product manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/symantec norton 360...

618
Norton 360 TM Product Manual Care for our Environment; It's the right thing to do.Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual is made from recycled materials.

Upload: vuthu

Post on 19-Aug-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton 360TM

Product Manual

Care for our Environment; ‘It's the right thing to do.’Symantec has removed the cover from this manual to reduce the Environmental Footprint of ourproducts. This manual is made from recycled materials.

Page 2: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton 360™ Product Manual

The software described in this book is furnished under a licenseagreement and may be used only in accordance with the terms ofthe agreement.

Documentation version 20.1

Copyright © 2012 Symantec Corporation. All rights reserved.

Symantec, the Symantec Logo, LiveUpdate, Norton 360, and Nortonare trademarks or registered trademarks of Symantec Corporationor its affiliates in the U.S. and other countries. Portions of thisproduct Copyright 1996-2011 Glyph & Cog, LLC. Other names maybe trademarks of their respective owners.

The product described in this document is distributed under licensesrestricting its use, copying, distribution, and decompilation/reverseengineering. No part of this document may be reproduced in anyform by any means without prior written authorization of SymantecCorporation and its licensors, if any.

THE DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESSOR IMPLIED CONDITIONS, REPRESENTATIONS ANDWARRANTIES, INCLUDING ANY IMPLIED WARRANTY OFMERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE ORNON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENTTHAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.SYMANTEC CORPORATION SHALL NOT BE LIABLE FORINCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTIONWITH THE FURNISHING, PERFORMANCE, OR USE OF THISDOCUMENTATION. THE INFORMATION CONTAINED IN THISDOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.

The Licensed Software and Documentation are deemed to becommercial computer software as defined in FAR 12.212 and subjectto restricted rights as defined in FAR Section 52.227-19 "CommercialComputer Software - Restricted Rights" and DFARS 227.7202, etseq. “Commercial Computer Software and Commercial ComputerSoftware Documentation”, as applicable, and any successorregulations. Any use, modification, reproduction release,performance, display or disclosure of the Licensed Software andDocumentation by the U.S. Government shall be solely in accordancewith the terms of this Agreement.

Symantec Corporation350 Ellis Street,Mountain View, CA 94043

http://www.symantec.com

Page 3: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Chapter 1 Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7About Norton 360 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7Activation protects you . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18About your Norton Account . . . . . . . . . . . . . . . . . . . . . . . . 23About Norton Management . . . . . . . . . . . . . . . . . . . . . . . . 30About Norton Community Watch . . . . . . . . . . . . . . . . . 37About Norton Bootable Recovery

Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39About Norton Power Eraser . . . . . . . . . . . . . . . . . . . . . . . . 52About updating Norton 360 . . . . . . . . . . . . . . . . . . . . . . . 53About Network Proxy Settings . . . . . . . . . . . . . . . . . . . . 65About Norton 360 status . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

Chapter 2 Monitoring your system'sperformance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

About System Insight . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

Chapter 3 Maintaining total protection . . . . . . . . . . . . . . . . . . 117About total protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117About keeping your computer secure . . . . . . . . . . . 118About solving connection problems . . . . . . . . . . . . 120About responding to emergencies . . . . . . . . . . . . . . . 120About monitoring protection

features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122About viewing details of system

vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159

Contents

Page 4: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Chapter 4 Scanning your computer . . . . . . . . . . . . . . . . . . . . . . . 163About the Norton 360 scans . . . . . . . . . . . . . . . . . . . . . . 163About Computer Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166About Insight Network scan . . . . . . . . . . . . . . . . . . . . . . 182About Reputation Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185About Scan Facebook Wall . . . . . . . . . . . . . . . . . . . . . . . . 197About SONAR Protection . . . . . . . . . . . . . . . . . . . . . . . . . . 200About scanning Office documents . . . . . . . . . . . . . . . 206About Silent Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208About boot time protection . . . . . . . . . . . . . . . . . . . . . . . 221About Early Launch Anti-Malware

Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222Running a scan at the command

prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223

Chapter 5 Responding to security issues . . . . . . . . . . . . . . . . 227What to do if a security risk is found . . . . . . . . . . . 227

Chapter 6 Understanding alerts andmessages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237

About Norton 360 alerts andmessages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237

About managing messages andalerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237

Types of risks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239Types of threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240Types of viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241

Chapter 7 Doing routine tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243Turning on or turning off automatic

tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243About custom task . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244About scheduling automatic tasks . . . . . . . . . . . . . . 246About scheduling backups . . . . . . . . . . . . . . . . . . . . . . . . 248Specifying Idle Time Out duration . . . . . . . . . . . . . . 249

Chapter 8 Keeping secure on the Internet . . . . . . . . . . . . . . 251About the Smart Firewall . . . . . . . . . . . . . . . . . . . . . . . . . 251About Intrusion Prevention . . . . . . . . . . . . . . . . . . . . . . 285

Contents4

Page 5: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

About Download Insight . . . . . . . . . . . . . . . . . . . . . . . . . . . 293About Norton AntiSpam .. . . . . . . . . . . . . . . . . . . . . . . . . . 303About configuring POP3 and SMTP

ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318About Network Cost Awareness . . . . . . . . . . . . . . . . . 320

Chapter 9 Securing your sensitive data . . . . . . . . . . . . . . . . . . 325About securing your sensitive data . . . . . . . . . . . . . 325

Chapter 10 Protecting your home network . . . . . . . . . . . . . . . 399About the Network Security Map .. . . . . . . . . . . . . . . 399

Chapter 11 Keeping your PC tuned up . . . . . . . . . . . . . . . . . . . . . 425About Tuneup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425About disk and file fragmentation . . . . . . . . . . . . . . 426Optimizing your permanent disks

manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426About using optimization efficiently . . . . . . . . . . . 427About cleaning up disk clutter . . . . . . . . . . . . . . . . . . . 428Running a scan to clean up disk

clutter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429Running Registry Cleanup . . . . . . . . . . . . . . . . . . . . . . . . 430Running Diagnostic Report . . . . . . . . . . . . . . . . . . . . . . . 430About Startup Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431

Chapter 12 Protecting your media and data . . . . . . . . . . . . . 435About Norton Backup and Restore . . . . . . . . . . . . . . 435About backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436About backup preparation . . . . . . . . . . . . . . . . . . . . . . . . 437About backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441Backing up your files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469Restoring files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470About Norton Backup Drive . . . . . . . . . . . . . . . . . . . . . . 479About solutions to the backup

problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483About online backup considerations . . . . . . . . . . . . 487Turning off or turning on backup . . . . . . . . . . . . . . . 492Turning off or turning on backup setting

options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494

5Contents

Page 6: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Chapter 13 Customizing settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497About Norton 360 Settings . . . . . . . . . . . . . . . . . . . . . . . . 497Customizing Norton 360 Settings . . . . . . . . . . . . . . . 502Turning on or turning off Quick Controls

services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503About Antivirus settings . . . . . . . . . . . . . . . . . . . . . . . . . . 504About Firewall settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 530About Norton AntiSpam settings . . . . . . . . . . . . . . . . 539About My Network settings . . . . . . . . . . . . . . . . . . . . . . . 543About backup settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546About Identity Protection settings . . . . . . . . . . . . . . 550About Task Scheduling settings . . . . . . . . . . . . . . . . . 554About Administrative Settings . . . . . . . . . . . . . . . . . . . 558

Chapter 14 Finding additional solutions . . . . . . . . . . . . . . . . . . 585Finding the version number of your

product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585Finding the End-User License

Agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 586About upgrading your product . . . . . . . . . . . . . . . . . . . 586About Norton Autofix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 589Staying informed about protection

issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591About Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592Uninstalling Norton 360 . . . . . . . . . . . . . . . . . . . . . . . . . . 599

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603

Contents6

Page 7: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This chapter includes the following topics:

1 About Norton 360

1 Activation protects you

1 About your Norton Account

1 About Norton Management

1 About Norton Community Watch

1 About Norton Bootable Recovery Tool

1 About Norton Power Eraser

1 About updating Norton 360

1 About Network Proxy Settings

1 About Norton 360 status

About Norton 360Norton 360 offers proven performance and deliverstoday’s fast and light all-in-one solution to protect yourPC and all your online activities. It protects againstviruses, worms, hackers, and botnet. With a singlesubscription, you can protect up to three PCs. Itsafeguards against online identity theft, protectsimportant files, and keeps your PC tuned and runningat peak performance.

1Getting Started

Page 8: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton 360 is completely automated and easy to use.It works quietly in the background to maintain youroverall system integrity with minimal effect on PCperformance. By offering an unmatched combinationof performance and protection, Norton 360 helps youget the most out of your PC and your online experience.

About Norton 360 main windowThe Norton 360 main window acts as a securitymanagement interface. You can access the mainfeatures and monitor the performance of yourcomputer from the main window.

As you use your computer, Norton 360 monitors howwell your computer and activities are protected fromthreats, risks, and damage. Norton 360 displays theprotection status of your computer in the main window.

Depending on the security status of your computer,Norton 360 shows your system status as Secure,Attention, or AtRisk. If your system status is markedas Attention or At Risk, at the bottom of the mainwindow, click FixNow to resolve all the security threatson your computer.

The options that are available in the main windowsummarize the most essential security and theproductivity issues that challenge users. They are:

Includes all virus, spyware,firewall, and other securityfeatures.

Security

Includes the protectionagainst phishing andfraudulent Web sites.

Identity

Includes the automatic andthe customizable backupsand restore capability.

Backup

Getting StartedAbout Norton 360

8

Page 9: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Includes the performancetuning features, such ascleaning up unwanted filesand performing RegistryCleanup.

Tuneup

Depending on the security status of the differentcomponents of your computer, the status areas of thefour protection categories are marked as Protected,Attention, or At Risk.

When the System Status or protection categoriesstatuses are marked as At Risk or Attention, at thebottom of the main window, click Fix Now to resolveall the security threats on your computer.

Norton 360 also provides you easy links at the top ofthe main window to the most frequent tasks. They are:

Lets you access the Taskswindow to run general tasks,backup tasks, and tuneuptasks.

Tasks

Lets you access the Settingswindow to configure settingssuch as Firewall, Antispam,and Backup.

Settings

9Getting StartedAbout Norton 360

Page 10: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you open thePerformance window inNorton 360.

The Performance windowchronicles all installs,downloads, optimizations,detections, alerts, andinstances of Quick Scan thatoccurred on your computersince installing Norton 360.The window also displays adetailed graphicalrepresentation of the CPUand memory usage by yourNorton product.

Performance

Lets you give feedback aboutthe Norton product that youuse.

Feedback

Lets you access the MyAccount window to manageyour Norton Account.

Account

Lets you access supportoptions, product upgradeoptions, subscription status,and product version number.

You can also access theonline Help from theSupportdrop-down menu. Helpprovides links to informationthat assists you with thespecific tasks that you wantto complete. The online Helpguides you to configure all ofthe product features.

Support

Getting StartedAbout Norton 360

10

Page 11: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

When your system status is AtRisk or Attention, thissection automatically provides you the FixNow optionto fix all the issues at once.

The right side of the Norton 360 main window helpsyou do the following:

Lets you access Norton One.

Norton One protects all ofyour devices including yourWindows PC, laptop, Mac,and Android smartphones.With a single Norton Onemembership, you getcomplete protection for fivedevices. In addition, you get25-GB online storage spaceto back up your data.

In addition to virus-freeassurance, you get premiumsupport with exclusivecustomer support access.Norton's well-trained andspecially-skilled customerservice agents help youresolve any problem.

w This option appearsonly if you have a Norton Onemembership.

One

11Getting StartedAbout Norton 360

Page 12: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you access NortonManagement.

Norton Management lets youmanageyourNortonproductsinstalled on all of yourdevices from one location. Tosign up or to log into NortonManagement, click theManage icon at the right sideof the main window. You canuse your existing NortonAccount login information toaccess Norton Management.The Norton Managementagent should be installed oneach device that you want toadd to Norton Management.

w Norton Managementmay not be available in someversions of Norton 360.

Manage

Getting StartedAbout Norton 360

12

Page 13: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you download theNorton Mobile Security forAndroid.

Norton Mobile Security helpsprotect your mobile devicesagainst loss, theft, viruses,and other mobile threats. Youcan use Norton MobileSecurity on all your devicesthat use the Androidoperating system.

When you click the Mobileicon, the main windowdisplays a Quick Response(QR) code for installingNorton Mobile Security. Youcan use the Android scan appon your Android device toscan the QR code and installNorton Mobile Security.

You can also click the link togo to the Web site where youcan download Norton MobileSecurity.

w Norton Mobile Securitymay not be available in someversions of Norton 360.

Mobile

13Getting StartedAbout Norton 360

Page 14: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Online Family

Getting StartedAbout Norton 360

14

Page 15: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you monitor your child’sactivities on the Internet.

w Norton Online Familymay not be available withsome versions of Norton 360.In such case, you may not beable to access Norton OnlineFamily options.

When you click the OnlineFamily icon, the Norton 360main window displays NortonOnline Family Log in option.Norton Online Familyprovides you advancedcontrols to monitor yourchild's online activities.

Symantec recommends thatyou use your Norton Accountlogin credentials to sign in toNorton Online Family. If youregister your product withyour Norton Account, yourNorton Account emailaddress is auto-filled in theemail address text box.

If you do not use NortonOnline Family, you can usethe Click Here link to set upyour account with NortonOnline Family.

After you set up youraccount, you can sign in toyour account on the Norton360 main window and viewyour child’s Internetactivities. You can viewdetails such as your child’slatest search terms, and thelatest alerts. After you signin, you can use the Get

15Getting StartedAbout Norton 360

Page 16: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Details option in the Norton360 main window to viewmore details on the NortonOnline Family Web site.

Getting StartedAbout Norton 360

16

Page 17: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you check the safety ofa Web site.

You can also perform a safesearch.

w This option may not beavailable with some versionsof Norton 360. In such case,you may not be able to accessthis option.

When you click Safe Webicon, the Norton 360 mainwindow displays Norton SafeWeb options.

You can use the Check Siteoption to analyze the securitylevels of any Web site thatyou want to visit. When youtype a Web site address in thetext box and clickCheck Site,it shows the Symantec’sratings for the Web site.

You can use the Safe Searchoption to search forinformation on the Internet.The Norton Safe Search usesAsk.com to generate thesearch results. Norton SafeSearch provides a site safetystatus and a Norton rating foreach of the search resultsgenerated.

You can use the View recentNorton Safe Web activityoption to view the recentNorton Safe Web statistics onmalicious sites and URLs. Youcan also view the list of newmalicious URLs.

Safe Web

17Getting StartedAbout Norton 360

Page 18: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you access NortonStudio.

Norton Studio is a Windows8 app that lets you manageyour Norton products andNorton product keys from onelocation. You can view thesecurity status of each ofyour devices and resolve thesecurity issues by using theNorton Studio from anylocation around the world.You can go to Windows 8 AppStore and download andinstall Norton Studio.

w This option appearsonly in Windows 8.

Studio

Your activation status or subscription status appearsat the bottom of the main window. You can use theActivate Now option to activate or subscribe yourNorton product.

Activation protects youProduct activation protects users from pirated orcounterfeit software. It protects you by limiting theuse of a product to those users who have acquired theproduct legitimately. Product activation requires aproduct key for each installation of a product. You mustactivate the product within a limited time period afteryou install it.

If you are connected to the Internet, product activationtakes place automatically when you start the productfor the first time after installation. After activation,the Norton Account window appears. You can createyour Norton Account and register your product.

Getting StartedActivation protects you

18

Page 19: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

If you are not connected to the Internet, you can clickTry Later in the Activation not complete window tostart your product. The Activation window reappearsevery time you start your product until you activateyour product. If you choose not to activate at that time,you receive an alert that reminds you to activate theproduct. You can also activate your product by clickingthe Trial Period Status link in the Norton 360 mainwindow.

w If you do not activate the product within the timeperiod that the alert specifies, the product stopsworking. You can activate it after the time period haselapsed, but you are not protected until you activatethe product.

Activating Norton 360To use all of the features in Norton 360, you must firstactivate your product. Product activation reducessoftware piracy and ensures that you have authenticSymantec software. You can renew your subscriptionafter the end of your subscription period.

If you are connected to the Internet, product activationtakes place automatically when you start the productfor the first time after installation. During activation,the Norton Account window appears. You can createyour Norton Account and register your product. Youcan also view details, such as your Product Key andrecent updates to the product. If you skip the NortonAccount window, the product is activated, but theProduct Key is not saved in the Norton Account. Youcan print the Product Key for the future, if you needto reinstall your product.

If you did not activate your product during installation,Norton 360 prompts for activation each time you startthe product. Also, you receive an activation alertregularly until you activate the product.

w You must activate your product within the time periodthat the alert specifies, or your product stops working.

19Getting StartedActivation protects you

Page 20: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can activate your product directly from theactivation alert. You can also activate your productfrom the Trial Period Status link in the main windowor from the My Account window. In some cases, youmight need to enter your Product Key to activate yourproduct. You can activate or renew the subscription ofyour product from any non-admin user account as well.Activation should take only a few minutes.

To activate Norton 360, your computer must beconnected to the Internet. If you use a proxy server toconnect to the Internet, you must configure the proxysettings. To configure proxy settings, go to the Norton360 main window, and then click Settings >Administrative Settings > Network Proxy Settings >Configure.

To activate Norton 360 from the alert

1 In the alert, click Activate Now or Renew Now.

2 Click OK.

3 Follow the on-screen instructions.

4 In the window that appears, click Done.

To activate your Norton 360 from the My Accountwindow

1 In the Norton 360 main window, click Account.

2 In the My Account window, click Activate Norton360 or Renew Subscription.The Renew Subscription option is available if youhave already activated your product.

3 Follow the on-screen instructions.

4 In the window that appears, click Done.

Getting StartedActivation protects you

20

Page 21: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To activate your product from the main window

1 In the Norton 360 main window, do one of thefollowing:

1 If you purchased a subscription version of aretail product, click Activate Now.

1 If the product came installed on your computer,click Activate Online Now.

1 If you want to renew the subscription of yourproduct, click Renew.

2 Follow the on-screen instructions to activate orsubscribe your product.

Where to find your product keyThe product key is a unique key that helps you to installand activate the Symantec product on your computer.The product key is a 25-character alphanumeric stringthat is shown in five groups of five characters each,separated by hyphens. The location of the product keyvaries depending on how you acquired the product.

The locations of the product key are as follows:

The product key is either ona sticker on the CD sleeve oron an insert in the productpackage.

If you purchased a retail copyof the product on CD

The product key is on theDVD package.

If you purchased the producton DVD

The product key is stored onyour computer as part of thedownload process and isincluded in the confirmationemail from the SymantecStore.

If you downloaded theproduct from the SymantecStore

21Getting StartedActivation protects you

Page 22: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The product key is providedas part of the activationprocess. Be sure to save yourproduct key by creating orsigning in to your NortonAccount, or by printing thekey. You may need theproduct key if you ever wantto reinstall your product.

If your computer came withthe product already installed

The product key is printed onthe card along withinstructions on how to use it.Be sure to save your productkey by creating or signing into your Norton Account. Youneed the product key if youever want to reinstall theproduct.

If you received a product keycard

To recover or access yourproduct key log on tohttps://account.norton.com.If you are not registered,register for Norton Account.You can find the product keyon the Products tab in theNorton Account page.

If you are still unable tolocate your product key, youcan recover it using NortonAccount

About problems during activationIf you cannot connect to the Symantec servers toactivate your product, first check your Internetconnection. You then need to see if you have parentalcontrol software, either installed or through your ISP,that might block the connection.

A connectivity problem can occur if you use parentalcontrol software. If you suspect that parental controlsmight block the connection, you can configure theparental controls so that they do not block the

Getting StartedActivation protects you

22

Page 23: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

activation procedure. You need to log in to yourparental control software or to the Internet throughyour ISP as an administrator to change yourconfiguration.

If you use a proxy server to connect to the Internet,you must configure the proxy settings. To configurethe proxy settings, go to the Norton 360 main window,and then click Settings > Administrative Settings >Network Proxy Settings > Configure.

About your Norton AccountWhen you create a Norton Account, you can manageall of your Norton products in one place. You can storeyour product keys in your Norton Account and alsobuy additional product keys. You can also register yourproduct with the Norton Account. It takes only a fewmoments to create your Norton Account. You must beconnected to the Internet to create a Norton Account.

After you create a Norton Account, you can access andmanage your account information and productinformation from anywhere. It helps to reinstall yourproducts and download the latest version of theproducts. If you install your product on more than onePC, you can use the same Norton Account. To accessyour Norton Account, go to the following URL:

https://account.norton.com

You can create a Norton Account in the following ways:

1 During activation

You can create your Norton Account and registeryour product from the Norton Account windowthat appears when you activate the product. Youmust provide your account information in theNorton Account window that appears.

1 Any time after activation

You can create a Norton Account from the AccessNorton Account link available in the My Accountwindow.

23Getting StartedAbout your Norton Account

Page 24: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

After you log in to your Norton Account, you canmanage your product information with the followingoptions:

Saves the information for all ofthe Norton products that youown.

The Products tab provides youthe information about theNorton products that you ownand the expiration date. You canclick the arrow icon against aproduct for more informationsuch as product key and theregistration date. You can alsobuy a new product key to protectadditional computers. You canuse the Update option to checkand download the latest productversion using Norton UpdateCenter.

Products

Contains order information ofthe Norton products you boughtfrom Norton online store.

Order History

Getting StartedAbout your Norton Account

24

Page 25: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Saves your account informationand your billing details.

The Profile options are:1 Account Information

You can update your NortonAccount information andyour shipping address on theAccount Information tab.After you update, clickUpdate to save the changes.

1 Billing Information

You can save your credit cardinformation and your billingaddress on the BillingInformation tab. It makes iteasier for saving onlineorders. After you update,click Update to save thechanges.

1 Change Password

You can change your currentNorton Account password onthe Change Password tab.

Profile

You can use the icons at the bottom of your NortonAccount Web page to access and use the following:

Norton Online Familymonitors and manages yourchild's Internet activities andcomputer usage.

Norton Online Family

25Getting StartedAbout your Norton Account

Page 26: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton Online Backupprovides a secure andeasy-to-use online backupsolution that safeguards yourimportant data againstsystem crash, accidentaldeleting, virus infection, andother disasters.

Norton Online Backup

Norton Safe Web checks thesafety of a Web site and letsyou perform a safe Websearch.

Norton Safe Web

The Symantec Web siteprovides more informationabout the various products ofSymantec, the latest updateson Internet security, andvarious support options.

Norton.com

Norton Update Center checksand lets you download thelatest version of your Nortonproduct.

Norton Update Center

If you forget your Norton Account password, you canget a temporary password by clicking the Forgot yourpassword link in the Norton Account sign-in Webpage. You need to provide your email address. You needto use the same email address that you provided whenyou created your Norton Account. Symantec sends atemporary password to your email address. You canuse the temporary password for a limited time period.You must reset your password after you log in to yourNorton Account.

Getting StartedAbout your Norton Account

26

Page 27: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Creating a Norton AccountYour Norton Account stores the product key and thebilling information of your product. You can alsoregister your product with the Norton Account.

In addition, Norton Account helps you to do thefollowing:

1 Access the product key and other productinformation when you need it.

1 Reinstall your Norton product.

1 Buy additional product keys for your home or office.

1 Check and download the latest version of theproduct by using Norton Update Center.

1 Save online orders and update billing information.

1 Manage your online backup.

Your computer must be connected to the Internet tocreate a Norton Account. If you use a proxy server toconnect to the Internet, you must configure the proxysettings. To configure the proxy settings, go to theNorton 360 main window, and then click Settings >Administrative Settings > Network Proxy Settings >Configure.

You can also create a Norton Account when youactivate your product. When you create your NortonAccount from the product, your product gets registeredin your account. If you have an existing NortonAccount, you can provide the same email address inthe NortonAccount window in your product. This way,you can register your current product and add it to thelist of Norton products in your existing NortonAccount. If you upgrade your registered product to thelatest available version, your product remainsregistered to the same Norton Account. In this case,you can continue using the same Norton Account logincredentials.

w Symantec products that are older than the 2006product year do not appear in your Norton Account.

27Getting StartedAbout your Norton Account

Page 28: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To create a Norton Account from the Norton AccountWeb page

1 In the Norton 360 main window, click Account.

2 In the My Account window, click Access NortonAccount.

3 In the Norton Account Web page that appears, clickSign up now.

4 In the Norton Account Sign Up Web page, providethe details about your account information, andthen click Sign Up.

To create a Norton Account and register your productafter activation

1 In the Norton 360 main window, click Account.

2 In the My Account window, click Access NortonAccount.

3 In the CompleteYourActivation window, type youremail address, and then click Next.

4 In the CreateyourNortonAccount window, provideyour account details, and then click Next.Your product information gets saved in your NortonAccount only after you log in to your NortonAccount.

5 In the window that appears, click Done.

To log in to your Norton Account and access yourproduct information, visit https://account.norton.com.

Accessing your Norton AccountThe product key for each Norton product isconveniently stored in your Norton Account. After youhave created your Norton Account successfully, youcan access your account from anywhere in the world.You can log in to your Norton Account any time byvisiting the following URL:

https://account.norton.com

You can easily find and update your account, product,and billing information from your Norton Account.

Getting StartedAbout your Norton Account

28

Page 29: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can also change your Norton Account password,if required. Your computer must be connected to theInternet to access your Norton Account.

w Symantec products that are older than the 2006product year do not appear in your Norton Account.

To access Norton Account

1 In the Norton 360 main window, click Account.

2 In the My Account window, click Access NortonAccount.

3 In the Norton Account Web page that appears, typeyour email address and password, and click SignIn.

Creating a temporary password for Norton AccountIf you forget the password of your Norton Account, youcan create a temporary password to sign in to yourNorton Account. The temporary password is sent tothe email address that you provided when you createdyour Norton Account.

After you sign in to your Norton Account by using thetemporary password, you are prompted to change yourpassword.

To create a temporary password for Norton Account

1 In the Norton 360 main window, click Account.

2 In the My Account window, click Access NortonAccount.

3 In the Norton Account Web page that appears, underForgot your password?, click Recover it here.

4 In the Forgot your Password Web page, verify theemail address that is provided in the EmailAddresstext box, and then click Continue.A temporary password is sent to your email address.You can use this temporary password to sign in toyour Norton Account.

29Getting StartedAbout your Norton Account

Page 30: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

About Norton ManagementNorton Management lets you manage all of your Nortonproducts and Norton product keys from one location.You can add your devices such as personal computersand laptops to Norton Management and remotelyinstall and manage your Norton products on the device.You can view the security status of each of your devicesand resolve the security issues by using the NortonManagement Web site from any location around theworld.

The Norton Management agent must be installed oneach device that you want to manage in NortonManagement. Norton Management uses the NortonManagement agent to install and uninstall Nortonproducts on your devices and to resolve the securityissues on your device remotely. After you install theNorton Management agent on a device, it can bemanaged remotely using the Web site.

You can do the following using Norton Management:

1 Add a device to Norton Management.

1 Install a Norton product on a device.

1 View Norton products that are installed on a device.

1 View the security status of a device.

1 Fix security issues on a device.

1 Purchase a new Norton product key.

1 Renew your Norton product subscription.

1 Remove a device from Norton Management.

1 Activate your product using another product key.

1 Upgrade your Norton products to the latestavailable version.

w The features listed above vary for different Nortonproducts and devices.

Getting StartedAbout Norton Management

30

Page 31: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Accessing Norton Management on WindowsYou can access Norton Management in one of thefollowing ways:

1 Using a Web browser on any computer.

1 From the main window of Norton security products.

To access Norton Management from the main windowof a Norton security product, you need to install theNorton Management agent on that device. Your devicemust be connected to the Internet to access NortonManagement.

To access Norton Management using a browser

1 Open your browser, and go to:https://.manage.norton.com

2 Click Sign In.

3 In the EmailAddress box, type your Norton Accountemail address.

4 In the Password box, type your Norton Accountpassword.

5 If you want Norton Management to remember youremail address every time when you log on, checkRemember me on this computer.

6 Click Sign In.

To access Norton Management from Norton securityproducts

1 At the bottom of the Norton security product mainwindow, click the Manage icon.

2 Click Log in.

3 Type your email address that you use for NortonAccount.

4 Type your password that you use for NortonAccount.

5 Click Go.

6 Click Manage Devices.

31Getting StartedAbout Norton Management

Page 32: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To access Norton Management from the Windowsnotification area

1 Go to the Windows device on which NortonManagement is installed.

2 In the notification area on the taskbar, click theNorton Management icon.

3 In the pop-up that appears, click Open NortonManagement.

Installing the Norton Management agent on WindowsNorton Management uses the Norton Managementagent to monitor and manage the security status of adevice. You must install Norton Management agent onevery device that you want to manage using NortonManagement.

You can download and install the Norton Managementagent in one of the following ways:

1 Log on to the Norton Management Web site anddownload the agent.

1 If your computer has Norton AntiVirus or NortonInternet Security, go to the main window of theproduct, click the Manage icon and then install theagent program.

w You must have an administrator privilege on yourdevice to install the Norton Management agent.

To install the Norton Management agent from theNorton Management Web site

1 Go to the device that you want to manage withNorton Management.

2 Open your browser, and go to:https://manage.norton.com

3 Click Sign In and log on to your account using yourNorton Account email address and password.

4 On the My Devices page, click Add Device.

Getting StartedAbout Norton Management

32

Page 33: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

5 In the confirmation window, click Yes to confirmthat you are already on the device you want tomanage.

6 In the window that appears, click Save File anddownload the installer file.

7 Double-click the file that you downloaded.

8 Click Run.

9 In the Welcome to Norton Management window,click UserLicenseAgreement, read the user licenseagreement, and then click Agree & Install.

10 If you are prompted to provide your email address,in the Email Address box, type the email addressthat you use to log on to your Norton Account, andthen click Next.

11 If you are prompted to provide your password, inthe Password box, type the password that you useto log on to your Norton Account, and then clickNext.

12 In the Set up this computer window, in the Namethis computer box, type a display name for thedevice.The name that you specify must be unique and mustnot exceed 40 characters.

13 Click Finish.

14 In the Congratulations window, click ManageDevices.

To install the NortonManagement agent from a Nortonsecurity product

1 At the bottom of the Norton security product mainwindow, click the Manage icon.

2 Click Get Started.

3 In the Welcome to Norton Management window,click the User License Agreement link, read theuser license agreement, and then click Agree &Install.

33Getting StartedAbout Norton Management

Page 34: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

4 If you are prompted to provide your email address,in the Email Address box, type the email addressthat you use to log on to your Norton Account, andthen click Next.

5 If you are prompted to provide your password, inthe Password box, type the password that you useto log on to your Norton Account, and then clickNext.

6 In the Set up this computer window, in the Namethis computer box, type a display name for thedevice, and then click Finish.

7 In the Congratulations window, click ManageDevices.

About managing devicesNorton Management lets you manage your device, viewthe security status of each of the devices, and resolvesecurity issues by using the Norton Management Website from any location around the world.

Using Norton Management, you can do the following:

1 Add a device to Norton Management.

1 Install a Norton product on a device.

1 View Norton products that are installed on a device.

1 View the security status of a device.

1 Fix security issues on any device.

1 Purchase a new Norton product key.

1 Renew your Norton product subscription.

1 Remove a device from Norton Management.

1 Uninstall a Norton product from a device.

1 Activate your product using another product key.

1 Upgrade your Norton products to the latestavailable version.

w The features listed above vary for different Nortonproducts and devices.

Getting StartedAbout Norton Management

34

Page 35: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

About the supported devicesTo install and use Norton 360, your device must meetthe following minimum system requirements:

Hardware requirement

Windows

1 300-MHz or faster processor

1 512 MB of RAM (256 MB minimum)

1 100 MB of available hard disk space

Operating systems

Service PackVersionPlatform

Service Pack 132-bit and 64-bitversions

1 MicrosoftWindows 7Home Basic

1 MicrosoftWindows 7HomePremium

1 MicrosoftWindows 7Professional

1 MicrosoftWindows 7Ultimate

1 MicrosoftWindows 7Starter

35Getting StartedAbout Norton Management

Page 36: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Service Pack 1 and2

32-bit and 64-bitversions

1 MicrosoftWindows VistaHome Basic

1 MicrosoftWindows VistaHomePremium

1 MicrosoftWindows VistaUltimate

1 MicrosoftWindows VistaBusiness

Service Pack 2 and3

32-bit versions1 MicrosoftWindows XPHome

1 MicrosoftWindows XPPro

1 MicrosoftWindows XPMedia CenterEdition (2005and later)

Mac

1 OS X 10.7 (Lion)

1 2GB of RAM

1 1.5 GB of available hard disk space

Android

1 Android OS 2.1 (Eclair) or later

1 2 MB of available hard disk space

Supported devices

1 Windows computers (desktop and laptop)

1 Mac

1 Android smartphones

Getting StartedAbout Norton Management

36

Page 37: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Supported Norton products

To use all the features of Norton 360, you must use thefollowing versions of Norton security product:

If you use an older version of Norton product, ensurethat you upgrade your product to the latest version touse all the features of Norton 360.

w Currently, there are no upgrades available for NortonAnti-Theft and Norton Online Family.

Supported browsers

1 Internet Explorer 7.0 or later.

1 Mozilla Firefox 3.5 or later.

1 Google Chrome 6.0 or later.

1 Apple Safari 4.0 or later.

1 Opera 10.0 or later.

Norton 360 may not work properly with the 64-bitversion of Web browsers.

You must enable JavaScript and cookies on yourbrowser to access Norton 360.

About Norton Community WatchNorton Community Watch helps in identifying newsecurity risks by submitting selected security andapplication data to Symantec for analysis. Symantecassesses the data to determine the new threats andtheir sources. The collective efforts from Nortonsecurity product users help in quick identification ofsolutions for these threats and risks. NortonCommunity Watch improves user security and productfunctionality. In addition, it helps Symantec to analyzethe execution, schedule, and efficiency ofNorton-specific tasks and settings on your computer.

Norton Community Watch collects and submits thefollowing types of data:

1 Identified malicious software such as portableexecutable files and running processes

37Getting StartedAbout Norton Community Watch

Page 38: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 Any Web site URL that your product identifies asfraudulent

1 All the Web site URLs that you visited before thedetection of a risk

1 The applications and processes that run on yourcomputer regularly and during any security riskdetection

1 Response instances that your computer sends toany potential security risk

1 General system information and performanceattributes from the computer

1 General information about your computer such asidle time, standby, and screensaver settings

After the potential security risks are assessed from thesubmitted data, Symantec sends the information backto Norton 360. The Norton features such as NortonInsight and Insight Network use this information toidentify files and processes at risk.

You should participate in Norton Community Watchsubmissions to provide valuable contribution to theentire community that uses Norton security products.No personally identifiable information is exposedduring data collection and submission. Symantecmaintains an adequate level of protection for thecollected information. The Detailed Error DataCollection option under Norton Community Watchin the AdministrativeSettings window lets you allowor deny the detailed data submissions. The detaileddata may vary depending on the Norton-specific errorsand components. You can configure the option tomanage the data submissions.

w Norton Community Watch collects and submits detaileddata about the Norton-specific errors and componentsonly. It does not collect or store any personalinformation of any user.

If you chose not to join Norton Community Watch whenyou installed your Norton product, you can turn it onlater. You can use the Norton Community Watch

Getting StartedAbout Norton Community Watch

38

Page 39: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

option in the Administrative Settings window. Youcan also review the data, which Norton CommunityWatch collects and submits to Symantec, in theSecurity History window.

Turning off or turning on Norton Community WatchYou can use the Norton Community Watch option tosend information about a suspicious file to Symantecfor analysis. Symantec assesses the data to determinethe new threats and their sources. The Norton featuressuch as Norton Insight and Insight Network use theSymantec assessed information to detect the securitythreats.

w Norton Community Watch collects and submits detaileddata about the Norton-specific errors and componentsonly. It does not collect or store any personalinformation of any user.

You can use Security History to review the informationthat has been sent to Symantec.

To turn off or turn on Norton Community Watch

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Administrative Settings window, in theNorton Community Watch row, do one of thefollowing:

1 To turn off Norton Community Watch, move theOn/Off switch to the right to the Off position.

1 To turn on Norton Community Watch, move theOn/Off switch to the left to the On position.

4 Click Apply.

About Norton Bootable Recovery ToolNorton Bootable Recovery Tool scans and removesviruses, spyware, and other security risks from your

39Getting StartedAbout Norton Bootable Recovery Tool

Page 40: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

computer. Your computer might be infected with avirus if you experience any of the following symptoms:

1 You cannot install Norton 360.

1 You cannot start your computer.

1 Your computer is extremely slow.

Norton Bootable Recovery Tool is integrated withWindows Preinstallation Environment (WinPE).Therefore, you can run Norton Bootable Recovery Toolonly from a CD, DVD, or USB key. You must use NortonBootable Recovery Tool Wizard to create the NortonBootable Recovery Tool CD, DVD, or USB key.

w You cannot run Norton Bootable Recovery Tool inWinPE for more than 72 hours. If you run NortonBootable Recovery Tool for more than 72 hours, yourcomputer restarts without any notification.

You can use the Norton Bootable Recovery Tool CD,DVD, or USB key to recover a computer that is infectedwith viruses and other security threats. This securityprogram is not a replacement for continuous, real-timeprotection from viruses and latest security risks. Toprotect your computer from future infections, be sureto install or continue using Norton 360 that you alreadypurchased.

Norton Bootable Recovery Tool detects and resolvesthe following security threats:

Programs that infect anotherprogram, boot sector,partition sector, or documentby inserting themselves orattaching themselves to thatmedium. Most viruses justreplicate; many also dodamage.

Viruses

Getting StartedAbout Norton Bootable Recovery Tool

40

Page 41: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Programs containingmalicious codes that aredisguised as or hiding insomething benign, such as agame or utility.

Trojan horses

Tools that are used by ahacker to gain unauthorizedaccess to your computer. Onetype of hacking tool, akeystroke logger, tracks andrecords your individualkeystrokes and can send thisinformation back to thehacker.

Hacking tools

Programs that can scansystems or monitor activityand relay the information toother computers or locationsin cyberspace.

Spyware

Programs that facilitate thedelivery of advertisingcontent through their ownwindow, or by using anotherprogram's interface.

Adware

41Getting StartedAbout Norton Bootable Recovery Tool

Page 42: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Programs that track systemactivity, gather systeminformation, or track userhabits, and relay thisinformation to third-partyorganizations. Theinformation that is gatheredby such programs is neitherpersonally identifiable norconfidential. Trackwareprograms are installed withthe user's consent, and mayalso be packaged as part ofother software that isinstalled by the user.

Trackware

Downloading the Norton Bootable Recovery ToolWizard

If your attempt to install a Norton product fails, youcan download the Norton Bootable Recovery ToolWizard. This easy-to-use wizard helps you createNorton Bootable Recovery Tool on a CD, DVD, or USBkey. You can use Norton Bootable Recovery Tool toscan your computer and remove any security threatsthat prevent successful installation.

It is recommended that you download and installNorton Bootable Recovery Tool Wizard on a computerthat does not have any security threats and createNorton Bootable Recovery Tool. If you create NortonBootable Recovery Tool on an infected computer, thereis a chance that the recovery CD, DVD, or USB keymight get infected.

w To use Norton Bootable Recovery Tool, you must usethe product key of the Norton product that youpurchased. If you use a trial version of Norton 360, youneed to create a Norton Account to receive a productkey to use Norton Bootable Recovery Tool.

Getting StartedAbout Norton Bootable Recovery Tool

42

Page 43: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can download Norton Bootable Recovery ToolWizard in one of the following ways:

1 From the Start menu.

1 From the Norton Support Web site.

To download theNortonBootable Recovery ToolWizardfrom the Start menu

1 On the Windows taskbar, do one of the following:

1 In Windows XP, click Start>Programs>Norton360 > Norton Recovery Tools.

1 In Windows Vista or Windows 7, click Start >All Programs > Norton 360 > Norton RecoveryTools.

1 In Windows 8, on the Start screen, click NortonRecovery Tools

2 Follow the on-screen instructions.

To download theNortonBootable Recovery ToolWizardfrom the Internet

1 Open your Web browser, and go to the followingURL:http://www.norton.com/recoverytool_n360

2 Follow the on-screen instructions.

To download theNortonBootable Recovery ToolWizardfrom Norton 360

1 In the Norton 360 main window, click Scan Now.

2 In the ComputerScan pane, do one of the following:

1 Click Quick Scan.

1 Click Full System Scan.

3 At the bottom of the scan window, next to If youthink there are still risks, click click here.

4 In the Norton Rescue Tools Web page, clickDownload Norton Bootable Recovery Tool.

5 Follow the on-screen instructions.

43Getting StartedAbout Norton Bootable Recovery Tool

Page 44: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

About locating your Norton Product Key or activationPIN

To use Norton Bootable Recovery Tool, you must startthe computer from any of the following recovery mediaand then provide your Norton Product Key or theactivation PIN when prompted:

1 Norton Bootable Recovery Tool CD or DVD

1 Norton Bootable Recovery Tool USB key

w If you already installed and activated any one of thefollowing Norton product on your computer, you donot have to enter the Product Key for Norton BootableRecovery Tool:

1 Norton Internet Security 2010 or later

1 Norton AntiVirus 2010 or later

1 Norton 360 version 3.0 or later

1 Norton Business Suite 4.0 or later

1 Norton Security Suite 4.0 or later

w Norton Bootable Recovery Tool does not have aseparate Product Key or activation PIN. To use NortonBootable Recovery Tool, you must provide the ProductKey or activation PIN of the Norton product that youpurchased.

w If you purchased your Norton product from an Internetservice provider (ISP), you would have received anactivation PIN. When you use Norton BootableRecovery Tool, you must use this activation PIN.

Norton Bootable Recovery Tool does not automaticallylocate the Product Key or the activation PIN on acomputer that has multiple operating systems. If youuse a computer that has multiple operating systems,you need to write down the Product Key or theactivation PIN before you start Norton BootableRecovery Tool and provide the key when prompted.

You can locate your Norton Product Key or activationPIN in any of the following ways:

Getting StartedAbout Norton Bootable Recovery Tool

44

Page 45: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 If you received your Norton product preinstalledby the computer manufacturer, the Product Key isavailable on your Norton Account. When you areprompted, you need to register for a NortonAccount. After you complete registration, you canlog on to your Norton Account and find yourProduct Key. You can also click on the Account linkon the main window of your product and registerand access Norton Account.

1 If you bought your product from Best Buy store, theNorton Product Key is available in the product CDbox. If you are not able to locate your Product Key,contact Best Buy.

1 If you bought a Norton product CD online or froma local store, the Norton Product Key is printed onthe back of the CD envelope. You can also log on toyour Norton Account and find your Product Key.

1 If you downloaded a Norton product from theNorton Online Store, the Product Key is in yourconfirmation email message. You can also see it inyour order details. In addition, you can log on toyour Norton Account and find your Product Key.

1 If you purchased your Norton product from an ISP,the activation PIN is in your confirmation emailmessage from your ISP. If you are not able to locateyour activation PIN, contact your ISP.

In case you use Norton Security Suite or NortonBusiness Suite, you can find your activation PIN in thefollowing way:

1 Go to the following URL:http://www.comcast.net/security

2 Under Get Norton Now, click Windows.

3 Click Get It Now.

4 Log on to your Comcast account, and then find youractivation PIN under the product name.You can use this activation PIN when you use NortonBootable Recovery Tool.

45Getting StartedAbout Norton Bootable Recovery Tool

Page 46: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Creating Norton Bootable Recovery Tool on a CD orDVD

Norton Bootable Recovery Tool is integrated withWindows Preinstallation Environment (WinPE).Therefore, you can run Norton Bootable Recovery Toolonly from a CD, DVD, or USB key. To use it, you firstneed to burn it to a CD or DVD.

w If you choose to create Norton Bootable Recovery Toolon a re-writable CD or DVD, all the data that are storedin the CD or DVD are permanently deleted. Ensure thatyou back up all the data before creating NortonBootable Recovery Tool on a re-writable CD or DVD.

To create Norton Bootable Recovery Tool CD or DVD

1 Open your CD drive and insert an empty CD or DVD.

2 In the Norton Bootable Recovery Tool mainwindow, click Create on CD/DVD media.

3 In the Create on CD/DVD media window, do of thefollowing:

1 Select the CD drive from the Specify drivedrop-down list.

1 If you want to add drivers, click Add next to Adddrivers.

1 If you want to change the default language, clickChange next to Specify language. You canchange the language in the Select Languagewindow. By default, Norton Bootable RecoveryTool is created in English.

4 Click Next.

5 If you create Norton Bootable Recovery Tool on are-writable CD or DVD, click Yes to confirm.

6 Review the results and do one of the following:

1 Click Done to close Norton Bootable RecoveryTool.

1 Click Back to Main to create or update NortonBootable Recovery Tool in another media.

Getting StartedAbout Norton Bootable Recovery Tool

46

Page 47: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Creating Norton Bootable Recovery Tool ISO fileYou can create a Norton Bootable Recovery Tool ISOfile on your computer. You can burn this ISO file to aCD or DVD and use it as a recovery CD or DVD on anycomputer. You can also use this ISO file to point to anyvirtual machine as a virtual CD-ROM.

To create Norton Bootable Recovery Tool ISO file

1 In the NortonBootableRecoveryToolWizard mainwindow, click Create ISO file.

2 In the Create ISO file window, do the following:

1 If you want to save the ISO file to a specificlocation, click Change next to Select location.

You can browse and select the folder location.

1 If you want to add drivers, click Add next to Adddrivers.

1 If you want to change the default language, clickChange next to Specify language.

You can change the language in the SelectLanguage window. By default, Norton BootableRecovery Tool is created in English.

3 Click Next.

4 Review the results and do one of the following:

1 Click Done to close Norton Bootable RecoveryTool.

1 Click Back to Main to create or update NortonBootable Recovery Tool in another media.

Creating Norton Bootable Recovery Tool on a USB keyYou can create Norton Bootable Recovery Tool on aUSB key and use it to run Norton Bootable RecoveryTool on your computer.

When you create Norton Bootable Recovery Tool on aUSB key, all the data that are stored in this USB keyare permanently deleted, and the USB key is formatted.Ensure that you back up all the data before creatingNorton Bootable Recovery Tool on a USB key.

47Getting StartedAbout Norton Bootable Recovery Tool

Page 48: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To create Norton Bootable Recovery Tool on a USB key

1 Insert the USB key into the USB port of yourcomputer.

2 In the NortonBootableRecoveryToolWizard mainwindow, click Create on USB key.

3 In the CreateonUSBkey window, do the following:

1 Select the USB drive from the Specify drivedrop-down list.

1 If you want to add drivers, click Add next to Adddrivers.

1 If you want to change the default language, clickChange next to Specify language.

You can change the language in the SelectLanguage window. By default, Norton BootableRecovery Tool is created in English.

4 Click Next.

5 In the confirmation message, click Yes to let NortonBootable Recovery Tool format your USB key beforecreating Norton Bootable Recovery Tool.

6 Review the results and do one of the following:

1 Click Done to close Norton Bootable RecoveryTool.

1 Click Back to Main to create or update NortonBootable Recovery Tool in another media.

Accessing Norton Bootable Recovery Tool WizardNorton Bootable Recovery Tool is integrated withWindows Preinstallation Environment (WinPE).Therefore, you can run Norton Bootable Recovery Toolonly from a CD, DVD, or USB key.

Norton Bootable Recovery Tool Wizard helps you createNorton Bootable Recovery Tool. You can create NortonBootable Recovery Tool on a CD, DVD, or USB key. Youcan use this media to run Norton Bootable RecoveryTool on your computer.

Getting StartedAbout Norton Bootable Recovery Tool

48

Page 49: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

If you have a valid Norton product key or activationPIN, you can go to your Norton Account and access theNorton Bootable Recovery Tool download link.

To access your Norton Account, go to the followingaddress:

https://account.norton.com

To access Norton Bootable Recovery Tool Wizard

1 Do one of the following:

1 Double-click the Norton Bootable Recovery ToolWizard icon on your computer desktop.

1 In Windows XP, Windows Vista, and Windows7, on the Windows taskbar, click Start > AllPrograms > Norton Bootable Recovery ToolWizard > Norton Bootable Recovery ToolWizard.

1 In Windows 8, on the Start screen, click NortonRecovery Tools.

2 Follow the on-screen instructions to downloadNorton Bootable Recovery Tool Wizard.

Using the Norton Bootable Recovery ToolIf the installation of your Norton product fails, you canuse the Norton Bootable Recovery Tool to scan andremove any security threats that prevent successfulinstallation. If your computer is infected and you arenot able to start your Windows operating system, youcan use Norton Bootable Recovery Tool to removethreats and recover your computer.

Norton Bootable Recovery Tool is available on theproduct CD that you purchased. You can use theproduct CD as a recovery media.

If you have purchased this product as a download, goto the following URL to download the Norton BootableRecovery Tool Wizard:

http://www.norton.com/recoverytool_n360

49Getting StartedAbout Norton Bootable Recovery Tool

Page 50: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton Bootable Recovery Tool automaticallydownloads the latest virus definitions from Symantecservers and uses these virus definitions to secure yourcomputer from all types of viruses and latest securitythreats. If Dynamic Host Configuration Protocol (DHCP)is enabled, virus definitions are automatically updatedwhen your computer is connected to the Internet.Therefore, you must use an Ethernet connection toupdate the virus definitions in Norton BootableRecovery Tool. You cannot update the Norton BootableRecovery Tool virus definitions by using a wirelessnetwork connection.

If the virus definitions are out of date, Norton BootableRecovery Tool may not detect and remove all the latestsecurity threats from your computer.

w To use Norton Bootable Recovery Tool, you must usethe product key of the Norton product that youpurchased. If you use a trial version of Norton 360, youneed to create a Norton Account to receive a productkey to use Norton Bootable Recovery Tool.

To use the Norton Bootable Recovery Tool

1 Insert the Norton Bootable Recovery Tool recoverymedia.

2 Turn on or Restart your computer and enter to theBIOS mode.You can enter the BIOS mode by pressing the keythat is displayed immediately after your system isturned on.

3 Select the recovery media on which you have createdthe Norton Bootable Recovery Tool and then pressEnter.If you are using UEFI-enabled machine, select therecovery media under the Legacy Boot optioninstead of the UEFI Boot option.The recovery media can be the Norton BootableRecovery Tool CD, DVD, or USB key.

Getting StartedAbout Norton Bootable Recovery Tool

50

Page 51: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

4 Read the Norton License Agreement, type yourProduct Key, and then click I Agree.If you use a non-QWERTY keyboard, use the VirtualKeyboard option to enter your Product Key.

5 In the Norton Bootable Recovery Tool window, clickNorton Advanced Recovery Scan.

6 In the Scan section, click Start Scan.When the scan is complete, the scan results windowlists the following:

1 The total number of files scanned

1 The total number of threats detected

1 The total number of resolved threats

1 The total number of unresolved threats

1 The details of each detected threat

7 In the scan results window, do one of the following:

1 To fix all of the threats that are found on yourcomputer, select Set all action to Fix.

1 To perform appropriate actions for each of thethreats, select Fix or Ignore.

8 Click Continue.

9 If a confirmation dialog box appears, click OK.

10 In the Scan Summary window, review the scansummary and do one of the following:

1 Click Done.

1 To run another scan, click Scan Again.

Updating virus definitions on a USB keySymantec virus definitions are used in Norton BootableRecovery Tool to scan your computer for the latestsecurity risks. When you create Norton BootableRecovery Tool on a USB key, the latest virus definitionsare automatically downloaded and included in the USBkey. You can update the virus definitions in NortonBootable Recovery Tool on a USB key that you createdearlier.

51Getting StartedAbout Norton Bootable Recovery Tool

Page 52: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To update Norton Bootable Recovery Tool virusdefinitions on a USB key

1 Insert your Norton Bootable Recovery Tool USB keyinto the USB port of your computer.

2 In the NortonBootableRecoveryToolWizard mainwindow, click Update USB key definitions.

3 In the Update USB key definitions window, fromthe Specify drive drop-down list, select the USBdrive.

4 Click Next.

5 Review the results and click Done.

About Norton Power EraserNorton Power Eraser is a powerful removal tool thatcan help you clean up the security risks that aredifficult to remove from your computer. If a programhijacked your computer and you have difficulty inremoving it, Norton Power Eraser helps you removethe security threat from your computer.

Norton Power Eraser includes detection and removalcapabilities for the security risks that impersonatelegitimate applications. The tool uses more aggressivetechniques than your Norton security product; hencethere is a risk that it may flag legitimate programs forremoval. You should carefully review the scan resultspage before removing any files.

Downloading and accessing Norton Power EraserYou can download Norton Power Eraser using yourWeb browser. After you download, you can scan yourcomputer with Norton Power Eraser to remove securitythreats.

To download and access Norton Power Erase

1 Open your Web browser and go the following URL:http://security.symantec.com/nbrt/npe.aspx

Getting StartedAbout Norton Power Eraser

52

Page 53: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

2 In the page that appears, click Download NortonPower Eraser.

3 Save the NPE.exe file to your Desktop.

4 Double-click the NPE.exe file on your Desktop.

5 Read the license agreement, and then click Accept.

Scanning your computer with Norton Power EraserYou can scan your computer with Norton Power Eraserto remove threats even if you have a Symantec securityproduct. If you cannot start your computer in Normalmode, you can run Norton Power Eraser in Safe mode.

To scan your computer with Norton Power Eraser

1 Double-click the NPE icon on your desktop.

2 Read the End User License Agreement and clickAccept.

3 In the NortonPowerEraser window, click Scan forRisks.

4 In the window that appears, click Restart.Norton Power Eraser restarts your computer andstarts the system scan after you log back in to yourcomputer. By default, Norton Power Eraser performsa Rootkit scan and requires a system restart.

w If Norton Power Eraser finds some issues or risks, youmay need to follow the on-screen instructions toresolve the issues

w Scanning your computer may take several minutes.The scan progress screen displays the items beingscanned. After the scan is complete, you candouble-click a file name in the list and get moreinformation about the item.

About updating Norton 360Norton 360 uses the Internet to automatically obtainupdates to its virus definition files and its programfiles. These updates continually enhance the technologythat Norton 360 uses to keep your PC protected.

53Getting StartedAbout updating Norton 360

Page 54: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Automatic updates require an Internet connection. Ifyou use a proxy server to connect to the Internet, youmust configure the proxy settings in your product. Ifyou do not normally keep your PC connected to theInternet, you can manually update Norton 360 afteryou connect to the Internet. Updating Norton 360 ona regular basis ensures that you have the latestdefinition updates and program updates.

About LiveUpdateSymantec products download the latest definitionupdates and program updates regularly from Symantecservers. The definition updates protect your computerfrom the latest viruses and unknown security threats.Using the LiveUpdate technology, Symantec productshelp you to obtain and install these updates.

LiveUpdate takes little time to download and processthe definition updates and program updates. You canchoose Smart Definitions to minimize download time,installation time, and memory consumption as SmartDefinitions are a subset of virus definitions. The SmartDefinitions option is available on the ScansandRiskstab in the Antivirus settings window. You can cancelthe LiveUpdate session at any time.

LiveUpdate obtains these updates for your computerby using your Internet connection. If your networkuses proxy servers to connect to Internet, LiveUpdateuses the proxy settings in your product to downloadthe latest updates. You can use the Network ProxySettings option in the AdministrativeSettings windowto configure the proxy settings of your network.

Getting StartedAbout updating Norton 360

54

Page 55: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

w LiveUpdate does not download the latest definitionupdates and program updates, if the Network CostAwareness option in the Settings window is set to NoTraffic. Network Cost Awareness lets you define theamount of network bandwidth that Norton 360 canuse. Therefore, you must ensure that the NetworkCostAwareness option is turned on and set to No Limit orCritical Updates Only for LiveUpdate to runsuccessfully.

About Program and Definition Updates

LiveUpdate obtains program updates and definitionupdates for your computer by using your Internetconnection.

Program updates are minor improvements to yourinstalled product. These differ from product upgrades,which are newer versions of the entire product.Program updates are usually created to extend theoperating system or hardware compatibility, adjust aperformance issue, or fix program errors. Programupdates are released on an as-needed basis.

w Some program updates may require that you restartyour computer after you install them.

LiveUpdate automates the process of downloading andinstalling program updates. It locates and obtains filesfrom an Internet site, installs them, and then deletesthe older files and downloaded definitions from thetemporary folder after processing the updates.

Definition updates are the files that keep yourSymantec products up to date with the latest antithreattechnology. The definition updates that you receivedepend on which product you use.

55Getting StartedAbout updating Norton 360

Page 56: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The type of definition updates that each of theSymantec products receive are as follows:

Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.

Norton AntiVirus, NortonAntiVirus Online

In addition to the virusand security risk updates,users of these productsreceive definition updatesfor security protection.For the products thatcontain protectionagainst phishing, usersreceive definition updatesagainst phishing.

The security definitionupdates provide the latestpredefined firewall rules,the updated lists ofapplications that accessthe Internet, IntrusionPrevention signatures,and Symantec spamdefinition files. Theselists are used to identifyunauthorized accessattempts to yourcomputer.

Norton Internet Security, NortonInternet Security Online

Getting StartedAbout updating Norton 360

56

Page 57: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.

In addition, users of theseproducts receiveSymantec spamdefinitionfiles and definitionupdates against phishing.

Norton 360, Norton 360 Online

Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.

In addition, users of theseproducts receiveSymantec spamdefinitionfiles and definitionupdates against phishing.

Norton Security Suite, NortonBusiness Suite

About Smart Definitions

Norton 360 downloads and installs virus definitionsregularly to protect your computer from the latestsecurity threats. For faster downloads and installationpurpose, Norton 360 classifies these virus definitionsinto two sets.

The virus definitions are classified into the followingtwo sets:

Contains all the virus definitionsfor each threat that is known toSymantec.

Complete Set

57Getting StartedAbout updating Norton 360

Page 58: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Contains the most importantvirus definitions that arerequired for latest securitythreats as viewed by Symantec.

The Core Set is a subset of theComplete Set, and it isapproximately 30 percentsmaller than the Complete Set.The Core Set minimizesdownload time, installation time,and system start time. It alsooccupies lesser amount of diskspace as compared to theComplete Set virus definitions.Therefore, the Core Set resultsin faster performance of yourcomputer.

Core Set

The Core Set virus definitions are called as SmartDefinitions. Norton 360 provides the SmartDefinitionsoption to choose between Core Set virus definitionsand Complete Set virus definitions for LiveUpdatesessions. The option is available on the Antispywareand Updates tab in the Antivirus settings window.

During Automatic LiveUpdate or each time that yourun LiveUpdate manually, Norton 360 checks if theSmart Definitions option is turned on or off. It thendownloads and installs the desired set of virusdefinitions based on the option settings. By default,the SmartDefinitions option is turned on, which meansthat the Core Set virus definitions are downloaded andinstalled.

Turning off or turning on Smart Definitions

Smart Definitions are a subset of virus definitions thatcontains most important definitions for the latestsecurity threats.

As the Smart Definitions are of considerably smallersize, it results in lesser download time, lesser

Getting StartedAbout updating Norton 360

58

Page 59: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

installation time, lesser boot time, and lesser memoryconsumption. It also occupies lesser amount of diskspace as compared to the full set of virus definitions.Therefore, Smart Definitions result in fasterperformance of your computer.

Norton 360 checks the Smart Definitions optionsettings during each LiveUpdate session. If the optionis turned on, the Smart Definitions are downloadedand installed. If the option is turned off, all of the virusdefinitions are downloaded and installed.

To turn off or turn on Smart Definitions

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.

3 In the Antivirus settings window, click theAntispyware and Updates tab.

4 In the Smart Definitions row, do one of thefollowing:

1 To turn off Smart Definitions, move the On/Offswitch to the right to the Off position.

1 To turn on Smart Definitions, move the On/Offswitch to the left to the On position.

5 In the Settings window, click Apply.

6 Click Close.

Turning off or turning on Automatic LiveUpdate

You can have LiveUpdate check for definition updatesand product updates automatically on a set schedule,by turning on the Automatic LiveUpdate option. Youcan also run LiveUpdate manually when the AutomaticLiveUpdate option is turned on. However, you mustrun LiveUpdate manually to obtain updates if you haveturned off the Automatic LiveUpdate option.

To access the Automatic LiveUpdate option, go theNorton 360 main window and then click Settings >Antivirus > Antispyware and Updates. You can also

59Getting StartedAbout updating Norton 360

Page 60: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

turn off or turn on the Automatic LiveUpdate optionfrom Quick Controls in the Settings window.

w If you are connected to the Internet, AutomaticLiveUpdate downloads product updates and definitionupdates every hour. If you have an Integrated ServicesDigital Network (ISDN) router that is set toautomatically connect to your Internet service provider(ISP), it may incur charges each time. If you do not wantthis setup, you can turn off the automatic connectionon your ISDN router, or turn off the AutomaticLiveUpdate option.

To turn on Automatic LiveUpdate from Quick Controls

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Quick Controls,check Automatic LiveUpdate.

To turn off Automatic LiveUpdate from Quick Controls

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Quick Controls,uncheck Automatic LiveUpdate.

3 In the Select the duration drop-down list, selecthow long you want to turn off AutomaticLiveUpdate, and then click OK.

Checking for updates manually

If you disconnect your PC from the Internet, Symantecrecommends that you check for Norton 360 updatesafter you reconnect.

To check for updates manually

1 In the Norton 360 main window, click Security, andthen click Run LiveUpdate.

2 In the Norton LiveUpdate window, when theLiveUpdate is completed successfully, click Close.

Checking for the latest virus and spyware definitions date

Virus definition files contain the information thatallows Norton 360 to recognize and alert you to the

Getting StartedAbout updating Norton 360

60

Page 61: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

presence of a specific virus or security threat. Norton360 shows the date on which you last updated the virusand spyware definitions.

You can also check the latest virus definition date. TheDefinitionsUpdate section in the PCSecurityDetailswindow displays the status and date of the last virusdefinition updates.

To check for the latest virus and spyware definition date

1 In the Norton 360 main window, click Security, andthen click View Details.

2 In the PC Security Details window, underDefinitionsUpdate, view the latest virus definitionsdetails.The Status column shows the date on which youlast downloaded and installed the latest definitionupdates.

About keeping your protection up to date

Definition updates are available to you as long as youmaintain an active product status. The ways in whichyou can acquire the product and maintain your statusare as follows:

The product includes a limited-timesubscription to definition updates. Whenthe subscription is due to expire, you areprompted to renew. Follow the on-screeninstructions to complete yoursubscription renewal.

After your product expires, you cannotobtain updates of any kind and all thesecurity features are turned off. If youdo not renew your product, you are nolonger protected against security threats.Though LiveUpdate continues to checkfor updates after expiration, you mustrenew your product to enable all thesecurity features.

If you purchaseda subscriptionversion of a retailproduct

61Getting StartedAbout updating Norton 360

Page 62: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

If you do not activate your service orrenew your subscription, you cannotobtain updates of any kind and thesoftware no longer functions.

If you purchaseda product as aservice, or it cameinstalled on yourcomputer

Your product status is always active aslong as your security service is activewith your service provider.

If your security service is not active, youcannot obtain updates of any kind andthe software no longer functions.

If you receive thisservice throughyour serviceprovider

Turning on or turning off Apply updates only on reboot

LiveUpdate obtains latest definition updates and theprogram updates that keep your computer secure fromthe latest security threats. Definition updates containthe information that allows Norton 360 to recognizeand alert you to the presence of a specific virus or asecurity threat. Certain program updates requiresystem restart for the update to complete. The Applyupdatesonlyonreboot option lets you choose how theprogram updates needs to be applied.

w The Apply updates only on reboot option is availableonly on Windows 7 and Windows 8.

When you turn on the Apply updates only on rebootoption, the RestartNow and the RestartLater optionsappear in the Norton LiveUpdate window. When youclick RestartNow, your computer is restarted and theprogram updates are applied. When you click RestartLater, the program updates are applied when yourestart your computer.

When you turn off the Apply updates only on rebootoption, the Apply Now option appears in the NortonLiveUpdate window. When you click Apply Now, theprogram updates that do not require system restartare applied instantly. However, the program updates

Getting StartedAbout updating Norton 360

62

Page 63: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

that require system restart are automatically appliedthe next time you restart your computer.

To turn on or turn off Apply updates only on reboot

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.

3 In the Antivirus settings window, click theAntispyware and Updates tab.

4 In the Apply updates only on reboot row, do oneof the following:

1 To turn off Applyupdatesonlyonreboot, movethe On/Off switch to the right to the Off position.

1 To turn on Applyupdatesonlyonreboot, movethe On/Off switch to the left to the On position.

5 In the Settings window, click Apply.

6 Click Close.

About Pulse Updates

In addition to the definition updates that AutomaticLiveUpdate downloads, Norton 360 uses streamingtechnology to download the latest virus definitions.These downloads are called Pulse Updates. The PulseUpdates are lighter and faster than AutomaticLiveUpdate. They keep your computer secure from theongoing threats that exist on the Internet. PulseUpdates protect you against the rapidly-changingenvironment of security threats without compromisingyour computer's performance. Pulse Updates shouldalways be turned on to get the latest updates.

Pulse Updates checks for definition updates every 5minutes. If definition updates are available, LiveUpdatedownloads the streamed virus definitions. PulseUpdates provide the updates in between the fullupdates, which Automatic LiveUpdate downloadsautomatically every hour. Norton 360 merges the newstream that is downloaded with the last updates thatare installed. The Pulse Updates downloads provide

63Getting StartedAbout updating Norton 360

Page 64: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

additional and fast protection for the latest threats inbetween the full updates without disrupting your onlineexperience.

Even if you do not turn on Pulse Updates, LiveUpdatecollects all the missed streams and, it updates yourcomputer during full definition updates.

Turning off or turning on Pulse Updates

Pulse Updates provide frequent, lightweight updatesevery 5 minutes in between the full updates. Alwaysensure that the Pulse Updates option is turned on. Itprotects you from the latest threats withoutcompromising your system performance or disruptingyour online experience.

You must be connected to the Internet to obtain latestdefinition updates by using Pulse Updates. You canturn on or turn off Pulse Updates only if AutomaticLiveUpdate is turned on.

To turn off or turn on Pulse Updates

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.

3 In the Antivirus settings window, clickAntispyware and Updates.

4 Under AutomaticLiveUpdate, in the PulseUpdatesrow, do one of the following:

1 To turn off Pulse Updates, move the On/Offswitch to the right to the Off position.

1 To turn on Pulse Updates, move the On/Offswitch to the left to the On position.

5 In the Settings window, click Apply.

6 Click Close.

Getting StartedAbout updating Norton 360

64

Page 65: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

About Network Proxy SettingsA proxy server regulates access to the Internet, andprevents external computers from accessing yournetwork. If you are on a network that uses a proxyserver to connect to the Internet, you can provide proxyserver details to Norton 360. You can use the NetworkProxy Settings window to specify the automaticconfiguration URL, the proxy settings, and theauthentication details. Norton 360 uses the proxysettings and authentication details to connect to theInternet automatically, whenever required. Forexample, LiveUpdate uses the specified proxy serversettings to retrieve updates. You must ensure that youspecify the proxy server details for LiveUpdate to runsuccessfully.

In some cases, your network uses an automaticconfiguration URL or script for managing Internetaccess. In this case, you must provide the URL of therequired Proxy Automatic Configuration (PAC) file. APAC file contains the code that lets your browser knowabout the proxy settings for different Web sites overthe Internet. It also contains the words which you wantto filter and block while you access the Internet. Youcan also choose the option that lets your browser toautomatically detect the proxy settings. If you wantyour manual settings in the network, ensure that youdisable the Automatic Configuration options.

65Getting StartedAbout Network Proxy Settings

Page 66: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Network Proxy Settings window lets you specify thefollowing settings:

Lets you specify the automaticconfiguration URL or script tomanage Internet access.

You have the following options:1 Automatically detect

settings

Lets your browser detect thenetwork settingsautomatically.

If you do not want to overrideyour manual settings fornetwork connections, youmust disable this option.

1 Useautomatic configurationscript

Lets your browser use theautomatic configuration URLor script to manage Internetaccess.

Use the URL box to providethe HTTP URL or the HTTPSURL.

Automatic Configuration

Lets you provide the details ofyour Proxy Settings.

UnderProxySettings, checkUsea proxy server for your HTTPconnections, and do thefollowing:

1 In the Address box, type theURL or IP address of yourproxy server.

1 In the Port box, type the portnumber of your proxy server.

You can specify a value from1 to 65535.

Proxy Settings

Getting StartedAbout Network Proxy Settings

66

Page 67: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you connect to the Internetthrough a server that requiresauthentication.

Use the Username box andPassword box to type theauthentication details.

Authentication

Configuring Network Proxy SettingsWhen you use a proxy server to connect to the Internet,you must specify the proxy server details. The NetworkProxy Settings window lets you enter automaticconfiguration settings, proxy settings, and proxy serverauthentication settings. The Network Proxy settingslet you connect to the Internet while you perform taskssuch as activating the product or accessing the supportoptions.

To configure Network Proxy Settings

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the NetworkProxySettings row, click Configure.

67Getting StartedAbout Network Proxy Settings

Page 68: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

4 In the Network Proxy Settings window, do thefollowing:

1 If you want your browser to automatically detectnetwork connection settings, under AutomaticConfiguration, check Automatically detectsettings.

1 If the proxy server requires an automaticconfiguration URL, under AutomaticConfiguration, check Use automaticconfiguration script. Type the URL of the PACfile in the URL box.

1 If your network uses a proxy server, under ProxySettings, check Use a proxy server for yourHTTPconnections. In the Address box, type theURL or IP address of your proxy server, and inthe Port box, type the port number of your proxyserver. You can specify a value from 1 to 65535.

1 If your proxy server requires a user name andpassword, under Authentication, check I needauthenticationtoconnect throughmyfirewallor proxy server. Type the user name in theUsername box and password in the Passwordbox.

5 In the NetworkProxySettings window, click Apply.

About Norton 360 statusNorton 360 displays the security status of yourcomputer under the Security section of the mainwindow. Based on the security status of your computer,Norton 360 shows your system status as Protected,Attention, or At Risk.

The system status indicator displays one of thefollowing statuses:

Indicates that your computeris protected from threats,risks, and damages.

Protected

Getting StartedAbout Norton 360 status

68

Page 69: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Indicates that your computerrequires attention.

At the bottom section of theNorton 360 main window,click Fix Now to resolve thesecurity threats on yourcomputer.

Attention

Indicates that your computeris at risk.

At the bottom section of theNorton 360 main window,click Fix Now to resolve thesecurity threats on yourcomputer.

At Risk

Norton 360 displays individual security status for eachprotection category, such as Security, Identity, Backup,and Tuneup. Based on the security status of thedifferent components of your computer, the statusareas of the four protection categories are marked asProtected, Attention, or At Risk.

When your system status or protection categoriesstatuses are marked as At Risk or Attention, at thebottom section of the Norton 360 main window, clickFix Now to resolve all the security threats on yourcomputer.

Responding to security status indicatorsWhen your system encounters a threat or a risk, theproduct displays the security status under the Securitysection of the main window. When a status indicatordisplays a status, you can take appropriate action toimprove your protection status. Your protection isbased on the programs that are installed on yourcomputer. To improve your protection status, ensurethat your installed programs are up to date.

69Getting StartedAbout Norton 360 status

Page 70: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

When your system status or protection categoriesstatuses are marked as At Risk or Attention, you canresolve the security issues directly from the mainwindow.

To respond to security status indicators

1 In the Norton 360 main window, click Fix Now.

2 Follow the on-screen instructions.

About the Norton 360 iconWhen you install Norton 360, it places an icon in thenotification area at the far right of the taskbar. Thisicon indicates the current security status of yourcomputer. Norton 360 displays an animated icon whenit actively fixes any issues or wants to inform you aboutany warning or urgent issues.

You can see the following representations of Norton360 icon in the notification area:

Represents that your computeris fully protected

Icon with a green checkmark badge

Represents that there are someissues against your computerprotection that require yourattention

Icon with an orangeexclamation mark badge

Represents that there are someurgent issues against yourcomputer protection that requireimmediate resolution

Icon with a red cross markbadge

Represents that the Silent Modefeature is turned on

This icon also displays thecurrent protection status badge.

Icon with acrescent-shaped edge

Getting StartedAbout Norton 360 status

70

Page 71: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can right-click the icon to see a shortcut menu forNorton 360. You can choose items on the shortcut menuto open the Norton 360 window, to fix any issues thatNorton 360 detects, or to get additional help.

About Norton 360 shortcut menuNorton 360 works in the background to keep your PCsecure. The Norton 360 icon is available in thenotification area at the far right of the taskbar. Theicon reassures you that your protection is up to date.It changes its color if any change in status occurs.

