioninfected files 216infected items 158resolve any items 158

Attention Requiredabout 158resolving the risk 158

Auto-Protectnotifications 211

Automatic LiveUpdateturning off or turning on 44

Automatic Program Controlabout 239

automatic tasks 225automatic updates 38Autorun Restore

about 454restoring 455

Bbackground jobs

about 79monitoring 85

backup 227, 411additional help 463backup file categories 420Backup Set 417categories 103file extensions 426file selection 432file types 420Identity Safe data 350locations 435Norton Backup Drive 456preparation 413problem solving 460restoring 447, 450restoring selected files 451scheduling 444settings 471, 521supported media 435

backup (continued)turning off or turning on 469

Backup and Restoreabout 350schedules 230

backup file categoriesadding or editing file

extensions 427removing file extensions 429resetting file extensions 429

backup filesdeleting 430

Backup Setabout 417adding files and folders 432creating 418deleting 445excluding files and folders 433modifying 419renaming 419

Backup Settingsabout 521turning off and turning on 471

backupsabout 412locations 442online 464online storage space 468restore destinations 453running 446

Bandwidthdefining usage 298managing 296

Blocked List 289blocking

spam 279Boot Time Protection 204

configure 205boot viruses 223browser cache files 404

Index570

Page 571: Help

Browser Protectionturning on and turning off 266

Browsingoptions 352

Browsing Optionsabout 352

Ccache files 404Cards

about 343adding 344deleting 346duplicating 346update image 344updating 346

categories in Norton 360viewing details 56

CDs for backups 460changing

scan schedules 167cleaning up disks 401, 405cleanups

in PC Tuneup 401Client Integration

configuring 282cloud technology

Cloud 168ClubNorton

security tips 565communication port

modifying 399Computer

protecting 106computers

blocking with AutoBlock 263IP address 386

configureIdentity Safe 330

connections 106cookies protection settings 482

CPU graphabout 73obtaining historical data 75resource-consuming

processes 75CPU usage

viewing 74Creating custom scans

adding files 159adding folders 159

custom scanconfigure scan options 161select items 160

custom scansabout 159creating 159deleting 163editing 162particular area 159running a custom scan 162scan frequently 159schedule the custom scan 159scheduling 164, 167

customer supportabout 561using 562

customizingAllowed List 287Blocked list 289

Ddefinition status 46definition updates 39

obtaining 48definitions

virus and spyware 45deleting

custom scans 163deleting custom scans

deleting 163details links 56

571Index

Page 572: Help

detectingsecurity risks 210

deviceadding 384editing details 387excluding from Intrusion

Prevention scan 394purging from exclusion list 268remotely monitoring 376removing from the Network

Security Map 396viewing 376

deviceschanging trust level 389

Diagnostic Reportrunning 406

dialers protection settings 482disk optimization 227, 402disks

cleaning up 404fragmentation 402optimizing 402

domainsadding allowed 287adding blocked 289

Download Insightabout 269configuring alerts 275turning off notifications 273turning on notifications 273

Download Intelligenceturning off 272turning on 272

DVDs for backups 460

Eemail

menu 284program 284spam 279

error messages 219

EULAchecking 554

Events graphmonitoring activities 62

Ffeatures

email filtering 281Feedback

Norton AntiSpam 291file extensions

of infected files 216file infectors 223files

backing up 446fragmentation 402scanning 227selection, for backups 432

filterimporting allowed 287Web Query 292

filteringemail 515identifying email senders 287,

289SSL 279web-based 292

firewallgeneral settings 506, 509intrusion prevention 506program rules 506protection settings 257, 506removing programs 243traffic rules 506

firewall rulesabout 236adding 244changing the order of 255creating 239, 245default 237processing order 236, 255

