+ All Categories

Help

Date post: 03-Dec-2014
Category:
Upload: andres-diaz
View: 84 times
Download: 0 times
Share this document with a friend
Popular Tags:
538
5.0 Product Manual We protect more people from more online threats than anyone in the world. Care for our Environment, It's the right thing to do. Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products.
Transcript
Page 1: Help

5.0Product Manual

We protect more people from more online threats than anyone in theworld.

Care for our Environment, ‘It's the right thing to do’.Symantec has removed the cover from this manual to reduce the Environmental Footprint of ourproducts.

Page 2: Help

Norton 360™ Product Manual

The software described in this book is furnished under a licenseagreement and may be used only in accordance with the terms ofthe agreement.

Documentation version 5.0

Copyright © 2010 Symantec Corporation. All rights reserved.

The product described in this document is distributed under licensesrestricting its use, copying, distribution, and decompilation/reverseengineering. No part of this document may be reproduced in anyform by any means without prior written authorization of SymantecCorporation and its licensors, if any.

THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESSOR IMPLIED CONDITIONS, REPRESENTATIONS ANDWARRANTIES, INCLUDING ANY IMPLIED WARRANTY OFMERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE ORNON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENTTHAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.SYMANTEC CORPORATION SHALL NOT BE LIABLE FORINCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTIONWITH THE FURNISHING, PERFORMANCE, OR USE OF THISDOCUMENTATION. THE INFORMATION CONTAINED IN THISDOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.

Symantec Corporation350 Ellis Street,Mountain View, CA 94043

http://www.symantec.com

Page 3: Help

Chapter 1 Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7About Norton 360 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7Activation protects you . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19About your Norton Account . . . . . . . . . . . . . . . . . . . . . . . . 23About Norton Community Watch . . . . . . . . . . . . . . . . . 31About Norton Bootable Recovery

Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33About updating Norton 360 . . . . . . . . . . . . . . . . . . . . . . . 37About Network Proxy settings . . . . . . . . . . . . . . . . . . . . . 47About Norton 360 status . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

Chapter 2 Monitoring your system'sperformance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

About System Insight . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

Chapter 3 Maintaining total protection . . . . . . . . . . . . . . . . . . . 91About total protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91About keeping your computer secure . . . . . . . . . . . . 92About solving connection problems . . . . . . . . . . . . . . 94About responding to emergencies . . . . . . . . . . . . . . . . 94About monitoring protection

features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96About viewing details of system

vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

Chapter 4 Scanning your computer . . . . . . . . . . . . . . . . . . . . . . . 133About the Norton 360 scan . . . . . . . . . . . . . . . . . . . . . . . 133About Computer Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137

Contents

Page 4: Help

About Insight Network scan . . . . . . . . . . . . . . . . . . . . . . 142About Reputation Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145About Scan Facebook Wall . . . . . . . . . . . . . . . . . . . . . . . . 155About SONAR Protection . . . . . . . . . . . . . . . . . . . . . . . . . . 158About scanning Office documents . . . . . . . . . . . . . . . 159About Silent Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161Running a scan at the command

prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174

Chapter 5 Responding to security issues . . . . . . . . . . . . . . . . 177What to do if a security risk is found . . . . . . . . . . . 177

Chapter 6 Understanding alerts andmessages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187

About Norton 360 alerts andmessages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187

About managing messages andalerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187

Types of risks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189Types of threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190Types of viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

Chapter 7 Doing routine tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193Turning on or turning off automatic

tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193About scheduling automatic tasks . . . . . . . . . . . . . . 194About scheduling backups . . . . . . . . . . . . . . . . . . . . . . . . 196Specifying Idle Time Out duration . . . . . . . . . . . . . . 197Choosing scans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198

Chapter 8 Keeping secure on the Internet . . . . . . . . . . . . . . 201About the Smart Firewall . . . . . . . . . . . . . . . . . . . . . . . . . 201About Intrusion Prevention . . . . . . . . . . . . . . . . . . . . . . 225About Download Insight . . . . . . . . . . . . . . . . . . . . . . . . . . . 233About Norton AntiSpam .. . . . . . . . . . . . . . . . . . . . . . . . . . 242

Contents4

Page 5: Help

Chapter 9 Securing your sensitive data . . . . . . . . . . . . . . . . . . 257About securing your sensitive data . . . . . . . . . . . . . 257

Chapter 10 Protecting your home network . . . . . . . . . . . . . . . 337About the Network Security Map .. . . . . . . . . . . . . . . 337

Chapter 11 Keeping your PC tuned up . . . . . . . . . . . . . . . . . . . . . 363About PC Tuneup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363About disk and file fragmentation . . . . . . . . . . . . . . 364Optimizing your permanent disks

manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364About using optimization efficiently . . . . . . . . . . . 365About cleaning up disk clutter . . . . . . . . . . . . . . . . . . . 366Running a scan to clean up disk

clutter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367Running Registry Cleanup . . . . . . . . . . . . . . . . . . . . . . . . 368Running Diagnostic Report . . . . . . . . . . . . . . . . . . . . . . . 368About Startup Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369

Chapter 12 Protecting your media and data . . . . . . . . . . . . . 373About Norton Backup and Restore . . . . . . . . . . . . . . 373About backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374About Backup preparation . . . . . . . . . . . . . . . . . . . . . . . . 375About backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378Backing up your files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404Restoring files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404About Norton Backup Drive . . . . . . . . . . . . . . . . . . . . . . 413About solutions to the backup

problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416About online backup considerations . . . . . . . . . . . . 420Turning off or turning on backup . . . . . . . . . . . . . . . 425Turning off or turning on backup setting

options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427

Chapter 13 Customizing settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431About Norton 360 Settings . . . . . . . . . . . . . . . . . . . . . . . . 431Customizing Norton 360 Settings . . . . . . . . . . . . . . . 436Turning on or turning off Quick Controls

services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437

5Contents

Page 6: Help

About Antivirus settings . . . . . . . . . . . . . . . . . . . . . . . . . . 438About Firewall settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463About Norton AntiSpam settings . . . . . . . . . . . . . . . . 471About My Network Settings . . . . . . . . . . . . . . . . . . . . . . 475About backup settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477About Identity Protection settings . . . . . . . . . . . . . . 480About Task Scheduling settings . . . . . . . . . . . . . . . . . 484About Administrative Settings . . . . . . . . . . . . . . . . . . . 488

Chapter 14 Finding additional solutions . . . . . . . . . . . . . . . . . . 509Finding the version number of your

product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509Finding the End-User License

Agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510About upgrading your product . . . . . . . . . . . . . . . . . . . 510About simple solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513Staying informed about protection

issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515Service and support solutions . . . . . . . . . . . . . . . . . . . . 516Uninstalling Norton 360 . . . . . . . . . . . . . . . . . . . . . . . . . . 522

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525

Contents6

Page 7: Help

This chapter includes the following topics:

1 About Norton 360

1 Activation protects you

1 About your Norton Account

1 About Norton Community Watch

1 About Norton Bootable Recovery Tool

1 About updating Norton 360

1 About Network Proxy settings

1 About Norton 360 status

About Norton 360Norton 360 offers proven performance and deliverstoday’s fast and light all-in-one solution to protect yourPC and all your online activities. It protects againstviruses, worms, hackers, and botnet. With a singlesubscription, up to three PCs are protected. Itsafeguards against online identity theft, protectsimportant files, and keeps your PC tuned and runningat peak performance.

Norton 360 is completely automated and easy to use.It works quietly in the background to maintain youroverall system integrity with minimal effect on PC

1Getting Started

Page 8: Help

performance. By offering an unmatched combinationof performance and protection, Norton 360 helps youget the most out of your PC and your online experience.

Norton 360 provides complete protection, whichincludes the following features:

Protects you from virus,spyware, and unknown threats

PC Security

Guards against online identitytheft with antiphishing,password management, andNorton Safe Web features

Identity Protection

Safeguards important files witha secure online backup, localbackup, and restore services

Backup

Keeps your computer tuned-upfor peak performance and letsyou monitor the performance ofyour computer

PC Tuneup

Automatic LiveUpdate provides you latest definitionand program updates to safeguard your computer. Youcan also use Silent Mode to suppress alerts andnotifications when you perform important tasks onyour computer. Norton 360 also provides youeasy-to-use support options.

In addition, Norton 360 blocks spyware from trackingyour online activities or from hijacking your computer.You can also use Silent Mode to suppress alerts andnotifications when you perform important tasks onyour computer.

About Norton 360 main windowThe Norton 360 main window acts as a securitymanagement interface. You can access the main

Getting StartedAbout Norton 360

8

Page 9: Help

features and monitor the performance of yourcomputer from the main window.

As you use your computer, Norton 360 monitors howwell your computer and activities are protected fromthreats, risks, and damage. Norton 360 displays theprotection status of your computer in the main window.

Depending on the security status of your computer, atthe top left of the Norton 360 main window, Norton360 shows your System Status as Secure, Attention,or At Risk. If your system status is marked asAttention or At Risk, at the bottom of the mainwindow, click FixNow to resolve all the security threatson your computer.

The options that are available in the main windowsummarize the most essential security and theproductivity issues that challenge users. They are:

Includes all virus, spyware,firewall, and other securityfeatures.

PC Security

Includes the protectionagainst phishing andfraudulent Web sites.

Identity Protection

Includes the automatic andthe customizable backupsand restore capability.

Backup

Includes the performancetuning features, includingcleaning up unnecessary filesand removing file fragmentson your disk.

PC Tuneup

Depending on the security status of the differentcomponents of your computer, the status areas of the

9Getting StartedAbout Norton 360

Page 10: Help

four protection categories are marked as Protected,Attention, or At Risk.

When the System Status or protection categoriesstatuses are marked as At Risk or Attention, at thebottom of the main window, click Fix Now to resolveall the security threats on your computer.

Norton 360 also provides you easy links at the top ofthe main window to the most frequent tasks. They are:

Lets you access the Taskswindow to run general tasks,backup tasks, and PC Tuneuptasks.

Tasks

Lets you access the Settingswindow to configure settingssuch as Firewall, Antispam,and Backup.

Settings

Lets you open thePerformance window inNorton 360.

The Performance windowchronicles all installs,downloads, optimizations,detections, alerts, andinstances of Quick Scan thatoccurred on your computersince installing Norton 360.The window also displays adetailed graphicalrepresentation of the CPUand memory usage by yourNorton product.

Performance

Lets you give feedback aboutthe Norton product that youuse.

Feedback

Getting StartedAbout Norton 360

10

Page 11: Help

Lets you access the MyAccount window to manageyour Norton Account.

Account

Lets you access supportoptions, product upgradeoptions, subscription options,and product version number.

You can also access theonline Help from theSupportmenu. Help provides links toinformation that assists youwith the specific tasks thatyou want to complete. Theonline Help guides you toconfigure all of the productfeatures.

Support

The bottom section of the Norton 360 main windowprovides you up-to-date virus and threat information.When your system status is AtRisk or Attention, thissection automatically provides you the FixNow optionto fix all the issues at once.

11Getting StartedAbout Norton 360

Page 12: Help

The bottom section of the Norton 360 main windowhelps you do the following:

Activity Map

Getting StartedAbout Norton 360

12

Page 13: Help

Lets you access the worldmap with hotspots ofcybercrimes and the latestthreats.