The messages that appear in the notification area mayrequire a response from you, such as opening a window.More often, messages inform you about currentactivities, and they disappear after a few seconds.

You can right-click the Norton 360 icon to accessspecific Norton 360 activities. Depending on the currentactivities, your options include the following:

Use this option to launch theNorton 360 main window tocomplete tasks, view currentstatus, or access otherfeatures.

Open Norton 360

Use this option to run a QuickScan to protect possiblevirus-infected areas of yourcomputer.

Run QuickScan

Use this option to runLiveUpdate to check fordefinition updates andprogram updates.

Run LiveUpdate

71Getting StartedAbout Norton 360 status

Page 72: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Use this option to create abackup of your files.

You can specify when andhow often Norton 360 backsup your files.

Run Backup Now

Use this option to review theinformation about thesecurity events for all of thecategories.

View Recent History

Use this option to resolveyour problem easily usingNorton Autofix.

Get Support

Use this option to turn on orturn off Silent Mode.

Turnon/Turnoff SilentMode

Use this option to turn on orturn off the firewall.

Enable/Disable SmartFirewall

Use this option to turn on orturn off AntivirusAuto-Protect.

Enable/Disable AntivirusAuto-Protect

Use this option to check anddownload the latest versionof the product.

Check for New Version

Viewing details of protection featuresIn the Norton 360 main window, you can see a summaryof each of the four protection features that Norton 360provides. You can view additional details about eachprotection feature.

Getting StartedAbout Norton 360 status

72

Page 73: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To view details of a protection feature

1 In the Norton 360 main window, click on aprotection feature, and then click View Details.In the window that appears, you can view thefollowing details:

1 The current status of the protection feature.

1 A list of the checks that the feature performs,and the results of each check. In some cases, theresults of a check can include a link that providesadditional information.

1 A list of actions that you can perform.

2 After you view details, click Close.

73Getting StartedAbout Norton 360 status

Page 74: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Getting StartedAbout Norton 360 status

74

Page 75: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This chapter includes the following topics:

1 About System Insight

About System InsightNorton 360 continuously monitors your computer tokeep it free of any problems and run at peak efficiency.Norton 360 constantly scans the vital areas of yourcomputer including memory, registry keys, and runningprocesses. It monitors the important activities such asgeneral file operation, network traffic, and Internetbrowsing. In addition, Norton 360 ensures that theactivities that it performs on your computer do notdegrade the overall performance of your computer.

System Insight provides you a centralized locationwhere you can view and monitor the activities that youperform on your system. System Insight displays suchinformation in the Performance window.

You can use the Performance window for the following:

1 To view monthly history of the important systemactivities that you performed or that occurred overa period of the last three months.

The Events graph that appears at the top of thewindow provides a pictorial representation ofimportant system activities. The activities includeapplication installations, application downloads,disk optimizations, threat detections, performance

2Monitoring yoursystem'sperformance

Page 76: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

alerts, or Quick Scans. The graph displays theactivities as icon or stripe, and the description foreach icon or stripe is provided at the bottom of thegraph. The pop-up that appears when you move themouse pointer over an icon provides you the detailsabout the activity. The View Details link in thepop-up lets you view additional details about theactivity in the Security History window. You canuse the tabs at the top of the graph to obtain detailsfor the current month and details for the last twomonths.

1 To rearrange the organization of files on yourcomputer.

Optimizing your system helps you maximize theusable free space on a disk by grouping files basedon how they are accessed. The Optimize option atthe top of the Events graph lets you defragmentyour system.

1 To view and analyze the effect of Norton 360 on theperformance of your computer.

The Performance graph that appears at the bottomof the window provides a graphical representationof your CPU usage and memory usage. The CPU tabdisplays a graph that represents the overall systemCPU usage and Norton-specific CPU usage. Whenyou click at any point on the CPU graph andmemory graph, Norton 360 displays a list of theprocesses that consume maximum resources at thatpoint. It also displays the percentage of usage foreach process. You can click a process that isavailable in the list to get more information aboutthe process in the File Insight window. TheMemory tab displays a graph that representsoverall memory usage and Norton-specific memoryusage. You can select any of the Zoom options toobtain magnified view or historical data of thegraphs.

1 To view the details of Norton-specific jobs that arecurrently running in the background.

Monitoring your system's performanceAbout System Insight

76

Page 77: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The NortonTasks window provides the details suchas the timestamp, the duration, and the status ofthe background jobs. The details also include thetype of power the job needs to run and if a job randuring idle time. You can select different powersources for the background jobs. You can also startor stop a background job at any time.

1 To view details about the known good files and theknown bad files.

The NortonInsightNetwork window lets you viewthe total number of files that Symantec analyzeswithin the Norton Community. You can view thenumber of trusted files that are available on yourcomputer.

1 To view the details of the Files of Interest.

The Norton Insight -ApplicationRatings windowprovides details on the trust level, prevalence,resource usage, and stability ratings for the Filesof Interest.

You can use the Performance Monitoring option tomonitor the performance of your computer. To accessthe PerformanceMonitoring option, go to the Norton360 main window, click Settings > AdministrativeSettings > Performance Monitoring.

Accessing the Performance windowSystem Insight provides you a centralized locationwhere you can view and monitor your system activities.System Insight displays such information in thePerformance window. You can access the Performancewindow to view details about the important systemactivities, CPU usage and memory usage, andNorton-specific background jobs. You can also viewNorton Insight details and defragment your bootvolume.

To access the Performance window

4 In the Norton 360 main window, click Performance.

77Monitoring your system's performanceAbout System Insight

Page 78: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

About monitoring system activitiesSystem Insight provides information about theimportant system activities that you performed or thatoccurred over a period of the last three months. SystemInsight displays the information in the Performancewindow. The Events graph at the top of thePerformance window displays each activity as icon orstripe. The description for each icon or stripe appearsat the bottom of the graph. You can use the tabs at thetop of the graph to obtain details for the current monthand for the last two months. The activities include:

Provides the details about theinstallation activities that youperformed on your system overa period of the last threemonths.

The details include theapplication that you installed,the date on which you installedthe application, and the totalnumber of installations on thatdate.

Installs

Provides the details about theapplication-download activitiesthat you performed on yoursystem over a period of the lastthree months.

The details include the date onwhich you downloaded a file andthe total number of downloadson that date. You can click thefile name link to view additionaldetails about the downloadedfile such as the Download Insightreport, file name, reputationlevel, and recommended action.

Downloads

Monitoring your system's performanceAbout System Insight

78

Page 79: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Indicates the optimizationactivities that you performed onyour system over a period of thelast three months.

Optimized

Provides the details about thethreat detection activities thatNorton 360 performed on yoursystem over a period of the lastthree months.

The details include the date onwhich Norton 360 detected athreat and the total number ofthreats that Norton 360 detectedon that date. The View Detailslink provides additional detailsabout the risk such as the riskimpact and the origin of the risk.The details also include theaction that a threat hasperformed on your system andthe action that Symantecrecommends you to resolve thethreat.

Detections

Provides the details about theperformance alerts that Norton360 displayed over a period ofthe last three months.

The details include themonitored date and the numberof performance alerts generated.The View Details link providesadditional details aboutperformance-related activities,program name, programlocation, and system resourcesutilization.

Alerts

79Monitoring your system's performanceAbout System Insight

Page 80: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Provides the details about QuickScans that Norton 360performed on your system overa period of the last threemonths.

The details include the date onwhich a Quick Scan wasperformed and the number ofQuick Scans that wereperformed on that date. TheView Details link providesadditional details such as thescan time, total items scanned,total risk detected, total risksresolved, and recommendedaction.

Quick Scans

Viewing details of your system activities

System Insight lets you view details of the systemactivities that you performed or that occurred over thelast three months in the Performance window. Theactivities include application installations, applicationdownloads, disk optimizations, threat detections,performance alerts, or Quick Scans. You can use thetabs at the top of the Events graph to obtain details forthe current month and for the last two months. TheEvents graph at the top of the Performance windowdisplays each activity as icon or stripe. The descriptionfor each icon or stripe appears at the bottom of thegraph. The pop-up that appears when you move themouse pointer over an icon provides you the detailsabout the activity. The details include the date on whichan activity was performed and the number of suchactivities that you performed on that date. The ViewDetails link provides additional details of the activityin the Security History window.

To view details of your system activities

1 In the Norton 360 main window, click Performance.

Monitoring your system's performanceAbout System Insight

80

Page 81: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

2 In the Performance window, at the top of the Eventsgraph, click the tab for a month to view the details.

3 In the Events graph, move the mouse pointer overthe icon or the stripe for an activity.

4 In the pop-up that appears, view the details of theactivity.

5 If the View Details option appears in the pop-up,click View Details to view additional details in theSecurity History window.

About performance alertingNorton 360 monitors your system performance. If itdetects an increased usage of system resources by anyprogram or process, it notifies you with performancealerts. Performance alerting works only when thePerformance Monitoring option and PerformanceAlerting option are turned on.

Performance alerting notifies you with informationabout the program name and resources that theprogram uses excessively. The Details & Settings linkin the performance notification alert lets you viewadditional details about the resource consumption bythe program. The File Insight window opens anddisplays the details of the file, the origin of the file, theprocess ID, and the complete resource usage list of theprogram. From the FileInsight window, you can chooseto exclude the program from being monitored. You canuse the Settings option in the File Insight window toturn off the Performance Alerting option.

w Performance alerts are not displayed when yourcomputer is idle or in Silent Mode.

For each system resource, such as CPU, memory, andhard disk, there is a resource consumption thresholddefined. When the resource consumption of a programexceeds the defined threshold limit, Norton 360 alertsyou with a performance alert.

You can use the Resource Threshold Profile forAlerting option to configure the threshold limit. To

81Monitoring your system's performanceAbout System Insight

Page 82: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

access the Resource Threshold Profile for Alertingoption, go to the Norton 360 main window, and thenclick Settings > Administrative Settings >Performance Monitoring > Resource ThresholdProfile for Alerting.

You can use the UseLowResourceProfileOnBatteryPower option to let Norton 360 automatically changethe resource threshold profile to low when yourcomputer runs on battery power.

You can use High-Usage Alert for option to configureNorton 360 to alert for high usage of CPU, memory,disk, and handles.

In addition, you can add programs to the ProgramExclusions list using the Program Exclusions option.When you add a program to the Program Exclusionslist, Norton 360 does not alert you when the programexceeds the defined resource consumption thresholdlimit.

You can view all the performance-related logs underthe Performance Alert category in the SecurityHistory window.

Configuring performance alerts

You can use the Performance Alerting option toreceive performance alerts when there is an increasedusage of system resources by any program or process.

You can use the following options to configureperformance alerts:

Turns off performance alerts.

Select this option if you donot want Norton 360 to notifyyou with performance alerts.

Off

Monitoring your system's performanceAbout System Insight

82

Page 83: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Turns on performance alerts.

Select this option if you wantNorton 360 to notify you withperformance alerts when aprogram or process exceedsthe threshold limit of thesystem resource usage.

By default, the PerformanceAlerting option is turned on.

On

Monitors and records thesystem resource usage.

Select this option if you wantNorton 360 to only monitorthe system resource usage ofevery program or processrunning on your computer.

When a program or processexceeds the threshold limitof the system resource usage,Norton 360 records thesedetails in the SecurityHistorywindow. You can viewthe details that are related toperformance alerts underPerformance Alert categoryin the Security Historywindow.

Log Only

To configure performance alerts

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

83Monitoring your system's performanceAbout System Insight

Page 84: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 Under Performance Monitoring, in thePerformanceAlerting row, do one of the following:

1 To turn off performance alerts, move thePerformanceAlerting switch to the Off position.

1 To turn on performance alerts, move thePerformanceAlerting switch to the On position.

1 To suppress the performance alerts, move thePerformance Alerting switch to the Log Onlyposition.

4 Under High-UsageAlertfor, do one of the following:

1 If you want Norton 360 to monitor the CPUusage, move the CPU switch to the left to the Onposition.

1 If you want Norton 360 to monitor the memoryusage, move the Memory switch to the left tothe On position.

1 If you want Norton 360 to monitor the diskusage, move the Disk switch to the left to the Onposition.

1 If you want Norton 360 to monitor the handlecount, move the Handles switch to the left tothe On position. By default, this option is turnedoff.

5 Click Apply, and then click Close.

Configuring the resource threshold profile

The threshold limit for the system resourcesdetermines at which point Norton 360 should notifyyou with performance alerts. When a specific programexceeds the threshold limit of using your systemresource, Norton 360 notifies you with a performancealert.

To configure the resource threshold profile

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

Monitoring your system's performanceAbout System Insight

84

Page 85: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 Under Performance Monitoring, in the ResourceThreshold Profile for Alerting row, select one ofthe following options:

Configures a low thresholdlimit for alerting.

Symantec recommends youto select this option whenyour computer runs onbattery power.

Low

Configures a mediumthreshold limit for alerting.

By default, the threshold limitis set to medium.

Medium

Configures a high thresholdlimit for alerting.

Symantec recommends youto select this option whenyour computer runs tasksthat require high resource.

High

4 Click Apply and then click Close.

Turning off or turning on the Use Low Resource Profile OnBattery Power option

When your computer runs on battery power, it isimportant that all active software programs consumeminimum resource usage. By reducing resource usage,your computer gains longer battery life and becomesmore energy efficient.

You can configure a low threshold profile and ensurethat all programs consume minimum resource usage.When the resource usage of a program or a processexceeds the low threshold limit, Norton 360 notifiesyou with a performance alert. You can choose to close

85Monitoring your system's performanceAbout System Insight

Page 86: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

the program or the process manually and free theresource.

If the Use Low Resource Profile On Battery Poweroption is turned on, Norton 360 automatically changesthe threshold profile to low when your computer runson battery power. By default, this option is turned on.

w Symantec recommends that you keep the Use LowResourceProfileOnBatteryPower option turned on.

To turn off the Use Low Resource Profile On BatteryPower option

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Performance Monitoring, in the Use LowResource Profile On Battery Power row, move theOn/Off switch to the right to the Off position.

4 Click Apply, and then click Close.

To turn on the Use Low Resource Profile On BatteryPower option

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Performance Monitoring, in the Use LowResource Profile On Battery Power row, move theOn/Off switch to the left to the On position.

4 Click Apply, and then click Close.

Excluding programs from performance alerts

Norton 360 lets you exclude programs fromperformance alerts. You can add the programs thatconsume high CPU, memory, or disk usage to theProgram Exclusions list. When you add a program tothe ProgramExclusions list, Norton 360 does not alertyou when the program exceeds the resourceconsumption threshold limit.

Monitoring your system's performanceAbout System Insight

86

Page 87: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To exclude a program from performance alerts

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Performance Monitoring, in the ProgramExclusions row, click Configure.

4 In the Program Exclusions window, click Add.

5 In the Select a program dialog box, browse to theexecutable file for the program that you want toadd.

6 Click Open.

7 In the Program Exclusions window, click Apply.

8 Click OK.

9 In the Settings window, click Apply.

10 Click Close.

Removing programs from Program Exclusions

The ProgramExclusions window lists all the programsthat are excluded from performance alerts. If you want,you can remove any of the programs that you alreadyadded to the Program Exclusions window. When youremove a program, the program appears in theperformance alert the next time it crosses the definedthreshold limit for resource consumption.

To remove a program from Program Exclusions

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Performance Monitoring, in the ProgramExclusions row, click Configure.

4 In the Program Exclusions window, select theprogram that you want to delete, and then clickRemove.To remove all the programs available in theProgram Exclusions window, click Remove All.

5 In the Program Exclusions window, click Apply

87Monitoring your system's performanceAbout System Insight

Page 88: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

6 Click OK.

7 In the Settings window, click Close.

About CPU graph and memory graphNorton 360 monitors the overall system CPU usageand memory usage and the Norton-specific CPU usageand memory usage. Norton 360 displays the details inthe CPU graph and the memory graph. The CPU graphand memory graph are real-time graphs of CPUutilization and memory utilization.

The graphs display a performance time for the last 90minutes or for the duration since you started yourcomputer. The graphs update the information at aninterval of every 15 seconds. The graphs progress fromright to left, and the most recent data appear on thefar right of the graph. The blue pattern in the graphsdepicts the overall system usage, and the yellow patterndepicts the Norton-specific usage. The gray blocks thatare labeled as Idle indicate the idle period of yourcomputer. The gray blocks include the period whenyour computer is in shutdown, sleep, or log out state.

The graphs show a default performance time of 90minutes. However, you can use the Zoom options todefine a region of the graph that you are interested toview. You can select a Zoom option to obtain magnifiedview or historical data of the graphs. For example, ifyou select the 10min option, Norton 360 displays themagnified view of CPU graph or memory graph for thelast 10 minutes. If you select the 1D option, Norton 360displays a historical data of the last one day.

When you click at any point on the CPU graph ormemory graph, Norton 360 displays a list of theprocesses that consume maximum resources at thatpoint. It also displays the percentage of usage for eachprocess. You can click a process that is available in thelist to get more information in the FileInsight window.

The File Insight window provides information aboutthe process such as:

Monitoring your system's performanceAbout System Insight

88

Page 89: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 The file name, version number, digital signature,the date on which the process was installed.

1 The date on which the process was last used andwhether it is a startup file.

1 The stability details.

1 The confidence level.

1 The resource usage details.

1 The actions that the process performs on yoursystem.

In addition, the File Insight window displays the CPUgraph and the resource usage details for the runningprocesses. The graph shows the breakdown of overallsystem CPU usage and the CPU usage by the process.

Viewing the CPU graph and memory graph

Norton 360 monitors the overall system CPU usageand memory usage and the Norton-specific CPU usageand memory usage. The CPU tab and the Memory tabat the top of the Performance graph display the CPUgraph and the memory graph respectively.

The Zoom options provide you the magnified view ofthe CPU graph and memory graph. For example, if youselect the 10min option, Norton 360 displays themagnified view of CPU graph or memory graph for thelast 10 minutes. If you select the 1W option, Norton360 displays the CPU graph and memory graph for thelast one week.

w By default, the graphs display performance time forthe last 90 minutes.

To view CPU graph and memory graph

1 In the Norton 360 main window, click Performance.

89Monitoring your system's performanceAbout System Insight

Page 90: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

2 In the Performance window, do one of the following:

1 To view the CPU graph, click the CPU tab.

1 To view the memory graph, click the Memorytab.

1 To magnify or shrink the graph, click 10min,30min, 1D, 1W, or 1M next to the Zoom option.

Obtaining historical data of your CPU and memory usage

The Zoom options also provide you the historical dataof the CPU graph and memory graph. For example, ifyou select the 1D option, Norton 360 displays the dataof CPU graph or memory graph for the last one day.

To view historical data of your CPU or memory usage

1 In the Norton 360 main window, click Performance.

2 In the Performance window, do one of the following:

1 To view the CPU graph, click the CPU tab.

1 To view the memory graph, click the Memorytab.

3 Do one of the following:

1 To obtain historical data for the last one day,click 1D.

1 To obtain historical data for the last one week,click 1W.

1 To obtain historical data for the last one month,click 1M.

Identifying resource-consuming processes

You can click at any point on the CPU graph or memorygraph to obtain a list of top three processes thatconsume maximum resources of your computer at thatpoint. You can click a process that is available in thelist to get more information about the process in theFile Insight window.

To identify resource-consuming processes

1 In the Norton 360 main window, click Performance.

Monitoring your system's performanceAbout System Insight

90

Page 91: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

2 In the Performance window, do one of the following:

1 To view the CPU graph, click the CPU tab.

1 To view the memory graph, click the Memorytab.

3 Click at any point on the graph to obtain a list ofresource-consuming processes.

4 Click the name of a process to obtain additionalinformation about the process in the File Insightwindow.

About optimizationThe data storage space on a disk is divided into discreteunits. These units are called clusters. When files arewritten to the disk, they are broken up intocluster-sized pieces. When all of the file pieces arelocated in adjacent or contiguous clusters, the file canbe accessed quickly.

Your computer’s hard disk stores all of your files,applications, and the Windows operating system. Thebits of information that make up your files graduallyspread over the disk. This process is known asfragmentation. The more that you use your computer,the more fragmented the hard disk gets.

When a fragmented file is accessed, the diskperformance is slower. The performance is slowerbecause the drive head locates, loads, saves, and keepstrack of all of the fragments of the file. If free space isalso fragmented, the drive head might have to trackadequate free space to store temporary files or newlyadded files.

Optimization rearranges file fragments into adjacentor contiguous clusters. When the drive head accessesall of the file data in one location, the file is read intothe memory faster. Optimization also maximizes theusable free space on a disk by grouping most frequentlyused files and infrequently used files. Optimizationconsolidates free space to avoid fragmenting newlyadded files. It adds extra space after major data

91Monitoring your system's performanceAbout System Insight

Page 92: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

structures so that they can grow without immediatelybecoming fragmented again.

You can optimize your boot volume manually by usingthe Optimize option in the Performance window.

You can also configure Norton 360 to defragment yourboot volume or the local disk that contains boot volumewhen your computer is idle. Norton 360 automaticallyschedules the optimization when it detects theinstallation of an application on your computer. Theoptimization process starts next time when yourcomputer is idle.

You can use the Idle Time Optimizer option in theAdministrativeSettings window to optimize the bootvolume during idle time.

Optimizing your boot volume

The Optimize option lets you optimize your bootvolume to improve the boot time of your computer.Optimization of your boot volume maximizes the usablefree space by rearranging file fragments into adjacentand contiguous clusters. When the drive head of yourhard disk accesses all of the file data in one location,the file is read into the memory faster.

When you use the Optimize option in Windows XP,Norton 360 optimizes only the boot volume (forexample, C:\Windows). Therefore, it requires less timeto complete optimization. However, when you use theOptimize option in Windows Vista, Windows 7, orWindows 8, Norton 360 optimizes the drive thatcontains the boot volume. Therefore, it requires moretime to complete optimization.

You can access the Optimize option at the top of thesecurity status graph in the Performance window. Youcan also optimize your boot volume using the InsightOptimizer option in the Norton Tasks window. TheInsightOptimizer row in the background jobs list thatis available in the Norton Tasks window displays thedetails of the boot volume optimization process. You

Monitoring your system's performanceAbout System Insight

92

Page 93: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

can view details such as timestamp, duration, andstatus of the background job.

To optimize your boot volume from the Performancewindow

1 In the Norton 360 main window, click Performance.

2 In the Performance window, at the top of thesecurity status graph, click Optimize.

To optimize your boot volume from the Norton Taskswindow

1 In the Norton 360 main window, click Performance.

2 In the Performance window, click Norton Tasks.

3 In the Norton Tasks window, under the NortonTasks column, click the play icon that appearsbefore Insight Optimizer.

About the Idle Time Optimizer

Idle Time Optimizer lets you configure Norton 360 todefragment your boot volume or the local disk thatcontains boot volume when your computer is idle.Norton 360 automatically schedules the optimizationwhen it detects the installation of an application onyour computer and your computer is idle. If you startusing your computer again, Norton 360 stops theoptimization task, and starts optimizing the next timethat your computer is idle. This way, the backgroundjob of optimization does not affect the performance ofyour computer.

Optimization rearranges file fragments into adjacentor contiguous clusters in the hard disk. It improves thecomputer performance by reading the files into thememory faster. Optimization also maximizes the usablefree space on a disk by grouping most frequently usedfiles and infrequently used files. In addition, itconsolidates free space to avoid fragmenting newlyadded files.

You must turn on the Idle Time Optimizer optionunder AdministrativeSettings in the Settings window

93Monitoring your system's performanceAbout System Insight

Page 94: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

to optimize the boot volume during idle time. Bydefault, this option is turned on.

Turning off or turning on Idle Time Optimizer

Norton 360 automatically schedules the optimizationwhen it detects the installation of a new applicationon your computer. Norton 360 runs this optimizationonly when your computer is idle.

You can use the IdleTimeOptimizer option to optimizethe boot volume during idle time. By default, this optionis turned on.

To turn off Idle Time Optimizer

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Idle Time Optimizer row, move the On/Offswitch to the right to the Off position.

4 Click Apply, and then click Close.

To turn on Idle Time Optimizer

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Idle Time Optimizer row, move the On/Offswitch to the left to the On position.

4 Click Apply, and then click Close.

About the Norton TasksThe NortonTasks window provides an interface whereyou can view and monitor all Norton-specificbackground tasks. Norton 360 runs most of thebackground tasks when your computer is idle. TheNorton Tasks window provides the details of thebackground tasks that Norton 360 performs.

The details include:

1 The name of the Norton task

Monitoring your system's performanceAbout System Insight

94

Page 95: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can use the icon that appears before the nameof a background job to start or stop a backgroundtask. You can start or stop a background task at anytime.

1 The timestamp of the Norton task

You can view details such as the date on which thebackground job last ran and the time. These detailshelp you decide whether to start a background taskor wait for Norton 360 to run the job during idletime.

1 The duration of the Norton task

You can view the length of time that a Norton taskran the last time. The details also help youdetermine the length of time a background tasktakes to complete if you start it.

1 The background task has run during idle time ornot

This detail helps you determine if a task has alreadyrun during idle time or you should run it.

1 The status of the Norton task

You can view details about the completion of thetask.

1 The power source that the Norton Task uses.

You can specify the type of power source that eachof the Norton Tasks uses. Use the Configure linkthat is available next to the power source icon toconfigure the power source for the Norton Tasks.

95Monitoring your system's performanceAbout System Insight

Page 96: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The Norton Tasks window lets you monitor thefollowing Norton-specific tasks:

Automatic LiveUpdateautomatically checks fordefinition updates andprogram updates when yourcomputer is connected to theInternet.

By default, AutomaticLiveUpdate checks forupdates every hour.

Automatic LiveUpdate

Performs a backup of the filesand data that are included inyour backup set.

If you created multiplebackup sets, all of the backupsets appear on the NortonTasks list. You can run aspecific backup from theNorton Tasks window.

Backing up DefaultSet

Eliminates the file clutter andrearrange the placement offiles on your computer disksto improve performance.

Disk Optimizer

Scans your entire computerfor viruses, spyware, anddifferent securityvulnerabilities.

It also runs other activitiessuch as LiveUpdate, Cleanup,Disk Optimization, andBackup.

Full System Scan

Optimizes the boot volume ofyour computer.

Insight Optimizer

Monitoring your system's performanceAbout System Insight

96

Page 97: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Deletes the unnecessary Webpage history that is leftbehind in your Internetbrowser's history folder.

Removes the traces of anyInternet searches that areperformed on your PC.

Internet Explorer HistoryCleaner

Deletes the temporary filesthat are left behind on thehard disk after Internetbrowsing.

Internet Explorer TemporaryFiles

Norton Community Watchprotects your computeragainst potential risks. Itcollects the informationabout new security threatsfrom your computer andsubmits the information toSymantec for analysis.Symantec assesses the datato identify the new threatsand resolves it.

Norton Community Watch

97Monitoring your system's performanceAbout System Insight

Page 98: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Allows the smart scanning offiles on your computer. Itimproves the performance ofNorton 360 scans by lettingyou scan fewer files withoutcompromising the security ofyour computer.

Norton Insight lets you checkthe details of the Files ofInterest that are available onyour computer. You can viewdetails such as signature ofthe file and the date on whichthe file was installed. You canalso view details such as thetrust level, community usage,resource usage, and thesource of the file.

Norton Insight

Pulse Updates check fordefinition updates every fiveminutes and downloads thestreamed virus definitions.Pulse Updates provide theupdates during the fullupdates, which LiveUpdatedownloads automaticallyevery few hours. Alwaysensure that the PulseUpdates option is turned on.It protects you from the latestthreats withoutcompromising your systemperformance or disruptingyour online experience.

Pulse Updates

Monitoring your system's performanceAbout System Insight

98

Page 99: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Scans the important locationsof your computer that theviruses and other securitythreats often target.

Quick Scan takes less time toscan than a Full System Scanbecause this scan does notscan your entire computer.

Quick Scan

Deletes the inaccurate entriesand obsolete entries in theWindows registry that cancause errors.

Windows Registry Cleaner

Deletes the unnecessary filesthat are left in WindowsTemporary folders after aprogram is installed orupdated.

Windows Temporary FileCleaner

The following grayed out categories of jobs run in thebackground to improve your system performance andprotection. You can only view the last run details forthe following activities.

Performs backgroundmaintenance tasks related toIdentity Safe. Tasks includesending Identity Safe profilestatistics and downloadingthe favorite icons.

Identity Safe Maintenance

Performs backgroundmaintenance tasks related toAntiSpam. Tasks includeupdating contacts andAntiSpam filters.

AntiSpam Maintenance

99Monitoring your system's performanceAbout System Insight

Page 100: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Performs backgroundmaintenance tasks related tolicensing.

Licensing Maintenance

Performs backgroundmaintenance tasks related toNorton Insight. Tasks includemaintaining details about thestability and trust level offiles in your computer.

Insight Maintenance

Performs backgroundmaintenance tasks related toNorton 360. Tasks includeclearing install logs andrescanning consolidatedfirewall rule.

Product Maintenance

You can also manually turn on Silent Mode for aspecified duration.

Monitoring background jobs of Norton 360

The Norton Tasks window provides the details of thebackground tasks that Norton 360 performs and letsyou view and monitor the background tasks. Norton360 runs most of the background tasks when yourcomputer is idle. Performing all background tasks whenyour computer is idle helps your computer to run atpeak efficiency when you use your computer. However,you can manually start or stop a task at any time. Youcan also specify the Idle Time Out duration. After theIdle Time Out duration is reached, Norton 360identifies the computer as idle and run the backgroundtasks. You can use the IdleCountdown bar to confirmthe idle state of your computer. You can also view theCPU graph and memory graph to obtain theperformance data of your computer.

Monitoring your system's performanceAbout System Insight

100

Page 101: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To monitor background jobs

1 In the Norton 360 main window, click Performance.

2 In the Performance window, click Norton Tasks.

3 In the Norton Tasks window, view the details ofbackground jobs.

4 Do one of the following:

1 To run a background job, click the play icon thatappears before the name of the background job.

1 To stop a running background job, click the stopicon that appears before the name of thebackground job.

5 Click Close.

About Power Source

You can choose the power source for Norton 360 toperform the Norton Tasks when the computer is idle.Norton Tasks are background tasks that Norton 360performs when your computer is idle. Norton Tasksinclude Quick Scan, Automatic LiveUpdate, NortonCommunity Watch, Norton Insight, Full System Scan,Insight Optimizer, and Pulse Updates. Norton 360consumes more power when it runs Norton Tasks.

By default, Norton 360 performs these tasks only whenyour computer is connected to the external power. Forexample, if you are in an airport, and your computeris running on battery power, Norton 360 does notperform the Norton Tasks. In this way, you can extendthe battery power of your computer. However, you canchoose the power source for Norton 360 to perform theNorton Tasks.

101Monitoring your system's performanceAbout System Insight

Page 102: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can select one of the following options:

Allows the Norton Tasks torun only when your computeruses external power.

If you choose this option,Norton 360 performs theNorton Tasks when thecomputer is idle andconnected to external power.

External

Allows the Norton Tasks torun irrespective if thecomputer uses externalpower or battery power.

If you choose this option,Norton 360 performs theNorton Tasks when thecomputer is idle. It does notconsider the type of powersource the computer uses.

External and Battery

You can configure the power source for each of theNorton Tasks.

Configuring the Power Source

You can choose the power source for Norton 360 toperform the Norton Tasks when the computer is idle.Norton Tasks are background tasks that Norton 360performs when your computer is idle.

By default, Norton 360 performs these tasks only whenyour computer is connected to the external power. Youcan configure the power source for each of the NortonTasks.

To configure the power source

1 In the Norton 360 main window, click Performance.

2 In the Performance window, in the left pane, clickNorton Tasks.

Monitoring your system's performanceAbout System Insight

102

Page 103: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 In the Norton Tasks window, under the PowerSource column, click the Configure link for theNorton Task that you want to configure the powersource.

4 In the Power Source window, select one of thefollowing:

1 ExternalAllows the Norton Task to run only when yourcomputer uses external power.

1 External and BatteryAllows the Norton Task to run irrespective if thecomputer uses external power or battery power.

If you choose this option, Norton 360 performsthe Norton Task when the computer is idle. Itdoes not consider the type of power source thecomputer uses.

5 Click OK.

6 In the Norton Tasks window, click Close.

About Norton InsightNorton Insight allows the smart scanning of files onyour computer. It improves the performance of Norton360 scans by letting you scan fewer files withoutcompromising the security of your computer.

103Monitoring your system's performanceAbout System Insight

Page 104: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

A Norton 360 scan can identify threats on yourcomputer in the following ways:

At regular intervals, Norton 360obtains definition updates fromSymantec. These updatescontain signatures of knownthreats. Each time when Norton360 obtains the definitionupdates, it performs a scan of allof the files that are available onyour computer. It compares thesignature of the files against theknown threat signatures toidentify threats on yourcomputer.

The Blacklist technique

Monitoring your system's performanceAbout System Insight

104

Page 105: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton 360 obtains specificinformation about the Files ofInterest and submits theinformation to Symantec duringidle time. The informationincludes things such as filename, file size, and hash key.Symantec analyzes theinformation of each File ofInterest and its unique hashvalue and provides a confidencelevel to the file. The Symantecserver stores the hash value andconfidence level details of theFiles of Interest. The serverprovides the details immediatelyafter you open the NortonInsight - Application Ratingswindow. Even the slightestmodification of the file causes achange in the hash value and theconfidence level of the file.Typically, most Files of Interestbelong to the operating systemor known applications, and theynever change. These files do notrequire repeated scanning ormonitoring. For example,Excel.exe is a file that neverchanges but you always scan itduring a normal security scan.

The Whitelist technique

105Monitoring your system's performanceAbout System Insight

Page 106: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Symantec assigns the following confidence levels toFiles of Interest:

Symantec analyzes the file astrusted based on the statisticalevaluation that is done on thefiles that are available within theNorton Community.

If the file has three green bars,Symantec rates the file asNorton Trusted.

The files that have three greenbars display a Norton Trustedpop-up text when you move themouse pointer over the greenbars.

Trusted

Symantec analyzes the file asgood based on the statisticalevaluation that is done on thefiles that are available within theNorton Community.

Symantec rates the trusted filesas follows:

1 If the file has two green bars,Symantec rates the file asGood.

1 If the file has one green bar,Symantec rates the file asFavorable.

Good

Symantec does not have enoughinformation about the file toassign a trust level to the file.

Unproven

Symantec has only a fewindications that the file is nottrusted.

Poor

Monitoring your system's performanceAbout System Insight

106

Page 107: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton 360 also provides different profiles to configureyour scan performance. When you use the Full Scanprofile, Norton 360 follows the Blacklist technique toscan your computer. It scans all of the files on yourcomputer against the signatures that it obtained duringdefinition updates. When you use the Standard Trustor HighTrust profile, Norton 360 follows the Whitelisttechnique to scan the files based on their confidencelevel. This way, Norton 360 significantly reduces thetime that is required to scan your computer completelyfor security threats.

The Whitelist technique that Norton Insight uses alsohelps in heuristic detection of suspicious applications.Normally, the execution behavior of well-knownapplications appears identical to the execution behaviorof unknown applications. Such behavior results in falseidentification of good applications as suspicious, andtherefore, necessitates security applications tomaintain a low heuristic detection threshold. However,keeping a low detection threshold does not provide acomplete heuristic protection against maliciousapplications. Norton 360 uses the Whitelist techniquethat helps maintain a high heuristic detectionthreshold. It excludes well-known applications fromheuristic detection to prevent false detection ofwell-known applications and to ensure a high detectionrate of malicious applications.

Viewing the files using Norton Insight

Norton Insight provides information about the Files ofInterest that are available on your computer. Norton360 lets you view specific categories of files based onthe option that you select in the Norton Insight -Application Ratings window.

107Monitoring your system's performanceAbout System Insight

Page 108: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The drop-down list that is available in the NortonInsight - Application Ratings window provides youthe following options:

Lists the processes that runon your computer at thatpoint in time when youselected this option.

All Running Processes

Lists the Files of Interest.All Files

Lists the programs that startwhen you start yourcomputer.

Startup Items

Lists all the files andprograms that are currentlyloaded on to the programmemory space.

All Loaded Modules

Lists the programs thatconsumemaximumresourcesof your computer.

Norton 360 displays a list oftop 10 resources that highlyaffect the performance ofyour computer.

Highest Performance Impact

Lists the files that have themaximum community usage.

Highest Community Usage

Monitoring your system's performanceAbout System Insight

108

Page 109: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lists the Files of Interest thatyou manually trusted in theFile Insight window.

This category does not listthe files that do not belongto the File of Interest even ifyou manually trust the files.However, Norton 360excludes all of the manuallytrusted files from Norton 360scan when you configureScan Performance Profilesto High Trust.

You can also remove the usertrust from all of the Files ofInterest that you manuallytrusted. You can use theClear All User Trust optionnext to the drop-down list toremove the user trust.

User Trusted Files

Lists the files that are notNorton Trusted.

You can manually trust all thefiles that are not trusted byclicking the Trust All Filesoption next to the drop-downlist.

Untrusted Files

You can view file details such as file name, trust level,community usage, resource usage, and the stabilityrating. There may be instances when the trust level ofa file has changed or a process running might havestopped running. You can refresh the Norton Insight- Application Ratings window to update the file listand file details. The coverage meter provides agraphical representation of the percentage of theNorton Trusted Files and the total Files of Interest. Thehigher the percentage, the lesser time the scan takes.

109Monitoring your system's performanceAbout System Insight

Page 110: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To view the files using Norton Insight

1 In the Norton 360 main window, click Security, andthen click Run Norton Insight.

2 In the Norton Insight - Application Ratingswindow, select an option from the Show drop-downlist to view a category of files.You may need to scroll the window to view all thefiles that are listed in the details area.

3 Click Close.

To refresh the list of files

4 In the Norton Insight - Application Ratingswindow, at the top of the file icon, click the refreshicon.

Checking the trust level of a file

Norton Insight lets you check the details of the Filesof Interest that are available on your computer. Youcan view details such as signature of the file and thedate on which the file was installed. You can also viewdetails such as the trust level, stability details,community usage, resource usage, and the source ofthe file. You can use the Locate option to find thelocation of the file on your computer. When youright-click a file that is available on your computer, theshortcut menu displays Norton 360 option and thenNortonFile Insight option. You can use the options tocheck the details of a File of Interest.

w Norton 360 displays the Norton File Insight optiononly when you right-click a File of Interest. In WindowsSafe mode, you cannot access this option for any file.Norton 360 also categorizes any file for which you openthe File Insight window to view details as a File ofInterest.

The Symantec server stores the hash value and trustlevel details of the File of Interest. The server providesthe file details immediately after you open the NortonInsight - Application Ratings window. However, youcan use theCheckTrustNow option in the FileInsight

Monitoring your system's performanceAbout System Insight

110

Page 111: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

window to update the trust value of a file. You can alsomanually trust any well-known files. You can changethe trust level of any file to User Trusted other thanthe files that are Norton Trusted.

You can determine the resource usage of a file that isavailable on your computer. The File Insight windowdisplays the CPU graph and the system resource usagedetails for the running processes. The graph shows thebreakdown of overall system CPU usage and the CPUusage or memory usage by the process.

To check the trust level of a file

1 In the Norton 360 main window, click Security, andthen click Run Norton Insight.

2 In the Norton Insight - Application Ratingswindow, click a file for which you want to check thedetails.

3 In the File Insight window, view the details of thefile.

4 In the File Insight window, click Close.

To check the trust level of a specific file

1 In the Norton 360 main window, click Security, andthen click Run Norton Insight.

2 In the Norton Insight - Application Ratingswindow, click Check a Specific File.

3 Browse to the location of the file for which you wantto check the details.

4 Select the file, and then click Open.

5 In the File Insight window, view the details of thefile.

6 In the File Insight window, click Close.

To find the location of the file

4 In the File Insight window, click Locate.

To refresh the trust level of the file

4 In the File Insight window, click CheckTrustNow.

111Monitoring your system's performanceAbout System Insight

Page 112: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To manually trust the file

4 In the File Insight window, in the Details tab, clickTrust Now.You can manually trust the files that are poor,unproven, or not Norton trusted.

To determine the resource usage of a running process

1 In the File Insight window, in the left pane, clickActivity.

2 In the Show drop-down list, do one of the following:

1 Select Performance to view the performancegraph of the process.

1 Select Performance Alert to view theperformance alert-related details of the process.

1 Select Network to view the network activitiesof the process.

1 Select Run Key change to include registrychanges.

Configuring the Scan Performance Profiles

The Scan Performance Profiles settings let youconfigure how Norton 360 should scan your computerbased on the digital signature and confidence level ofthe files. To make Norton 360 scans lighter, faster, andmore effective, you can exclude from scans the filesthat have known digital signatures or high confidencelevels.

You can configure the Scan Performance Profilessettings to do the following:

1 Configure to Full Scan to perform a complete scanof your computer.

The complete scan includes a scan of all files onyour computer irrespective of the confidence levelor digital signature of the files.

1 Configure to StandardTrust to perform a scan thatexcludes the files that are Norton Trusted.

Monitoring your system's performanceAbout System Insight

112

Page 113: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton 360 scans the files that have a confidencelevel other than Norton Trusted.

1 Configure to High Trust to perform a scan thatexcludes the files that have known digital signaturesor high confidence levels.

Norton 360 does not scan the files that haveconfidence level as Norton Trusted or User Trusted.It also excludes the Good files with high confidencelevel from the scan. It scans the files withconfidence levels as Poor Trust, Unproven Trust,Bad Trust, and the files without a class 3 digitalsignature.

You must configure the Scan Performance Profilessettings before you run a scan or before a scan isscheduled to run. Norton 360 scans your computeraccording to the configuration you specified in theScan Performance Profiles settings.

To configure Scan Performance Profiles from theSettings window

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.On the ScansandRisk tab, in the ScanPerformanceProfiles row, click on one of the settings. Youroptions are:

1 Full Scan

1 Standard Trust

1 High Trust

3 Click Apply, and then click Close.

To configure ScanPerformanceProfiles from theNortonInsight - Application Ratings window

1 In the Norton 360 main window, click Security, andthen click Run Norton Insight.

113Monitoring your system's performanceAbout System Insight

Page 114: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

2 In the Norton Insight - Application Ratingswindow, move the ScanPerformanceProfiles sliderto one of the settings. Your options are:

1 Full Scan

1 Standard Trust

1 High Trust

3 Click Close.

About Monthly ReportMonthly Report lets you view a summary of whatNorton 360 has done for you. Norton 360 displays themonthly report every 30 days after you install yourproduct. After 30 days of installation, Norton 360displays the Monthly Report automatically. If you donot want Norton 360 to display the Monthly Reportautomatically, you can select the Do not displaymonthly reports automatically option in the NortonMonthly Report window.

You can view the Monthly Report using the CheckMonthly Report option that is present in the MyAccount window.

Norton 360 lets you turn off or turn on Monthly Reportfrom the AdministrativeSettings window. The NortonMonthlyReport window displays the Tipofthemonthto recommend some of the product’s features andservices.

When your product expires after the trial period,Monthly Report displays the activation status of yourproduct. However, when your product expires after thesubscription period, Monthly Report displays thesubscription status of your product.

Monitoring your system's performanceAbout System Insight

114

Page 115: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton 360 provides reports based on the followingcategories:

Lets you view the details ofthe various attacks your PCis protected from.

For example, you can viewthe total number of virusesand spyware from whichyou are protected.

PC Security

Lets you view the details ofAntiphishing activities.

For example, you can viewthe total number of knownauthenticated sites that youvisited.

Web

Lets you view the details ofBackup and PC Tuneupactivities. For example, youcan view the total numberof files that you backed upon drive C of yourcomputer.

For example, you can viewthe total number of filesthat you backed up on driveC of your computer.

Backup & Tuneup

Monthly Report lets you view the latest news onInternet security and also provides information on howto stay safe while you are online. You can click the ReadMore option in the Norton Monthly Report windowto view more information on how to stay safe online.

115Monitoring your system's performanceAbout System Insight

Page 116: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Viewing the Monthly Report

The Monthly Report lets you view how Norton 360protected you for the past 30 days. This report includesdifferent activities that Norton 360 performed toprotect your computer.

The Monthly Report provides information about thefollowing activities:

1 The total number of threats that Norton 360detected on your computer.

1 The total number of phishing and authenticatedWeb sites that you visited.

1 The total number of files that you backed up.

1 The total number of unwanted files and the obsoleteWindows registry entries that are removed.

If you do not want Norton 360 to display the MonthlyReport automatically, you can do one of the following:

1 Select the Do not display monthly reportsautomatically option in the Norton MonthlyReport window.

1 Turn off the Monthly Report option in theAdministrative Settings window.

To view the Monthly Report

1 In the Norton 360 main window, click Account.

2 In the My Account window, click Check MonthlyReport.

3 Click Close.

Monitoring your system's performanceAbout System Insight

116

Page 117: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This chapter includes the following topics:

1 About total protection

1 About keeping your computer secure

1 About solving connection problems

1 About responding to emergencies

1 About monitoring protection features

1 About viewing details of system vulnerabilities

About total protectionNorton 360 offers total protection of your PC thatincludes Antivirus and Spyware Protection, onlineidentity theft protection, backup, and PC tuneupcapabilities. It provides a complete protection againsta wide range of threats, leaving you free to work andplay confidently on your PC.

After you install Norton 360 and set up a backupstorage destination, it then does all the rest. You donot have to do anything else to be protected. However,Norton 360 also lets you customize your firewallsettings or adware protection, or set your own schedulefor automatic activities.

3Maintaining totalprotection

Page 118: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton 360 is grouped into the following fourcategories of protection:

Blocks and removes virusesand spyware from email anddownloaded sites, protectsagainst emerging threats,scans, cleans emailattachments, and securesconnections and datatransmission between yourcomputer and the Internet.

Security

Helps to guard againstidentity theft, verifiesauthenticity of Web sites.

Identity

Backs up all your importantfiles and data to a variety ofstorage locations.

Backup

Finds and fixes commoncomputer problems, cleansup unwanted cookies andfiles, and defragments thehard disk to optimize PCperformance.

Tuneup

About keeping your computer secureNorton 360 automatically protects your PC when youinstall it and updates itself regularly to maintainprotection. However, you can increase the security ofyour PC further by learning how to avoid threatsagainst your PC and your data.

To avoid email threats, do the following:

1 Open only those email attachments that come froma trusted source and that you expect to receive.

Maintaining total protectionAbout keeping your computer secure

118

Page 119: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 Delete all unwanted messages without openingthem.

1 Do not respond to email that you suspect is spam.Delete it.

1 Be wary of any email that requests confidentialinformation, and confirm the authenticity of therequest before you reply.

To protect yourself from phishing attempts, do thefollowing:

1 When you visit a Web site, type the address directlyinto your browser rather than clicking a link.

1 Provide personal information only on trusted sites.Examples include the sites that have "https" in theWeb address or that have a lock icon at the bottomof the browser window.

1 Do not provide personal information to anyunsolicited requests for information.

To avoid viruses, worms, and Trojan horses, do thefollowing:

1 Transfer files to your PC only from a well-knownsource or a trusted source.

1 Do not send or receive files over instant messagingconnections.

1 Terminate an instant messaging connection if aperson on your buddy list sends strange messages,files, or Web links.

To avoid spyware, do the following:

1 Do not approve suspicious error messages fromwithin your Web browser.

1 Be suspicious of "free deal" offers because spywaremay come as part of such a deal.

1 Carefully read the End User License Agreement forthe programs that you install. Also, do not installa program if other programs are installed as partof the required program.

119Maintaining total protectionAbout keeping your computer secure

Page 120: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

About solving connection problemsNorton 360 uses an Internet connection to supportseveral of its protection features. If you use a proxyserver to connect to the Internet, you must configurethe proxy settings of Norton 360. You can configureNetwork Proxy Settings in the AdministrativeSettingswindow.

If you cannot connect to the Internet after you installNorton 360, you can use the Support features to helpyou troubleshoot your connection problem.

About responding to emergenciesNorton 360 automatically downloads definition updatesregularly and secures your computer from latestviruses and unknown threats. In addition, Norton 360monitors your Internet activities to protect yourcomputer from the Internet-based threats that exploitsoftware vulnerabilities.

However, security issues can arise, and you need todecide which action to take.

If you think that your computer is infected with a virusor with destructive software, you can take the followingactions:

Helps you to scan the possiblevirus-infected areas of acomputer that the viruses andother security risks often target

Because this scan does not scanyour entire computer, it takeslesser time to run than a FullSystem Scan.

Quick Scan

Maintaining total protectionAbout solving connection problems

120

Page 121: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Checks all boot records, files,and running programs to protectyour computer from viruses andspyware

It also runs other tasks (such asLiveUpdate, Registry Cleanup,Disk Optimization, and Backup)to provide a high level ofprotection and improve theperformance of your computer.Consequently, when you run aFull System Scan withadministrator privileges, it scansmore files than when you run itwithout administrator privileges.This scan might take more timethan the other scans.

Full System Scan

Scans a specific file, folder,drive, or removable drive thatyou choose. You can also createyour own scan and schedule itto run at a specific time.

Custom Scan

Checks for vulnerabilities andrisks, and protects yourcomputer by running thefollowing checks:1 LiveUpdate

1 InternetExplorer TemporaryFiles

1 Windows Temporary Files

1 Internet Explorer History

1 Disk Optimization

1 Registry Cleanup

1 Backup

Custom Task

121Maintaining total protectionAbout responding to emergencies

Page 122: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

When you right-click a folder, the shortcut menudisplays Norton 360 and then Scan Now option. Youcan use this command to scan any particular folder.

When you right-click a file, the shortcut menu displaysNorton 360 and then Insight Network Scan option.You can use this command to scan a file using bothlocal definitions and definitions that are hosted in theCloud.

About monitoring protection featuresYour Symantec product maintains records of allprotection-related actions that it takes and theactivities that it monitors. You can review the historyand the logs through Security History. You can viewsummary and results of activities and scans. You canalso monitor other security tasks.

About Security HistorySecurity History window lets you do the following:

1 View the summary of alerts and event messages.

1 View the results of scans that are run on yourcomputer.

1 View the items that you submitted to SymantecSecurity Response Web site.

1 Manage Quarantine items.

1 Monitor the security tasks that your productsperform in the background.

Security History lets you monitor the security tasksthat your product performs in the background. Inaddition, the alerts that you receive can be reviewedat any time in Security History. If you cannot reviewan alert when you receive it, you can review it later inSecurity History.

The alerts, scan results, and other security items thatare related to various product features appear undertheir respective categories in the Security History

Maintaining total protectionAbout monitoring protection features

122

Page 123: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

window. For example, the security items that arerelated to the Quarantine feature appear under theQuarantine category. In addition, the SecurityHistorywindow displays details of each item in the Detailspane.

Based on their functionalities, Security History broadlyorganizes all categories into the following groups:

1 All Activity

1 Protection and Performance

1 Submissions and Errors

1 PC Tuneup

1 Informational

By default, the following information categories areavailable in the Security History window:

1 Recent History

1 Full History

1 Scan Results

1 Resolved Security Risks

1 Unresolved Security Risks

1 Quarantine

1 SONAR Activity

1 Firewall – Network and Connections

1 Firewall – Activities

1 Intrusion Prevention

1 Download Insight

1 AntiSpam

1 Identity

1 Norton Product Tamper Protection

1 Performance Alert

1 Network Cost Awareness

1 Backup

1 Sites reported to Symantec

1 Norton Error Reporting

123Maintaining total protectionAbout monitoring protection features

Page 124: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 Email Errors

1 Norton Community Watch

1 Registry Cleanup

1 File Cleanup

1 Disk Optimization

1 Silent Mode

1 LiveUpdate

You can view the security items based on the categoryof events that you select and the search string that youprovide. Norton 360 restricts the number of searchresults that appear on each page in the SecurityHistory window. Therefore, Security History dividesthe items that are returned for any search criteria anddisplays them on separate pages. You can use thepagination scroll at the bottom of the window tonavigate to different pages sequentially. In case youwant to view a specific page, you can use the Gotopageoption to open the page. The maximum number ofitems that appear per page is 100.

Based on the security status of an item in aninformation category, you can take an appropriateaction to resolve a risk or a threat. The actions thatyou can perform include the following:

1 Restore and exclude a quarantined item.

1 Remove an item from Security History.

1 Submit an item to Symantec for further analysis.

1 Trust or restrict devices on a selected network.

1 Remove the trusted or restricted status of deviceson the selected network.

1 Allow a selected program to access the Internet.

1 Configure Norton 360 to notify you when it blocksa selected attack signature.

Norton 360 also lets you save the security eventshistory. You can view the security event informationwhenever you want. If you want to analyze the securityevents for a particular day, you can save the Security

Maintaining total protectionAbout monitoring protection features

124

Page 125: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

History logs for that day. You can later import the fileinto Security History and analyze the data.

Viewing items in Security History

Security History provides a record of all the activitiesthat Norton 360 performed on your computer.

You can view details about all the activities including:

1 Security History alerts and event messages

1 Results of different scans

1 Information that you submitted to SymantecSecurity Response Web site

1 Quarantined items

1 Norton 360 firewall activities

1 Norton 360 PC Tuneup activities

1 Norton 360 backup and restore activities

1 Security tasks that Norton 360 performed in thebackground

Based on their functionalities, all Security Historycategories appear under the following groups in theShow drop-down list:

1 All Activity

1 Protection and Performance

1 Submissions and Errors

1 PC Tuneup

1 Informational

The items that are related to the various productfeatures appear under their respective categories inthe SecurityHistory window. For example, the securityitems that are related to the Quarantine feature appearunder Quarantine category in the Security Historywindow. In addition, the Security History windowdisplays details of each item in the Details pane.

To view items in Security History

1 In the Norton 360 main window, click Tasks.

125Maintaining total protectionAbout monitoring protection features

Page 126: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

2 In the Tasks window, under General Tasks, clickCheck Security History.

Maintaining total protectionAbout monitoring protection features

126

Page 127: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 In SecurityHistory window, in the Show drop-downlist, select the category of items that you want toview. Your options are:

The Recent History view inthe Security History window

Recent History

displays the alerts that youreceived during the last sevendays. It lists the history ofcertain recent securityevents.

The Full History view in theSecurity History window

Full History

displays the completeSecurity History.

You can scan your computerto check if any virus, spyware,

Scan Results

malware, or security risk hasinfected your computer.

The Scan Results view in theSecurity History windowdisplays the details about thescans that are run on yourcomputer.

127Maintaining total protectionAbout monitoring protection features

Page 128: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The security risks include thesuspicious programs that cancompromise the security ofyour computer.

The Resolved Security Risksview in the Security Historywindow displays a list ofsecurity risks that Norton 360has detected and thenrepaired, quarantined, orremoved. The quarantineditems are listed in theQuarantine view. You canalso view the quarantineditems in theQuarantine view.

Resolved Security Risks

The security risks include thesuspicious programs that cancompromise the security ofyour computer.

The Unresolved SecurityRisks view in the SecurityHistorywindow displays a listof security risks that Norton360 was not able to repair,remove, or quarantine.

Certain threats requiresystem restart. Logs for suchthreats can be cleared onlyafter you restart your system.

Unresolved Security Risks

Maintaining total protectionAbout monitoring protection features

128

Page 129: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The Security HistoryQuarantine provides a safelocation on your computerwhere you can isolate itemswhile you decide an action totake on them.

The Quarantine view in theSecurity History windowdisplays all of the securityrisks that are isolated in theSecurity History Quarantine.

Quarantine

Symantec Online Network forAdvanced Response (SONAR)identifies new threats basedon the suspicious behavior ofapplications. SONAR detectsand protects your computeragainst malicious code evenbefore virus definitions areavailable throughLiveUpdate.

The SONAR Activity view inthe Security History windowdisplays details about thesecurity risks that SONARdetects. This category alsolists any activity thatmodifies the configuration orthe settings of yourcomputer.

The More Details option forthis category provides detailsabout the resources that thisactivity affects.

SONAR Activity

129Maintaining total protectionAbout monitoring protection features

Page 130: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.

The Firewall - Network andConnections category in theSecurity History windowdisplays information aboutthe networks that yourcomputer connects to. It alsodisplays the actions that youhave taken to trust or torestrict networks andcomputers.

This category also displays ahistory of all of the TCP/IPnetwork connections thatwere made with yourcomputer. Networkconnections are logged whenthe connection is closed.

The Security History -AdvancedDetailswindow forthis category lets you modifytrust or restrict settings forcomputers and networks.

Firewall - Network andConnections

Maintaining total protectionAbout monitoring protection features

130

Page 131: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.The firewall maintains rulesto control Internet access toand from your computer.

The Firewall - Activities viewin the Security Historywindow displays the rulesthat firewall creates. Therules that you create alsoappear in this view.

The Security History -AdvancedDetailswindow forthis category shows thecreated Program rules. It alsolets you allow a blockedprogram rule.

Firewall - Activities

Intrusion Prevention scans allthe network traffic thatenters and exits yourcomputer for known threats.

The Intrusion Preventionview in the Security Historywindow displays detailsabout recent IntrusionPrevention activities.

The Security History -AdvancedDetailswindow forthis category lets you controlwhether or not to be notifiedwhen Intrusion Preventiondetects an IntrusionPrevention signature.

Intrusion Prevention

131Maintaining total protectionAbout monitoring protection features

Page 132: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Download Insight processesany executable file that youdownload for analysis of itsreputation level. It theninforms you about theprocessing results based onthe Download Insightsettings.

The Download Insight viewin the Security Historywindow displays details of allevents that Download Insightprocesses and notifies. Thisview also containsinformation about the actionsthat you take based on thereputation data of the events.

Download Insight

Norton AntiSpam protectsyour computer from exposureto unsolicited email.

The AntiSpam view in theSecurity History windowdisplays details about theemail messages thatAntiSpam has processed.

AntiSpam

The various features ofIdentity Safe help youmanage your identities andprovide additional securitywhile you perform onlinetransactions.

The Identity view in theSecurity History windowdisplays the Antiphishingdefinitions that Norton 360downloads when you runLiveUpdate to obtain thelatest virus definitions.

Identity

Maintaining total protectionAbout monitoring protection features

132

Page 133: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton Product TamperProtection lets you protectyour Norton product from anyattack or modification byunknown, suspicious, ormalicious applications.

The Norton Product TamperProtection view in theSecurity History windowdisplays details aboutunauthorized attempts tomodify Symantec processes.The tasks that your Symantecproduct blocks also appear inthe list.

Norton Product TamperProtection

The performance alertfeature lets you view,monitor, and analyze theimpact of the systemactivities on your computer.

The Performance Alert viewin the Security Historywindow provides detailsabout the impact of theprocesses that run on yourcomputer. The details includethe process name, theresources used, the extent ofresource utilization, and theoverall impact of the processon your computer. Inaddition, logs related toperformance alerts and theprograms that you haveexcluded from performancealerts also appear in the list.

Performance Alert

133Maintaining total protectionAbout monitoring protection features

Page 134: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Network Cost Awareness letsyou set up policies andrestrict the Internet usage ofNorton 360. You can definethe amount of networkbandwidth that Norton 360can use.

The Network Cost Awarenessview in the Security Historywindow provides detailsabout the actions that youperformed to restrict theInternet usage of Norton 360.

Network Cost Awareness

TheBackup view displays thelist of the backup and restoreactivities that you performed.

Backup

In some cases, you mighthave submitted evaluation ofcertain Web pages toSymantec.

The Sites Reported toSymantec view in theSecurity History windowdisplays all the Web sites thatyou reported to Symantec toverify authenticity.

Sites reported to Symantec

Maintaining total protectionAbout monitoring protection features

134

Page 135: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton 360 may generateerrors in some cases. Forexample, an error can occurwhen you run LiveUpdate orscan a folder. Engine errors,timeout errors, and programerrors are some of the typesof errors.

The Norton Error Reportingview in the Security Historywindow displays any errorthat Norton 360 hasgenerated.

Norton Error Reporting

Email errors include anyfailure that occurs whenNorton 360 tries to send,download, or scan an emailmessage that you send orreceive.

The Email Errors view in theSecurity History displaysdetails about any Email Erroralerts that you receive whenan Email error occurs. Detailsinclude the Error ID and theErrormessage. This view alsodisplays information aboutsubject, sender address, andthe recipient address that arerelated to the email messagein the alert.

Email Errors

135Maintaining total protectionAbout monitoring protection features

Page 136: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The Norton CommunityWatch feature lets yousubmit any suspicioussecurity or suspiciousapplication data to Symantecfor analysis. Symantecassesses the data todetermine the new threats.

The Norton CommunityWatch view in the SecurityHistorywindow displays a listof files that you havesubmitted to Symantec foranalysis. Files, at variousstages of submission, alsoappear in the list.

Norton Community Watch

The windows registry cancontain the entries that referto files that do not exist. Suchbroken registry items canslow down your computer.Registry Cleanup scans yourcomputer and cleans anybroken registry entries thatit finds.

TheRegistry Cleanup view inthe Security History windowdisplays the list of theRegistry Cleanup activitiesthat been performed in yourcomputer.

Registry Cleanup

Maintaining total protectionAbout monitoring protection features

136

Page 137: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The File Cleanup featureremovesunwanted temporaryfiles including leftoverInternet browser files,Internet search words, andother temporary files.

The File Cleanup view in theSecurity History windowshows the list of the FileCleanup activities that wereperformed on your computer.

File Cleanup

Disk optimization is a processin which the physicallocations of files arestreamlined. Files andmetadata are re-arranged toimprove data access time.

The disk optimization view inthe Security History windowshows the list of the diskoptimization activities thatwere performed on yourcomputer.

Disk Optimization

137Maintaining total protectionAbout monitoring protection features

Page 138: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

SilentMode suppresses alertsand notifications andtemporarily suspends mostof the background activities.

The Silent Mode view in theSecurity History windowdisplays the summary of theSilent Mode sessions.

The summary includes thefollowing information:1 The type of Silent Mode

such as Silent Mode orQuiet Mode

1 The type of program thatturns on Silent Mode suchas disk burning or TVrecording

1 The name ofUser-Specified programthat turns on Silent Mode

1 Whether Silent Mode isturned on or turned off

Silent Mode

LiveUpdate obtains the latestvirus definition updates andthe program updates to allthe Symantec products thatyou installed on yourcomputer. These updatesprotect your computer fromnewly discovered threats.

The LiveUpdate view in theSecurity History windowshows the details of theLiveUpdate activities on yourcomputer. The details includethe severity, the status, andthe duration of theLiveUpdate sessions on yourcomputer.

LiveUpdate

Maintaining total protectionAbout monitoring protection features

138

Page 139: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

4 Click a row to view details for that item.If you want to view additional information about anitem, click the More Details option in the Detailspane or double-click the particular row. You canview the advanced details about the item in theSecurity History-Advanced Details window andtake actions as needed. For some categories, theMoreDetails option opens the File Insight windowthat displays the details about the selected SecurityHistory event. You must use the Options link in theSecurity History window to select an action thatNorton 360 must perform on any item in thesecategories. The Options link is also available in theFile Insight window for certain items.

About the Security History - Advanced Details window

The SecurityHistory -AdvancedDetails window letsyou view more information about the items that youselect in the Show drop-down list in the SecurityHistory window. You can also perform any action thatis available for the selected item from this window.

139Maintaining total protectionAbout monitoring protection features

Page 140: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The following table lists the categories that providethe advanced details about the Security History items:

Displays the followinginformation about the item:1 Severity

This category displays therisk level of the selecteditem. The various levels ofsecurity risks are High,Medium, Low, and Info.

1 Activity

This category displays theactivity that was performedby Norton 360.

1 Date & Time

This category displays thedate and time of the activity.

1 Status

This category displays thestatus of the action that hasbeen taken on the item.

1 Recommended Action

This category displays theactions that you might needto perform.

Alert Summary

Displays the detailedinformation of the item

You can view the details such ascategory, risk level, riskcategory, submission date of therisk, risk status, risk description,and recommended actions forthe items.

Advanced Details

Maintaining total protectionAbout monitoring protection features

140

Page 141: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Actions

141Maintaining total protectionAbout monitoring protection features

Page 142: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Displays the actions that areavailable for the selected item

The options in the Actions viewvary depending on the optionsthat are available in the Showdrop-down list in the SecurityHistory window.

The following are some of theActions options:1 Trust

This action allows access toor from the selectedcomputer or all of theunclassified computers onthe selected network.

This option is available in theSecurity History - Firewall -Network and Connectionsview.

1 Restrict

This action blocks access toor from the selectedcomputer or all of theunclassified computers onthe selected network.

This option is available in theSecurity History - Firewall -Network and Connectionsview.

1 Remove trust

Removes the trusted statusfrom the selected computeror from all of the unclassifiedcomputers on the selectednetwork.

This option is available in theSecurity History - Firewall -Network and Connectionsview.

1 Remove restriction

Maintaining total protectionAbout monitoring protection features

142

Page 143: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This action removes therestricted status from theselected computer or fromall of the unclassifiedcomputers on the selectednetwork.

This option is available in theSecurity History - Firewall -Network and Connectionsview.

1 View Rule

This action shows thefirewall rule that is used tocontrol the Internet accessattempts by the selectedprogram in the ProgramControl window of Norton360.

This option is available in theSecurity History -Firewall-Activities view.

1 Norton File Insight

This action shows the detailsof the file that accessed thenetwork in the File Insightwindow.

This option is available in theSecurity History -Firewall-Activities view.

1 Allow

This action allows theselected program to accessthe Internet.

This option is available in theSecurity History - IntrusionPrevention view.

143Maintaining total protectionAbout monitoring protection features

Page 144: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 Stop Notifying Me

This action prevents Norton360 from notifying you whenit blocks the selected attacksignature in the future.

This option is available in theSecurity History - IntrusionPrevention view.

1 Notify Me

This action allows Norton360 to notify you when itblocks the selected attacksignature in the future.

This option is available in theSecurity History - IntrusionPrevention view.

Displays the links that providethe information that is relatedto the selected item

For some Security History items,this view lets you access therelevant settings pane of theNorton 360 window.

Risk Management

About the File Insight window

The File Insight window provides details about anyFile of Interest that is available on your computer. Thisoption of file analysis is available for the files that youdownload, scan, or use to perform an activity.

You can access the File Insight window in differentways. For example, you can use the variousnotifications, alerts, scan and performance-relatedwindows, and the shortcut menu of the various filesthat are present on your computer to open the window.Security History provides a centralized location whereyou can access the File Insight windows of the various

Maintaining total protectionAbout monitoring protection features

144

Page 145: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

events that are related to Security Risks, DownloadInsight, and Performance.

The File Insight window lets you view more details ofevents that belong to some of the following categoriesin the Security History window:

Lets you view the detailedinformation about the resolvedsecurity risks in an organizedway.

The Resolved Security Riskscategory includes the infectedfiles that Norton 360 repairs,removes, or quarantines. Thiscategory mostly includes themedium-level or the high-levelrisks that are either quarantinedor blocked.

The File Insightwindow providesdetails about the risk level, theorigin, and the activity report ofthe resolved security risks onyour system.

Resolved Security Risks

145Maintaining total protectionAbout monitoring protection features

Page 146: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you view the detailedinformation about theunresolved security risks in anorganized way.

The Unresolved Security Riskscategory includes the infectedfiles for which Norton 360 wasnot able to take any action. Thiscategory mostly includes thelow-level risks that require yourattention for a suitable action.

The File Insightwindow providesdetails about the risk level, theorigin, and the activity report ofthe unresolved security risks onyour system.

Unresolved SecurityRisks

Lets you view the detailedinformation about quarantinedsecurity risks in an organizedway.

The Quarantine categoryincludes the infected files thatare isolated from the rest of yourcomputer while they await yourattention for a suitable action.

The File Insightwindow providesdetails about the risk level, theorigin, and the activity report ofquarantined security risks onyour system.

Quarantine

Lets you view the reputationdetails of a file that youdownload.

You can use these details todetermine the safety level of thefile and then decide the actionthat you want to perform.

Download Insight

Maintaining total protectionAbout monitoring protection features

146

Page 147: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you view the performancedetails of any File of Interest thatis available on your computer.

The information includes thegeneral details, the origin andlineage information, theresource usage, and the actionsthat the file has performed onyour system.

Performance Alert

The FileInsight window provides various details aboutthe Security History item. These details are classifiedin different tabs in the File Insight window.

You can select a tab to view more details about it. TheFile Insight window provides details about a file in thefollowing tabs:

Displays the information such asthe confidence level, communityusage of a file, how long ago thefile was released and how stablethe file is.

w Stability ratings of a filemay vary depending upon youroperating system.

You can view details such as thesignature and the date on whichthe file was created. You candetermine if a file is a startupfile and the date on which thefile was last used.

Details

147Maintaining total protectionAbout monitoring protection features

Page 148: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Provides the lineage details of afile.

You can view the file name andthe URL of the source fromwhere the file was downloaded.The lineage details of a file areavailable only if you downloadedor created the file after youinstalled Norton 360.

w If the historical details ofa file are not available, Norton360 disables thisOrigin section.

Origin

Provides the details about thesuspicious actions performed bythe file on your computer. It alsoprovides information about theresource usage of a process andthe effect of the process on theoverall CPU utilization of yourcomputer.

Activity

Based on the severity of the security risks and the risktype, Norton 360 might display one or more of thefollowing options in the File Insight window:

Lets you locate the file onyour computer.

This option is available at thetop of the window.

Locate

Lets you copy the data fromthe File Insightwindow to theclipboard.

After you copy the content tothe Clipboard, you can opena document, paste the data,and save the document.

Copy to Clipboard

Maintaining total protectionAbout monitoring protection features

148

Page 149: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Let you return the securityrisk that is quarantined to theoriginal location on yourcomputer.

Returns the selectedQuarantine item to itsoriginal location withoutrepairing it and excludes theitem from being detected inthe future scans. If you do notwant to exclude the item fromfuture scans uncheck thecheck box available in theQuarantine Restorewindow.

Restore

Lets you access the ThreatDetected window and viewmore details and performactions.

Options

About the Threat Detected window

The ThreatDetected window appears whenever Norton360 detects a security risk on your computer. You canuse this window to view details about the risk and selectan action for the risk. Sometimes, you may want toaccess the Threat Detected window for the same riskagain. In that case, the window can be opened at anytime from Security History. Security History is thecentralized location where you can access the ThreatDetected windows of risks that belong to some of thefollowing categories:

This category includes thesecurity risks or the infectedfiles that Norton 360 hasdetected and then repaired,quarantined, or removed.

Resolved Security Risks

149Maintaining total protectionAbout monitoring protection features

Page 150: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This category includes thesecurity risks or the infectedfiles that Norton 360 was notable to repair, remove, orquarantine.

Unresolved SecurityRisks

This category includes thesecurity risk items that areisolated from the rest of yourcomputer while they await yourattention for a suitable action.

Quarantine

The action options in the ThreatDetected window fora risk vary depending on the risk type and its severitylevel. The following are some of the options that areavailable in this window:

Returns the security risk that isquarantined to the originallocation on your computer

Restore

Returns the selected Quarantineitem to its original locationwithout repairing it and excludesthe item from being detected inthe future scans

Removes the security risk fromyour computer and quarantinesit

Remove this file

Excludes the security risk fromfuture scan

Exclude this program

Removes the selected securityrisk item from the SecurityHistory log

Remove from history

Maintaining total protectionAbout monitoring protection features

150

Page 151: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Takes you to the SymantecSecurity Response Web site

Get help

Sends the security risk toSymantec

Submit to Symantec

Searching in Security History

You can search the items that are listed in SecurityHistory. You can use the Quick Search option to finditems using a keyword or the name of a security risk.If you want to view all of the Security History itemsthat pertain to a particular security risk, you can filterthe items using QuickSearch. For example, if you wantto view all of the alerts that Auto-Protect has generated,you can type Auto-Protect and filter the list.

You can clear the search results and return to thecurrent Security History list by clicking the black cross(x) icon in the Quick Search box.

The Quick Search option works on the current viewonly. If you want your search to include all of the itemsin Security History, you must select the Full Historyview.

To search in Security History

1 In the Security History window, in the QuickSearch text box, type the name of the item that youwant to search.

2 Click Go.

Exporting or Importing Security History information

Norton 360 lets you export the Security History eventsto a file. You can export and save the Security Historyevents and view them at your leisure.

For example, you can analyze the security events on aparticular day. You can use the Quick Search optionto obtain a list of all of the items that are related to aparticular security risk. You can then use the Export

151Maintaining total protectionAbout monitoring protection features

Page 152: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

option to save the list in the Security History log. Youcan later import the log file and analyze the data.

Security History stores the information in a separatefile. When the file size reaches its maximum size limit,information that is related to new events overwritesthe information that is related to older events. You canexport the log periodically, if you want to keep theentire Security History information.