Index572

Page 573: Help

firewall rules (continued)removing 258turning on and off 256

Firewall settingsadding programs 241

foldersscanning 227

fragmentation 402Full Screen Detection

about 191Full System Scan 155

scheduling 166

GGeneral Rules

adding 244removing 258

Hhack tools protection settings 482high-risk security threats

excluding from scanning 187home network

settings 519

Iicons in Norton 360 54Identity Protection

categories 103Settings 524

Identity Safeabout 313accessing 327, 363, 368backing up 350changing password 358configuring 330information 301logging in and out 328logins 335Norton toolbar 328

Identity Safe (continued)password 353restoring data 351security 353turning off 316turning on 317

Identity Safe Password & Securityoptions

about 353Identity Safe profiles

about 317creating 318

identity theftInternet 301

Idle Time Optimizerabout 78turning off 79turning on 79

Idle Time Outsetting 231

importlogins 325

Insight Networkabout 168cloud computing 168Insight Network scan 168Quick Scan 168scan 168shortcut menu scan 168Single File Scan 168

Insight Protectionturning off 169turning on 169

installationproblems 36, 38

integration with email clients 282integration with email

programs 284Internet

connection problems 106search Explorer history 227

573Index

Page 574: Help

Internet (continued)temporary files 227, 404

Intrusion AutoBlockblocking computers

permanently 265turning on and off 263unblocking computers 264

Intrusion Prevention 506, 511about 260exclusion list 266turning individual notifications

on and off 261turning notifications on and

off 261Intrusion Prevention scan

excluding a device 394exclusion list 266purging devices 268remove devices 268

IP addresses 386finding 386

itemssubmitting from

Quarantine 143

Jjoke programs protection

settings 482

LLiveUpdate 45

about 39Smart Definitions 42–43technology 38updating 226

locations for backup 435Login

adding manually 338changing password 341changing URL 340

Login (continued)changing user name 341configuring 330creating new folder 338deleting 338editing 338importing 325managing 338saving 336updating 343

low resource profile on batteryturning off 70turning on 70

Mmacro viruses 223main window

messages 104status colors 219status messages 219

malware 221Manage Logins

about 335Manage Notes

about 348Manual Repair

reviewing remaining risksin 216

Manual Repair windowreviewing remaining risks

in 156manual scan options 495Media Center Extender

Silent Mode 195Memory graph

about 73obtaining historical data 75

messages 104, 219Norton 360 219

Metered Broadband Modeabout 296

Index574

Page 575: Help

Metered Broadband Mode(continued)

turning off 297turning on 297

Metered Broadband modedefining bandwidth 298

Monthly Reportactivities 101

multipartite viruses 223

NNetwork

changing trust level 389discovering devices 382editing details 389forming 382joining 382managing 375

network locations 506Network Proxy Settings

about 48configuring 51

Network Security Mapabout 375adding devices 384modifying communication

port 399purging 396removing devices 396turning off 384turning off Network Security

Overview 381turning on Network Security

Overview 381viewing device details 398viewing devices 376wireless network

viewing status 397Network Security Overview

turning off 381turning on 381

new versionchecking 556

newsletter 565Norton 360

about 7about securing 549Allowed and Blocked lists 281background jobs 79categories 103details 56EULA 554icons 54main window 8, 219new version 556password 550–551protecting 551registering 29securing 550shortcut menu 55status 52uninstalling 566upgrading 554version number 553

Norton 360 scanabout 149command line scanning 205Computer Scan 149custom scans 159Idle Time Scan 149Insight Network 168Insight Network scan 149Reputation Scan 149

Norton 360 settings 257resetting password 551

Norton Account 467about 24accessing 30changing password 31creating 29

Norton Account password 31

575Index

Page 576: Help

Norton AntiSpam 279about 279Address Book Exclusions 286configure 515Feedback 291settings 515SSL 279Web Query 292

Norton Autofixsupport assistants 557

Norton Backup and Restore 411Norton Backup Drive

about 456deleting files 459restoring files from a Backup

Set 458Norton Bootable Recovery Tool

about 34using 38

Norton Bootable Recovery ToolWizard

downloading 36Norton Community Watch

about 32joining 32turning off or turning on 33

Norton Firewall Diagnosisabout 259

Norton Insightabout 88Files of Interest 92refreshing trust level 92trusted files 88viewing processes 92