The Activity Map shows thetop cities in the world wheremost of the cybercrimeactivities occur. These citiesare represented as yellowdots on the map. You canclick a continent in the worldmap to view its cities with thehighest number of threats.The details on the ActivityMap are updated from aSymantec server on a regularbasis. Your computer must beconnected to the Internet toreceive the activity mapupdates.

You can view the date andtime that the Activity Mapwas last updated. You canalso use theMap Details linkto get a brief idea of theActivity Map.

When you click Map Details,the Activity Map shows aseries of latest viruses andthreats that your productprotects your computer from.You can use the info link nextto each item to view itsdetails in an overlay window.You can also use the ViewDetails link in the overlaywindow to know more aboutthe threat in a Symantec Webpage.

13Getting StartedAbout Norton 360

Page 14: Help

Online Family

Getting StartedAbout Norton 360

14

Page 15: Help

Lets you monitor your child’sactivities on the Internet.

w Norton Online Familymay not be available withsome versions of Norton 360.In such case, you may not beable to access Norton OnlineFamily options.

When you clickOnline Familyicon on the main window, thebottom section of the Norton360 main window displaysNorton Online Family sign inoptions. Norton Online Familyprovides you advancedcontrols to monitor yourchild's online activities.

You can use the link on thebottom section of the Norton360 main window to set upyour account with NortonOnline Family.

Symantec recommends thatyou use your Norton Accountlogin credentials to sign in toNorton Online Family. If youregister your product withyour Norton Account, yourNorton Account emailaddress is auto-filled in theemail address text box.

After you set up youraccount, you can sign in toyour account on the bottomsection of the Norton 360main window and view yourchild’s Internet activities. Thebottom section of the Norton360 main window showsdetails such as your child’s

15Getting StartedAbout Norton 360

Page 16: Help

latest search terms, and thelatest alerts. After you signin, you can use the GetDetails option in the bottomsection of the Norton 360main window to view moredetails on the Norton OnlineFamily Web site.

Getting StartedAbout Norton 360

16

Page 17: Help

Safe Web

17Getting StartedAbout Norton 360

Page 18: Help

Lets you check the safety ofa Web site.

You can also perform a safesearch.

w This option may not beavailable with some versionsof Norton 360. In such case,you may not be able to accessthis option.

When you clickSafeWeb iconon the main window, thebottom section of the Norton360 main window displaysNorton Safe Web options.

You can use the Check Siteoption in the bottom sectionof the Norton 360 mainwindow to analyze thesecurity levels of any Website that you want to visit.When you type a Web siteaddress in the text box andclick Check Site, it shows theSymantec’s ratings for theWeb site.

You can use the Safe Searchoption in the bottom sectionof the Norton 360 mainwindow to search forinformation on the Internet.The Norton Safe Search usesAsk.com to generate thesearch results. Norton SafeSearch provides a site safetystatus and a Norton rating foreach of the search resultsgenerated.

You can also use the Viewrecent Norton Safe Web

Getting StartedAbout Norton 360

18

Page 19: Help

activity option in the bottomsection of the Norton 360main window to view therecent Norton Safe Webstatistics on malicious sitesand URLs. You can also viewthe list of new maliciousURLs.

Your activation status or subscription status appearsat the bottom of the main window. You can use theActivate Now option to activate or subscribe yourNorton product.

Activation protects youProduct activation is a technology that protects usersfrom pirated or counterfeit software. It protects youby limiting the use of a product to those users who haveacquired the product legitimately. Product activationrequires a Product Key for each installation of aproduct. You must activate the product within a limitedtime period after you install it.

If you are connected to the Internet, product activationtakes place automatically when you start the productfor the first time after installation. After activation,the Norton Account window appears. You can createyour Norton Account and register your product.

If you are not connected to the Internet, you can clickTry Later in the Activation not complete window tostart your product. The Activation window reappearsevery time you start your product until you activateyour product. If you choose not to activate at that time,you receive an alert that reminds you to activate theproduct. You can also activate your product by clickingthe Trial Period Status link in the Norton 360 mainwindow.

19Getting StartedActivation protects you

Page 20: Help

w If you do not activate the product within the timeperiod that the alert specifies, the product stopsworking. You can activate it after the time period haselapsed, but you are not protected until you activatethe product.

Activating Norton 360To use all of the features in Norton 360, you must firstactivate your product. Product activation reducessoftware piracy and ensures that you have authenticSymantec software. You can renew your subscriptionafter the end of your subscription period.

If you are connected to the Internet, product activationtakes place automatically when you start the productfor the first time after installation. During activation,the Norton Account window appears. You can createyour Norton Account and register your product. Youcan also view details, such as your Product Key andrecent updates to the product. If you skip the NortonAccount window, the product is activated, but theProduct Key is not saved in the Norton Account. Youcan print the Product Key for the future, if you needto reinstall your product.

If you did not activate your product during installation,Norton 360 prompts for activation each time you startthe product. Also, you receive an activation alertregularly until you activate the product.

w You must activate your product within the time periodthat the alert specifies, or your product stops working.

You can activate your product directly from theactivation alert. You can also activate your productfrom the Trial Period Status link in the main windowor from the My Account window. In some cases, youmight need to enter your Product Key to activate yourproduct. You can activate or renew the subscription ofyour product from any non-admin user account as well.Activation should take only a few minutes.

Getting StartedActivation protects you

20

Page 21: Help

To activate Norton 360, your computer must beconnected to the Internet. If you use a proxy server toconnect to the Internet, you must configure the proxysettings. You can configure Network Proxy Settingsin the Administration Settings window.

To activate Norton 360 from the alert

1 In the alert, click Activate Now or Renew Now.

2 Click OK.

3 Follow the on-screen instructions.

4 In the window that appears, click Done.

To activate your Norton 360 from the My Accountwindow

1 In the Norton 360 main window, click Account.

2 In the My Account window, click Activate Norton360 or Renew Subscription.The Renew Subscription option is available if youhave already activated your product.

3 Follow the on-screen instructions.

4 In the window that appears, click Done.

To activate your product from the main window

1 In the Norton 360 main window, do one of thefollowing:

1 If you purchased a subscription version of aretail product, click Activate Now.

1 If the product came installed on your computer,click Activate Online Now.

1 If you want to renew the subscription of yourproduct, click Renew.

2 Follow the on-screen instructions to activate orsubscribe your product.

Where to find your Product KeyThe product key is a unique key that helps you to installand activate the Symantec product on your computer.The Product Key is a 25-character alphanumeric stringthat is shown in five groups of five characters each,

21Getting StartedActivation protects you

Page 22: Help

separated by hyphens. The location of the Product Keyvaries depending on how you acquired the product.

The locations of the Product Key are as follows:

The Product Key is either ona sticker on the CD sleeve oron an insert in the productpackage.

If you purchased a retail copyof the product on CD

The Product Key is on theDVD package.

If you purchased the producton DVD

The Product Key is stored onyour computer as part of thedownload process and isincluded in the confirmationemail from the SymantecStore.

If you downloaded theproduct from the SymantecStore

The Product Key is providedas part of the activationprocess. Be sure to save yourProduct Key by creating orsigning in to your NortonAccount, or by printing thekey. You may need theProduct Key if you ever wantto reinstall your product.

If your computer came withthe product already installed

The Product Key is printed onthe card along withinstructions on how to use it.Be sure to save your ProductKey by creating or signing into your Norton Account. Youneed the Product Key if youever want to reinstall theproduct.

If you received a Product Keycard

Getting StartedActivation protects you

22

Page 23: Help

To recover or access yourProduct Key log on tohttps://www.mynortonaccount.com/amsweb.If you are not registered,register for Norton Account.You can find the Product Keyon the Products tab in theNorton Account page.

If you are still unable tolocate your Product Key, youcan recover it using NortonAccount

About problems during activationIf you cannot connect to the Symantec servers toactivate your product, first check your Internetconnection. You then need to see if you have parentalcontrol software, either installed or through your ISP,that might block the connection.

A connectivity problem can occur if you use parentalcontrol software. If you suspect that parental controlsmight block the connection, you can configure theparental controls so that they do not block theactivation procedure. You need to log in to yourparental control software or to the Internet throughyour ISP as an administrator to change yourconfiguration.

If you use a proxy server to connect to the Internet,you must configure the proxy settings. You canconfigure Network Proxy Settings in the MiscellaneousSettings section.

About your Norton AccountWhen you create a Norton Account, you can manageall of your Norton products in one place. You can storeyour Product Keys in your Norton Account and alsobuy additional Product Keys. You can also register yourproduct with the Norton Account. It takes only a fewmoments to create your Norton Account. You must beconnected to the Internet to create a Norton Account.

23Getting StartedAbout your Norton Account

Page 24: Help

After you create a Norton Account, you can access andmanage your account information and productinformation from anywhere. It helps to reinstall yourproducts and download the latest version of theproducts. If you install your product on more than onePC, you can use the same Norton Account. To accessyour Norton Account, go to the following URL:

https://www.mynortonaccount.com/amsweb

You can create a Norton Account in the following ways:

1 During activation

You can create your Norton Account and registeryour product from the Norton Account windowthat appears when you activate the product. Youmust provide your account information in theNorton Account window that appears.

1 Any time after activation

You can create a Norton Account from the AccessNorton Account link available in the My Accountwindow.

Getting StartedAbout your Norton Account

24

Page 25: Help

After you log in to your Norton Account, you canmanage your product information with the followingoptions:

Saves the information for all ofthe Norton products that youown.

The Products tab provides youthe information about theNorton products that you ownand the expiration date. You canclick the arrow icon against aproduct for more informationsuch as Product Key and theregistration date. You can alsobuy a new Product Key to protectadditional computers. You canuse the Update option to checkand download the latest productversion using Norton UpdateCenter.

Products

Contains order information ofthe Norton products you boughtfrom Norton online store.

Order History

25Getting StartedAbout your Norton Account

Page 26: Help

Saves your account informationand your billing details.

The Profile options are:1 Account Information

You can update your NortonAccount information andyour shipping address on theAccount Information tab.After you update, clickUpdate to save the changes.

1 Billing Information

You can save your credit cardinformation and your billingaddress on the BillingInformation tab. It makes iteasier for saving onlineorders. After you update,click Update to save thechanges.

1 Change Password

You can change your currentNorton Account password onthe Change Password tab.

Profile

You can use the icons at the bottom of your NortonAccount Web page to access and use the following:

Norton Online Familymonitors and manages yourchild's Internet activities andcomputer usage.

Norton Online Family

Getting StartedAbout your Norton Account

26

Page 27: Help

Norton Online Backupprovides a secure andeasy-to-use online backupsolution that safeguards yourimportant data againstsystem crash, accidentaldeleting, virus infection, andother disasters.

Norton Online Backup

Norton Safe Web checks thesafety of a Web site and letsyou perform a safe Websearch.

Norton Safe Web

The Symantec Web siteprovides more informationabout the various products ofSymantec, the latest updateson Internet security, andvarious support options.

Norton.com

Norton Update Center checksand lets you download thelatest version of your Nortonproduct.

Norton Update Center

If you forget your Norton Account password, you canget a temporary password by clicking the Forgot yourpassword link in the Norton Account sign-in Webpage. You need to provide your email address. You needto use the same email address that you provided whenyou created your Norton Account. Symantec sends atemporary password to your email address. You canuse the temporary password for a limited time period.You must reset your password after you log in to yourNorton Account.