You can save your log file in one of the following fileformats:

1 Security History Log Files (.mcf)

The .mcf file format is the Security History Log Filesformat and is proprietary to Symantec.

When you use this file type option, you can viewthe file only in the Security History window.

1 Text Files (.txt)

The data is saved in a comma-separated text format.

When you use this file type option, you can openand view the file externally without using SecurityHistory.

You can import only the log files that have .mcf fileextension. When you import a log file, the exported listof Security History information in the log file appears.This list replaces the current security events list. Youcan select an option in the Show drop-down list to viewthe option-specific details that are saved in the log file.To revert to the current Security History list you mustclick the Close file: file_name.mcf link.

To export Security History information

1 In the Norton 360 main window, click Tasks.

2 In the Tasks window, under General Tasks, clickCheck Security History.

3 In the Security History window, in the Showdrop-down list, select an option.

4 Click Export.

Maintaining total protectionAbout monitoring protection features

152

Page 153: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

5 In the Save As dialog box that appears, navigate toa location and specify the name for the file.The category name in the Show drop-down listappears as the default file name. You can provide afile name of your choice.

6 In the Save as type box, select the format in whichyou want to save your log file.

7 Click Save.

To import Security History information

1 In the Norton 360 main window, click Tasks.

2 In the Tasks window, under General Tasks, clickCheck Security History.

3 In the Security History window, click Import.

4 In the Open dialog box that appears, browse to thefolder that has the file you want to import.

5 Select the .mcf file and click Open.You can only open log files of .mcf format in theSecurity History window. You can open and viewlog files of .txt file externally without using SecurityHistory.In the import mode, you cannot make modificationsto the information. For example, you cannot clearthe logs. You can revert to the current SecurityHistory list by closing the file.

Managing items in the Quarantine

The Security History Quarantine provides a safelocation on your computer where you can isolate itemswhile you decide on an action to take on them.Quarantined items are isolated from the rest of yourcomputer so that they cannot spread or reinfect yourcomputer. In some cases, you may have an item thatyou think is infected, but is not identified as a risk bythe Norton 360 scans. You can manually place suchitems in the Quarantine.

You cannot open quarantined items accidentally andspread the virus, but you can evaluate the quarantineditems for possible submission to Symantec.

153Maintaining total protectionAbout monitoring protection features

Page 154: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The Security History Quarantine includes the followinggroups of items:

Includes the items suchas spyware and adwarethat are generally low riskand that another programrequires to functionproperly.

You can restore theseitems if necessary.

Security risks

Includes viruses andother high-risk items.

Security threats

Once an item has been quarantined, you have severaloptions. All of the actions that you take on quarantineditems must be performed in the Security HistoryQuarantine.

To perform an action on a quarantined item

1 In the SecurityHistory window, in the Quarantineview, select the item on which you want to performthe action.

2 In the Details pane, click Restore & Options.You can use the More Details link to view moredetails about the item before you select an actionfor it. The link opens the File Insight window thatcontains more information about the risk.

Maintaining total protectionAbout monitoring protection features

154

Page 155: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 In the Threat Detected window, select the actionthat you want to perform. Some of the options are:

Returns the security risk thatis quarantined to the originallocation on your computer

This option is available onlyfor the detected viral threats.

Restore

Returns the selectedQuarantine item to itsoriginal location withoutrepairing it and excludes theitem from being detected inthe future scans

This option is available forthe detected viral andnon-viral threats.

Restore & exclude this file

Removes the selected itemfrom the Security History log

Remove from history

Sends the selected item toSymantec for evaluation ofthe security risk

In some cases, Norton 360might not identify an item asa security threat, but youmight suspect that the itemis infected. In such cases, youcan use this option to submitthe item to Symantec forfurther analysis.

Submit to Symantec

You can also navigate to this window by using theOptions link in the File Insight window for somerisks.

4 Follow the on-screen instructions.

155Maintaining total protectionAbout monitoring protection features

Page 156: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Adding an item to the Quarantine

Security History Quarantine provides a safe locationon your computer in which you can isolate items whileyou decide on an action to take on each item.

The Quarantine view in the SecurityHistory windowdisplays a list of quarantined items. You can view thename and the risk status of each quarantined item.

You can manually add an item to the Security HistoryQuarantine. You can use the AddtoQuarantine optionin the Quarantine view in the SecurityHistory windowto quarantine the items that you suspect are infected.This action has no effect on the items that are alreadyquarantined.

w You cannot add a known Good File to Quarantine.

To add an item to the Quarantine

1 In the SecurityHistory window, in the Quarantineview, click Add to Quarantine.

2 In the Manual Quarantine dialog box, in theDescription text box, type a short name for the itemthat you want to add.This text appears in the Quarantine, so you shoulduse a recognizable description.

3 Click Browse.

4 In the Select File toQuarantine dialog box, browseto the item that you want to add, select it, and thenclick Open.

5 Click Add.

6 Click Close.

Restoring an item from the Quarantine

Some programs rely on other programs that areclassified as security risks to function. The programmay not function if a particular security file is removed.All of the removed security risks are automaticallybacked up in the Security History Quarantine. Thisway, Norton 360 lets you restore any risk to regain the

Maintaining total protectionAbout monitoring protection features

156

Page 157: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

functionality of a program that requires the riskprogram to run.

For example, a shareware or freeware program thatyou download may use adware to keep its price low. Inthis case, you can allow the security risk program toremain on your computer or restore it if SpywareProtection has removed it.

Some quarantined items are successfully disinfectedafter Norton 360 rescans them. You can also restoresuch items.

w If you restore an item to a directory other than itsoriginal location, it may not function properly.Therefore, it is recommended that you reinstall theprogram.

To restore an item from the Quarantine

1 In the SecurityHistory window, in the Quarantineview, select the item that you want to restore.

2 In the Details pane, click Restore & Options.

3 In the Threat Detected window, click Restore &exclude this file.This option returns the selected Quarantine itemto its original location without repairing it andexcludes the item from being detected in the futurescans.

4 In the Quarantine Restore window, click Yes.In case of non-viral threats, you can use the optionthat is available in this window to exclude thesecurity risk. Norton 360 does not detect thesecurity risks that you exclude in the future scans.

5 In the Browse forFolder dialog, select the folder ordrive where you want to restore the file and thenclick OK.

6 Click Close.

Removing an item from the Quarantine

You can configure Norton 360 to remove a security riskfrom your computer. You can use the Restore option

157Maintaining total protectionAbout monitoring protection features

Page 158: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

to remove the security risk and places it in the SecurityHistory Quarantine. Some programs may rely on thesecurity risk item that you quarantine to function. Inthis case, you can restore the security risk to regainthe functionality of a program that requires the riskprogram to run.

w The Restore option is only available for the securityrisks that are manually quarantined.

To remove an item from the Quarantine

1 In the SecurityHistory window, in the Quarantineview, select the item that you want to remove.

2 Click Restore & Options.

3 In the Threat Detected window, click Restore.This option is available for the security risks thatare manually quarantined.

4 In the Quarantine Restore window, click Yes.

5 Click Close.

Manually submitting an item to Symantec

When a virus or other risk is detected, it isautomatically submitted to Symantec SecurityResponse Web site for analysis. If you have turned offthe option to submit risks automatically, you canmanually submit them from the Security HistoryQuarantine. You must have an Internet connection tosubmit an item.

When you submit files to Symantec automatically ormanually, you contribute to the effectiveness of yourSymantec product. For example, you can submit anitem that has not been detected during scanning thatyou believe may be a security risk. Symantec SecurityResponse analyzes the file. If it is identified as asecurity risk, it is added to a future definition update.

Personally identifiable information is never includedin submissions.

In some cases it is necessary for Symantec SecurityResponse to block submissions of a particular type or

Maintaining total protectionAbout monitoring protection features

158

Page 159: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

volume. These items appear as Not Submitted inSecurity History.

To manually submit an item to Symantec

1 In the SecurityHistory window, in the Quarantineview, select the item that you want to submit toSymantec.

2 In the Details pane, click Restore & Options.

3 In the Threat Detected window, click Submit toSymantec.

4 In the dialog box that appears, click OK.

About viewing details of systemvulnerabilities

The Intrusion Prevention feature of Norton 360provides a proactive solution to prevent the threatsthat might exploit the vulnerabilities of the programsor the operating system of your computer. Norton 360now provides the Vulnerability Protection featurethat enables you to view details of the protectionfeature against possible attacks on thesevulnerabilities. Vulnerability Protection displays anextensive list of the programs on your computer thatcontain vulnerabilities. In addition, it provides detailsabout the vulnerability and the solution that IntrusionPrevention provides to identify any attack on thevulnerability. You can use Vulnerability Protectionto view the correlation between the vulnerabilities thatyour computer is protected against and the programsthat may contain these vulnerabilities.

About Vulnerability ProtectionVulnerability Protection is a component of IntrusionPrevention System. Vulnerability Protection providesinformation about the susceptibility of the programsthat may be on your computer against malicious

159Maintaining total protectionAbout viewing details of system vulnerabilities

Page 160: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

attacks. It also provides information about the knownattacks that they are protected from.

Vulnerabilities are flaws in your programs or youroperating system that can create weaknesses in overallsecurity of your system. Improper computerconfigurations or security configurations also createvulnerabilities. External attackers exploit thesevulnerabilities and perform malicious actions on yourcomputer. Examples of such malicious attacks areactive desktop monitoring, keylogging, and hacking.Such attacks can slow down the performance of yourcomputer, cause program failure, or expose yourpersonal data and confidential information to thehackers.

Norton 360 provides signature-based solutions toprotect your computer from the most common Internetattacks. Attack signatures contain the information thatidentifies an attacker’s attempt to exploit a knownvulnerability in your operating system or the programsthat are installed on your computer. The IntrusionPrevention feature of Norton 360 uses an extensive listof attack signatures to detect and block suspiciousnetwork activity.

Vulnerability Protection lets you view the correlationbetween the vulnerabilities that your computer isprotected against and the programs that may containthese vulnerabilities. For example, if Internet Explorerdoes not handle certain HTTP responses, it can resultin a vulnerability that can be exploited. In this case,Vulnerability Protection lists Internet Explorer as avulnerable program. It also provides details about thesignatures that Intrusion Prevention uses to detect anyattempt to exploit this vulnerability.

Viewing the list of vulnerable programs

The Vulnerability Protection window lets you viewthe extensive list of programs with the knownvulnerabilities that Norton 360 protects you against.

Maintaining total protectionAbout viewing details of system vulnerabilities

160

Page 161: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

For each program, you can view details such as thename of the program, its vendor, and the number ofvulnerabilities that the program contains. You can alsoview more details about the vulnerabilities by clickingon the program name.

To view the list of vulnerable programs

1 In the Norton 360 main window, click Tasks.

2 In the Tasks window, under General Tasks, clickCheck Vulnerability Protection.

3 After you finish viewing the list, click Close.

Viewing details about a vulnerable application

The VulnerabilityProtection window displays the listof the programs on your computer that are susceptibleto malicious attacks. In addition, you can view detailsof the vulnerabilities that a program contains. TheProgram Vulnerability Details window displays thenames of the attack signatures that IntrusionPrevention uses to detect any attempts to exploit thevulnerabilities in the program.

You can click an attack signature to get additionalinformation about the signature in the SymantecSecurity Response Web site.

The Intrusion Signatures window of IntrusionPrevention lets you view a list of attack signatures.Intrusion Prevention relies on this list of attacksignatures to detect and block suspicious activity. Youcan uncheck a signature from the list, if you do notwant Norton 360 to monitor the signature. TheProgram Vulnerability Details list does not includeany signature that you disable in the IntrusionSignatures window. By default, all the signatures inthe IntrusionSignatures window are turned on. Unlessyou have a good reason to disable a signature, youshould leave the signatures turned on. If you disable asignature, your computer may be vulnerable to attack.

161Maintaining total protectionAbout viewing details of system vulnerabilities

Page 162: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To view details about a vulnerable application

1 In the Norton 360 main window, click Tasks.

2 In the Tasks window, under General Tasks, clickCheck Vulnerability Protection.

3 In the Vulnerability Protection window, in theProgram column, click the program name for whichyou want to view the details.

4 In the ProgramVulnerabilityDetails window, viewthe signature details of the program.

5 If you want to view additional information aboutthe signature, then click the signature name.

6 After you finish viewing the vulnerability details,in the ProgramVulnerabilityDetails window, clickClose.

7 In the VulnerabilityProtection window, click Close.

Maintaining total protectionAbout viewing details of system vulnerabilities

162

Page 163: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This chapter includes the following topics:

1 About the Norton 360 scans

1 About Computer Scan

1 About Insight Network scan

1 About Reputation Scan

1 About Scan Facebook Wall

1 About SONAR Protection

1 About scanning Office documents

1 About Silent Mode

1 About boot time protection

1 About Early Launch Anti-Malware Protection

1 Running a scan at the command prompt

About the Norton 360 scansNorton 360 scans secure your computer from all typesof viruses and unknown threats using the latest virusdefinitions. It also scans all the Internet activities thatare performed on your computer to protect yourcomputer from the Internet-based threats that exploitsoftware vulnerabilities.

4Scanning yourcomputer

Page 164: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton 360 automatically performs different types ofscans to secure your computer from latest threats. Italso lets you run different types of scans manually tosecure your computer.

By using Norton 360, you can run the following typesof scans:

Computer Scan uses the latestvirus definitions that areavailable locally in the computer.

If you suspect that yourcomputer is infected, you canrun three types of computerscans manually to prevent virusinfections on your computer. Thethree types of scans that areavailable under Computer Scanare Quick Scan, Full SystemScan, and Custom Scan.

Computer Scan

Insight Network Scan uses thevirus definitions that areavailable locally and hosted inthe Cloud. InsightNetwork Scandetects the files that aresuspicious or vulnerable on yourcomputer using thereputation-based threatdetection. Norton 360 performsan Insight Network Scan onlywhen the Insight Protectionoption is turned on. By default,the Insight Protection option isturned on.

You can see this InsightProtection option under Scansand Risks tab in the Antivirussettings window.

Insight Network Scan

Scanning your computerAbout the Norton 360 scans

164

Page 165: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Reputation Scan displays thereputation information of thefiles on your computer. Itdisplays the reputationinformation such as trust level,prevalence, stability rating, andresource usage. ReputationScan displays the detailedreputation information of thegood files and the number of badfiles that have been detected orremoved.

Reputation Scan also internallyperforms Computer Scan andInsight Network Scan to detectthe threats. The different typesof scans that are available underReputation Scan areQuick Scan,Full System Scan, and CustomScan.

w Norton 360 ReputationScan is applicable only for theexecutable files and the installerfiles.

Reputation Scan

165Scanning your computerAbout the Norton 360 scans

Page 166: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Scan Facebook Wall lets youscan the links and URLs that areavailable on your Facebookprofile.

When you click the ScanFacebook Wall option, Norton360 takes you to the Facebooklogin Web page. After you log into your Facebook profile, NortonSafe Web asks you to grantpermission to access yourFacebook wall. To do so, use thegrant us permission to accessyour stream option available onthe Facebook Web page, andthen follow the on-screeninstructions. After you grantpermission, Norton safe Webscans all the available links onyour Facebook wall each timeyou use Scan Facebook Walloption. It then displays thesecurity status of the scannedURLs.

Scan Facebook Wall

Norton 360 keeps your computer secure from latestthreats by automatically running Full System Scanwhen your computer is in the idle state.

About Computer ScanNorton 360 automatically downloads latest virusdefinition regularly and secures your computer fromall types of viruses and unknown threats. When Norton360 performs a Computer Scan, it uses the latest virusdefinitions that Symantec provides.

The threat detections that are based on the localdefinition are specified with a specific name. Forexample, if a Trojan horse is detected, the scan results

Scanning your computerAbout Computer Scan

166

Page 167: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

of the Computer Scan displays the threat as Trojan.Foo.You can click the Run Scans option available in theTasks window to access the different types of computerscans.

If you suspect that your computer is infected, you canrun three types of computer scans manually to preventvirus infections on your computer.

You can run the following types of computer scans:

Scans the important locations ofyour computer that the virusesand other security threats oftentarget.

Quick Scan takes less time toscan than a Full System Scanbecause this scan does not scanyour entire computer.

Quick Scan

Scans your computer for alltypes of viruses and securitythreats.

Full System Scan thoroughlyexamines your entire computerfor viruses, spyware, anddifferent security vulnerabilities.It also runs LiveUpdate, Virusand Spyware Scan, diskoptimization, and backup. Inaddition, it cleans up theInternet Explorer temporary filesand Windows temporary files.

Norton 360 automatically runsa Full System Scan when yourcomputer is in idle state.

Full System Scan

Scans a specific file, folder,drive, or removable drive thatyou choose.

Custom Scan

167Scanning your computerAbout Computer Scan

Page 168: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Runs LiveUpdate, backup, anddisk optimization tasks.

Runs LiveUpdate, backs up yourdata, frees disk space, andoptimizes your disk volume.

Custom Task

Computer Scan provides details about the scanneditems. You can view the details such as total numberof files scanned, security risks detected, security risksresolved, and the total items that require attention. Italso provides you the different ways to resolve anyitems that were not automatically resolved during thescan. You can also view the severity of the risk, thename of the risk, and the status of the risk about theresolved items.

Running a Quick ScanA Quick Scan helps you to scan the possiblevirus-infected areas of a computer that the viruses andother security risks often targets. Because this scandoes not scan your entire computer, it takes less timeto run than a Full System Scan.

When Norton 360 performs Quick Scan for the firsttime, it automatically runs LiveUpdate, and cleans upthe Internet Explorer temporary files and Windowstemporary files.

When the Insight Protection option is turned on,Norton 360 simultaneously performs a traditionalQuick Scan and an Insight Network Quick Scan. Bydefault, the Insight Protection option is turned on.

During idle time, Norton 360 runs a Quick Scan whenthere is a definition update.

To run a Quick Scan

1 In the Norton 360 main window, click Security, andthen click Run Scans.

2 In the Scans window, under Computer Scan, clickQuick Scan.

Scanning your computerAbout Computer Scan

168

Page 169: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 Click Go.You can use the following options:

Suspends the scan temporarily.

Click Resume to continue thescan.

Pause

Skips the current scan.Skip

Terminates a Quick Scan.Cancel

4 On the Results Summary window, do one of thefollowing:

1 If no items require attention, click Finish.

1 If there are items require attention, review therisks in the Threats Detected window.

Running a Full System ScanA Full System Scan thoroughly examines your entirecomputer for viruses, spyware, and different securityvulnerabilities. A Full System Scan runs LiveUpdate,virus and spyware scan, disk optimization, and backup.

A Full System Scan helps you to do the following:

1 Obtain latest protection and program updates.

1 Scan your computer for threats.

1 Optimize disks to improve the performance of yourcomputer.

1 Back up your data.

You can back up your files regularly to protect thevaluable information on your computer.

To run a Full System Scan

1 In the Norton 360 main window, click Security, andthen click Run Scans.

2 In the Scans window, under Computer Scan, clickFull System Scan.

169Scanning your computerAbout Computer Scan

Page 170: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 Click Go.

4 After the scan is complete, in the Scans window,click Close.

Scanning selected drives, folders, or filesOccasionally, you might want to scan a particular file,removable drives, any of your computer's drives, orany folders or files on your computer. For example,when you work with removable media and suspect avirus, you can scan that particular disk. Also, if youhave received a compressed file in an email messageand you suspect a virus, you can scan that individualelement.

To scan individual elements

1 In the Norton 360 main window, click Security, andthen click Run Scans.

2 In the Scans window, under ComputerScans, clickCustom Scan.

3 Click Go.

Scanning your computerAbout Computer Scan

170

Page 171: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

4 In the Scans window, do one of the following:

1 To scan specific drives, click Run next to DriveScan, select the drives that you want to scan,and then click Scan.

1 To scan specific folders, click Run next to FolderScan, select the folders that you want to scan,and then click Scan.

1 To scan specific files, click Run next to FileScan,select the files that you want to scan, and thenclick Add.

You can also press Ctrl, and select multiple filesto scan.

You can use the following options to suspend ascan:

Suspends a custom scantemporarily.

Click Resume to continue thescan.

Pause

Terminates the scan.

Click Yes to confirm.

Stop

5 In the Results Summary window, do one of thefollowing:

1 If no items require attention, click Finish.

1 If any items require attention, review them onthe Threats Detected window.

About the Results Summary windowNorton 360 displays the ResultSummary window whenyou run a manual scan. At the end of a scan, the ResultsSummary window provides the summary of the scanresults.

If your most recent scan was a Quick Scan, this windowshows the results of a fast scan of the areas of your

171Scanning your computerAbout Computer Scan

Page 172: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

computer. Viruses, spyware, and other risks oftentarget these areas.

If your most recent scan was a Full System Scan, thiswindow shows the results of a comprehensive scan ofyour entire computer.

The Result Summary window displays the followinginformation:

1 Total items scanned

1 Total security risks detected

1 Total security risks resolved

1 Total items that require your attention

About the Threats Detected windowNorton 360 displays the Threats Detected windowwhen it detects threats. At the end of a scan, theThreatsDetected window provides you different waysto resolve any items that were not automaticallyresolved during the scan.

The ThreatsDetected window provides the informationsuch as the severity of the risk, the name of the risk,and the status of the risk. It also provides the actionthat you can take to resolve the item. The ThreatsDetected window provides you the different optionssuch as Fix, Manual Fix, Exclude, Get Help, andRescan to resolve the item.

It also provides the Ignore option only once during thefirst-time detection of low-risk items.

Ignore option is available once until you do not changethe default settings for the Low Risks option underComputer Scan.

The options in the ThreatsDetected window vary basedon the types of files that Norton 360 identified asinfected during the scan.

Scanning your computerAbout Computer Scan

172

Page 173: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

About custom scansYou can create a custom scan if you regularly scan aparticular segment of your computer. This custom scanlets you scan the segment frequently without havingto specify it every time. You can also schedule thecustom scan to run automatically on specific dates andtimes or at periodic intervals. You can schedule a scanaccording to your preferences. If the scheduled scanbegins when you use your computer, you can run thescan in the background instead of stopping your work.

You can delete the scan when it is no longer necessary.For example, if you work on a project for which youneed to swap files frequently with others. In this case,you might want to create a folder into which you copyand scan those files before using them. When theproject is done, you can delete the custom scan for thatfolder.

Creating a custom scan

Instead of running the default scans that are listed inthe Scans pane, you can create your own scans thatmeet your specific requirements. For example, you cancreate a scan that checks a folder in which you storeall the downloaded files.

You can create a custom scan in the Scans window.

When you create custom scans, you can also schedulethem to run automatically on specific dates and timesor at periodic intervals.

To create a custom scan

1 In the Norton 360 main window, click Security, andthen click Run Scans.

2 In the Scans window, under ComputerScans, clickCustom Scan.

3 Click Go.

4 In the Scans window, click Create Scan.

173Scanning your computerAbout Computer Scan

Page 174: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

5 In the New Scan window, in the Scan Name box,type a name for the scan.You cannot specify a scan name that is already inuse.

6 On the Scan Items tab, add the items that you wantto scan. See “Selecting the scan items” on page 174.

7 On the Scan Schedule tab, set the frequency andtime at which you want to perform the scan. See“Scheduling a scan” on page 178.

8 On the ScanOptions tab, configure the scan optionsas required. See “Configuring the scan options”on page 175.

9 Click Save.

Selecting the scan items

When you configure a custom scan, you must selectthe items that you want to include in the scan. You caninclude individual files, folders, or drives. You caninclude multiple drives, folders, and files to add to thescan. You can also exclude items from the scan.

w When you select a drive, all the items in the driveincluding the files and folders are automatically addedto the scan. When you select a folder, all of the files infolder are added to the scan.

To select the scan items

1 In the Norton 360 main window, click Security, andthen click Run Scans.

2 In the Scans window, under ComputerScans, clickCustom Scan.

3 Click Go.

4 In the Scans window, do one of the following:

1 To add items for a new scan, click Create Scan.

You must provide a name for the scan in theScan Name box.

1 To add items for an existing scan, in the EditScan column, click the edit icon for the scan thatyou want to modify.

Scanning your computerAbout Computer Scan

174

Page 175: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

5 In the window that appears, on the Scan Items tab,do the following:

1 To add drives, click Add Drives, in the ScanDrives dialog box, select the drives to bescanned, and click Add.

1 To add folders, click Add Folders, in the ScanFolders dialog box, select the folders to bescanned, and click Add.

1 To add files, click AddFiles, in the Files toScandialog box, select the files to be scanned, andthen click Add.

If you need to remove an item from the list, selectthe item, and then click Remove.

6 Click Next.

7 In the Scan Schedule tab, select the scan scheduleas required, and then click Next.

8 In the Scan Options tab, click Save.

Configuring the scan options

Norton 360 lets you configure scan options for eachscan that you customize. By default, the scan optionsreflect the current Computer Scans settings in theSettings window. The changes that you make areapplicable to the current scan only.

In addition to the custom scans that you create, youcan configure the scan options for the default scans.You can configure scan options for Full System Scan,Quick Scan, Drive Scan, Folder Scan, and File Scan.

To configure the scan options

1 In the Norton 360 main window, click Security, andthen click Run Scans.

2 In the Scans window, under ComputerScans, clickCustom Scan.

3 Click Go.

4 In the Scans window, in the EditScan column, clickthe edit icon next to the scan that you want toschedule.

175Scanning your computerAbout Computer Scan

Page 176: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

5 In the Edit Scan window, on the Scan Options tab,configure the scan options as required.

6 Click Save.

Editing a custom scan

You can edit a custom scan that you created. You caninclude additional files or folders to the scan or removethe files and folders that you do not want to scan. Youcan also change the name of the scan.

You can edit a custom scan in the Scans window.

To edit a custom scan

1 In the Norton 360 main window, click Security, andthen click Run Scans.

2 In the Scans window, under ComputerScans, clickCustom Scan.

3 Click Go.

4 In the Scans window, in the EditScan column, clickthe edit icon next to the custom scan that you wantto modify.

5 In the Edit Scan window, on the Scan Items tab,select the items that you want to scan. See“Selecting the scan items” on page 174.

6 On the Scan Schedule tab, set the frequency andtime at which you want to perform the scan. See“Scheduling a scan” on page 178.

7 On the ScanOptions tab, configure the scan optionsas required. See “Configuring the scan options”on page 175.

8 Click Save.

Running a custom scan

When you run a custom scan, you do not have toredefine what you want to scan.

You can run a custom scan from the Scans window.

Scanning your computerAbout Computer Scan

176

Page 177: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To run a custom scan

1 In the Norton 360 main window, click Security, andthen click Run Scans.

2 In the Scans window, under ComputerScans, clickCustom Scan.

3 Click Go.

4 In the Scans window, click Run next to the customscan that you want to run.You can use the following options to suspend acustom scan:

Suspends a custom scantemporarily.

Click Resume to continue thescan.

Pause

Terminates a custom scan.

Click Yes to confirm.

Stop

5 In the Results Summary window, do one of thefollowing:

1 If no items require attention, click Finish.

1 If any items require attention, review the riskson the Threats Detected window.

Deleting a custom scan

You can delete custom scans if they are no longerneeded.

You can delete a custom scan in the Scans window.

To delete a custom scan

1 In the Norton 360 main window, click Security, andthen click Run Scans.

2 In the Scans window, under ComputerScans, clickCustom Scan.

3 Click Go.

177Scanning your computerAbout Computer Scan

Page 178: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

4 In the Scans window, in the Delete column, clickthe delete icon next to the custom scan that youwant to delete.

5 Click Yes to confirm that you want to delete thescan.

About scheduling scans

Norton 360 automatically detects the idle state of yourcomputer and runs a Full System Scan. However, youcan schedule a Full System Scan according to yourpreferences. You can also set up a schedule for a QuickScan and custom virus scans that you create.

You can schedule scans to run automatically on specificdates and times or at periodic intervals. If the scheduledscan begins when you use your computer, you can runthe scan in the background instead of stopping yourwork. Norton 360 lets you schedule the Full SystemScan, Quick Scan, and custom virus scans. However,you cannot schedule the Drive Scan, Folder Scan, andFile Scan.

You can also set up Norton 360 to turn off yourcomputer or move it to sleep mode or hibernate modeautomatically when the scheduled scan is complete.

Scheduling a scan

You have complete flexibility in scheduling customscans. When you select how frequently you want a scanto run (daily, weekly, or monthly), you are presentedwith additional options. For example, you can requesta monthly scan, and then schedule it to occur onmultiple days instead.

In addition to the custom scans that you create, Norton360 lets you schedule the Full System Scan and QuickScan.

You can also schedule the scan to run in specific timeintervals (hours or days). You can schedule a customscan in the Scans window.

Scanning your computerAbout Computer Scan

178

Page 179: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

w Norton 360 lets you select multiple dates if youschedule a monthly scan.

To schedule a custom scan

1 In the Norton 360 main window, click Security, andthen click Run Scans.

2 In the Scans window, under ComputerScans, clickCustom Scan.

3 Click Go.

4 In the Scans window, in the EditScan column, clickthe edit icon next to the custom scan that you wantto schedule.

5 In the EditScan window, on the ScanSchedule tab,do one of the following:

1 If you do not want to run the scan at anyparticular time, but want to keep the scanoptions and scan items saved, select Do notschedule this scan.

1 To run the scan at specific time intervals, selectRun at a specific time interval.

1 To run the scan at specific time every day, selectDaily.

1 To run the scan on a specific day on a week,select Weekly.

1 To run the scan on a specific day on a month,select Monthly.

These frequency options include the additionaloptions that you can use to refine the schedule. Setthe additional options as required.

6 Under Run the scan, do the following:

1 To run the scan only at idle time, check Only atidle time.

1 To run the scan only when your computer isconnected with external power source, checkOnly on AC power.

1 To prevent your computer from going to a Sleepor Standby mode, check Prevent standby.

179Scanning your computerAbout Computer Scan

Page 180: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

7 Under After scan completion:, select the state atwhich your computer should be after the scan iscomplete. Your options are:

1 Stay On

1 Turn Off

1 SleepThis option works only if you have configuredthe power options in your computer using theWindows Control Panel.

1 HibernateThis option works only if you have configuredthe power options in your computer using theWindows Control Panel.

8 Click Next.

9 In the Scan Options tab, click Save.

Scheduling a Full System Scan

Norton 360 automatically detects the idle state of yourcomputer and runs a Full System Scan. Full SystemScan protects your computer against infection withoutcompromising the performance of your computer. Youcan schedule a Full System Scan on specific dates andtimes or at periodic intervals.

You can schedule a Full System Scan in the Scanswindow.

To schedule a Full System Scan

1 In the Norton 360 main window, click Security, andthen click Run Scans.

2 In the Scans window, under ComputerScans, clickCustom Scan.

3 Click Go.

4 In the Scans window, in the EditScan column, clickthe edit icon next to Full System Scan.

Scanning your computerAbout Computer Scan

180

Page 181: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

5 In the Edit Scan window, under Whendoyouwantthe scan to run?, set the frequency and time atwhich you want the scan to run.Most of the frequency options include the additionaloptions that you can use to refine the schedule. Setthe additional options as required.

6 Click Next.

7 In the Scan Options tab, click Save.

Scheduling a Quick Scan

Quick Scan scans the important locations of yourcomputer that the viruses and other security threatsoften target. When you perform a Quick Scan, Norton360 scans only the running processes and the loadedprograms. Quick Scan takes less time to scan than aFull System Scan because this scan does not scan yourentire computer.

Norton 360 lets you schedule a Quick Scan. You canschedule a Quick Scan in the Scans window.

To schedule a Quick Scan

1 In the Norton 360 main window, click Security, andthen click Run Scans.

2 In the Scans window, under ComputerScans, clickCustom Scan.

3 Click Go.

4 In the Scans window, in the EditScan column, clickthe edit icon next to Quick Scan.

5 In the Edit Scan window, under Whendoyouwantthe scan to run?, set the frequency and time atwhich you want the scan to run.Most of the frequency options include the additionaloptions that you can use to refine the schedule. Setthe additional options as required.

6 Click Next.

7 In the Scan Options tab, click Save.

181Scanning your computerAbout Computer Scan

Page 182: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Editing a scheduled scan

You can change the schedule of any scheduled customscan, QuickScan, or Full SystemScan from the Scanswindow.

To edit a scheduled scan from Norton 360 Scans dialogbox

1 In the Norton 360 main window, click Security, andthen click Run Scans.

2 In the Scans window, under ComputerScans, clickCustom Scan.

3 Click Go.

4 In the Scans window, in the EditScan column, clickthe edit icon next to the scan that you want to edit.

5 In the EditScan window, on the ScanSchedule tab,change the schedule as required.Most of the frequency options include the additionaloptions that you can use to refine the schedule. Setthe additional options as required.

6 Click Next.

7 In the Scan Options tab, click Save.

About Insight Network scanThe Insight Network scan uses the Cloud technologywherein a remote server on the Web contains the latestvirus definitions. Norton 360 scans your computer forthe latest security threats. When Norton 360 performsthe Insight Network scan, it uses the virus definitionsthat are available locally and in the Cloud. Norton 360provides additional protection by using the most recentdefinitions in the Cloud, apart from the definitions thatare available locally on your computer.

Norton 360 performs an Insight Network scan onlywhen the Insight Protection option is turned on. Bydefault, the Insight Protection option is turned on.You can see this InsightProtection option under Scansand Risks tab in the Antivirus settings window.

Scanning your computerAbout Insight Network scan

182

Page 183: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

When the Insight Protection option is turned on,Norton 360 performs a traditional scan and an InsightNetwork scan simultaneously. The traditional scanuses the definitions from the local system, and theInsight Network scan uses the definitions that arehosted in the Cloud.

Threat detection based on the Cloud definitions isidentical to the threat detection that is based on thelocal definitions. However, the Cloud definitions arespecified with additional data about the threats that itdetects which indicates that it has been obtained fromthe Internet. Definitions in the Cloud provide a genericname for the risk detected, but the local definitionsprovide the specific name for the risk detected. Forexample, if a Trojan horse is detected, the scan resultsof the Insight Network might display Cloud.Trojan.However, the scan results of the local definition mightdisplay Trojan.Foo.

If the traditional scan completes while the InsightNetwork scan is still running, you can view the InsightNetwork Scan progress status.

The Insight Network scan supports Quick Scan, InsightNetwork context-menu scan, Instant Messenger Scan,and Download Insight scan. It does not support EmailScan, Full System Scan, and Auto-Protect scan.

If the Insight Protection option is turned on, you canmanually run the following types of Insight Networkscans:

1 Insight Network Quick Scan

Norton 360 simultaneously performs a traditionalQuick Scan and an Insight Network Quick Scan toscan the areas of your computer that the virusesoften target. Norton 360 also performs an InsightNetwork Quick Scan simultaneously with an IdleQuick Scan.

w The Insight Network scan does not support a QuickScan that runs as a part of an Idle Full System Scan.

1 Insight Network context-menu scan

183Scanning your computerAbout Insight Network scan

Page 184: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

When you right-click a file, the shortcut menudisplays Norton 360 and then Insight NetworkScan. You can use this command to scan a file usingboth local definitions and definitions that arehosted in the Cloud.

w This Insight Network Scan command is availableonly for single file.

Turning off or turning on Insight ProtectionInsightProtection option lets Norton 360 perform anInsight Network scan on your computer

When the Insight Protection option is turned on,Norton 360 performs a traditional scan and an InsightNetwork scan simultaneously. The traditional scanuses the definitions from the local system, and theInsight Network scan uses the definitions that arehosted in the Cloud. Norton 360 performs only atraditional scan if the Insight Protection option isturned off.

Norton 360 performs an Insight Network scan onlywhen the Insight Protection option is turned on. Bydefault, the Insight Protection option is turned on.

The Insight Network scan supports only InsightNetwork Quick Scan, and Insight Networkcontext-menu scan. Insight Network scan does notsupport a Quick Scan that runs as a part of an Idle FullSystem Scan. It also does not support Full System Scan,Email Scan, single file Office document scan, andAuto-Protect scan.

To turn off or turn on the Insight Protection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.

3 In the Antivirus settings window, click the Scansand Risks tab.

Scanning your computerAbout Insight Network scan

184

Page 185: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

4 In the Insight Protection row, do one of thefollowing:

1 To turn off Insight Protection, move the On/Offswitch to the right to the Off position.

1 To turn on Insight Protection, move the On/Offswitch to the left to the On position.

5 In the Settings window, click Apply.

About Reputation ScanReputation Scan provides information on thetrust-worthiness of all programs and processes runningon your computer. It helps you detect the files that aresuspicious or vulnerable on your computer using thereputation-based threat detection. Reputation-basedthreat detection maintains information of every filesubmitted by millions of other Norton users. Theinformation include trust level, community usage,stability, etc. During reputation scan, reputation-basedthreat detection uses this information to detectsuspicious or vulnerable files on your computer. Norton360 lets you run different types of Reputation Scanand detect suspicious programs on your computer.

Reputation Scan filters the files on the basis of certainfiltering criteria and performs an Insight NetworkScan on the filtered files. Reputation Scan filters thefiles as reputation files. It filters running processesand the loaded DLLs, startup files (services, drivers,and auto run apps), portable executable files mentionedin the Windows prefetch cache, and executable filesthat are listed in the Run registry keys and RunOnceregistry keys.

When you perform a Reputation Quick Scan or FullSystem Scan, Norton 360 considers the Files of Interestthat are available on your computer.

After it has filtered the reputation files, Norton 360performs an InsightNetworkScan. When Norton 360performs an Insight Network Scan, it also performs a

185Scanning your computerAbout Reputation Scan

Page 186: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Computer Scan. Norton 360 uses the Computer Scanto perform the signature-based threat detection. Itcompares the signature of the filtered reputation filesagainst the known threat signatures to identify threatson your computer. If a security threat is detected,Norton 360 automatically removes the threat fromyour computer.

Norton 360 uses the Insight Network Scan to detectsuspicious or vulnerable files on your computer usingthe reputation-based threat detection. The InsightNetwork Scan uses the Cloud technology wherein aremote Symantec server on the Web stores the latestreputation information. It checks the Cloud for thereputation information on the filtered files.

Norton 360 obtains specific information such as filename and hash key about the filtered reputation filesand sends this information to the Cloud. The Cloudanalyzes the file information and provides a trust levelfor each file. The Symantec server sends back thereputation information to your computer. If any of thefiltered files is suspicious or vulnerable, Norton 360assigns Bad or Poor trust level. Apart from reputationinformation, Norton 360 also checks for the latest virusdefinitions on the Cloud.

w Your computer must be connected to the Internet toaccess the latest reputation information and virusdefinitions from the Cloud. If your computer is notconnected to the Internet, Norton 360 uses thereputation information that is available locally.

When you perform a Reputation Scan, Norton 360considers only the following categories of files:

This category includesWindows executable files(.exe) and script files (.scr).

Executable files

Scanning your computerAbout Reputation Scan

186

Page 187: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This category includesWindows System files (.sys),dynamic link library files(.dll), and device driver files(.drv).

System files

This category includesActiveX control files (.ocx).

Developer files

This category includesWindows Installer Packagefiles (.msi) and resource-onlyDLL files (.loc).

Miscellaneous files

Norton 360 lets you scan specific areas of yourcomputer based on the type of Reputation Scan thatyou select. You can manually run the following typesof Reputation Scan:

Scans the important locationsof your computer that theviruses and other securitythreats often target.

When you perform a QuickScan, Norton 360 considersthe Files of Interest thatrelated to loaded programsand the running processes.

Quick Scan

187Scanning your computerAbout Reputation Scan

Page 188: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Scans all the Files of Interestthat are available on yourcomputer.

When you perform a FullSystem Scan, Norton 360searches for Files of Intereston all the locations on yourcomputer. The locationsinclude all drives, runningprocesses, loaded programs,and startup files.

Full System Scan

Scans a specific file, folder,drive, or removable drive.

When you perform a customscan, Norton 360 considersonly the filtered reputationfiles.

Custom Scan

Symantec rates a file based on the statistical evaluationthat is done on the file using the Norton CommunityWatch data and Symantec’s analysis. Symantec assignsthe following confidence levels to reputation files:

Symantec has a highindication that the file istrusted.

Trusted

Symantec has a highindication that the file istrusted.

Good

Symantec does not haveenough information aboutthe file to assign a trust levelto the file.

The file is neither safe norunsafe.

Unknown

Scanning your computerAbout Reputation Scan

188

Page 189: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Symantec has a fewindications that the file is nottrusted.

This file is suspicious and canharm your computer.

Poor

Symantec has a highindication that the file is nottrusted.

This file is suspicious and canharm your computer.

Bad

When the Reputation Scan is complete, you can viewthe summary of the scan results in the NortonReputationScan window. You can view the reputationinformation such as the file name, trust level, age ofthe file, stability rating, and community usage for eachfile. The trust level determines whether a file is safeor unsafe. If a file has Poor or Bad trust level, Norton360 lets you quarantine the file.

Running a Reputation Full System ScanWhen you perform a Full System Scan, Norton 360scans all the Files of Interest that are available on yourcomputer. This fileset includes the files that relate tothe running processes, startup files, and loadedprograms.

To run a Reputation Full System Scan

1 In the Norton 360 main window, click Security, andthen click Run Scans.

2 In the Scans window, under ReputationScan, clickFull System Scan.

3 Click Go.In the Reputation Scan window, you can analyzethe trust level, community usage, resource usage,and stability of the scanned items.

189Scanning your computerAbout Reputation Scan

Page 190: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

4 If there is a file with Poor or Bad trust level, underthe TrustLevel column, click the red cross (x) icon.

5 In the Quarantine File window, click Quarantinethis file.

6 In the Manual Quarantine window, click Add.

7 Click Close.

8 In the NortonReputationScan window, click Close.

Running a Reputation Quick ScanWhen you perform a Quick Scan, Norton 360 scansonly the running processes and the loaded programs.Reputation Quick Scan does not scan your entirecomputer and it takes lesser time to run than aReputation Full System Scan.

To run a Reputation Quick Scan

1 In the Norton 360 main window, click Security, andthen click Run Scans.

2 In the Scans window, under ReputationScan, clickQuick Scan.

3 Click Go.In the Norton Reputation Scan window, you cananalyze the trust level, community usage, resourceusage, and stability of the scanned items.

4 If there is a file with Poor or Bad trust level, underthe TrustLevel column, click the red cross (x) icon.

5 In the Quarantine File window, click Quarantinethis file.

6 In the Manual Quarantine window, click Add.

7 Click Close.

8 In the NortonReputationScan window, click Close.

Running a Reputation custom scanNorton 360 lets you scan specific areas on yourcomputer by using the Reputation custom scan. Youcan scan any of your computer's drives, removabledrives, folders or files. For example, if you want to

Scanning your computerAbout Reputation Scan

190

Page 191: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

check the trust level of a specific file, you can scan theparticular file.

To run a Reputation custom scan

1 In the Norton 360 main window, click Security, andthen click Run Scans.

2 In the Scans window, under ReputationScan, clickCustom Scan.

3 Click Go.

4 In the Reputation Custom Scan window, do one ofthe following:

1 Click Drive Scan, select the drive that you wantto scan, and then click Scan.

1 Click FolderScan, select the folder that you wantto scan, and then click OK.

1 Click File Scan, select the file that you want toscan, and then click Open.

In the Reputation Scan window, you can analyzethe trust level, community usage, resource usage,and stability of the scanned items.

5 If there is a file with Poor or Bad trust level, underthe TrustLevel column, click the red cross (x) icon.

6 In the Quarantine File window, click Quarantinethis file.

7 In the Manual Quarantine window, click Add.

8 Click Close.

9 In the NortonReputationScan window, click Close.

About the Reputation Scan resultsNorton 360 lets you run different Reputation Scans todetect any suspicious programs or vulnerable programson your computer. Norton 360 lets you manually runthe following types of Reputation Scan:

1 Reputation Quick Scan

1 Reputation Full System Scan

1 Reputation Custom Scan

191Scanning your computerAbout Reputation Scan

Page 192: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

When you run a Reputation Quick Scan, Norton 360considers the Files of Interest which include runningprocesses and loaded programs. When you run aReputation Full System Scan, Norton 360 considers allthe Files of Interest that are available on yourcomputer. When you run a Reputation custom scan,Norton 360 lets you select the drive, folder, or file thatyou want to scan.

Reputation Scan filters the files on the basis of certainfiltering criteria and performs an Insight NetworkScan on the filtered files. Reputation Scan filters .exefiles, .scr files, .sys files, .dll files, .drv files, .ocx files,and .msi files and analyzes these files.

Norton 360 displays the reputation information of thescanned files in the NortonReputationScan window.

Norton 360 consolidates the reputation informationof your most recent scan and presents the reputationinformation using different graphical formats.

The top of the Norton Reputation Scan windowdisplays the following statistics:

1 The Trust Level graph displays the average trustlevel of files on your computer. It also displays theaverage trust level of the files that Symantecanalyzes within the Norton Community.

1 The CommunityUsage graph displays the averagecommunity usage of files on your computer. It alsodisplays the average community usage of the filesthat Symantec analyzes within the NortonCommunity.

1 The Stability graph displays the average reliablefiles on your computer. It also displays the averagereliable files that Symantec analyzes within theNorton Community.

w Stability ratings vary depending upon youroperating system.

1 The Norton Network graph displays the detailsabout the known good files and bad files.

Scanning your computerAbout Reputation Scan

192

Page 193: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can view the number of trusted files that areon your computer. You can also view the totalnumber of files that Symantec analyzes within theNorton Community.

w Your computer must be connected to the Internet toview these details. Norton 360 connects to theSymantec servers to collect the reputation information.

The bottom of the Norton Reputation Scan windowdisplays the reputation information of each scanneditem. For each scanned item, you can view the followingdetails:

Indicates the file name andfile type.

You can click a file name toview additional details aboutthe file in the File Insightwindow.

File Name

193Scanning your computerAbout Reputation Scan

Page 194: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Indicates the trust level thatis assigned to a file.

Symantec analyzes specificinformation about a file suchas the digital signature andthe hash value to determinethe trust level of a file.Symantec rates a file basedon the statistical evaluationthat is done on the file usingtheNortonCommunityWatchdata and Symantec’sanalysis.

Symantec assigns thefollowing trust levels toreputation files:

1 Trusted: Symantec has ahigh indication that thefile is trusted.

1 Good: Symantec has ahigh indication that thefile is trusted.

1 Unknown: Symantec doesnot have enoughinformation about the fileto assign a trust level tothe file.

1 Poor: Symantec has a fewindications that the file isnot trusted.

1 Bad: Symantec has a highindication that the file isnot trusted.

If you have a file that hasPoor or Bad trust level,Norton 360 displays a redcross (x) icon next to the trustlevel. You can click on the redcross (x) icon and quarantinethe suspicious file.

Trust Level

Scanning your computerAbout Reputation Scan

194

Page 195: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Indicates the communityusage level of the file.

The search results aregrouped in to the followingcategories:

1 Very Few Users: Showsthe files that have verylow community usage.

1 Few Users: Shows thefiles that have averagecommunity usage.

1 Many Users: Shows thefiles that have very highcommunity usage.

You can also use thecommunity usage of a file todetermine the legitimacy ofthe file. Symantec uses astringent statistical methodto evaluate thetrustworthiness of a file andto classify the file as a Goodfile.

Community Usage

195Scanning your computerAbout Reputation Scan

Page 196: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Indicates the system resourceusage level of the file.

The usage levels are asfollows:

1 Low: Indicates that thefile consumes minimumsystem resources.

1 Moderate: Indicates thatthe file consumesmoderate systemresources.

1 High: Indicates that thefile consumes maximumsystem resources.

1 Unknown: Indicates thatthe file has performed noaction in your computer.

Resource Usage

Scanning your computerAbout Reputation Scan

196

Page 197: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Indicates the stability ratingof the file.

The stability rating dependson how frequently theprogram crashes. Thedifferent stability ratings areas follows:

1 Reliable: Indicates thatthe program is reliable.

1 Stable: Indicates that theprogram is comparativelystable. However, itcrashes sometimes.

1 Slightly Unstable:Indicates that theprogram is slightlyunstable.

1 Unstable: Indicates thatthe program is unstable.

1 Very Unstable: Indicatesthat the programfrequently crashes.

1 Unknown: Indicates thatthe crash history of theprogram is not known.

w Stability ratings varydepending upon youroperating system.

Stability

About Scan Facebook WallNorton Safe Web protects your computer frommalicious URLs when you use Facebook. It scans eachURL that is available on your Facebook Wall anddisplays the Norton rating icons for the scanned URLs.

You can also check if a URL is safe or unsafe. NortonSafe Web scans your Facebook News feed and providesyou the safety status for each of the URL. This way,

197Scanning your computerAbout Scan Facebook Wall

Page 198: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

you are not only protected from unsafe sites but youcan also let other Facebook users know the securitystatus of any Web site.

However, Norton Safe Web requires your permissionto scan the URLs that are available on your FacebookWall. When you install the Norton Safe Web FacebookApp, Norton Safe Web App asks for your permissionto access your Facebook Wall. You can choose to allowor deny permission to let Norton Safe Web access yourFacebook Wall.

The auto-scan feature in Norton Safe Web applicationpage helps you protect your Facebook Wall offline.Norton Safe Web scans the News Feed on yourFacebook Wall every day and protects you frommalicious links. When Norton Safe Web detects amalicious link, it notifies you with a post on yourFacebook Wall. To activate Norton Auto-Scan, go toyour NortonSafeWebScanResults page on Facebookand click EnableAuto-Scan. The Norton Safe Web appwill ask for additional permission to post in your wallwhen malicious links are identified while enabling thisfeature.

To remove the malicious link from your Facebook Wall,go to your profile and remove the malicious link. Youcan also click See Norton Safe Web Report to viewNorton ratings and other details about this maliciouslink. When no malicious activity is detected on yourFacebook Wall, Norton Safe Web posts a messagenotifying that your Facebook Wall is safe. Norton SafeWeb posts this message on your Facebook Wall oncein every 30 days.

If you later decide to remove Norton Safe Web fromyour Facebook profile, you can use the ApplicationSettings option of Facebook.

Scanning your computerAbout Scan Facebook Wall

198

Page 199: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The following are the safety states that Norton SafeWeb provides after it scans the links on your FacebookWall:

Indicates that the site is safe tovisit and Norton Trusted.

The sites with this rating do notharm your computer and so youcan visit this site.

Safe

Indicates that the site hassecurity risks.

The sites with this rating mayinstall malicious software onyour computer. Symantecrecommends that you do notvisit this site.

Warning

Indicates that Norton Safe Webhas not yet tested this site andit does not have sufficientinformation about this site.

Untested

Indicates that the site may havesecurity threats. Symantecrecommends you to be cautiouswhile you visit such Web sites.

Caution

Enabling your Facebook Wall ScanThe Norton Safe Web feature scans your Facebook Walland analyzes the security levels of all the availablelinks on your Facebook Wall. It then displays thesecurity status of the scanned URLs. However, NortonSafe Web requires your permission to scan yourFacebook Wall.

199Scanning your computerAbout Scan Facebook Wall

Page 200: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To enable your Facebook Wall

1 In the Norton 360 main window, click Security, andthen click Run Scans.

2 In the Scans window, under Scan Facebook Wall,click Scan Facebook Wall.

3 Click Go.

4 In the Facebook login Web page, log in to yourFacebook profile.

5 In the Request for permission page, click Allow.

6 In the Web page that appears, click Pleasegrantuspermission to access your News Feed and Wall.

7 Follow the on-screen instructions to let Norton SafeWeb access your Facebook Wall.

About SONAR ProtectionSymantec Online Network for Advanced Response(SONAR) provides real-time protection against threatsand proactively detects unknown security risks on yourcomputer. SONAR identifies emerging threats basedon the behavior of applications. SONAR identifiesthreats quicker than the traditional signature-basedthreat detection techniques. SONAR detects andprotects you against malicious code even before virusdefinitions are available through LiveUpdate.

w Symantec recommends that your computer remainsconnected to Internet to get the real-time protectionagainst threats and proactively detects unknownsecurity risks on your computer.

SONAR monitors your computer for malicious activitiesthrough heuristic detections.

SONAR automatically blocks and removeshigh-certainty threats. Norton 360 notifies you whenhigh-certainty threats are detected and removed.SONAR provides you the greatest control whenlow-certainty threats are detected. You can also

Scanning your computerAbout SONAR Protection

200

Page 201: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

suppress the SONAR notifications by disabling theShow SONAR Block Notifications option.

The ViewDetails link in the notification alert lets youview the summary of the resolved high-certaintythreats. You can also view the details under ResolvedSecurity Risks category in the Security Historywindow.

Turning off or turning on SONAR ProtectionSONAR protects you against malicious code even beforevirus definitions are available through LiveUpdate. Bydefault, SONAR Protection is turned on to proactivelydetect unknown security risks on your computer.

When you turn off SONAR Protection, you areprompted with a protection alert. This protection alertlets you specify the amount of time for which you wantSONAR Protection to be turned off.

w When Auto-Protect is turned off, SONAR Protection isalso disabled. In this case, your computer is notprotected against emerging threats.

To turn off or turn on SONAR Protection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.

3 On the AutomaticProtection tab, under RealTimeProtection, in the SONAR Protection row, do oneof the following:

1 To turn off SONAR Protection, move the On/Offswitch to the right to the Off position.

1 To turn on SONAR Protection, move the On/Offswitch to the left to the On position.

4 In the Settings window, click Apply.

About Real Time ExclusionsSymantec Online Network for Advanced Response(SONAR) provides real-time protection against threats

201Scanning your computerAbout SONAR Protection

Page 202: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

and proactively detects unknown security risks on yourcomputer. SONAR identifies emerging threats basedon the behavior of applications. SONAR identifiesthreats quickly compared to the traditionalsignature-based threat detection techniques. SONARdetects and protects you from malicious programs evenbefore virus definitions are available throughLiveUpdate.

SONAR monitors your computer for malicious activitiesusing heuristic detections. It automatically blocks andremoves high-certainty threats. Norton 360 notifiesyou when high-certainty threats are detected andremoved.

However, you can configure Norton 360 to excludecertain programs from the Norton 360 Auto-Protectscans and SONAR scans. You should exclude programsonly if you are confident that they are not infected.You can exclude the programs from the Auto-Protectscans and SONAR scans by adding them to the RealTimeExclusions window. When you add a program tothe RealTimeExclusions window, Norton 360 ignoresthe file when it performs Auto-Protect scan and SONARscan. This option also excludes subfolders within afolder.

w Exclude a program from Norton 360 scans only if youare confident that the program is safe. For example, ifanother program relies on a security risk program tofunction, you might decide to keep the program onyour computer.

To add programs to the RealTimeExclusions window,go to the Norton 360 main window, and then clickSettings > Antivirus > Scans and Risks > Items toExclude from Auto-Protect, SONAR and DownloadIntelligence Detection > Configure.

Excluding security threats from scanning

You can use Scan Exclusions window and Real TimeExclusions window to exclude viruses and otherhigh-risk security threats from scanning.

Scanning your computerAbout SONAR Protection

202

Page 203: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To exclude high-risk security threats from scanning

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.

3 In the Antivirus settings window, click the Scansand Risks tab.

4 Under Exclusions / Low Risks, do one of thefollowing:

1 In the Items to Exclude from Scans row, clickConfigure.

1 In the Items to Exclude from Auto-Protect,SONAR and Download Intelligence Detectionrow, click Configure.

5 In the window that appears, click Add.

6 In the Add Item dialog box, click the browse icon.

7 In the dialog box that appears, select the item thatyou want to exclude from the scan.

8 Click OK.

9 In the Add Item dialog box, click OK.

10 In the window that appears, click Apply, and thenclick OK.

About Signature ExclusionsNorton 360 lets you select specific known security risksand exclude them from Norton 360 scans. Exclude arisk from Norton 360 scans only if you have a specificneed. For example, if another program relies on asecurity risk program to function, you might decide tokeep the program on your computer. You might alsodecide not to be notified about the program in futurescans.

w When you exclude a known security risk from Norton360 scans, the protection level of your computerreduces. You should exclude items only if you areconfident that they are not infected.

To exclude a security risk from scans, you need to addthe specific security risk to the Signature Exclusions

203Scanning your computerAbout SONAR Protection

Page 204: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

window. The Signature Exclusions window containsthe list of all security risks that can be excluded fromNorton 360 scans. For each security risk, you can viewthe risk details and the effect of the risk on yourcomputer.

To add security risks to the Signature Exclusionswindow, go to the Norton 360 main window, and thenclick Settings > Antivirus > Scans and Risks >Exclusions / Low Risks > Signatures to Exclude fromAll Detections > Configure.

Adding items to the Signature Exclusions

To exclude a security risk from scans, you must addthe specific security risk to the Signature Exclusionswindow. You can select a known risk by name and addit to the list.

w When you exclude a known security risk from Norton360 scans, the protection level of your computerreduces. You should exclude items only if you areconfident that they are not infected.

To add a signature to the Signature Exclusions

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.

3 In the Antivirus settings window, click the Scansand Risks tab.

4 Under Exclusions /LowRisks, in the Signatures toExclude from All Detections row, click Configure.

5 In the Signature Exclusions window, click Add.

6 In the Security Risks window, click on a securityrisk that you want to exclude and then click Add.

7 In the Signature Exclusions window, click Apply,and then click OK.

8 In the Settings window, click Close.

Scanning your computerAbout SONAR Protection

204

Page 205: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

About clearing file IDs that are excluded during scansWhen you run a Reputation Scan, Norton 360 providesinformation on the trust-worthiness of all programsand processes running on your computer. ReputationScan helps you detect the files that are suspicious orvulnerable on your computer using thereputation-based threat detection. Norton 360 providesreputation information such as trust level, userprevalence, and stability for each program and processthat is scanned. Norton 360 stores the reputationinformation of all scanned files.

All trusted and favorable files are provided withTrusted and Good trust levels. If any of the scannedfiles is suspicious or vulnerable, Norton 360 assignsBad or Poor trust level.

During each successive scan that you run, Norton 360excludes the Trusted and Good files from beingscanned. However, if you want Norton 360 to scan allthe files in your computer, you must clear thereputation information of the excluded files.

w When you exclude a reputation-based threat, Norton360 does not add the signature of the excluded threatto the Signature Exclusions window. This is becausethe reputation-based threats are excluded by hashvalue. You can use the Clearing IDs of files that areexcluded during scans option to clear the excludedreputation-based threats.

To clear the reputation information of files that areexcluded from scans. In the Norton 360 main window,click Settings > AntiVirus > Scans and Risks >Exclusions/LowRisks>ClearfileIDsexcludedduringscans > Clear All.

Clearing IDs of files that are excluded during scans

Norton 360 tags all trusted and favorable files withTrusted and Good trust levels. When a file is taggedas Trusted or Good, Norton 360 does not scan this file

205Scanning your computerAbout SONAR Protection

Page 206: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

again. This can improve the scan performance ofNorton 360 on your computer.

However, if you want Norton 360 to scan all the filesin your computer, you must clear the reputationinformation of the excluded files.

w When you clear IDs of files that are excluded duringscans, it might take a longer time to complete scan.

Norton 360 excludes the Trusted and Good files frombeing scanned. However, if you want Norton 360 toscan all the files in your computer, you must clear thereputation information of the excluded files.

To clear IDs of files that are excluded during scans

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.

3 In the Antivirus settings window, click the Scansand Risks tab.

4 Under Exclusions / LowRisks, in the Clear file IDsexcluded during scans row, click Clear All.

5 In the Warning window, click Yes.

6 In the Settings window, click Close.

About scanning Office documentsNorton 360 protects all Office documents that youreceive through email messages, through Internetdownload, and through inserted floppy disks or otherremovable media. By automatically scanning all Officefiles, Norton 360 maintains a higher level of security.Norton 360 scans the Office document when you openthem.

You can use the Microsoft Office Automatic Scanoption in the Settings window to scan documents ofthe following Microsoft Office applications:

Microsoft Wordwinword.exe

Scanning your computerAbout scanning Office documents

206

Page 207: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Microsoft Excelexcel.exe

Microsoft PowerPointpowerpnt.exe

Microsoft Visiovisio.exe

Microsoft Accessmsaccess.exe

Microsoft Projectwinproj.exe

Norton 360 scans the Office documents and protectagainst threats, including virus macros and infectedembedded objects.

By default, Microsoft Office Automatic Scan option,under Computer Scans, in the Antivirus settingswindow is turned off. Turn on this option to scanMicrosoft Office files automatically.

Turning on or turning off Microsoft Office AutomaticScan

Norton 360 maintains a higher level of security byautomatically scanning all Office files. You can turnon the Microsoft Office Automatic Scan option toprotect your computer against the virus macros andembedded objects.

To Turn on or turn off Microsoft Office Automatic Scan

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.

3 In the Antivirus settings window, click the Scansand Risks tab.

207Scanning your computerAbout scanning Office documents

Page 208: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

4 In the MicrosoftOfficeAutomaticScan row, do oneof the following:

1 To turn on Microsoft Office Automatic Scan,move the On/Off switch to the left to the Onposition.

1 To turn off Microsoft Office Automatic Scan,move the On/Off switch to the right to the Offposition.

5 In the Settings window, click Apply, and then clickClose.

About Silent ModeNorton 360 provides many solutions and features tohandle viruses and other security threats. Norton 360displays alerts and notifications to inform you howviruses and other security threats are detected andresolved. When you perform important tasks on yourcomputer, you likely prefer not to receive any alertmessages. Norton 360 suppresses alerts andnotifications and temporarily suspends most of thebackground activities based on the Silent ModeSettings that are turned on.

Norton 360 provides the following options under SilentMode Settings:

Norton 360 allows you tomanually turn on for a specifiedduration using Silent Modeoption.

Silent Mode

Norton 360 turns on this optionautomatically when it detects afull-screen application and turnsoff when you stop using thefull-screen application.

Full Screen Detection

Scanning your computerAbout Silent Mode

208

Page 209: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton 360 turns on this optionautomatically when it detects adisk burning task or a MediaCenter TV recording task. Norton360 also turns on Quiet Modeautomatically when you run aprogram that you included in theQuiet Mode Programs list.Norton 360 turns off Quiet Modewhen the disk burning sessionor TV program recording sessionis complete. Norton 360 alsoturns off Quiet Mode when itstops detecting runninginstances of the programs thatyou included in the Quiet ModePrograms list.

Quiet Mode

The Norton 360 icon displays the turn-on status ofSilent Mode in the notification area, at the far right ofthe taskbar. The icon changes to a crescent-patternedicon when Silent Mode is turned on. Norton 360 alsonotifies you after Silent Mode is turned off.

You can view the summary of the Silent Mode sessionsunder the Recent History, Full History, and SilentMode categories in the drop-down list of the Showoption in the Security History window.

The summary includes the following information:

1 The turn-on or turn-off status of Silent Mode

1 Usage of Silent Mode Settings, such as Silent Modeor Quiet Mode

1 The type of program that turns on Silent Mode,such as disk burning or TV recording

1 The name of a user-specified program that turnson Silent Mode

1 The time and date when Silent Mode is turned onor turned off

1 The severity displays the risk level of the selecteditem

209Scanning your computerAbout Silent Mode

Page 210: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

About the Silent Mode that you turn on manuallyNorton 360 lets you manually turn on Silent Mode fora specified duration. When Silent Mode is turned on,Norton 360 suppresses alerts and suspends backgroundactivities for the duration that you specify. You canverify the turn-on status of Silent Mode in thenotification area, at the far right of the taskbar. TheNorton 360 icon in the notification area changes to acrescent-patterned icon to display the turn-on statusof Silent Mode. Turning on Silent Mode manuallybefore you perform your tasks helps you prevent alerts,notifications, or background activities interruptingyou for the specified duration.

You can turn on Silent Mode for a period of one hour,two hours, four hours, six hours, or one day. After thespecified duration, Norton 360 turns off Silent Mode.You can also manually turn off Silent Mode at any time.Norton 360 notifies you after Silent Mode is turned off.The activities that are suspended when Silent Mode isturned on run after Silent Mode is turned off.

Turning on or turning off Silent Mode manually

You can manually turn on Silent Mode for a specifiedduration before you perform any important task onyour computer. You can turn on Silent Mode for aperiod of one hour, two hours, four hours, six hours,or one day. The Norton 360 icon displays the turn-onstatus of Silent Mode in the notification area, at thefar right of the taskbar. Norton 360 notifies you afterSilent Mode is turned off. After Silent Mode is turnedoff, Norton 360 also displays alerts if it detected anysecurity activities that occurred during the Silent Modesession.

You can turn on or turn off Silent Mode from theAdministrative Settings window, Quick Controls inthe Settings window, or from the Norton Taskswindow. You can also turn on or turn off Silent Modeby using the Norton 360 icon in the notification area.

Scanning your computerAbout Silent Mode

210

Page 211: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To turn onSilentMode from theAdministrative Settingswindow

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Silent Mode Settings, in the Silent Moderow, move the On/Off switch to the left to the Onposition.

4 In the Settings window, click Apply.

5 In the TurnonSilentMode dialog box, in the Selectthe duration drop-down list, select how long youwant to turn on Silent Mode, and then click OK.

6 Click Close.

To turn off SilentMode from theAdministrative Settingswindow

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Silent Mode Settings, in the Silent Moderow, move the On/Off switch to the right to the Offposition.

4 In the Settings window, click Apply.

5 Click Close.

To turn on Silent Mode from the Norton Tasks window

1 In the Norton 360 main window, click Performance.

2 In the Performance window, click Norton Tasks.

3 In the Norton Tasks window, under Silent Mode,move the On/Off switch to the left to the Onposition.

4 In the TurnonSilentMode dialog box, in the Selectthe duration drop-down list, select how long youwant to turn on Silent Mode, and then click OK.

5 Click Close in the Norton Tasks window.

To turn off Silent Mode from the Norton Tasks window

1 In the Norton 360 main window, click Performance.

211Scanning your computerAbout Silent Mode

Page 212: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

2 In the Performance window, click Norton Tasks.

3 In the Norton Tasks window, under Silent Mode,move the On/Off switch to the right to the Offposition.

4 Click Close in the Norton Tasks window.

To turn on Silent Mode from the notification area

1 In the notification area on the Windows taskbar,right-click the Norton 360 icon, and then click Turnon Silent Mode.

2 In the TurnonSilentMode dialog box, in the Selectthe duration drop-down list, select how long youwant to turn on Silent Mode, and then click OK.

To turn off Silent Mode from the notification area

4 In the notification area on the Windows taskbar,right-click the Norton 360 icon, and then click Turnoff Silent Mode.

To turn off or turn on Silent Mode from Quick Controls

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Quick Controls, doone of the following:

1 To turn off Silent Mode, uncheck Silent Mode.

1 To turn on Silent Mode, check SilentMode, andselect the duration for which you want SilentMode to be turned on from the Turn on SilentMode dialog box, and click OK.

About the Silent Mode that turns on automaticallyWhen you watch a movie, play games, or make apresentation, you run the application in the full-screenmode. Norton 360 detects the application that you runin the full-screen mode and automatically enablesSilent Mode. When Silent Mode is enabled, Norton 360suppresses most of the alerts and suspends backgroundactivities. Only those activities run that are involvedin protecting your computer from viruses and othersecurity threats. Minimum background activities also

Scanning your computerAbout Silent Mode

212

Page 213: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

ensure high performance of your computer. Theactivities that are suspended run after you finish usingthe application in the full-screen mode.

Silent Mode also helps you maintain an uninterruptedMedia Center Extender session. A Media CenterExtender session is an extended session of Media Centerto an entertainment device, such as a television. Thealerts and notifications that appear during a MediaCenter Extender session disconnect the session betweenthe host computer and the entertainment device.Norton 360 identifies a Media Center Extender sessionas an active full-screen application and turns on SilentMode. When Silent Mode is enabled, Norton 360suppresses alerts and notifications and suspendsbackground activities to provide uninterrupted sessionsfor Silent Mode options such as Full Screen Detectionor Media Center applications.

Turning off or turning on Full Screen Detection

You can use the Full Screen Detection option in theSettings window to turn on or turn off Silent Modeautomatically when Norton 360 detects a full-screenapplication. By default, the Full Screen Detectionoption remains turned on after you install Norton 360.

To turn off Full Screen Detection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Full ScreenDetection row, move the On/Offswitch to the right to the Off position.

4 In the Settings window, click Apply.

5 Click Close.

To turn on Full Screen Detection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

213Scanning your computerAbout Silent Mode

Page 214: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 In the Full ScreenDetection row, move the On/Offswitch to the left to the On position.

4 In the Settings window, click Apply.

5 Click Close.

About Quiet ModeNorton 360 automatically enables Quiet Mode whenyou perform tasks that require higher utilization ofyour system resources. When Quiet Mode is turned on,Norton 360 suspends the background activities andlets the task use the maximum resources for betterperformance.

You can choose to set Norton 360 to automaticallyenable Quiet Mode when you do the following tasks:

1 IMAPI 2.0 Disk Burn

1 Media Center TV Recording

1 User-Specified Programs

Scanning your computerAbout Silent Mode

214

Page 215: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The following table explains about the various options:

When you use a Media Centerapplication to burn a CD or aDVD, Norton 360 automaticallyenables Quiet Mode, if the IMAPI2.0 Disk Burn option is turnedon. By default, the IMAPI 2.0Disk Burn option is turned on.When Quiet Mode is enabled,Norton 360 suspendsbackground activities to improvethe performance of yourdisk-burning session. However,Norton 360 continues to displayalerts and notifications duringthe session.

Norton 360 supports thefollowing Media Centerdisk-burner applications to turnon Quiet Mode:1 IMAPI 2.0

1 J. River MEDIA CENTER(version 13.0.125 and later)

Norton 360 turns on Quiet Modeas soon as you start burning aCD or a DVD using a MediaCenter application. Norton 360turns off Quiet Mode after thedisk-burning session iscomplete. You cannot turn offQuiet Mode during thedisk-burning session by turningoff the IMAPI 2.0 Disk Burnoption in the Settings window.

IMAPI 2.0 Disk Burn

215Scanning your computerAbout Silent Mode

Page 216: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

When you use a Media Centerapplication to record a TVprogram, Norton 360automatically enables QuietMode, if the Media Center TVRecording option is turned on.By default, theMedia Center TVRecording option is turned on.When Quiet Mode is enabled,Norton 360 suspendsbackground activities to improvethe performance of your TVprogram recording session.However, Norton 360 continuesto display alerts andnotifications during the session.

Norton 360 supports thefollowing Media Centerapplications to turn on QuietMode:1 Windows Media Center

For Windows Media Centerto enable Quiet Mode duringTV program session, youmight need to restart yourcomputer after you installNorton 360.

1 J. River MEDIA CENTER(version 13.0.125 and later)

Norton 360 turns on Quiet Modeas soon as you start recording aTV program. After Quiet Mode isturned on, it turns off after therecording session is complete.You cannot turn off Quiet Modeduring the TV program recordingsession by turning off theMediaCenter TV Recording option inthe Settings window.

Media Center TVRecording

Scanning your computerAbout Silent Mode

216

Page 217: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton 360 automatically turnson Quiet Mode when it detects aTV program recording session ora disk-burning session. Inaddition, you can manually addthe programs for which you wantNorton 360 to turn on QuietMode to the Quiet ModePrograms list. When Norton 360detects a running instance of aprogram that you added in thelist, it automatically turns onQuiet Mode. When Quiet Modeis turned on, Norton 360suspends the backgroundactivities but does not suppressalerts and notifications.

You can also add or remove arunning program to the QuietMode Programs list.

User-Specified Programs

Turning off or turning on the Quiet Mode options

You can turn off or turn on the Quiet Mode options,such as IMAPI 2.0 Disk Burn and Media Center TVRecording in the Settings window. By default, the QuietMode options are turned on. If you perform a task foran option that you turned on, Norton 360 detects thetask and automatically turns on Silent Mode. Forexample, you turn on the IMAPI2.0DiskBurn optionand start burning a disk using a Media Centerapplication. In this case, Norton 360 detects thedisk-burning session and turns on Quiet Mode.

Norton 360 turns on Quiet Mode as soon as you startrecording a TV program or burning a CD or a DVD.Once Quiet Mode is turned on, it turns off only afterthe TV program recording session or disk-burningsession is complete. You cannot turn off Quiet Modeduring the sessions by using the options in the Settingswindow.

217Scanning your computerAbout Silent Mode

Page 218: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To turn off or turn on IMAPI 2.0 Disk Burn

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Silent Mode Settings, under Quiet Mode onDetection of, do one of the following:

1 To turn off detection of a disk burning session,in the IMAPI 2.0 Disk Burn row, move theOn/Off switch to the right to the Off position.

1 To turn on detection of a disk burning session,in the IMAPI 2.0 Disk Burn row, move theOn/Off switch to the left to the On position.

