Norton Security Main Window
Total Page:16
File Type:pdf, Size:1020Kb
Norton™ Security Product Manual Care for our Environment; ‘It's the right thing to do.’ Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual is made from recycled materials. Norton™ Security Product Manual The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 22.0 Copyright © 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, LiveUpdate, Norton 360, and Norton are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Portions of this product Copyright 1996-2011 Glyph & Cog, LLC. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. “Commercial Computer Software and Commercial Computer Software Documentation”, as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement. Symantec Corporation 350 Ellis Street, Mountain View, CA 94043 http://www.symantec.com Printed in the United States of America. 10 9 8 7 6 5 4 3 2 1 Contents Chapter 1 Getting started ....................................... 7 Activation protects you ................................ 7 About Norton Security main window .............. 11 Sign In to your Norton account ..................... 19 About Norton Bootable Recovery Tool ................................................ 20 Starting Norton Security from the command prompt ............................................ 31 Responding to security status indicators ......................................... 31 About Norton LiveUpdate ........................... 35 Configuring Network Proxy Settings .............. 41 Chapter 2 Monitoring your system's performance ................................... 43 About System Insight ................................ 43 30-Day Report ......................................... 70 Chapter 3 Protecting your files and data ................. 73 About maintaining protection ....................... 73 About the Norton Security scans .................. 74 Chapter 4 Responding to security issues ............... 111 About keeping your computer secure ........... 111 About solving connection problems ............. 112 About responding to emergencies ............... 113 What to do if a security risk is found ............. 114 Contents 4 Chapter 5 Doing routine tasks .............................. 125 Turning on or turning off automatic tasks ............................................. 125 Running custom tasks .............................. 126 Scheduling security and performance scans ............................................ 127 Specifying Idle Time Out duration ................ 128 Chapter 6 Protecting Internet activities ................. 130 About the Smart Firewall .......................... 131 Turning off and turning on Browser Protection ....................................... 160 Turning off or turning on Download Intelligence ..................................... 161 Configuring the Download Insight Notifications option ........................... 162 Configuring the Show Report on Launch of Files option .................................... 163 Turning off or turning on Intrusion Prevention notifications ...................... 166 Excluding or including attack signatures in monitoring ...................................... 167 Turning off or turning on AutoBlock .............. 169 Unblocking AutoBlocked computers ............. 170 Permanently blocking a computer that has been blocked by AutoBlock ................. 170 About Intrusion Prevention exclusion list ................................................ 171 Removing all devices from Intrusion Prevention exclusion list ..................... 172 Adding a device to the Device Trust ............. 173 Changing the trust level of your network and devices .......................................... 175 About the types of security risks ................. 179 About Norton AntiSpam ............................ 180 Adding POP3 and SMTP ports to Protected Ports ............................................. 192 Removing an email port from Protected Ports ............................................. 193 Contents 5 Turning off or turning on Network Cost Awareness ..................................... 194 Defining the Internet usage of Norton Security ......................................... 195 Chapter 7 Securing your sensitive data ................. 197 About Norton Safe Web ............................ 197 About Antiphishing .................................. 203 About Identity Safe ................................. 207 About Norton toolbar ............................... 247 Norton Identity Safe ................................ 251 Chapter 8 Keeping your computer tuned up ........... 255 About disk and file fragmentation ................ 255 Optimizing your permanent disks manually ........................................ 256 About using optimization efficiently .............. 257 About cleaning up disk clutter .................... 258 Running a scan to clean up disk clutter ............................................ 259 Running Diagnostic Report ........................ 259 Managing startup items ............................ 260 Disabling or enabling startup items .............. 261 Chapter 9 Monitoring protection features .............. 262 About Security History ............................. 262 Chapter 10 Customizing protection features ............ 294 Feature summary ................................... 294 About turning off automatic features ............. 298 Chapter 11 Customizing settings ............................ 303 Customizing Norton Security settings ........... 303 Turning on or turning off Quick Controls services ......................................... 305 About Automatic Protection settings ............. 305 About Scans and Risks settings .................. 312 About Antispyware and Updates settings .......................................... 319 Contents 6 About the Intrusion and Browser Protection settings .......................................... 322 Turning on or turning off Remote Management ................................... 323 Resetting your Norton product Settings password ....................................... 324 Turning off the Norton product Settings password ....................................... 325 Securing your Norton product Settings using a password ..................................... 326 About Norton Product Tamper Protection ....................................... 327 Chapter 12 Finding additional solutions .................. 330 Finding the version number of your product .......................................... 330 Finding the End-User License Agreement ...................................... 331 About upgrading your product .................... 331 Solving problems with Norton Autofix ........... 334 Reasons for Fix Now failures ..................... 335 About Support ....................................... 337 Uninstalling your Norton product ................. 339 Index .......................................................................... 344 Getting started 1 This chapter includes the following topics: 1 Activation protects you 1 About Norton Security main window 1 Sign In to your Norton account 1 About Norton Bootable Recovery Tool 1 Starting Norton Security from the command prompt 1 Responding to security status indicators 1 About Norton LiveUpdate 1 Configuring Network Proxy Settings Activation protects you Product activation verifies that you are authorized to use the software and initiates your subscription. It ensures that you have a genuine Norton product installed on your computer. Only genuine Norton products can receive updates from Symantec and in turn protect you from threats. Activation is a simple process that protects you from pirated or counterfeit software. Pirated software is something that is illegally copied or distributed, and not legitimately licensed. You put yourself under the risk of viruses, security breach, Getting started 8 Activation protects you system crashes, and much more if you use pirated software. To activate the product, you need: 1 a license or a product key 1 a Norton account 1 an Internet