27Getting StartedAbout your Norton Account

Page 28: Help

Creating a Norton AccountYour Norton Account stores the Product Key and thebilling information of your product. You can alsoregister your product with the Norton Account.

In addition, Norton Account helps you to do thefollowing:

1 Access the Product Key and other productinformation when you need it.

1 Reinstall your Norton product.

1 Buy additional Product Keys for your home or office.

1 Check and download the latest version of theproduct by using Norton Update Center.

1 Save online orders and update billing information.

1 Manage your online backup.

Your computer must be connected to the Internet tocreate a Norton Account. If you use a proxy server toconnect to the Internet, you must configure the proxysettings. You can configure Network Proxy Settings inthe Administration Settings window.

You can also create a Norton Account when youactivate your product. When you create your NortonAccount from the product, your product gets registeredin your account. If you have an existing NortonAccount, you can provide the same email address inthe NortonAccount window in your product. This way,you can register your current product and add it to thelist of Norton products in your existing NortonAccount. If you upgrade your registered product to thelatest available version, your product remainsregistered to the same Norton Account. In this case,you can continue using the same Norton Account logincredentials.

w Symantec products that are older than the 2006product year do not appear in your Norton Account.

Getting StartedAbout your Norton Account

28

Page 29: Help

To create a Norton Account from the Norton AccountWeb page

1 In the Norton 360 main window, click Account.

2 In the My Account window, click Access NortonAccount.

3 In the Norton Account Web page that appears, clickSign up now.

4 In the Norton Account Sign Up Web page, providethe details about your account information, andthen click Sign Up.

To create a Norton Account and register your productafter activation

1 In the Norton 360 main window, click Account.

2 In the My Account window, click Access NortonAccount.

3 In the Activation – Norton Account window, typeyour email address.

4 In the CreateyourNortonAccount window, provideyour account details, and then click Next.Your product information gets saved in your NortonAccount only after you log in to your NortonAccount.

5 Do one of the following:

1 To confirm your Norton Account, click Done.

1 To log in to your Norton Account and access yourproduct information, visithttps://www.mynortonaccount.com/amsweb.

Accessing your Norton AccountThe Product Key for each Norton product isconveniently stored in your Norton Account. After youhave created your Norton Account successfully, youcan access your account from anywhere in the world.You can log in to your Norton Account any time byvisiting the following URL:

https://www.mynortonaccount.com/amsweb

29Getting StartedAbout your Norton Account

Page 30: Help

You can easily find and update your account, product,and billing information from your Norton Account.You can also change your Norton Account password,if required. Your computer must be connected to theInternet to access your Norton Account.

w Symantec products that are older than the 2006product year do not appear in your Norton Account.

To access Norton Account

1 In the Norton 360 main window, click Account.

2 In the My Account window, click Access NortonAccount.

3 In the Norton Account Web page that appears, typeyour email address and password, and click SignIn.

Creating a temporary password for Norton AccountIf you forget the password of your Norton Account, youcan create a temporary password to sign in to yourNorton Account. The temporary password is sent tothe email address that you provided when you createdyour Norton Account.

After you sign in to your Norton Account by using thetemporary password, you are prompted to change yourpassword.

To create a temporary password for Norton Account

1 In the Norton 360 main window, click Account.

2 In the My Account window, click Access NortonAccount.

3 In the Norton Account Web page that appears, underForgot your password?, click Recover it here.

4 In the Forgot your Password Web page, verify theemail address that is provided in the EmailAddresstext box, and then click Continue.A temporary password is sent to your email address.You can use this temporary password to sign in toyour Norton Account.

Getting StartedAbout your Norton Account

30

Page 31: Help

About Norton Community WatchNorton Community Watch helps in identifying newsecurity risks by submitting selected security andapplication data to Symantec for analysis. Symantecassesses the data to determine the new threats andtheir sources. The collective efforts from Nortonsecurity product users help in quick identification ofsolutions for these threats and risks. NortonCommunity Watch improves user security and productfunctionality. In addition, it helps Symantec to analyzethe execution, schedule, and efficiency ofNorton-specific tasks and settings on your computer.

Norton Community Watch collects and submits thefollowing types of data:

1 Identified malicious software such as portableexecutable files and running processes

1 Any Web site URL that your product identifies asfraudulent

1 All the Web site URLs that you visited before thedetection of a risk

1 The applications and processes that run on yourcomputer regularly and during any security riskdetection

1 Response instances that your computer sends toany potential security risk

1 General system information and performanceattributes from the computer

1 General information about your computer such asidle time, standby, and screensaver settings

After the potential security risks are assessed from thesubmitted data, Symantec sends the information backto Norton 360. The Norton features such as NortonInsight and Insight Network use this information toidentify files and processes at risk.

You should participate in Norton Community Watchsubmissions to provide valuable contribution to theentire community that uses Norton security products.

31Getting StartedAbout Norton Community Watch

Page 32: Help

No personally identifiable information is exposedduring data collection and submission. Symantecmaintains an adequate level of protection for thecollected information. The Detailed Error DataCollection option under Norton Community Watchin the AdministrativeSettings window lets you allowor deny the detailed data submissions. The detaileddata may vary depending on the Norton-specific errorsand components. You can configure the option tomanage the data submissions.

If you chose not to join Norton Community Watch whenyou installed your Norton product, you can turn it onlater. You can use the Norton Community Watchoption in the Settings window for AdministrativeSettings. You can also review the data, which NortonCommunity Watch collects and submits to Symantec,in the Security History window.

Turning off or turning on Norton Community WatchNorton Community Watch remains active once it isinstalled. If for any reason, you want to temporarilydisable it, you can turn it off from within the programitself.

You can use Security History to review the informationthat has been sent to Symantec.

To turn off or turn on Norton Community Watch

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Settings window for Administrative Settings,in the NortonCommunityWatch row, do one of thefollowing:

1 To turn off Norton Community Watch, move theOn/Off switch to the right to the Off position.

1 To turn on Norton Community Watch, move theOn/Off switch to the left to the On position.

4 In the Settings window, click Apply.

Getting StartedAbout Norton Community Watch

32

Page 33: Help

About Norton Bootable Recovery ToolNorton Bootable Recovery Tool scans and removesviruses, spyware, and other security risks from yourcomputer. Your computer might be infected with avirus if you experience any of the following symptoms:

1 You cannot install Norton 360.

1 You cannot start your computer.

1 Your computer is extremely slow.

Norton Bootable Recovery Tool is integrated withWindows Preinstallation Environment (WinPE).Therefore, you can run Norton Bootable Recovery Toolonly from a CD, DVD, or USB key. You must use NortonBootable Recovery Tool Wizard to create the NortonBootable Recovery Tool CD, DVD, or USB key.

You can use the Norton Bootable Recovery Tool CD,DVD, or USB key to recover a computer that is infectedwith viruses and other security threats. This securityprogram is not a replacement for continuous, real-timeprotection from viruses and latest security risks. Toprotect your computer from future infections, be sureto install or continue using Norton 360 that you alreadypurchased.

Norton Bootable Recovery Tool detects and resolvesthe following security threats:

Programs that infect anotherprogram, boot sector,partition sector, or documentby inserting themselves orattaching themselves to thatmedium. Most viruses justreplicate; many also dodamage.

Viruses

33Getting StartedAbout Norton Bootable Recovery Tool

Page 34: Help

Programs containingmalicious codes that aredisguised as or hiding insomething benign, such as agame or utility.

Trojan horses

Tools that are used by ahacker to gain unauthorizedaccess to your computer. Onetype of hacking tool, akeystroke logger, tracks andrecords your individualkeystrokes and can send thisinformation back to thehacker.

Hacking tools

Programs that can scansystems or monitor activityand relay the information toother computers or locationsin cyberspace.

Spyware

Programs that facilitate thedelivery of advertisingcontent through their ownwindow, or by using anotherprogram's interface.

Adware

Getting StartedAbout Norton Bootable Recovery Tool

34

Page 35: Help

Programs that track systemactivity, gather systeminformation, or track userhabits, and relay thisinformation to third-partyorganizations. Theinformation that is gatheredby such programs is neitherpersonally identifiable norconfidential. Trackwareprograms are installed withthe user's consent, and mayalso be packaged as part ofother software that isinstalled by the user.

Trackware

Downloading the Norton Bootable Recovery ToolWizard

If your attempt to install a Norton product fails, youcan download the Norton Bootable Recovery ToolWizard. This easy-to-use wizard helps you createNorton Bootable Recovery Tool on a CD, DVD, or USBkey. You can use Norton Bootable Recovery Tool toscan your computer and remove any security threatsthat prevent successful installation.

It is recommended that you download and installNorton Bootable Recovery Tool Wizard on a computerthat does not have any security threats and createNorton Bootable Recovery Tool. If you create NortonBootable Recovery Tool on an infected computer, thereis a chance that the recovery CD, DVD, or USB keymight get infected.

w To use Norton Bootable Recovery Tool, you must usethe Product Key of the Norton product that youpurchased. If you use a trial version of Norton 360, youneed to create a Norton Account to receive a ProductKey to use Norton Bootable Recovery Tool.

35Getting StartedAbout Norton Bootable Recovery Tool

Page 36: Help

To download theNortonBootable Recovery ToolWizardfrom the Internet

1 Open your Web browser, and go to the followingURL:http://www.norton.com/recoverytool_n360

2 Follow the on-screen instructions.

Using the Norton Bootable Recovery ToolIf the installation of your Norton product fails, you canuse the Norton Bootable Recovery Tool to scan andremove any security threats that prevent successfulinstallation. If your computer is infected and you arenot able to start your Windows operating system, youcan use Norton Bootable Recovery Tool to removethreats and recover your computer.

Norton Bootable Recovery Tool is available on theproduct CD that you purchased. You can use theproduct CD as a recovery media.

w To use Norton Bootable Recovery Tool, you must usethe Product Key of the Norton product that youpurchased. If you use a trial version of Norton 360, youneed to create a Norton Account to receive a ProductKey to use Norton Bootable Recovery Tool.

To use the Norton Bootable Recovery Tool

1 Insert the recovery media and start your computerfrom the recovery media.The recovery media can be a Norton BootableRecovery Tool CD, DVD, USB key, or the productCD.

2 In the Norton Bootable Recovery Tool window,select your language, and then click OK.

3 Read the Norton License Agreement, type yourProduct Key, and then click I Agree.

4 Click Start Scan.

5 After the scan is complete, remove the recoverymedia from the drive or USB port, and restart yourcomputer.

Getting StartedAbout Norton Bootable Recovery Tool

36

Page 37: Help

About updating Norton 360Norton 360 uses the Internet to automatically obtainupdates to its virus definition files and its programfiles. These updates continually enhance the technologythat Norton 360 uses to keep your PC protected.

Automatic updates require an Internet connection. Ifyou use a proxy server to connect to the Internet, youmust configure the proxy settings in your product. Ifyou do not normally keep your PC connected to theInternet, you can manually update Norton 360 afteryou connect to the Internet. Updating Norton 360 ona regular basis ensures that you have the latestdefinition updates and program updates.