4 In the Settings window, click Apply.

5 Click Close.

To turn off or turn on Media Center TV Recording

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Silent Mode Settings, under Quiet Mode onDetection of, do one of the following:

1 To turn off detection of a TV program recordingsession, in the MediaCenterTVRecording row,move the On/Off switch to the right to the Offposition.

1 To turn on detection of a TV program recordingsession, in the MediaCenterTVRecording row,move the On/Off switch to the left to the Onposition.

4 In the Settings window, click Apply.

5 Click Close.

About User-Specified Programs

Norton 360 automatically turns on Quiet Mode whenit detects a TV program recording session or adisk-burning session. In addition, you can manuallyadd the programs for which you want Norton 360 to

Scanning your computerAbout Silent Mode

218

Page 219: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

turn on Quiet Mode to the Quiet Mode Programs list.When Norton 360 detects a running instance of aprogram that you added in the list, it automaticallyturns on Quiet Mode. When Quiet Mode is turned on,Norton 360 suspends the background activities butdoes not suppress alerts and notifications.

You can also add a running program to the Quiet ModePrograms list. However, when you add a runningprogram, Norton 360 does not detect the currentrunning instance of the program to turn on Quiet Mode.Norton 360 turns on Quiet Mode the next time whenyou execute the program.

You can also remove a running program from the QuietMode Programs list. However, if Quiet Mode is turnedon, it turns off only after the running instances of allthe programs in the list are complete. You cannot turnoff Quiet Mode by removing a program from the listwhen it runs.

You can view the details of the programs that you addto the Quiet Mode Programs list or remove from thelist in the Security History window.

Adding programs to User-Specified Programs

You can manually add the programs for which you wantNorton 360 to turn on Quiet Mode to the Quiet ModePrograms list. When you execute the program that youadded to the list, Norton 360 detects the program andturns on Quiet Mode.

You can also add a running program to the QuietModePrograms list. However, when you add a runningprogram, Norton 360 does not detect the currentrunning instance of the program to turn on Quiet Mode.Norton 360 turns on Quiet Mode the next time whenyou execute the program.

You can only add the programs that have .exe fileextension to the Quiet Mode Programs list.

219Scanning your computerAbout Silent Mode

Page 220: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To add a program

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Silent Mode Settings, under Quiet Mode onDetectionof, in the User-SpecifiedPrograms row,click Configure.

4 In the Quiet Mode Programs window, click Add.

5 In the Add Program dialog box, navigate to thelocation of the file that you want to add to the QuietMode Programs list.

6 Select the file, and then click Open.

7 In the Quiet Mode Programs window, click OK.

Removing programs from User-SpecifiedPrograms

You can remove a program from the Quiet ModePrograms list. After you remove a program, Norton360 does not turn on Quiet Mode the next time whenit detects a running instance of the program.

You can also remove a running program from the QuietModePrograms list. However, if Quiet Mode is turnedon, it turns off only after the running instances of allthe programs in the list are complete. You cannot turnoff Quiet Mode by removing a program from the listwhen it runs.

To remove a program

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Silent Mode Settings section, under QuietMode on Detection of, in the User-SpecifiedPrograms row, click Configure.

4 In the Quiet Mode Programs window, select theprogram that you want to delete, and then clickRemove.

Scanning your computerAbout Silent Mode

220

Page 221: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

5 In the confirmation dialog box, click Yes.

6 In the Quiet Mode Programs window, click Applyand then click OK.

About boot time protectionThe boot time protection feature provides enhancedsecurity level from the time you start your computer.It ensures better security by running all the necessarycomponents that are required for computer protectionas soon as you start your computer.

To protect your computer during boot time, you mustconfigure the Boot Time Protection option. To accessthe BootTimeProtection option, go to the Norton 360main window, and then click Settings > Antivirus >Automatic Protection.

You can use the following options to configure BootTime Protection:

1 AggressiveProvides maximum protection during yourcomputer start time.

This option ensures complete protection during theboot time as Auto-Protect starts functioning as soonas you start your computer.

1 NormalProvides enhanced protection during your computerstart time without compromising your computer'sboot performance.

When you select this option, the drivers andplug-ins start functioning during the computer starttime before their specified time delay. This optionensures better boot performance along with goodsecurity levels.

1 OffTurns off boot time protection.

If you turn off the Boot Time Protection option,the protection level of your computer reduces.

221Scanning your computerAbout boot time protection

Page 222: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Configuring boot time protectionThe boot time protection feature provides enhancedsecurity level from the time you start your computer.As soon as you start your computer, Norton 360 startsAuto-Protect and all required drivers and plug-ins startfunctioning. This feature ensures higher level ofsecurity from the moment you turn on your computer.

To configure boot time protection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.

3 In the BootTimeProtection row, click on one of thesettings. Your options are:

1 Aggressive

1 Normal

1 Off

4 Click Apply, and then click Close.

About Early Launch Anti-MalwareProtection

The early launch anti-malware protection featureprovides enhanced security level when you start yourcomputer. It ensures better security by running all thenecessary components of Norton 360 that are requiredto block any malware from functioning when you startyour computer.

To enable early launch anti-malware protection, go tothe Norton 360 main window, and then click Settings> Antivirus > Automatic Protection > Early LaunchAnti-Malware Protection > On.

By default this option is turned off.

w This option is available only on Windows 8.

Scanning your computerAbout Early Launch Anti-Malware Protection

222

Page 223: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Turning on or turning off Early Launch Anti-MalwareProtection

The Early Launch Anti-Malware Protection featureprovides enhanced security level during the boot timewhen you start your computer. It ensures betterprotection by running all the necessary componentsof Norton 360 that are required to block any malwarefrom functioning when you start your computer.

w This option is available only on Windows 8.

To turn on or turn off early launch anti-malwareprotection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.

3 In the Antivirus settings window, click theAutomatic Protection tab.

4 In the EarlyLaunchAnti-MalwareProtection row,do one of the following:

1 To turn on Early Launch Anti-MalwareProtection, move the On/Off switch to the leftto the On position.

1 To turn off Early Launch Anti-MalwareProtection, move the On/Off switch to the rightto the Off position.

5 In the Settings window, click Apply, and then clickClose.

Running a scan at the command promptYou can scan with Norton 360 from the commandprompt without opening the Norton 360 main window.You type the path and name of the file that you want

223Scanning your computerRunning a scan at the command prompt

Page 224: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

to scan or customize the scan by adding a specificcommand. The following commands are available:

NAVW32 launches helpand terminates.

/?

Scans all drives/A

Scans the local drives/L

Enables (+) or disables(-) subfolders scanning

/S[+|-]

Enables (+) or disables(-) boot recordscanning and masterboot record scanning(for example, NAVW32C: /B+ or NAVW32 C:/B-)

/B[+|-]

Scans only the bootrecords

/BOOT

Runs a Quick Scan/QUICK

Enables (+) or disables(-) a Quick Scan

/SE[+|-]

Enables (+) or disables(-) scanning of stealthitems

/ST[+|-]

Scans the files thatmatches specified wildcard

[folder_path]\*[?]

Scanning your computerRunning a scan at the command prompt

224

Page 225: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Scans the specifieddrive, folder, or file

[drive|folder|file]

Performs Quick Scan inthe background.

w Norton 360displays the scanswindow only when athreat is detected.

/SESCAN

To run a scan from the command prompt

1 At the command prompt, type the path in whichNorton 360 is located and the executable's file name.The following examples show the syntax of a scancommand:

1 "\Program Files\Norton360\Engine\version\NAVW32"/command_name

Where version represents the version numberof Norton 360 and command_name representsthe command.

1 "\Program Files\Norton360\Engine\version\NAVW32"[path]file_name

Where version represents the version numberof Norton 360 and [path] file_name representsthe location, name, and extension of the file.

2 Press Enter.

225Scanning your computerRunning a scan at the command prompt

Page 226: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Scanning your computerRunning a scan at the command prompt

226

Page 227: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This chapter includes the following topics:

1 What to do if a security risk is found

What to do if a security risk is foundYour product provides many solutions and features forhandling viruses and other security threats that itdetects.

When Norton 360 detects a security risk on yourcomputer, you must take appropriate action on therisk. Norton 360 notifies you when it detects a securityrisk. You can view details about the risk in the windowthat appears and select an action that you want Norton360 to perform on the risk.

By default, Norton 360 removes the security risk fromyour computer and quarantines it. However, you canrestore the file from the Quarantine to its originallocation and exclude it from future scans.

w Exclude a program from Norton 360 scans only if youare confident that the program is safe. For example, ifanother program relies on a security risk program tofunction, you might decide to keep the program onyour computer.

In some cases, Norton 360 requires your attention tomanually resolve the detected security risk. You canaccess the Symantec Security Response Web site andrefer the manual removal instructions.

5Responding tosecurity issues

Page 228: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

In some cases, Norton 360 might not identify an itemas a security threat, but you might suspect that theitem is infected. In such cases, you can submit the itemto Symantec for further analysis.

In addition, your product provides solutions forsecurity risks, such as spyware and adware.

About detecting viruses, spyware, and other risksViruses and other security threats can be detectedduring a manual or customized scan. Auto-Protectdetects these threats when you perform an action withan infected file. Threats can also appear during aninstant messenger session, when you send an emailmessage, or during a manual or customized scan.

Security risks, such as spyware and adware, can alsobe detected when these activities are performed.

The files that can potentially infect your system whenyour computer first starts up are scanned first.

These files include the following:

1 Files that are associated with the processes that arecurrently running in memory

1 Files with startup folder entries

1 Files with system start INI file entries

1 Files with system start batch file entries

1 Files that the system start registry keys refers

If an infected file is detected during this portion of themanual scan, it is repaired or removed. Anyunnecessary references are also removed from yourcomputer. Before attempting to repair, quarantine, ordelete any infected file that has a process running inmemory, your product attempts to terminate theprocess. You are alerted and prompted to close allunnecessary programs before the process is terminated.

You can view information about detected viruses andother security threats in Security History.

Responding to security issuesWhat to do if a security risk is found

228

Page 229: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Security History also includes information aboutspyware, adware, and other security risks.

Reviewing Auto-Protect notificationsAuto-Protect scans files for viruses, worms, and Trojanhorses when you perform an action with them, suchas moving them, copying them, or opening them.

It also scans for spyware, adware, and other securityrisks.

If Auto-Protect detects suspicious activity, it logs anotification in Security History that tells you that arisk was found and resolved.

If Auto-Protect detect one or more viruses it eitherrepairs or deletes the viruses and notifies you. Thenotification provides information on which file wasrepaired or deleted and which virus, Trojan horse, orworm infected the file. No further action is necessary.

To review Auto-Protect notifications

1 In the Norton 360 main window, click Tasks.

2 In the Tasks window, under General Tasks, clickCheck Security History.

229Responding to security issuesWhat to do if a security risk is found

Page 230: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 In the Show drop-down list, select the category forwhich you want to review Auto-Protect alerts.Your options are:

Review Auto-Protectnotifications that youreceived in the last sevendays.

Recent History

Review all of theAuto-Protect notificationsthat you have received.

Full History

Review all of the resolvedsecurity threats.

The Resolved SecurityRisks category includesthe infected files thatNorton 360 repairs,removes, or quarantines.

Resolved Security Risks

Review the list ofunresolved security risks.

The Unresolved SecurityRisks category includesthe infected files forwhich Norton 360 wasnot able to take anyaction. This categorymostly includes thelow-level risks thatrequire your attention fora suitable action.

Unresolved Security Risks

Responding to security issuesWhat to do if a security risk is found

230

Page 231: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

4 In the right pane, click the Options link.The option name appears as Restore & Options forfew items.If one or more security risks such as spyware arefound, you can take action on these items, ifrequired.

231Responding to security issuesWhat to do if a security risk is found

Page 232: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

5 In the Threat Detected window, select theappropriate action on the risk.The following are some of the options that areavailable in the Threat Detected window:

Returns the selectedQuarantine item to its

Restore & Exclude this file

original location andexcludes the item frombeing detected in thefuture scans.

This option is availablefor the detected viral andnon-viral threats.

Excludes the security riskfrom future scan.

Exclude this program

Norton 360 adds thesecurity risk to theappropriate exclusionslist.

Lets you resolve the riskusing a manual fix tool.

Manual Fix (recommended)

If you resolve a threatmanually, you mustremove the threatinformation from theSecurity Historywindow.

Removes the security riskfrom your computer andquarantines it.

Remove this file (may causebrowser to close)(recommended)

This option is availablefor the security risks thatrequire your attention.

Responding to security issuesWhat to do if a security risk is found

232

Page 233: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Removes the selectedsecurity risk from thecomputer andquarantines it.

This option is availablefor the security risks thatrequire your attention formanual removal.

This option is alsoavailable for the securityrisks that are manuallyquarantined.

Remove this file (may causebrowser to close)

Removes the selectedsecurity risk item fromthe Security History log.

Remove from history

Takes you to theSymantec SecurityResponse Web site.

This option is availablefor the security risks thatrequire your attention formanual removal. You canrefer the SymantecSecurity Response Website for manual removalinstructions or otherinformation about therisk.

Get help (recommended)

233Responding to security issuesWhat to do if a security risk is found

Page 234: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Sends the security risk toSymantec.

In some cases, Norton360 might not identify anitem as a security threat,but you might suspectthat the item is infected.In such cases, you canuse this option to submitthe item to Symantec forfurther analysis.

Submit to Symantec

About responding to risks detected during a scanAt the end of a scan, the Results Summary windowprovides the summary of the scan results. You can usethe ThreatsDetected window to resolve any items thatwere not automatically resolved during the scan.

You can use the Show drop-down list that is availablein the Security History window to resolve any itemsthat were not automatically resolved during the scan.The Recommended Action section in the SecurityHistory window displays the action that you shouldtake to resolve the security threat.

If you have run a Full System Scan, Norton 360 displaysthe Scans window at the end of the scan. The Scanswindow lists each activity and status of the scan results.

About actions when Norton 360 cannot repair a fileOne of the common reasons that Norton 360 cannotautomatically repair or delete an infected file is thatyou do not have the current definition updates. RunLiveUpdate, and then scan again.

Before running LiveUpdate to receive protectionupdates, ensure that Quick Scan is turned on (it isturned on by default). After LiveUpdate retrieves thelatest definition updates, Quick Scan automatically

Responding to security issuesWhat to do if a security risk is found

234

Page 235: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

checks for the infections that have processes runningin memory. It also checks for the infections that thestart-up files and folders refer.

If that does not work, read the information on theSecurity History - Advanced Details window toidentify the types of files that cannot be repaired. Youcan take one of the following actions, depending on thefile type:

You can view the file type ofthe detected risk. Thisinformation helps you todecide the action that can betaken depending on the filetype.

For example, you can view theinfected files with thefollowing file nameextensions (any file can beinfected):1 .exe

1 .doc

1 .dot

1 .xls

Infected files

Replace using your operatingsystem disks.

Hard disk master boot record,boot record, or system files(such as IO.SYS orMSDOS.SYS) and floppy diskboot record and system files

235Responding to security issuesWhat to do if a security risk is found

Page 236: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Responding to security issuesWhat to do if a security risk is found

236

Page 237: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This chapter includes the following topics:

1 About Norton 360 alerts and messages

1 About managing messages and alerts

1 Types of risks

1 Types of threats

1 Types of viruses

About Norton 360 alerts and messagesMost of the time, Norton 360 quietly protects yourcomputer from viruses and other risks and threats sothat you can use your PC with confidence. The greenbadge on the Norton 360 status icon in the lower-rightcorner of your computer screen indicates that yourprotection is up to date. You can use your computerwith confidence. If the badge color changes to orangeor red, it means you should open Norton 360 to learnabout the problems that Norton 360 has encountered.

About managing messages and alertsNorton 360 displays messages in several ways and inseveral locations.

6Understandingalerts andmessages

Page 238: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You might see messages in the following locations:

Several types of Norton 360messages appear in thenotification area, at the farright of the taskbar. Forexample, your PC was turnedoff, or it has not beenconnected to the Internet fora while. In this case, you seea message that yourprotection may not be up todate.

A different alert appears if asecurity setting was turnedoff. This message warns youthat your PC might not besecure and helps you to turnon the setting.

In most cases you can clickthe alert to open Norton 360and fix the problems.

Notification area on yourWindows desktop

Alerts and other messagesappear at the middle of themain window. The color ofthe message indicates itsurgency. If the message coloris green, your computer isprotected. If the messagecolor is orange or red, youmust take appropriate actionto ensure that you stayprotected.

Norton 360 main windowoverall status

Understanding alerts and messagesAbout managing messages and alerts

238

Page 239: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton 360 displaysindividual status areas foreach protection feature, suchasSecurity, Identity,Backup,and Tuneup. The status areasshow how many issues needto be resolved for eachfeature. You can use ViewDetails under each statusarea for more informationabout those issues. You canuse the Fix Now option to fixall the issues that need to beresolved to secure yourcomputer.

Norton 360 protectioncategories and details

Types of risksA risk is anything that can be exploited to harm yourPC and its data, or that can be used to steal your data.Norton 360 protects your system from a variety ofrisks.

Risks fall into several categories:

These programs aredeliberately designed tocause damage to your PC.They include threats such asviruses, worms, and Trojanhorses. Malicious software issometimes called malware.

Malicious software

These programs concealthemselves on your PC. Theymonitor what you do, or lookthrough the information thatis stored on your PC, andsend the information back totheir creators.

Spyware

239Understanding alerts and messagesTypes of risks

Page 240: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

These risks consist of flawsin legitimate software thatcan be exploited, either tocause damage, block data, orsteal information.Vulnerabilities are usuallyexploited through networkconnections.

Vulnerabilities

Types of threatsThreats consist of the software that has beendeliberately designed to destroy, modify, disclose, orblock your data.

Threats fall into the following categories:

Viruses are the smallprograms that attachthemselves tootherprogramsand replicate themselves.

Viruses

Worms are like viruses in thatthey copy themselves fromPC to PC, but they do notattach themselves to otherprograms.

Worms

These destructive programsclaim to be some other typeof program, but they causedamage when they run.

Trojan horses

Norton 360 scans your PC for viruses, worms, Trojanhorses, and other software that is intentionallydestructive. It also monitors your Internet connectionto protect you from the Internet-based threats thatexploit software vulnerabilities.

Understanding alerts and messagesTypes of threats

240

Page 241: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Types of virusesA virus is a small program that is designed to alter theway your PC operates, without your knowledge orpermission.

To be a virus, a program must do the following:

1 Run on its own, without you having to take anyaction

1 Make copies of itself so that it can spread to otherPCs

Although not all viruses are intended to cause damage,even harmless viruses can affect the performance andstability of your PC. Norton 360 attempts to removeall viruses from your PC.

Viruses fall into the following recognized categories:

These viruses infect programfiles. When infected files run,they can attach the virusesthat they carry to otherprogram files. Norton 360scans all program files onyour PC to find and eliminatefile infectors.

File infectors

These viruses attachthemselves to the systemareas of your PC and becomeactive as soon as your PCstarts. They can attachthemselves to disks or otherstorage devices that isconnected to your PC. Norton360 scans the system areasof your PC to find and removeboot viruses.

Boot viruses

241Understanding alerts and messagesTypes of viruses

Page 242: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

These viruses use thetechniques of both boot andfile infector viruses. Norton360 scans for such virusesand eliminates them.

Multipartite viruses

These viruses attachthemselves to the data filesthat contain executablecomponents, such as somespreadsheet, presentation,and word-processing files.These viruses that are spreadwhen a program runs theexecutable portion of a datafile. Norton 360 scans datafiles for macro viruses andremoves them.

Macro viruses

Norton 360 scans your PC for both known viruses andunknown viruses.

Known viruses are automatically detected and repaired.Unknown viruses are detected by analyzing eachexecutable file for various characteristics common toviruses. In addition, Norton 360 automatically updatesitself over the Internet to expand and refine its list ofknown viruses.

Understanding alerts and messagesTypes of viruses

242

Page 243: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This chapter includes the following topics:

1 Turning on or turning off automatic tasks

1 About custom task

1 About scheduling automatic tasks

1 About scheduling backups

1 Specifying Idle Time Out duration

Turning on or turning off automatic tasksNorton 360 runs automatic tasks as it quietly works toprotect your PC. These automatic tasks includescanning for viruses, monitoring your Internetconnection, updating backups, and downloadingprotection updates. These activities run in thebackground when your PC is turned on.

If any item needs your attention, Norton 360 displaysa message that tells you the current status or asks youto do something. If you do not see any messages, thenNorton 360 is doing its job and your PC is protected.

You can open Norton 360 at any time to see the statusof your PC at a glance or to view protection details.

When a background activity is in progress, Norton 360notifies you with a message in the notification areathat is located at the far-right of the task bar. You can

7Doing routinetasks

Page 244: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

see the results of the latest Norton 360 activities thenext time you open the Norton 360 main window. Tosee a current report of Norton 360 activities, you canview the summary in the Monthly Report window.

To turn on or turn off automatic tasks

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Tasks Scheduling.

3 In the TaskScheduling window, on the AutomaticTasks tab, do the following:

1 Check the feature that you want to runautomatically.

Check the Tasks check box to check all thefeatures at once.

1 Uncheck the feature that you do not want to runautomatically.

Uncheck the Tasks check box to uncheck all thefeatures at once.

4 Click Apply.

5 Click Close.

About custom taskNorton 360 lets you choose your own combination oftasks for a one-time scan. You can run LiveUpdate,back up your data, remove temporary files, free diskspace by cleaning up disk clutter, and optimize yourdisks.

You can select and run the following tasks:

Downloads the latestprotection and programupdates.

LiveUpdate

Doing routine tasksAbout custom task

244

Page 245: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Deletes the temporary filesthat are left behind on yourPC's hard disk after Internetbrowsing.

Internet Explorer TemporaryFiles

Deletes the unnecessary filesthat are left in WindowsTemporary folders after aprogram has been installedor updated.

Windows Temporary Files

Deletes the unnecessary Webpage history that is leftbehind in your Internetbrowser's history folder.

Internet Explorer History

Defragments your hard diskand free space.

Disk Optimization

Deletes the inaccurate entriesand obsolete entries in theWindows registry that cancause errors.

Registry Cleanup

Runs backup.

The files to be backed up andthe backup location are theones you specified when youconfigured your backupsettings.

Backup

Running custom tasksNorton 360 automatically checks your system andchooses the best settings to keep your system secure.However, you can run some specific tasks. You canchoose the specific tasks that you want to run by usingthe options available in the Custom Tasks window.

245Doing routine tasksAbout custom task

Page 246: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton 360 lets you choose your own combination oftasks for a one-time scan. You can run LiveUpdate,back up your data, free disk space by cleaning up diskclutter, and optimize your disks.

To run custom tasks

1 In the Norton 360 main window, click Security, andthen click Run Scans.

2 In the Scans window, under Computer Scan, clickCustom Task, and then click Go.

3 In the Custom Tasks window, check the tasks thatyou want to run.To select all the tasks, check the Tasks option.

4 Click Go.

About scheduling automatic tasksYou can use the Task Scheduling settings to specifyhow often Norton 360 scans your system for securityand performance issues. You can also access backupscheduling options from Task Scheduling settings.

Scheduling security and performance scansUse the Task Scheduling settings to have Norton 360examine your system automatically for security andperformance issues. You can specify when and howoften Norton 360 performs those examinations.

You have the following options for scheduling securityand performance scans:

Examine your PC for securityand performance issueswhenever your PC is idle.

This setting provides themaximum protection.

Automatic (Recommended)

Doing routine tasksAbout scheduling automatic tasks

246

Page 247: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Examine your PC one or moretimes each week for securityand performance issues.

You can pick the days of theweek and the time of day onwhich the scan performs.

Weekly

Examine your PC once eachmonth for security andperformance issues.

You can pick the day of themonth and the time of day onwhich the scan performs.

Monthly

Do not perform a scheduledsecurity or performance scanof your PC.

If you choose this option, youshould perform manualsecurity and performancescans of your PC periodicallyto maintain protection.

Manual Schedule

Your computer's performance is maximized if youschedule your critical operations to occur when yourcomputer is idle. When you schedule your scans weeklyor monthly and check the Runonlyatidletime option,Norton 360 scans your computer when it is idle.Symantec recommends that you check Runonlyatidletime to experience better performance of yourcomputer.

To schedule security and performance scans

1 In the Norton 360 main window, click Settings.

2 In the Settings window, click Tasks Scheduling.

247Doing routine tasksAbout scheduling automatic tasks

Page 248: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 On the Scheduling tab, under Schedule, select anoption.When you click Weekly or Monthly, you must selectthe time and day to run the automatic tasks. Youalso have the option of specifying that the automatictasks must run only when the PC is idle.

4 Click Apply.

5 Click Close.

About scheduling backupsYou can configure backup scheduling on the When tabin the Manage Backup Sets window to specify whenand how often should Norton 360 back up your files.

You have the following backup scheduling options:

Backs up the changed fileswhenever your PC is idle

This setting provides the bestbackup protection.

Automatic (Recommended)

Backs up the changed filesone or more times each week

You can pick the days of theweek and the time of day onwhich Norton 360 shouldperform backups.

Weekly

Backs up the changed filesonce each month

You can pick the day of themonth and the time of day onwhich Norton 360 shouldperform backups.

Monthly

Doing routine tasksAbout scheduling backups

248

Page 249: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Does not perform anyscheduled backups ofchanged files

If you choose this option, youshould manually back up yourchanged files regularly.

Manual Schedule

Your computer's performance is maximized if youschedule your critical operations to occur when yourcomputer is idle. When you schedule backup weeklyor monthly and check Run only at idle time, Norton360 backs up your files when your computer is idle.Symantec recommends that you check Runonlyatidletime to experience better performance of yourcomputer.

Specifying Idle Time Out durationYou can set the duration after which Norton 360 shouldidentify your computer as idle. You can select a value(in minutes) between 1 minute and 30 minutes. Whenyou do not use your computer for the specifiedduration, Norton 360 identifies your computer as idle.Norton 360 then runs the activities that are scheduledto run at idle time.

To specify Idle Time Out duration from the Settingswindow

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Idle Time Out row, in the drop-down list,select the duration that you want to specify.You might need to scroll the window to view theoption.

4 In the Settings window, click Apply.

249Doing routine tasksSpecifying Idle Time Out duration

Page 250: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Doing routine tasksSpecifying Idle Time Out duration

250

Page 251: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This chapter includes the following topics:

1 About the Smart Firewall

1 About Intrusion Prevention

1 About Download Insight

1 About Norton AntiSpam

1 About configuring POP3 and SMTP ports

1 About Network Cost Awareness

About the Smart FirewallThe Smart Firewall monitors the communicationsbetween your computer and other computers on theInternet. It also protects your computer from suchcommon security problems as the following:

Warns you of connectionattempts from othercomputers and ofattempts by programs onyour computer to connectto other computers

Improper connection attempts

8Keeping secure onthe Internet

Page 252: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Cloaks the inactive portson your computer therebyproviding protectionagainst attacks throughhacking techniques suchas port scanning

Port scans

Monitors the networktraffic to or from yourcomputer for suspiciousbehavior and stops anyattack before theythreaten your system

Intrusions

A firewall blocks hackers and other unauthorizedtraffic, while it allows authorized traffic to pass.Turning off Smart Firewall reduces your systemprotection. Always ensure that the Smart Firewall isturned on.

Turning off or turning on Smart FirewallSmart Firewall monitors communications betweenyour computer and the other computers on theInternet. It also protects your computer from commonsecurity problems.

If you must turn off the Smart Firewall, you shouldturn it off temporarily to ensure that it is turned onagain automatically. To ensure that your computerremains protected, you can turn on the Smart Firewallmanually before the time that you specify concludes.

When the Smart Firewall is turned off, your computeris not protected from Internet threats and securityrisks.

To turn off Smart Firewall

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

Keeping secure on the InternetAbout the Smart Firewall

252

Page 253: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 On the General Settings tab, in the SmartFirewallrow, move the On/Off switch to the right to the Offposition.

4 Click Apply.

5 In the Security Request window, in the Select theduration drop-down list, select the duration forwhich you want to turn off Smart Firewall.

6 Click OK.

7 Click Close.

To turn on Smart Firewall

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the General Settings tab, in the SmartFirewallrow, move the On/Off switch to the left to the Onposition.

4 Click Apply.

5 Click Close.

To turn off Smart Firewall from Quick Controls

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Quick Controls,uncheck Smart Firewall.

To turn on Smart Firewall from Quick Controls

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Quick Controls,check Smart Firewall.

To turn off Smart Firewall from the notification area

1 In the notification area on the taskbar, right-clickthe Norton 360 icon, and then click Disable SmartFirewall.

2 In the Security Request window, in the Select theduration drop-down list, select the duration forwhich you want to turn off Smart Firewall.

3 Click OK.

253Keeping secure on the InternetAbout the Smart Firewall

Page 254: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To turn on Smart Firewall from the notification area

4 In the notification area on the taskbar, right-clickthe Norton 360 icon, and then click Enable SmartFirewall.

About firewall rulesA firewall is a security system that uses rules to blockor allow connections and data transmission betweenyour computer and the Internet. Firewall rules controlhow the Smart Firewall protects your computer frommalicious programs and unauthorized access. Thefirewall automatically checks all traffic that comes inand out of your computer against these rules.

The Smart Firewall uses two kinds of firewall rules:

Control network access forprograms on your computer.

Program rules

Control all the incoming and theoutgoing network traffic.

Traffic rules

About the order in which firewall rules are processed

The Smart Firewall processes Traffic rules before itprocesses Program rules. For example, when there isa Program rule that allows Internet Explorer to accessInternet using port 80 with TCP protocol and a Trafficrule that blocks TCP communication through port 80for all applications. The Internet Explorer applicationcannot access the Internet as Norton 360 givesprecedence to Traffic rules over the Program rules.

For example, you have a Program rule for the SymantecpcAnywhere application that blocks the use of theapplication with any other computer. You add anotherrule for the same application that allows its use witha specific computer. You then move the new rule beforethe original rule in the program rule list. Norton 360processes the new rule first and lets you use Symantec

Keeping secure on the InternetAbout the Smart Firewall

254

Page 255: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

pcAnywhere with that specific computer. It thenprocesses the original rule and prevents its use withany other computer.

About Traffic rules

Norton 360 includes a number of predefined Trafficrules. These rules provide network functionality andprotection from known Internet risks. Examples ofdefault Traffic rules include the following:

Permit all types ofoutbound and safe typesof inbound ICMP (InternetControl MessageProtocol) messaging.

ICMP messages providestatus and controlinformation.

Default Allow Specific InboundICMP

Default Allow Specific OutboundICMP

255Keeping secure on the InternetAbout the Smart Firewall

Page 256: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Permit the use of theNetBIOS name serviceand the NetBIOSdatagram service that theMicrosoft Network usesin file and printer sharing.

NetBIOS is an acronymfor Network BasicInput/Output System.NetBIOS provides nameservice, session service,and datagram service.Name service providesresolution of names,Session service managessessions forconnection-orientedservices, and Datagramservice distributesdatagrams forconnection-orientedservices.

Default Allow Inbound NetBIOSName (Shared Networks)

Default Allow Inbound NetBIOS(Shared Networks)

Permit the use of theBootp service.

Bootp is short forBootstrap Protocol, whichenables a computer todiscover its own IPaddress.

Default Allow Inbound Bootp

Default Allow Outbound Bootp

The Traffic Rules tab displays a list of predefinedtraffic rules. Some of the default Traffic rules areread-only and are locked. You cannot modify theserules.

The rules appear in the order of their priority levels.Rules that appear higher in the list override the rulesthat appear lower in the list.

Keeping secure on the InternetAbout the Smart Firewall

256

Page 257: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can add a new Traffic rule on this tab. You can alsodo the following activities:

You can change the settings ofa Traffic rule that does notfunction the way you want.

However, you cannot modifysome of the default rules thatare read-only.

See “Modifying Traffic rules andProgram rules” on page 273.

Modify a Traffic rule

You can disable a Traffic rule.

However, you cannot turn offsome of the default rules thatare read-only.

See “Turning off a Traffic ruletemporarily” on page 275.

Turn off a Traffic rule

You can change the priority of aTraffic rule by changing theorder in which it appears in thelist.

w Only advanced users ornovice users at the direction oftechnical support, shouldperform this action.

See “Changing the order offirewall rules” on page 274.

Change the priority of aTraffic rule

About Program rules

Program rules control network access for the programsthat are on your computer. You can use the Firewallsettings to create and modify rules for programs.

On the Program Rules tab, you can do the following:

1 Add a program.

257Keeping secure on the InternetAbout the Smart Firewall

Page 258: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 Rename a program.

1 Modify the rules for a program.

1 Add a rule for a program.

1 Modify the access settings of a program rule.

1 Modify the priority of rules for a program bychanging the sequence of rules in the list.

1 Remove a program rule.

1 Remove a program.

1 View the trust level of a program.

You can create Program rules in the following ways:

Lets the firewallautomatically configureaccess for programs thefirst time that users runthem. This method is theeasiest way to createfirewall rules.

Automatically customize Internetaccess settings

Manages the list ofprograms that can accessthe Internet.

Use Firewall settings

Keeping secure on the InternetAbout the Smart Firewall

258

Page 259: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets the firewall notifyyou when a programattempts to access theInternet. You can thenallow or block Internetaccess for the program.

In some instances, suchas when you watch amovie, you might prefernot to be alerted with anymessages. In such cases,you can turn onAutomatic ProgramControl. Norton 360 doesnot prompt you with anyfirewall alerts in thisstate.

The firewall notifies youonly if you have changedthe General Settingsoptions of Smart Firewallfrom their default,recommended settings.

Respond to alerts

Adding a program to Firewall settings

You can add programs to Firewall settings to controltheir ability to access the Internet. Manually configuredFirewall settings for programs override any settingsthat Automatic Program Control makes. However,Symantec recommends you to retain the settings thatAutomatic Program Control makes as and when yourun your programs.

w Firewall settings for programs are not migrated fromprevious versions of Norton 360. If you want to restoreany programs that you manually added in the previousversion, you must add them again in the currentversion.

259Keeping secure on the InternetAbout the Smart Firewall

Page 260: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To add a program to Firewall settings

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the Program Rules tab, click Add.

4 In the Select a program dialog box, browse to theexecutable file for the program that you want toadd.

5 Click Open.

6 In the Security Alert window, analyze thereputation information of the program.Norton 360 fetches and displays the reputationinformation and the recommended access setting.

Keeping secure on the InternetAbout the Smart Firewall

260

Page 261: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

7 In the Options drop-down list, select the access levelthat you want this program to have.Your options are:

Allow all access attemptsby this program.

Allow Always

Deny all access attemptsby this program.

Block Always

Create the rules thatcontrol how this programaccesses the Internet.

You can set the followingcriteria for a rule:

Manually configure

1 Action

1 Connections

1 Computers

1 Communications

1 Advanced

1 Description

If you select this option,you must follow theinstructions in the wizardthat appears andconfigure the rule.

8 Click OK.

Customizing a program

After you use Norton 360 for a while, you might needto change the access settings for certain programs.

To customize a program

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

261Keeping secure on the InternetAbout the Smart Firewall

Page 262: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 On the ProgramRules tab, in the Program column,select the program that you want to change.

4 In the drop-down list next to the program that youwant to change, select the access level that you wantthis program to have. Your options are:

Allow all access attemptsby this program.

Allow

Deny all access attemptsby this program.

Block

Create the rules thatcontrol how this programaccesses the Internet.

Custom

5 Click Apply.

Removing a program

You can remove programs from Firewall settings ifnecessary.

The firewall settings for the programs are not migratedfrom previous versions of Norton 360. If you removedany programs in the previous version and do not wantthem in the current version, you must remove themagain.

To remove a program from Firewall settings

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the ProgramRules tab, in the Program column,select the program that you want to remove.

4 Click Remove.

5 In the Confirmation dialog box, click Yes.The confirmation dialog box appears only when theAutomatic Program Control option is turned off.

Keeping secure on the InternetAbout the Smart Firewall

262

Page 263: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

6 Click Apply.

Adding Traffic rules and Program rulesFirewall settings automatically create most of thefirewall rules that you need. You can add custom rulesif necessary.

w Only experienced users should create their own firewallrules.

You can add the following types of firewall rules:

1 Traffic rules

1 Program rules

To add a Traffic rule

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the Traffic Rules tab, click Add.

4 Follow the instructions in the Add Rule wizard.

To add a Program rule

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the ProgramRules tab, in the Program column,select the program to which you want to add a rule.

4 Click Modify.You can also use the Access drop-down list next tothe program to modify the access level for theprogram. Accordingly, Smart Firewall modifies orcreates the relevant rule for the program.

5 In the Rules window, click Add.

6 Follow the instructions in the Add Rule wizard.

7 In the Rules window, click OK.

Using the Add Rule Wizard

The AddRule Wizard leads you through the steps thatare necessary to create firewall rules.

263Keeping secure on the InternetAbout the Smart Firewall

Page 264: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To use the Add Rule Wizard

1 Open the Add Rule Wizard by creating a Trafficrule or a Program rule.

Keeping secure on the InternetAbout the Smart Firewall

264

Page 265: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

2 In the first panel of the AddRuleWizard, select theaction that you want for this rule. Your options are:

Allow communication ofthis type.

Allow

For example, consider aTraffic rule with thefollowing criteria: allinbound connectionsfrom Internet address192.168.1.1 through port8080. When you selectAllow, Smart Firewallallows all connectionsthat satisfy the criteria ofthis Traffic rule.

Prevent communicationof this type.

Block

For example, consider aTraffic rule with thefollowing criteria: allinbound connectionsfrom Internet address192.168.1.1 through port8080. When you selectBlock, Smart Firewallblocks all connectionsthat satisfy the criteria ofthis Traffic rule.

265Keeping secure on the InternetAbout the Smart Firewall

Page 266: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Monitor

Keeping secure on the InternetAbout the Smart Firewall

266

Page 267: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Update the Firewall –Activities category in theevent log each time thatcommunication of thistype takes place. Thisoption lets you monitorhow often this firewallrule is used. Norton 360notifies you every timethat the traffic matchingthe monitor rule criteriapasses through yourcomputer. You can usethe links in thesenotifications to view thelogs. You can view theevent log under Firewall– Activities category inthe Security Historywindow.

Norton 360 createsseparate action rules toallow or block theprograms that have onlyaMonitor rule associatedwith them. The Monitorrule must be of higherorder than the action rulefor successful log entry ofthe network event that isrelated to the program.

The monitor rule only logsthe traffic events in theSecurity Historywindow.You need to createanother Allow or Blockrule to handle thenetwork traffic.

You can monitor andallow or block the trafficby enabling the Create a

267Keeping secure on the InternetAbout the Smart Firewall

Page 268: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Security History logentry option in the AddRule Wizard or theModify Rule Wizard.

3 Click Next.

4 Select the type of connection for the rule. Youroptions are:

The rule applies tooutbound connectionsfrom your computer toanother computer.

Connections to other computers

The rule applies toinbound connectionsfrom another computer toyour computer.

Connections from othercomputers

The rule applies toinbound and to outboundconnections.

Connections to and from othercomputers

Keeping secure on the InternetAbout the Smart Firewall

268

Page 269: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

5 Click Next, and then select the computers that applyto the rule. Your options are:

The rule applies to allcomputers.

Any computer

This rule applies only tocomputers in the localsubnet.

Any computer in the localsubnet

Anorganization’snetworkis divided into subnets tofacilitate efficientInternet communications.A subnet represents all ofthe computers in thesame LAN.

269Keeping secure on the InternetAbout the Smart Firewall

Page 270: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The rule applies only tothe computers, sites, ordomains that you specify.

You can specify thenames and addresses ofcomputers that apply tothe rule. The details ofthe specified computersappear in the list. You canalso remove computersfrom the list.

When you select thisoption, the Add optionbecomes available. Whenyou clickAdd, Norton 360displays the Networkingdialog box in which youcan specify individualcomputers, a range ofcomputers, or specify allcomputers on a subnet ornetwork.

You can use the Addoption or the Removeoption to add or removea computer.

Only the computers and siteslisted below

Keeping secure on the InternetAbout the Smart Firewall

270

Page 271: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

6 Click Next, and then select the protocols for therule. Your options are:

The rule applies to TCP(Transmission Control

TCP

Protocol)communications.

The rule applies to UDP(User Datagram Protocol)communications.

UDP

The rule applies to TCPand to UDPcommunications.

TCP and UDP

The rule applies to ICMP(InternetControlMessage

ICMP

Protocol)communications.

This option is availableonly when you add aTraffic rule, modify aTraffic rule, or modify aProgramrule that handlesICMP traffic.

The rule applies toICMPv6 (Internet Control

ICMPv6

Message Protocol forInternet Protocol version6) communications.

This option is availableonly when you add aTraffic rule, modify aTraffic rule, or modify aProgramrule that handlesICMPv6 traffic.

271Keeping secure on the InternetAbout the Smart Firewall

Page 272: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The rule applies to allsupported protocols.

When you select thisoption, you cannotspecify the types ofcommunications or portsthat apply to the rule.

All

7 Select the ports for the rule. Your options are:

The rule applies tocommunications that useany port.

All types of communication (allports, local and remote)

The rule applies to theports that you specify.You can specify the portsby selecting from thelisted ports or by addingspecific ports or portranges.

Only communications thatmatch all types and ports listedbelow

w If you select ICMPor ICMPv6 protocol, youcan specify thecommands. To do so,select a command fromthe list of knowncommandsor add specificcommands or commandranges.

When you select thisoption, the Add optionbecomes available. Youcan use theAdd option orthe Remove option tospecify or remove a portor a command.

Keeping secure on the InternetAbout the Smart Firewall

272

Page 273: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

8 Click Next.

9 Check Create a Security History log entry if youwant Norton 360 to create an entry in the firewallevent log.Norton 360 creates an entry when a networkcommunication event matches this rule. You canview the event log in the Security History windowunder Firewall – Activities. If you selected theMonitor option in the Action window, then theCreate a Security History log entry option isautomatically checked. You cannot uncheck the boxto turn off this option as it is the default setting.

10 Check Apply this rule if you want to apply this ruleto IPv6 NAT Traversal traffic.

11 Click Next, and then, in the text box, type a namefor this rule.

12 Click Next, and then review the new rule settings.

13 Click Finish.

14 When you have finished adding rules, click OK.

Modifying Traffic rules and Program rulesYou can change an existing firewall rule if it does notfunction the way that you want. You can use the Modifyoption to change the settings of an existing firewallrule. When you change a rule, the firewall uses the newcriteria of the modified rule to control network traffic.

You cannot modify some of the default rules that areread-only. However, you can view the settings of theserules by using the View option.

To modify a Traffic rule

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the Traffic Rules tab, select the rule that youwant to change.

4 Click Modify.

273Keeping secure on the InternetAbout the Smart Firewall

Page 274: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

5 In the Modify Rule window, make the necessarychanges to modify any aspect of the rule.

6 When you have finished changing the rule, clickOK.

To modify a Program rule

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the ProgramRules tab, select the program thatyou want to change.

4 Click Modify.You can also use the Access drop-down list next tothe program to modify the access level for theprogram. Accordingly, Smart Firewall modifies orcreates the relevant rule for the program.

5 In the Rules window, select the rule that you wantto change.

6 Click Modify.

7 In the Modify Rule window, make the necessarychanges to modify to change any aspect of the rule.

8 When you have finished changing the rule, clickOK.

9 In the Rules window, click OK.

Changing the order of firewall rulesEach list of firewall rules is processed from the topdown. You can adjust how the firewall rules areprocessed by changing their order.

w Do not change the order of the default Traffic rulesunless you are an advanced user. Changing the orderof default Traffic rules can affect firewall functionalityand reduce the security of your computer.

To change the order of Traffic rules

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

Keeping secure on the InternetAbout the Smart Firewall

274

Page 275: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 On the Traffic Rules tab, select the rule that youwant to move.

4 Do one of the following:

1 To move this rule before the rule above it, clickMove Up.

1 To move this rule after the rule below it, clickMove Down.

5 When you are done moving the rules, click Apply.

To change the order of Program rules

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the ProgramRules tab, select the program thatcontains the rule that you want to move.

4 Click Modify.

5 In the Rules window, select the rule that you wantto move.

6 Do one of the following:

1 To move this rule before the rule above it, clickMove Up.

1 To move this rule after the rule below it, clickMove Down.

7 When you are done moving the rules, click OK.

8 In the Firewall settings window, click Apply.

Turning off a Traffic rule temporarilyYou can temporarily turn off a Traffic rule if you wantto allow specific access to a computer or a program.You must remember to turn on the rule again whenyou are done working with the program or computerthat required the change.

w You cannot turn off some of the default firewall rulesthat appear in the list. You can only view the settingsof these rules by using the View option.

275Keeping secure on the InternetAbout the Smart Firewall

Page 276: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To turn off a Traffic rule temporarily

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the Traffic Rules tab, uncheck the box next tothe rule that you want to turn off.

4 Click Apply.

Allowing a blocked programSometimes the Norton 360 firewall blocks certainprograms from accessing the Internet. Such programsmight include certain streaming-media programs,network games, or custom business applications thatare provided by your employer. If you know that theprogram's Internet activity is not a threat to yoursecurity, you can unblock the program's Internetaccess.

To allow a blocked program

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the ProgramRules tab, select the program thatyou want to allow access to the Internet.

4 In the Access drop-down list for the program entry,click Allow.

5 Click Apply.

To allow a blocked program from the Security Historywindow

1 In the Norton 360 main window, click Tasks.

2 In the Tasks window, under General Tasks, clickCheck Security History.

3 In the Security History window, in the Showdrop-down list, select Firewall - Activities.

4 Select the firewall activity that is associated withthe blocked program.

5 Click More Details.

Keeping secure on the InternetAbout the Smart Firewall

276

Page 277: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

6 In the SecurityHistory-AdvancedDetails window,under Actions, click Allow.

Removing a firewall ruleYou can remove some of the firewall rules if necessary.However, you cannot modify some of the default Trafficrules that appear in the list. You can view the settingsof these rules by using the View option.

w Do not remove a default firewall rule unless you are anadvanced user. Removing a default firewall rule canaffect firewall functionality and reduce the security ofyour computer.

To remove a Traffic rule

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the Traffic Rules tab, select the rule that youwant to remove.

4 Click Remove.

5 In the Confirmation dialog box, click Yes.

To remove a Program rule

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the ProgramRules tab, in the Program column,select the program that contains the rule that youwant to remove.

4 Click Modify.To remove all the program rules that are associatedwith the program, click Remove.

5 In the Rules window, select the rule that you wantto remove.

6 Click Remove.

7 In the Confirmation dialog box, click Yes.

8 Click OK.

277Keeping secure on the InternetAbout the Smart Firewall

Page 278: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

About Norton Firewall DiagnosisThere may be times when firewall may block thenetwork traffic that you want to allow based on itsconfiguration settings. In such cases, you may haveissues in accessing the Internet, the Network, oranother computer to perform tasks such as sharingresources.

When you experience network connection problems,Norton Firewall acts quickly in identifying the causeof failure and provides its diagnosis. Norton 360displays the Firewall Diagnostics Wizard when youencounter network connection problems.

w Norton Firewall Diagnosis is available only in Windows7 and Windows 8.

The Wizard contains the problem diagnosis report thatis unique for different cases of network blocks. Forinstance, a network block can occur in any of thefollowing cases:

1 The one click option to stop all network traffic isactive

1 The uncommon protocol that is handling the trafficis blocked

1 The currently active firewall rule is conditioned toblock the traffic that you want to allow

1 The traffic has violated the process policy of thefirewall

1 The traffic has violated the traffic policy of thefirewall

1 The traffic comes from the restricted zone ofnetworks or computers

1 The traffic matches an Intrusion Prevention attacksignature

You can use the FirewallDiagnosticsWizard as a guideto troubleshoot the network connection problem byyourself.

Keeping secure on the InternetAbout the Smart Firewall

278

Page 279: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

For each case of network block, the Wizard containsthe firewall’s analysis of the cause and the possiblesolutions to fix the block.

Norton 360 recommends that you use the FirewallDiagnostics Wizard to remove any type of block. Thesolutions in the Wizard let you analyze the issue andtake a suitable action to resolve the problem.

Using the Wizard to troubleshoot the problem has thefollowing advantages:

1 It automatically tries to fix the problem by itself

1 It lets you modify the settings that are related tothe block

1 It lets you view the log details related to the networkblock event

1 It provides you the option to turn off firewall as thelast means to resolve the issue

About Reputation FirewallThe Reputation Firewall feature lets Norton 360 to takefirewall decisions based on information on thetrust-worthiness of programs and running processesthat access the network. It provides the reputationinformation in the firewall alerts. Firewall alerts notifyyou of connection attempts from other computers andby programs on your computer to connect to theInternet or other computers. You can use the reputationinformation in the firewall alerts to make definitedecisions on whether to allow or block communicationattempts of networking applications.

In addition, you can identify any suspicious programsor vulnerable programs that attempt to access yourcommunication network.

When Automatic Program Control is set to Aggressiveor Automatic, Norton 360 automatically configuresInternet access settings for all Web-enabled programsthe first time they run. When a program attempts toaccess Internet for the first time, Automatic ProgramControl creates rules for it.

279Keeping secure on the InternetAbout the Smart Firewall

Page 280: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

w Automatic Program Control configures network accessonly for the versions of programs that Symantecrecognizes as safe. Norton 360 blocks any infectedprogram or process that attempts to connect to theInternet.

However, if you have turned off Automatic ProgramControl, Norton 360 displays firewall alerts each timea program or process attempts to access the network.You must manually specify the access settings in thefirewall alerts for all inbound traffic and outboundtraffic. You can use the reputation details that appearin the left pane in the firewall alert to make yourdecision.

To learn more about the reputation details in thefirewall alerts, See “About the reputation informationin firewall alerts” on page 280.

About the reputation information in firewall alerts

Firewall alerts notify you of connection attempts fromother computers and of attempts by programs on yourcomputer to connect to other computers. Thereputation details in the firewall alerts help you makemore definite decisions on whether to allow or blockcommunication attempts of networking applications.

You can use the reputation details to determine thetrust-worthiness of programs and running processeson your computer that access the network. Thereputation-based security technology providesreputation ratings for files on the Internet based onthe information that is collected from Nortoncustomers.

Norton 360 obtains specific information such as filename and hash key about the file and sends thisinformation to the Symantec server. Symantec analyzesthe file information and provides a trust level for thefile. The Symantec server sends back the reputationinformation to your computer. Based on the reputationinformation of the program, you can allow or block theinbound traffic or outbound traffic. If any of the file is

Keeping secure on the InternetAbout the Smart Firewall

280

Page 281: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

suspicious or vulnerable, Norton 360 assigns Poor orBad trust level.

w Your computer must be connected to the Internet toaccess the latest reputation information that Symanteccollects. If your computer is not connected to theInternet, Norton 360 uses the reputation informationthat is available locally.

281Keeping secure on the InternetAbout the Smart Firewall

Page 282: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

In the left pane of the firewall alerts, you can find thefollowing reputation information:

Shows the stability rating ofthe file on your computer.

The stability rating dependson how frequently theprogram crashes. Thedifferent stability ratings areas follows:

1 Reliable

Indicates that theprogram is reliable.

1 Stable

Indicates that theprogram is comparativelystable. However, itcrashes sometimes.

1 Slightly Unstable

Indicates that theprogram is slightlyunstable.

1 Unstable

Indicates that theprogram is unstable.

1 Very Unstable

Indicates that theprogram frequentlycrashes.

1 Unknown

Indicates that the crashhistory of the program isnot known.

w Stability ratings varydepending upon youroperating system.

Stability

Keeping secure on the InternetAbout the Smart Firewall

282

Page 283: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Shows the user prevalence ofthe file. This data is based onthe information that millionsof Norton Community Watchcustomers shared andSymantec's researchanalysis.

The different categories are:

1 Very Few Users

Indicates that the file hasvery low user prevalence.

1 Few Users

Indicates that the file hasaverage user prevalence.

1 Many Users

Indicates that the file hashigh user prevalence.

Prevalence

Indicates the age of the filebased on the data thatmillions of NortonCommunity Watch customersshared and Symantec'sresearch analysis.

Age

283Keeping secure on the InternetAbout the Smart Firewall

Page 284: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Shows the trust level of thefile.

Symantec assigns thefollowing trust levels:

1 Norton Trusted -Indicates the file that isNorton Trusted.

1 Good - Symantec has highindications that the file istrusted.

1 Unproven - Symantecdoes not have enoughinformation about the fileto assign a trust level tothe file.

The file is neither safe norunsafe.

1 Poor - Symantec has onlya few indications that thefile is not trusted.

1 Bad - Symantec has veryhigh indications that thefile is not trusted.

This file is suspicious andcan harm your computer.

If the Security Alert windowdisplays Poor or Badreputation, Symantecrecommends that you selectthe Terminate or BlockAlways option from theOptions drop-down list. Thisaction terminates or blocksall access attempts by theprogram or process. Thisprogram or process issuspicious and can harm yourcomputer.

Trust Level

Keeping secure on the InternetAbout the Smart Firewall

284

Page 285: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

About Intrusion PreventionIntrusion Prevention scans all the network traffic thatenters and exits your computer and compares thisinformation against a set of attack signatures. Attacksignatures contain the information that identifies anattacker's attempt to exploit a known operating systemor program vulnerability. Intrusion Prevention protectsyour computer against most common Internet attacks.

For more information about the attacks that IntrusionPrevention blocks, go to the following URL:

http://www.symantec.com/business/security_response/attacksignatures

If the information matches an attack signature,Intrusion Prevention automatically discards the packetand breaks the connection with the computer that sentthe data. This action protects your computer from beingaffected in any way.

Intrusion Prevention scanning of every request fromall the devices that access your computer increases thescan time which slows down the network speed of yourcomputer. You can reduce the scan time and improvethe network speed of your computer by excluding thetrusted devices from Intrusion Prevention scanning.If you are sure that a device on your network is safe,you use the EditDeviceTrustLevel window to changethe trust level of the device to FullTrust. You can thenselect the ExcludefromIPSscanning option to excludethese trusted devices from Intrusion Prevention scan.

Intrusion Prevention relies on an extensive list ofattack signatures to detect and block suspiciousnetwork activity. Norton 360 runs LiveUpdateautomatically to keep your list of attack signatures upto date. If you do not use Automatic LiveUpdate, youshould manually run LiveUpdate once a week.

285Keeping secure on the InternetAbout Intrusion Prevention

Page 286: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Turning off or turning on Intrusion Preventionnotifications

You can choose whether you want to receivenotifications when Intrusion Prevention blockssuspected attacks. Whether or not you receivenotifications, Intrusion Prevention activities arerecorded in Security History. The Security Historyentries include information about the attackingcomputer and information about the attack.

You can choose whether you want to receivenotifications when Intrusion Prevention blockssuspected attacks based on a particular signature.

To turn off or turn on Intrusion Prevention notifications

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the Notifications row, doone of the following:

1 Move the On/Off switch to the right to the Offposition.

1 Move the On/Off switch to the left to the Onposition.

4 In the Settings window, click Apply.

To turn off or turn on an individual Intrusion Preventionnotification

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionSignaturesrow, click Configure.

4 In the IntrusionSignatures window, click an attacksignature, and then click Properties.

5 In the Signature Properties window, uncheck orcheck Notify me when this signature is detected.

Keeping secure on the InternetAbout Intrusion Prevention

286

Page 287: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

6 Click OK.

7 In the Intrusion Signatures window, click OK.

8 In the Settings window, click Apply.

Excluding or including attack signatures in monitoringIn some cases, benign network activity may appearsimilar to an attack signature. You may receiverepeated notifications about possible attacks. If youknow that the attacks that trigger these notificationsare safe, you can create exclusion for the attacksignature that matches the benign activity.

Each exclusion that you create leaves your computervulnerable to attacks.

If you have excluded the attack signatures that youwant to monitor again, you can include them in the listof active signatures.

To exclude attack signatures from being monitored

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionSignaturesrow, click Configure.

4 In the Intrusion Signatures window, uncheck theattack signatures that you want to exclude.

5 Click OK.

To include the attack signatures that were previouslyexcluded

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionSignaturesrow, click Configure.

4 In the Intrusion Signatures window, check theattack signatures that you want to include.

287Keeping secure on the InternetAbout Intrusion Prevention

Page 288: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

5 Click OK.

Turning off or turning on AutoBlockWhen an attack is detected from a computer, the attackis automatically blocked to ensure that your computeris safe. If a different attack signature is detected fromthe same computer, Norton 360 activates AutoBlock.The AutoBlock feature blocks all traffic between yourcomputer and the attacking computer for a specifictime period. During this period, AutoBlock also blocksthe traffic that does not match an attack signature.

w You can specify the period for which you want Norton360 to block the connections from attacking computers.By default Norton 360 blocks all traffic between yourcomputer and the attacking computer for a period of30 minutes.

AutoBlock stops traffic between your computer and aspecific computer. If you want to stop all traffic to andfrom your computer, you can use the Block AllNetwork Traffic option.

If AutoBlock blocks a computer or computers that youneed to access, you can turn off AutoBlock.

To turn off or turn on AutoBlock

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionAutoBlockrow, click Configure.

4 In the Intrusion AutoBlock window, underAutoBlock, do one of the following:

1 To turn off Intrusion AutoBlock, click Off.

1 To turn on Intrusion AutoBlock, click On(Recommended), and then in the AutoBlockattacking computers for drop-down list, selecthow long you want to turn on AutoBlock.

5 Click OK.

Keeping secure on the InternetAbout Intrusion Prevention

288

Page 289: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Unblocking AutoBlocked computers

In some cases, benign network activity can appear tobe similar to an attack and AutoBlock blocks thenetwork activity automatically to ensure that yourcomputer is safe. The list of computers that AutoBlockhas currently blocked may include the computer thatyou should be able to communicate with.

If a computer that you need to access appears on thelist of blocked computers, you can unblock it. You maywant to reset your AutoBlock list if you have changedyour protection settings. To reset the AutoBlock list,you can unblock all of the computers that are on thelist at one time.

To unblock AutoBlocked computers

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionAutoBlockrow, click Configure.

4 In the Intrusion AutoBlock window, underComputers currently blocked by AutoBlock, doone of the following:

1 To unblock one computer, select its IP address,and then click Unblock.

5 Click OK.

Permanently blocking a computer that has been blocked byAutoBlock

You can permanently block a computer that has beenblocked by AutoBlock. The permanently blockedcomputer is removed from the AutoBlock list and addedas a Restricted computer in the Network Security Mapof Home Networking.

289Keeping secure on the InternetAbout Intrusion Prevention

Page 290: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To permanently block a computer that has been blockedby AutoBlock

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionAutoBlockrow, click Configure.

4 In the Intrusion AutoBlock window, underComputers currently blockedbyAutoBlock, clickthe computer that you want to block permanently.

5 Under the Action column, select Restrict.

6 Click OK.

Turning off and turning on Browser ProtectionYou can choose whether you want to protect your Webbrowser by allowing Norton 360 to block unknownprograms from accessing your computer.

By default, the Browser Protection option is turnedon. In this case, Norton 360 proactively blocks new orunknown malware programs before they attack yourcomputer. By protecting your Web browser, Norton360 secures your sensitive information and preventsthe attackers from controlling your system remotely.This feature checks for browser vulnerabilities inInternet Explorer 7.0 or later, Chrome 17.0 or later, orFirefox 10.0 or later browsers.

w Always keep the Browser Protection setting turned onto protect your Web browser against attacks bymalicious Web sites.

To turn off or turn on Browser Protection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

Keeping secure on the InternetAbout Intrusion Prevention

290

Page 291: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 On the Intrusion and Browser Protection tab, inthe BrowserProtection row, do one of the following:

1 To turn off Browser Protection, move the On/Offswitch to the right to the Off position.

1 To turn on Browser Protection, move the On/Offswitch to the left to the On position.

4 Click Apply.

5 If you turned off Browser Protection, in theProtection Alert dialog box, in the Select theduration drop-down list, select how long you wantto turn off Browser Protection.

6 Click OK.

About Intrusion Prevention exclusion listThe Intrusion Prevention System in Norton 360 scansall the network traffic that enters and exits yourcomputer. When a device on your network requestsaccess to your computer, Intrusion Prevention scansthis request to ensure that it is not a virus attack. Ifthe information matches an attack signature, IntrusionPrevention blocks the traffic from the suspicious deviceand protects your computer. Scanning every requestfrom all the devices that access your computerincreases the scan time which slows down the networkspeed of your computer.

If you are sure that a device on your network is safe,you can change the trust level of the device to FullTrust. You can configure the trust level of a deviceusing the Network Security Map. You can exclude thesetrusted devices from Intrusion Prevention scan.Excluding Full Trust devices from the IntrusionPrevention scan saves the scan time and improves thenetwork speed of your computer. When you exclude adevice that is set to Full Trust, Norton 360 does notscan any information that is received from this device.The Full Trust devices that are excluded from IntrusionPrevention scan are added to Intrusion Preventionexclusion list.

291Keeping secure on the InternetAbout Intrusion Prevention

Page 292: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

When a device on your network attempts to infect yourcomputer, AutoBlock stops all access requests fromthis device. If you add this device to the IntrusionPrevention exclusion list, Norton 360 removes thedevice from the exclusion list.

w Ensure that the IP address of the devices that are addedto Intrusion Prevention exclusion list never changes.

If you find that any of the devices that you excludedfrom the Intrusion Prevention scan is infected, you canpurge the saved exclusion list. When you purge theexclusion list, Norton 360 removes all the IPS excludeddevices from the exclusion list.

Removing all devices from Intrusion Preventionexclusion list

If you are sure that a device on your network is safe,you can change the trust level of the device to FullTrust. You can then select the Exclude from IPSscanning option to exclude these trusted devices fromIntrusion Prevention scan. Excluding Full Trust devicesfrom Intrusion Prevention scan saves the scan timeand improves the network speed of your computer.When you exclude a Full Trust device from IntrusionPrevention scan, Norton 360 does not scan anyinformation that is received from this device. The FullTrust devices that are excluded from IntrusionPrevention scan are added to Intrusion Preventionexclusion list.

If you find that any of the devices that you excludedfrom Intrusion Prevention scan is infected, you canpurge the saved exclusion list and remove all thedevices.

You can purge the saved exclusion list under thefollowing circumstances:

1 Any of the devices that you excluded from IntrusionPrevention scan is infected.

1 Any of the devices that you excluded from IntrusionPrevention scan attempts to infect your computer.

Keeping secure on the InternetAbout Intrusion Prevention

292

Page 293: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 Your home network is infected.

When a device on your network attempts to infect yourcomputer, AutoBlock stops all the access requests fromthis device. If you add this device to the IntrusionPrevention exclusion list, Norton 360 removes thedevice from the exclusion list.

When you remove all the devices from the savedexclusion list, Intrusion Prevention scans every requestfrom all the devices that access your computer.

To remove all the devices from the Intrusion Preventionexclusion list

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 Click the Intrusion and Browser Protection tab.

4 Under Intrusion Prevention, in the Exclusion Listrow, click Purge.

5 In the confirmation dialog box, click Yes.

6 In the Firewall settings window, click Apply.

About Download InsightDownload Insight provides information about thereputation of any executable file that you downloadfrom the supported portals. The reputation detailsindicate whether the downloaded file is safe to install.You can use these details to decide the action that youwant to take on the file.

Some of the supported portals are:

1 Internet Explorer (Browser)

1 Opera (Browser)

1 Firefox (Browser)

1 Chrome (Browser)

1 AOL (Browser)

1 Safari (Browser)

293Keeping secure on the InternetAbout Download Insight

Page 294: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 Yahoo (Browser)

1 MSN Explorer (Browser, E-mail & Chat)

1 QQ (Chat)

1 ICQ (Chat)

1 Skype (Chat)

1 MSN Messenger (Chat)

1 Yahoo Messenger (Chat)

1 Limewire (P2P)

1 BitTorrent (P2P)

1 Thunder (P2P)

1 Vuze (P2P)

1 Bitcomet (P2P)

1 uTorrent (P2P)

1 Outlook (E-mail)

1 Thunderbird (E-mail)

1 Windows Mail (E-mail)

1 Outlook Express (E-mail)

1 FileZilla (File Manager)

1 UseNext (Download Manager)

1 FDM (Download Manager)

1 Adobe Acrobat Reader (PDF viewer)

Based on the type of portal you use to download yourfile, Norton 360 does one of the following:

1 Analyzes the file based on its reputation detailswhen the download is complete.

1 Analyzes the file based on its reputation detailswhen the file is accessed.

Download Insight uses the file analysis results toprovide you the reputation details of the file. The basicreputation levels of the files are good, bad, unproven,

Keeping secure on the InternetAbout Download Insight

294

Page 295: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

and poor. Based on the reputation levels, the files canbe broadly classified as follows:

Includes the files that are eitherNorton trusted or User trusted.

Safe files have good reputationlevels. These files do not harmyour computer. By default,Auto-Protect allows theexecution of the safe files.

Safe

Includes the files that Norton360 identifies as a security riskor a threat.

Unsafe files are characterized bybad or poor reputation levelsand Norton 360 removes themfrom your computer.

Unsafe

Includes the files that areneither safe nor unsafe.

Unknown files have unprovenreputation. These files mightharm your computer. In the caseof an unknown file, DownloadInsight notifies you that it isunsure of the reputation level ofthe file. You can use the ViewDetails link in the notificationsto view more details of the file.

For unknown files, Norton 360lets you decide the action thatyou want to perform on the file.For example, you can run a file,stop the file from running, orremove the file from yourcomputer.

Unknown

295Keeping secure on the InternetAbout Download Insight

Page 296: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

By default, Download Insight lets you install safe files.For files of unknown reputation levels, DownloadInsight prompts you to select an action that you wantto perform on the file. In case of an unsafe file,Download Insight informs you that Norton 360 hasdetected the file as a threat and has removed the file.

Based on the reputation details that the DownloadInsight notifications provide for the files that needattention, you can take an action on the file. TheDownloadInsight window provides the various optionsthat let you select an action. The options that appearin the window vary depending on the reputation levelof the downloaded file. The following are some of theoptions that are available in this window:

Lets you install the executableprogram.

Run this program

Lets you cancel the installationof the executable program.

Cancel run

Lets you remove the file fromyour computer.

Remove this file frommysystem

Security History logs details of all events thatDownload Insight processes and notifies. It alsocontains information about the safety level of the fileand the action that you take on the file, if any. You canview these details in the Download Insight categoryin Security History.

When you turn off Auto-Protect, Norton 360automatically turns off Download Insight. In this case,your computer is not adequately protected fromInternet threats and security risks. Therefore, ensurethat you always keep Auto-Protect turned on to protectyour computer from security risks.

When Silent Mode is turned on, Norton 360 suppressesthe Download Insight notifications.

Keeping secure on the InternetAbout Download Insight

296

Page 297: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Turning off or turning on Download IntelligenceDownload Insight protects your computer against anyunsafe file that you may run or execute after youdownload it using a supported Web browser. By default,the DownloadIntelligence option is turned on. In thiscase, Download Insight notifies you about thereputation levels of any executable file that youdownload. The reputation details that Download Insightprovides indicate whether the downloaded file is safeto install.

There may be times when you want to turn offDownload Insight. For example, if you want todownload an unsafe file. In this case, you must turn offDownload Insight so that Norton 360 lets you downloadthe file and does not remove it from your computer.

You can use the DownloadIntelligence option to turnoff or turn on Download Insight.

To turn off Download Intelligence

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the Intrusion and Browser Protection tab, inthe Download Intelligence row, move the On/Offswitch to the right to the Off position.

4 In the Settings window, click Apply.

5 In the Security Request dialog box, in the Selectthe duration drop-down list, select how long youwant to turn off Download Insight, and then clickOK.

6 In the Settings window, click Apply, and then clickClose.

To turn on Download Intelligence

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

297Keeping secure on the InternetAbout Download Insight

Page 298: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 On the Intrusion and Browser Protection tab, inthe Download Intelligence row, move the On/Offswitch to the left to the On position.

4 In the Settings window, click Apply, and then clickClose.

Configuring the Download Insight Notifications optionYou can use the DownloadInsightNotifications optionto choose when you want Download Insight to displaynotifications.

By default, the DownloadInsightNotifications optionis set to On. Based on the type of portal you use todownload your file, Norton 360 does one of thefollowing:

1 Notifies you each time when you download anexecutable file.

1 Notifies you only when you download a file that isinfected with a local virus identification. If the filethat you download is infected with a cloud virusidentification, Norton 360 removes the file fromyour computer and notifies you with the threatdetails.

When the Download Insight Notifications option isset to RisksOnly, Download Insight notifies only whenyou download an infected or a suspicious executablefile.

Setting the Download Insight Notifications to RisksOnly does not turn off analysis of all the otherexecutable files that you download. Whether or notyou receive notifications of all files, Security Historykeeps a record of all the Download Insight activities.You can review the summary of the Download Insightalerts and notifications in Security History.

To configure the Download Insight Notifications option

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

Keeping secure on the InternetAbout Download Insight

298

Page 299: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 On the IntrusionandBrowserProtection tab, underDownload Intelligence, in the Download InsightNotifications row, do one of the following:

1 To receive Download Insight notifications onlyfor the infected or the suspicious executable filesthat you download, move the DownloadInsightNotifications switch to the right to the RisksOnly position.

1 To receive Download Insight notifications forall files that you download, move the DownloadInsight Notifications switch to the left to theOn position.

4 In the Settings window, click Apply, and then clickClose.

Configuring the Download Insight Full Report optionThe Download Insight Full Report option lets youspecify when and for what type of file you want to beprompted to select a suitable action. For example, youcan specify the type of downloaded files for whichDownload Insight asks you to decide what to do withthe file and how frequently these prompts for a suitableaction must appear.

299Keeping secure on the InternetAbout Download Insight

Page 300: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can use the following options to configureDownload Insight Full Report:

When you set the DownloadInsight Full Report option toAlways, Download Insightprompts you for a suitable actionin case of safe and unknownfiles. In this case, the DownloadInsight window appearswhenever you try to launch anydownloaded file that has a safeor an unknown reputation score.In this window, you can viewdetails about the file and theoptions that let you select asuitable action for the file.

In the case of unsafe files,Norton 360 identifies them asthreats and removes them.

Always

Keeping secure on the InternetAbout Download Insight

300

Page 301: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

When you set the DownloadInsight Full Report option toUnproven Only, DownloadInsight prompts you to select asuitable action for unknown filesonly. In this case, the DownloadInsight window appearswhenever you try to launch anydownloaded file that has anunknown reputation score. Inthis window, you can viewdetails about the file and theoptions that let you select asuitable action for the file.

By default, theDownload InsightFull Report option is set toUnproven Only. In this case,Norton 360 allows the executionof the safe files withoutprompting you for a suitableaction. In the case of unsafefiles, Norton 360 identifies themas threat and removes them.

Unproven Only

301Keeping secure on the InternetAbout Download Insight

Page 302: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

When you set the DownloadInsight Full Report option toNever, Download Insight doesnot prompt you to select asuitable action for any type offile that you download. In thiscase, the Download Insightwindow does not appearwhenever you try to launch anydownloaded file.

In case of unsafe files, Norton360 identifies them as threatand removes them.

The alert messages that yousuppress and the activity detailscan be reviewed at any time inSecurity History.

Never

To configure the Download Insight Full Report option

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the IntrusionandBrowserProtection tab, underDownload Intelligence, in the Download InsightFull Report row, do one of the following:

1 If you want Download Insight to prompt you fora suitable action in case of safe and unknownfiles, move the Download Insight Full Reportswitch to the Always position.

1 If you want Download Insight to prompts you toselect a suitable action for unknown files only,move the Download InsightFullReport switchto the Unproven Only position.

1 If you do not want Download Insight to promptyou to select a suitable action for any type of file,move the Download InsightFullReport switchto the Never position.

Keeping secure on the InternetAbout Download Insight

302

Page 303: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

4 In the Settings window, click Apply, and then clickClose.

Turning on or turning off Alert on Poor StabilityWhen you turn on the Alert on Poor Stability option,Download Insight prompts you to select a suitableaction when you try to download an unstable file.

When you set the DownloadInsightFullReport optionto Never, Download Insight does one of the following:

1 Does not prompt you to select a suitable action forany type of file that you download if the Alert onPoor Stability option is turned off. The DownloadInsight window does not appear whenever you tryto open any downloaded file.

1 Prompts you to select a suitable action when youtry to download an unstable file if the AlertonPoorStability option is turned on. Norton 360 identifiesunsafe files as security threat and removes them.

By default, the AlertonPoorStability option is turnedoff.