Norton LiveUpdateabout 39

Norton Product Tamper Protectionabout 547turning off 548turning on 548

Norton Safe Searchsearching Web 310

Norton Safe Webabout 305turning off 310turning on 310

Norton Tasksabout 79

Norton toolbarabout 359accessing 363settings 327

Notesdeleting 348saving 348updating 348

notification area icon 104notifications

Auto-Protect 211Intrusion Prevention 261

OOffice documents

embedded objects 189scanning office documents 189turn on or turn off 190virus macros 189

One Click Supportusing 558

online backupsactivation 467considerations 464purchasing more storage 468

Online transactionsidentity theft 313

Optimizationabout 76and performance 403boot volume 77running 402

Index576

Page 577: Help

optimizing 401and fragmentation 402

OptionsClient Integration 282

Ppassword

changing 358editing 338Norton Account 31saving 336updating 343

PC securitycategories 103

PC Tuneupcategories 103disk cleanup 405disk optimization 402optimization 402Startup Manager 407

PC tuneup 401, 404Performance

accessing 61alerts 65monitoring 74

performance alertsabout 65configure 67configure threshold 69excluding programs 71removing programs from

exclusion list 72turning off 67turning off low resource

profile 70turning on 67turning on low resource

profile 70performance improvement 402Personal data

backing up 350

pop-up messages 219port scans 234problem solving 559problem solving backups 460problems

problems found during 216resolve any items 216solving 558

Product Key 22accessing 30

product passwordprotecting 550

product status 46program

patches 39Program Control

Automatic 239Program rules

adding 244removing 258

program updates 39programs

configuring Internet access 244creating firewall rules 244removing programs 243

programs, blocked 257protection

dates 45maintaining 104quick scan 154updates 38

protection featuresmonitoring 108

proxy serverconfiguring 51settings 48

Pulse Updatesabout 47using 48

577Index

Page 578: Help

QQuarantine

adding an item 141items, submitting for

analysis 143managing items 138opening 138removing items 142restoring items 141

Quarantined Items viewadding items 111

Quick Controlsturning on or turning off 481

Quick Scanrunning quick scan 154scheduling 167

Quiet Modeabout 191, 197disk burning 197options 200turning off 200turning on 200TV recording 197User-Specified Programs 201

RReal Time Exclusions

about 186Registry Cleanup 227, 406Remote Monitoring

setting up 382repair

actions 216infected files 216removable media 216system files 216

Reputation Scanabout 170results 177running Custom Scan 176

Reputation Scan (continued)running Full System Scan 175running Quick Scan 175

Respondingabout 106responding to emergencies 106

restore 411Autorun Restore 454–455choosing destinations 453Identity Safe data 350restoring backed-up files 447selecting Backup Set 450selecting files to restore 451

restoring itemsQuarantine 141

resultresolved risks 157

Results Summaryabout 157resolved risks 157total items scanned 157

risksintrusions 234malware 221port scans 234spyware 221vulnerabilities 221

ruleschanging 245creating 244–245

Running custom scansscanning required files 162scanning required folders 162

running Full System ScanReputation Scan 175

running Quick ScanReputation Scan 175

SSafe Surfing

about 301

Index578

Page 579: Help

Safe Webturning off 310turning on 310

scan at the command promptcommand line scanning 205

Scan Completeappearing after a scan 216

Scan Complete windowappearing after a scan 156

Scan Facebook Wallabout 182scanning 184

scannedtotal items scanned 157

scanningautomatically 164individual elements 156problems found during 216

Scanscommand line 205Computer Scan 152create a custom scan 159Custom Scan 152custom scan 227deleting custom scans 163file 156floppy disk 156folder 156Full System Scan 152, 155hard drive 156Insight Network 168manual 45Norton Bootable Recovery