About LiveUpdateSymantec products download the latest definitionupdates and program updates regularly from Symantecservers. The definition updates protect your computerfrom the latest viruses and unknown security threats.Symantec products help you to obtain and install theseupdates by using the LiveUpdate technology.

LiveUpdate takes little time to download and processthe definition updates and program updates. You canchoose Smart Definitions to minimize download time,installation time, and memory consumption as SmartDefinitions are a subset of virus definitions. The SmartDefinitions option is available on the ScansandRiskstab in the Antivirus settings window. You can cancelthe LiveUpdate session at any time.

You can also skip the LiveUpdate session.

LiveUpdate obtains these updates for your computerby using your Internet connection. If your networkuses proxy servers to connect to Internet, LiveUpdateuses the proxy settings in your product to downloadthe latest updates. You can use the Network ProxySettings option in the AdministrativeSettings windowto configure the proxy settings of your network.

37Getting StartedAbout updating Norton 360

Page 38: Help

About Program and Definition Updates

LiveUpdate obtains program updates and definitionupdates for your computer by using your Internetconnection.

Program updates are minor improvements to yourinstalled product. These differ from product upgrades,which are newer versions of the entire product.Program updates are usually created to extend theoperating system or hardware compatibility, adjust aperformance issue, or fix program errors. Programupdates are released on an as-needed basis.

w Some program updates may require that you restartyour computer after you install them.

LiveUpdate automates the process of downloading andinstalling program updates. It locates and obtains filesfrom an Internet site, installs them, and then deletesthe leftover files from your computer.

Definition updates are the files that keep yourSymantec products up to date with the latest antithreattechnology. The definition updates that you receivedepend on which product you use.

The type of definition updates that each of theSymantec products receive are as follows:

Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.

Norton AntiVirus, NortonAntiVirus Online

Getting StartedAbout updating Norton 360

38

Page 39: Help

In addition to the virusand security risk updates,users of these productsreceive definition updatesfor security protection.For the products thatcontain protectionagainst phishing, usersreceive definition updatesagainst phishing.

The security definitionupdates provide the latestpredefined firewall rules,the updated lists ofapplications that accessthe Internet, IntrusionPrevention signatures,and Symantec spamdefinition files. Theselists are used to identifyunauthorized accessattempts to yourcomputer.

Norton Internet Security, NortonInternet Security Online

Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.

In addition, users of theseproducts receiveSymantec spamdefinitionfiles and definitionupdates against phishing.

Norton 360, Norton 360 Online

39Getting StartedAbout updating Norton 360

Page 40: Help

Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.

In addition, users of theseproducts receiveSymantec spamdefinitionfiles and definitionupdates against phishing.

Norton Security Suite, NortonBusiness Suite

About Smart Definitions

Norton 360 downloads and installs virus definitionsregularly to protect your computer from the latestsecurity threats. For faster downloads and installationpurpose, Norton 360 classifies these virus definitionsinto two sets.

The virus definitions are classified into the followingtwo sets:

Contains all the virus definitionsfor each threat that is known toSymantec.

Complete Set

Getting StartedAbout updating Norton 360

40

Page 41: Help

Contains the most importantvirus definitions that arerequired for latest securitythreats as viewed by Symantec.

The Core Set is a subset of theComplete Set, and it isapproximately 30 percentsmaller than the Complete Set.The Core Set minimizesdownload time, installation time,and system start time. It alsooccupies lesser amount of diskspace as compared to theComplete Set virus definitions.Therefore, the Core Set resultsin faster performance of yourcomputer.

Core Set

The Core Set virus definitions are called as SmartDefinitions. Norton 360 provides the SmartDefinitionsoption to choose between Core Set virus definitionsand Complete Set virus definitions for LiveUpdatesessions. The option is available on the ScansandRiskstab in the Antivirus settings window.

During Automatic LiveUpdate or each time that yourun LiveUpdate manually, Norton 360 checks if theSmart Definitions option is turned on or off. It thendownloads and installs the desired set of virusdefinitions based on the option setting. By default, theoption is turned off, which means that the CompleteSet virus definitions are downloaded and installed.When you turn on Smart Definitions, Norton 360downloads and installs the Core Set virus definitionson your computer.

Turning on or turning off Smart Definitions

Smart Definitions are a subset of virus definitions thatcontains most important definitions for the latestsecurity threats.

41Getting StartedAbout updating Norton 360

Page 42: Help

As the Smart Definitions are of considerably smallersize, it results in lesser download time, lesserinstallation time, lesser boot time, and lesser memoryconsumption. It also occupies lesser amount of diskspace as compared to the full set of virus definitions.Therefore, Smart Definitions result in fasterperformance of your computer.

Norton 360 checks the Smart Definitions optionsettings during each LiveUpdate session. If the optionis turned on, the Smart Definitions are downloadedand installed. If the option is turned off, all of the virusdefinitions are downloaded and installed.

To turn on or turn off Smart Definitions

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.

3 Click Scans and Risks tab.

4 Under Computer Scans, in the Smart Definitionsrow, do one of the following:

1 To turn on Smart Definitions, move the On/Offswitch to the left to the On position.

1 To turn off Smart Definitions, move the On/Offswitch to the right to the Off position.

5 In the Settings window, click Apply.

6 Click Close.

Turning off or turning on Automatic LiveUpdate

You can have LiveUpdate check for definition updatesand product updates automatically on a set schedule,by turning on the Automatic LiveUpdate option. Youcan also run LiveUpdate manually when the AutomaticLiveUpdate option is turned on. However, you mustrun LiveUpdate manually to obtain updates if you haveturned off the Automatic LiveUpdate option.

You can turn off or turn on the AutomaticLiveUpdateoption from the Antivirus settings window. You can

Getting StartedAbout updating Norton 360

42

Page 43: Help

also turn off or turn on the Automatic LiveUpdateoption from Quick Controls in the Settings window.

w If you are connected to the Internet, AutomaticLiveUpdate downloads product updates and definitionupdates every hour. If you have an ISDN router that isset to automatically connect to your Internet serviceprovider (ISP), it may incur charges each time. If thistype of setup is a problem, you can set your ISDN routernot to automatically connect to the ISP. Alternatively,you can turn off Automatic LiveUpdate.

To turn on Automatic LiveUpdate from Quick Controls

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Quick Controls,check Automatic LiveUpdate.

To turn off Automatic LiveUpdate from Quick Controls

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Quick Controls,uncheck Automatic LiveUpdate.

3 In the Select the duration drop-down list, selecthow long you want to turn off AutomaticLiveUpdate, and then click OK.

Checking for updates manually

If you disconnect your PC from the Internet, Symantecrecommends that you check for Norton 360 updatesafter you reconnect.

To check for updates manually

1 In the Norton 360 main window, move the mousepointer over PC Security, and then click RunLiveUpdate.

2 In the Activities and Scan Details window, whenthe LiveUpdate is completed successfully, clickClose.

43Getting StartedAbout updating Norton 360

Page 44: Help

Checking for the latest virus and spyware definitions date

Virus definition files contain the information thatallows Norton 360 to recognize and alert you to thepresence of a specific virus or security threat. Norton360 shows the date on which you last updated the virusand spyware definitions.

You can also check the latest virus definition date. TheDefinitionUpdate link at the bottom of the PCSecuritystatus area shows you the date and time of the lastdefinition updates.

To check for the latest virus and spyware definition date

1 In the Norton 360 main window, move the mousepointer over PC Security, and then click ViewDetails.

2 In the PC Security Details window, view the latestvirus definitions details.The Status column shows the date on which youlast downloaded and installed the latest definitionupdates.

About keeping your protection up to date

Definition updates are available to you as long as youmaintain an active product status. The ways in which

Getting StartedAbout updating Norton 360

44

Page 45: Help

you can acquire the product and maintain your statusare as follows:

The product includes a limited-timesubscription to definition updates. Whenthe subscription is due to expire, you areprompted to renew. Follow the on-screeninstructions to complete yoursubscription renewal.

After your product expires, you cannotobtain definition updates and all thesecurity features are turned off. If youdo not renew your product, you are nolonger protected against security threats.Though LiveUpdate continues todownload program updates afterexpiration, you must renew your productto enable all the security features.

If you purchaseda subscriptionversion of a retailproduct

If you do not activate your service orrenew your subscription, you cannotobtain updates of any kind and thesoftware no longer functions.

If you purchaseda product as aservice, or it cameinstalled on yourcomputer

Your product status is always active aslong as your security service is activewith your service provider.

If your security service is not active, youcannot obtain updates of any kind andthe software no longer functions.

If you receive thisservice throughyour serviceprovider

About Pulse Updates

In addition to the definition updates that AutomaticLiveUpdate downloads, Norton 360 uses streamingtechnology to download the latest virus definitions.These downloads are called Pulse Updates. The PulseUpdates are lighter and faster than AutomaticLiveUpdate. They keep your computer secure from the

45Getting StartedAbout updating Norton 360

Page 46: Help

ongoing threats that exist on the Internet. PulseUpdates protect you against the rapidly-changingenvironment of security threats without compromisingyour computer's performance. Pulse Updates shouldalways be turned on to get the latest updates.

Pulse Updates checks for definition updates every 5minutes. If definition updates are available, LiveUpdatedownloads the streamed virus definitions. PulseUpdates provide the updates in between the fullupdates, which Automatic LiveUpdate downloadsautomatically every hour. Norton 360 merges the newstream that is downloaded with the last updates thatare installed. The Pulse Updates downloads provideadditional and fast protection for the latest threats inbetween the full updates without disrupting your onlineexperience.

Even if you do not turn on Pulse Updates, LiveUpdatecollects all the missed streams and, it updates yourcomputer during full definition updates.

Turning off or turning on Pulse Updates

Pulse Updates provide frequent, lightweight updatesevery 5 minutes in between the full updates. Alwaysensure that the Pulse Updates option is turned on. Itprotects you from the latest threats withoutcompromising your system performance or disruptingyour online experience.

You must be connected to the Internet to obtain latestdefinition updates by using Pulse Updates. You canturn on or turn off Pulse Updates only if AutomaticLiveUpdate is turned on.

To turn off or turn on Pulse Updates

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.

3 In the Settings window for Antivirus, click theAntispyware and Updates tab.

Getting StartedAbout updating Norton 360

46

Page 47: Help

4 Under Updates, in the Pulse Updates row, do oneof the following:

1 To turn off Pulse Updates, move the On/Offswitch to the right to the Off position.

1 To turn on Pulse Updates, move the On/Offswitch to the left to the On position.

5 In the Settings window, click Apply.

About Network Proxy settingsA proxy server regulates access to the Internet, andprevents external computers from accessing yournetwork. If you are on a network that uses a proxyserver to connect to the Internet, you can provide proxyserver details to Norton 360. You can use the NetworkProxy Settings window to specify the automaticconfiguration URL, the proxy settings, and theauthentication details. Norton 360 uses the proxysettings and authentication details to connect to theInternet automatically, whenever required. Forexample, LiveUpdate uses the specified proxy serversettings to retrieve updates. You must ensure that youspecify the proxy server details for LiveUpdate to runsuccessfully.