To turn on or turn off Alert on Poor Stability

1 In the Norton 360 main window, click Settings.

2 On the IntrusionandBrowserProtection tab, underDownload Intelligence, in the Alert on PoorStability row, do one of the following:

1 To turn on Alert on Poor Stability, move theOn/Off switch to the left to the On position.

1 To turn off Alert on Poor Stability, move theOn/Off switch to the right to the Off position.

3 Click Apply, and then click Close.

About Norton AntiSpamNorton AntiSpam lets you categorize the emailmessages that you receive in your email programs intospam email and legitimate email. It filters legitimate

303Keeping secure on the InternetAbout Norton AntiSpam

Page 304: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

email into the Inbox folder and spam email into theJunk folder or the Norton AntiSpam folder.

Norton AntiSpam uses Symantec enterprise-class,spam-filtering technology to classify the spam emailmessages from legitimate email messages. NortonAntiSpam uses a real-time filter delivery mechanismand filters email messages using various local filtersat different levels. The local filters classify the emailmessages as spam or legitimate. If the local filtersclassify the email message as legitimate, NortonAntiSpam collects information such as signature andURL hashes of the email message. Norton AntiSpamthen sends this information to the Symantec Webserver for additional analysis.

When the email message is classified as spam, NortonAntiSpam changes the subject of the email messageand sends it to your email client. The email clientidentifies the change in the subject of the emailmessage and moves it to the Junk folder or the NortonAntiSpam folder.

The Norton AntiSpam local filters use Whitelisttechnique, Blacklist technique, and patented filteringtechnology to classify email messages as spam orlegitimate. For these filters to work efficiently, NortonAntiSpam requires antispam definition updates atregular intervals through LiveUpdate. These updatescontain signature information of spam and legitimateemail messages. The updates also contain any new rulethat Symantec creates to filter spam email messages.

Norton AntiSpam uses predefined email rules and theuser-defined Allowed List and Blocked List, to expeditethe scanning of email. It accepts email messages fromthe list of allowed email senders and blocks emailmessages from the list of blocked email senders.

Norton AntiSpam also automatically imports the listsof addresses from supported email programs duringthe initial integration. It helps you keep your list ofallowed and blocked email senders in sync with yourcurrent address books. When Norton AntiSpam imports

Keeping secure on the InternetAbout Norton AntiSpam

304

Page 305: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

the addresses from your Outlook address book orWindows address book, it also imports the addressesthat are available in the Safe Sender and the BlockedSender lists.

w Turning off Norton AntiSpam increases your exposureto receive unsolicited email messages. Always ensurethat Norton AntiSpam is turned on. It secures youremail client from unwanted online content.

You can review all the antispam statistics under theAntiSpam category in the Security History window.

About spam filtering featuresWith the increase in usage of email, many users receivea number of unwanted and unsolicited commercialemail messages that are known as spam. Not only doesspam make it difficult to identify valid email messages,but some spam contains offensive messages andimages.

Norton 360 provides several powerful features toreduce your exposure to unwanted online content.

Adds several options to the toolbar insupported email programs.

See “About your email programtoolbar” on page 308.

Integration withemail programs

305Keeping secure on the InternetAbout Norton AntiSpam

Page 306: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 Uses a user-defined address listto expedite the scanning of email.

1 Accepts all email messages fromsenders in the Allowed List.

1 Treats all email messages fromsenders in the Blocked List asspam.

1 Allows and blocks email messagesfrom entire domains as well asindividual email addresses.

See “About Norton AntiSpam settings”on page 539.

Allowed and BlockedLists

Automatically imports lists ofaddresses from supported emailprograms to keep your list of allowedemail senders and blocked emailsenders in sync.

See “Identifying authorized senders”on page 311.

Automatic import ofaddresses

Lets you query the Symantec Webservers to filter the spam emailmessages which the local filters failto classify as spam.

See “About Web Query” on page 316.

Web Query

Updates the copies of Symantec spamdefinition files automatically.

Automatedupdateofspam definitions

Configuring Client IntegrationThe Client Integration tab lists the supported emailprograms, or clients, that are installed on yourcomputer and their associated address books. Whenyou select an email program, Norton 360 adds a NortonAntiSpam drop-down list or a few options to thetoolbar of the supported email program. You can use

Keeping secure on the InternetAbout Norton AntiSpam

306

Page 307: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

the NortonAntiSpam drop-down list or the options toclassify the email messages as spam or legitimate. Youcan also use these options to empty the spam folderand to open the Settings window to configure theNorton AntiSpam settings. If your email program doesnot have a Junk folder, it also adds a Norton AntiSpamfolder in the folders area. You can use the NortonAntiSpam folder to sort and store spam messages.However, if your email client has a Norton AntiSpamfolder from the previous version of Norton 360, NortonAntiSpam uses the Norton AntiSpam folder and notthe Junk folder.

w The following email clients do not support clientintegration:

1 Outlook 2010 64-bit

1 Thunderbird

1 Windows Mail

When you classify an email message as spam orlegitimate, Norton AntiSpam lets you send themisclassified email message as feedback to Symantec.You can use the Feedback option to send themisclassified email message to Symantec for analysis.

You can also import the list of addresses that arepresent in the supported email program into the NortonAntiSpam Allowed List and Blocked List. NortonAntiSpam automatically adds the new email addressesfrom the address book of your supported email programonce in a day when your computer is idle. However, ifyou want to manually import addresses, use the Importoption in the Allowed List window.

When you open your email client, the welcome screenappears. If you do not want the welcome screen toappear in the future, check the Don't show this againoption before you click Close. Norton 360 notifies thesuccessful integration of Norton AntiSpam with youremail client.

Norton AntiSpam also automatically imports the listsof addresses from the supported email programs during

307Keeping secure on the InternetAbout Norton AntiSpam

Page 308: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

the initial client integration. It helps you keep your listof allowed and blocked email senders in sync with yourcurrent address books. When Norton AntiSpam importsthe addresses from your Outlook address book orWindows address book, it also imports the addressesthat are available in the Safe Sender and the BlockedSender lists.

Norton 360 supports Norton AntiSpam integrationwith the following email programs:

1 Microsoft Outlook 2002/2003/2007/2010

1 Outlook Express 6.0 or later

w Norton 360 supports only the 32-bit version ofMicrosoft Outlook 2010.

w After successful integration, Outlook Express restartsautomatically.

To configure Client Integration

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Client Integration tab, turn on or turn offthe programs with which you want NortonAntiSpam to integrate.

4 Select one or more address books to be importedautomatically into your Allowed List.

5 Click Apply to save the changes.

About your email program toolbar

Norton AntiSpam adds a drop-down list or a fewoptions to the toolbar of supported email programs.

Keeping secure on the InternetAbout Norton AntiSpam

308

Page 309: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can use the following options:

Marks the selected email as spam and movesthe email message into the Junk folder or theNorton AntiSpam folder.

When you reclassify an email message as spam,Norton 360 provides you the option to send themisclassified email message as feedback toSymantec. This option appears only if theFeedback option on the Client Integration tab,in the AntiSpam settings window, is set as AskMe.

When you reclassify an email message as spam,Norton 360 displays a message whether or notto add the sender's email address to the BlockedList. This message appears depending on theoption that you select in the drop-down listpresent at the bottom of the Blocked Listwindow.

This isSpam

Marks the selected email as allowed (not spam)and moves the email message into the Inbox.

When you reclassify an email message aslegitimate, Norton 360 provides you the optionto send the misclassified email message asfeedback to Symantec. This option appears onlyif the Feedback option on theClient Integrationtab, in the AntiSpam settings window, is set asAsk Me.

When you reclassify an email message aslegitimate, Norton 360 displays a messagewhether or not to add the sender's email addressto the Allowed List. This message appearsdepending on the option that you select in thedrop-down list present at the bottom of theAllowed List window.

This isnot Spam

Removes all email that has been placed in theJunk folder or the Norton AntiSpam folder.

EmptySpamFolder

309Keeping secure on the InternetAbout Norton AntiSpam

Page 310: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Displays the Norton AntiSpam settings sectionof the Norton 360 Settings window

OpenNortonAntiSpam

Setting Address Book ExclusionsWhen you add an email address to the Address BookExclusions list, Norton AntiSpam does not import theaddress into the Allowed List and Blocked List. If youdelete an email address from the Allowed List orBlocked List, Norton AntiSpam automatically adds theaddress to the Address Book Exclusions list. However,when you delete an email address that you manuallyadded to the Allowed List or Blocked List, NortonAntiSpam does not add the address to the Address BookExclusions list.

You cannot add a domain name to the Address BookExclusions list. When you delete a domain name fromthe Allowed List or Blocked List, Norton AntiSpam doesnot add the domain name to the Address BookExclusions list.

w You can specify Address Book Exclusions before youimport the address book. Add all email addresses tothe Address Book Exclusions list that you do not wantto import from the address book of your email program.

To add entries to the Address Book Exclusions list

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Filter tab, in the Address Book Exclusionsrow, click Configure.

4 In the AddressBookExclusions window, click Add.

5 In the AddEmailAddress dialog box, type the emailaddress.Optionally, type the name that corresponds to theemail address for easy identification.

6 Click OK to close the AddEmailAddress dialog box.

Keeping secure on the InternetAbout Norton AntiSpam

310

Page 311: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

7 Click OK to save and close the Address BookExclusions window.

To edit or delete entries in the Address Book Exclusionslist

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Filter tab, in the Address Book Exclusionsrow, click Configure.

4 In the AddressBookExclusions window, select theitem with which you want to work.

5 Do one of the following:

1 To edit an entry, click Edit to open the EditEmailAddress window, edit the details, and thenclick OK.

1 To delete an entry, click Remove.

6 Click OK to save and close the Address BookExclusions window.

Identifying authorized sendersIf you are sure that an email address or domain is safeand do not want Norton AntiSpam to block them, youcan add them to the Allowed List

When your computer is idle, Norton AntiSpamautomatically imports the address book entries andSafe Sender List entries once in a day.

If you have added a new supported email program, youcan import its address book manually to your AllowedList immediately or at any time. You can also addnames and domains to the Allowed List individually.

w Before you import the address book, you can specifyyour Address Book Exclusions. Norton AntiSpam doesnot import the email addresses that you add to theAddress Book Exclusions list.

To import an address book

1 In the Norton 360 main window, click Settings.

311Keeping secure on the InternetAbout Norton AntiSpam

Page 312: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Filter tab, in the Allowed List row, clickConfigure.

4 In the Allowed List window, click Import.

5 In the Allowed List window, click Apply.

6 Click OK.

To add entries to your Allowed List

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Filter tab, in the Allowed List row, clickConfigure.

4 In the Allowed List window, click Add.

5 In the Add Email Address dialog box, in theAddress Type drop-down list, select the addresstype.You can select one the following options.

1 Email

1 Domain

6 Do one of the following:

1 To add an email address, type the email addressthat you want to allow, and optionally, the nameof the sender.

1 To add a domain name, type the address of thedomain (for example, symantec.com), andoptionally, the name of the domain.

7 Click OK.

8 In the Allowed List window, click Apply.

9 Click OK

To edit or delete entries in the Allowed List

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

Keeping secure on the InternetAbout Norton AntiSpam

312

Page 313: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 On the Filter tab, in the Allowed List row, clickConfigure.

4 In the Allowed List window, select the item thatyou want to edit or delete.

5 Do one of the following:

1 To edit an entry, click Edit to open the EditEmail Address dialog box, edit the details, andclick OK.

1 To delete an entry, click Remove.

When you delete an entry that was imported,Norton AntiSpam automatically adds it to theAddress Book Exclusions list.

6 In the Allowed List window, click Apply.

7 Click OK.

Identifying senders of spamIf you do not want to receive any email messages froma specific address or domain, you can add it to theBlocked List. Norton AntiSpam marks all emailmessages from this address or domain as spam.

w Norton AntiSpam also automatically imports the listsof addresses that are available in the Blocked Senderlists of your email program into the Blocked List duringthe initial client integration or address book import.

Norton AntiSpam lets you type invalid email addressesto the Blocked List.

w Always add suspicious email addresses and domainsto the Blocked List, so that you do not receiveunsolicited email messages from such addresses ordomains.

To import addresses to the Blocked List

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Filter tab, in the Allowed List row, clickConfigure.

313Keeping secure on the InternetAbout Norton AntiSpam

Page 314: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

4 In the Allowed List window, click Import.

5 In the Allowed List window, click Apply.

6 Click OK.

To add entries to the Blocked List

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Filter tab, in the Blocked List row, clickConfigure.

4 In the Blocked List window, click Add.

5 In the Add Email Address dialog box, in theAddress Type drop-down list, select the addresstype.You can select one of the following:

1 Email

1 Domain

6 Do one of the following:

1 To add an email address, type the email addressthat you want to block, and the name of thesender.

1 To add a domain, enter the address of the domain(for example, symantec.com), and the name ofthe domain.

7 Click OK.

8 In the Blocked List window, click Apply.

9 Click OK.

To edit or delete entries in the Blocked List

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Filter tab, in the Blocked List row, clickConfigure.

4 In the Blocked List window, select the item withwhich you want to work.

Keeping secure on the InternetAbout Norton AntiSpam

314

Page 315: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

5 Do one of the following:

1 To edit an entry, click Edit to open the EditEmail Address dialog box, edit the details, andthen click OK.

1 To delete an entry, click Remove.

When you delete an entry that was imported,Norton AntiSpam automatically adds it to theAddress Book Exclusions list.

6 In the Blocked List window, click Apply.

7 Click OK.

Setting the Feedback optionEmail messages in the email client might sometimesget wrongly classified as spam or legitimate. TheFeedback option lets you send the misclassified emailmessage as feedback to Symantec for analysis.

w The Feedback option is available only when MicrosoftOutlook or Outlook Express is installed on yourcomputer.

To set the Feedback option

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

315Keeping secure on the InternetAbout Norton AntiSpam

Page 316: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 On the ClientIntegration tab, in the Feedback row,select any one from the following three options:

Automatically sends themisclassified email message toSymantec when you classify anemail message as spam orlegitimate

On

Prompts you before NortonAntiSpam sends themisclassified email message toSymantec when you classify anemail message as spam orlegitimate

Ask Me

Does not send the misclassifiedemail message to Symantec

Off

4 Click Apply.

5 Click Close.

About Web QueryWith the increase in usage of email, many users receivea number of unwanted and unsolicited commercialemail messages that are known as spam. Not only doesspam make it difficult to identify valid email messages,but some spam contains offensive messages andimages. The Web Query is a feature of Norton AntiSpamthat Norton 360 uses to classify the email messagesmore effectively.

An effective spam filtration is possible when each emailmessage that you receive is scanned through differentfilters. With only one or two levels of email filters, ahigh percentage of legitimate emails are misclassifiedas spam or spam is misclassified as legitimate. To avoidsuch misclassification, Norton AntiSpam employsdifferent filters. Each email filter uses a unique

Keeping secure on the InternetAbout Norton AntiSpam

316

Page 317: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

approach to filter spam email messages from legitimateemail messages.

The email messages that you receive in your emailprogram undergo scanning through different localfilters of Norton AntiSpam. The local filters useWhitelist technique, Blacklist technique, and patentedfiltering technology to classify email messages aslegitimate or spam. If the local filters classify an emailmessage as spam, Norton AntiSpam changes the subjectof the email message. Norton AntiSpam then sends theemail message to your email client. If the local filtersfail to classify the email message as spam, NortonAntiSpam collects information such as signature andURL hashes of the email message. Norton AntiSpamthen sends this information to the Web Query filterfor additional analysis.

The Web Query filter analyzes the signature and URLhashes of the email message and then sends theanalysis report to Norton AntiSpam. If the emailmessage is identified as spam, Norton AntiSpam altersthe subject of the email message and sends it to youremail program. Based on predefined email rules, theemail program then moves the email message to theJunk folder or the Norton AntiSpam folder.

w Symantec recommends that you keep the Web Queryoption turned on. Turning off the Web Query optionincreases your exposure to the spam email messagesthat contain phishing or spam URLs.

Turning off or turning on Web Query

Norton AntiSpam uses local filters to identify spamemail messages. The email messages that the localfilters do not identify as spam are then scannedadditionally through the Web Query filter. Web Queryfilter analyzes the signature and URL hashes of theemail messages to classify them as legitimate email orspam email.

If the email message is identified as spam, then NortonAntiSpam alters the subject of the email message.

317Keeping secure on the InternetAbout Norton AntiSpam

Page 318: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton AntiSpam then sends the email message to youremail program. Based on predefined email rules, theemail program then moves the email message to theJunk folder or the Norton AntiSpam folder.

w Symantec recommends you to keep the Web Queryoption turned on. Turning off the Web Query optionincreases your exposure to the spam email messagesthat contain phishing or spam URLs.

To turn off the Web Query filter

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Filter tab, in the Web Query row, move theOn/Off switch to the right to the Off position.

4 Click Apply.

5 Click Close.

To turn on the Web Query filter

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Filter tab, in the Web Query row, move theOn/Off switch to the left to the On position.

4 Click Apply.

5 Click OK

About configuring POP3 and SMTP portsNorton 360 automatically configures your emailprogram to protect it from viruses and other securitythreats. Norton 360 supports all email accounts thatuse non-SSL POP3 and SMTP communication protocols.Norton 360 also scans all incoming and outgoing emailmessages.

Norton 360 lets you manually configure your POP3 andSMTP email ports for email protection. Typically, yourInternet service provider (ISP) provides you the port

Keeping secure on the InternetAbout configuring POP3 and SMTP ports

318

Page 319: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

numbers for your email program. If the SMTP and POP3port numbers for your email program are differentfrom the default port numbers, you must configureNorton 360.

To ensure email protection, Symantec recommendsthat you check the POP3 and SMTP port numbers foryour email program. If they are not the default ports,add them to the ProtectedPorts window. To configurethe ProtectedPorts option, go to the Norton 360 mainwindow, and then click Settings > AntiSpam > Filter> Protected Ports > Configure.

If you do not want Norton 360 to protect a port, youcan remove the port from the ProtectedPortswindow.

w You cannot remove the default SMTP port 25 and POP3port 110. Norton 360 automatically protects thesedefault ports.

Adding POP3 and SMTP ports to Protected PortsNorton 360 supports all email programs that use POP3and SMTP communication protocols with default ports.However, if your email program is not configured withthe default ports, you can manually configure yourPOP3 and SMTP email ports.

To ensure email protection, the POP3 and SMTP portnumbers must be protected. If the POP3 and SMTP portnumbers are not the default ports, Symantecrecommends that you add the port numbers to theProtected Ports window.

To add POP3 and SMTP ports to Protected Ports

1 In the Norton 360 main window, click Settings.

2 In the Settings window, click AntiSpam.

3 On the Filter tab, in the Protected Ports row, clickConfigure.

4 In the Protected Ports window, click Add.

319Keeping secure on the InternetAbout configuring POP3 and SMTP ports

Page 320: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

5 In the AddPorttoprotect window, in the PortTypedrop-down list, do one of the following:

1 To add the incoming email port, click POP3.

1 To add the outgoing email port, click SMTP.

6 In the Port box, type the port number.The port number must be between 1 and 65535.

7 Click OK.

8 In the Protected Ports window, click Apply, andthen click OK.

9 In the Settings window, click Close.

Removing an email port from Protected PortsIf you do not want Norton 360 to protect a port, youcan remove the port from the ProtectedPorts window.

w Norton 360 automatically protects the default SMTPport 25 and the default POP3 port 110. You cannotremove these default ports.

To remove an email port from Protected Ports

1 In the Norton 360 main window, click Settings.

2 In the Settings window, click AntiSpam.

3 On the Filter tab, in the Protected Ports row, clickConfigure.

4 In the Protected Ports window, click the port thatyou want to remove, and then click Remove.

5 Click Apply and then click OK.

6 In the Settings window, click Close.

About Network Cost AwarenessThe Network Cost Awareness feature lets you set uppolicies to restrict the Internet usage of Norton 360.You can define the amount of network bandwidth thatNorton 360 can use.

You can choose a communication policy that suits yourInternet connection. If you have unlimited Internet

Keeping secure on the InternetAbout Network Cost Awareness

320

Page 321: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

plan, you can set up NoLimit policy so that Norton 360connects to Symantec servers to ensure completeprotection. However, if you think that Norton 360 usestoo much of your Internet connection, you can restrictthe Internet usage of Norton 360. Network CostAwareness helps you manage the Internet usage ofNorton 360.

To connect to the Internet, Norton 360 accesses thegateway through a network connection. The connectingdevice can be a 3G phone, an Internet data card, or awireless network card. Network Cost Awareness letsyou set up a policy for each network connection thatNorton 360 uses to connect to the Internet.

You can set up one of the following policies for each ofthe network connection that Norton 360 uses toconnect to the Internet:

1 AutoAllows Norton 360 to receive all product and virusdefinition updates based on the Windows 8 costawareness policy. By default, the Auto policy hasunlimited Internet connection on LAN and Wi-Fi.

w The Auto option is available only in Windows 8.

1 No LimitAllows Norton 360 use the network bandwidth thatis required to receive all product and virusdefinition updates. Symantec recommends that youapply this policy. If you do not use Windows 8, thedefault policy is set to No Limit.

1 EconomyAllows Norton 360 access the Internet only toreceive critical product updates, virus definitions,and web queries needed to protect your device.

1 No TrafficBlocks Norton 360 from connecting to the Internet.If you choose this policy, Norton 360 cannot receivecritical virus definitions and program updates,which can lead to potential dangers and virusattacks.

321Keeping secure on the InternetAbout Network Cost Awareness

Page 322: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Turning off or turning on Network Cost AwarenessYou can set up policies to restrict the Internet usageof Norton 360. If you do not want to restrict theInternet usage of Norton 360, you can turn off NetworkCost Awareness.

If you feel that Norton 360 uses too much networkbandwidth, you can turn on NetworkCostAwareness.Then, you can set up policies to restrict the Internetusage of Norton 360. Norton 360 connects to theInternet based on the policy that you set up in theNetworkCostAwarenessSettings window. By default,Network Cost Awareness is turned on.

To turn off Network Cost Awareness

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the Network Cost Awareness row, move theOn/Off switch to the right to the Off position.

4 Click Apply.

5 Click Close.

To turn on Network Cost Awareness

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the Network Cost Awareness row, move theOn/Off switch to the left to the On position.

4 Click Apply.

5 Click Close.

Defining the Internet usage of Norton 360If you think that Norton 360 uses too much of yournetwork bandwidth, you can restrict the Internet usageof Norton 360. You can set up policy for each networkconnection that Norton 360 uses to connect to theInternet.

Keeping secure on the InternetAbout Network Cost Awareness

322

Page 323: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The Network Cost Awareness Settings window listsall the network connections that your computer usesto connect to the Internet. You can view the status ofthe network connections that are currently in use. Thenetwork policy that you set up defines the amount ofnetwork bandwidth that Norton 360 can use.

To define the Internet usage of Norton 360

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the Network Cost Awareness row, move theOn/Off switch to the left to the On position.

4 Click Configure.The NetworkCostAwarenessSettings window listsall the network connections that Norton 360 usesto connect to the Internet.

5 Under the Policy column, click the drop-down listnext to the network connection for which you wantto set up a policy.

323Keeping secure on the InternetAbout Network Cost Awareness

Page 324: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

6 Select one of the following:

1 AutoAllows Norton 360 to receive all product andvirus definition updates based on the Windows8 cost awareness policy. By default, the Autopolicy has unlimited Internet connection on LANand Wi-Fi.

w The Auto option is available only in Windows 8.

1 No LimitAllows Norton 360 use the network bandwidththat is required to receive all product and virusdefinition updates. If you do not use Windows8, the default policy is set to No Limit.

1 EconomyAllows Norton 360 access the Internet only toreceive critical product updates and virusdefinitions.

If you have a limited Internet connection, youcan select the Economy option to ensureprotection from critical security threats.

1 No TrafficBlocks Norton 360 from connecting to theInternet. If you choose this policy, Norton 360cannot receive critical virus definitions andprogram updates, which can lead to potentialdangers and virus attacks.

7 Click Apply, and then click OK.

8 In the My Network settings window, click Close.

Keeping secure on the InternetAbout Network Cost Awareness

324

Page 325: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This chapter includes the following topics:

1 About securing your sensitive data

About securing your sensitive dataThe Internet provides the fastest and the easiest wayto exchange information. In spite of the manyadvantages that the Internet provides, you arevulnerable to information theft and identity theft.Information can be stolen and misused in several ways.

Following are a few of the most common methods ofinformation theft:

1 Online financial transactions

1 Unsafe online storage of sensitive information

1 Misuse of your identity while you communicateonline

The Identity Safe feature in Norton 360 offers severalpowerful ways to tackle identity theft. Identity Safe isthe best tool that you can use to safeguard your identitywhile you are online.

About Safe SurfingSafe Surfing comprises of the Antiphishing and theNorton Safe Web features. Antiphishing analyzes thesecurity level of the Web sites that you visit anddisplays the results in the Norton Site Safety pop-up

9Securing yoursensitive data

Page 326: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

window. The Norton Safe Web feature provides you asafe search environment in the Web by displaying thesite rating icons next to every search result.

When you install Norton 360, it adds the NortonToolbar to the Internet Explorer, Firefox, or Chromebrowsers. Norton 360 protects your Web browsers whenyou turn on the Antiphishing and Norton Safe Weboptions in the SafeSurfing section under Identity Safeoption of the Norton 360 Settings window.

w The Antiphishing and Norton Safe Web features aresupported in the Internet Explorer, Firefox, or ChromeWeb browsers.

When you turn off Antiphishing and Norton Safe Web,Identity Safe may autofill fraudulent Web sites withyour confidential information. Symantec recommendsthat you do not browse the Web when Antiphishingand Norton Safe Web features are turned off.

About Antiphishing

Antiphishing protects you from visiting unsafe Websites. When Antiphishing is turned on, the Antiphishingcomponent analyzes the security level of the Web sitesthat you visit. It then displays the results in the NortonSite Safety pop-up window. Antiphishing also blocksnavigation to the Web sites that are confirmed to befraudulent.

Antiphishing provides you the following informationabout the Web sites you visit:

1 If the Web site is safe to enter confidentialinformation

1 If the Web site is fraudulent

1 If the Web site is suspicious

1 If the Web site is known to give annoying results

The Norton Site Safety pop-up window in InternetExplorer, Firefox, or Chrome Web browsers lets youview more details about the safety status of the Websites you visit.

Securing your sensitive dataAbout securing your sensitive data

326

Page 327: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

In addition, the Norton Site Safety pop-up windowincludes information about Symantec AuthenticatedWeb sites. Web site hackers often mimic company Websites to create fraudulent Web sites. Norton 360identifies the fraudulent Web sites.

Symantec analyzes the pages of these sites and verifiesif they belong to the company that it represents. Youcan be confident that the information that you providegoes to the company with which you want to dobusiness.

You can report the evaluation of a Web site you suspectto be fraudulent to Symantec for further evaluation.Use the Report Site option from Norton Toolbar toreport a Web site. You can also report the evaluationof a Web site that you suspect to be fraudulent butAntiphishing reports as safe.

Even when you turn off the Antiphishing option,Norton 360 protects you from Internet threats throughits Norton Safe Web features. When Antiphishing isturned off, you cannot use the Report Site option inthe Norton menu to submit the evaluation of the Website to Symantec.

The Norton Site Safety pop-up window displays thefollowing messages:

1 Site is Safe

1 Site is Unsafe

1 Site Untested

1 Norton Secured

1 Caution

1 Fraudulent Site

1 Suspicious Site

1 Page Not Analyzed

Turning off or turning on Antiphishing

Antiphishing protects you from visiting unsafe Websites. The Antiphishing feature in Norton 360 analyzes

327Securing your sensitive dataAbout securing your sensitive data

Page 328: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

the security level of all the Web sites that you visit anddisplays the results in the Norton Site Safety pop-upwindow. Antiphishing also blocks navigation to theWeb sites that are confirmed to be fraudulent.

The Norton Site Safety pop-up window helps youunderstand if the Web site that you visit is safe orunsafe.

You can turn off or turn on Antiphishing in the SafeSurfing section of the Identity Protection settingswindow.

To turn off or turn on Antiphishing

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Identity Protection.

3 In the Antiphishing row, do one of the following:

1 To turn off Antiphishing, in the Antiphishingrow, move the On/Off switch to the right to theOff position.

1 To turn on Antiphishing, in the Antiphishingrow, move the On/Off switch to the left to theOn position.

4 In the Settings window, click Apply.

5 Click Close.

Reporting an incorrect evaluation of a Web site

On rare occasions, Antiphishing may report incorrectevaluation of a Web site. For example, you might visita site that you shop with regularly and Antiphishingreports that the site is fraudulent. On the contrary, youmight visit a Web site that you suspect is a phishingsite, but Antiphishing reports that no fraud wasdetected. In either case, you can report the Web site toSymantec for further evaluation.

w The Web site you want to report to Symantec forfurther evaluation must be kept open in your Webbrowser.

Securing your sensitive dataAbout securing your sensitive data

328

Page 329: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To report an incorrect evaluation of a suspicious Website

1 Open your browser and go to the Web site that youthink is suspicious.

2 On the Norton Toolbar, in the Norton menu, clickReport site.

3 In the dialog box that appears, verify that the Website address and click Submit.

4 In the confirmation dialog box, click Close.

To report an incorrect evaluation of a safe Web site

1 Open your browser and go to the Web site that youthink is safe.

2 On the Norton Toolbar, in the Norton menu, clickReport site.

3 In the dialog box that appears, verify that the Website address and click Submit.

4 In the confirmation dialog box, click Close.

About Norton Safe Web

Norton Safe Web helps you surf, search, and shop moresafely on the Internet. By using Norton Safe Web, youcan check if a Web site is malicious or not even beforeyou visit it. Norton Safe Web analyzes the Web sitesyou visit and detects if there are any viruses, spyware,malware, or other security threats that exist on theWeb sites. Based on the analysis, Norton Safe Webprovides safety ratings for all the Web sites.

In addition, Norton Safe Web lets you view thecommunity rating and user reviews of the Web sitesyou visit.

w Norton Safe Web supports Internet Explorer, Firefox,or Chrome Web browsers.

You can view the site safety status of any Web siteusing the FullReport option on the NortonSiteSafetypop-up window. You can also use the CommunityBuzzoption on the Norton menu to view the safety statusof the Web sites.

329Securing your sensitive dataAbout securing your sensitive data

Page 330: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

w The Community Buzz option is available only inEnglish-language versions of Windows.

For each Web site that you want to know the site safetystatus, Norton Safe Web lets you do the following:

1 View the Norton rating.

1 View the community rating.

1 Add your reviews.

1 View the user reviews.

1 View a list of keywords that are tagged to the Website.

1 View the threat information and the generalinformation about the Web site.

If you use a proxy server to connect to the Internet,you must configure the Network Proxy Settings ofNorton 360.

When you search the Internet using Google, Yahoo, orBing search engines, Norton Safe Web displays siterating icons next to the search results. As you movethe mouse pointer over the Norton icon, a pop-upappears with site safety and shopping safetyinformation. The pop-up displays brief informationabout the safety of the site. Norton Safe Web alsoprovides a detailed report about the safety of the WebSites you visit.

You can click the icon next to the search results or theFull Report option in the Norton Site Safety pop-upwindow to view the detailed report. The report isdisplayed on the Norton Safe Web site.

Securing your sensitive dataAbout securing your sensitive data

330

Page 331: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton Safe Web provides the following Web site safetystates when you browse through the Internet:

You can see Norton Secured iconnext to the search results.

Symantec has analyzed this pageand determined that the Website is VeriSign trusted and issafe to visit.

Norton Secured

You can see a green OK icon nextto the search results.

When you visit a Web site withthis status, you can see a similarstatus icon on the NortonToolbar. Norton Safe Web hasanalyzed this Web site anddetermined that it is safe to visit.

Site is Safe

You can see a gray questionmark icon next to the searchresults.

When you visit this Web site, theNorton Toolbar shows a greenOK icon. Norton Safe Web hasnot analyzed this Web site andit does not have sufficientinformation about this Web site.As Symantec has not tested theWeb site, it is recommended thatyou do not visit this Webs site.

Site Untested

331Securing your sensitive dataAbout securing your sensitive data

Page 332: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can see a red cross (x) iconnext to the search results.

When you visit a Web site withthis status, you can see a similarstatus icon on the NortonToolbar. Norton Safe Web hasanalyzed this Web site anddetermined that the Web site isunsafe to visit. This Web sitemay attempt to install malicioussoftware on your computer.

Site is Unsafe

You can see a yellow exclamationmark icon next to the searchresults.

When you visit a Web site withthis status, you can see a similarstatus icon on the NortonToolbar. Norton Safe Web hasanalyzed this Web site anddetermined that this Web sitehas some threats that areclassified asAnnoyance Factors.These annoyance factors are notdangerous, but it can installunwanted applications on yourcomputer without yourpermission.

Caution

In addition to the site safety information, Norton SafeWeb provides the following shopping safetyinformation:

Norton Safe Web has analyzedthis Web site and determinedthat you can have a safeshopping experience.

Safe

Securing your sensitive dataAbout securing your sensitive data

332

Page 333: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton Safe Web does not havesufficient information about thisWeb site to provide a shoppingsafety rating.

Untested

Norton Safe Web has analyzedthis Web site and determinedthat the site has shopping risks.

Symantec recommends that youdo not visit this page. The Website may sell counterfeit itemswithout proper indication.

Risky

Norton Safe Web has analyzedthis Web site and has only someinformation about the Web siteto provide shopping safetyinformation.

The information is not sufficientto declare that the Web site issafe to shop.

Limited

When you visit any Web site that has an unsafe status,Norton Safe Web blocks that Web page. If you still wantto view the site, use the Continuetositeanyway optionthat appears on the blocked page.

You can block malicious pages using the BlockMaliciousPages option under the SafeSurfing sectionof the Identity Protection Settings window.

If you turn off this option, Norton Safe Web does notblock the unsafe Web sites. However, Norton Toolbarstill displays the status of these sites as unsafe evenwhen the option is turned off.

In addition, Norton Safe Web protects your computerwhile you use Facebook. It scans each URL that isavailable on your Facebook Wall and displays theNorton rating icons for the scanned URLs. You can also

333Securing your sensitive dataAbout securing your sensitive data

Page 334: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

let other Facebook users know about the security statusof any Web site.

To scan your Facebook Wall using Norton Safe Web,use the ScanFacebookWall option. The option appearswhen you click the Run Scans option in the Taskswindow.

Turning off or turning on Norton Safe Web

Norton Safe Web protects your computer while youbrowse the Internet using Internet Explorer, Firefox,or Chrome Web browsers. It analyzes the security levelsof the Web sites that you visit and indicates if the Websites are free from threats. It provides you a safeenvironment on the Web by displaying the site ratingicons next to each search result. The site rating iconslets you know if a Web site is malicious or not evenbefore you visit it.

You can turn off or turn on Norton Safe Web in theSafeSurfing section under IdentityProtectionsettingswindow.

To turn off or turn on Norton Safe Web

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Identity Protection.

3 In the NortonSafeWeb row, do one of the following:

1 To turn off Norton Safe Web, in the NortonSafeWeb row, move the On/Off switch to the rightto the Off position.

1 To turn on Norton Safe Web, in the NortonSafeWeb row, move the On/Off switch to the left tothe On position.

4 In the Settings window, click Apply.

5 Click Close.

Securing your sensitive dataAbout securing your sensitive data

334

Page 335: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Searching the Web using Norton Safe Search

Norton Safe Search enhances your Web searchexperience. When you search the Internet using NortonSafe Search, it uses Ask.com to generate the searchresults. Norton Safe Search provides the site safetystatus and Norton rating for each of the search resultsgenerated.

By default, the NortonSafeSearch box is enabled. Afteryou install Norton 360 and open Internet Explorer,Firefox, or Chrome Web browsers for the first time, analert message is displayed. The alert message promptsyou to enable Norton Safe Search. You can choose toenable or disable Norton Safe Search.

Norton Safe Search provides you the intelligentsearch-as-you-type feature that displays searchsuggestions when you type a few letters of the searchphrase.

In addition, Norton Safe Search provides the followingfeatures:

When you search the Internetusing Norton Safe Search, itanalyzes the security levels ofthe Web sites and displays thesearch results.

You can use the Filter OutUnsafe Sites option in theNorton Safe Search Web site tofilter the unsafe Web sites fromthe search results. When youclick the Filter Out Unsafe Sitesoption the Unsafe Site Filteroption is turned on. By defaultthis option is turned off.

Unsafe Site Filter

335Securing your sensitive dataAbout securing your sensitive data

Page 336: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton Safe Search enables youto erase all the data that arerelated to your search activitiesfrom the Ask.com server. ThePrivacy Safeguard feature ofNorton Safe Search removes thesearch data, such as your IPaddress, user identifier, andsession identifier from theAsk.com server.

You can turn on or turn offPrivacy Safeguard using theTurnOn Privacy Safeguard and TurnOff Privacy Safeguard optionsrespectively.

Erase Search History

w Norton Safe Search feature is available only for someregions including the United States, the UnitedKingdom, Canada, Australia, and Germany. The PrivacySafeguard feature is available only for the UnitedStates, the United Kingdom, and Canada.

You can use Norton Safe Search even when you turnoff the Identity Safe features.

w Norton Safe Search is supported only in the InternetExplorer, Firefox, or Chrome Web browsers.

To search the Web using Norton Safe Search

1 Start your Web browser.

2 On the Norton Toolbar, in the Norton Safe Searchbox, type the search string that you want to search.

3 Do one of the following:

1 Click Search.

1 In the pop-up window that appears, select asearch suggestion that matches your searchstring.

Securing your sensitive dataAbout securing your sensitive data

336

Page 337: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Turning off or turning on Scam Insight

Scam Insight prevents you from divulging yoursensitive information such as Social Security Numbersor credit card information, to fraudulent Web sites. Ithelps you detect the Web sites that are suspicious orvulnerable using reputation-based threat detection. Itmainly focuses the Web sites that require you to enteryour personal information.

You can use the Scam Insight option in the IdentityProtectionsettings window to turn on or off the ScamInsight feature.

The Norton Site Safety pop-up window helps youunderstand if the Web site that you visit is safe orunsafe.

To turn off or turn on Scam Insight

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Identity Protection.

3 In the Scam Insight row, do one of the following:

1 To turn off Scam Insight, in the Scam Insightrow, move the On/Off switch to the right to theOff position.

1 To turn on Scam Insight, in the Scam Insightrow, move the On/Off switch to the left to theOn position.

4 In the Settings window, click Apply.

5 Click Close.

About Identity SafeIdentity Safe helps you manage your identities andprovides additional security while you perform onlinetransactions.

337Securing your sensitive dataAbout securing your sensitive data

Page 338: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The following features in Identity Safe provide securestorage of your sensitive information:

Stores login information, suchas your login credentials for youronline bank account, email userID, and password.

Edit Logins

Stores your personalinformation, such as addresses,date of birth, and credit cardinformation.

Edit Cards

Stores the details, such aspassport numbers and socialsecurity numbers.

Edit Notes

In addition to being a depository of sensitiveinformation, Identity Safe provides the followingfeatures:

1 Protects you from identity theft when you performonline transactions

Antiphishing also helps to protect you frommalicious Web sites when you perform onlinetransactions.

1 Manages your card information when you havemultiple credit cards to maintain

1 Safeguards the data that you save on your computer

By saving your data with a local vault, you canprevent your sensitive Identity Safe data on yourcomputer from being misused. A local vault isspecific to each of the Windows user accountspresent on your computer.

1 Provides you the ease of carrying and using yourIdentity Safe data when you are on the move

By saving your data using an online vault, you canaccess your sensitive Identity Safe data from anycomputer that has Norton 360 installed.

Securing your sensitive dataAbout securing your sensitive data

338

Page 339: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton 360 adds the Norton Toolbar to the InternetExplorer, Firefox, or Chrome Web browsers. TheNorton Toolbar has the following components:

1 Norton menu

1 Norton Safe Search

1 Share

1 Safe Web indicator

1 Vault Open/Vault Closed menu

1 Login Assistant

When you have cards or logins in Identity Safe, theVaultOpen menu displays the list of cards and logins.

w Norton 360 supports latest versions of Google Chromeand Firefox.

If you turn off Identity Safe, you cannot access yourlogins and Identity Safe features from the NortonToolbar.

Norton 360 lets you access all the Identity Safe featuresfrom your browser’s toolbar even after the productexpires. This way, you can still view or manage yourlogin details even after Norton 360 expires. However,it is not safe to browse the Internet after Norton 360expires as you are vulnerable to online thefts andphishing attacks.

About setting up Norton Identity Safe Account

Identity Safe helps you manage your sensitiveinformation and provide additional security while youperform online transactions. The features in IdentitySafe provide a secure storage for your personalinformation such as your address, login information,passwords, and credit card details.

Identity Safe provides a secure storage for thefollowing:

1 Login information such as user IDs and passwordsof your email accounts

339Securing your sensitive dataAbout securing your sensitive data

Page 340: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 Personal information such as your address, date ofbirth, passport number, and social security number.

1 Credit card details including card number and cardexpiry date.

w You can view all the options that are available inIdentity Safe only after you set up Identity Safe.

Identity Safe lets you create an online vault and saveyour Identity Safe data. You can create one online vaultfor each Norton Account. You cannot create a new localvault but use your existing local vault when youupgrade to new version of the Norton 360.

In addition to the local vault on your Windows useraccount, you can save your Identity Safe data in onlinevault. The Identity Safe data is stored online vault usingyour Norton Account.

You can access the Identity Safe data that you storedonline from any computer that meets the followingcriteria:

1 The latest version of Norton 360 must be installed.

1 The computer must be connected to the Internet.

The Identity Safe data is stored online using yourNorton Account. You can create only one online vaultfor a Norton Account.

w If you have Identity Safe data that is stored on anyexternal drives from the older versions of Norton 360,you can convert that portable profile to local vault oronline vault. When you connect your external drive toyour computer, the Identity Safe menu in the NortonToolbar provides option to merge or delete the IdentitySafe data from your portable profile. You can mergethe data from the portable profile to local vault oronline vault.

Turning off or turning on Identity Safe

Identity Safe helps you manage your identity andprovides additional security while you perform onlinetransactions. You can use the various features in

Securing your sensitive dataAbout securing your sensitive data

340

Page 341: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Identity Safe to manage your personal data such asaddresses, date of birth and credit card information.The logins, cards, and notes help you store and useyour personal information in a secure way.

You can turn off or turn on the Identity Safe from theQuick Controls in the Settings window or from theSettings window for Identity Protection.

w After you turn on Identity Safe, you must log in toIdentity Safe to access the various features.

To turn off or turn on Identity Safe from Quick Controls

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Quick Controls, doone of the following:

1 To turn off Identity Safe, uncheck IdentitySafe.

1 To turn on Identity Safe, check Identity Safe.

To turn off Identity Safe from Settings window

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 In the Identity Protection settings window, in theIdentity Safe row, move the On/Off switch to theright to the Off position.

3 Click Apply.

To turn on Identity Safe from Settings window

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 In the Identity Protection settings window, in theIdentity Safe row, move the On/Off switch to theleft to the On position.

3 Click Apply.

About Identity Safe vaults

You can create one local vault for each Windows useraccount on your computer. The data that you save andthe Identity Safe settings that you make are specific tothat local vault. You cannot access the data that you

341Securing your sensitive dataAbout securing your sensitive data

Page 342: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

save in one Windows user account from anotherWindows user account. This way Identity Safe protectsyour sensitive data from misuse by multiple users ofyour computer.

Symantec recommends that you create separatepassword-protected Windows user accounts if you wantto share your computer with multiple users.

In addition to the local vault that you create on aWindows user account, you can save your Identity Safedata in online vault. When you move your Identity Safedata from local vault to online vault, the data in yourlocal vault is permanently removed. The Identity Safedata is stored online using your Norton Account.

You can access the Identity Safe data that you storedonline from any computer that meets the followingcriteria:

1 The latest version of Norton 360 must be installed.

1 The computer must be connected to the Internet.

You can create only one online vault for a NortonAccount.

w If you have Identity Safe data that is stored on anyexternal drives from the older versions of Norton 360,you can convert that portable profile to local vault oronline vault. When you connect your external drive toyour computer, the Vault Open menu in the NortonToolbar provides option to merge the Identity Safedata from your portable profile. You can merge thedata from the portable profile to your local vault oronline vault.

In addition to the features such as saving logins, cards,and notes, you can do the following using your IdentitySafe vault:

1 Import your Identity Safe data from the file youalready backed up. You can also import the datathat you stored in portable profile from an olderversion of the product to the current version.

1 Export your Identity Safe data to .DAT file.

Securing your sensitive dataAbout securing your sensitive data

342

Page 343: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 Reset your Identity Safe.

About creating Identity Safe vaults

Identity Safe helps you manage your sensitiveinformation and provide additional security while youperform online transactions. The various features inIdentity Safe provide a secure storage for your personalinformation such as your address, login information,passwords, and credit card details.

Identity Safe lets you create an online vault and saveyour Identity Safe data. You can create one online vaultfor each Norton Account. You cannot create a new localvault but use your existing local vault when youupgrade to new version of the Norton 360.

In addition to the local vault on your Windows useraccount, you can save your Identity Safe data in onlinevault. The Identity Safe data is stored online vault usingyour Norton Account.

You can access the Identity Safe data that you storedonline from any computer that meets the followingcriteria:

1 The latest version of Norton 360 must be installed.

1 The computer must be connected to the Internet.

w You can create only one online vault for a NortonAccount. You must log in to your Norton Account tomove Identity Safe data from the local vault to theonline vault.

You can create Identity Safe vaults from the IdentitySafe section under IdentityProtectionof the Settingswindow.

Creating online vault

Identity Safe lets you create an online vault and saveyour Identity Safe data. You can create one online vaultfor each Norton Account. You cannot create a new localvault but use your existing local vault when youupgrade to new version of the Norton 360.

343Securing your sensitive dataAbout securing your sensitive data

Page 344: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

In addition to the local vault on your Windows useraccount, you can save your Identity Safe data in onlinevault. The Identity Safe data is stored online vault usingyour Norton Account.

You can access the Identity Safe data that you storedonline from any computer that meets the followingcriteria:

1 The latest version of Norton 360 must be installed.

1 The computer must be connected to the Internet.

w You can create only one online vault for a NortonAccount.

To create online vault

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Identity Protection.

3 Under IdentitySafe, in the IdentitySafeSetup row,click Configure.

4 Click Next, and enter your Norton Accountcredentials.If you do not have a Norton Account, Identity Safeautomatically redirects you to Create NortonAccount window to create a new Norton Account.

5 In the Create your Vault Password window, in theCreate Vault Password box, type your password.

6 In the Re-type Vault Password box, type thepassword again to confirm.

7 In the Password Hint box, type a hint for thepassword.

8 Check Store information online through yourNorton Account.This option appears only if you log in to your NortonAccount.

9 Click Create.

10 In the IdentitySafeSetupSuccessful window, clickGet Started.

Securing your sensitive dataAbout securing your sensitive data

344

Page 345: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Signing in to Norton Account

Identity Safe lets you create a local vault and an onlinevault to save your Identity Safe data. You must log into your Norton Account to create an online vault. TheIdentity Safe data is stored online using your NortonAccount.

You can access the Identity Safe data that you storedonline from any computer that meets the followingcriteria:

1 The latest version of Norton 360 must be installed.

1 The computer must be connected to the Internet.

w You can create only one online vault per NortonAccount. If you already have a Norton Account, youcan log in with your credentials or create a newaccount.

To sign in to Norton Account

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Identity Protection.

3 Under IdentitySafe, in the IdentitySafeSetup row,click Configure.

4 At the bottom of the Set Up Identity Safe window,click Log In to Norton Account.

5 In the SignIntoNortonAccount window, type yourE-mail Address and Password.

6 Click Sign In.

Syncing local vault to online vault

You can sync the Identity Safe data from your localvault to the online vault. When you move the data fromyour local vault to online vault, all the data in yourlocal vault is removed permanently.

The Sync Data Online option in Identity Safe helpsyou to save your data online.

345Securing your sensitive dataAbout securing your sensitive data

Page 346: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The following are the benefits of moving your IdentitySafe data online:

1 Lets you access your Identity Safe data from anycomputer.

w Your computer must have the latest version Norton360 installed and must be connected to the Internet.

1 Lets you access your Identity Safe data from onlinevault without depending on any external drive.

1 Provides a convenient means to automaticallysynchronize Identity Safe data across differentcomputers using your Norton Account.

w You must log in to your Norton Account to move theIdentity Safe data from your local vault to online vault.

To sync local vault to online vault

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Identity Protection.

3 Under Identity Safe, in the Sync Data Online row,click Configure.

4 In the Sync Identity Safe Data Online window, inthe Enter thePassword box, type the password foryour local vault.

5 Click Log In to Norton Account.

6 In the SignIntoNortonAccount window, type yourNorton Account user name and password, and clickLog In.

7 Click Validate.

8 In the Sync Identity Safe Data Online window,create a password for your online vault.

9 Click Sync Data.

10 In the SyncIdentitySafeDataOnline window, clickGet Started.

Merging local vault to online vault

Identity Safe lets you store and manage your sensitiveinformation including your address, login information,

Securing your sensitive dataAbout securing your sensitive data

346

Page 347: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

passwords, and credit card details. You can sync youridentity safe data in the local vault into the online vault.

When you save your data in online vault, you can accessyour Identity Safe data from any computer that hasNorton 360 installed.

You can merge the Identity Safe data from your localprofile into your online vault.

w When you merge the data from local vault to onlinevault, the data from the local vault is permanentlymoved to the online vault. You can access the data fromthe online vault.

To merge local vault to online vault

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Identity Protection.

3 Under Identity Safe, in the Sync Data Online row,click Configure.

4 In the Sync Identity Safe Data Online window, inthe Enter thePassword box, type the password foryour local vault.

5 Click LogIntoNortonAccount option at the bottomof the Sync Identity Safe Data Online window.

6 In the SignIntoNortonAccount window, type yourNorton Account user name and password, and clickSign In.

7 Click Validate.If you already have an online vault, Norton 360automatically takes you to Merge Identity SafeOnline window to merge your local vault with youronline vault.

8 In the Warning dialog box, click Yes.This window appears only if your Norton Accountalready has an online vault associated with it.

9 In the Merge Identity Safe Data Online window,type your online vault password associated withyour Norton Account in the Enter the Passwordbox.

347Securing your sensitive dataAbout securing your sensitive data

Page 348: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

10 In the Merge Identity Safe Data Online window,click Merge.

Deleting local vault and online vault

Identity Safe lets you create a local vault and an onlinevault to save your Identity Safe data. If you no longerrequire your Identity Safe data that is stored in yourlocal vault and online vault, you can delete the vaults.When you delete the local vault and online vault, allthe Identity Safe data is permanently removed.

To delete the local vault and online vault

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Identity Protection.

3 Under Identity Safe, in the Delete Data row, clickConfigure.

4 In the Warning window, click Yes.

5 In the Settings window, click Apply.

6 Click Close.

Merging portable profile to local vault or online vault

If you have Identity Safe data that is stored on anyexternal drives from the older versions of Norton 360,you can merge that portable profile to local vault oronline vault. When you connect your external drive toyour computer, the Identity Safe menu in the NortonToolbar provides option to merge the Identity Safedata from your portable profile. You can merge thedata from the portable profile to local vault or onlinevault.

w You can merge the Identity Safe data from the portableprofile to the vault that you are currently logged in.

Securing your sensitive dataAbout securing your sensitive data

348

Page 349: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To merge the Identity Safe data from portable profileto local vault or online vault

1 On the Norton Toolbar, in the Identity Safe menu,click Merge Portable Data (Drive:\).This option appears only if you connect an externaldrive with portable profile.

2 In the dialog box that appears, click Yes.

3 In the Import Identity Safe Data window, underImport my data from, click Portable Profile(Drive:\).

4 In the Password box, type the password.

5 Do one of the following:

1 If you want to delete the data from the portableprofile after import, check Delete original dataonce merged.

1 If you do not want to delete the data from theportable profile after import, uncheck Deleteoriginal data once merged.

Importing logins

Identity Safe lets you import the logins that you havesaved in Internet Explorer. After you set up IdentitySafe vaults, the IdentitySafeSetupSuccessful windowappears.

You can use this window to import your logins. Theimported logins appear in the VaultOpen menu on theNorton Toolbar and in the Edit Logins window. Youcan use the imported logins the same way that you usethe logins that you create.

w This option is unavailable for Windows 8 OperatingSystem.

To import logins

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under IdentitySafe, in the IdentitySafeSetup row,click Configure.

349Securing your sensitive dataAbout securing your sensitive data

Page 350: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 Set up Identity Safe.

4 In the Identity Safe Setup Successful window, doone of the following:

1 Check ImportmyloginsfromInternetExplorerto import all the logins that you saved in yourWeb browser.

1 Uncheck Import my logins from InternetExplorer, if you do not want to import all thelogins that you saved in your Web browser.

5 In the IdentitySafeSetupSuccessful window, clickDone.

Resetting Identity Safe

There may be instances when you need to reset yourIdentity Safe.

You may need to reset your Identity Safe in thefollowing occasions:

1 You experience a computer failure.

1 You forget your Identity Safe password.

w If you forget your Identity Safe password, you cannotrestore it. You can only reset your Identity Safe andstore all your data again.

Norton 360 lets you enter an incorrect password threetimes. If your attempts are unsuccessful, Norton 360provides you an option to reset your Identity Safe. Ifyou reset the Identity Safe, you lose all the IdentitySafe data that you stored, such as your logininformation, cards, and notes.

To reset your Identity Safe

1 In the Norton 360 main window, click Settings.

2 In the Settings window, click Identity Protection.

3 Under Identity Safe, in the Log in to Identity Saferow, click Configure.

Securing your sensitive dataAbout securing your sensitive data

350

Page 351: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

4 In the Enter the Password box, type your IdentitySafe password.If you forget your password, Identity Safe lets youenter wrong password three times. If your attemptsare unsuccessful, the Trouble Logging In? windowappears.

5 In the Trouble Logging In? window, click ResetIdentity Safe.If you forget the Identity Safe password of youronline vault, you need to provide your NortonAccount credentials to reset your Identity Safe.

6 In the confirmation dialog box, click Yes.

Accessing Identity Safe

You can access the Identity Safe settings from thefollowing sections of Norton 360:

1 From the Identity Safe section in the IdentityProtection settings window

1 From the Norton Toolbar

1 From the Identity section in the Norton 360 mainwindow

With Norton 360, you can access and configure all theIdentity Safe features even after the product expires.The following are the features that you can view oraccess after the product expires:

You can view the Edit Loginswindow using the Identity Safemenu on the Norton Toolbar.

Edit Logins

You can use this feature to takea backup of your Identity Safedata.

The data that you back up arestored as .DAT file.

Export Data

351Securing your sensitive dataAbout securing your sensitive data

Page 352: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

w You must be logged in to Identity Safe to access theIdentity Safe features. The Identity Safe features aresupported only in the Internet Explorer, Firefox, orChrome Web browsers.

To access Identity Safe settings from the main window

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, for the Identity Safe featurethat you want to open, click Configure.

To access Identity Safe settings from the Settingswindow

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Identity Protection.

3 Under Identity Safe, for the Identity Safe featurethat you want to open, click Configure.

To access Identity Safe settings from theNorton Toolbar

1 Start your Web browser.

2 On the Norton Toolbar, in the Norton menu, clickSettings.

3 For the Identity Safe feature that you want to open,click Configure.

Logging in to and logging out of Identity Safe

You can log in to or log out of Identity Safe from thefollowing areas of Norton 360:

1 The Identity Safe section in the Settings windowfor Identity Protection

1 The Identity section in the Norton 360 mainwindow

1 The Norton Toolbar

To secure your Identity Safe data from others, log outof Identity Safe whenever you are away from yourcomputer.

Securing your sensitive dataAbout securing your sensitive data

352

Page 353: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Identity Safe automatically logs you out of the currentvault, when you are logged in to your local vault oronline vault and click Identity Safe Setup to create anew vault.

To view or edit your confidential data, you must belogged in to Identity Safe.

To log in to Identity Safe

1 In the Norton 360 main window, click Identity, andthen click Log in to Identity Safe.

2 In the Open Vault window, in the Enter thePassword box, type the password of the vault youwant to log in.

3 Click Log In.

To log out of Identity Safe

4 In the Norton 360 main window, click Identity, andthen click Logoutof IdentitySafe. You can also logout from the Settings window for IdentityProtection.

To log in to Identity Safe from the Norton Toolbar

1 Start your Web browser.

2 On the Norton Toolbar, click Vault Closed.

3 In the Open Vault window, in the Enter thePassword box, type the password of the vault youwant to log in.

4 Click Open Vault.

To log out of Identity Safe from the Norton Toolbar

1 Start your Web browser.

2 On the NortonToolbar, click VaultOpen, and thenclick Close Vault.

Configuring Identity Safe settings

You can use the various features in Identity Safe tomanage your personal sensitive information. Thelogins, cards, and notes help you store and use yourinformation in a secure way.

353Securing your sensitive dataAbout securing your sensitive data

Page 354: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To configure Identity Safe settings

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

Securing your sensitive dataAbout securing your sensitive data

354

Page 355: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

2 Under Identity Safe, identify the feature that youwant to use, and click Configure. Your options are:

Lets you set up Identity Safevault.

Identity Safe Setup

You can create a local vault oran online vault and store yourIdentity Safe data.

w You must log in to yourNorton Account to create anonline vault.

355Securing your sensitive dataAbout securing your sensitive data

Page 356: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you configure the way youwant Identity Safe to collect,store, and display the logininformation for the Web pagesyou visit.

You can configure Identity Safeto display your cards that youcreated for the Web sites thathave forms. You can alsoconfigure the autofill settings forthe Web sites that containsecurity threats.

In addition, you can do thefollowing activities:1 Configure the region for your

card information.1 Specify how you want Norton

Identity Safe to use theautofill feature.

1 Set the options that makeIdentity Safe to display amessage to notify you thatyou have inserted an externaldrive.

1 Set the options that makeIdentity Safe to warn youabout the unsafe removal ofexternal drives.

1 Turn off the browser’spassword manager

Browsing Options

Lets you change the passwordsettings and the security level ofyour Identity Safe password.

w You should change yourIdentity Safe passwordfrequently to keep your IdentitySafe data from being misused.

Password & Security

Securing your sensitive dataAbout securing your sensitive data

356

Page 357: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you manage your personalinformation such as name, dateof birth, email address, andcredit card information in oneplace.

You can use the information thatyou store to automatically fillforms. This feature lets youprovide sensitive informationwithout typing it when you areonline. In this way, Identity Safeprotects you from keyloggersthat steal and misuse youridentity.

Edit Cards

Lets you manage your variouslogin information.

Logins include information suchas your email login credentialsand Internet bankingcredentials.

When you save all of your logininformation in the Identity Safe,you can do the following:1 Easily track all your logins

1 Quickly launch your loginWeb sites

1 View or update yourpassword for the Web site

1 Use folders to organize yourlogins

1 Change your login settings

Edit Logins

357Securing your sensitive dataAbout securing your sensitive data

Page 358: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you store and managesensitive information.

You can save social securitynumber, driver's license number,insurance policy number, andpassport number. You can alsosave private accounts, lockcombinations, documents, notes,frequent flier numbers, bankaccount number, securitychallenge questions, and legaland financial information.

Edit Notes

Lets you back up the IdentitySafe data in .DAT or .CSV fileformats.

w You should back up all ofyour Identity Safe dataperiodically.

Export Data

Lets you import the Identity Safedata from the backed up file orfrom the portable profile thatyou have from the older versionsof Norton 360.

When you import the IdentitySafe data you have the followingoptions:

1 Merge the imported data into the vault that you arecurrently logged in.

1 Replace the existing IdentitySafe data that you stored inyour vault that you arelogged in with the importeddata.

Import Data

Securing your sensitive dataAbout securing your sensitive data

358

Page 359: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you move your Identity Safedata that you stored in your localvault to online vault.

w When you sync yourIdentity Safe data from localvault to online vault, the data inthe local vault is permanentlyremoved.

Sync Data Online

Lets you permanently removethe Identity Safe vault.

Delete Data

About Edit logins

The Edit Logins feature in Identity Safe lets you viewall the logins that you want Identity Safe to manage.Login information includes information such as youremail login credentials and Internet bankingcredentials.

Identity Safe provides you the option to save yourlogins when you enter your login information in a Website's login page. You can instantly save your logininformation in Identity Safe.

w To manage your logins, you must be logged in toIdentity Safe.

Identity Safe offers the following features:

1 Safely stores Web site login information

1 Lets you save multiple IDs or accounts andpasswords for a Web site

1 Lets you organize your logins under various folders

1 Intelligently searches for a particular login

1 Lets you save the Web site name with a name otherthan the default name

1 Displays the login ID and lets you show or hide thepassword

1 Displays the strength of the password for your login

359Securing your sensitive dataAbout securing your sensitive data

Page 360: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 Lets you quickly launch the Web site login page

1 Fills in your login automatically when you revisitWeb pages

1 Lets you manually add logins

1 Lets you change the URL of your saved logins

1 Lets you view the last time you made changes tothe settings of your saved logins

1 Lets you access the login features that you savedfor a Web site even after Norton 360 expires.

The Identity Safe features are supported in the InternetExplorer, Firefox, or Chrome Web browsers.

w Norton 360 supports latest versions of Google Chromeand Firefox.

You can use the Vault Open menu that is available onthe Norton Toolbar to view and autofill the details ofthe saved logins.

You can also use LoginAssistant option on the NortonToolbar to view, copy, or edit the logins or cards inyour online vault.

Login Assistant window has the following options:

Lets you view the logincredentials of the web pagecurrently loaded in yourbrowser.

Website Login

Lets you view the Cards thatyou have saved in your onlinevault.

Cards

Lets you view all the logincredentials that you havesaved in your online vault.

All Logins

If you have saved multiple logins for a same Web site,you can choose a login from the drop-down list that

Securing your sensitive dataAbout securing your sensitive data

360

Page 361: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

appears on the top left corner of the Login Assistantwindow.

Identity Safe automatically detects login fields whichare not auto filled or filled incorrect by Identity safein the Web pages and displays the Need Assistancemenu bar in your browser. The NeedAssistancemenubar will let you use the saved login credentials. If youwant manually enter the details from your IdentitySafe data, you can click Copy option to copy and pastethe information.

w You need to validate your vault password for managingthe login credentials in the Login Assistant window,if you have selected Require Identity Safe passwordbefore filling option in the Edit Logins window.

Saving logins

Norton 360 automatically saves your login details whenyou enter them for the first time. You can save multiplelogins for the same Web page. You can also save thesame login for different Web pages.

If you do not want your logins to be savedautomatically, you can use the following option in theBrowsing Option window:

1 Yes, Save Automatically

1 No, Never Save any logins

1 Ask before saving

By default Yes, Save Automatically option is set.

After Identity Safe saves a login, it automatically fillsthe login details next time you visit the Web site.

You must be logged in to Identity Safe to save and useautofill passwords. If the password or user name fieldis blank, Identity Safe does not prompt you to save thelogin.

Identity Safe lets you access all the login features thatyou saved for a Web site even after the product expires.

361Securing your sensitive dataAbout securing your sensitive data

Page 362: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To save a login

1 Go to the Web site for which you want to save yourlogin.

2 Type your login details, and then click the optionor link that logs you in.Norton 360 automatically saves your login detailswhen you enter them for the first time.

To save additional logins for a Web site

1 Go to the Web page for which you want to saveanother login.Your login credentials automatically appear on theWeb page.

2 Clear the login credentials that appear on the Webpage.

3 Type the new login, and then click the option or linkthat logs you in.

4 On the Norton Toolbar, in the Login Saved to YourVault row, click Options.

5 In the Save Login for Site dialog box, type a namefor your login in the Name box, select the folder inwhich you want to save your login from the Folderdrop-down list.

6 Click Save.

Editing logins

Edit Logins lets you view all of the logins that you wantIdentity Safe to manage.

Edit Logins provides the following features:

1 Lets you safely store Web site login information.

1 Lets you save multiple IDs or accounts andpasswords for a Web site.

1 Lets you organize your logins under various folders.

1 Intelligently searches for a particular login.

1 Lets you save the Web site name with a name otherthan the default name.

Securing your sensitive dataAbout securing your sensitive data

362

Page 363: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 Displays the login ID and lets you show or hide thepassword.

1 Displays the strength of the password for each ofthe logins.

1 Lets you quickly launch the Web site login page.

1 Fills in your login automatically when you revisitWeb pages.

1 Lets you manually add logins.

1 Lets you change the URL of your saved logins.

1 Lets you view the last time you made changes tothe settings of your saved logins.

w Edit Logins also lets you access all the login featuresthat you saved for a Web site even after Norton 360expires.

To create a new folder

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Logins row, clickConfigure.

3 In the EditLogins window, click CreateNewFolder.

4 In the New Folder dialog box, in the Enter newfolder name box, type a folder name.

5 Click OK.

6 Click Close.

To add a login manually

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Logins row, clickConfigure.

3 In the EditLogins window, click CreateNewLogin.

4 In the New Login dialog box, type the URL of theWeb site or a name for which you want to use thislogin.If it is a URL, ensure that you prefix it with HTTPor HTTPS.

5 Click OK.

363Securing your sensitive dataAbout securing your sensitive data

Page 364: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

6 In the Username dialog box, in the Enter newusername box, type the user name of the login, andthen, click OK.

7 In the Information dialog box, click OK.The Information dialog box prompts you to set apassword for the login that you created.

8 In the Edit logins window, in the Password box,type the password of your login.

9 Click Close.

10 In the Save dialog box, click Yes to save the changes.The Save dialog box appears only if you set apassword for the login that you created.

To set a password for the login that you addedmanually

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Logins row, clickConfigure.

3 In the EditLogins window, under Logins, select thelogin for which you want to set a password.

4 Under Details, next to Password box, click Show.The Validate Password for Identity Safe windowappears. This window appears only if you havechanged the Identity Safe password security levelto Ask for my password before filling out a loginor form in the Password & Security window.

5 In the ValidatePasswordforIdentitySafe window,do the following:

1 In the Enter the Password box, type yourIdentity Safe password.

1 Click Validate.

6 In the Edit Logins window, in the Password box,type your Identity Safe password.

7 Click Close.

8 In the confirmation dialog box, click Yes to save thechanges.

Securing your sensitive dataAbout securing your sensitive data

364

Page 365: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To delete a login or a folder

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Logins row, clickConfigure.

3 In the EditLogins window, under Logins, select theWeb site name or the folder that you want to delete.You can only delete the folders that you manuallycreate; You cannot delete the folders createdthrough auto categorization.

4 Click Delete.

5 In the Warning dialog box, click Yes.

6 Click Close.

You can also use LoginAssistant option on the NortonToolbar to view, copy, or edit the logins or cards inyour online vault.

Identity Safe automatically detects login fields whichare not auto filled or filled incorrect by Identity safein the Web pages and displays the Need Assistancemenu bar in your browser. The NeedAssistancemenubar will let you use the saved login credentials. If youwant manually enter the details from your IdentitySafe data, you can click Copy option to copy and pastethe information.

w You need to validate your vault password for managingthe login credentials in the Login Assistant window,if you have selected Require Identity Safe passwordbefore filling option in the Edit Logins window.

Managing your URL details

Edit Logins lets you view the URL of the logins thatyou saved. You can view the URL of the Web site loginsthat you save in Edit Logins.

When you save a login, you can do the following:

1 Quickly launch the Web site login page using theURL

1 Change the URL of the login manually

365Securing your sensitive dataAbout securing your sensitive data

Page 366: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Ensure that the URL you change belongs to thesame domain as the current URL.

1 View the details of the date and time when you lastmade to the Edit Logins settings

To quick-launch a login Web page

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Logins row, clickConfigure.

3 In the EditLogins window, under Logins, select thelogin for which you want to launch the Web site.If you have saved your login in a folder, double-clickthe folder and select the login.

4 Under Details, click the URL that is available nextto the Address option to launch the Web site.

5 Click Close.

To change the URL of your login

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Logins row, clickConfigure.You can also access the Edit Logins window fromthe Vault Open menu on the Norton Toolbar.

3 In the EditLogins window, under Logins, select thelogin for which you want to launch the Web site.

4 Under Details, click Change that is available nextto the Address option.

5 In the Update URL window, in the Enter the newURL here box, type the new URL.Ensure that the URL you modify is valid and isprefixed with HTTP or HTTPS.

6 Click OK.

7 In the Edit Logins window, click Close.

Securing your sensitive dataAbout securing your sensitive data

366

Page 367: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Changing the user name and password

Identity Safe lets you change the user name andpassword for the logins that you have saved in the EditLogins window. The updated information isautomatically filled the next time you visit that Webpage.

To change the user name

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Logins row, clickConfigure.

3 In the EditLogins window, under Logins, select theWeb site name for which you want to change theuser name.

4 Under Details, next to Username box, clickChange.

5 In the Username dialog box, in the Enter newusername box, type the new user name.

6 Click OK.

7 In the Edit Logins window, click Close.

To change the password

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Logins row, clickConfigure.

3 In the EditLogins window, under Logins, select theWeb site name for which you want to change thepassword.

4 Under Details, next to the Password box, clickShow.The Validate Password for Identity Safe windowappears. This window appears only if you havechanged the security level of the Identity Safepassword to Askformypasswordbeforefillingoutaloginorform in the Password&Security window.

367Securing your sensitive dataAbout securing your sensitive data

Page 368: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

5 In the ValidatePasswordforIdentitySafe windowdo the following:

1 In the Enter the Password box, type yourIdentity Safe password.

1 Click Validate.

6 In the Edit Logins window, in the Password box,type the new password.

7 Click Close.

8 In the confirmation dialog box, click Yes to save thechanges.

Updating the password for a login

Good security practice requires that you regularlychange the password for a login. You can keep yourlogin credentials in Identity Safe updated every timeyou change your password for a Web page. The updatedinformation is automatically filled the next time youvisit that login's associated Web page.

You can also update your new login information inIdentity Safe when you are on the Web page. IdentitySafe asks you if you want to update your logins.

To update the password for a login

1 Go to the Web page for which you want to changethe password information.

2 Clear the password entry that Identity Safeautofilled.

3 Type the new password, and then click the buttonor link that logs you in.

4 In the Savenewpasswordforlogin? menu bar, clickSave.

About Edit Cards

The EditCards option in Identity Safe lets you manageyour personal information such as name, date of birth,email address, and credit card information in one place.

Securing your sensitive dataAbout securing your sensitive data

368

Page 369: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can use the information that you store in the cardsto do the following:

1 Automatically fill forms

1 Provide sensitive information without having totype it while you are online

In this way, Identity Safe protects you from keyloggersthat steal and misuse your identity.

w Some Web sites have forms with fields for credit cardsor other personal information. The Vault Open menuon the NortonToolbar lists the cards that you createdfor autofill. You can choose a card from the list to fillthe forms automatically.

You can add, view, edit, and duplicate the details of anycard that you create. You can also delete a card if it isno longer needed.

In addition, Edit Cards provides you the followingfeatures:

1 Lets you password-protect the card to protectyourself from misuse of your sensitive informationand personal information

1 Recognizes the Web pages that have forms andimmediately displays a pop-up window with the listof cards

1 Provides you a quick view of any of your cards thatis not password-protected

Identity Safe provides additional security for yourpassword-protected cards by not displaying thesummary of the card

Identity Safe automatically detects login fields whichare not auto filled or filled incorrect by Identity safein the Web pages and displays the Need Assistancemenu bar below the Norton Toolbar in your browser.The Need Assistance menu bar lets you choose therequired card from the list of cards that you have saved.You can also click LoginAssistant option to select thecard to fill the Web site with the details that are savedin the card.

369Securing your sensitive dataAbout securing your sensitive data

Page 370: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can also copy and edit the required fields from theselected card in the Login Assistant window. Bydefault, the important data such as Passwords, CreditCard number, and birth date are hidden; you need toselect Show option to view and copy the data.

w Symantec recommends you to clear your data copiedfrom the cards by selecting Clear Clipboard option.

Adding cards

The cards in the Edit Identity Cards window help youto automatically fill forms on Web sites with a singleclick. You can create cards to store information, suchas personal details, contact details, and credit carddetails. You can provide a card name to help youidentify a specific card.

If you have more than one credit card, you can createmultiple cards with different sets of information. Whenyou visit a transactional Web site, you can provide thecredit card details that are present in any of the cardsthat you created.

You can also create anonymous cards for use onunfamiliar Web sites where you may be uncomfortableproviding your personal information. You canautomatically fill online forms when you visit a Website.

To add a card

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Cards row, clickConfigure.

3 In the Edit IdentityCards window, click AddCard.

Securing your sensitive dataAbout securing your sensitive data

370

Page 371: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

4 Use the following tabs to type your card details:

Provide details such as cardname, name, gender, and dateof birth. You can set a passwordand provide additional securityfor your card.