Tool 38Quick Scan 152quick scan 154removable drive 156running custom scans 162using custom 159

scheduling 228backup and restore 230

scheduling (continued)backups 444custom scans 164scans 164tasks 528

scheduling custom scanmultiple schedules 164

scheduling custom scansscheduling Full System

Scan 164searching

Security History 135secure online storage 468Security History

about 108Actions window 124adding items to the

Quarantine 111full alert history 111importing or exporting 136manual scan results 111Quarantine 138Quick Search 135recent alert history 111searching 135security risks 111submission, items to

Symantec 111suspicious email 111viewing items 111viewing quarantined items 111

security risksadding to Quarantine 141attacks 234found by Auto-Protect 209, 211port scans 234removing from the

Quarantine 142restoring from Quarantine 141

security status 53self-healing 557

579Index

Page 580: Help

Settings 475Administrative Settings 532antivirus 482customizing 480firewall 257, 506, 509home network 519Identity Protection 524Quick Controls 481

settingsTask Scheduling 528

settings passwordresetting 551turning off 551

Settings Password Protectionabout 549configuring 550resetting 551turning off 551

shortcut menu 55Signature Exclusions

about 188Signature Ezclusions

excluding items 189signatures

including and excluding 262Silent Mode

about 191Full Screen Detection 195Media Center Extender 195turning off 193, 196turning on 193, 196turning on manually 193

Smart Definitionsabout 42turning on or turning off 43

Smart Firewallabout 233customizing 236

SONAR Protectionabout 185emerging threats 185

SONAR Protection (continued)heuristic technology 185SONAR Advanced Mode 185turning off 186turning on 186

spyware 221, 504found by Auto-Protect 211protection settings 482settings 489system scan 155

SSL (Secure Sockets Layer)Norton AntiSpam 279

startup files 210startup items

delaying and running 409disabling or enabling 408

Startup Managerabout 407delaying and running delayed

items 409disabling or enabling startup

items 408status 52–53submission, items to Symantec 143subscription

maintaining 564product updates 46

Supervisor user accountcreating firewall rules 239

SupportAutoFix Scan 558Self Help 560solving problems 558worldwide service 565

Support policy 564Symantec Security Response 143

viewing submitted files 111Symantec Support Web site

about 561using 562

Index580

Page 581: Help

Symantec Web siteblogs and forums 559

System Insightabout 59Events graph 59monitoring activities 62Performance graph 59

system status graphactivity details 64

TTask Scheduling

settings 528tasks

automatic 225technical support

about 561using 562

threatsnewly discovered 46protection from 233Trojan horses 222viruses 222worms 222

trackware protection settings 482Trojan horses 222Trust Control

Intrusion Prevention and 260trust level

changing 389device 389network 389

Uupdates 38

automatically 44manual 45obtaining 48Pulse Updates 47summary 39

upgradingnew version 554

User-Specified Programsabout 201adding programs 202Quiet Mode 201removing programs 203

Vversion number

checking 553virus and spyware checks

scheduling 228virus and spyware settings 489virus definitions 45virus protection

system scan 155viruses 222

boot 223file infectors 223macro 223multipartite 223protection settings 482types 223

vulnerabilities 221Vulnerability Protection

about 144, 146viewing programs 145

WWeb pages

launching 340protection 302reporting 304

Web Queryabout 292turning off 293turning on 293

Web sitescache files 404

581Index

Page 582: Help

Windows temporary files 227wireless network

viewing status 397worms 222

Index582

Page 583: Help
Page 584: Help

foo

Norton from Symantec products protect consumers from traditional threats with antivirus, phishing protection, and spywareprotection. They also protect against bots, drive-by downloads, and identity theft, and are light on system resources. In addition,Symantec provides services such as online backup and PC Tuneup, and is a trusted source for family online safety. For moreinformation, please click one of the following links:

Antivirus | Phishing Protection | Spyware Protection | Online Backup

Copyright © 2011 Symantec Corporation. All rights reserved. Symantec, Norton, and the Norton Logo are trademarks or registeredtrademarks of Symantec Corporation and its affiliates in the U.S. and other countries. Other names may be trademarks of theirrespective owners.