In some cases, your network uses an automaticconfiguration URL or script for managing Internetaccess. In this case, you must provide the URL of therequired Proxy Automatic Configuration (PAC) file. APAC file contains the code that lets your browser knowabout the proxy settings for different Web sites overthe Internet. It also contains the words which you wantto filter and block while you access the Internet. Youcan also choose the option that lets your browser toautomatically detect the proxy settings. If you wantyour manual settings in the network, ensure that youdisable the Automatic Configuration options.

47Getting StartedAbout Network Proxy settings

Page 48: Help

Network Proxy Settings window lets you specify thefollowing settings:

Lets you specify the automaticconfiguration URL or script tomanage Internet access.

You have the following options:1 Automatically detect

settings

Lets your browser detect thenetwork settingsautomatically.

If you do not want to overrideyour manual settings fornetwork connections, youmust disable this option.

1 Useautomatic configurationscript

Lets your browser use theautomatic configuration URLor script to manage Internetaccess.

Use the URL box to providethe HTTP URL or the script tothe required PAC file (suchas file://C:/Proxy.pac).

Automatic Configuration

Getting StartedAbout Network Proxy settings

48

Page 49: Help

Lets you provide the details ofyour Proxy Settings.

UnderProxySettings, checkUsea proxy server for your HTTPconnections, and do thefollowing:

1 In the Address box, type theURL or IP address of yourproxy server.

1 In the Port box, type the portnumber of your proxy server.

You can specify a value from1 to 65535.

Proxy Settings

Lets you connect to the Internetthrough a server that requiresauthentication.

Use the Username box andPassword box to type theauthentication details.

Authentication

Configuring Network Proxy SettingsWhen you use a proxy server to connect to the Internet,you must specify the proxy server details. The NetworkProxy Settings window lets you enter automaticconfiguration settings, proxy settings, and proxy serverauthentication settings. The Network Proxy settingslet you connect to the Internet while you perform taskssuch as activating the product or accessing the supportoptions.

To configure Network Proxy Settings

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the NetworkProxySettings row, click Configure.

49Getting StartedAbout Network Proxy settings

Page 50: Help

4 In the Network Proxy Settings window, do thefollowing:

1 If you want your browser to automatically detectnetwork connection settings, under AutomaticConfiguration, check Automatically detectsettings.

1 If the proxy server requires an automaticconfiguration URL, under AutomaticConfiguration, check Use automaticconfiguration script. Type the URL (such asfile://C:/Proxy.pac) in the URL box.

1 If your network uses a proxy server, under ProxySettings, check Use a proxy server for yourHTTPconnections. In the Address box, type theURL or IP address of your proxy server, and inthe Port box, type the port number of your proxyserver. You can specify a value from 1 to 65535.

1 If your proxy server requires a user name andpassword, under Authentication, check I needauthorization to connect through my firewallor proxy server. Type the user name in theUsername box and password in the Passwordbox.

5 In the NetworkProxySettings window, click Apply.

About Norton 360 statusNorton 360 displays the security status of yourcomputer at the top of the main window. Based on thesecurity status of your computer, Norton 360 showsyour system status as Secure, Attention, or At Risk.

The system status indicator displays one of thefollowing statuses:

Indicates that your computeris protected from threats,risks, and damages.

Secure

Getting StartedAbout Norton 360 status

50

Page 51: Help

Indicates that your computerrequires attention.

At the bottom section of theNorton 360 main window,click Fix Now to resolve thesecurity threats on yourcomputer.

Attention

Indicates that your computeris at risk.

At the bottom section of theNorton 360 main window,click Fix Now to resolve thesecurity threats on yourcomputer.

At Risk

Norton 360 displays individual security status for eachprotection category, such as PC Security, IdentityProtection, Backup, and PC Tuneup. Based on thesecurity status of the different components of yourcomputer, the status areas of the four protectioncategories are marked as Protected, Attention, or AtRisk.

See “Responding tosecurity statusindicators”on page 51.

When your system status or protection categoriesstatuses are marked as At Risk or Attention, at thebottom section of the Norton 360 main window, clickFix Now to resolve all the security threats on yourcomputer.

Responding to security status indicatorsWhen your system encounters a threat or a risk, theproduct displays the security status at the top of themain window. When a status indicator displays a status,you can take appropriate action to improve yourprotection status. Your protection is based on theprograms that are installed on your computer. Toimprove your protection status, ensure that yourinstalled programs are up to date.

51Getting StartedAbout Norton 360 status

Page 52: Help

When your system status or protection categoriesstatuses are marked as At Risk or Attention, you canresolve the security issues directly from the mainwindow.

To respond to security status indicators

1 In the Norton 360 main window, click Fix Now.

2 Follow the on-screen instructions.

About the Norton 360 iconWhen you install Norton 360, it places an icon in thenotification area at the far right of the taskbar. Thisicon indicates the current security status of yourcomputer. Norton 360 displays an animated icon whenit actively fixes any issues or wants to inform you aboutany warning or urgent issues.

You can see the following representations of Norton360 icon in the notification area:

Represents that your computeris fully protected

Icon with a green checkmark badge

Represents that there are someissues against your computerprotection that require yourattention

Icon with an orangeexclamation mark badge

Represents that there are someurgent issues against yourcomputer protection that requireimmediate resolution

Icon with a red cross markbadge

Represents that the Silent Modefeature is turned on

This icon also displays thecurrent protection status badge.

Icon with acrescent-shaped edge

Getting StartedAbout Norton 360 status

52

Page 53: Help

You can right-click the icon to see a shortcut menu forNorton 360. You can choose items on the shortcut menuto open the Norton 360 window, to fix any issues thatNorton 360 detects, or to get additional help.

About Norton 360 shortcut menuNorton 360 works in the background to keep your PCsecure. The Norton 360 icon is available in thenotification area at the far right of the taskbar. Theicon reassures you that your protection is up to date.It changes its color if any change in status occurs.

The messages that appear in the notification area mayrequire a response from you, such as opening a window.More often, messages inform you about currentactivities, and they disappear after a few seconds.

You can right-click the Norton 360 icon to accessspecific Norton 360 activities. Depending on the currentactivities, your options include the following:

Use this option to launch theNorton 360 main window tocomplete tasks, view currentstatus, or access otherfeatures

Open Norton 360

Use this option to run a QuickScan to protect possiblevirus-infected areas of yourcomputer

Run QuickScan

Use this option to runLiveUpdate to check fordefinition updates andprogram updates

Run LiveUpdate

53Getting StartedAbout Norton 360 status

Page 54: Help

Use this option to create abackup of your files

You can specify when andhow often Norton 360 backsup your files.

Run Backup Now

Use this option to review theinformation about thesecurity events for all of thecategories

View Recent History

Use this option to resolveyour problem easily usingOne Click Support

Get Support

Use this option to view all thelogins that you want IdentitySafe to manage

If you have not created anyIdentity Safe profile, thisoption first lets you create anIdentity Safe profile.

Manage Logins

Use this option to turn on orturn off Silent Mode

Turnon/Turnoff SilentMode

Use this option to turn on orturn off the firewall

Enable/Disable SmartFirewall

Use this option to turn on orturn off AntivirusAuto-Protect

Enable/Disable AntivirusAuto-Protect

Use this option to check anddownload the latest versionof the product

Check for New Version

Getting StartedAbout Norton 360 status

54

Page 55: Help

Viewing details of protection featuresIn the Norton 360 main window, you can see a summaryof each of the four protection features that Norton 360provides. You can view additional details about eachprotection feature.

To view details of a protection feature

1 In the Norton 360 main window, move the mousepointer over a protection feature, and then clickView Details to view the following details:

1 The current status of the protection feature.

1 A list of the checks that the feature performs,and the results of each check. In some cases, theresults of a check can include a link that providesadditional information.

1 A list of things that you can do.

2 After you view details, click Close.

55Getting StartedAbout Norton 360 status

Page 56: Help

Getting StartedAbout Norton 360 status

56

Page 57: Help

This chapter includes the following topics:

1 About System Insight

About System InsightNorton 360 continuously monitors your computer tokeep it free of any problems and run at peak efficiency.Norton 360 constantly scans the vital areas of yourcomputer including memory, registry keys, and runningprocesses. It monitors the important activities such asgeneral file operation, network traffic, and Internetbrowsing. In addition, Norton 360 ensures that theactivities that it performs on your computer do notdegrade the overall performance of your computer.

System Insight provides you a centralized locationwhere you can view and monitor the activities that youperform on your system. System Insight displays suchinformation in the Performance window.

You can use the Performance window for the following:

1 To view monthly history of the important systemactivities that you performed or that occurred overa period of the last three months

The Events graph that appears at the top of thewindow provides a pictorial representation ofimportant system activities. The activities includeapplication installations, application downloads,disk optimizations, threat detections, or Quick

2Monitoring yoursystem'sperformance

Page 58: Help

Scans. The graph displays the activities as icon orstripe, and the description for each icon or stripeis provided at the right side of the graph. Thepop-up that appears when you move the mousepointer over an icon provides you the details aboutthe activity. The View Details link in the pop-uplets you view additional details about the activityin the Security History window. You can use thetabs at the top of the graph to obtain details for thecurrent month and details for the last two months.

1 To rearrange the organization of files on yoursystem

Optimizing your system helps you maximize theusable free space on a disk by grouping files basedon how they are accessed. The Optimize option atthe top of the Events graph lets you defragmentyour system.

1 To view and analyze the effect of Norton 360 on theperformance of your computer

The Performance graph that appears at the bottomof the window provides a graphical representationof your CPU usage and memory usage. The CPU tabdisplays a graph that represents the overall systemCPU usage and Norton-specific CPU usage. Whenyou click at any point on the CPU graph andmemory graph, Norton 360 displays a list of theprocesses that consume maximum resources at thatpoint. It also displays the percentage of usage foreach process. You can click a process that isavailable in the list to get more information aboutthe process in the File Insight window. TheMemory tab displays a graph that representsoverall memory usage and Norton-specific memoryusage. You can select any of the Zoom options toobtain magnified view or historical data of thegraphs.

1 To view the details of Norton-specific jobs that arecurrently running in the background

The NortonTasks window provides the details suchas the timestamp, the duration, and the status of

Monitoring your system's performanceAbout System Insight

58

Page 59: Help

the background jobs. The details also include thetype of power the job needs to run and if a job randuring idle time. You can also start or stop abackground job at any time.

1 To view and manage your network

The Network Security Map window provides apictorial representation of the devices on thenetwork to which your computer is connected. Youcan view devices and customize the NetworkSecurity Map to remotely monitor the computerson which a Norton product is installed.

1 To view details about the known good files and theknown bad files

The NortonInsightNetwork window lets you viewthe total number of files that Symantec analyzeswithin the Norton Community. You can also viewthe total number of computers that are available inthe community to provide the data. You can viewthe number of trusted files that are available onyour computer.

You can use the Performance Monitoring option inthe Administrative Settings window to enable ordisable Norton 360 to monitor your system'sperformance.

Accessing the Performance windowSystem Insight provides you a centralized locationwhere you can view and monitor your system activities.System Insight displays such information in thePerformance window. You can access the Performancewindow to view details about the important systemactivities, CPU usage and memory usage, andNorton-specific background jobs. You can also viewNorton Insight details and defragment your bootvolume.