Online form filling islanguage-specific. In theCountry/Regionbox, the countryUnited States is selected bydefault. You should change yourregion and create a new cardbefore you fill online forms forany other language.

General

Provide your contact informationin this section. Contactinformation includes your emailaddress, postal address, andphone numbers.

Contact

Provide your credit card detailssuch as the type of the card,expiration date, and cardnumber in this section. Youcannot enter a credit cardnumber of more than 16 digits.

Credit Card

5 Click Save.

6 Click Close.

Editing, deleting, or duplicating cards

All the cards that you have saved in Identity Safe arelisted in the Edit Identity Cards window. You canselect, view, duplicate, and edit the details of any cardthat you created. You can delete a card if it is no longerneeded. You can also duplicate a saved card and changeonly the fields that you want to change.

371Securing your sensitive dataAbout securing your sensitive data

Page 372: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can view a summary of the card that you created.You can select any of the cards that are present in thelist of cards at the left pane of the Edit Identity Cardswindow. When you select a card, you can view asummary of the card.

w When you lock your card with a password, IdentitySafe provides additional security to your card. Youcannot view the summary of the locked card. Youcannot edit, delete, or duplicate a card unless youprovide the password.

If you have multiple cards, use the scroll arrows tobrowse the list.

When you create, duplicate, or edit a card, the card'sregion is set to the user's default region. If you browseto a Web site other than the default region and use thecard to fill the form on that Web site, the fields maynot fill correctly. For example, your card has a defaultUnited States region but you are on a France Web page.In this case, you must use the card with France as theregion to fill the Web page form.

To edit a card

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Cards row, clickConfigure.

3 In the Edit Identity Cards window, select the cardthat you want to edit.

4 Click Edit Card.

5 Modify the required details that you want to change.

6 Click Save.

7 Click Close.

To delete a card

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Cards row, clickConfigure.

Securing your sensitive dataAbout securing your sensitive data

372

Page 373: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 In the Edit Identity Cards window, select the cardthat you want to delete.

4 Click Delete Card.

5 In the Warning dialog box, click Yes.

6 Click Close.

To duplicate a card

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Cards row, clickConfigure.

3 In the Edit Identity Cards window, select the cardthat you want to duplicate.

4 Click Duplicate Card.

5 Modify the details that you want to change.

6 Click Save.

7 Click Close.

Identity Safe automatically detects login fields whichare not auto filled or filled incorrect by Identity safein the Web pages and displays the Need Assistancemenu bar below the Norton Toolbar in your browser.The Need Assistance menu bar lets you choose therequired card from the list of cards that you have saved.You can also click LoginAssistant option to select thecard to fill the Web site with the details that are savedin the card.

You can also copy and edit the required fields from theselected card in the Login Assistant window. Bydefault, the important data such as Passwords, CreditCard number, and birth date are hidden; you need toselect Show option to view and copy the data.

w Symantec recommends you to clear your data copiedfrom the cards by selecting Clear Clipboard option.

About Edit Notes

Identity Safe stores and manages your sensitiveinformation. It becomes difficult to manage all of the

373Securing your sensitive dataAbout securing your sensitive data

Page 374: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

identity numbers that you use when you browse theWeb. The Edit Notes option in Identity Safe stores allyour sensitive IDs in a very secure way and lets youuse them easily when you are online. You can use EditNotes to save information such as social securitynumber, driver's license number, insurance policynumber, and legal and financial information.

Editing Notes

You can use the Edit Notes option in Identity Safe tostore your personal information, which you can retrieveand use when needed. You can use this information tofill out Web site registration forms. You can also view,edit, and delete the notes that you have saved.

To create Notes

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Notes row, clickConfigure.

3 In the EditNotes window, under Details, in the Titlebox, type a title for the note you want to save.If a note already exists, click CreateNewNotes, andthen under Details, in the Title box, type a title forthe note you want to save.

4 Type any additional information in the Informationbox.

5 Click Save.

6 In the Edit Notes window, click OK.

To edit Notes

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Notes row, clickConfigure.

3 In the Edit Notes window, under Title, select thetitle of the note that you want to edit.

Securing your sensitive dataAbout securing your sensitive data

374

Page 375: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

4 Click EditNotes, and modify the information underDetails.You can change the category, modify the title, andedit the additional information that you haveprovided.

5 Click Save.

6 In the Edit Notes window, click OK.

To delete Notes

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Edit Notes row, clickConfigure.

3 In the Edit Notes window, under Title, select thetitle of the note that you want to delete.

4 Click Delete Notes.

5 In the Warning dialog box, click Yes.

6 In the Edit Notes window, click OK.

About exporting and importing Identity Safe data

You can export your Identity Safe data for securitypurposes, data recovery, or when you transfer yourIdentity Safe data to a new computer. The backup filesare saved as .DAT files.

You can protect the files that you backed up with apassword. Symantec recommends that you use apassword to keep your Identity Safe data more secure.The backup password does not need to be the same asyour Identity Safe password. You must provide thepassword when you restore the Identity Safe data thatyou backed up.

You can import your Identity Safe data from the filethat you previously backed up. You can also import theIdentity Safe data from the portable profile.

When you import the Identity Safe data you have thefollowing options:

375Securing your sensitive dataAbout securing your sensitive data

Page 376: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 Merge the imported data in to the vault that youare currently logged in.

1 Replace the existing Identity Safe data that youstored in your vault that you are logged in with theimported data.

w You can also delete the data once the import iscomplete.

Exporting your Identity Safe data

You can export your Identity Safe data for securitypurposes, data recovery, or when you transfer yourIdentity Safe data to a new computer.

You can retrieve Identity Safe data when your productexpires.

To export your Identity Safe data

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Export Data row, clickConfigure.

3 In the ExportIdentitySafeData window, select theFile Format.You can select one of the following:

1 Identity Safe Backup Format

1 Plain text

4 In the Exportmydata to box, type or browse to thelocation to which you want your data saved.

5 Type the name that you want to assign to the file.

6 If you want to back up your data with a passwordfor more security, type and confirm the password.

7 Click OK.In the ValidatePasswordforIdentitySafewindow,enter your vault password to export your IdentitySafe data

8 In the confirmation dialog box, click OK.

Securing your sensitive dataAbout securing your sensitive data

376

Page 377: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Importing your Identity Safe data

You can import your Identity Safe data from the filethat you previously backed up. You can also import theIdentity Safe data from the portable profile that yousaved in the older version of Norton 360.

You can merge the imported data in to the vault thatyou are currently logged in or replace the existingIdentity Safe data that you stored in your vault thatyou are logged in with the imported data.

w The Merge with existing data and Replace existingdata options appear only when you import IdentitySafe data from a backup file.

When you import Identity Safe data from local orportable profile, you can only merge the data. TheDeleteOriginaldataoncemerged option appears whenyou import the data from local or portable profile. Bydefault, this option is enabled.

w When importing, the file size must not be more than15 MB for .CSV files and 35 MB for .NPM files.

To import your data

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Import Data row, clickConfigure.

377Securing your sensitive dataAbout securing your sensitive data

Page 378: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 In the Import Identity Safe Data window, underImport my data from, select one of the followingoptions:

1 Portable Profile (Drive: Drive:\)This option appears only if you connect anexternal drive with a portable profile.

1 Local ProfileSelect this option if you want to import theIdentity Safe data from your local vault to onlinevault. This option appears only if you are loggedin to your online vault.

1 Backup FileIf you select this option, you must type or browseto the location of the file from which you wantto import the data.

4 If you backed up your data with a password, in thePassword box, type the password.

5 If you want to import the data from a backup file,under While importing data, select one of thefollowing options:

1 Merge with existing data

1 Replace existing data

6 Click OK.

7 In the confirmation dialog box, click OK.

About Browsing Options

BrowsingOptions lets you configure the way you wantIdentity Safe to collect, store, and display the logininformation for the Web pages you visit. You canconfigure Identity Safe to display your cards that youcreated for the Web sites that have forms. You can alsoconfigure the autofill settings for the Web sites thatcontain security threats.

Securing your sensitive dataAbout securing your sensitive data

378

Page 379: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can configure the following options in theBrowsing Options window:

Configures Identity Safe todisplay your logins each timeyou visit a Web site that hasmultiple logins.

Displaymy Logins each timeI visit a page with multipleLogins

Automatically fills your logindetails when you visit a Website.

Autofill my logins when Ivisit websites

Automatically categorizes thesaved logins in theirrespective folders such asBanking, Shopping, News,and so on.

Autocategorize Logins

Displays your Identity Cardseach time you visit a Webpage with forms to fill yourpersonal details.

Display my Identity Cardseach time I visit a page withfillable form

Lets you save the logincredentials for the Web sitesthat you visit.

You can use the followingoptions:

1 Yes, Save Automatically

1 No, Never Save anylogins

1 Ask before saving

Save my credentials when Ilog in to Web sites

In addition, you can use the Autofill sites containingsecurity threats option to specify how you wantIdentity Safe to respond to the Web sites that havesecurity threats. You can also turn off the browser’spassword manager using the Turn off the browser’spassword manager option.

379Securing your sensitive dataAbout securing your sensitive data

Page 380: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

About Password & Security

You can use Password & Security to change yourIdentity Safe password. You can also use this option toset the level of security that you want for Identity Safepassword usage.

The following sections let you change the Identity Safepassword and set security levels for your password:

Change your Identity Safepassword and set a newpassword hint using theChange Password option.

Identity Safe Password

Securing your sensitive dataAbout securing your sensitive data

380

Page 381: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Password Security

381Securing your sensitive dataAbout securing your sensitive data

Page 382: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Specify the Identity Safepassword security level.

Identity Safe provides fourlevels of security to protectyour Identity Safe password.Choose one of the followingoptions:1 Ask for my password at

the beginning of eachlogin session

Prompts for your IdentitySafe password the firsttime you access IdentitySafe.

If you are logged in toWindows, you do not needto provide the passwordagain.

You should use thisoption to make your logincredentials more secure.

1 Ask for my passwordbefore filling out a loginor form

Prompts for your IdentitySafe password with everyonline form before itautofills any login.

You can specify thatindividual logins requireyour Identity Safepassword before autofilloccurs.

1 Automatically log out ofIdentity Safe if it isinactive for

Automatically logs youout of Identity Safe whendo not use your IdentitySafe for a specified time

Securing your sensitive dataAbout securing your sensitive data

382

Page 383: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

period. You can specifythe idle time-out periodas 15, 30, or 45 minutes.

Use this option if otherpeople have access toyour computer.

1 Ask for my passwordafter sleep orhibernation

Prompts you for yourIdentity Safe passwordwhen your systemrestores from suspendedstate.

This option preventsmisuse of your IdentitySafe data by validatingyour Identity Safepassword each time yoursystem restores fromsuspended state.w Norton360promptsyou to enter your IdentitySafe password only if youhad logged into yourIdentity Safe vault whenthe system moved to thesuspended state.

w You must validate yourIdentity Safe password eachtime you change the securitylevel of the vault to a settingthat is less secure than thecurrent security level.

Changing the Identity Safe password

You should change your Identity Safe Passwordregularly to prevent unauthorized access to yourpersonal information in Identity Safe. You can change

383Securing your sensitive dataAbout securing your sensitive data

Page 384: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

the password by using the Password&Security optionin Settings window.

If you want to change the Identity Safe password ofyour online vault, the password you provide must havethe following characteristics:

1 At least eight characters

1 At least one capital letter

1 At least two numerals (0 through 9)

1 At least one symbol (for example, * > & $ %)

1 The password must not match with your NortonAccount user name or password.

w You can set your password hint here if you did notprovide it when you configured Identity Safe.

To change the Identity Safe password

1 In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.

2 Under Identity Safe, in the Password & Securityrow, click Configure.

3 In the Password & Security window, click ChangePassword.

4 In the ChangeIdentitySafePassword window, typethe current password and the new password, andconfirm the new password.

5 Click OK.

6 In the confirmation dialog box, click OK.

About Norton ToolbarWhen you install Norton 360, it adds Norton Toolbarto Internet Explorer, Firefox, and Chrome Webbrowsers.

Securing your sensitive dataAbout securing your sensitive data

384

Page 385: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You have the following options in the NortonToolbar:

Lets you access IdentityProtection and other settings.

The following options areavailable in the Norton menu:1 Report Site

1 Settings

1 Go to Norton Safe Webwebsite

1 Enable Norton Safe Web

1 Enable Norton SafeSearch/DisableNortonSafeSearch

1 My Norton Account

1 Help

w The Minimize Toolbaroption appears only in theInternet Explorer browser. Also,the Community Buzz option isavailable only inEnglish-language versions ofWindows.

Norton menu

385Securing your sensitive dataAbout securing your sensitive data

Page 386: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you access the Identity Safedata stored in your online vault.You can add, edit or delete yourLogins, Cards, and Notes underthis section.

You can use the Norton SafeSearch option to enhance yourWeb search experience. TheNorton Safe Search usesAsk.com to generate the searchresults. Norton Safe Searchgenerates the search resultsbased upon the site safety statusand Norton rating for each of thesearch results.

You can also set this page asyour default home page.

Navigate to the IdentitySafe Home Page icon

Lets you share the Web site withyour friends through the popularnetworking sites such asFacebook, Twitter, LinkedIn,Yahoo Mail, Hot Mail or GoogleMail.

Share

Lets you know if the Web siteyou visit is safe or unsafe.

The Antiphishing and NortonSafe Web options under theSafeSurfing section on the Settingswindow of the IdentityProtection option in the mainSettings window, analyze thesecurity level of the Web sitesyou visit. It then displays theresults in theNorton Site Safetypop-up window.

Safe Web indicator

Securing your sensitive dataAbout securing your sensitive data

386

Page 387: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you view the logins andcards that you have saved inIdentity Safe.

Some Web sites have forms tofill or require login information.You can use the VaultOpen/Vault Closed menu to fillthe details in those Web sites.The Vault Open/Vault Closedmenu displays the list of alllogins and cards that you saved.You can select a login from thelist and a use it to log in to theWeb site. You can also select acard from the list and use to fillforms.

You can use theOption submenuto manage your logins, cards,and notes and to access theIdentity Protection settingswindow. In addition, you can editand delete a login using theVault Open/Vault Closed menu.

w You should be logged in toany of the Identity Safe vault toaccess the Vault Open/VaultClosed menu.

Vault Open/Vault Closedmenu

Lets you view and copy thelogins or cards that you saved inyour Identity Safe vault. You canselect the desired login or cardfrom the drop-down menu to fillin the Web site.

w You must enable Show FillForm Assistant option, underthe Vault Open menu on theNorton Toolbar.

Fill Assistant

387Securing your sensitive dataAbout securing your sensitive data

Page 388: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

In Google Chrome Web browser, the Norton Toolbarcan be accessed as a Chrome Extension. In theExtensions page of the Chrome browser, you can enableor disable the Norton Toolbar, and uninstall theNorton Toolbar from your Chrome browser.

If the Norton Toolbar is enabled, you can access thefollowing options:

Lets you browse internet instealth mode without storingdata of your browsing sessionin browsing or downloadhistories.

Allow in incognito

Lets you view the URLlocation of the downloadedfile.

Allow access to file URLs

w If you have uninstalled the NortonToolbar from yourChrome browser, you must reinstall Norton 360 toaccess the Norton Toolbar on your Chrome browseragain.

Norton 360 lets you install the NortonToolbar for freeeven after you uninstall the product. When youuninstall Norton 360, it offers to leave the NortonToolbar without any cost to search and browse safelyover the Internet. However, when you choose to installthe Norton Toolbar, the only features that you haveare Norton Safe Search and Norton Safe Web.

w Your computer must be connected to the Internet toavail this option. Norton 360 does not offer to leavethe NortonToolbar if you upgrade your product to thelatest version or choose to reinstall another Nortonproduct.

Hiding and showing the Norton Toolbar

You can hide the NortonToolbar if you do not want tosee the evaluation of every Web site that you visit.

Securing your sensitive dataAbout securing your sensitive data

388

Page 389: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

When you hide the toolbar, Norton 360 does not displaythe Norton Site Safety pop-up window. However,Norton 360 notifies you about suspicious andfraudulent Web sites or if an error needs yourattention.

To hide or show the Norton Toolbar in the InternetExplorer and Firefox Web browsers

1 At the top of your browser window, click View.

2 On the Toolbars submenu, do one of the following:

1 Uncheck Norton Toolbar to hide the toolbar.

1 Check Norton Toolbar to show the toolbar.

To hide or show the Norton Toolbar in the ChromeWebbrowser

1 At the top-right corner of your Web browser, clickthe Wrench icon.

2 In the main menu that appears, click Tools >Extensions.

3 In the Web page that appears, under Extensions, doone of the following:

1 Click Disable to hide the toolbar.

w You can also hide the Norton Toolbar byright-clicking the NortonToolbar icon near theWrench icon. However, you cannot enable theNortonToolbar using the NortonToolbar icon.

1 Click Enable to show the toolbar.

To hide the Norton Toolbar button in the Chrome Webbrowser

4 At the top-right corner of your Web browser,right-click the NortonToolbar icon, and then clickHide button option.

To show the Norton Toolbar button in the Chrome Webbrowser

1 At the top-right corner of your Web browser, clickthe Wrench icon.

389Securing your sensitive dataAbout securing your sensitive data

Page 390: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

2 In the main menu that appears, click Tools >Extensions.

3 Under Extensions page, click Show button option.

Accessing Identity Safe settings from the Norton Toolbar

When you install Norton 360, it adds the NortonToolbar to the Internet Explorer, Firefox, and ChromeWeb browsers. The Vault Open menu on the NortonToolbar provides quick links to access the optionsunder Identity Safe.

To access the Identity Safe settings from the Nortonmenu

1 Start your Web browser.

Securing your sensitive dataAbout securing your sensitive data

390

Page 391: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

2 On the NortonToolbar, in the Norton menu, selectone of the following:

Lets you report to Symantecabout the current Antiphishingevaluation.

Report Site

Lets you minimize the NortonToolbar.

Minimize Toolbar

When you check this option, theIdentity Safe phrase and theSafe Web phrase disappear andonly the Identity Safe and SafeWeb indicators remain.

In addition, the size of theNorton Safe Search box isreduced.

w The Minimize Toolbaroption appears only in theInternet Explorer browser.

Lets you open the IdentityProtection settings window and

Settings

configure the Identity Safeoptions.

Lets you open the Norton SafeWeb sitehttp://www.safeweb.norton.com.

Go to Norton Safe Webwebsite

391Securing your sensitive dataAbout securing your sensitive data

Page 392: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you turn on the Norton SafeWeb feature which provides asafe online browsing experience.

The following are the uniquefeatures of Norton Safe Web:

1 Displays the site safetyrating icons next to thesearch results

1 Displays the site safetyrating icons when you are ona Web site

Enable Norton Safe Web

Lets you view the Norton SafeSearch box.

You can type a search string inthe Norton Safe Search box andperform a search. The search boxdisplays relevant searchsuggestions in a pop-up window.

By default, the Norton SafeSearch box is enabled. If youwant to disable Norton SafeSearch, you can use the DisableNorton Safe Search option.

Enable Norton SafeSearch/ Disable NortonSafe Search

Lets you open the Web sitehttps://account.norton.com.

Norton Account lets you registeryour product with Symantec andmanage all of your Nortonproducts in one place.

My Norton Account

Lets you view the Norton menuhelp page.

Help

Securing your sensitive dataAbout securing your sensitive data

392

Page 393: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Accessing the Vault Open/Vault Closed menu

The Vault Open/Vault Closed menu on the NortonToolbar lets you view and manage the logins, Identitycards, and notes that you saved.

You can also access the Identity Protection of theSettings window using the Vault Open/Vault Closedmenu

In addition, you can do the following:

1 Navigate to any Web site for which you have savedthe login credentials.

1 Submit feedback about your experience withIdentity Safe.

1 Export your Identity Safe data.

1 Import your Identity Safe data from the file youbacked up or from the portable profile.

1 Convert your local vault to online vault.

When you visit any login Web page without setting upyour Identity Safe, a menu bar appears in the NortonToolbar. You can use the Setup option that is availablein the menu bar to set up Identity Safe.

Vault Open/Vault Closed menu lets you view the loginsthat you saved even after the product expires. You canuse this option to autofill the login details of the savedlogin. As Antiphishing is disabled when the product isexpired, it is not recommended to autofill the logindetails. In addition, you can view the IdentityProtection settings window. However, you cannot view,access, or configure all the features in the IdentityProtection settings after Norton 360 expires.

To access your logins from the Vault Open/Vault Closedmenu

1 Start your Web browser.

393Securing your sensitive dataAbout securing your sensitive data

Page 394: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

2 On the Norton Toolbar, in the Vault Open/VaultClosed menu, select one of the following:

Lets you merge the IdentitySafe data from your portable

Merge Portable Data(Drive:\)

profile that you have createdfrom the previous versions ofNorton 360.

w This option appears intheVault Open/Vault Closedmenu only if you haveconnected an external drivewith portable profile.

You can select this option ifyou want to autofill the login

Stop ignoring this page

information in the currentWeb page.

w This option appears intheVault Open/Vault Closedmenu only if you selectIgnore this page option.

Lets you view the list oflogins that you used recentlyin that computer.

Recently Used Logins

w You can view only thelatest five logins that youused.

Lets you view the list of allthe logins you have stored inIdentity Safe.

All Logins

Securing your sensitive dataAbout securing your sensitive data

394

Page 395: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Settings

395Securing your sensitive dataAbout securing your sensitive data

Page 396: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you view the variousoptions that are available inIdentity Safe.

The options are:1 Edit Logins

Lets you open the EditLogins window.

1 Edit Identity Cards

Lets you open the EditIdentity Cards window.

1 Edit Notes

Lets you open the EditNotes window.

1 Export

Lets you open the ExportIdentity Safe Datawindow.

1 Import

Lets you open the ImportIdentity Safe Datawindow.

1 Sync to Online

Lets you open the SyncIdentity Safe DataOnlinewindow.

You can move yourIdentity Safe data thatyou stored in your localvault to online vault. Youmust log in to your NortonAccount to move yourdata online.w This option appearsin the Vault Open menuonly when you are loggedin to your local vault.

1 Ignore this page

You can select this optionif you do not want to

Securing your sensitive dataAbout securing your sensitive data

396

Page 397: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

autofill the logininformation in the currentWeb page.

Lets you open the NortonFeedback Web site.

You can submit feedback onyour experience with IdentitySafe. You can also submit theproblems that youencountered with IdentitySafe. You can select from thelist of problems or you candescribe your problem.

Report Issue

Lets you log out of or log into Identity Safe.

You should log out of IdentitySafe to secure your IdentitySafe data when you are awayfrom your computer.

Close Vault

397Securing your sensitive dataAbout securing your sensitive data

Page 398: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Securing your sensitive dataAbout securing your sensitive data

398

Page 399: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This chapter includes the following topics:

1 About the Network Security Map

About the Network Security MapA home network typically consists of the computersand other devices that share your Internet connection.The Network Security Map helps you view and manageyour network.

After you configure Network Security Map, Norton 360automatically detects the devices that are connectedto your network and lists them in the Network SecurityMap. You can view devices and customize the NetworkSecurity Map to remotely monitor the computers onwhich a Norton product is installed.

w Ensure that the computers that you want to remotelymonitor have a version of a Norton product thatsupports Remote Monitoring.

You can access the Network Security Map from the MyNetwork settings window.

You can monitor the following items in the NetworkSecurity Map:

1 Security status of the computers that are connectedto the network

1 Status of the protection features of the computersthat are connected to the network

10Protecting yourhome network

Page 400: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 Subscription status and Norton product version ofthe computers that are connected to your network

1 Status of your wireless network connection

1 Connection status of the devices that are on thenetwork

1 The known, unknown, or intruder devices that areon your network

You can grant or deny permission to the networkeddevices to access your computer.

You can also modify details about a computer or devicethat is connected to your network.

Viewing devices on the Network Security MapThe NetworkSecurityMap window provides a pictorialrepresentation of the devices on the network to whichyour computer is connected. You can view the detailsof each device, such as device name, security status,and IP address.

The Network Security Map window also provides thesecurity status of the following computers:

1 The computer on which you view the remotemonitoring status (MY PC)

1 The computers that are remotely monitored

The trust level of the device appears at the bottom ofthe icon in the network map.

Norton 360 displays devices in the following order:

1 MY PC

1 Devices with online connection status

1 Devices with offline connection status

When you connect a new device to your network,Norton 360 automatically refreshes the NetworkSecurity Map window and displays the device.

Protecting your home networkAbout the Network Security Map

400

Page 401: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

w Norton 360 requires you to configure the SymantecSecurity Driver to open the Network Security Map. Youcannot install the Symantec Security Driver when yourun LiveUpdate. You can either allow the NortonLiveUpdate to complete or close the Norton LiveUpdatesession before you install the Symantec Security Driver.

To view devices on the Network Security Map

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 If the Product Configuration panel appears, clickContinue.The Product Configuration panel appears whenyou click Network Security Map for the first time.The ProductConfiguration panel helps you installSymantec Security Driver that is required to viewthe NetworkSecurityMap window. The process ofinstallation of the Symantec Security Driverdisrupts your network connection temporarily.

5 The Network Security Overview window lets youview the summary of features of the NetworkSecurity Map. The Network Security Overviewwindow appears in the following instances:

1 When you open the Network Security Mapwindow for the first time.

1 When you turn on Welcome Screen at Startupin the Settings window.

6 If the NetworkSecurityOverview window appears,click OK.If you do not want to view the Network SecurityOverview window in the future, check Donotshowthis again before you click OK.

7 In the Network Details drop-down list, select thenetwork that lists the device for which you want tosee the details.

401Protecting your home networkAbout the Network Security Map

Page 402: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To view the details of a device on the Network SecurityMap

Protecting your home networkAbout the Network Security Map

402

Page 403: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

4 In the NetworkSecurityMap window, click a deviceicon.You can use the scroll arrows to view the devicesthat are listed in the network map.The device details section that is located below thenetwork map displays the following details:

Shows the name of the deviceDevice Name

For a computer, the NetworkSecurity Map displays theNetBIOS name by default.However, the Network SecurityMap displays the name of thedevice as NEW if it meets thefollowing conditions:

1 The device does not have aNetBIOS name

1 The device has a firewall thatis enabled

You can change the device namein the Edit Device Detailswindow.

Shows the name of the networkadapter manufacturer of thedevice

Adapter Manufacturer

The adapter manufacturer'sname is based on the physicaladdress (also known as MediaControl Access address or MACaddress) of the device.

403Protecting your home networkAbout the Network Security Map

Page 404: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Shows the category to which thedevice belongs

The device category iconprovides details on theconnection status and securitystatus. Norton 360 labels allunknown devices as NEW andsets the category as GENERICDEVICE.

This category may includecomputer-related devices, suchas printers, media devices, andgame consoles.

You can change the devicecategory in the Edit DeviceDetails window.

Category

Shows how well your computeris protected from threats, risks,and damage

w The security statusappears only for MY PC and thecomputers that are remotelymonitored.

Security Status

Shows the connection status ofRemote Monitoring

The statuses are:

1 ON

1 OFF

You can turn off RemoteMonitoring for an individualcomputer or for all thecomputers that you remotelymonitor.

Remote Monitoring

Protecting your home networkAbout the Network Security Map

404

Page 405: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Shows the access level that isgranted to a remote device toconnect to your computer

The initial trust level is set basedon the configuration of yourcomputer. You can set trust levelfor all devices other thanMYPC.

Trust Level

Shows the status of theconnection

The statuses are:

1 ONLINE

1 OFFLINE

Connection

Shows the physical address (alsoknown as the Media AccessControl address or MAC address)of the computer or device

Physical Address

Shows the IP address of thecomputer or device

If you change the IP address ofa device, the updated IP addressappears in theNetwork SecurityMap window when you refreshthe list.

IP Address

Turning off or turning on Network Security OverviewThe Network Security Overview window provides abrief summary about the following features:

1 Wireless Security

1 Remote Monitoring

1 Network Map

1 Trust Controls

405Protecting your home networkAbout the Network Security Map

Page 406: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can click each of the features and read thesummary to learn more about using Network SecurityMap to manage your home network. By default, theNetworkSecurityOverview window appears each timeyou open Network Security Map.

If you do not want to view the Network SecurityOverview window, you can turn it off. Turning off theNetwork Security Overview window does not affectthe performance or security of your computer.

w You can also turn off the NetworkSecurityOverviewwindow if you check Do not show this again optionthat is available at the bottom of the NetworkSecurityOverview window.

To turn off Network Security Overview

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 Under Network Security Map, in the WelcomeScreen at Startup row, move the On/Off switch tothe right to the Off position.

4 Click Apply.

5 Click Close.

To turn on Network Security Overview

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 Under Network Security Map, in the WelcomeScreen at Startup row, move the On/Off switch tothe left to the On position.

4 Click Apply.

5 Click Close.

Setting up Remote MonitoringYou can set up Remote Monitoring by allowingcomputers on your network to communicate with yourcomputer.

Protecting your home networkAbout the Network Security Map

406

Page 407: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

w Ensure that the computers that you want to remotelymonitor have a version of a Norton product thatsupports Remote Monitoring.

Norton 360 requires a Passkey to set up RemoteMonitoring. You must type the same Passkey for allthe computers that you want to remotely monitor.

After you set up Remote Monitoring, you can connectany computer to your network and enter the samePasskey. Norton 360 automatically identifies thecomputer and connects it to the Network Security Map.

To set up Remote Monitoring

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 On the left side of the Network Security Mapwindow, under Remote Monitoring, click Setup.

5 In the Remote Monitoring Setup window, type aPasskey.The Passkey should be between 6 and 20 charactersin length. The Passkey is case sensitive.

6 Under Choose the default mode for ComputerDiscovery, select one of the following options:

Lets your computer alwaysdiscover other computers thatare connected to the network

Computer Discoveryalways on

Lets your computer discoverother computers that areconnected to the network whenthe Network Security Mapwindow is open

Computer Discovery ononly when NetworkSecurity Map screen isdisplayed

7 Click OK.

8 Set up Remote Monitoring for all other computersthat you want to monitor remotely.

407Protecting your home networkAbout the Network Security Map

Page 408: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Turning off Remote MonitoringWhen you turn off Remote Monitoring, you stop remotemonitoring of the computers that are connected toyour network.

You can turn off Remote Monitoring for the following:

1 All of the computers that you remotely monitor

1 An individual computer that you remotely monitor

w You can turn off Remote Monitoring only after youcomplete the Remote Monitoring Setup process.

To turn off Remote Monitoring for all computers

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 On the left side of the Network Security Mapwindow, under Remote Monitoring, click Disable.

5 In the confirmation dialog box, click Yes.

To turn off Remote Monitoring for an individualcomputer

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 In the Network Security Map window, in thenetwork map, click the computer for which you wantto disable Remote Monitoring.

5 In the device details area, next to RemoteMonitoring, click Disable.

6 In the confirmation dialog box, click Yes.

Adding a device to the Network Security MapYou can manually add a computer or device to theNetwork Security Map.

Protecting your home networkAbout the Network Security Map

408

Page 409: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can add the following details when you add adevice:

1 The name or description

1 The IP address or physical address

The Network Security Map finds any computers thatare connected to your network. However, you can addthe computers and the devices that are currently notconnected.

Norton 360 adds to the Trust Control network all thedevices that you manually add to Network SecurityMap. You can select the Trust Control network in theNetwork Details drop-down list to view the devicesthat you added. You can also edit the name of thedevice.

w You cannot edit the Trust Control network details.

The default trust level of the devices that you add tothe Network Security Map is Protected. However, youcan change the trust level of the devices.

w If you trust a device that is not on your network, youcan expose your computer to potential security risks.

To add a device to the Network Security Map

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 On the left side of the Network Security Mapwindow, under Total in Network, click the plussymbol.

5 In the AddaDevice window, in the Name box, typethe name of the device that you want to add to theNetwork Security Map.The maximum character length of the device nameis 15 characters.

409Protecting your home networkAbout the Network Security Map

Page 410: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

6 In the IP or Physical Address box, type the IPaddress or physical address of the device that youwant to add to the Network Security Map.You can use the following formats in the IP orPhysical Address box:

172.16.0.0IPv4 address

fe80::12ac:fe44:192a:14ccIPv6 address

11-22-c3-5a-fe-a4Physical address

ftp.myfiles.comResolvable host

The address that you provide is not verified untilthe device is physically found on the network.

7 Click Add Device.

Finding a computer's IP addressYou can find a computer's IP address in various ways.On Windows 2000/XP, Windows Vista, Windows 7, andWindows 8 computers, you can use the ipconfigcommand to find the IP address of a computer.

The ipconfig command reports the IP address of itslocal computer only. You must run this program on thecomputer that you want to identify.

To find the IP address by using ipconfig on Windows2000/XP

1 On the computer you want to identify, on theWindows taskbar, click Start > Run.

2 In the Run dialog box, type cmd.

3 Click OK.

4 At the command prompt, type ipconfig, and thenpress Enter.

5 Write down the IP address.

Protecting your home networkAbout the Network Security Map

410

Page 411: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To find the IP address by using ipconfig on WindowsVista

1 On the computer you want to identify, on theWindows taskbar, click Start.

2 In the Start Search text box, type cmd, and thenpress Enter on your keyboard.

3 At the command prompt, type ipconfig, and thenpress Enter.

4 Write down the IP address.

To find the IP address by using ipconfig on Windows 7

1 On the computer you want to identify, on theWindows taskbar, click Start.

2 In the Searchprogramsandfiles text box, typecmd,and then press Enter on your keyboard.

3 At the command prompt, type ipconfig, and thenpress Enter.

4 Write down the IP address.

To find the IP address by using ipconfig on Windows 8

1 On the Apps screen, under Windows System, clickCommand Prompt.

2 At the command prompt, type ipconfig, and thenpress Enter.

3 Write down the IP address.

Editing device detailsYou can change the name and category of a device thatis available on the Network Security Map. You canselect the categories such as Generic Device, Laptop,Media Device, or Game Console.

You cannot change the category of the device that youadded manually. By default, Norton 360 displays thecategory of the manually added device as USERDEFINED.

The NetworkSecurityMap window displays differenticons, depending on the category that you select. Icons

411Protecting your home networkAbout the Network Security Map

Page 412: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

help you identify the devices that are listed in thenetwork map.

To edit the details of the device that is on your network

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 In the Network Security Map window, in thenetwork map, click a device icon.

5 In the device details section, next to Device Name,click Edit.

6 In the EditDeviceDetails window, in the Name box,type a new name.The maximum character length of the device nameis 15 characters.

7 In the Category drop-down list, click one of thefollowing device categories:

1 GENERIC DEVICE

1 DESKTOP PC

1 LAPTOP

1 SERVER PC

1 NETWORK PRINTER

1 ROUTER/SWITCH

1 CABLE/DSL MODEM

1 MEDIA DEVICE

1 GAME CONSOLE

1 PDA/MOBILE PHONE

1 NETWORK STORAGE DEVICE

1 WEB CAMERA

1 TABLET

1 MUSIC PLAYER

1 TV

8 Click OK.

Protecting your home networkAbout the Network Security Map

412

Page 413: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To edit the name of the device that you addedmanually

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 In the Network Security Map window, in theNetworkDetails drop-down list, click TrustControl.

5 In the network map, select a device that you added.

6 In the device details area, next to DeviceName, clickEdit.

7 In the Edit Device Details dialog box, in the Namebox, type a new name.

8 Click OK.

Editing network detailsYou can view the details and change the name of yournetwork in the Edit Network Details window.

w You cannot edit the Trust Control network details.

To edit network details

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 In the NetworkSecurityMap window, on the rightside of Network Details, click Edit.

5 In the Edit Network Details dialog box, in theNetwork Name box, type a new name.

6 Click OK.

Changing the trust level of your network and devicesThe trust level determines the default level of accessthat devices on your network have to your computer.Any device on your network that is not explicitlyTrusted or Restricted uses the trust level of your

413Protecting your home networkAbout the Network Security Map

Page 414: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

network. The initial network trust level is set based onthe configuration of your computer.

w Ensure that you change the trust level of a device toFull Trust, if it is a known device, and is connected toyour network.

The following conditions are necessary for the trustlevel of a device to be Shared:

1 The computer should not have a public IP address.

Your computer does not have a public IP address ifit is not directly connected to the Internet.

1 The computer should be connected to a LANthrough a secure connection.

1 The network category should be private in WindowsVista.

In addition, the trust level of a device is Shared in anyof the following cases:

1 When the computer on the network has one or morefolders or printers that are shared

1 When the computer is Media Center compatible (forexample, if you have Windows XP Media CenterEdition, Windows Vista Home Premium, WindowsVista Ultimate, Windows 7 Home Premium,Windows 7 Professional, or Windows 7 Ultimate)

w If you use a wireless network that is not secure, thedefault trust level of all the devices that are on thenetwork is Protected.

The trust level of a device also depends on the trustlevel of its network. When you change the trust levelof a network, Norton 360 assigns the same trust levelto all the devices that are connected to that network.However, Norton 360 does not change the trust levelof the devices that you individually trust or restrict.

You can modify these settings if you want to changethe trust level for the following:

1 Your network

1 Devices that are connected to the Network SecurityMap

Protecting your home networkAbout the Network Security Map

414

Page 415: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To change the trust level of your network

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 In the NetworkSecurityMap window, on the rightside of Network Details, click Edit.

5 In the Edit Network Details window, next to TrustLevel, click Edit.You can view the details of the network in the EditNetwork Details window before you change thetrust level.

415Protecting your home networkAbout the Network Security Map

Page 416: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

6 To select a trust level for a network, in the EditNetwork Trust Level window, click one of thefollowing:

Adds the network to the Trustedlist

FULL TRUST

All the network traffic that yourcomputer receives from aTrusted network is filtered andallowed through firewall.However, known attacks andinfections are still monitored.You should select this settingonly when you are sure that thenetwork is completely safe.

Adds the network to the Sharedlist

SHARED

All the network traffic that yourcomputer receives from a Sharednetwork is filtered. Only sharedresources on your computer,such as files, folders, andprinters are allowed. You shouldselect this setting if you want thefirewall to protect you from alltraffic except those that pertainto file and printer sharing.

Adds the network to theProtected list

PROTECTED

A network is in the ProtectedTrust Level when it has not beenclassified as Trusted, Shared, orRestricted. You remain protectedfrom known attacks and allunexpected traffic.

Protecting your home networkAbout the Network Security Map

416

Page 417: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Adds the network to theRestricted list

The devices that are onRestricted network cannotcommunicate with yourcomputer. However, you can stilluse the network to browse Websites, send email messages, ortransmit other communications.

RESTRICTED

7 Click OK.

To change the trust level of a device

1 In the Norton 360 main window, click Settings.

2 In the Settings window, click My Network.

3 Under NetworkSecurityMap, in the TrustControlrow, click Configure.

4 In the Network Security Map window, do one ofthe following:

1 To edit the trust level of a device that youmanually added, in the network map, click thedevice.

1 To edit the trust level of a device that is on yournetwork, in the NetworkDetails drop-down list,click LocalAreaConnection, and then click thedevice.

5 In the device details section, next to Trust Level,click Edit.

417Protecting your home networkAbout the Network Security Map

Page 418: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

6 To select a trust level for a device, in the EditDeviceTrust Level window, click one of the following:

Adds a device to the Full Trustlist

Full Trust devices are monitoredonly for known attacks andinfections. You should select thissetting only when you are surethat the device is completelysafe.

FULL TRUST

Adds a device to the Restrictedlist

Restricted devices do not haveaccess to your computer.

RESTRICTED

Adds a device to a default trustlevel

The devices that are removedfrom the Full Trust level orRestricted trust level take thedefault trust level of thenetwork. The trust level of thenetwork can be Full Trust,Restricted, Protected, or Shared.

USE NETWORK TRUST(trust level)

7 Click OK.Norton 360 displays the trust level status of eachrestricted device on the icon of the device.

Excluding a device from Intrusion Prevention scanThe Intrusion Prevention System in Norton 360 scansall the network traffic that enters and exits yourcomputer. When a device on your network requestsaccess your computer, Intrusion Prevention scans thisrequest to ensure that it is not a virus attack. Scanningevery request from all the devices that access your

Protecting your home networkAbout the Network Security Map

418

Page 419: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

computer increases the scan time which slows downthe network speed of your computer.

If you know that a specific device on your network issafe, you can apply Full Trust level to this device. Inaddition, you can exclude this specific device fromIntrusion Prevention scan. When you exclude a devicefrom Intrusion Prevention scan, Norton 360 trusts thisdevice and does not scan any information that isreceived from this device. This improves the networkspeed of your computer and helps the trusted deviceto access your device quickly.

w You can exclude only full trusted devices that are onthe local subnet.

To exclude a device from Intrusion Prevention scan,you must ensure that the IP address of the device neverchanges. Norton 360 uses IP addresses to identifydevices on your home network. If the IP address of thedevice changes, Norton 360 cannot identify the trusteddevice that should be excluded from IntrusionPrevention scan.

w You can exclude a trusted device from IntrusionPrevention scan only if you are sure that the devicedoes not have any security threats.

When you apply Full Trust to a device and exclude itfrom Intrusion Prevention scan, the IP address andMAC address of the device are added to the TrustControl.

To exclude a device from Intrusion Prevention scan

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 Under My Network, in the Network Security Maprow, click Configure.

4 If the NetworkSecurityOverview window appears,click OK.

419Protecting your home networkAbout the Network Security Map

Page 420: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

5 In the Network Security Map window, do one ofthe following:

1 To edit the trust level of a device that is on yournetwork, in the network map, click the device.

1 To edit the trust level of a device that youmanually added, in the Network Detailsdrop-down list, click Trust Control, and thenclick the device.

6 In the device details section, in the TrustLevel row,click Edit.

7 In the Edit Device Trust Level window, click FULLTRUST.

8 At the bottom of the Edit Device Trust Levelwindow, check Exclude from IPS scanning.

9 In the Exclude fromIPSScanning dialog box, clickYes to confirm.

10 Click OK.

Removing devices from the Network Security MapThe Network Security Map window lists the devicesthat are connected to your network. You can remove adevice or a computer from the Network Security Map.You can purge all devices from the network map andcreate a new list of devices. For example, you can purgeall the devices that were present in your previousnetwork before you connect to a new network. Ensurethat you disable Remote Monitoring before you purgethe network map. Norton 360 cannot purge the networkmap when the Remote Monitoring is turned on. Also,ensure that you close the Network Security Mapwindow before you purge the network map. You cannotpurge the network map when the Network SecurityMap window is open.

w Norton 360 purges the devices that you add manuallyin the Trust Control network depending upon theirtrust level. It does not purge the devices that have atrust level as Full Trust or Restricted.

Protecting your home networkAbout the Network Security Map

420

Page 421: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

When you remove an individual device, the onlinedevices appear again the next time you open theNetwork Security Map. However, Norton 360permanently removes the offline devices.

To remove an individual device

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 In the Network Security Map window, do one ofthe following:

1 To remove a device that is on your network, inthe network map, click the device.

1 To remove a device that you manually added, inthe NetworkDetails drop-down list, select TrustControl, and then click the device.

5 On the left side of the Network Security Mapwindow, under Total in Network, click the minussymbol.

6 In the confirmation dialog box, click Yes.

To purge the Network Security Map

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 Under NetworkSecurityMap, in the NetworkMaprow, click Purge.

4 In the confirmation dialog box, click Yes.

Viewing the status of your wireless networkYou can view the status of your wireless network inthe Network Security Map window. The NetworkSecurity Map displays the status of your wirelessnetwork as secure or not secure. A secure networkrequires a strong wireless encryption. If your wirelessnetwork is not secure, you can turn on encryption onyour wireless router.

421Protecting your home networkAbout the Network Security Map

Page 422: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

For more information on how to secure your wirelessnetwork, on the left side of the NetworkSecurityMapwindow, click the Why is it not secure link. Follow theinstructions.

w You should only trust a wireless connection that issecure. Trusting a wireless connection that is notsecure puts all of the devices on your network at risk.

To view the status of your wireless network

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 On the left side of the Network Security Mapwindow, view the status of your wireless network.Your wireless network statuses are:

Indicates that your wirelessnetwork is secure.

WirelessNetwork Secure

Indicates that your wirelessnetwork is not secure.

Wireless Network NotSecure

Viewing the device detailsThe Network Security Map lets you view the details ofyour computer. You can view the following details:

1 The configuration status of your protectionfeatures, such as Auto-Protect, IntrusionPrevention, and Email Scanning

1 The configuration status of your definition updates,such as Automatic LiveUpdate and Pulse Updates

1 The version number of your Norton product

1 The subscription status of your Norton product

1 The configuration status of your transactionsecurity, such as Identity Safe and Antiphishing

1 The last five AntiVirus threats that are detected

Protecting your home networkAbout the Network Security Map

422

Page 423: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To view the device details

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 In the Network Security Map window, in thenetwork map, click the device for which you wantto see the details.You can view the details of only the computers thatyou remotely monitor.

5 In the device details section, next to Category, clickDetails.

6 In the Device Details window, view the details ofthe device.

7 Click Close.

Modifying the communication port for NetworkSecurity Map

The Network Security Map settings let you configurethe communication port number that Norton productsuse to communicate with each other over a network.By default, Norton products use 31077 as thecommunication port number.

If you change the communication port number of yourNorton product, you must change it on every computerthat is connected to your home network. In addition,when you find more computers that use the RemoteMonitoring Setup process, ensure that the same portnumber is used on every computer.

w Though you can modify the communication portnumber, it is recommended that you do not change thisport number. If you change the communication portnumber, you must use a port number in the range of1-65535.

Tomodify the communication port forNetwork SecurityMap

1 In the Norton 360 main window, click Settings.

423Protecting your home networkAbout the Network Security Map

Page 424: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

2 In the Settings window, under Detailed Settings,click My Network.

3 In the Communication Port box, type a newcommunication port number.You must use the same port number for each of thedevice that is connected to your Network SecurityMap.

4 Click Apply.

5 Click Close.

Protecting your home networkAbout the Network Security Map

424

Page 425: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This chapter includes the following topics:

1 About Tuneup

1 About disk and file fragmentation

1 Optimizing your permanent disks manually

1 About using optimization efficiently

1 About cleaning up disk clutter

1 Running a scan to clean up disk clutter

1 Running Registry Cleanup

1 Running Diagnostic Report

1 About Startup Manager

About TuneupNorton 360 offers total protection of your PC thatincludes Tuneup capability, which increases your PCperformance. Tuneup keeps your computer tuned upfor peak performance.

Norton 360 keeps your PC tuned up and runningsmoothly by using various techniques, such asoptimizing your hard disk and deleting unusedtemporary files.

11Keeping your PCtuned up

Page 426: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Tuneup detects and fixes common computer problems,cleans up unwanted cookies and files, and defragmentsthe hard disk to optimize PC performance.

About disk and file fragmentationYour PC's hard disk stores all of your files, applications,and the Windows operating system. Over time, the bitsof information that make up your files gradually spreadover the disk. This process is known as fragmentation.The more you use your computer, the more fragmentedyour disks become.

When a fragmented file is accessed, the diskperformance is slower. The performance is slowerbecause the drive head locates, loads, saves, and keepstrack of all of the fragments of the file. If free space isalso fragmented, the drive head might have to trackadequate free space to store temporary files or newlyadded files.

Norton 360 optimizes your permanent disks to improveyour PC's efficiency and speed. The optimizationprocess rearranges the scattered file fragments intoadjacent or contiguous clusters. When the drive headaccesses all of the file data in one location, the file isread into the memory faster. Optimization alsoconsolidates free space to avoid fragmenting newlyadded files. It adds extra space after major datastructures so that they can grow without immediatelybecoming fragmented again.

Optimizing your permanent disks manuallyOptimizing your PC's permanent disks can improveperformance and reliability. Norton 360 automaticallychecks your permanent disks for fragmentation andoptimizes them if they are more than 10 percentfragmented. You can always check the latest reportsto see if optimization is necessary.

Keeping your PC tuned upAbout disk and file fragmentation

426

Page 427: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

w You can run Disk optimization only when disk has morethan 15 percent of free space.

Some programs, such as movie-editing programs orprograms that require large amounts of disk space, canwork more efficiently if your disks are optimized. Ifyou prefer not to wait until Norton 360 performsautomatic optimization, you can optimize your disksmanually.

w Disk optimization does not run on PC with solid statehard drive.

To optimize your permanent disks manually

1 In the Norton 360 main window, click Tuneup, andthen click Run Disk Optimization.

2 When the activity is complete, in the Tuneupwindow, click Close.

About using optimization efficientlyNorton 360 automatically optimizes the permanentdisk in your PC as necessary and does not require youto take any action to accomplish that task. You can,however, adopt some practices that help Norton 360perform automatic optimization more efficiently.

The following practices can help make automaticoptimization more efficient:

Norton 360 performs diskoptimization when your PC isidle. If you turn off your PCwhenever you finish yourwork, Norton 360 cannotperform automaticoptimization. If you turn offyour PC during optimization,Norton 360 restarts theoptimization process whenyou turn on your PC again.

Occasionally leave your PCturned on when you do notuse the PC

427Keeping your PC tuned upAbout using optimization efficiently

Page 428: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton 360 automaticallyoptimizes the hard disk asneeded. You can also set aschedule for optimization.

Set a schedule foroptimization

Large files are often morefragmented than the smallerfiles. These fragmented filesaffect the performance ofyour computer.

Remove the large files thatyou no longer need

About cleaning up disk clutterOver time, the permanent disk in your PC canaccumulate many temporary and unneeded files.Eventually, these files can significantly reduce theavailable disk storage space and affect the performanceof your PC. Norton 360 automatically cleans upaccumulated disk clutter.

The temporary files that clutter your PC can come fromthe following sources:

When you install software onyour PC, the installationprocess creates temporaryfiles as part of theinstallation process. In somecases, the installer might notclean up these temporaryfiles when the installationfinishes.

Software installations

Keeping your PC tuned upAbout cleaning up disk clutter

428

Page 429: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

When you browse a Webpage, your browserdownloads the text andgraphics that comprise thecontents of the page. Whenyou finish viewing the page,the browser can leave thedownloaded contents on yourPC. The downloaded contentshelp to display the Web pagemore quickly if you view thepage again. These browserfiles accumulate over time.

Web browsing

During normal operation,some programs createtemporary files to improveefficiency while you work. Ifa program ends unexpectedlybecause of a software error,those temporary files can beleft behind.

Program errors

Running a scan to clean up disk clutterA cleanup scan searches your PC's permanent disk fortemporary and unused files to improve performanceand increase available disk space. Norton 360automatically removes the temporary and the unusedfiles from your PC.

Various activities, such as extensive Web browsing ora series of software installations produce temporaryfiles. You can run a manual cleanup scan to remove thetemporary files immediately.

To clean up your disk clutter

1 In the Norton 360 main window, click Tuneup, andthen click Run File Cleanup.

429Keeping your PC tuned upRunning a scan to clean up disk clutter

Page 430: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

2 When the activity is complete, in the Tuneupwindow, click Close.

Running Registry CleanupThe Windows registry can contain the entries that referto files that do not exist. Such broken registry itemscan slow down your computer. Registry Cleanup scansyour computer and cleans any broken registry entriesthat it finds.

To run Registry Cleanup

1 In the Norton 360 main window, click Tasks.

2 In the Tasks window, under PCTuneupTasks, clickRun Registry Cleanup.

3 When the activity is complete, in the Tuneupwindow, click Close.

Running Diagnostic ReportNorton 360 Diagnostic Report gathers informationabout your computer, which includes the operatingsystem, programs, and hardware. You can use thisreport to find and fix the issues.

Norton 360 Diagnostic Report is a real-time report witha timestamp. Norton 360 does not generate this reportautomatically. You need to use the Run DiagnosticReport option and manually generate the report.

If Norton 360 finds any issues on your computer, youcan use the Fix Now option to resolve the issues.

You can save, email, or print the report when neededfor review.

To run Diagnostic Report

1 In the Norton 360 main window, click Tuneup, andthen click Run Diagnostic Report.

2 When the activity is complete, view the details inDiagnostic Report window, and then click Close.

Keeping your PC tuned upRunning Registry Cleanup

430

Page 431: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

About Startup ManagerSome programs are configured to launch during startupof your computer. The number of startup itemsincreases as you install new applications, and the timethat is required to start your computer increases as aresult. Startup Manager helps to manage the startupitems on your computer. For any startup program thatthe Startup Manager lists, you can view the detailedinformation such as CommunityUsage and ResourceUsage. You can also click the application name andview the File Insight details. These details would helpyou determine whether or not to enable an applicationduring startup.

You can use Startup Manager to manage programs withthe following extensions:

1 Windows executable files (.exe)

1 Windows System files (.sys)

1 Dynamic link library files (.dll)

1 ActiveX control files (.ocx)

Norton 360 displays the community usage details underthe following conditions:

1 When the Norton Community Watch option isturned on.

See “Turning off or turning on Norton CommunityWatch” on page 39.

1 When the Network Cost Awareness option isconfigured to No Limit or Economy.

See “Defining the Internet usage of Norton 360”on page 322.

Startup Manager lets you view the list of programs thatare included to the startup items. You can configureStartup Manager to run or not run these programswhen your computer starts. You can also choose todelay the start of the programs and run them manuallyfrom the Startup Manager. This way, you can enhancethe performance of your computer. You can disable a

431Keeping your PC tuned upAbout Startup Manager

Page 432: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

program and measure the performance of yourcomputer the next time you start your computer.

Norton 360 delays the start of the delayed programsby five minutes. The first delayed program in theStartup Manager window, starts five minutes afteryou start your computer. Every subsequent delayedprogram starts with a further delay of 10 seconds.

When you uninstall or if your Norton 360 expires, theprograms that you had added to the Startup Managerare reset to their default startup setting.

Sometimes, you may see some startup programsmissing from the startup list. Norton 360 removes astartup program from the list for the following reasons:

1 When you disable a program that has a startupsetting.

1 When you update a program that can possibly resetall startup settings to default.

1 When you use another program to manage yourstartup programs.

1 When you edit the registry keys manually.

w To add a startup item, you can open your Startup folderthat is available in your Windows Start menu and addprograms as required. For more information on addingprograms in Windows Startup, go to MicrosoftTechnical Support Web site or Windows online Help.

Disabling or enabling startup itemsWhenever you start your computer, there are someprograms that automatically start and run in parallel.These programs are called startup items. The startupitems increase the start time of your computer.

Startup Manager helps you manage the startup itemsof your computer efficiently. If you do not want aprogram to automatically start when you turn on yourcomputer, you can disable the program using StartupManager. You can also delay a startup item that youwant to start at a later time.

Keeping your PC tuned upAbout Startup Manager

432

Page 433: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To disable startup items

1 In the Norton 360 main window, click Tuneup, andthen click Run Startup Manager.

2 In the On/Off column, uncheck a program that youdo not want to automatically start when you turnon your computer.

3 Click Apply to save the changes.

4 Click Close.

To enable startup items

1 In the Norton 360 main window, click Tuneup, andthen click Run Startup Manager.

2 In the On/Off column, check a program that youwant to automatically start when you turn on yourcomputer.

3 Click Apply to save the changes.

4 Click Close.

Managing startup itemsNorton 360 Startup Manager monitors and lists theprograms that automatically start when you turn onyour computer. To reduce the start time of yourcomputer and improve the performance, you can delaythe start of some of the programs when you turn onyour computer.

Norton 360 delays the start of the delayed programsby five minutes. The first delayed program in theStartupManager window starts five minutes after youstart your computer. Every subsequent delayedprogram starts with a further delay of 10 seconds.

To delay startup items

1 In the Norton 360 main window, click Tuneup, andthen click Run Startup Manager.

2 In the Delay Start column, check a program thatyou want to delay.

3 Click Apply to save the changes.

4 Click Close.

433Keeping your PC tuned upAbout Startup Manager

Page 434: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To run delayed startup items manually

1 In the Norton 360 main window, click Tuneup, andthen click Run Startup Manager.

2 In the StartupManager window, click RunDelayedItems Now.

3 Wait for the program to start, and then in theStartup Manager window, click Close.

Keeping your PC tuned upAbout Startup Manager

434

Page 435: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This chapter includes the following topics:

1 About Norton Backup and Restore

1 About backups

1 About backup preparation

1 About backup set

1 Backing up your files

1 Restoring files

1 About Norton Backup Drive

1 About solutions to the backup problems

1 About online backup considerations

1 Turning off or turning on backup

1 Turning off or turning on backup setting options

About Norton Backup and RestoreThe Norton Backup and Restore feature protects yourimportant data and media files by regularly backingup the files. If something catastrophic happens to yourPC, you can restore your valuable information fromthe backups that Norton 360 has made.

12Protecting yourmedia and data

Page 436: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

About backupsOne of the most important ways to protect the valuableinformation on your PC is to back up your filesregularly. In case you lose your data, Norton 360 letsyou restore them later. For example, you accidentallyerase an important file or your PC has a hardwaremalfunction that destroys some files. In this case, youcan restore your lost files from your backup.

You can also use backup to keep your PC's permanentdisk from becoming filled with old and seldom-usedfiles. After you have backed up such files, you canremove them from your PC and restore them later ifyou need to use them again.

Norton 360 lets you to conveniently back up your filesto any media that Windows recognizes as a storagedrive. The backup destination may include externaldrive, network storage folders, CD, DVD, Blu-ray disc,iPod, flash drive, cameras, smart-phones, or a host ofother devices.

For any file that you have backed up, Norton 360 letsyou view the status through the icon overlays and theBackup tab in Properties page. The icon overlays ona file show the backup status of your protected files.You can view details such as the last backup time ofeach backup set in the Backup tab of the file Propertiespage. You can turn off these options if you do not wantto view these icon overlays and the Backup details.

Norton 360 also provides a safe and a private onlinestorage environment to which you can back up yourfiles. The online storage location is different from thelocation where you normally store files in your PC.Disasters that damage or destroy your PC cannot harmyour backups because they are stored in a differentlocation. In addition, when you use the Norton 360online backup, you can restore your files from anycomputer at any time. Norton 360 must be installed inthe PC to access your Norton Account.

Protecting your media and dataAbout backups

436

Page 437: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

No matter which backup method you choose, you canalways add or remove items from the set of files thatyou select to back up. You can add or remove anindividual file from the backup sets by using theshortcut menu that appears when you right-click a file.

About backup preparationAfter you install Norton 360, you must configureNorton 360 to back up your important files on yourcomputer. You can back up your important files withNorton 360 either automatically or at a time that youspecify. You can always change the backup settingsyou initially make.

Choose the following settings when you make a backup:

You can perform the varioustasks that are related to thebackup sets such as creating,deleting, and renamingbackup sets.

You can also preview thedetails that are related to anyparticular backup set such asthe size and the availablefiles.

Summary

437Protecting your media and dataAbout backup preparation

Page 438: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can choose from a varietyof file types, such as photos,documents, and music. Youcan also specify individualfiles.

You have the followingoptions:1 Sources

Lets you select a sourcefrom which you want toback up your files.

Norton Backup iscomprehensive or shortdepending on thelocations that you select.

1 File Types

Lets you include orexclude a backup filecategory.

You can add a file or afolder to the backup orexclude a file or a folderfrom the backup. You canalso use Add or excludefiles and folders optionto view the added andexcluded files and folders.In addition, you can usethe Edit File Type optionto edit file extensionswithin each file category.When you check Edit FileType, you can add, edit,or remove the fileextensions in eachBackup category by usingthe Configure option.

What

Protecting your media and dataAbout backup preparation

438

Page 439: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Where

439Protecting your media and dataAbout backup preparation

Page 440: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can choose any storagelocation that Norton 360offers for your backuplocation, depending on yourPC and the connecteddevices.

You can choose to store yourbackups on external media,such as CD, DVD, Blu-raydisc, or iPod. You can alsostore your backups on anetwork drive, removableflash memory drive, orpermanent disk in your PC.

w Backing up your files toa location where your sourcefiles are available is not safe.You may lose your dataduring hardwaremalfunctions.

You can delete the previouslybacked-up files. You can alsodecide if you want to verifyyour backups by checking theVerify backup option.

Norton 360 also provides asecure online backup servicethat you can use to store yourbacked-up files in a safelocation on the Internet. Thisservice protects yourinformation even ifsomething catastrophichappens to your computer.

w To use the SecureOnline Storage option, youmust set the Network CostAwareness option in the MyNetworkwindow toNoLimit.The My Network option is

Protecting your media and dataAbout backup preparation

440

Page 441: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

available in the Settingswindow.

You can have Norton 360back up your files when yourcomputer is idle. You can alsoset a regular backup scheduleor manually back up yourfiles.

When

When you use the Secure Online Storage option forthe first time, Norton 360 needs to be activated. Toactivate the Secure Online Storage, click the ClickheretoactivateyourSecureOnlineStorage link. The onlinebackup service that is provided with the Norton 360requires you to create a Norton Account. When youback up files online, Norton 360 requests your NortonAccount name and password, which preventsunauthorized access to your backed-up files.

Before Norton 360 runs a backup, it examines the fileson your computer so that it can back up your files moreefficiently. During this initial examination, Norton 360counts the number of files that may need to be backedup. Norton 360 also records the types and sizes of thosefiles. This process usually takes no more than a fewminutes the first time you run a backup.

About backup setNorton 360 lets you create multiple sets of backupconfigurations. The configuration is a set of rules andis called a backup set. You can specify the files that youintend to back up, the backup destination, and the timewhen you want to back up your files. You can usemultiple backup sets to back up different combinationsof files or file categories to different locations.

Multiple backup set creation helps you to use yourlimited Secure Online Storage judiciously. For example,

441Protecting your media and dataAbout backup set

Page 442: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

you can create a backup set to back up your picturefiles and music files to a CD. You can also createanother backup set to back up your Microsoft Officedocuments and your financial files to your SecureOnline Storage.

w To use SecureOnlineStorage option, you must set theNetwork Cost Awareness option in the My Networkwindow to No Limit. The My Network option isavailable in the Settings window.

You can do the following tasks:

1 You can create multiple backup sets with differentset of rules. For example, you can create a backupset to back up your pictures to your local fixed disk.You can also create another backup set to back upyour videos to a CD. You can configure differentschedules for each backup set.

1 You can modify a backup set to include or excludefiles or file categories or to use another backupdestination to back up your files. You can changethe schedule of a backup set. You can also renamea backup set if the name does not describe thebackup set after you modify the rules.

1 You can delete a backup set if it is no longer needed.You can create a new backup set to start backingup your files from the beginning.

The Summary tab of the ManageBackupSets windowdisplays the set of rules that you have configured foreach backup set. You can select a backup set from theBackupsetname drop-down list to view the rules. Thisway, you can keep a record of the files or file categoriesthat Norton 360 backs up to different destinations. Youcan also modify the rules if required. In addition, youcan view the date and time of the last backup activityfor a backup set.

Creating a new backup setYou can create multiple backup sets with differentconfigurations. For example, you can create a backup

Protecting your media and dataAbout backup set

442

Page 443: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

set to back up your pictures to your local fixed disk.You can create another backup set to back up yourvideos to a CD. You can also configure differentschedules for each backup set.

When you create a new backup set, Norton 360 appliesthe default configuration for the backup set. You canchange the configuration if the default configurationdoes not meet your needs.

You can identify each backup set with a backup setname. The default name of a backup set is DefaultSet.You can save a backup set with the default name aswell. But, whenever you create a new backup set, youmust provide a name for the backup set. The maximumcharacter length of a backup set name is 32alphanumeric characters. You cannot create more than10 backup sets.

To create a new backup set

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the Summary tab, under Things you can do,click Create new backup set.

3 In the window that appears, type a name for yourbackup set, and then click OK.

4 On the What tab, under File Types, select a filecategory.

5 In the Manage Backup Sets window, click SaveSettings.

Modifying or renaming a backup setWhen you create a new backup set, Norton 360 appliesthe default configuration for the backup set. You canchange the configuration if the default configurationdoes not meet your needs.

You can modify a backup set to include or exclude filesor file categories or choose another backup destinationto back up your files. You can change the schedule ofa backup set. You can also rename a backup set if the

443Protecting your media and dataAbout backup set

Page 444: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

name does not describe the backup set after you modifythe configuration.

w The maximum character length of a backup set nameis 32 alphanumeric characters.

To modify a backup set

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the Summary tab, in the Backup set namedrop-down list, select the backup set that you wantto modify.

3 Under BackupSetSummary, view the details of thebackup set, and do the following:

1 To include or exclude files or file categories in abackup set, click What, and change the settings.

1 To change the backup destination, click Where,and change the settings.

1 To change the backup schedule, click When, andchange the settings.

4 In the Manage Backup Sets window, click SaveSettings.

To rename a backup set

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the Summary tab, in the Backup set namedrop-down list, select the backup set that you wantto rename.

3 Under Thingsyoucando, click Renamebackupset.

4 In the window that appears, change the name of thebackup set, and then click OK.

5 In the Manage Backup Sets window, click SaveSettings.

About backup file categories

When Norton 360 performs a backup, it first examinesthe permanent disk of your PC for files to back up and

Protecting your media and dataAbout backup set

444

Page 445: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

sorts them into various categories. It then backs up thefiles that fall into these categories.

Norton 360 uses the following file categories:

This category includes, but isnot limited to: PhotographicJPEG and JIFF images (.jpg,.jpeg, .jpe, .jP2, .j2k, .j2c,.jpf); Graphic InterchangeFormat image files (.gif);Bitmap Graphics files (.bmp,.pct); Tagged Image Formatfiles (.tif, .tiff); AdobePhotoDeluxe images (.pdd);Windows Metafile (.wmf);Portable (Public) NetworkGraphic files (.png);Photoshop files (.psd);Macintosh Quickdraw/PICTDrawing files (.pict);Encapsulated PostScript files(.eps); MS Foxpro Screen files(.sct); Run Length EncodedBitmap files (.rle);Device-Independent BitmapGraphic files (.dib); BorlandJBuilder Project files (.jpx);Japan Picture Format files(.jpc); Image Alchemy HSITemporary Raw Bitmap files(.raw); Pixar Picture files(.pxr); CAD files (.vda); PixarPicture File (.pxr); TARGA File(.tga); Adobe IllustratorVector Graphic (.ai); KodakPhoto CD (.pcd); Kodak RAWBitmap Image (.kdc); AdobeInDesign Document (.indd);Paint Shop Pro Image (.psp);Corel Vector Graphic Drawing(.cdr); and Targa Bitmap files(.icb, .vst).

Pictures

445Protecting your media and dataAbout backup set

Page 446: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This category includes, but isnot limited to: MPEG AudioStream, Layer III files (.mp3);MPEG-4 Video files (.mp4);MPEG-4 Audio Layer files(.m4a); Apple Protected AACfiles (.m4p); Real NetworksRealMedia Streaming Mediafiles (.ra); RealMediaStreaming Media files (.rm);RealMedia Metafile files(.ram); MIDI files (.rmi); MSWindows Media Audio files(.wma); MPEG-2 AdvancedAudio Coding files (.aac);Monkey's Audio LosslessAudio Compression Formatfiles (.ape); Free LosslessAudio Codec files (.flac);Waveform Audio files (.wav);MP3 Playlist files (.m3u);Musical Instrument DigitalInterface MIDI Sound files(.mid; .midi); Fast Tracker 2Extended Module files (.xm);ScreamTracker v3 Sound files(.s3m); MPEG Audio Stream,Layer I (.mp1); WindowsMedia Player Playlist (.wpl);Playlist (.pls); Audio Codec 3File (.a3c); Audio InterchangeFile Format (.aif, .aifc, .aiff);and MPEG Audio Stream,Layer II (.mp2).

Music

Protecting your media and dataAbout backup set

446

Page 447: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This category includes, but isnot limited to: MicrosoftMoney files (.mny, .mn1,.mn2, .mn3, .mn4, .mn5,.mn6, .mn7, .mn8, .mn9,.mn10, .mn11, .mn12, .mn13,.mn14, .mn15, .mbf);TurboTax Tax Return files(.tax); H&R Tax Return files(.t01, .t02, .t03, .t04, .t05,.t06); TaxACT files (.ta0, .ta1,.ta2, .ta3, .ta4, .ta5, .ta8,.ta9); QuickBooks files (.qba,.qbb, .qbi, .qbw, .qbx, .qph,.qdf, .qdb, .qif, .qsd, .qel,.qph, q00, q01, .q02, .q03,.q04, .q05, .Q98); Olicom Faxfiles (.ofx); Quicken Data File(.qdt); Simply Accounting File(.sdb); and Open FinancialConnectivity files (.ofc).

Financial Files

447Protecting your media and dataAbout backup set

Page 448: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This category includes, but isnot limited to: MicrosoftWindows Media files (.wmv);Apple QuickTime Video Clipfiles (.mov); MPEG 1 SystemStream files (.mpg, .mpeg);Macromedia Flash Formatfiles (.swf); Audio VideoInterleave files (.avi); MSAdvanced Streaming Formatfiles (.asf); Beijer E-Designerfiles (.mpa); MPEG Movie Clipfiles (.mpe); MPEG-4 Videofiles (.m4v); Digital Video File(.dv); Ogg Vorbis CompressedVideo File (.ogm); Open MediaFormat File (.omf) MPEG-1Video File (.m1v); MPEG-2Program Stream Format File(.m2p); MPEG-2 Video OnlyFile (.m2v); QuickTime Movie(.moov); MPEG-1 Video File(.mpv); QuickTime Movie (.qt);VDOScript File (.vdo); andDVD Video Movie File (.vob).

Video

Protecting your media and dataAbout backup set

448

Page 449: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This category includes, but isnot limited to: MicrosoftWord documents andtemplates (doc, .dot);Microsoft Excel Worksheetand templates (.xls, .xlt,.xlam); Microsoft PowerPointPresentation and Slideshowfiles (.ppt, .pps); MicrosoftProject files (.mpp); AdobeAcrobat files (.pdf); Text files(.txt); PostScript files (.ps);HyperText Markup Languagefiles (.htm, .html); MicrosoftHTML documents (.mht);WildTangent Branded .PNGfiles (.wpg);Comma-Separated Variablestext files (.csv); andWordPerfect PC Suitedocuments (.wpd).

Office Documents

This category includes, but isnot limited to: MicrosoftOutlook Personal Folder files(.pst); Microsoft ExchangeMail messages (.msg);Microsoft Outlook ExpressE-mail or Windows Mail(.dbx); Netscape Mail E-mailMessage files (.snm); MediaStream Broadcast (.msb);Mailbox Message File (.mbx);Microsoft Outlook RulesWizard File (.rwz); MicrosoftOutlook Express ElectronicMail (.eml); First ReaderSaved Message Folder (.fol);and (.MsMessageStore).

Email

449Protecting your media and dataAbout backup set

Page 450: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This category includes, but isnot limited to: MicrosoftOutlook Address Book files(.wab); Microsoft PersonalAddress Book files (.pab);Palm Address Book files(.aba); Beijer E-Designer files(.mpa); Palm Date Book files(.tda); vCard files (.vcf);Microsoft Outlook AddressBook (.oab); MicrosoftPhonebook (.pbk); PalmDateBook File (.dba); andSharp Organizer TelephoneBank (.ozp).

Contacts

This category includes, but isnot limited to: InternetLocation files (.url) thatappear on the InternetExplorer Favorites menu.

Internet Favorites

This category includes thefiles that you specifically addto the backup. The categoryalso includes the files thatNorton 360 cannot add to anyof its file categories.

Other File Types

About backup file extensions

A file extension is a string of characters that isappended to the name of a file and is used to identifythe file format. Norton 360 uses the file extension toback up the files that are present on your computerinto different categories. Each backup file categorycontains a list of default file extensions. When you runa backup, Norton 360 identifies the files that are basedon the file extensions and backup file categories. Forexample, if you want to back up the documents with a

Protecting your media and dataAbout backup set

450

Page 451: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

.fm file extension in the Office Documents category,you can add the .fm file extension to the category.

The Edit File Type option on the What tab of theManage Backup Sets window lets you add, edit, orremove file extensions in each backup category. Whenyou check Edit File Type, the Configure option thatappears next to each backup category lets you edit fileextensions in that category.

You can use the EditFileType option on the What tabof the ManageBackupSets window to do the following:

1 You can view the file extensions that are alreadylisted in a backup file category.

This option helps to ensure that the list has theextensions of files that you intended to back up.

1 You can add a file extension to the list or edit a fileextension that is present in the list.

This option helps to ensure that the next time whenyou run backup, Norton 360 must back up the fileswith the extensions that you added.

1 You can remove a file extension from the existinglist or a file extension that you added.

This option helps to ensure that Norton 360 doesnot back up the unintended files, the next time yourun backup.

1 You can reset a file category to its default fileextensions.

This option helps to restore the changes you madeto a backup file category.

w The file extensions are independent of a backup set. Ifyou change a file extension in a backup file category,the change applies to all backup sets.

