User Manual My Norton User Manual
Total Page:16
File Type:pdf, Size:1020Kb
My Norton™ User Manual My Norton User Manual The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 22.20.1 Copyright © 2020 Symantec Corporation. All rights reserved. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by Symantec as on premises or hosted services. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement. Symantec Corporation 350 Ellis Street, Mountain View, CA 94043 http://www.symantec.com Printed in the United States of America. 10 9 8 7 6 5 4 3 2 1 Contents Chapter 1 Welcome to Norton LifeLock .............................................. 6 System requirements for New Norton 360 ........................................... 6 Access your Norton account ............................................................. 8 Chapter 2 Set up your protection ......................................................... 9 Set up Device Security .................................................................... 9 Set up Norton Password Manager ................................................... 10 Set up Cloud Backup .................................................................... 14 Set up LifeLock Identity Theft Protection ........................................... 14 Dark Web Monitoring powered by LifeLock** ............................... 16 Set up your Secure VPN ................................................................ 17 Set up Parental Controls ................................................................ 18 Protect your banking information using Norton Safe Web ...................... 21 Chapter 3 Manage your Device Security ........................................... 23 What to do when your device is at risk .............................................. 23 Run LiveUpdate ..................................................................... 24 View or fix device security threats that Norton detects .................... 24 Act on quarantined risks or threats ............................................. 26 Use Norton to optimize and improve computer performance .................. 28 Run Norton scans to check for threats on your PC .............................. 31 Create your own custom Norton scans ....................................... 34 Schedule Norton scans ........................................................... 35 View real-time threats that Norton SONAR protection detects ........................................................................... 36 Exclude files and folders from Norton Auto-Protect, SONAR, and Download Intelligence scans .............................................. 37 Exclude files with low-risk signatures from Norton scans ................ 38 Turn on or turn off automatic tasks ............................................. 38 Run custom tasks .................................................................. 39 Schedule security and performance scans .................................. 40 Configure Data Protector to block malicious processes affecting your PC ......................................................................... 41 Contents 4 Set Norton to remove scripts that can be exploited in phishing attempts ......................................................................... 44 FAQs: Norton Script Control ..................................................... 46 Manage your Password Manager .................................................... 48 Turn off or turn on Norton Safe Web ........................................... 49 Search the web using Norton Safe Search .................................. 50 Access Norton Password Manager ............................................ 52 Create Norton Password Manager cloud vault .............................. 53 Delete your Norton Password Manager cloud vault ....................... 54 Export your Norton Password Manager data ................................ 55 Import your Norton Password Manager data ................................ 56 Enable or disable the Norton Security toolbar ............................... 57 Protect your device from exploits, hackers, and zero-day attacks ........... 57 Turn Norton Firewall on or off ................................................... 59 Customize Program Rules ....................................................... 60 Change the order of firewall rules .............................................. 60 Turn off a Traffic rule temporarily ............................................... 61 Allow a blocked program ......................................................... 62 Turn off Firewall Block Notification ............................................. 63 Intrusion Prevention exclusion list .............................................. 63 Turn on Browser Protection ...................................................... 64 Set Norton Firewall to stop or start notifying you when it blocks an attack ........................................................................ 65 Turn off or turn on AutoBlock .................................................... 66 Unblock AutoBlocked computers ............................................... 66 Add a device to Device Trust .................................................... 67 Turn off or turn on Download Intelligence .................................... 68 Turn off or turn on spam filtering ................................................ 69 Define the Internet usage for Norton .......................................... 70 Turn off or turn on Network Cost Awareness ................................ 71 Set Norton to monitor applications and block malicious websites from accessing your computer ......................................................... 71 Get started using Norton Cloud Backup ............................................ 73 Add or exclude files and folders in your backup sets ...................... 75 Restore pictures, music, or other important files from Norton backup sets .................................................................... 76 Turn on Norton backup ............................................................ 76 Customize your Norton product settings ............................................ 77 Customize Real Time Protection settings .................................... 78 Scans and Risks settings ......................................................... 79 Intrusion and Browser Protection settings .................................... 82 Set Norton to allow you to remotely manage your protected devices .......................................................................... 83 Contents 5 Protect Norton device security settings from unauthorized access ........................................................................... 83 Set a shortcut key to search Norton device security for information ..................................................................... 84 Chapter 4 Find additional solutions ................................................... 85 Uninstall Device Security ............................................................... 85 Disclaimers ................................................................................. 86 Chapter 1 Welcome to Norton LifeLock This chapter includes the following topics: ■ System requirements for New Norton 360 ■ Access your Norton account System requirements for New Norton 360 Norton Device Security entitlement only ■ Norton™ AntiVirus Plus covers a single PC or Mac Device Security and Norton Secure VPN entitlements Supports devices running on Windows, Mac, Android, and iOS ■ Norton™ 360 Standard covers a single device ■ Norton™ 360 Deluxe covers up to 5 devices ■ Norton™ 360 with LifeLock Select covers up to 5 devices ■ Norton™ 360 with LifeLock Advantage covers up to 10 devices ■ Norton™ 360 with LifeLock Ultimate Plus covers unlimited devices (Restrictions apply*) Device Security Note: Not all features are available on all platforms. Note: Parental Controls, Cloud Backup, and SafeCam are currently not support on Mac OS. Welcome to Norton LifeLock 7 System requirements for New Norton 360 Windows™ Operating Systems ◆ ■ Microsoft Windows® 10 (all versions) ■ Microsoft Windows® 10 in S mode (32-bit