To access the Performance window

4 In the Norton 360 main window, click Performance.

59Monitoring your system's performanceAbout System Insight

Page 60: Help

About monitoring system activitiesSystem Insight provides information about theimportant system activities that you performed or thatoccurred over a period of the last three months. SystemInsight displays the information in the Performancewindow. The Events graph at the top of thePerformance window displays each activity as icon orstripe. The description for each icon or stripe appearsat the bottom of the graph. You can use the tabs at thetop of the graph to obtain details for the current monthand for the last two months. The activities include:

Provides the details about theinstallation activities that youperformed on your system overa period of the last three months

The details include theapplication that you installed,the date on which you installedthe application, and the totalnumber of installations on thatdate.

Installs

Provides the details about theapplication-download activitiesthat you performed on yoursystem over a period of the lastthree months

The details include the date onwhich you downloaded a file andthe total number of downloadson that date. You can click thefile name link to view additionaldetails about the downloadedfile such as the Download Insightreport, file name, reputationlevel, and recommended action.

Downloads

Monitoring your system's performanceAbout System Insight

60

Page 61: Help

Indicates the optimizationactivities that you performed onyour system over a period of thelast three months

Optimized

Provides the details about thethreat detection activities thatNorton 360 performed on yoursystem over a period of the lastthree months

The details include the date onwhich Norton 360 detected athreat and the total number ofthreats that Norton 360 detectedon that date. The View Detailslink provides additional detailsabout the risk such as the riskimpact and the origin of the risk.The details also include theaction that a threat hasperformed on your system andthe action that Symantecrecommends you to resolve thethreat.

Detections

Provides the details about theperformance alerts that Norton360 displayed over a period ofthe last three months

The details include themonitored date and the numberof performance alerts generated.The View Details link providesadditional details aboutperformance-related activities,program name, programlocation, and system resourcesutilization.

Alerts

61Monitoring your system's performanceAbout System Insight

Page 62: Help

Provides the details about QuickScans that Norton 360performed on your system overa period of the last three months

The details include the date onwhich a Quick Scan wasperformed and the number ofQuick Scans that wereperformed on that date. TheView Details link providesadditional details such as thescan time, total items scanned,total risk detected, total risksresolved, and recommendedaction.

Quick Scans

Viewing details of your system activities

System Insight lets you view details of the systemactivities that you performed or that occurred over thelast three months in the Performance window. Theactivities include application installations, applicationdownloads, disk optimizations, threat detections,performance alerts, or Quick Scans. You can use thetabs at the top of the Events graph to obtain details forthe current month and for the last two months. TheEvents graph at the top of the Performance windowdisplays each activity as icon or stripe. The descriptionfor each icon or stripe appears at the bottom of thegraph. The pop-up that appears when you move themouse pointer over an icon provides you the detailsabout the activity. The details include the date on whichan activity was performed and the number of suchactivities that you performed on that date. The ViewDetails link provides additional details of the activityin the Security History window.

To view details of your system activities

1 In the Norton 360 main window, click Performance.

Monitoring your system's performanceAbout System Insight

62

Page 63: Help

2 In the Performance window, at the top of the Eventsgraph, click the tab for a month to view the details.

3 In the Events graph, move the mouse pointer overthe icon or the stripe for an activity.

4 In the pop-up that appears, view the details of theactivity.

5 If the View Details option appears in the pop-up,click View Details to view additional details in theSecurity History window.

About performance alertingNorton 360 monitors your system performance. If itdetects an increased usage of system resources by anyprogram or process, it notifies you with performancealerts. Performance Alerting works only when thePerformance Monitoring option and PerformanceAlerting option are turned on.

Performance Alerting notifies you with informationabout the program name and resources that theprogram uses excessively. The Details & Settings linkin the performance notification alert lets you viewadditional details about the resource consumption bythe program. The File Insight window opens anddisplays the details of the file, the origin of the file, andthe complete resource usage list of the program. Fromthe FileInsight window, you can choose to exclude theprogram from being monitored. You can use theSettings option in the File Insight window to turn offthe Performance Alerting option.

w Performance alerts are not displayed when yourcomputer is idle or in Silent Mode.

For each system resource, such as CPU, memory, andhard disk, there is a resource consumption thresholddefined. When the resource consumption of a programexceeds the defined threshold limit, Norton 360 alertsyou with a performance alert.

63Monitoring your system's performanceAbout System Insight

Page 64: Help

You can configure the threshold limit by using theResourceThresholdProfile forAlerting option underAdministrative Settings in the Settings window.

You can use the Low-ResourceProfileUseOnBatteryPower option to let Norton 360 automatically changethe resource threshold profile to low when yourcomputer runs on battery power.

In addition, you can add programs to the ProgramExclusions list using the Program Exclusions option.When you add a program to the Program Exclusionslist, Norton 360 does not alert you when the programexceeds the resource consumption threshold limit.

You can view all the performance-related logs underthe Performance Alert category in the SecurityHistory window.

Configuring performance alerts

You can use the Performance Alerting option toreceive performance alerts when there is an increasedusage of system resources by any program or process.

You can use the following options to configureperformance alerts:

Turns off performance alerts.

Select this option if you donot want Norton 360 to notifyyou with performance alerts.

Off

Turns on performance alerts.

Select this option if you wantNorton 360 to notify you withperformance alerts when aprogram or process exceedsthe system resource usagethreshold limit.

By default, the PerformanceAlerting option is turned on.

On

Monitoring your system's performanceAbout System Insight

64

Page 65: Help

Monitors and records thesystem resource usage.

Select this option if you wantNorton 360 to only monitorthe system resource usage ofevery program or processrunning on your computer.

When a program or processexceeds the system resourceusage threshold limit, Norton360 records these details intheSecurity Historywindow.You can view the details thatare related to performancealerts under PerformanceAlert category in theSecurityHistory window.

Log Only

To configure performance alerts

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Performance Monitoring, in thePerformanceAlerting row, do one of the following:

1 To turn off performance alerts, move thePerformanceAlerting switch to the Off position.

1 To turn on performance alerts, move thePerformanceAlerting switch to the On position.

1 To suppress the performance alerts, move thePerformance Alerting switch to the Log Onlyposition.

65Monitoring your system's performanceAbout System Insight

Page 66: Help

4 Under High-Usage Alert for:, do the following:

1 If you want Norton 360 to monitor the CPUusage, move the CPU switch to the On position.By default, this switch is turned on.

1 If you want Norton 360 to monitor the memoryusage, move the Memory switch to the Onposition. By default, this switch is turned on.

1 If you want Norton 360 to monitor the diskusage, move the Disk switch to the On position.By default, this switch is turned on.

1 If you want Norton 360 to monitor the handlecount, move the Handles switch to the Onposition.

5 Click Apply, and then click Close.

Configuring the resource threshold profile

The threshold limit for the system resourcesdetermines at which point Norton 360 should notifyyou with performance alerts. You can use the ResourceThreshold Profile for Alerting option in the Settingswindow to configure the resource consumptionthreshold limit. When a specific program exceeds thethreshold limit of using your system resource, Norton360 notifies you with a performance alert.

To configure the resource threshold profile

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

Monitoring your system's performanceAbout System Insight

66

Page 67: Help

3 Under Performance Monitoring, in the ResourceThreshold Profile for Alerting row, select one ofthe following options:

Configures a low thresholdlimit for alerting

If you choose this option,Norton 360 notifies you withperformance alerts whenevera program reaches the lowestthreshold limit of using yoursystem resource.

Symantec recommends youto select this option whenyour computer runs onbattery power.

Low

Configures a mediumthreshold limit for alerting

By default, the threshold limitis set to medium.

Medium

Configures a high thresholdlimit for alerting.

If you choose this option,Norton 360 notifies you withperformance alerts whenevera program reaches thehighest threshold limit ofusing your system resource.

High

4 Click Apply, and then click Close.

Turning off or turning on the Low-Resource Profile Use OnBattery Power option

When your computer runs on battery power, it isimportant that all active software programs consumeminimum resource usage. By reducing resource usage,

67Monitoring your system's performanceAbout System Insight

Page 68: Help

your computer gains longer battery life and becomesmore energy efficient.

You can configure a low threshold profile and ensurethat all programs consume minimum resource usage.When the resource usage of a program or a processexceeds the low threshold limit, Norton 360 notifiesyou with a performance alert. You can choose to closethe program or the process manually and free theresource.

If the Low-Resource Profile Use On Battery Poweroption is turned on, Norton 360 automatically changesthe threshold profile to low when your computer runson battery power. By default, this option is turned on.You can view the Low-ResourceProfileUseOnBatteryPower option under Administrative Settings in theSettings window.

w Symantec recommends that you keep theLow-Resource Profile Use On Battery Power optionturned on.

To turn off the Low-Resource Profile Use On BatteryPower option

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Performance Monitoring, in theLow-Resource Profile Use On Battery Power row,move the On/Off switch to the right to the Offposition.

4 Click Apply, and then click Close.

To turn on the Low-Resource Profile Use On BatteryPower option

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

Monitoring your system's performanceAbout System Insight

68

Page 69: Help

3 Under Performance Monitoring, in theLow-Resource Profile Use On Battery Power row,move the On/Off switch to the left to the Onposition.

4 Click Apply, and then click Close.

Excluding programs from appearing in performance alerts

Norton 360 lets you exclude programs from appearingin performance alerts. You can add the programs thatconsume high CPU, memory, or disk usage to theProgram Exclusions list. When you add a program tothe ProgramExclusions list, Norton 360 does not alertyou when the program exceeds the resourceconsumption threshold limit.

To exclude a program from appearing in performancealerts

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Performance Monitoring, in the ProgramExclusions row, click Configure.

4 In the Program Exclusions window, click Add.

5 In the Select a program dialog box, browse to theexecutable file for the program that you want toadd.

6 Click Open.

7 In the Program Exclusions window, click OK.

8 In the Settings window, click Apply, and then clickClose.

Removing programs from Program Exclusions

The ProgramExclusions window lists all the programsthat are excluded from appearing in performancealerts. If you want, you can remove any of the programsthat you already added to the Program Exclusionswindow. When you remove a program, the program

69Monitoring your system's performanceAbout System Insight

Page 70: Help

appears in the performance alert the next time itcrosses the resource consumption threshold limit.

To remove a program

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Performance Monitoring, in the ProgramExclusions row, click Configure.

4 In the Program Exclusions window, select theprogram that you want to delete, and then clickRemove.

5 Click OK.

6 In the Settings window, click Apply, and then clickClose.

About CPU graph and memory graphNorton 360 monitors the overall system CPU usageand memory usage and the Norton-specific CPU usageand memory usage. Norton 360 displays the details inthe CPU graph and the memory graph. The CPU graphand memory graph are real-time graphs of CPUutilization and memory utilization.

The graphs display a performance time for the last 90minutes or for the duration since you started yourcomputer. The graphs update the information at aninterval of every 15 seconds. The graphs progress fromright to left, and the most recent data appear on thefar right of the graph. The blue pattern in the graphsdepicts the overall system usage, and the yellow patterndepicts the Norton-specific usage. The gray blocks thatare labeled as Idle indicate the idle period of yourcomputer. The gray blocks include the period whenyour computer is in shutdown, sleep, or log out state.

The graphs show a default performance time of 90minutes. However, you can use the Zoom options todefine a region of the graph that you are interested toview. You can select a Zoom option to obtain magnifiedview or historical data of the graphs. For example, if

Monitoring your system's performanceAbout System Insight

70

Page 71: Help

you select the 10min option, Norton 360 displays themagnified view of CPU graph or memory graph for thelast 10 minutes. If you select the 1d option, Norton 360displays a historical data of the last one day.