Adding or editing a file extension in a backup filecategory

Each backup file category contains a list of fileextensions. However, you can add a file extension to abackup file category. Norton 360 identifies the files

451Protecting your media and dataAbout backup set

Page 452: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

with the file extension that you added and backs themup to that file category. For example, if you want toback up the documents with a .fm file extension in theOffice Documents category, you can add the .fm fileextension to that category.

You can also edit an existing file extension or a fileextension that you added.

The maximum character length of a file extension is10 characters.

To add a file extension to a backup file category

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the What tab, next to FileTypes, check EditFileType.

3 Under File Types, next to a file category, clickConfigure.

4 In the window that appears, click Add New.

5 Type the file extension that you want to add.

6 Click OK.

7 Click Save.

To edit a file extension in a backup file category

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the What tab, next to FileTypes, check EditFileType.

3 Under File Types, next to a file category, clickConfigure.

4 In the window that appears, select the file extensionthat you want to edit, and then click Edit.

5 Edit the file extension.

6 Click OK.

7 Click Save.

Protecting your media and dataAbout backup set

452

Page 453: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Removing a file extension fromabackup category

Each backup file category contains a list of fileextensions. However, you can remove a default fileextension or a file extension that you added to a backupfile category. Norton 360 identifies the files with thefile extension that you removed and does not back themup the next time that you run backup. For example,you do not want to back up the documents with a .rtffile extension in the Office Documents category. Inthis case, you can remove the .rtf file extension fromthat category.

To remove a file extension from a backup category

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the What tab, next to FileTypes, check EditFileType.

3 Under File Types, next to a file category, clickConfigure.

4 In the window that appears, select the file extension,and then click Remove.

5 Click Save.

Resetting a backup category to default fileextensions

You can reset a file category to its default list of fileextension. When you reset a file category, Norton 360restores the default file extension that you removedpreviously and remove the file extensions that youadded.

To reset a backup category to default file extensions

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the What tab, next to FileTypes, check EditFileType.

3 Under File Types, next to a file category, clickConfigure.

453Protecting your media and dataAbout backup set

Page 454: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

4 In the window that appears, click Reset Defaults.

5 Click Save.

Deleting previously backed up files

You can delete the files that you backed up previouslyfrom your backup location. You can also delete the filesif the files are no longer useful for you and you have alimited space on your backup location. You can alsodelete backed up files if you changed the file categoryfor a backup set. You may want to delete previouslybacked up files before you run a backup.

You can delete the previously backed up files from thefollowing locations:

1 Summary tab

1 Where tab

When the backed up files are deleted, the backup detailsof the files that belong to the backup set that you deletealso changes. For example, the icon overlays and theBackup tab in the file properties of the file no longerappear.

w You cannot delete a backup set if only one backup setis available.

You can also uncheck the backup category if you nolonger want to back up the files that you deleted.

Deleting previously backed up files is particularlyhelpful if you want to free some space on your SecureOnline Storage.

w To delete files from your online backup, you must setthe Network Cost Awareness option in the MyNetwork window to NoLimit. The MyNetwork optionis available in the Settings window.

To delete previously backed up files from the Summarytab

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

Protecting your media and dataAbout backup set

454

Page 455: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

2 On the Summary tab, in the Backup set namedrop-down list, select the backup set that you wantto delete.

3 Under Things you can do, click Delete backup set.

4 In the Delete Backup Set window, select one of thefollowing:

Lets you remove the backupset.

Delete backup set

Lets you remove the backupset and the files that areavailable in the backup set.

Delete backup set and files

5 Click Yes to confirm.

Todelete previously backedup files from theWhere tab

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the Where tab, click Delete Backed up Files.

3 In the window that appears, in the drop-down list,select the backup set from which you want to deletethe previously backed up files.This window appears when you have more than onebackup set.

4 Click OK.

5 In the window that appears, in the left pane, selectthe file category that contains the files.You can also select the Folders category to selectthe folders that you want to delete.

6 Check the files that you want to delete.

7 To view the files that you selected, on the left pane,click Selected Files.

8 Click Delete Selected.

9 In the confirmation dialog box, click Yes.

10 Click Close.

455Protecting your media and dataAbout backup set

Page 456: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Adding files and folders to a backup set

You are not limited to backing up the files that Norton360 automatically detects and places into its filecategories. You can add files to the set of files to bebacked up, and you can exclude files from being backedup as well.

Norton 360 lets you select a file or folder from yourcomputer that you want to include in your backup. TheAdd or exclude files and folders option on the Whattab in the Manage Backup Sets window provides youthe options to add files and folders to a backup set.

You can also right-click a file or a folder and add it toa backup set using the Norton 360 option on theshortcut menu. The shortcut menu is available afteryou configure your backup and when the ManageBackupSets window and the RestoreFiles window areclosed. When you add a file to the backup set, Norton360 lists the information in the window that appearswhen you click Addorexcludefilesandfolders option.You can view all the files and folders that you addedto the backup.

You can also remove an addition from the list of itemsthat is included or excluded from backup by using theRemove from list option. This option is available inthe window that appears when you click Addorexcludefiles and folders.

w To add files to your online backup, you must set theNetwork Cost Awareness option in the My Networkwindow to No Limit. The My Network option isavailable in the Settings window.

To add a file to a backup set

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the What tab, click Add or exclude files andfolders.

3 In the window that appears, click Include File.

Protecting your media and dataAbout backup set

456

Page 457: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

4 In the file selection window that appears, navigateto file that you want to add, click to select it, andthen click Open.

5 Click OK.

6 In the Manage Backup Sets window, click SaveSettings to save the settings.

To add a folder to a backup set

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the What tab, click Add or exclude files andfolders.

3 In the window that appears, click Include Folder.

4 In the folder selection window that appears,navigate to the folder that you want to add, and thenclick OK.

5 Click OK.

6 In the Manage Backup Sets window, click SaveSettings to save the settings.

To add a file or folder to a backup set in WindowsExplorer

1 In Windows Explorer, right-click the file or folder,select Norton 360 > Add to Backup.The Add to Backup option in the shortcut menu isenabled only after you configure your backup andwhen the ManageBackupSets window and RestoreFiles window are closed.

2 Click the backup set to which you want to add thefile or the folder.

Excluding files and folders from a backup set

Norton 360 lets you exclude backing up the files thatNorton 360 automatically detects and places into itsfile categories or a complete file category. The Add orexcludefilesandfolders option on the What tab in theManageBackupSets window provides you the optionsto exclude files and folders to a backup set.

457Protecting your media and dataAbout backup set

Page 458: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can exclude a file or folder from the backup setfrom Windows Explorer by using the shortcut menu.The shortcut menu is available after you configure yourbackup and when the Manage Backup Sets windowand the Restore Files window are closed. When youexclude a file from the backup set, Norton 360 lists theinformation in the window that appears when you clickAdd or exclude files and folders option. You can viewall the files that you excluded from the backup.

You can also remove an exclusion from the list of itemsthat is included or excluded from backup by using theRemove from list option. This option is available inthe window that appears when you click Addorexcludefiles and folders.

To exclude a file from a backup set

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the What tab, click Add or exclude files andfolders.

3 In the window that appears, click Exclude File.

4 In the file selection window that appears, navigateto the file that you want to exclude, and then clickOpen.

5 Click OK.

6 In the Manage Backup Sets window, click SaveSettings to save the settings.

To exclude a folder from a backup set

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the What tab, click Add or exclude files andfolders.

3 In the window that appears, click Exclude Folder.

4 In the folder selection window that appears,navigate to the folder that you want to exclude, andthen click OK.

5 Click OK.

Protecting your media and dataAbout backup set

458

Page 459: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

6 In the Manage Backup Sets window, click SaveSettings to save the settings.

To exclude a file or folder fromabackup set inWindowsExplorer

1 In Windows Explorer, right-click the file, clickNorton 360 > Exclude from Backup.The Exclude from Backup option in the shortcutmenu is enabled only after you configure yourbackup and when the ManageBackupSets and theRestore Files windows are closed.

2 Click the backup set from which you want to excludethe file or the folder.

About backup locations

Norton 360 can back up your files to several kinds ofstorage locations. The speed, safety, and quantity ofyour backup depend on the choice of your location. Noone backup location is the best in all situations and forall users.

You can choose any storage location that Norton 360offers for your backup location, depending on your PCand the connected devices. Use the information in the

459Protecting your media and dataAbout backup set

Page 460: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

following table to choose a location that best meetsyour needs for safety, speed, and storage capacity:

Your subscription to Norton 360comes with an allocation ofstorage space on a secure serverthat is located on the Internet.This location is the safest, mostsecure backup choice availablebecause it stores yourinformation in a remote location.As a consequence, even thedisasters that might damage ordestroy your PC cannot affectyour backups. Online backupscan take place automatically, aslong as your PC has an activeInternet connection. However,you require a reasonably fastInternet connection.

You can configure the Internetbandwidth that backup uses toback up your files usingBandwidth Throttle on theWhere tab of the ManageBackup Sets window.

You can alter the followingbandwidth throttle states:1 Fastest (recommended)

1 High usage

1 Moderate usage

1 Low usage

You can buy more online storagespace whenever you want.

w To use the Secure OnlineStorage option, you must set theNetworkCostAwarenessoptionin theMyNetworkwindow toNoLimit. TheMyNetwork option isavailable in theSettingswindow.

Secure Online Storage

Protecting your media and dataAbout backup set

460

Page 461: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This choice backs your files upto a special folder on drive C ofyour PC. Backing up to drive C isvery quick and convenient, andis only limited to the amount offree space available on yourdrive. You can run automaticbackups with this choice.

Backing up to drive C is aconvenient but an unsafe backupmethod. Any mechanicalproblem that the drive mightexperience can damage bothyour original files and yourbackups.

If you use drive C for quick andautomatic backups, you mustback up your files occasionallyto a different drive or anotherlocation.

C: (Local Fixed Disk)

This choice provides for fast,convenient backups. You can runautomatic backups and alwayshave access to your backed upfiles as long as the drive isconnected to your PC.

Although using another drive issafer than using drive C, doingso still leaves your data at riskfrom any PC hardwaremalfunctions.

If you choose to back up toanother drive, you should alsoback up your files occasionallyto some other location.

Other internal or externaldrive

461Protecting your media and dataAbout backup set

Page 462: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

CD, DVD, or Blu-ray discs

Protecting your media and dataAbout backup set

462

Page 463: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This choice requires that youhave recordable CDs, DVDs, orBlu-ray discs and an optical drivein your PC to record on thosediscs. You must be present toinsert and remove discs whenrequested. Therefore, you cannotselect automatic scheduling ofbackups when you back up toCDs, DVDs, or Blu-ray discs.

Backing up to CDs, DVDs, orBlu-ray discs is slower thanbacking up to other media.Backing up to CDs, DVDs, orBlu-ray discs is also lessconvenient because you must bepresent during the backup.

By using Norton 360, you canback up your data to any of thefollowing optical media types ifyour optical drive supports them:1 CD-R

1 CD-RW

1 DVD+R

1 DVD-R

1 DVD+R DL

1 DVD-R DL

1 DVD+RW

1 DVD-RW

1 DVD RAM

1 BD-R

1 BD-RE

You should store your backupdiscs in a safe place elsewhereto provide protection against adisaster that occurs at yourcomputer's location.

w When you select the CD orthe DVD Drive as the backup

463Protecting your media and dataAbout backup set

Page 464: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

location for the first time, Norton360 prompts you to configurethe optical backup drive on yourcomputer. Norton 360 lets youinstall the optical driver.

You can use this choice if yourPC is connected to a localnetwork that offers a storagelocation to which you haveaccess. Depending on the speedof your network, this choice canbe almost as fast as backing upto an internal drive or externaldrive.

This choice does not appear ifyour PC is not connected to anetwork that offers a storagedevice to which you have access.

To back up your data to anexternal network drive, you mustmap the external network driveto your computer. When you mapa drive, you must also specify adrive letter for the connection.

Network drive

Protecting your media and dataAbout backup set

464

Page 465: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Flash drives and the other datastorage devices that areattached to your PC can alsoserve as backup locations.Norton 360 displays suchdevices as external disk drives.If such a device is alwaysattached to your PC, you can useit for automatic backups.

The amount of storage spacethat is available on these devicescan be less than on hard disks.If you use a flash drive forbackups, you should also backup your files occasionally toanother storage location.

Flash drive andremovable storagedevices, including iPod

Choosing a backup location

Norton 360 provides several kinds of storage locationsfor backups. You can choose a different location if yourbackup needs change or if you want to store yourbackups in several locations for added security.

When you select Secure Online Storage as the backuplocation, Norton 360 prompts you to register to yourNorton Account. You must be connected to the Internetto register to your Norton Account.

To use Secure Online Storage as a backup location, youmust set the Network Cost Awareness option in theMy Network window to No Limit. The My Networkoption is available in the Settings window.

w You must activate your Norton 360 with a valid licensekey to use the online storage space.

To choose a backup location

1 Make sure that the device to which you want to backup your data is connected to your PC and turned on.

2 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

465Protecting your media and dataAbout backup set

Page 466: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 On the Where tab, select the location and devicewhere you want your backups to be stored.If the device or location does not appear on the list,click Refresh List.

4 Click Save Settings.

Installing optical backup driver

Norton 360 offers several storage location options forbackups. You can choose a different location if yourbackup needs change or if you want to store yourbackups in several locations for added security.

If you want to back up your important files and datato a CD or DVD Drive, you must configure the opticalbackup drive on your computer. The optical backupdrive helps you read or write data on optical discs.

When you select CD or DVD Drive as the backuplocation for the first time, Norton 360 prompts you toconfigure the optical backup drive on your computer.Norton 360 lets you install the optical driver.

When you install optical backup driver, you must insertand remove discs when prompted. Therefore, youcannot select automatic scheduling of backups whenyou back up to CDs, DVDs, or Blu-ray discs for the firsttime. When the backup is complete, you can click ViewDetails in the Backup window to view the status ofyour last backup.

To install optical backup driver

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the Where tab, select the CD or DVD Driveoption, and then click Run Backup.

3 In the dialog that appears, click OK.

4 When you are prompted, insert a blank CD or DVDinto the CD-ROM drive and click OK.You can view the progress of the backup in theBackup window.

5 When the backup is complete, click Close.

Protecting your media and dataAbout backup set

466

Page 467: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Viewing or changing a backup schedule

Norton 360 lets you schedule backups when it isconvenient for you. You can schedule your backups torun late at night or whenever you know that yourcomputer is not needed for any other activity.

You have the following backup schedule choices:

Choose this option to back upyour computer when it isturned on but not otherwisein use. This choice is therecommended choice formost users. Norton 360checks your computer to beidle every four hours to runan automatic backup. Notethat the backup location mustbe available at the time thatthe automatic backup takesplace.

w You cannot back upyour data to a CD or DVD ifyou select this option.

Automatic (Recommended)

Choose this option to pickone or more days of the week,and the time of day, for yourbackups to occur.

Weekly

Choose a specific day of themonth, and specific time of aday, for your backups tooccur.

Check Run only at idle timeto run an automatic backuponly at idle time. Norton 360checks to see if yourcomputer is idle every fourhours.

Monthly

467Protecting your media and dataAbout backup set

Page 468: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Choose this option to haveNorton 360 backup your filesonly when you start thebackup yourself.

Manual Schedule

Your computer's performance is maximized if youschedule to perform your critical operations when yourcomputer is idle. When you schedule backup weeklyor monthly and check the Runonlyatidletime option,Norton 360 backs up your files when your computer isidle. Symantec recommends you to check the Runonlyat idle time option to experience better performanceof your computer.

To view or change a backup schedule

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the When tab, under Schedule, select an optionto view or change the backup schedule.

3 Click Save Settings.

Deleting a backup setYou can delete a backup set if it is no longer needed.You cannot delete a backup set if only one backup setis available. However, you can create a new backup setbefore you delete the old backup set.

When a backup set is deleted, the Backup details of thefiles that are included in that backup set also change.For example, the icon overlays and the Backup tab inthe file properties of the file no longer appear.

Deleting a backup set is particularly helpful if you wantto free some space on your Secure Online Storage.

w To delete a backup set from your online backup, youmust set the Network Cost Awareness option in theMy Network window to No Limit. The My Networkoption is available in the Settings window.

Protecting your media and dataAbout backup set

468

Page 469: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To delete a backup set

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the Summary tab, in the Backup set namedrop-down list, select the backup set that you wantto delete.

3 Under Things you can do, click Delete backup set.

4 In the Delete Backup Set window, select Deletebackup set option.

5 In the confirmation dialog box, click Yes.

To delete a backup set and files

1 In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.

2 On the Summary tab, in the Backup set namedrop-down list, select the backup set that you wantto delete.

3 Under Things you can do, click Delete backup set.

4 In the Delete Backup Set window, select Deletebackup set and files option.The ManageBackupSet window shows the progressof the backed files that are being deleted from yourselected backup set.

5 Click Yes to confirm.

Backing up your filesAfter you provide Norton 360 with your preferredbackup settings, running a backup is very easy. In fact,if you scheduled all backup sets to run backupsautomatically, you do not need to do anything at all.Norton 360 performs automatic backups for all backupsets when your PC is turned on but not engaged inperforming any other tasks. However, Norton 360 doesnot back up your files automatically if the backupdestination is a CD, DVD, or Blu-ray disc. Backing upto these destinations needs your intervention.

469Protecting your media and dataBacking up your files

Page 470: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Whether you have set Norton 360 to back up your PCautomatically or not, you can always run a backup. Forexample, you have added or modified important filesand you want to be sure they are safe. In this case, youcan run a backup manually. You can also run a backupat the end of the day if you do not want to wait for anautomatic backup to occur.

You can view the details of your backup activity underthe backup category in the Security History window.

To back up your files

1 In the Norton 360 main window, click Backup, andthen click Run Backup Now.

2 Follow any instructions for performing the backupthat Norton 360 provides.For example, if you choose to back up your files toCDs, then Norton 360 asks you to insert a recordableCD.

3 In the Backup window, click Close.

Restoring filesThe reason to have a good backup is to restore yourfiles from the backup if the need arises. Norton 360provides an easy method to restore your backed-upfiles.

By default, Norton 360 displays the backup location ofthe most recent backup set you ran and the originallocations of the files.

w To restore files from online backup, you must set theNetwork Cost Awareness option in the My Networkwindow to No Limit. The My Network option isavailable in the Settings window.

Protecting your media and dataRestoring files

470

Page 471: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

When you restore files, you can change any of thefollowing settings:

You can choose any of thebackup sets to restore thefiles.

If you backed up your data inan external media, you mustconnect it to your computerto restore those files. Norton360 lists all the backup setsthat you ran backup for andthat your PC can currentlydetect.

Restore From

You can restore the backedup files in a backup set thatyou selected. You can use theSearch option to search forfiles by name and add theselected file to restore. Youcan also check the RestoreAll Files and Categoriesoption next to the Filesheading to select all filecategories. In addition, youcan browse for backed upfiles based on file categoriesand folders by using theBrowse for Files and Foldersoption.

You can filter the backed upfiles in a backup set by thebackup file categories.

Files

471Protecting your media and dataRestoring files

Page 472: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can restore to theoriginal locations of the files,or navigate to a new locationwhere you can restore yourfiles. Norton 360 displays thetotal number of files and thetotal size of the files that youhave selected for restoration.

If files with the same nameare present at the originallocation, the files that yourestore replace those files.

Restore To

w If you backed up files to CDs or DVDs, do not restorefiles by copying them directly to your PC from thebackup disks. When Norton 360 backs files up to CDsor DVDs, it sometimes has to split files between twodiscs. Directly copying a file back from a disc, therefore,may only copy part of the file. Such a file appears tobe damaged when you try to use it. Instead, let Norton360 restore your files for you.

To restore files

1 In the Norton 360 main window, click Backup, andthen click Restore Files.

2 In the Restore Files window, do one or more of thefollowing:

1 Under Restore From, change where to restorefrom.

1 Under Files, specify what to restore.

1 Under Restore To, change where to restore thefiles to.

3 Click Restore Files.

4 Follow the on-screen instructions to finish restoringyour files.

Protecting your media and dataRestoring files

472

Page 473: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Choosing where to restore files fromWhen Norton 360 restores files, it displays the backuplocation of the most recent backup set you ran. Youcan change the location to restore files from a differentbackup location. For example, you have backed up filesto drive C and then later backed up files to CDs. Youcan then choose to restore files from either drive C orfrom the CDs.

w To restore files from online backup, you must set theNetwork Cost Awareness option in the My Networkwindow to No Limit. The My Network option isavailable in the Settings window.

To choose where to restore files from

1 In the Norton 360 main window, click Backup, andthen click Restore Files.

2 In the Restore Files window, under Restore From,click View All.

3 In the window that appears, click the backup setthat you want to restore, and then click OK.If the backup set is not visible, make sure that themedia in which you had backed up your files isconnected, and click Refresh List.If you have activated online backup, the windowalso contains the backup set that contains the filesthat you backed up online from another computer.For example, you can view the backup set containingthe files that you backed up from your homecomputer. However, the other computer must haveNorton 360 registered with the same NortonAccount.

4 Make any other necessary changes to your restoresettings, and click Restore Files.

5 Follow the on-screen instructions to finish restoringyour files.

473Protecting your media and dataRestoring files

Page 474: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Selecting files to restoreWhen you restore backed-up files with Norton 360, youmight not need to restore all the files from a backup.You can restore the files that may have been damaged,accidentally erased, or modified incorrectly. Norton360 provides several ways for you to select only thefiles that you need to restore.

When you click the Browse for Files and Foldersoption, you can view a list of all the backed-up files.You can easily select the files that you want to restoreby checking them. You can filter the files by itscategories available in the left pane in the RestoreFileswindow.

The various options that are available under the FilterResults By section in the left pane of the window are:

You can view all the backed-upfiles in a backup set.

All file types

You can view all the filecategories in the left pane thatyou have previously backed up.When you click a file category,you can view all the backed-upfiles of that file category in theright pane.

File Categories

You can view all the backed-upfolders containing files availablein a backup set.

Folders

You can view all the files andfolders that you select to restore.

Selected Files

You can also search for a particular file by using theSearch option. You can exclude each item in the rightpane if you want to exclude it from restoration byunchecking it.

Protecting your media and dataRestoring files

474

Page 475: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can use any of the following methods, and you cancombine methods, to select files to restore:

You can restore all thebacked-up files withoutexcluding any file within abackup set.

Restore all files andcategories

You can search by file name,or by part of a file name fromthe list of backed up files andrestore them. You can alsouse wildcard characters, suchas asterisks (*) or questionmarks (?) to search file namesor folder names. For example,you can type *.doc to searchall the Microsoft Worddocuments.

Restore files by searching

You can see a list of the filesthat are included in each filecategory, and choose whichof those files to restore.

Restore individual files withina file category

You can select the files and the file categories that youwant to restore in the Restore Files window.

To select all the backed-up files to restore

1 In the Norton 360 main window, click Backup, andthen click Restore Files.

2 In the Restore Files window, next to Files, checkRestore All Files and Categories.All of the backed-up files and folders in the backupset get selected for restore.

To select files to restore by searching

1 In the Norton 360 main window, click Backup, andthen click Restore Files.

475Protecting your media and dataRestoring files

Page 476: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

2 Under Files, in the Search text box, type all or partof a file name, or the extension of the file.

3 Click Search.The window that appears displays the file namesthat contain the text that you typed.

4 Check the files that you want to restore, and thenclick OK.

5 Repeat steps 2 through 4 to add more files to thelist of those that Norton 360 restores.

To select an individual file within a file category torestore

1 In the Norton 360 main window, click Backup, andthen click Restore Files.

2 In the Restore Files window, under Files, clickBrowse for Files and Folders.

3 In the left pane, under ShowResults for, click a filecategory from which you want to restore files.

4 In the right pane, do one of the following:

1 Check the files that you want to restore.

1 If you want to restore all the files in thatcategory or folder, check the check box in theheader close to Backup Item.

5 Repeat steps 3 through 4 to add more files to thelist of those that Norton 360 restores.You can use the Selected Files option in the leftpane under ShowResultsfor to view all the selectedfiles that you want to restore.

6 Click OK.

Choosing a restore destinationWhen you restore files from a backup, you can choosewhere Norton 360 places the restored files. You canrestore the files to a separate folder of your choice ortheir original location. By default, Norton 360 selectsthe original locations of the files.

Protecting your media and dataRestoring files

476

Page 477: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

w Restoring files to their original locations deletes newerversions of the same files that are stored in thoselocations. If you do not want to replace those files withthe restored files, you must move the newer versionssomewhere else before you restore. You can also restorethem to a different location.

You can change the restore destination from anycomputer at any time.

w Some drives use older Windows file systems, such asFAT-16 or FAT-32, which cannot store files larger than4 GB. For such large files to restore, make sure thatyour restore destination is formatted with a file systemthat supports large files, such as NTFS.

To change a restore destination

1 In the Norton 360 main window, click Backup, andthen click Restore Files.

2 In the RestoreFiles window, under RestoreTo, clickChange.

3 In the window, click New Location.

4 Do one of the following:

1 Type a restore location in the space provided.

1 Click Browse, use the browse window to navigateto the location to which you want to restore files,and then click OK.

5 Make any other necessary changes to your restoresettings, and then click Restore Files.

6 Follow the on-screen instructions to finish restoringyour files.

About Norton 360 Autorun RestoreNorton 360 Autorun Restore helps you restore the filesthat are backed up on an optical disc. You can also usethis feature to restore your backed up files to acomputer that does not have Norton 360 installed.

477Protecting your media and dataRestoring files

Page 478: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

When you insert an optical disc that contains thebacked-up files, the Autorun Restore featureautomatically opens the Portable Restore window.

w If you disable Windows auto-run option, you mustmanually launch the Autorun Restore feature.

The Portable Restore window provides you thefollowing information:

1 The name of the backup set

1 The size of the backed-up files

1 The date and time you backed up the files

You can select the files that you want to restore. Youcan restore the files to their original location. Bydefault, Autorun restores the files you select toC:\Restored Files\. You can customize the locationwhere you want to restore the selected files.

You can also launch the Norton 360 main window ifNorton 360 version 3.0 or later is installed on yourcomputer. If Norton 360 version 3.0 or later is notinstalled on your computer, Autorun tells you that theproduct is not installed on your computer.

You can also use the following link to obtain moreinformation:

http://www.symantec.com/norton/360

Restoring files by using Norton 360 Autorun Restore

Norton 360 Autorun Restore lets you restore your filesbacked-up on an optical disk. Autorun can restore yourbacked-up files to a computer that does not haveNorton 360 installed on it.

You can restore your backed-up files to their originallocations or custom locations. You can also use theLaunch Norton 360 option in the Portable Restorewindow to open the Norton 360 main window. Norton360 version 3.0 or later must be installed on yourcomputer to open Norton 360.

Protecting your media and dataRestoring files

478

Page 479: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To restore files using Norton 360 Autorun Restore

1 Insert an optical disc that contains the backed-upfiles.

2 Click the ARestore icon to launch the AutorunRestore feature.If the Windows AutoPlay option is disabled,navigate to the optical disk that has your backup,and double click the ARestore icon to launch theAutorun Restore feature.

3 In the Portable Restore window, click Select Filesto Restore option.

4 In the window that appears, in the left pane, underthe Filter Results By section, click a file categoryfrom which you want to restore files.

5 In the right pane, check the files that you want torestore.If you want to restore all the files, in the left pane,under the Filter Results By section, click All filetypes, and then check the check box in the headerclose to Backup Item.

6 Under Restore to, click one of the following:

1 Original LocationChoose this option if you want to restore the filesto the original location.

1 Custom LocationChoose this option if you want to restore the filesto a new location. By default, Autorun restoresthe files you select to C:\Restored Files\.

7 Click Restore Selected.

8 Follow the on-screen instructions to finish restoringyour files.

About Norton Backup DriveNorton 360 provides the Norton Backup Drive in yourWindows Explorer after you configure your backup.Norton Backup Drive contains a list of backup

479Protecting your media and dataAbout Norton Backup Drive

Page 480: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

destinations where your files are backed up. Eachbackup destination contains the backup sets to whichthe backup destination is configured.

Norton Backup Drive displays the files that you backedup to a media device. You must connect and turn onthe media device before you view your files.

You can also view the files that you backed up to SecureOnline Storage. You must be connected to the Internetand logged in to Norton Account.

To view the files in your online backup, you must setthe Network Cost Awareness option in the MyNetwork window to NoLimit. The MyNetwork optionis available in the Settings window.

w The Norton Backup Drive is accessible only to systemadministrator.

You can do the following with Norton Backup Drive:

1 View the files that are backed up in different backupdestinations.

To view the files that you backed up to a mediadevice, you must connect the device to yourcomputer.

1 Restore a file from a backup set on the NortonBackup Drive to restore to your computer.

1 Select and delete a file from a backup set on theNorton Backup Drive.

Norton 360 does not back up the file you deletedthe next time you run backup.

1 Open a file to view the content of the file before yourestore or delete it on the Norton Backup Drive.

1 Use the Search command on the Start menu or theSearchToolbar option to locate files in the NortonBackup Drive.

w Norton Backup Drive appears in Windows Exploreronly when the Backup option in the Backup Settingswindow is turned on.

Protecting your media and dataAbout Norton Backup Drive

480

Page 481: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Viewing backup files on the Norton Backup DriveYou can use the Norton Backup Drive to view the filesthat are backed up. You can view the Norton BackupDrive after you configure backup.

If you backed up your files to a media device, ensurethat the device is connected to your PC and turned on.You can then view the files on the Norton Backup Drive.

If you backed up your files to Secure Online Storage,you must be connected to the Internet. You must alsobe logged in to Norton Account to view the files on theNorton Backup Drive.

w To view the files in your online backup, you must setthe Network Cost Awareness option in the MyNetwork window to NoLimit. The MyNetwork optionis available in the Settings window

To view backup files on the Norton Backup Drive

1 In Windows Explorer, click Norton Backup Drive.

2 Select the backup destination, and navigate to thebackup set that contains the files that you backedup.

Restoring a file from a backup set on the NortonBackup Drive

To restore a file, you can drag it from a backup set onthe Norton Backup Drive to your computer. You canalso click to open and view the contents of the filebefore you restore it.

Right-click to select the files to restore in the NortonBackup Drive, and then click Restore to. You canrestore your backed-up files to their original locationsor custom locations.

To restore a file fromabackup set on theNortonBackupDrive

1 In Windows Explorer, click Norton Backup Drive.

481Protecting your media and dataAbout Norton Backup Drive

Page 482: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

2 Select the backup destination, and navigate to thebackup set destination that contains the file thatyou backed up.

3 Do one of the following:

1 Right-click to select the files to restore in NortonBackup Drive, and then click Restore.

The files are restored to the original location byoverwriting the existing files.

1 Right-click to select the files to restore in theNorton Backup Drive, and then click Restoreto.

You can choose to restore your files to theOriginal Location or to a New Location.

4 Click OK.

Deleting a file from a backup set on the NortonBackup Drive

You can select and delete a file from a backup set onthe Norton Backup Drive. Norton 360 does not back upthe deleted file the next time you run a backup. Youcan also click the file to open and view the file contentbefore you restore it.

To delete a file from a backup set on the Norton BackupDrive

1 In Windows Explorer, click Norton Backup Drive.

2 Select the backup destination, and navigate to thebackup set destination that contains the file thatyou backed up.

3 Do one of the following:

1 Right-click to select the files to delete, and thenclick Delete.

1 Select the file, and then press Delete.

Protecting your media and dataAbout Norton Backup Drive

482

Page 483: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

About solutions to the backup problemsThe following table provides some tips to help youavoid backup problems.

The following tips apply to allbackups:1 Perform backups

regularly. The more oftenyou back up, the lesschance there is that youcan lose importantinformation.Anautomaticbackup schedule isrecommended, since thattends to back up thosefiles that have mostrecently changed. Ascheduled weekly backupis a good second choice.

1 If you use automaticbackups, leave your PCturned on when not inuse. Automatic backupstake place when your PCis turned on but not inuse.

1 Regularly check thebackup results thatNorton 360 provides toensure that all of the filesthat should be backed upare backed up.

All backups

483Protecting your media and dataAbout solutions to the backup problems

Page 484: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The following tips apply tobackups to CDs or DVDs:1 Have extra discs on hand

when you back up. Thistip helps you to avoidoccasional disc flaws orsituations where theamount of backed up datais more than youanticipated.

1 Label your backup discswith the complete details,so that you can find theright disc when you needto restore files.

1 Do not copy files directlyfrom the backup discs toyour PC. You mayinadvertently copy onlypart. Instead, use theNorton 360 restorefeature or use the Norton360 Autorun Restorefeature.

Backing up to CDs or DVDs

Protecting your media and dataAbout solutions to the backup problems

484

Page 485: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The following tips apply tobackups to external drives:1 Some drives use older

Windows file systems,such as FAT-16 or FAT-32that cannot store fileslarger than 4 GB. For suchlarge files to back up,ensure that your backupdrive is formatted with afile system that supportslarge files, such as NTFS.

1 If you use automatic orscheduled backups, makesure that the externaldrives are connected andturned on.

1 To avoid accidentallycorrupting your backedup files, do not use abackup drive for purposesother than for backing up.

Backing up to external drives,including flash drives

485Protecting your media and dataAbout solutions to the backup problems

Page 486: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The following tips apply tobackups to online storage:1 Make sure that your PC

does not automaticallydisconnect from theInternet when it is not inuse.

1 Regularly check theamount of space that youhave left in your SecureOnline Storage, andconsider purchasing morestorage space before youneed it.

1 Online backups work bestwith a fast Internetconnection. If yourbackups take too long,consider backing up onlythe files that you regularlywork. Then periodicallyback up to CDs, DVDs,Blu-ray discs, or externaldrives to back up yourlarger, seldom-used files.

1 If you back up more thanone PC to your onlinestorage, give each PC adifferent nickname.Giving a differentnickname to each PChelps you identify the PCand the backups thatcorresponds to each PC.

Backing up to your SecureOnline Storage

Getting additional help with backup problemsIf you run into problems with your Symantec productthat you cannot solve, or have questions about theproduct, additional help is available. You can use theNorton Autofix window to open the support Web site

Protecting your media and dataAbout solutions to the backup problems

486

Page 487: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

and search the Symantec Knowledge Base for solutionsto your problem.

To get additional help with backup problems

1 In the Norton 360 main window, click Support, andthen click Get Support.

2 In the NortonAutofix window, click OpenSupportWeb Site to launch the support Web site.

About online backup considerationsNorton 360 provides you with secure backup storagespace on a server that is accessible to your computerthrough its Internet connection. When your backuplocation is distant from your computer, your data issafe from local disasters, such as a fire, flood, orearthquake.

w To use online backup, you must set the Network CostAwareness option in the My Network window to NoLimit. The My Network option is available in theSettings window.

487Protecting your media and dataAbout online backup considerations

Page 488: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Although online backup is convenient and safe, beforechoosing it for your backup method, consider thefollowing limitations:

Speed limitations

Protecting your media and dataAbout online backup considerations

488

Page 489: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The amount of time that it takesto transfer your backup to theSecure Online Storage dependson the speed of your Internetconnection. If you have manyfiles to back up, the first backupcan take hours or days,depending on the speed of yourInternet connection.

You can configure the Internetbandwidth that backup uses toback up your files using theBandwidth Throttle option. Thisoption is available on theWheretab of the Manage Backup Setswindow.

You can alter the followingbandwidth throttle states:1 Fastest (recommended)

1 High usage

1 Moderate usage

1 Low usage

Furthermore, many home andsmall business Internetconnections are asymmetrical,meaning that their uploadspeeds are slower than theirdownload speeds. A single largefile, such as a high-qualityphotograph, may take severalminutes or longer to upload toyour Secure Online Storage.

If you have many large files andasymmetrical or slow Internetconnection, consider the use ofone of the other backuplocations that Norton 360provides. You can then use yourSecure Online Storage to back

489Protecting your media and dataAbout online backup considerations

Page 490: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

up your smaller files, such asyour financial documents andword-processing documents.

If a backup is in progress, youshould leave your computerturned on, so that the backupcan finish. However, if a backupis interrupted, then the next timeit starts, it resumes where it leftoff and continues until itfinishes.

Norton 360 provides sufficientonline storage to handle manyof your backup needs, and youcan purchase more storage whenyou need it. Nonetheless, theamount of space in your SecureOnline Storage is much smallerthan the typical permanent diskthat most recent computershave. Online backups are idealfor the files that you regularlywork on. You can back up largefiles and the files that seldomchange to a different location.

In addition, you shouldperiodically look over the filesthat you have in your SecureOnline Storage. Eliminate thosefiles that you no longer need, tomake additional storage spaceavailable.

Storage limitations

About online backup activationNorton 360 uses your Norton Account to keep track ofthe following:

1 The computers that you back up to online storage

Protecting your media and dataAbout online backup considerations

490

Page 491: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 The amount of online storage space that is availableto you

Your product needs to be activated to use the onlinebackup feature. The first time you configure onlinebackup, Norton 360 connects to your Norton Accountand requests that you sign in to the account. You mayhave established a Norton Account when you installedNorton 360 or when you installed another Nortonproduct.

To sign in to your Norton Account, you use the emailaddress and the password that you supplied when youcreated your Norton Account. You only need to sign into your Norton Account the first time that youconfigure online backup. Norton 360 retains youraccount information so you do not have to sign in again.If you do not have a Norton Account when youconfigure online backup for the first time, Norton 360lets you create one.

Symantec provides 2 GB of online storage for eachNorton 360 product key. You can share the onlinestorage space that is allocated to you using your NortonAccount among your computers. For example, you havetwo computers having Norton 360 installed on it andregistered with the same Norton Account. You canshare the storage space among your two computers.You use 1 GB of online storage space for your firstcomputer. When you activate the online storage foryour second computer using the same Norton Account,that computer can use the remaining 1 GB of space.

w To use online backup, you must set the Network CostAwareness option in the My Network window to NoLimit. The My Network option is available in theSettings window.

Purchasing more online storage spaceYour Norton 360 subscription comes with an allotmentof secure online storage space. When Norton 360performs an online backup, it calculates the amountof space that it needs for the backup. If your online

491Protecting your media and dataAbout online backup considerations

Page 492: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

storage does not contain sufficient space for thebackup, Norton 360 notifies you and provides you anoption to buy more space.

You do not have to wait until Norton 360 tells you thatyou need more online storage space. You can purchaseadditional space at any time.

You must be connected to the Internet to purchasemore online storage space.

It can take about 30 seconds for the status on the MyAccount page to display the amount of space that youpurchased.

To purchase additional online storage space whenbacking up

1 When Norton 360 notifies you that it needs moreonline storage space, click Buy More Storage.Your Web browser opens to a secure page, on whichyou can purchase additional online storage space.

2 Follow the instructions on the secure Web page topurchase additional online storage space.

To purchase additional online storage space at othertimes

1 In the Norton 360 main window, click Backup, andthen click Buy More Storage.Your Web browser opens to a secure page, on whichyou can purchase additional online storage space.

2 Follow the instructions on the Web page to purchaseadditional online storage space.

Turning off or turning on backupWhen the Backup option is turned on, Norton 360automatically backs up your files when your computeris idle. However, if you want to temporarily disablebackup, you can turn it off from within the program.

When you turn off backup, the backup status in theNorton 360 main window changes from Protected toDisabled. In the Disabled state, Norton 360 disables

Protecting your media and dataTurning off or turning on backup

492

Page 493: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

all automatic backup of files. You can use the RunBackupNow option in the main window if you want toback up your files from all the backup sets.

You can turn off or turn on backup from the Settingswindow, BackupSettings window, or from the BackupDetails window.

To turn off or turn on backup from the Settings window

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Quick Controls, doone of the following:

1 To turn off backup, uncheck Backup.

1 To turn on backup, check Backup.

To turn off or turn on backup from the Backup Settingswindow

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Backup Settings.

3 In the Backup Settings window, do one of thefollowing:

1 To turn off backup, move the On/Off switch tothe right to the Off position.

1 To turn on backup, move the On/Off switch tothe left to the On position.

4 In the Settings window, click Apply.

To turn off or turn on backup from the Backup Detailswindow

1 In the Norton 360 main window, click Backup, andthen click View Details.

2 In the Backup Details window, under Things YouCan Do, do one of the following:

1 To turn off backup, click Turn Off Backup.

1 To turn on backup, click Turn On Backup.

493Protecting your media and dataTurning off or turning on backup

Page 494: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Turning off or turning on backup settingoptions

Norton 360 provides you various options to manageyour backup settings. Norton 360 backup settings letyou access the backup details of a particular file bystatus icon overlays without opening the product. Youcan use the icon overlays to view the backup status ofa file or folder. You can also use the Properties pageof a file to know the backup status of your backup sets.

When the Backup Status Overlays option is turnedon, Norton 360 adds a backup status icon to the files,based on the following conditions:

1 The files belong to a backup file category that youincluded in any of the backup sets.

1 The files are located at a source that you includedin any of the backup sets.

The following table lists the backup status overlay iconsfor the files on your computer:

Indicates that the file has beenbacked up

This icon changes to blue iconwith arrows if you modify thefile.

Green icon with a checkmark

Indicates that the file has notbeen backed up

This icon changes to green whenNorton 360 automatically backsup the file during idle time.

Blue icon with arrows

Protecting your media and dataTurning off or turning on backup setting options

494

Page 495: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Indicates that the file has beenexcluded from backup

Norton 360 displays a disabledbackup status on a file when youexclude the file from any of thebackup sets.

Gray icon with a slashmark

Norton 360 Backup provides the Norton Backup Drivein your Windows Explorer after you configure yourbackup. Norton Backup Drive contains a list of backupdestinations where your files are backed up.

You can use the ContextMenu option to add or excludea file or a folder to your backup sets when youright-click it. You can use this option after youconfigure Backup in the ManageBackupSets window.

You can use the Property Page option to view moredetails about the backup status icons. When youright-click a file that you backed up and view the FileProperties, you can see its backup details on theBackup tab. The Backup tab lists the state of the filefor each backup set and the last backup time.

You can turn off these options if you do not want tosee the icons and backup statuses.

To turn off backup setting options

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Backup Settings.

495Protecting your media and dataTurning off or turning on backup setting options

Page 496: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 In the Backup Settings window, do one of thefollowing:

1 To turn off icon overlays, in the Backup StatusOverlays row, move the On/Off switch to theright to the Off position.

1 To turn off NortonBackupDrive, in the NortonBackup Drive row, move the On/Off switch tothe right to the Off position.

1 To turn off right-click backup menu, in theContext Menu row, move the On/Off switch tothe right to the Off position.

1 To turn off Backup tab in the Properties page,in the Property Page row, move the On/Offswitch to the right to the Off position.

4 In the Settings window, click Apply.

To turn on backup setting options

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Backup Settings.

3 In the Backup Settings window, do one of thefollowing:

1 To turn on icon overlays, in the Backup StatusOverlays row, move the On/Off switch to theleft to the On position.

1 To turn on NortonBackupDrive, in the NortonBackup Drive row, move the On/Off switch tothe left to the On position.

1 To turn on right-click backup menu, in theContext Menu row, move the On/Off switch tothe left to the On position.

1 To turn on Backup tab in the Properties page,in the Property Page row, move the On/Offswitch to the left to the On position.

4 In the Settings window, click Apply.

Protecting your media and dataTurning off or turning on backup setting options

496

Page 497: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This chapter includes the following topics:

1 About Norton 360 Settings

1 Customizing Norton 360 Settings

1 Turning on or turning off Quick Controls services

1 About Antivirus settings

1 About Firewall settings

1 About Norton AntiSpam settings

1 About My Network settings

1 About backup settings

1 About Identity Protection settings

1 About Task Scheduling settings

1 About Administrative Settings

About Norton 360 SettingsThe Detailed Settings in the Settings window let youadjust protection settings and network settings. Youcan also customize schedules for security scans andbackups.

13Customizingsettings

Page 498: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can configure the following Detailed Settings inthe Settings window:

Specify how certain types ofviruses and spyware, as well asother threats, are handled inNorton 360.

You can specify whetherincoming emails are checked andinstant messenger is scanned.You can also specify which filesand signatures are excludedfrom scans, and how low-riskthreats are handled. In addition,you can configure Real TimeProtection, Antispyware, andLiveUpdate.

Antivirus

Specify in detail how to handleincoming and outgoingconnections for your PC.

You can specify Traffic rules andrules for specific programs. Youcan also specify how you wantNorton 360 to handle intrusionattempts and browserprotection.

Firewall

Secure your email client fromunwanted online content.

You can configure NortonAntiSpam to define which clientit should integrate with and howit should handle the email thatit scans on those clients. You canspecify if you want NortonAntiSpam to check the Symantecservers to filter the spam emailmessages which the local filtersclassify as legitimate.

AntiSpam

Customizing settingsAbout Norton 360 Settings

498

Page 499: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

View all the devices available inyour network and specify thetrust level of the devices that areconnected to your network.

You can hide or show theNetwork Security Overviewwindow at startup and configurethe communication port thatNorton products use tocommunicate with each other.You can also purge the NetworkSecurity Map.

My Network

Lets you download and installNorton Safety Minder andconfigure Norton Online Family.

Norton Online Family is aparental control application thatprovides a smart way to keepyour children safe when they areonline. Norton Safety Minder isan application that needs to beinstalled on each computer thatyour child uses to monitor theInternet activities. You can usethe Parental Controls link tovisit Norton Online Family Webpage to download Norton SafetyMinder. Click Download NortonSafety Minder to downloadNorton Safety Minder. Follow theon-screen instructions tocomplete the installation.

If you have already installedNorton Safety Minder, you canclick Parental Control to openthe Parental Control settingswindow.

Parental Controls

499Customizing settingsAbout Norton 360 Settings

Page 500: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Configure Identity Safe to secureyour online identities andtransaction data.

You can also configure SafeSurfing options.

Identity Protection

Specify when and how oftenNorton 360 examines yourcomputer for viruses and otherrisks.

Tasks Scheduling

Use the options in this windowto configure the security of yourproduct.

You can specify your proxysettings in Norton 360. You canalso configure Idle TimeOptimizer, PerformanceMonitoring, and Power SavingMode. In addition, you canconfigure Silent Mode, Idle TimeOut duration, Automatic TasksDelay duration, NortonCommunity Watch, and FirefoxCleanup.

Administrative Settings

Specify the files and folders thatyou want to back up, the backuplocation, and the backupschedule.

You can also turn off or turn onoptions such as Backup StatusOverlays,Norton Backup Drive,Context Menu, and PropertyPage.

Backup Settings

Customizing settingsAbout Norton 360 Settings

500

Page 501: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The Quick Controls in the Settings window let youturn on or turn off the following services:

Turns on or turns off Silent Mode

You can turn on Silent Mode fora period of one hour, two hours,four hours, six hours, or one day.

Silent Mode

Turns on or turns offAntiphishing and Norton SafeWeb features

When you turn on Safe Surfing,it protects your computer whileyou browse with InternetExplorer or Firefox.

Safe Surfing

Turns on or turns off IdentitySafe

When you turn off Identity Safe,Norton 360 no longer lets youmanage your logins, cards, andnotes.

Identity Safe

Turns on or turns off Backup

When you turn on Backup, yourcomputer starts backing up withyour specified settings.

Backup

Turns on or turns off iconoverlays on files

Icon overlays show the backupstatus of your files.

Backup Status Overlays

Turns on or turns off theautomatic updates that guardagainst new and emergingthreats

Automatic LiveUpdate

501Customizing settingsAbout Norton 360 Settings

Page 502: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Turns on or turns off SmartFirewall

When you turn on SmartFirewall, it monitorscommunications between yourcomputer and the othercomputers on the Internet. Italso protects your computerfromcommonsecurity problems.

Smart Firewall

Turns on or turns off NortonTamper Protection

When you turn on NortonTamper Protection, it protectsNorton 360 from attacks ormodifications by unknown,suspicious, or threateningapplications.

Norton TamperProtection

Customizing Norton 360 SettingsThe default Norton 360 settings provide a safe,automatic, and efficient way to protect your computer.However, if you want to change or customize yourprotection settings, you can access most features fromthe Settings window.

You can configure Norton 360 settings in the followingways:

1 You can use the On/Off switch to turn on or turnoff a feature. When you turn off a feature, the colorof the On/Off switch turns red, which indicates thatyour computer is vulnerable to security threats.When you turn on a feature, the color of the On/Offswitch turns green, which indicates that yourcomputer is protected against security threats.

1 You can drag the slider of a protection feature toyour preferred setting. Most often, Norton 360

Customizing settingsCustomizing Norton 360 Settings

502

Page 503: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

provides the slider setting for you to decide whetherto resolve security threats automatically or ask youbefore it takes an action.

1 You can configure a protection feature by eitherselecting the options that are provided for theconfiguration or by providing the requiredinformation. Most of these options are available ascheck boxes for you to check or uncheck.

You can also use the DefaultAll option to reset theconfiguration to the default level.

1 You can select a preferred option from thedrop-down list.

1 You can check or uncheck the Quick Controlsoptions to turn on or turn off a feature.

Norton 360 also provides the Use Defaults option inmost of the Settings window. You can use this optionto reset the configuration to the default level.

To customize Norton 360 settings

1 In the Norton 360 main window, click Settings.

2 In the Settings window, click the protection featurethat you want to customize.

3 In the window that appears, set the option to yourpreferred settings.You may need to click a tab to access the settingsthat are listed under that tab.

4 In the Settings window, do one of the following:

1 To save the changes, click Apply.

1 To close the window without saving the changes,click Close.

Turning on or turning off Quick Controlsservices

In the Settings window, you can turn on or turn off thefollowing Quick Controls services:

1 Silent Mode

503Customizing settingsTurning on or turning off Quick Controls services

Page 504: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 Safe Surfing

1 Identity Safe

1 Backup

1 Backup Status Overlays

1 Automatic LiveUpdate

1 Smart Firewall

1 Norton Tamper Protection

You should leave all of the services turned on exceptSilent Mode.

To turn on or turn off Quick Controls services

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Quick Controls, doone of the following:

1 To turn on a service, check its check box.

1 To turn off a service, uncheck its check box.

If an alert or a message appears, select theduration from the drop-down menu, and thenclick OK.

About Antivirus settingsNorton 360 always protects you from known virusesand the latest virus outbreak. The Antivirus settingsmonitor your PC for the presence of viruses andspyware, as well as other threats, and eitherquarantines or remove them.

The Antivirus settings protect your computer againstthe security risks that can compromise your personalinformation and privacy. The different type of scans,such as Computer Scans, Email Antivirus Scan, andInstant Messenger scan detects and prevents from anyvirus infection on your computer.

The Antivirus settings obtain the latest virusdefinitions through definition updates and keep yourcomputer secure from the latest security threats.

Customizing settingsAbout Antivirus settings

504

Page 505: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can use the following Antivirus settings:

The Automatic Protectionsettings let you control thescanning and monitoring of yourcomputer.

It protects your computer bycontinuously checking forviruses and other security risks.Your options are:1 Boot Time Protection

You can use the Boot TimeProtection option to providean enhanced security levelfrom the time you start yourcomputer. This optionensures better protection byrunning all the necessarycomponents that arerequired for computerprotection when you restartyour computer.

1 Real Time Protection

You can use the Real TimeProtectionoptions to protectyour computer bycontinuously checking forviruses and other securityrisks.

Automatic Protection

505Customizing settingsAbout Antivirus settings

Page 506: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Scans and Risks

Customizing settingsAbout Antivirus settings

506

Page 507: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Scans and Risks settings let youcustomize the scans that Norton360 performs on your computer.

You can use the following Scansand Risks options:1 Computer Scans

Norton 360 lets you rundifferent types of scans todetect and prevent any virusinfection on your computer.

You can use the variousComputer Scans options tocustomize the scans thatNorton 360 performs on yourcomputer. You can alsospecify scanning ofcompressed files andMicrosoft Office documents.

1 Scan Performance Profiles

Scan Performance Profilessettings let you configurehow Norton 360 should scanyour computer based on thedigital signature and trustlevel of the files.

1 Protected Ports

Norton 360 protects thePOP3 and SMTP ports of youremail program.

You can use this option tomanually configure yourPOP3 and SMTP email portsfor email protection. If theSMTP and POP3 portnumbers that your Internetservice provider (ISP) hasprovided for your emailprogram is different from thedefault SMTP and POP3 portnumbers, you must configure

507Customizing settingsAbout Antivirus settings

Page 508: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton 360 to protect theports.

1 Email Antivirus Scan

Email Antivirus Scan protectsyou from the threats that aresent or received in emailattachments.

This option lets you definehow Norton 360 shouldbehave when it scans emailmessages. Based on theoptions you choose, Norton360 automatically scans theemail messages that yousend or receive.

1 Instant Messenger Scan

The Instant Messenger Scanoption lets you customizescanning of the files that youreceive from instantmessenger programs.

You can select the supportedinstant messenger programsfrom which you may receivefiles. Norton 360 scans thefiles that you receive fromthe selected instantmessenger programs.

Customizing settingsAbout Antivirus settings

508

Page 509: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 Exclusions / Low Risks

Exclusions options specifythe items such as folders,files, and drives that youexclude from Norton 360scans. Scans, signatures, andlow-risk items are someitems that you can excludefrom scanning

Exclusions options let youchoose which categories ofrisks you want Norton 360 todetect.w Exclusions reduce yourlevel of protection andshould be used only if youhave a specific need.

1 Insight Protection

The Insight Network scanuses the Cloud technologywherein a remote server onthe web contains the latestvirus definitions. Norton 360scans your computer for thelatest security threats. WhenNorton 360 performs theInsight Network scan, it usesthe virus definitions that areavailable locally and in theCloud. Norton 360 providesadditional protection byusing the most recentdefinitions in the Cloud,apart from the definitionsthat are available locally onyour computer.

509Customizing settingsAbout Antivirus settings

Page 510: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Antispyware protects yourcomputer against the securityrisks that can compromise yourpersonal information andprivacy.

Norton 360 protects yourcomputer from vulnerabilitiesthrough the latest definition andprotection updates. Your optionsare:1 Antispyware

Antispyware protects yourcomputer against thesecurity risks that cancompromise your personalinformation and privacy

This option lets you choosewhich categories of risk youwant Norton 360 to detectfor manual, email, andinstant messenger scanning.

1 Updates

Norton 360 protects yourcomputer fromvulnerabilities through thelatest definition andprotection updates.Definition updates containthe information that letsNorton 360 to recognize andalert you to the presence ofa specific virus or securitythreat

You can use the Updatesoptions to obtain the latestvirus definitions throughdefinition updates and keepyour computer secure fromthe latest security threats.

Antispyware andUpdates

Customizing settingsAbout Antivirus settings

510

Page 511: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

About Automatic Protection settingsThe Boot Time Protection option on the AutomaticProtection tab provides an enhanced security levelfrom the time you start your computer. This optionensures better security by running all the necessarycomponents that are required for computer protectionas soon as you start your computer.

The Real Time Protection settings on the AutomaticProtection tab let you control the scanning andmonitoring of your computer. It protects your computerby continuously checking for viruses and other securityrisks.

You can use the Real Time Protection options todetermine what gets scanned and what the scan looksfor. It also provides you with advanced protection byproactively detecting unknown security risks on yourcomputer. You can determine what happens when asecurity risk or risk-like activity is encountered.

511Customizing settingsAbout Antivirus settings

Page 512: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can use the following Real Time Protectionoptions:

Auto-Protect

Customizing settingsAbout Antivirus settings

512

Page 513: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Auto-Protect loads intomemory and providesconstant protection while youwork. It checks for virusesand other security risks everytime that you run programson your computer.

Auto-Protect checks forviruses when you insert anyremovable media, access theInternet, or use the documentfiles that you receive orcreate. It also monitors yourcomputer for any unusualsymptoms thatmight indicatean active threat.

You can stay protected byusing the following options:1 Caching

Improves theperformance of yourcomputer

If you turn on this option,Norton 360 keeps arecord of the files that areaccessed often. Norton360 does not scan thoserecorded files, even whenyou restart yourcomputer.

1 Removable Media Scan

Checks for boot viruseswhen you accessremovable media

After the removablemedia has been scannedfor boot viruses, it is notscanned again until it isreinserted or formatted.If you still suspect that a

513Customizing settingsAbout Antivirus settings

Page 514: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

boot virus infects yourremovable media, ensurethat Auto-Protect isturned on to rescan theremovable media. Youthen insert the removablemedia and open it fromMy Computer forAuto-Protect to rescan it.You can also scan itmanually to verify that itis not infected.

Customizing settingsAbout Antivirus settings

514

Page 515: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

SONAR Protection

515Customizing settingsAbout Antivirus settings

Page 516: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Symantec Online Network forAdvanced Response (SONAR)provides the real-timeprotection against threatsand proactively detectsunknown security risks onyour computer.

SONAR identifies theemerging threats that arebased on the behavior ofapplications. SONAR isquicker than the traditionalsignature-based threatdetection techniques. It alsodetects and protects yourcomputer against maliciouscode even before virusdefinitions are availablethrough LiveUpdate.

SONAR Protection includesthe following options:1 SONAR Advanced Mode

Norton 360 provides youthe greatest control overlow-certainty threats onlyif this option is turned on.

1 Remove RisksAutomatically

This option lets thelow-certainty threatsbehave as high-certaintythreats when SONARAdvancedMode option isenabled. In this case,Norton 360 automaticallyremoves the threats andnotifies you.

1 Remove Risks if I AmAway

This option lets Norton

Customizing settingsAbout Antivirus settings

516

Page 517: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

360 to automaticallyremove low-certaintythreats if it does not getany response from youwhen SONAR AdvancedMode option is enabled.

1 Show SONAR BlockNotifications

This option lets youenable or disable SONARBlock notifications.Norton 360 suppressesthe SONAR Blocknotifications when you setthe Show SONAR BlockNotifications option toLog Only.

This feature provides betterprotection by running all thenecessary components ofNorton 360 that blockmalware intrusion when youstart your computer.

w This feature is availableonly in Windows 8.

Early Launch Anti-MalwareProtection

About Scans and Risks settingsScans and Risks settings let you customize the scansthat Norton 360 performs on your computer. You canconfigure a Norton 360 scan based on the digitalsignature and trust level of the files on your computer.You can define how Norton 360 should behave whenit scans email messages and customize scanning of thefiles that you receive from instant messenger programs.

517Customizing settingsAbout Antivirus settings

Page 518: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can use the following Scans and Risks settings:

Computer Scans

Customizing settingsAbout Antivirus settings

518

Page 519: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton 360 lets you run differenttypes of scans to detect andprevent any virus infection onyour computer. The scans areQuick Scan, Full System Scan,and Customized Scan. You canuse the various Computer Scansoptions to customize the scansthat Norton 360 performs onyour computer. You can alsospecify scanning of compressedfiles and Microsoft Officedocuments.

The Computer Scans optionsalso let you specify scans todetect rootkits, other stealthitems, tracking cookies, andunknown security threats. Youroptions are:1 Compressed File Scan

Scans and repairs the filesinside compressed files.

When you turn on thisfeature, Norton 360 scansand detects viruses andother security risks in thefiles within compressed filesand removes the compressedfiles.

1 Microsoft Office AutomaticScan

Scans the Microsoft Officefiles when you open them.

If you install Microsoft Office2000 or later after Norton360 is installed, you mustturn on this option to scanMicrosoft Office filesautomatically.

1 Rootkits and Stealth ItemsScan

519Customizing settingsAbout Antivirus settings

Page 520: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Scans for rootkits and othersecurity risks that might behidden on your computer.

1 Network Drives Scan

Scans the network drivesthat are connected to yourcomputer.

Norton 360 performs aNetwork Drives Scan duringFull System Scan andCustomScan. By default, theNetwork Drives Scan optionis turned on. If you turn offthis option, Norton 360 doesnot scan network drives.

1 Heuristic Protection

Scans your computer toprotect against unknownsecurity threats.

Norton 360 uses heuristictechnology to checksuspicious characteristics ofa file to categorize it asinfected. It compares thecharacteristics of a file to aknown infected file. If the filehas sufficient suspiciouscharacteristics, then Norton360 identifies the file asinfected with a threat.

1 Tracking Cookies Scan

Scans for the small files thatprograms might place onyour computer to track yourcomputing activities.

Customizing settingsAbout Antivirus settings

520

Page 521: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 Full System Scan

Scans your computer whenit is idle.

When your computer is idle,Norton 360 runs a FullSystem Scan. After the scanis complete, you can view thesummary of the scan resultsand take appropriate actionwhen you start using yourcomputer again. You can usethe Configure option toschedule the Full SystemScan.

1 Number of Threads forManual Scan

Lets you select the numberof threads that Norton 360uses for manual scanThreads are subsets of aprocess that share theprocess resources butexecute independently ofeach other. Threads help inparallel execution of aprogram to allow theprogram to operate faster ina multiprocessorenvironment.

521Customizing settingsAbout Antivirus settings

Page 522: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The Scan Performance Profilessettings let you configure howNorton 360 should scan yourcomputer based on the digitalsignature and trust level of thefiles.

w You must configure theScan Performance Profilessettings before you run a scanor before a scan is scheduled torun. Norton 360 scans yourcomputer according to theconfiguration you specified inthe Scan Performance Profilessettings.

You can configure the followingScan Performance Profilessettings:1 Full Scan

Configure a complete scan ofyour computer.

1 Standard Trust

Configure a scan thatexcludes the files that areNorton Trusted.

1 High Trust

Configure a scan thatexcludes the Norton andCommunity Trusted files andthe files that have knowndigital signatures.

Scan PerformanceProfiles

Customizing settingsAbout Antivirus settings

522

Page 523: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Protected Ports settings protectthe POP3 and SMTP ports ofyour email program.

You can use this option tomanually configure your POP3and SMTP email ports for emailprotection. If the SMTP andPOP3 port numbers that yourInternet service provider (ISP)has provided for your emailprogram is different from thedefault SMTP and POP3 portnumbers, you must configureNorton 360 to protect the ports.

Protected Ports

Email Antivirus Scan protectsyou from the threats that aresent or received in emailattachments.

You can use the Email AntivirusScan options to define howNorton 360 should behave whenit scans email messages. Basedon the options you choose,Norton 360 automatically scansthe email messages that yousend or receive.

Email Antivirus Scan

Instant Messenger Scan optionslet you customize the scanningof the files that you receive frominstant messenger programs.

You can select the supportedinstant messenger programsfrom which you may receive files.Norton 360 scans the files thatyou receive from the selectedinstant messenger programs.

Instant Messenger Scan

523Customizing settingsAbout Antivirus settings

Page 524: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Exclusion / Low Risks

Customizing settingsAbout Antivirus settings

524

Page 525: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Exclusions options specify theitems such as folders, files, anddrives that you exclude fromNorton 360 scans. Scans,signatures, and low-risk itemsare some items that you canexclude from scanning.

Exclusions options also let youchoose which categories of risksyou want Norton 360 to detect.Your options are:1 Low Risks

Lets you manage the low-riskitems that are found in yourcomputer.

You can specify how youwant Norton 360 to respondto low-risk items.

1 Items to Exclude fromScans

Lets you determine whichdisks, folders, or files youwant to exclude from riskscanning.

You can add new exclusionitems or edit the added itemsin the excluded-items list.You can also remove itemsfrom the excluded-items list.

1 Items to Exclude fromAuto-Protect and SONARDetection

Lets you determine whichdisks, folders, or files youwant to exclude fromAuto-Protect scans andSONAR scans.

You can add the new itemsthat need to be excluded ormodify the items that youalready excluded. You can

525Customizing settingsAbout Antivirus settings

Page 526: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

also remove items from theexcluded-items list.

1 Signatures to Exclude fromAll Detections

Lets you select known risksby name and remove a riskname from theexcluded-items list

You can also view the riskimpact that is based on theperformance, privacy,removal, and stealth impact.

1 Clear file IDs excludedduring scans

Lets you remove thereputation information of thefiles that are excluded fromscanning.

You can use the Clear Alloption to clear the reputationinformation of the files thatare excluded from scanning.

w Exclusions reduce yourlevel of protection and should beused only if you have a specificneed.

Customizing settingsAbout Antivirus settings

526

Page 527: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The Insight Network scan usesthe Cloud technology wherein aremote server on the Webcontains the latest virusdefinitions. Norton 360 scansyour computer for the latestsecurity threats. When Norton360 performs the InsightNetwork scan, it uses the virusdefinitions that are availablelocally and in the Cloud. Norton360 provides additionalprotection by using the mostrecent definitions in the Cloud,apart from the definitions thatare available locally on yourcomputer.

Insight Protection

About Antispyware and Updates settingsAntispyware protects your computer against thesecurity risks that can compromise your personalinformation and privacy.

Norton 360 protects your computer from vulnerabilitiesthrough the latest program updates and definitionupdates. Automatic LiveUpdate and Pulse Updatesobtain the latest virus definitions through definitionupdates and keep your computer secure from the latestsecurity threats.

You can use the following Antispyware and Updatessettings:

Antispyware options let youchoose which categories of riskyou want Norton 360 to detectfor Auto-Protect, manual, email,and instant messenger scans.

Antispyware

527Customizing settingsAbout Antivirus settings

Page 528: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Updates

Customizing settingsAbout Antivirus settings

528

Page 529: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton 360 protects yourcomputer from vulnerabilitiesthrough the latest program anddefinition updates. Definitionupdates contain the informationthat lets Norton 360 recognizeand alert you to the presence ofa specific virus or securitythreat. You can use the Updatesoptions to obtain the latest virusdefinitions through definitionupdates and keep your computersecure from the latest securitythreats. Your options are:

1 Automatic LiveUpdate

Automatic LiveUpdateautomatically checks fordefinition and programupdates when you areconnected to the Internet.

1 Pulse Updates

In addition to the definitionupdates that AutomaticLiveUpdate downloads,Norton 360 uses streamingtechnology to download thelatest virus definitions. Thesedownloads are called PulseUpdates. The Pulse Updatesare lighter and faster, andkeep your computer securefrom the ongoing threats onthe Internet.

1 Smart Definitions

Lets you install only the CoreSet virus definitions.

You can choose SmartDefinitions to minimizedownload time, installationtime, and memoryconsumption as Smart

529Customizing settingsAbout Antivirus settings

Page 530: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Definitions are a subset ofvirus definitions.

1 Apply updates only onreboot

Lets you choose how theprogram updates obtainedby Automatic LiveUpdateneed to be applied to yourcomputer. Certain programupdates may require you torestart your computer for theupdates to complete.

When you turn on thisoption, program updates thatrequire system restart areautomatically applied thenext time you restart yoursystem. However, programupdates that do not requiresystem restart are appliedinstantly. By default, thisoption is turned off.w This option is availableonly in Windows 7 andWindows 8.

About Firewall settingsFirewall settings in Norton 360 check your PC's Internetconnection to protect it from unwanted communicationactivity and Internet intrusions.

Customizing settingsAbout Firewall settings

530

Page 531: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The following tabs are available in the Firewall settingswindow:

Lets you activate the generalfirewall features andcustomize the ports that yourcomputer uses to access Webpages

The general settings let youcontrol how firewall handlesthe uncommon protocols andthe network traffic to andfrom your computer.According to the generalsettings, the firewall allowsor blocks the incoming or theoutgoing connectionattempts and the sharing ofresources with yourcomputer. You can also usethe general settings to let thefirewall control connectionattempts to or from theblocked and the inactiveports in your computer.

General Settings

Lets you control settings forthe programs that access theInternet

Program Rules

Lets you determine how thefirewall handles incomingandoutgoing networkconnections of various kinds

You can change the settingsto allow or deny specifictypes of connections withyour PC.

Traffic Rules

531Customizing settingsAbout Firewall settings

Page 532: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Prevents intrusion attemptsand protects your Webbrowser from attacks bymalicious Web sites

You can use the DownloadIntelligence option that isavailable on this tab toprotect your computeragainst any unsafe file thatyou download. This featuresupports only downloadsusing the HTTP protocol andInternet Explorer, Chrome,and Firefox browsers.

Intrusion and BrowserProtection

Customizing settingsAbout Firewall settings

532

Page 533: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you activate theadvanced protection featuresof Smart Firewall

The advanced settings let youturn on or turn off theAutomatic Program Controlfeature. Automatic ProgramControl automaticallyconfigures Internet accesssettings for the Web-enabledprograms that you run for thefirst time. To turn onAutomatic Program Control,you must set it to Aggressiveor Automatic.

The Automatic Learn IPv6NAT Traversal Traffic optionis available only whenAutomatic Program Controlis set to Aggressive orAutomatic. Norton 360provides the Automatic LearnIPv6 NAT Traversal Trafficoption to control the networktraffic that uses Teredo tocommunicate with yourcomputer.

When you turn off AutomaticProgram control, you can turnon Advanced EventsMonitoring. You can use theAdvancedEventsMonitoringoptions to configure theInternet access settings forInternet-enabled programsthe first time that they run.

Advanced Settings

533Customizing settingsAbout Firewall settings

Page 534: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

About Firewall General settingsSmart Firewall General settings let you activate thegeneral firewall features and customize the ports thatyour computer uses to access Web pages. Your optionsare:

Determines how the SmartFirewall handles uncommonprotocols.

Uncommon Protocols

Returns the Smart Firewall to itsdefault state.

You can use the Reset option toensure that all recommendedfirewall rules and settings areconfigured.

w If you reset the firewall,you remove any custom rules orsettings that you haveconfigured. Therefore, Norton360 prompts you with aconfirmation dialog box whenyou reset firewall.

Firewall Reset

Ensures that blocked andinactive ports do not respond toconnection attempts.

Active ports are prevented fromresponding to connectionattempts that have incorrectsource or destinationinformation.

Stealth Blocked Ports

Customizing settingsAbout Firewall settings

534

Page 535: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Automatically allows the Internettraffic that matches theconnections that an applicationopens.

Check this option to do thefollowing:1 Analyze the network traffic

that enters your computer.1 Block the suspicious

applications that try toconnect to your computer.

Stateful Protocol Filter

Allows the computers on thenetwork to share resources suchas files, folders, and printers(that are locally attached).

Automatic File/PrinterSharing Control

Blocks all networkcommunications to and fromyour computer.

Block All Network Traffic

About the Intrusion and Browser Protection settingsIntrusion Prevention scans all the network traffic thatenters and exits your computer and compares thisinformation against a set of attack signatures. Attacksignatures contain the information that identifies anattacker's attempt to exploit a known operating systemor program vulnerability. Intrusion Prevention protectsyour computer against most common Internet attacks.

If the information matches an attack signature,Intrusion Prevention automatically discards the packetand breaks the connection with the computer that sentthe data. This action protects your computer from beingaffected in any way.

Intrusion Prevention relies on an extensive list ofattack signatures to detect and block suspiciousnetwork activity. Norton 360 runs LiveUpdateautomatically to keep your list of attack signatures up

535Customizing settingsAbout Firewall settings

Page 536: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

to date. If you do not use Automatic LiveUpdate, youshould run LiveUpdate once a week.

Norton 360 also provides the Web Browser Protectionfeature to protect your Web browser from maliciousprograms.

w The Browser Protection feature is available for InternetExplorer 7.0 or later, Chrome 17.0 or later, and Firefox10.0 or later.

With increasing Internet use, your Web browser isprone to attack by malicious Web sites. These Web sitesdetect and exploit the vulnerability of your Webbrowser to download malware programs to your systemwithout your consent or knowledge. These malwareprograms are also called drive-by downloads. Norton360 protects your Web browser against drive-bydownloads from malicious Web sites.

The Intrusion and Browser Protection settings alsoinclude the Download Intelligence option to protectyour computer against any unsafe file that youdownload. Download Intelligence provides informationabout the reputation level of any executable file thatyou download using the Web browser. DownloadIntelligence supports only downloads using the HTTPprotocol, Internet Explorer 6 browser or later, Chrome10.0 browser or later, and Firefox 3.6 browser or later.The reputation details that Download Intelligenceprovides indicate whether the downloaded file is safeto install. You can use these details to decide whetheryou want to install the executable file.

About Smart Firewall Advanced settingsSmart Firewall Advanced settings let you activate theadvanced protection features of Smart Firewall byturning off Automatic Program Control.

Automatic Program Control automatically configuresInternet access settings for the Web-enabled programsthat are run for the first time. The Automatic LearnIPv6 NAT Traversal Traffic option is available only

Customizing settingsAbout Firewall settings

536

Page 537: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

when Automatic Program Control is set to Aggressiveor Automatic. You can use this option to specify howNorton 360 must control any network traffic that usesTeredo to communicate with your computer.