When you click at any point on the CPU graph ormemory graph, Norton 360 displays a list of theprocesses that consume maximum resources at thatpoint. It also displays the percentage of usage for eachprocess. You can click a process that is available in thelist to get more information in the FileInsight window.

The File Insight window provides information aboutthe process such as:

1 The file name, version number, digital signature,the date on which the process was installed

1 The date on which the process was last used andwhether it is a startup file

1 The confidence level

1 The resource usage details

1 The actions that the process performs on yoursystem

In addition, the File Insight window displays the CPUgraph and the resource usage details for the runningprocesses. The graph shows the breakdown of overallsystem CPU usage and the CPU usage by the process.

Viewing the CPU graph and memory graph

Norton 360 monitors the overall system CPU usageand memory usage and the Norton-specific CPU usageand memory usage. The CPU tab and the Memory tabat the top of the Performance graph display the CPUgraph and the memory graph respectively.

The Zoom options provide you the magnified view ofthe CPU graph and memory graph. For example, if youselect the 10min option, Norton 360 displays themagnified view of CPU graph or memory graph for thelast 10 minutes. If you select the 30min option, Norton360 displays a magnified view of the CPU graph andmemory graph for the last 30 minutes.

71Monitoring your system's performanceAbout System Insight

Page 72: Help

To view CPU graph and memory graph

1 In the Norton 360 main window, click Performance.

2 In the Performance window, do one of the following:

1 To view the CPU graph, click the CPU tab.

1 To view the memory graph, click the Memorytab.

3 Do one of the following:

1 To obtain a magnified view, click 10min or30min next to the Zoom option.

1 To obtain the default performance time, click90min next to the Zoom option.

Obtaining historical data of your CPU and memory usage

The Zoom options also provide you the historical dataof the CPU graph and memory graph. For example, ifyou select the 1d option, Norton 360 displays the dataof CPU graph or memory graph for the last one day.

To view historical data of your CPU or memory usage

1 In the Norton 360 main window, click Performance.

2 In the Performance window, do one of the following:

1 To view the CPU graph, click the CPU tab.

1 To view the memory graph, click the Memorytab.

3 Do one of the following:

1 To obtain historical data for the last one day,click 1d.

1 To obtain historical data for the last one week,click 1w.

1 To obtain historical data for the last one month,click 1m.

Identifying resource-consuming processes

You can click at any point on the CPU graph or memorygraph to obtain a list of the processes that consumemaximum resources of your computer at that point.

Monitoring your system's performanceAbout System Insight

72

Page 73: Help

You can click a process that is available in the list toget more information about the process in the FileInsight window.

To identify resource-consuming processes

1 In the Norton 360 main window, click Performance.

2 In the Performance window, do one of the following:

1 To view the CPU graph, click the CPU tab.

1 To view the memory graph, click the Memorytab.

3 Click at any point on the graph to obtain a list ofresource-consuming processes.

4 Click the name of a process to obtain additionalinformation about the process in the File Insightwindow.

About optimizationThe data storage space on a disk is divided into discreteunits. These units are called clusters. When files arewritten to the disk, they are broken up intocluster-sized pieces. When all of the file pieces arelocated in adjacent or contiguous clusters, the file canbe accessed quickly.

Your computer’s hard disk stores all of your files,applications, and the Windows operating system. Thebits of information that make up your files graduallyspread over the disk. This process is known asfragmentation. The more that you use your computer,the more fragmented the hard disk gets.

When a fragmented file is accessed, the diskperformance is slower. The performance is slowerbecause the drive head locates, loads, saves, and keepstrack of all of the fragments of the file. If free space isalso fragmented, the drive head might have to trackadequate free space to store temporary files or newlyadded files.

Optimization rearranges file fragments into adjacentor contiguous clusters. When the drive head accesses

73Monitoring your system's performanceAbout System Insight

Page 74: Help

all of the file data in one location, the file is read intothe memory faster. Optimization also maximizes theusable free space on a disk by grouping most frequentlyused files and infrequently used files. Optimizationconsolidates free space to avoid fragmenting newlyadded files. It adds extra space after major datastructures so that they can grow without immediatelybecoming fragmented again.

You can optimize your boot volume manually by usingthe Optimize option in the Performance window.

You can also configure Norton 360 to defragment yourboot volume or the local disk that contains boot volumewhen your computer is idle. Norton 360 automaticallyschedules the optimization when it detects theinstallation of an application on your computer. Theoptimization process starts next time when yourcomputer is idle. You can use the IdleTimeOptimizeroption in the Administrative Settings window tooptimize the boot volume during idle time.

Optimizing your boot volume

The Optimize option lets you optimize your bootvolume to improve the boot time of your computer.Optimization of your boot volume maximizes the usablefree space by rearranging file fragments into adjacentand contiguous clusters. When the drive head of yourhard drive accesses all of the file data in one location,the file is read into the memory faster.

When you use the Optimize option in Windows XP,Norton 360 optimizes only the boot volume (forexample, C:\Windows). Therefore, it requires less timeto complete optimization. However, when you use theOptimize option in Windows Vista or Windows 7,Norton 360 optimizes the drive that contains the bootvolume. Therefore, it requires more time to completeoptimization.

You can access the Optimize option at the top of thesecurity status graph in the Performance window. Youcan also optimize your boot volume using the Insight

Monitoring your system's performanceAbout System Insight

74

Page 75: Help

Optimizer option in the Norton Tasks window. TheInsightOptimizer row in the background jobs list thatis available in the Norton Tasks window displays thedetails of the boot volume optimization process. Youcan view details such as timestamp, duration, andstatus of the background job.

To optimize your boot volume from the Performancewindow

1 In the Norton 360 main window, click Performance.

2 In the Performance window, at the top of thesecurity status graph, click Optimize.

To optimize your boot volume from the Norton Taskswindow

1 In the Norton 360 main window, click Performance.

2 In the Performance window, click Norton Tasks.

3 In the Norton Tasks window, under the NortonTasks column, click the Play icon that appearsbefore Insight Optimizer.

About the Idle Time Optimizer

Idle Time Optimizer lets you configure Norton 360 todefragment your boot volume or the local disk thatcontains boot volume when your computer is idle.Norton 360 automatically schedules the optimizationwhen it detects the installation of an application onyour computer and your computer is idle. If you startusing your computer again, Norton 360 stops theoptimization task, and starts optimizing the next timethat your computer is idle. This way, the backgroundjob of optimization does not affect the performance ofyour computer.

Optimization rearranges file fragments into adjacentor contiguous clusters in the hard disk. It improves thecomputer performance by reading the files into thememory faster. Optimization also maximizes the usablefree space on a disk by grouping most frequently usedfiles and infrequently used files. In addition, it

75Monitoring your system's performanceAbout System Insight

Page 76: Help

consolidates free space to avoid fragmenting newlyadded files.

You must turn on the Idle Time Optimizer optionunder AdministrativeSettings in the Settings windowto optimize the boot volume during idle time. Bydefault, this option is turned on.

Turning off or turning on Idle Time Optimizer

Norton 360 automatically schedules the optimizationwhen it detects the installation of a new applicationon your computer. Norton 360 runs this optimizationonly when your computer is idle.

You must turn on the Idle Time Optimizer optionunder AdministrativeSettings in the Settings windowto optimize the boot volume during idle time. Bydefault, this option is turned on.

To turn off Idle Time Optimizer

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Idle Time Optimizer row, move the On/Offswitch to the right to the Off position.

4 Click Apply, and then click Close.

To turn on Idle Time Optimizer

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Idle Time Optimizer row, move the On/Offswitch to the left to the On position.

4 Click Apply, and then click Close.

About the Norton TasksThe NortonTasks window provides an interface whereyou can view and monitor all Norton-specificbackground tasks. Norton 360 runs most of thebackground tasks when your computer is idle. The

Monitoring your system's performanceAbout System Insight

76

Page 77: Help

Norton Tasks window provides the details of thebackground tasks that Norton 360 performs.

The details include things such as:

1 The name of the background task

You can use the icon that appears before the nameof a background job to start or stop a backgroundtask. You can start or stop a background task at anytime.

1 The timestamp of the background task

You can view details such as the date on which thebackground job last ran and the time. The detailshelps you decide whether to start a background taskor wait for Norton 360 to run the job during idletime.

1 The duration of the background task

You can view the length of time that a backgroundtask ran the last time. The details also help youdetermine the length of time a background tasktakes to complete if you start it.

1 The background task has run during idle time ornot

This detail helps you determine if a task has alreadyrun during idle time or you should run it.

1 The status of the background task

You can view details about the completion of thetask. You can also determine the type of power thata background task needs to complete.

In addition to viewing and monitoring the backgroundtask details, you can specify the IdleTimeOut duration.After the Idle Time Out duration is reached, Norton360 identifies the computer as idle and run thebackground tasks. You can use the Idle Countdownbar to confirm the idle state of your computer. You canview the CPU graph and memory graph to obtain theperformance data of your computer.

You can also manually turn on Silent Mode for aspecified duration.

77Monitoring your system's performanceAbout System Insight

Page 78: Help

Monitoring background jobs of Norton 360

The Norton Tasks window provides the details of thebackground tasks that Norton 360 performs and letsyou view and monitor the background tasks. Norton360 runs most of the background tasks when yourcomputer is idle. Performing all background tasks whenyour computer is idle helps your computer to run atpeak efficiency when you use your computer. However,you can manually start or stop a task at any time. Youcan also specify the Idle Time Out duration. After theIdle Time Out duration is reached, Norton 360identifies the computer as idle and run the backgroundtasks. You can use the IdleCountdown bar to confirmthe idle state of your computer. You can also view theCPU graph and memory graph to obtain theperformance data of your computer.

To monitor background jobs

1 In the Norton 360 main window, click Performance.

2 In the Performance window, click Norton Tasks.

3 In the Norton Tasks window, view the details ofbackground jobs.

4 Do one of the following:

1 To run a background job, click the Play icon thatappears before the name of the background job.

1 To stop a running background job, click the Stopicon that appears before the name of thebackground job.

5 Click Close.

About Norton InsightNorton Insight allows the smart scanning of files onyour computer. It improves the performance of Norton360 scans by letting you scan fewer files withoutcompromising the security of your computer.

Monitoring your system's performanceAbout System Insight

78

Page 79: Help

A Norton 360 scan can identify threats on yourcomputer in the following ways:

At regular intervals, Norton 360obtains definition updates fromSymantec. These updatescontain signatures of knownthreats. Each time when Norton360 obtains the definitionupdates, it performs a scan of allof the files that are available onyour computer. It compares thesignature of the files against theknown threat signatures toidentify threats on yourcomputer.

The Blacklist technique

79Monitoring your system's performanceAbout System Insight

Page 80: Help

Norton 360 obtains specificinformation about the Files ofInterest and submits theinformation to Symantec duringidle time. The informationincludes things such as filename, file size, and hash key.Symantec analyzes theinformation of each File ofInterest and its unique hashvalue and provides a confidencelevel to the file. The Symantecserver stores the hash value andconfidence level details of theFiles of Interest. The serverprovides the details immediatelyafter you open the NortonInsight - Application Ratingswindow. Even the slightestmodification of the file causes achange in the hash value and theconfidence level of the file.Typically, most Files of Interestbelong to the operating systemor known applications, and theynever change. These files do notrequire repeated scanning ormonitoring. For example,Excel.exe is a file that neverchanges but you always scan itduring a normal security scan.