You can configure the Automatic Program Controloption to the following settings:

1 Aggressive - Allows Norton 360 to alert you whenit detects a program with Unproven or Poor trustlevel receiving inbound traffic. You can decidewhether to allow or block the traffic after viewingthe reputation details of the program in the firewallalert. When you select this option, Norton 360 doesnot alert you for any outbound traffic irrespectiveof the reputation of the program (Norton Trusted,Good, Unproven, Poor, or Bad). Norton 360automatically takes decisions on the outboundtraffic.

1 Automatic - Allows Norton 360 to automaticallytake decisions when a program receives inbound oroutbound traffic. When you select this option,Norton 360 does not prompt you with any firewallalerts.

1 Off - Turns off Automatic Program Control. If youhave selected this option, you must manuallyspecify the Internet access settings for all inboundtraffic and outbound traffic in the firewall alerts.

When you turn off Automatic Program Control, youcan turn on Advanced Events Monitoring. You can usethe AdvancedEventsMonitoring options, to configurethe Internet access settings for Internet-enabledprograms the first time that they run. When you turnon the Advanced Events Monitoring feature, you areprompted with numerous firewall alerts. You can allowor deny any of the events that may harm yourcomputer. When the event occurs for the first time, afirewall alert appears and you can allow or block theevent. When you allow the event, the event detailsappear under the relevant category that is available inAdvanced Events Monitoring. The application that

537Customizing settingsAbout Firewall settings

Page 538: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

triggers the allowed event is added to the trusted listof its corresponding category in Advanced EventsMonitoring. You can remove the application from thelist. In this case, firewall alert appears when theapplication triggers the event next time.

The Advanced Events Monitoring settings consist ofthe following categories that provide your computerwith advanced protection:

Monitors themaliciousprogramsthat launch Internet-enabledprograms.

Program Component

Monitors themaliciousprogramsthat attach to safe programswithout being detected.

Program Launch

Monitors the Trojan horses ormalicious programs that launchtrusted applications in hiddenmode through command-lineparameters.

CommandLine Execution

Monitors the Trojan horses ormalicious programs that injectcode into an application'sprocess without triggeringfirewall alerts.

Code Injection

Monitors the Trojan horses andother malicious programs thatmanipulate an application'sbehavior to connect to theInternet without triggeringfirewall alerts.

Window Messages

Customizing settingsAbout Firewall settings

538

Page 539: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Monitors the Trojan horses andother malicious programs thatbypass network traffic.

These programs penetrate theWindows TCP/IP layer to sendand receive data withouttriggering firewall alerts.

Direct Network Access

Monitors themaliciousprogramsthat use the documentedinterfaces that the trustedapplications provide to transmitdata outside the networkwithout triggering firewall alerts

Active Desktop Change

Monitors themalicious keyloggerprograms that access personalinformation of a user on aparticular computer bymonitoring their keystrokeactivities.

Key Logger Monitor

Monitors themaliciousprogramsthat manipulate an application'sbehavior by instantiatingcontrolled COM objects.

COM Control

About Norton AntiSpam settingsWith the increase in usage of email, many users receivea number of unwanted and unsolicited commercialemail messages that are known as spam. Not only doesspam make it difficult to identify valid email messages,but some spam contains offensive messages andimages.

Norton AntiSpam incorporates several powerfulfeatures to reduce your exposure to unwanted onlinecontent.

539Customizing settingsAbout Norton AntiSpam settings

Page 540: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton AntiSpam settings help you configure thefollowing:

1 The email client with which Norton AntiSpamshould integrate

1 The list of allowed email senders

1 The list of blocked email senders

1 The email addresses and domains that NortonAntiSpam should not import into the list of allowedand blocked email senders

1 The option to send feedback to Symantec aboutmisclassified email

1 The option to filter email messages through WebQuery to maintain high spam detection efficiency

You can configure Norton AntiSpam settings on thefollowing tabs:

The options on the Filter tab letyou configure the list of allowedand blocked email senders. Youcan also configure the option tofilter the email messagesthrough the Web Query filter.You can define whether feedbackabout a misclassified emailmessage should be sent toSymantec. In addition, you canconfigure the Address BookExclusions list.

Filter

Customizing settingsAbout Norton AntiSpam settings

540

Page 541: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

The options on the ClientIntegration tab let you integrateNorton AntiSpam with youremail clients to keep you freefrom unsolicited emailmessages. You can also specifywhether or not to display a briefintroduction of Norton AntiSpameach time you start your emailprogram. In addition, you canspecify which address book youwant Norton AntiSpam tointegrate with.

Client Integration

About Filter settingsThe Filter tab in the AntiSpam settings windowprovides options to configure AntiSpam settings.

You can use the following options on the Filter tab:

Lets you exclude the emailaddresses that must not beautomatically added from youraddress book to the Allowed List.

Address Book Exclusions

Lets you add specific addressesand domains (for example,@symantec.com) fromwhichyouwant to receive email messages.

Allowed List

Lets you add specific addressesand domains from which you donot want to receive emailmessages.

Norton AntiSpam marks all emailmessages from these addressesor domains as spam.

Blocked List

541Customizing settingsAbout Norton AntiSpam settings

Page 542: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you check the SymantecWeb servers to filter the spamemail messages which the localfilters classify as legitimate.

Web Query

Lets you configure your POP3and SMTP email ports for emailprotection.

Protected Ports

About Client Integration settingsThe Client Integration tab in the AntiSpam settingswindow lists the supported email programs, or clients,that are installed on your computer and theirassociated address books.

You have the following options on the ClientIntegration tab:

Norton 360 supports NortonAntiSpam integration withMicrosoft Outlook and OutlookExpress. In Windows Vista,Norton 360 also supports NortonAntiSpam integration withWindows Mail.

When you turn on an emailclient, Norton AntiSpamintegrates with the email client.

Email Clients

Customizing settingsAbout Norton AntiSpam settings

542

Page 543: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton 360 supports NortonAntiSpam integration with theaddress books of email clientsfrom which you want NortonAntiSpam to import emailaddresses.

You can also import into theAllowed List the list of addressesthat are present in an emailprogram. You do not have tointegrate Norton AntiSpam withyour email clients to import theaddresses into the Allowed List.

Address Books

The Feedback option under the Miscellaneous rowlets you send feedback about the misclassified emailmessage to Symantec.

w The option is available only when Microsoft Outlookor Outlook Express is installed on your computer.

The WelcomeScreen option under the Miscellaneousrow provides a brief introduction of Norton AntiSpameach time you start your email program. You can turnoff the Welcome Screen option if you do not want thewelcome screen to appear.

The following email clients do not support clientintegration:

1 Outlook 2010 64-bit

1 Thunderbird

1 Windows Mail

About My Network settingsThe My Network settings let you configure thecommunication port that Norton products use tocommunicate with each other. You can also specifywhether to display the Network Security Overviewwindow when you open Network Security Map.

543Customizing settingsAbout My Network settings

Page 544: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can use the Configure option in the NetworkSecurity Map row to access Network Security Mapwindow. The NetworkSecurityMap window providesa pictorial representation of the devices on the networkto which your computer is connected. You can view thedetails of each device before you set up RemoteMonitoring. The ProductConfiguration panel appearswhen you click the Configure option for the first time.The ProductConfiguration panel helps you install thecomponent that is required to view Network SecurityMap.

You have the following options:

Manages the trust level of the devicesthat you manually add to your homenetwork.

Trust Control is a special networkthat lists all the devices that youmanually add to the Network SecurityMap, irrespective of their connectionstatus. You can select the TrustControl network in the NetworkDetails drop-down list to view thedevices that you added. You can alsoreclassify the devices that you addedto the Network Security Map astrusted or restricted. You cannot editthe details of Trust Control network.

Trust Control

Customizing settingsAbout My Network settings

544

Page 545: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Removes all of the devices that arelisted in Network Map.

You can purge Network Map if youwant to create a new list of devices.For example, you can purge all of thedevices that were present on yourprevious network before you connectto a new network. Ensure that youdisable Remote Monitoring beforeyou purge the Network Map. Norton360 cannot purge the Network Mapwhen the Remote Monitoring isturned on.

w Norton 360 purges the devicesthat you add manually in the TrustControl network depending upontheir trust level. It does not purge thedevices that have a trust level of FullTrust or Restricted.

Network Map

545Customizing settingsAbout My Network settings

Page 546: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Shows the communication port thatNorton products use to communicatewith each other over the network.

If you change the communicationport number on your computer, youmust change it on each computerthat is connected to your NetworkSecurity Map. In addition, when youfind more computers that use theRemote Monitoring Setup process,ensure that the same port number isused on every computer.

w Though this communicationport is configurable, Symantecrecommends that you do not changethe port number to avoid potentialconflicts with other well-knownnetworking ports. If you change thecommunication port number, youmust use a port number in the range1-65535.

CommunicationsPort

Displays the Network SecurityOverview window when you openNetwork Security Map.

Welcome Screen atStartup

The Network Cost Awareness option lets you set uppolicies and restrict the Internet usage of Norton 360.You can use the Configure option in the NetworkCostAwareness row to define the amount of networkbandwidth that Norton 360 can use.

About backup settingsYou can use the backup settings in Norton 360 toconfigure your system backup.

Norton 360 Backup lets you perform the followingtasks:

Customizing settingsAbout backup settings

546

Page 547: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 Select the files that are required to be backed up.

1 Choose the location to store the backed up files.

1 Assign a schedule to run a backup.

In addition to the backup tasks, Norton 360 backupsettings let you easily access the backup status of aparticular file without opening the product. TheBackup Settings window provides you the option toturn off or turn on the Backup.

Under Backup, you have the following options:

Lets you configure what, where,and when to back up yourimportant files

You can use the Configureoption to specify the source,destination, and schedule of thebackup.

Manage Backup

547Customizing settingsAbout backup settings

Page 548: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you view the backup statusof a file by adding the statusoverlay to the file’s icon

The status overlays that appearsare:1 Green icon with a check mark

Indicates that the file hasbeen backed up

This icon changes to blueicon with arrows if youmodify the file.

1 Blue icon with arrows

Indicates that the file has notbeen backed up

This icon changes to greenwhen Norton 360automatically backs up thefile during idle time.

1 Gray icon with a slash mark

Indicates that the file hasbeen excluded from backup

Norton 360 displays adisabled backup status on afile when you exclude the filefrom any of the backup sets.

Backup Status Overlays

Lets you view the list of backupdestinations where your files arebacked up in the WindowsExplorer

You can also add a file to abackup set and delete a file froma backup set. In addition, youcan restore a file from a backupset on the Norton Backup Driveto your customized location.

Norton Backup Drive

Customizing settingsAbout backup settings

548

Page 549: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you add or exclude a file ora folder to a backup set by usingthe right-click shortcut menu

You can use this option after youconfigure Backup in theManageBackup Sets window. It listsdown all the available backupsets for easy backups.

Context Menu

Lets you view the backup statusof each backup set on theBackup tab in the file Propertiespage that you included in yourbackup

It lists down all the availablebackup sets along with the dateand time that it was last backedup. It also shows thecorresponding icon overlay thatindicates if the file is included orexcluded in a particular backupset.

Property Page

549Customizing settingsAbout backup settings

Page 550: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you specify the amount oflocal disk space that you want toreserve.

When you perform an onlinebackup, Norton 360 creates atemporary file in your local diskfor file transfer. At times, thisfile becomes large and consumesa large amount of free spaceavailable on your local drive.

When the available free diskspace on your computer reachesthe specified limit, Norton 360notifies you and does notperform an online backup. Youmust free some disk space andthen perform an online backup.By default, Norton 360 reserves2048 MB (2 GB) of your localdisk space.

Reserved FreeDisk SpaceDuring Online Backup (inMB)

About Identity Protection settingsIdentity thieves often use fraudulent Web sites toattempt to trick you into divulging private information.These sites may be disguised as shopping sites orfinancial transaction sites. Norton 360 helps guardagainst identity theft by verifying the Web sites youvisit.

Antiphishing, Norton Safe Web, and Identity Safefeatures in Norton 360 let you safely browse theInternet and securely perform online transactions.

When you install Norton 360, it adds the NortonToolbar to Internet Explorer, Chrome and Firefox.Norton 360 protects your Internet Explorer browser,Chrome browser, and Firefox browser when you turnon the Safe Surfing option.

Customizing settingsAbout Identity Protection settings

550

Page 551: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Antiphishing tells you the following things about theWeb pages that you visit:

1 If it is safe to enter confidential information

1 If the Web page is known to be fraudulent

1 If the Web page is approved by Symantec

1 If the Web page is known to belong to a suspicioussite

1 If the Web page is known to give annoying results

Norton Safe Web lets you know that a Web site ismalicious before you visit it. It provides you a safe Websearch environment by displaying the site rating iconsnext to every search result.

When you turn on Norton Safe Web, you can see thefollowing site rating icons next to the search results:

Indicates the site is VeriSigntrusted

Norton Secured icon

Indicates that the site is safe tovisit

Green OK

Indicates that the site mayattempt to install malicioussoftware in your computer andis unsafe to visit

Red cross (x) mark

Indicates that the site mayprovide annoying results

Yellow exclamation mark

Indicates that Norton Safe Webhas not analyzed the site and itdoes not have sufficientinformation

Grey question mark

The Identity Safe feature in Norton 360 lets you saveand protect your logins. However, the feature remainsinactive until you create an Identity Safe password and

551Customizing settingsAbout Identity Protection settings

Page 552: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

log in to Identity Safe. The password protects you byrestricting unauthorized access to your data in IdentitySafe.

The Identity Safe feature provides you the ease of usingyour Identity Safe data when you are on the move. Youcan create an online vault and save your data in theonline vault. You access your sensitive Identity Safedata from any computer that is connected to theInternet.

You can set up Identity Safe in the following areas ofNorton 360:

1 The IdentitySafe section under IdentityProtectionoption in the Settings window

1 The Identity Protection section in the Norton 360main window

Identity Safe provides you the following features for asecure online transaction experience:

Table 13-1 Identity Safe features

AdviceDescriptionFeature

When you saveall of your logininformation inIdentity Safe, youcan do thefollowing:1 Easily track

all of yourlogins

1 Quicklylaunch yourlogin Webpages

Lets youmanageyourlogininformation

Thisinformationincludessuch thingsas youremail logincredentialsand Internetbankingcredentials.

Edit Logins

Customizing settingsAbout Identity Protection settings

552

Page 553: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

AdviceDescriptionFeature

You can use theinformation thatyou store in thecards to do thefollowing:1 Automatically

fill forms1 Provide

sensitiveinformationwithouthaving totype it whileyou areonline

In this way,Identity Safeprotects youfrom keyloggersthat steal andmisuse youridentity.

Lets youmanageyourpersonalinformationin one place

Edit Cards

553Customizing settingsAbout Identity Protection settings

Page 554: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

AdviceDescriptionFeature

It becomesdifficult tomanage variousidentitynumbers. EditNotes stores allof your sensitiveIDs in a verysecure way andlets you easilyuse them whileyou are online.

Lets youstore andmanagesensitiveinformation

In EditNotes, youcan includeinformationsuch asSocialSecuritynumber,driverlicensenumber,insurancepolicynumber, andlegal andfinancialinformation.

Edit Notes

About Task Scheduling settingsThe Task Scheduling settings let you specify the tasksthat Norton 360 should run automatically when yourcomputer is idle. They also help you to schedule youractivities that are related to security, performance, andbackup.

Customizing settingsAbout Task Scheduling settings

554

Page 555: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Task Scheduling includes the following settings:

Lets you specify the tasks thatshould run in the backgroundautomatically when yourcomputer is idle

These automatic tasks includeactivities that are related to PCSecurity and PC Tuneup.

Your options are:1 InternetExplorer Temporary

Files1 Windows Temporary Files

1 Internet Explorer History

1 Disk Optimization

1 Registry Cleanup

Automatic Tasks

555Customizing settingsAbout Task Scheduling settings

Page 556: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Scheduling

Customizing settingsAbout Task Scheduling settings

556

Page 557: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you schedule PC Securityand PC Tuneup related activities

You can specify how oftenNorton 360 should scan yoursystem for security andperformance issues and when itshould perform backups.

You have the following optionsfor scheduling custom PCSecurity and PC Tuneupactivities:1 Automatic (Recommended)

This option is therecommendedoption.Norton360 detects the time your PCis idle and then automaticallyruns the tasks.

1 Weekly

You can schedule to run yourtasks on a weekly basis. Youmust specify the day andtime. You can also specifythat the schedule must runonly when the PC is idle.

1 Monthly

You can schedule to run yourtasks on a monthly basis. Youmust specify the time andthe day of the month. Youcan also specify that theschedule must run only whenthe PC is idle.

1 Manual Schedule

You can run the tasksmanually.

Your computer's performance ismaximized if you schedule yourcritical operations to occur whenyour computer is idle. Norton360 identifies your computer as

557Customizing settingsAbout Task Scheduling settings

Page 558: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

idle when there is no detectablemouse or keyboard activity for aperiod that you specify as idletimeout duration. When youschedule your scans weekly ormonthly and check the Run onlyat idle time option, Norton 360scans your computer when it isidle. Symantec recommends youto check the Run only at idletime option to experience betterperformance of your computer.

You can use the Click here toschedule backup option tonavigate to the Manage BackupSets window. You can scheduleyour backup set in theWhen tab.

About Administrative SettingsYou can use Administrative Settings window toconfigure various important options of Norton 360.

You have the following options:

Lets you configure Norton 360to defragment your boot volumeor the local disk that containsthe boot volume when yourcomputer is idle.

When the option is turned on,Norton 360 automaticallyschedules the optimization afteryou install an application onyour computer. Optimizationspeeds up your computer’sperformance by defragmentingthe fragmented parts of the disk.

Idle Time Optimizer

Customizing settingsAbout Administrative Settings

558

Page 559: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you view how Norton 360has protected you for the past30 days.

This report includes theactivities that Norton 360performed to protect yourcomputer. You can turn on theMonthly Report option to letNorton 360 automaticallydisplay the Monthly Report oncein every 30 days.

Monthly Report

Lets you automatically downloadthe latest version of the Norton360.

You can easily upgrade to thelatest version of Norton 360when prompted. By default, thisoption is turned on. Symantecrecommends you to install thelatest product version as it mightcontain new features, and itensures better protectionagainst security threats.

w This feature may not workin some versions of Norton 360.

Automatic Download ofNew Version

559Customizing settingsAbout Administrative Settings

Page 560: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you specify the automaticconfiguration details, proxysettings, and the authenticationdetails to connect to theInternet.

Programs such as LiveUpdateand Norton Insight use thespecified proxy server settingsto connect to the Symantecserver over the Internet.LiveUpdate uses proxy settingsto retrieve updates. NortonInsight uses proxy settings toobtain specific informationabout the files such as trust levelor digital signature.

Network Proxy Settings

Customizing settingsAbout Administrative Settings

560

Page 561: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you submit selectedsecurity and application data toSymantec for analysis.

Norton Community Watchprotects you against newpotential risks. It collects theinformation about new securitythreats from your computer andsubmits the information toSymantec for analysis. Symantecassesses the data to identify thenew threats and resolves it.

The Detailed Error DataCollection option is availablewhen the Norton CommunityWatch option is turned on.

Detailed Error Data Collectionlets you allow or deny some ofthe detailed data submissions.These detailed data may varydepending on theNorton-specific errors andcomponents. You can use theAlways, Never and Ask Meoptions to configure thesubmissions.

NortonCommunityWatch

561Customizing settingsAbout Administrative Settings

Page 562: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you remotely view yourdevice’s security status and fixsome security issues by usingNorton Management, NortonOne, and Norton Studio. NortonStudio is an app that works onWindows 8.

When you turn on RemoteManagement, Norton 360publishes details such as yoursubscription status, securitystatus of your device, and otherdetails to the NortonManagement, Norton One, andNorton Studio app. These detailshelp you view and fix securityissues of your device. You canaccess these details by usingNorton Studio app in Windows8, or using Norton Managementand Norton One from anywhereto manage Norton 360 on yourdevice.

w By default, this feature isdisabled unless you register yourNorton 360 with your NortonAccount.

Remote Management

Lets you configure Norton 360to show or hide the notificationsthat appear whenNorton-specific automaticbackground tasks are run.

Norton Task Notification

Customizing settingsAbout Administrative Settings

562

Page 563: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Performance Monitoring

563Customizing settingsAbout Administrative Settings

Page 564: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you monitor theperformance of your computer.

When the PerformanceMonitoring option is turned on,Norton 360 monitors the CPUusage and memory usage of yourcomputer. It also records theimportant system activities thatyou performed over the periodof the last three months.

In addition, Norton 360 notifiesyou with performance alertswhen there is a high usage ofyour system resource by aprogram or process.

You have the following optionswhen the PerformanceMonitoring option is turned on:1 Performance Alerting

Lets you configure Norton360 to detect and notify youabout the increased usage ofyour computer resources byany program or process.

Norton 360 alerts you withthe information about theprogram name and theresources that the programuses. The Details & Settingslink in the notification alertlets you view additionaldetails about the resourceconsumption by the programin the File Insight window.

When this option is set toOn,Norton 360 notifies you withthe performance alerts andsaves the event in theSecurity History log. Whenthis option is set to LogOnly,

Customizing settingsAbout Administrative Settings

564

Page 565: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton 360 saves the eventin the Security History logbut does not alert you withthe notifications. You canalso turn off this option ifyou do not want to viewperformance alerts. Bydefault, this option is turnedon.

1 Resource Threshold Profilefor Alerting

Lets you configure theresource threshold profile fordisplaying performancealerts.

When the resourceconsumption of a programexceeds the definedthreshold limit, Norton 360notifies you with aperformance alert.

You can set your thresholdlevel to Low, Medium, orHigh. Medium is the defaultsetting.

565Customizing settingsAbout Administrative Settings

Page 566: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 UseLowResourceProfileOnBattery Power

Lets you configure Norton360 to change the resourcethreshold to low profile whenyour computer runs onbattery power.

It ensures betterperformance of yourcomputer on battery power.When this option is turnedoff, Norton 360 uses thethreshold level that you setin the Resource ThresholdProfile For Alerting option.By default, this option isturned on.

Customizing settingsAbout Administrative Settings

566

Page 567: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 High-Usage Alert for:2 CPU

When this option isturned on, Norton 360detects and notifies youabout the increasedusage of the CPUresource by any programor process. By default,this option is turned on.

2 Memory

When this option isturned on, Norton 360detects and notifies youabout the increasedusage of memory by anyprogram or process. Bydefault, this option isturned on.

2 Disk

When this option isturned on, Norton 360detects and notifies youabout the increasedusage of your disk by anyprogram or process. Bydefault, this option isturned off.

2 Handles

When this option isturned on, Norton 360detects and notifies youabout the increasedusage of handles by anyprogram or process. Ahandle is a pointer thatenables a program toaccess or identify aresource. By default, thisoption is turned off.

567Customizing settingsAbout Administrative Settings

Page 568: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

1 Program Exclusions

Lets you select specificprograms to exclude fromappearing in performancealerts.

You can use the Configureoption to list the programsfor which you do not want toget performance alerts.

Lets you save your battery powerby suspending a list ofbackground jobs when yourcomputer is on battery power.

By default, this option is turnedon.

Power Saving Mode

Customizing settingsAbout Administrative Settings

568

Page 569: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you secure the product andprotect it from unauthorizedchanges.

You have the following options:1 Non-Admins Access to

Settings

Lets you access andconfigure all the options inthe Settings window from anon-admin user account aswell

By default, this option isturned off. You need to log into your computer as anadministrator to turn on thisoption. You cannot accessthe Settings window if theSettings window is openedin some other user accounton your computer.

1 Norton Product TamperProtection

Lets you protect your Nortonproduct from an attack ormodification by unknown,suspicious, or threateningapplications

1 Settings PasswordProtection

Lets you protect Norton 360settings with a password. Itprotects the product settingsfrom unauthorized access

1 Product State Monitoring

Lets you monitor or ignorethe protection status ofAntivirus, Firewall, IdentityProtection, andMiscellaneous features ofNorton 360

Product Security

569Customizing settingsAbout Administrative Settings

Page 570: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Silent Mode Settings

Customizing settingsAbout Administrative Settings

570

Page 571: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you turn on or turn offSilent Mode.

You have the following options:1 Silent Mode

When you turn on the SilentMode option, you enableSilent Mode for a specifiedduration. Norton 360suppresses all alerts andsuspends the backgroundactivities for the durationthat you specify.

1 Full Screen Detection

When you turn on the FullScreen Detection option,Norton 360 automaticallydetects the applications thatyou run in full-screen modeand enables Silent Mode.Norton 360 suppresses mostof the alerts and suspendsthe background activities.The only activities that runare those that protect yourcomputer from viruses andother security threats.

1 QuietModeonDetection of:2 IMAPI 2.0 Disk Burn

When you use a MediaCenter application toburn a CD or DVD, Norton360 detects the activity,and automatically turnson Quiet Mode. WhenQuiet Mode is turned on,Norton 360 suppressesthe background activitiesbut continues to displayalerts and notifications.

2 Media Center TVRecording

571Customizing settingsAbout Administrative Settings

Page 572: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

When you use a MediaCenter application torecord a TV program,Norton 360 detects theactivity, andautomatically turns onQuiet Mode. When QuietMode is turned on,Norton 360 suppressesthe background activitiesbut continues to displayalerts and notifications.

2 User-SpecifiedPrograms

When you run anapplication that is listedin the User-SpecifiedPrograms list, Norton360 detects the activity,and automatically turnson Quiet Mode. WhenQuiet Mode is turned on,Norton 360 suppressesthe background activitiesbut continues to displayalerts and notifications.

You can configure the listof programs for whichyou want to turn on QuietMode.

Lets you configure Norton 360to notify you about special offerson the latest Norton products,add-ons, and other usefulinformation from Symantec.

Special OfferNotification

Customizing settingsAbout Administrative Settings

572

Page 573: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets you delay the automaticrunning of Norton-specificbackground tasks when youresume your computer fromhibernate mode or standbymode.

Automatic ResumeDelayFrom Sleep orHibernation

Lets you specify duration forrunning Norton-specificprograms on your computer thatrun automatically when you turnon your computer.

It does not delay Norton 360protection. You can specifyAutomatic Tasks Delay durationfor a period of 1 minute to 20minutes. The default duration is20 minutes.

Automatic Tasks Delay

Lets you specify the Idle Timeoutduration after Norton 360identifies your computer as idle.

You can specify Idle Timeout fora period of 1 minute to 30minutes. The default duration is10 minutes.

Idle Time Out

573Customizing settingsAbout Administrative Settings

Page 574: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Lets your PC run smoothly andefficiently by deleting theunused temporary files andbrowsing history if you useFirefox Web browser.

Norton 360 automatically cleansup Internet Explorer temporaryfiles, history, and bookmarks asa background activity.

You have the following options:1 Firefox Temporary File

Cleanup

Lets you clean up thetemporary files that getaccumulated when you visitWeb pages in the Firefox Webbrowser.

1 Firefox History Cleanup

Lets you clean up the historyand bookmarks that getaccumulated when you visitWeb pages on the FirefoxWeb browser.

Firefox Cleanup

About Norton Product Tamper ProtectionNorton Product Tamper Protection prevents outsideprograms from making changes to the Norton product.This security feature also prevents Windows SystemRestore from changing Norton files, which results inthe Restoration Incomplete message.

Norton Product Tamper Protection protects Norton360 from an attack or modification by any virus orother unknown threat. You can protect your productfrom accidental modification or deletion by keepingthe NortonProductTamperProtection option turnedon.

Customizing settingsAbout Administrative Settings

574

Page 575: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

If you want to temporarily turn off Norton ProductTamper Protection, you can turn it off for a specifiedduration.

w You cannot run System Restore on your computer whenNortonProductTamperProtection is turned on. Youmust temporarily turn off Norton Product TamperProtection to run a successful System Restore.

Turning off or turning on Norton Product Tamper Protection

Norton Product Tamper Protection protects the Norton360 files from an attack or modification by any virusor other unknown threat. You can protect your productfrom accidental modification or deletion by keepingthe NortonProductTamperProtection option turnedon.

If you want to temporarily turn off Norton ProductTamper Protection, you can turn it off for a specifiedduration.

w You cannot run System Restore on your computer whenNortonProductTamperProtection is turned on. Youmust temporarily turn off Norton Product TamperProtection to run a successful System Restore.

To turn off Norton Product Tamper Protection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Product Security, in the Norton ProductTamper Protection row, move the On/Off switchto the right to the Off position.

4 Click Apply.

5 In the Security Request dialog box, in the Selectthe duration drop-down list, select how long youwant to turn off Norton Product Tamper Protection.

6 Click OK.

7 In the Settings window, click Close.

575Customizing settingsAbout Administrative Settings

Page 576: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To turn on Norton Product Tamper Protection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Product Security, in the Norton ProductTamper Protection row, move the On/Off switchto the left to the On position.

4 Click Apply, and then click Close.

About securing Norton 360 Settings using a passwordYou can configure Norton 360 to prevent unauthorizedaccess to your product settings. If you share yourcomputer with others and do not want them to modifyyour Norton 360 Settings, you can secure Norton 360Settings using a password. The Settings PasswordProtection option lets you secure your Norton 360Settings by setting up a password.

By default, Settings Password Protection option isturned off. You must turn on the Settings PasswordProtectionoption to set up a password for your productsettings. You can access the Settings PasswordProtection option under Product Security, in theAdministrativeSettings window. The password mustbe between 8 and 256 characters in length.

After you set up a password for Norton 360 Settings,you must enter the password each time to access orconfigure your product settings. If you forget yoursettings password, you can reset the password in thewindow that appears when you choose to uninstallNorton 360. You do not need to uninstall the productto reset your password. You can use the reset settingspassword option in the Select your UninstallPreference window to reset your password.

w The reset settings password option appears in theSelect your Uninstall Preference window only whenthe SettingsPasswordProtection option is turned on.

Customizing settingsAbout Administrative Settings

576

Page 577: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

You can turn off the Settings Password Protectionoption if you no longer require password protectionfor your Norton 360 Settings.

Securing your Norton 360 Settings using a password

You can secure your Norton 360 Settings fromunauthorized access by setting up a password for yourproduct settings. The Settings Password Protectionoption in the AdministrativeSettings window lets yousecure your Norton 360 Settings using a password.

After you set up a password for Norton 360 settingsyou must enter the password each time to view orconfigure your product settings.

By default, the Settings Password Protection optionis turned off. You must turn on the SettingsPasswordProtection option to set up a password for your productsettings.

w The password must be between 8 and 256 charactersin length.

To secure your Norton 360 Settings using a password

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under ProductSecurity, in the SettingsPasswordProtection row, move the On/Off switch to the leftto the On position.

4 Do one of the following:

1 In the Settings Password Protection row, clickConfigure.

1 In the Settings window, click Apply.

5 In the dialog box that appears, in the Password box,type a password.

6 In the Confirm Password box, type the passwordagain.

7 Click OK.

8 In the Settings window, click Close.

577Customizing settingsAbout Administrative Settings

Page 578: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Turning off Norton 360 Settings password

You can protect your Norton 360 Settings with apassword using the Settings Password Protectionoption. If the Settings Password Protection option isturned on, you need to enter the Settings passwordeach time to view or configure your Norton 360settings. You cannot access the product settingswithout providing your Settings password.

w In case you forget your Settings password, you canreset it using the resetsettingspassword option in theSelect Uninstall Preference window.

You can turn off the Settings Password Protectionoption if you do not require password protection forNorton 360 settings.

To turn off Norton 360 Settings password

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the dialog box that appears, in the Password box,type your Settings password, and then click OK.

4 In the SettingsPasswordProtection row, move theOn/Off switch to the right to the Off position.

5 In the Settings window, under Product Security,in the SettingsPasswordProtection row, move theOn/Off switch to the right to the Off position.

6 Click Apply, and then click Close.

Resetting your Norton 360 Settings password

If you forget your Norton 360 Settings password, youcan reset the password. You can reset your Norton 360Settings password using the reset settings passwordoption in the Select Uninstall Preference window.

To access the SelectUninstallPreference window, youmust choose to uninstall Norton 360. However, youneed not uninstall the product to reset your Settingspassword.

Customizing settingsAbout Administrative Settings

578

Page 579: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

w The reset settings password option appears in theSelect Uninstall Preference window only if theSettings Password Protection option is turned on. Touse the SettingsPasswordProtection option, go to theNorton 360 main window, and then click Settings>General >Product Security.

To reset your Norton 360 Settings password

1 On the Windows taskbar, do one of the following:

1 In Windows XP, Windows Vista, or Windows 7,click Start > Control Panel.

1 In Windows 8, on the Apps screen, underWindows System, click Control Panel.

2 In WindowsControlPanel, do one of the following:

1 In Windows XP, double-click Add or RemovePrograms.

1 In Windows Vista, click ProgramsandFeatures.

1 In Windows 7 or Windows 8, click Programs >Programs and Features.

The Programs option in Windows 7 or Windows8 is available when you select the Categoryoption in the View by drop-down list.

3 In the list of currently installed programs, do oneof the following:

1 In Windows XP, click Norton360, and then clickChange/Remove.

1 In Windows Vista, Windows 7, or Windows 8,click Norton 360, and then clickUninstall/Change.

4 At the bottom of the Select Your UninstallPreference window, click reset settingspassword.

5 In the dialog box that appears, in the ResetPassword Key box, type the randomly generatedkey that is displayed against Reset Password Key.

6 In the New Password box, type the new password.

7 In the Confirm New Password box, type the newpassword again.

8 Click OK.

579Customizing settingsAbout Administrative Settings

Page 580: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

About Remote ManagementThe Remote Management feature lets you remotelymanage Norton 360 using Norton Studio app, NortonManagement, and Norton One. It allows Norton 360 tosend the product-related details to NortonManagement, Norton One, and Norton Studio app. Thedetails that Remote Management publishes help youview and fix some security issues of the device.

w By default, this feature is disabled unless you registeryour Norton 360 with your Norton Account.

Norton Studio is a Metro App and works only onWindows 8. But, you can view the security status andfix security issues of your devices running earlierversions of Windows from Norton Studio app. In thiscase, you must turn on the RemoteManagement optionin your Norton product that is installed on your devices.For example, you have a Norton Studio app and Norton360 installed on your laptop running Windows 8. Youalso have Norton Internet Security and NortonAntiVirus installed on your desktops running WindowsXP and Vista, respectively. In this case, you can viewthe security status of all three devices in the NortonStudio app. If any of the device is at risk, you can alsofix them from the Norton Studio app.

To use the Remote Management feature, you need toregister your Norton 360 with your Norton Account.Your device needs to be connected to the Internet touse Remote Management feature. When the RemoteManagement option is turned on, Norton 360 publishesdetails such as your Norton 360 subscription status,current security state of your device, and other detailsto the Norton Management, Norton One, and NortonStudio app. You can access your Norton Studio app inWindows 8, or Norton Management and Norton Onefrom anywhere to view your Norton 360 details andresolve any security issue. When this option is turnedoff, Norton 360 does not publish any of its details inthe Norton Management, Norton One, and NortonStudio app.

Customizing settingsAbout Administrative Settings

580

Page 581: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

By default, the Remote Management option is turnedoff. You can turn on this option if you want to remotelymanage Norton 360 on your device.

In the Norton Management, Norton One, and NortonStudio app, you can do the following:

1 View the security statistics of Norton 360 for thelast 30 days (only in Norton Studio app)

w The activities that are displayed in Norton Studioapp may vary depending on the latest version ofNorton product that is installed on your devices.

2 Blocked malicious software

2 Blocked intrusions

2 Blocked spam messages

2 Blocked phishing Web sites

2 Blocked Safe Web sites

2 Quarantined items

2 Blocked Firewall threats

2 Total number of known threats

2 Total number of known attacks

2 Total number of known antiphishing sites

2 Timestamp of last full scan

2 Timestamp of last Quick Scan

2 Timestamp when stats were published

1 View health states of different components of yourdevice

2 Overall product health

2 Computer category health

2 Network category health

2 Web category health

2 Backup category health

2 PC Tuneup category health

1 Fix the following items:

2 Firewall

581Customizing settingsAbout Administrative Settings

Page 582: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

2 Auto-Protect

2 Scan incoming emails

2 Scan outgoing emails

2 Antispyware

2 Intrusion Prevention

2 SONAR

2 Antiphishing

2 Browser Protection

1 Perform the following tasks:

2 Resolve issues

2 Re-key Norton 360

2 Re-sync license

2 Run LiveUpdate

Turning on or turning off Remote Management

Remote management lets you remotely manage Norton360 using Norton Management, Norton One, andNorton Studio app. Norton Studio is a Metro App andworks only on Windows 8. When you turn on RemoteManagement option, you can view your Norton 360details and fix some security issues of your device.

By default, this feature is disabled unless you registeryour Norton 360 with your Norton Account.

When the Remote Management option is turned on,Norton 360 sends details related to your Nortonproduct to Norton Management, Norton One, andNorton Studio app. When this option is turned off,Norton 360 does not publish any of its details in theNorton Management, Norton One, and Norton Studioapp.

By default, the Remote Management option is turnedoff.

In some cases, you are prompted to enter your NortonAccount password when turning on RemoteManagement option.

Customizing settingsAbout Administrative Settings

582

Page 583: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To turn on Remote Management

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Remote Management row, move the On/Offswitch to the left to the On position.

4 Click Apply, and then click Close.

To turn off Remote Management

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Remote Management row, move the On/Offswitch to the right to the Off position.

4 Click Apply, and then click Close.

583Customizing settingsAbout Administrative Settings

Page 584: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Customizing settingsAbout Administrative Settings

584

Page 585: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

This chapter includes the following topics:

1 Finding the version number of your product

1 Finding the End-User License Agreement

1 About upgrading your product

1 About Norton Autofix

1 Staying informed about protection issues

1 About Support

1 Uninstalling Norton 360

Finding the version number of your productIf you want to upgrade your Norton product or wantto reach the customer support for assistance, you mustknow your product version number. You can find theversion number of your product on your computer.

To find the version number of your product

1 In the Norton 360 main window, click Support.

2 In the Support drop-down menu, click About.You can note the version number of your productin the window that appears.

14Finding additionalsolutions

Page 586: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Finding the End-User License AgreementEnd-User License Agreement (EULA) is a legaldocument that you agree to while installing theproduct. EULA contains information such as therestriction on sharing or usage of the software, theuser rights on the software, and the supportinformation.

You can read the EULA to learn more about thefollowing information:

1 The usage policies of Norton 360.

1 The terms and conditions for using Norton 360.

To find the End-User License Agreement

1 In Windows Explorer, double-click the drive whereNorton 360 is located.

2 Double-click Program Files > Norton 360 > MUI >version > 09 > 01.Where version represents the version number ofinstalled Norton 360.

3 Do one of the following:

1 If you are a North American user, double-clickEULA_NorthAmerica.htm.

1 If you are an International user, double-clickEULA_ International.htm.

About upgrading your productNorton 360 helps you upgrade your product if you havean active subscription. You can upgrade your currentproduct to the latest version without any cost as longas you have an active subscription with the currentproduct. If a new version of your product is available,Norton 360 lets you download the new version.

The Automatic Download of New Version optionautomatically downloads the latest available versionof Norton 360 and prompts you for free installation.To get the latest version of Norton 360, you need to

Finding additional solutionsFinding the End-User License Agreement

586

Page 587: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

turn on the Automatic Download of New Versionoption. To turn on the Automatic Download of NewVersion option, go the Norton 360 main window, andthen click Settings > Administrative Settings >Automatic Download of New Version > On.

If you choose to install the latest version of the product,Norton 360 downloads and seamlessly installs the latestversion. Ensure that you have saved all your importantdata such as pictures and financial records before youinstall the new version of the product.

If you download and install the latest version of yourproduct, your subscription status remains the same asyour previous version of product. For example, youhave 200 days of subscription left with your currentversion of product and you upgrade your product tothe latest version. In this case, the subscription statusof your upgraded product remains 200 days only.

If a new version is not available, the Web page informsyou that no new version is available and your productis up to date. Symantec recommends that you have thelatest version of the product, as it contains new andenhanced features for better protection against securitythreats.

Product upgrade is different from the program updatesand the definition updates that are minorimprovements to your installed product. The maindifferences are as follows:

1 Product upgrade lets you download and install anew version of the entire product.

1 Definition updates are the files that keep yourSymantec products up to date with the latestantithreat technology.

1 Program updates are enhancements to Norton 360that Symantec issues periodically.

If a new version of the product is not available, ensurethat you have all the latest program updates anddefinition updates. LiveUpdate automates the processof obtaining and installing program and definition

587Finding additional solutionsAbout upgrading your product

Page 588: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

updates. You can use LiveUpdate to obtain the latestupdates.

The upgrade process might not work if your Webbrowser is incompatible to communicate with theSymantec servers.

w Your product must be activated and you need anInternet connection to check and install new productversion.

Checking for a new version of the productYou can upgrade your product to the latest version ifyou have an active subscription. If you have a newversion available, you can download and install thenew version of your product. You can also let Norton360 notify you when a new version of your product isavailable. You can do so by turning on the AutomaticDownload of New Version option in theAdministrative Settings window. The latest versionof your product may contain new and enhancedfeatures for better protection against security threats.

When you check for a new version, details about yourproduct such as product name and version are sent toSymantec servers. The servers then check whether anew version of the specified product is available or not.

If a new version is available, you can download andinstall it from the Web page. If a new version is notavailable, the Web page informs you about it. In suchcase, you can run LiveUpdate to obtain latest programand definition updates and keep the existing versionof your product up to date.

The upgrade process might not work if your Webbrowser is incompatible to communicate with theSymantec servers. You can use Internet Explorerversion 6.0 or later, Chrome version 10.0 or later, andFirefox version 3.6 or later.

w Your product must be activated and you need anInternet connection to check if a new version isavailable and install new version of the product.

Finding additional solutionsAbout upgrading your product

588

Page 589: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To check for a new version of the product

1 In the Norton 360 main window, click Support.

2 In the Support drop-down menu, click Check forNew Version.This option is available only if your product isactivated. The Web page that appears displayswhether a new version of the product is availableor not.

3 Follow the on-screen instructions to download thenew product.

About Norton AutofixNorton Autofix provides additional product supportwith one-click access from the Norton 360 mainwindow. Norton Autofix performs a Quick Scan of yourcomputer and repairs problems without yourintervention. If the problem persists, you can use theOpen Support Web Site option to go to the NortonSupport Web site for help using our online forum, chat,email, or telephone.

In addition, the Norton Support Web site providesaccess to the knowledge base articles. By using thesearticles, you can easily find solutions to your technicalproblems.

The support technicians can help you solve morecomplex problems by using remote-assistancetechnology. The remote-assistance technology allowsSymantec support technicians to access your computeras remote users so that they can perform maintenanceor service.

w Support offerings can vary based on the language orproduct.

When you click the GetSupport option in the Supportdrop-down menu, Norton 360 checks your Internetconnection. To access Norton Autofix, ensure that yourcomputer is connected to the Internet. If you use aproxy server to connect to the Internet, you must

589Finding additional solutionsAbout Norton Autofix

Page 590: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

configure the proxy settings of Norton 360. See“Configuring Network Proxy Settings” on page 67.

If you do not know your proxy settings, contact yourInternet service provider or network administrator forassistance.

Solving a problem using Norton AutofixNorton Autofix performs a Quick Scan of yourcomputer and repairs problems without yourintervention. If a problem persists, you can use theNorton Support Web site for additional online supportand contact options.

Your computer must be connected to the Internet toaccess Norton Autofix. If you use a proxy server toconnect to the Internet, you must configure the proxysettings of Norton 360.

w If you do not want to proceed with the support session,you can use the Cancel option to bypass the scan.

To solve a problem if your computer is connected to theInternet

1 In the Norton 360 main window, click Support.

2 In the Support drop-down menu, click GetSupport.

3 In the Norton Autofix window, do one of thefollowing:

1 If the problem is not fixed automatically, clickOpen Support Web Site, and follow theon-screen instructions to find additional support.

1 If the problem is fixed, click Close.

To solve a problem if your computer is unable to connectto the Internet

1 In the Norton 360 main window, click Support.

2 In the Support drop-down menu, click GetSupport.

3 Follow the on-screen instructions in the CheckingYourConnection window to attempt to correct yourconnection issue.

Finding additional solutionsAbout Norton Autofix

590

Page 591: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

4 In the Checking Your Connection window, clickRetry.

5 If you use a proxy server to connect to the Internet,you may be prompted to authenticate. If you areprompted, then in the Proxy Settings Detectedwindow, do the following:

1 In the Username box, type the user name thatyou provided when you configured your NetworkProxy settings.

1 In the Password box, type the password that youprovided when you configured your NetworkProxy settings.

1 Click OK.

6 If the problem still persists, in the Norton Autofixwindow, click the click here link.Under SupportContactNumbers, select the region,and then your country to view the contact details.You can use the contact details to contact thetechnical support team.

Staying informed about protection issuesIf you need help using Norton 360, you can find helpfulinformation on the Symantec Web site. It containsmany useful and informative features that areespecially designed to complement Norton 360,including the following:

1 Detailed background information about currentthreats and outbreaks.

1 Newsletter to which you can subscribe.

1 Protection blog that lets you post your owncomments and view comments from experts.

w The Symantec Web site is constantly updated andenhanced, so the available resources may vary.

591Finding additional solutionsStaying informed about protection issues

Page 592: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To stay informed about protection issues

1 Open your Web browser, and go to the followingURL:http://www.symantec.com

2 In the Symantec Web site, click Norton.

3 In the menu bar that appears, do the following:

1 Click the Viruses&Risks tab, and then click anyitem on the left pane to find out more detailsabout it.

1 Click the Community tab, and then use one ofthe following:

Register as a user andparticipate in discussions.

You can create your own threadsof topics or take help from theexisting forum discussions.

Norton Forums

Read the messages thatprominent leaders post frominside and outside Symantec andobtain information straight fromthe source.

You can add comments or askquestions on the blogs that youare interested in.

Norton Blogs

Check about Norton in otherWeb sites and social networksthat are available.

Other NortonCommunities

About SupportIf you have purchased Norton 360, you can accessSupport from the product.

Finding additional solutionsAbout Support

592

Page 593: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

w Support offerings may vary based on the language orproduct.

About Norton Support Web siteThe Norton Support Web site provides a full range ofself-help options.

By using Norton Support Web site, you can do thefollowing:

1 Find help with your product download, productsubscription, product activation, productinstallation, and other issues.

1 Find and download the latest product manual.

1 Manage your products and services using NortonAccount.

1 Search Norton Forum to find the additional producthelp about installing, configuring, andtroubleshooting errors. You can also post yourquestions in the forum and get answers fromexperts. To post your questions, you need to firstregister for Norton Forum.

1 Find information about the latest virus threats andremoval tools.

w Availability of support varies by region, language, orproduct. For additional support, go to the followingURL:

http://www.norton.com/support

In addition to the self-help options, you can use theContact Us option at the bottom of the Web page to

593Finding additional solutionsAbout Support

Page 594: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

contact the technical support team in the followingways:

Chat in real time with asupport representative.

For more complex technicalissues, chat offers the optionto allow a supportrepresentative to connectremotely to your computerand resolve your problem.

Live Chat

Submit your question on ourWeb site and receive aresponse by email.

Email support has a slowerresponse time than chat orphone.

Email

Speak to a supportrepresentative in real time.

Phone

Search for additional producthelp about installing,configuring, andtroubleshooting errors.

Norton Forums

Using the Norton Support Web site

Norton Support Web site contains answers to the mostcommon customer questions. You can find the latestproduct manual, knowledge base articles, and virusremoval tools.

Norton Support Web site contains problem-solvingarticles that are presented in an easy step-by-stepformat. The articles are categorized and listed on theleft side of the Web page. Using the categories, you canbrowse through the available support topics. You can

Finding additional solutionsAbout Support

594

Page 595: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

also use the SearchSupport box to find solution usinga keyword.

Norton Support Web site also contains useful links tothe product manual, the Norton Account, the NortonForum, and the spyware help under AdditionalResources.

To use the Norton Support Web site

1 In the Norton 360 main window, click Support.

2 In the Support drop-down menu, click GetSupport.

3 Follow the on-screen instructions.

4 In the NortonAutofix window, click OpenSupportWeb Site.The Norton Support Web page appears.

5 Follow the on-screen instructions.

About phone supportNorton Autofix offers a range of technical support andcustomer service options. When you click the GetSupport option in the Support drop-down menu,Norton Autofix performs a Quick Scan and repairsproblems without your intervention.

If the problem persists, and you have an active Internetconnection, you can use the Open Support Web Siteoption in the NortonAutofix window. This option takesyou to the Norton Support Web site for additionalonline support and contact details.

You get the click here option in the Norton Autofixwindow, only when you have a problem connecting tothe Internet. You can use the click here link to get thephone number to contact a support representative.

w Support offerings may vary based on the language orproduct.

If you cannot access phone support by using NortonAutofix, then you can access the phone support optionsat the following URL:

http://www.norton.com/support

595Finding additional solutionsAbout Support

Page 596: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Getting support by phone

When you click the GetSupport option in the Supportdrop-down menu, Norton Autofix performs a QuickScan and should repair your computer problems.However, if the problem persists, you can use the OpenSupport Web Site option to go to the Norton SupportWeb site for help by telephone, email, chat, or forum.

If you have a problem connecting to the Internet, youget the clickhere option in the NortonAutofix window.You can use the clickhere link to get the phone numberto contact a support representative.

w Availability of support varies by region. Regulartelephone and Internet connection fees apply in certaincountries.

To get support by phone if your computer is unable toconnect to the Internet

1 In the Norton 360 main window, click Support.

2 In the Support drop-down menu, click GetSupport.

3 Follow the on-screen instructions.

4 In the Norton Autofix window, click the click herelink.

5 In the Norton Autofix window, under SupportContact Numbers, select the region, and then thelocation.You can use the phone number to contact a supportrepresentative.

To get support by phone if your computer is connectedto the Internet

1 In the Norton 360 main window, click Support.

2 In the Support drop-down menu, click GetSupport.

3 After Norton Autofix scans, click the OpenSupportWeb Site link.The Norton Support Web page appears.

4 Click the Contact Us option at the bottom of theWeb page and follow the on-screen instructions.

Finding additional solutionsAbout Support

596

Page 597: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Support policySymantec recommends that you have the latest versionof the product, as it contains new and enhancedfeatures for better protection against security threats.Current help and support for your Norton product canbe found at the following URL:

www.norton.com/support

Symantec reserves the right to change its supportpolicies at any time without notice. You can view thelatest version of the support policy at the followingURL:

www.symantec.com/supportpolicy

About keeping your subscription currentSubscription period lengths vary by Symantec product.To maintain uninterrupted protection, you must keepyour subscription up to date. If you do not renew yoursubscription, you cannot obtain updates of any kindand the software no longer functions.

When you run LiveUpdate near the end of yoursubscription period, you are prompted to subscribe fora nominal charge. Follow the on-screen instructionsto renew your subscription.

When you renew your subscription, the definitionupdates and new product features are availablethroughout the subscription period. Please note thatfeatures may be added, modified, or removed duringthis period.

Worldwide service and supportWorldwide service and support solutions vary bycountry. To contact one of our Support offices, pleasego to the following Web site and select your language.

www.norton.com/support

597Finding additional solutionsAbout Support

Page 598: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

If you are a Norton One Premium Member, go to thefollowing Norton One support Web site for informationon this topic:

https://one.norton.com/support

ClubNortonClubNorton is your one-stop resource center forInternet security. As a Norton customer, Symantecwants to make your experience with your computersafe, enjoyable, and productive. Whether you use yourcomputer to manage your personal finances, shoponline, or share your latest digital photos with friendsand family, ClubNorton makes your experience a goodone. Our goal is to consistently provide the proper toolsand information to keep you up to date.

For more information, go to the following URL andselect your country or region in the Select YourCountry/Region drop-down menu:

www.clubnorton.com

The ClubNorton Web page includes a regularly updatedarticle library, a glossary, the Norton Forums, and theNorton Update Center. You can also find the followinguseful links in the Web page:

1 Symantec Security Check

1 Subscription Troubleshooter

1 Home & Home Office Security

1 Product Manuals

1 Product Updates

1 Product Reviews

1 Order Status

1 Returns

1 Rebates

Finding additional solutionsAbout Support

598

Page 599: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Uninstalling Norton 360You can remove Norton 360 from your computer in thefollowing ways:

1 From Windows Control Panel

1 From the Start menu

w You should print out the Uninstalling Norton 360 Helptopic before continuing with the uninstallation. Youcannot access online Help during uninstallation.

If you want to reinstall Norton 360 on your computer,you must uninstall Norton 360 from your computer.You can reinstall the product using the installation filethat you downloaded from Symantec Web site or fromthe product disc. To reinstall Norton 360, follow theinstallation procedures that are available in the userguide.

During uninstallation, Norton 360 offers to leave theNorton Toolbar for free to search and browse safelyover the Internet even after the product is uninstalled.You can choose to keep the Norton Toolbar thatcomprises Norton Safe Search and Norton Safe Webfeatures without any cost. Norton Safe Search providessite safety status and Norton rating for each of thesearch results generated. Norton Safe Web analysesthe security levels of the Web sites you visit andindicates if the Web sites are free from threats.

w Your computer must be connected to the Internet toavail this option. Norton 360 does not offer to leavethe Norton Toolbar if you upgrade your product to thelatest version or choose to reinstall another Nortonproduct. In addition, the Norton Toolbar installationis available only if the operating system of yourcomputer is English.

599Finding additional solutionsUninstalling Norton 360

Page 600: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

To uninstall Norton 360 from Windows Control Panel

1 Do one of the following:

1 On the Windows Taskbar, click Start > ControlPanel.

1 In Windows 8, go to Apps, and under WindowsSystem, Click Control Panel

2 In Windows ControlPanel, do one of the following:

1 In Windows XP, click AddorRemovePrograms.

1 In Windows Vista, click ProgramsandFeatures.

1 In Windows 7 or Windows 8, click Programs >Programs and Features.

The Programs option in Windows 7 andWindows 8 is available when you select theCategory option in the View by drop-down list.

3 In the list of currently installed programs, do oneof the following:

1 In Windows XP, click Norton360, and then clickChange/Remove.

1 In Windows Vista, Windows 7, or Windows 8,click Norton 360, and then clickUninstall/Change.

4 In the page that appears, under Select YourUninstall Preference, click one of the following:

Lets you retain your settings,passwords, and preferences forNorton features before youuninstall Norton 360

Select this option if you want toreinstall Norton 360 or anotherNorton product.

I plan to reinstall aNorton product. Pleaseleavemy settings behind.

Lets you completely removeNorton 360 without saving yoursettings, passwords, andpreferences

Please remove all userdata.

Finding additional solutionsUninstalling Norton 360

600

Page 601: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

5 To uninstall Norton 360, click Next.

6 If Norton 360 offers to install the Norton Toolbarafter uninstall, do one of the following:

1 To keep the Norton Toolbar after uninstall, clickAgree & Install.

1 To uninstall Norton 360 without keeping theNorton Toolbar, click Skip.

7 Do one of the following:

1 Click Restart Now (recommended) to restartyour computer.

1 Click Restart Later to restart your computerlater.

Norton 360 is not fully uninstalled until you restartyour computer.

To uninstall Norton 360 from the Start menu

1 Do one of the following:

1 On the Windows taskbar, click Start > AllPrograms>Norton360>UninstallNorton360.

1 In Windows 8, go to Start screen and then clickUninstall Norton 360

2 In the page that appears, under Select YourUninstall Preference, click one of the following:

Lets you retain your settings,passwords, and preferences forNorton features before youuninstall Norton 360

Select this option if you want toreinstall Norton 360 or anotherNorton product.

I plan to reinstall aNorton product. Pleaseleavemy settings behind.

Lets you completely removeNorton 360 without saving yoursettings, passwords, andpreferences

Please remove all userdata.

601Finding additional solutionsUninstalling Norton 360

Page 602: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

3 To uninstall Norton 360, click Next.

4 If Norton 360 offers to install the Norton Toolbarafter uninstall, do one of the following:

1 To keep the Norton Toolbar after uninstall, clickAgree & Install.

1 To uninstall Norton 360 without keeping theNorton Toolbar, click Skip.

5 Do one of the following:

1 Click Restart Now (recommended) to restartyour computer.

1 Click Restart Later to restart your computerlater.

Norton 360 is not fully uninstalled until you restartyour computer.

Finding additional solutionsUninstalling Norton 360

602

Page 603: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Aabout customer support 593Actions window

deleting security risks 139performing actions 139restoring security risks 139submission, items to

Symantec 139activation 19

about 18Norton Account 23online backups 490problems 22troubleshooting 22

Add Rule Wizardopening 263using 263

Address Book Exclusionssetting 310

addressesadding allowed 311adding blocked 313importing allowed 311settings 541

Administrative Settingsabout 558

Advanced Modeallow an event 200

adwarefound by Auto-Protect 229

adware protection settings 504Aggressive

SONAR Protection 200alerts 237

responding to 257Allowed List 311Antiphishing

about 326hiding the toolbar 388showing the toolbar 388turning off 327turning on 327

AntiSpamabout 303Address Book Exclusions 310Allowed List 311Blocked List 313Client Integration 306configure 539Feedback 315settings 539Web Query 316

antivirus settings 504Application Ratings

check trust level 110Scan Performance Profiles 112

attack signatures 285attacks

network 252

Index

Page 604: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

attentioninfected files 234infected items 172resolve any items 172

Attention Requiredabout 172resolving the risk 172

Auto-Protectnotifications 229

Automatic LiveUpdateturning off or turning on 59

Automatic Program Controlabout 257

automatic tasks 243automatic updates 53Autorun Restore

about 477restoring 478

Bbackground jobs

about 94monitoring 100

backup 245, 435additional help 486backup file categories 444Backup Set 441categories 117file extensions 450file selection 456file types 444Identity Safe data 375locations 459Norton Backup Drive 479preparation 437problem solving 483restoring 470, 473restoring selected files 474scheduling 467settings 494, 546supported media 459

backup (continued)turning off or turning on 492

Backup and Restoreabout 375schedules 248

backup file categoriesadding or editing file

extensions 451removing file extensions 453resetting file extensions 453

backup filesdeleting 454

Backup Setabout 441adding files and folders 456creating 442deleting 468excluding files and folders 457modifying 443renaming 443

Backup Settingsabout 546turning off and turning on 494

backupsabout 436locations 465online 487online storage space 491restore destinations 476running 469

Bandwidthdefining usage 322managing 320

Blocked List 313blocking

spam 303Boot Time Protection 221

configure 222boot viruses 241browser cache files 428

Index604

Page 605: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Browser Protectionturning on and turning off 290

Browsingoptions 378

Browsing Optionsabout 378

Ccache files 428Cards

about 368adding 370deleting 371duplicating 371update image 370updating 371

categories in Norton 360viewing details 72

CDs for backups 483changing

scan schedules 182cleaning up disks 425, 429cleanups

in Tuneup 425Client Integration

configuring 306cloud technology

Cloud 182ClubNorton

security tips 598communication port

modifying 423Computer

protecting 120computers

blocking with AutoBlock 288IP address 410

configureIdentity Safe 353

connections 120cookies protection settings 504

CPU graphabout 88obtaining historical data 90resource-consuming

processes 90CPU usage

viewing 89Creating custom scans

adding files 173adding folders 173

custom scanconfigure scan options 175select items 174

custom scansabout 173creating 173deleting 177editing 176particular area 173running a custom scan 176scan frequently 173schedule the custom scan 173scheduling 178, 182

customer supportabout 593using 594

customizingAllowed List 311Blocked list 313

Ddefinition status 61definition updates 55

obtaining 64definitions

virus and spyware 60deleting

custom scans 177deleting custom scans

deleting 177details links 72

605Index

Page 606: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

detectingsecurity risks 228

deviceadding 408editing details 411excluding from Intrusion

Prevention scan 418purging from exclusion list 292remotely monitoring 400removing from the Network

Security Map 420viewing 400

deviceschanging trust level 413

Diagnostic Reportrunning 430

dialers protection settings 504disk optimization 245, 426disks

cleaning up 428fragmentation 426optimizing 426

domainsadding allowed 311adding blocked 313

Download Insightabout 293configuring alerts 299turning off notifications 298turning on notifications 298

Download Intelligenceturning off 297turning on 297

DVDs for backups 483

Eemail

menu 308program 308spam 303

error messages 237

EULAchecking 586

Events graphmonitoring activities 78

Ffeatures

email filtering 305Feedback

Norton AntiSpam 315file extensions

of infected files 234file infectors 241files

backing up 469fragmentation 426scanning 245selection, for backups 456

filterimporting allowed 311Web Query 316

filteringemail 539identifying email senders 311,

313SSL 303web-based 316

firewallgeneral settings 530, 534intrusion prevention 530program rules 530protection settings 276, 530removing programs 262traffic rules 530

firewall rulesabout 254adding 263changing the order of 274creating 257, 263default 255processing order 254, 274

Index606

Page 607: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

firewall rules (continued)removing 277turning on and off 275

Firewall settingsadding programs 259

foldersscanning 245

fragmentation 426Full Screen Detection

about 208Full System Scan 169

scheduling 180

GGeneral Rules

adding 263removing 277

Hhack tools protection settings 504high-risk security threats

excluding from scanning 202home network

settings 543

Iicons in Norton 360 70Identity Protection

categories 117Settings 550

Identity Safeabout 337accessing 351, 390backing up 376changing password 383configuring 353information 325logging in and out 352logins 359Norton toolbar 352

Identity Safe (continued)password 380restoring data 377security 380turning off 341turning on 341

Identity Safe Password & Securityoptions

about 380Identity Safe profiles

about 341creating 343

identity theftInternet 325

Idle Time Optimizerabout 93turning off 94turning on 94

Idle Time Outsetting 249

importlogins 349

Insight Networkabout 182cloud computing 182Insight Network scan 182Quick Scan 182scan 182shortcut menu scan 182Single File Scan 182

Insight Protectionturning off 184turning on 184

installationproblems 42, 49

integration with email clients 306integration with email

programs 308Internet

connection problems 120search Explorer history 245

607Index

Page 608: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Internet (continued)temporary files 245, 428

Intrusion AutoBlockblocking computers

permanently 289turning on and off 288unblocking computers 289

Intrusion Prevention 530, 535about 285exclusion list 291turning individual notifications

on and off 286turning notifications on and

off 286Intrusion Prevention scan

excluding a device 418exclusion list 291purging devices 292remove devices 292

IP addresses 410finding 410

itemssubmitting from

Quarantine 158

Jjoke programs protection

settings 504

LLiveUpdate 60

about 54Smart Definitions 57–58technology 53updating 244

locations for backup 459Login

adding manually 362changing password 367changing URL 365

Login (continued)changing user name 367configuring 353creating new folder 362deleting 362editing 362importing 349managing 362saving 361updating 368

low resource profile on batteryturning off 85turning on 85

Mmacro viruses 241main window

messages 118status colors 237status messages 237

malware 239Manage Logins

about 359Manage Notes

about 373Manual Repair

reviewing remaining risksin 234

Manual Repair windowreviewing remaining risks

in 170manual scan options 517Media Center Extender

Silent Mode 212Memory graph

about 88obtaining historical data 90

messages 118, 237Norton 360 237

Monthly Reportactivities 116

Index608

Page 609: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

multipartite viruses 241

NNetwork

changing trust level 413discovering devices 406editing details 413forming 406joining 406managing 399

Network Cost Awarenessabout 320defining bandwidth 322turning off 322turning on 322

network locations 530Network Proxy Settings

about 65configuring 67

Network Security Mapabout 399adding devices 408modifying communication

port 423purging 420removing devices 420turning off 408turning off Network Security

Overview 405turning on Network Security

Overview 405viewing device details 422viewing devices 400wireless network

viewing status 421Network Security Overview

turning off 405turning on 405

new versionchecking 588

newsletter 598

Norton 360about 7about securing 576Allowed and Blocked lists 305background jobs 94categories 117details 72EULA 586icons 70main window 8, 237new version 588password 577–578protecting 578registering 27securing 577shortcut menu 71status 68uninstalling 599upgrading 586version number 585

Norton 360 scanabout 163command line scanning 223Computer Scan 163custom scans 173Idle Time Scan 163Insight Network 182Insight Network scan 163Reputation Scan 163

Norton 360 settings 276resetting password 578

Norton Account 490about 23accessing 28changing password 29creating 27

Norton Account password 29Norton AntiSpam 303

about 303Address Book Exclusions 310configure 539

609Index

Page 610: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Norton AntiSpam (continued)Feedback 315settings 539SSL 303Web Query 316

Norton Autofixsupport assistants 589

Norton Backup and Restore 435Norton Backup Drive

about 479deleting files 482restoring files from a Backup

Set 481Norton Bootable Recovery Tool

about 39using 49

Norton Bootable Recovery ToolWizard

downloading 42Norton Community Watch

about 37joining 37turning off or turning on 39

Norton Firewall Diagnosisabout 278

Norton Insightabout 103Files of Interest 107refreshing trust level 107trusted files 103viewing processes 107

Norton LiveUpdateabout 54

Norton Product Tamper Protectionabout 574turning off 575turning on 575

Norton Safe Searchsearching Web 335

Norton Safe Webabout 329

Norton Safe Web (continued)turning off 334turning on 334

Norton Tasksabout 94

Norton toolbarabout 384accessing 390settings 351

Notesdeleting 374saving 374updating 374

notification area icon 118notifications

Auto-Protect 229Intrusion Prevention 286

OOffice documents

embedded objects 206scanning office documents 206turn on or turn off 207virus macros 206

One Click Supportusing 590

online backupsactivation 490considerations 487purchasing more storage 491

Online transactionsidentity theft 337

Optimizationabout 91and performance 427boot volume 92running 426

optimizing 425and fragmentation 426

OptionsClient Integration 306

Index610

Page 611: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Ppassword

changing 383editing 362Norton Account 29saving 361updating 368

PC securitycategories 117

PC Tuneupcategories 117disk cleanup 429disk optimization 426optimization 426Startup Manager 431

PC tuneup 428Performance

accessing 77alerts 81monitoring 89

performance alertsabout 81configure 82configure threshold 84excluding programs 86removing programs from

exclusion list 87turning off 82turning off low resource

profile 85turning on 82turning on low resource

profile 85performance improvement 426Personal data

backing up 376pop-up messages 237port scans 252problem solving 591problem solving backups 483

problemsproblems found during 234resolve any items 234solving 590

Product Key 21accessing 28

product passwordprotecting 577

product status 61program

patches 55Program Control

Automatic 257Program rules

adding 263removing 277

program updates 55programs

configuring Internet access 263creating firewall rules 263removing programs 262

programs, blocked 276protection

dates 60maintaining 118quick scan 168updates 53

protection featuresmonitoring 122

proxy serverconfiguring 67settings 65

Pulse Updatesabout 63using 64

QQuarantine

adding an item 156items, submitting for

analysis 158

611Index

Page 612: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Quarantine (continued)managing items 153opening 153removing items 157restoring items 156

Quarantined Items viewadding items 125

Quick Controlsturning on or turning off 503

Quick Scanrunning quick scan 168scheduling 181

Quiet Modeabout 208, 214disk burning 214options 217turning off 217turning on 217TV recording 214User-Specified Programs 218

RReal Time Exclusions

about 201Registry Cleanup 245, 430Remote Management

about 580turning off 582

Remote managementturning on 582

Remote Monitoringsetting up 406

repairactions 234infected files 234removable media 234system files 234

Reputation Scanabout 185results 191running Custom Scan 190

Reputation Scan (continued)running Full System Scan 189running Quick Scan 190

Respondingabout 120responding to emergencies 120

restore 435Autorun Restore 477–478choosing destinations 476Identity Safe data 375restoring backed-up files 470selecting Backup Set 473selecting files to restore 474

restoring itemsQuarantine 156

resultresolved risks 171

Results Summaryabout 171resolved risks 171total items scanned 171

risksintrusions 252malware 239port scans 252spyware 239vulnerabilities 239

ruleschanging 263creating 263

Running custom scansscanning required files 176scanning required folders 176

running Full System ScanReputation Scan 189

running Quick ScanReputation Scan 190

SSafe Surfing

about 325

Index612

Page 613: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Safe Webturning off 334turning on 334

scan at the command promptcommand line scanning 223

Scan Completeappearing after a scan 234

Scan Complete windowappearing after a scan 170

Scan Facebook Wallabout 197enabling 199

scannedtotal items scanned 171

scanningautomatically 178individual elements 170problems found during 234

Scanscommand line 223Computer Scan 166create a custom scan 173Custom Scan 166custom scan 245deleting custom scans 177file 170floppy disk 170folder 170Full System Scan 166, 169hard drive 170Insight Network 182manual 60Norton Bootable Recovery

Tool 49Quick Scan 166quick scan 168removable drive 170running custom scans 176using custom 173

scheduling 246backup and restore 248

scheduling (continued)backups 467custom scans 178scans 178tasks 554

scheduling custom scanmultiple schedules 178

scheduling custom scansscheduling Full System

Scan 178searching

Security History 151secure online storage 491Security History

about 122Actions window 139adding items to the

Quarantine 125full alert history 125importing or exporting 151manual scan results 125Quarantine 153Quick Search 151recent alert history 125searching 151security risks 125submission, items to

Symantec 125suspicious email 125viewing items 125viewing quarantined items 125

security risksadding to Quarantine 156attacks 252found by Auto-Protect 227, 229port scans 252removing from the

Quarantine 157restoring from Quarantine 156

security status 69self-healing 589

613Index

Page 614: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Settings 497Administrative Settings 558antivirus 504customizing 502firewall 276, 530, 534home network 543Identity Protection 550Quick Controls 503

settingsTask Scheduling 554

settings passwordresetting 578turning off 578

Settings Password Protectionabout 576configuring 577resetting 578turning off 578

shortcut menu 71Signature Exclusions

about 203Signature Ezclusions

excluding items 204signatures

including and excluding 287Silent Mode

about 208Full Screen Detection 212Media Center Extender 212turning off 210, 213turning on 210, 213turning on manually 210

Smart Definitionsabout 57turning on or turning off 58

Smart Firewallabout 251customizing 254

SONAR Protectionabout 200emerging threats 200

SONAR Protection (continued)heuristic technology 200SONAR Advanced Mode 200turning off 201turning on 201

spyware 239, 527found by Auto-Protect 229protection settings 504settings 511system scan 169

SSL (Secure Sockets Layer)Norton AntiSpam 303

startup files 228startup items

delaying and running 433disabling or enabling 432

Startup Managerabout 431delaying and running delayed

items 433disabling or enabling startup

items 432status 68–69submission, items to Symantec 158subscription

maintaining 597product updates 61

Supervisor user accountcreating firewall rules 257

SupportAutoFix Scan 590Self Help 592solving problems 590worldwide service 597

Support policy 597Symantec Security Response 158

viewing submitted files 125Symantec Support Web site

about 593using 594

Index614

Page 615: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Symantec Web siteblogs and forums 591

System Insightabout 75Events graph 75monitoring activities 78Performance graph 75

system status graphactivity details 80

TTask Scheduling

settings 554tasks

automatic 243technical support

about 593using 594

threatsnewly discovered 61protection from 251Trojan horses 240viruses 240worms 240

trackware protection settings 504Trojan horses 240Trust Control

Intrusion Prevention and 285trust level

changing 413device 413network 413

Tuneup 425

Uupdates 53

automatically 59manual 60obtaining 64Pulse Updates 63

updates (continued)summary 55

upgradingnew version 586

User-Specified Programsabout 218adding programs 219Quiet Mode 218removing programs 220

VVault

accessing 393version number

checking 585virus and spyware checks

scheduling 246virus and spyware settings 511virus definitions 60virus protection

system scan 169viruses 240

boot 241file infectors 241macro 241multipartite 241protection settings 504types 241

vulnerabilities 239Vulnerability Protection

about 159, 161viewing programs 160

WWeb pages

launching 365protection 326reporting 328

Web Queryabout 316

615Index

Page 616: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

Web Query (continued)turning off 317turning on 317

Web sitescache files 428

Windows temporary files 245wireless network

viewing status 421worms 240

Index616

Page 617: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution
Page 618: Product Manual - static.highspeedbackbone.netstatic.highspeedbackbone.net/pdf/Symantec Norton 360 2013 Manual… · Product Manual ... today’s fast and light all-in-one solution

foo

Norton from Symantec products protect consumers from traditional threats with antivirus, phishing protection, and spywareprotection. They also protect against bots, drive-by downloads, and identity theft, and are light on system resources. In addition,Symantec provides services such as online backup and PC Tuneup, and is a trusted source for family online safety. For moreinformation, please click one of the following links:

Antivirus | Phishing Protection | Spyware Protection | Online Backup

Copyright © 2012 Symantec Corporation. All rights reserved. Symantec, Norton, and the Norton Logo are trademarks or registeredtrademarks of Symantec Corporation and its affiliates in the U.S. and other countries. Other names may be trademarks of theirrespective owners.