The Whitelist technique

Symantec assigns the following confidence levels toFiles of Interest:

Symantec analyzes the file astrusted based on the fileinformation that Norton 360sends to Symantec.

Norton Trusted

Monitoring your system's performanceAbout System Insight

80

Page 81: Help

Symantec analyzes the file asgood based on the statisticalevaluation that is done on thefiles that are available within theNorton Community.

Good

Symantec does not have enoughinformation about the file toassign a trust level to the file.

Unproven

Symantec has only a fewindications that the file is nottrusted.

Poor

Symantec has high indicationsthat the file is not trusted.

Bad

Norton 360 also provides different profiles to configureyour scan performance. When you use the Full Scanprofile, Norton 360 follows the Blacklist technique toscan your computer. It scans all of the files on yourcomputer against the signatures that it obtained duringdefinition updates. When you use the Standard Trustor HighTrust profile, Norton 360 follows the Whitelisttechnique to scan the files based on their confidencelevel. This way, Norton 360 significantly reduces thetime that is required to scan your computer completelyfor security threats.

The Whitelist technique that Norton Insight uses alsohelps in heuristic detection of suspicious applications.Normally, the execution behavior of well-knownapplications appears identical to the execution behaviorof unknown applications. Such behavior results in falseidentification of good applications as suspicious, andtherefore, necessitates security applications tomaintain a low heuristic detection threshold. However,keeping a low detection threshold does not provide acomplete heuristic protection against maliciousapplications. Norton 360 uses the Whitelist technique

81Monitoring your system's performanceAbout System Insight

Page 82: Help

that helps maintain a high heuristic detectionthreshold. It excludes well-known applications fromheuristic detection to prevent false detection ofwell-known applications and to ensure a high detectionrate of malicious applications.

Viewing the files using Norton Insight

Norton Insight provides information about the Files ofInterest that are available on your computer. Norton360 lets you view specific categories of files based onthe option that you select in the Norton Insight -Application Ratings window.

The drop-down list that is available in the NortonInsight - Application Ratings window provides youthe following options:

Lists the processes that runon your computer at thatpoint in time when youselected this option

All Running Processes

Lists the Files of InterestAll Files

Lists the programs that startwhen you start yourcomputer

Startup Items

Lists all the files andprograms that are currentlyloaded on to the programmemory space

All Loaded Modules

Monitoring your system's performanceAbout System Insight

82

Page 83: Help

Lists the programs thatconsumemaximumresourcesof your computer

Norton 360 displays a list oftop 10 resources that highlyaffect the performance ofyour computer.

Highest Performance Impact

Lists the files that have themaximum community usage

Highest Community Usage

Lists the files that youinstalled most recently

The list contains the files thatyou installed in the last 30days after you installedNorton 360.

Most Recently Installed

Lists the Files of Interest thatyou manually trusted in theFile Insight window

This category does not listthe files that do not belongto the File of Interest even ifyou manually trust the files.However, Norton 360excludes all of the manuallytrusted files from Norton 360scan when you configureScan Performance Profilesto High Trust.

You can also remove the usertrust from all of the Files ofInterest that you manuallytrusted. You can use theClear All User Trust optionnext to the drop-down list toremove the user trust.

User Trusted Files

83Monitoring your system's performanceAbout System Insight

Page 84: Help

Lists the files that have theconfidence level as NotTrusted

You can manually trust all thefiles that are not trusted byclicking the Trust All Filesoption next to the drop-downlist.

Untrusted Files

You can view file details such as file name, trust level,community usage, resource usage, and the date onwhich the file was installed. There may be instanceswhen the trust level of a file has changed or a processrunning might have stopped running. You can refreshthe Norton Insight - Application Ratings window toupdate the file list, file details, and coveragepercentage. The coverage meter provides a graphicalrepresentation of the percentage of the Norton TrustedFiles and the total Files of Interest. The higher thepercentage, the lesser time the scan takes.

To view the files using Norton Insight

1 In the Norton 360 main window, move the mousepointer over PC Security, and click Run NortonInsight.

2 In the Norton Insight - Application Ratingswindow, select an option from the drop-down listto view a category of files.You may need to scroll the window to view all thefiles that are listed in the details area.

3 Click Close.

To refresh the list of files

4 In the Norton Insight - Application Ratingswindow, click Refresh.

Checking the trust level of a file

Norton Insight lets you check the details of the Filesof Interest that are available on your computer. You

Monitoring your system's performanceAbout System Insight

84

Page 85: Help

can view details such as signature of the file and thedate on which the file was installed. You can also viewdetails such as the trust level, community usage,resource usage, and the source of the file. You can usethe Locate this file option to find the location of thefile on your computer. When you right-click a file thatis available on your computer, the shortcut menudisplays Norton 360 option and then Norton FileInsight option. You can use the options to check thedetails of a File of Interest.

w Norton 360 displays the Norton File Insight optiononly when you right-click a File of Interest. In WindowsSafe mode, you cannot access this option for any file.Norton 360 also categorizes any file for which you openthe File Insight window to view details as a File ofInterest.

The Symantec server stores the hash value and trustlevel details of the File of Interest. The server providesthe file details immediately after you open the NortonInsight - Application Ratings window. However, youcan use theCheckTrustNow option in the FileInsightwindow to update the trust value of a file. You can alsomanually trust any well-known files. You can changethe trust level of any file to User Trusted other thanthe files that are Norton Trusted.

You can determine the resource usage of a file that isavailable on your computer. The File Insight windowdisplays the CPU graph and the system resource usagedetails for the running processes. The graph shows thebreakdown of overall system CPU usage and the CPUusage or memory usage by the process.

To check the trust level of a file

1 In the Norton 360 main window, move the mousepointer over PCSecurity, and then click RunNortonInsight.

2 In the Norton Insight - Application Ratingswindow, click a file for which you want to check thedetails.

85Monitoring your system's performanceAbout System Insight

Page 86: Help

3 In the File Insight window, view the details of thefile.

4 Click Close to close the File Insight window.

To check the trust level of a specific file

1 In the Norton 360 main window, move the mousepointer over PCSecurity, and then click RunNortonInsight.

2 In the Norton Insight - Application Ratingswindow, click Check a Specific File.

3 Browse to the location of the file for which you wantto check the details.

4 Select the file, and then click Open.

5 In the File Insight window, view the details of thefile.

6 Click Close to close the File Insight window.

To refresh the trust level of the file

4 In the File Insight window, click CheckTrustNow.

Configuring the Scan Performance Profiles

The Scan Performance Profiles settings let youconfigure how Norton 360 should scan your computerbased on the digital signature and confidence level ofthe files. To make Norton 360 scans lighter, faster, andmore effective, you can exclude from scans the filesthat have known digital signatures or high confidencelevels.

You can configure the Scan Performance Profilessettings to do the following:

1 Configure to Full Scan to perform a complete scanof your computer.

The complete scan includes a scan of all files onyour computer irrespective of the confidence levelor digital signature of the files.

1 Configure to StandardTrust to perform a scan thatexcludes the files that are Norton Trusted.

Monitoring your system's performanceAbout System Insight

86

Page 87: Help

Norton 360 scans the files that have a confidencelevel other than Norton Trusted.

1 Configure to High Trust to perform a scan thatexcludes the files that have known digital signaturesor high confidence levels.

Norton 360 does not scan the files that haveconfidence level as Norton Trusted or User Trusted.It also excludes the Good files with high confidencelevel from the scan. It scans the files withconfidence levels as Poor Trust, Unproven Trust,Bad Trust, and the files without a class 3 digitalsignature.

You must configure the Scan Performance Profilessettings before you run a scan or before a scan isscheduled to run. Norton 360 scans your computeraccording to the configuration you specified in theScan Performance Profiles settings.

To configure Scan Performance Profiles

1 In the Norton 360 main window, click Settings.

2 In the Settings window, click Antivirus.

3 On the ScansandRisk tab, in the ScanPerformanceProfiles row, drag the slider to one of the settings.Your options are:

1 Full Scan

1 Standard Trust

1 High Trust

4 In the Settings window, click Apply.

To configure ScanPerformanceProfiles from theNortonInsight - Application Ratings window

1 In the Norton 360 main window, move the mousepointer over PCSecurity, and then click RunNortonInsight.

87Monitoring your system's performanceAbout System Insight

Page 88: Help

2 In the Norton Insight - Application Ratingswindow, in the ScanPerformanceProfiles row, dragthe slider to one of the settings. Your options are:

1 Full Scan

1 Standard Trust

1 High Trust

3 Click Close.

About Monthly ReportMonthly Report lets you view a summary of whatNorton 360 has done for you. Norton 360 displays themonthly report every 30 days after you install yourproduct. After 30 days of installation, Norton 360displays the Monthly Report automatically. If you donot want Norton 360 to display the Monthly Reportautomatically, you can select the Do not displaymonthly reports automatically option in the Norton360 Monthly Report window.

You can view the Monthly Report using the CheckMonthly Report option that is present in the MyAccount window.

Norton 360 lets you turn off or turn on Monthly Reportfrom the AdministrativeSettings window. The Norton360 Monthly Report window displays the Tip of themonth to recommend some of the product’s featuresand services.

When your product expires after the trial period,Monthly Report displays the activation status of yourproduct. However, when your product expires after thesubscription period, Monthly Report displays thesubscription status of your product.

Monitoring your system's performanceAbout System Insight

88

Page 89: Help

Norton 360 provides reports based on the followingcategories:

Lets you view the details of thevarious attacks your PC isprotected from

For example, you can view thetotal number of viruses andspyware from which you areprotected.

PC Security

Lets you view the details ofAntiphishing activities

For example, you can view thetotal number of knownauthenticated sites that youvisited.

Identity Protection

Lets you view the details ofBackup activities

For example, you can view thetotal number of files that youbacked up on drive C of yourcomputer.

Backup

Lets you view the details of PCTuneup activities

For example, you can view thetotal number of Internet Explorertemporary files and Windowstemporary files that areremoved.

PC Tuneup

Monthly Report lets you view the latest news onInternet security and also provides information on howto stay safe while you are online. You can click the ReadMore option in the Norton 360 Monthly Reportwindow to view more information on how to stay safeonline.

89Monitoring your system's performanceAbout System Insight

Page 90: Help

Viewing the Monthly Report

The Monthly Report lets you view how Norton 360protected you for the past 30 days. This report includesdifferent activities that Norton 360 performed toprotect your computer.

The Monthly Report provides information about thefollowing activities:

1 The total number of threats that Norton 360detected on your computer.

1 The total number of phishing and authenticatedWeb sites that you visited.

1 The total number of files that you backed up.

1 The total number of unwanted files and the obsoleteWindows registry entries that are removed.

If you do not want Norton 360 to display the MonthlyReport automatically, you can do one of the following:

1 Select the Do not display monthly reportsautomatically option in the Norton 360 MonthlyReport window.

1 Turn off the Monthly Report option in theAdministrative Settings window.

To view the Monthly Report

1 In the Norton 360 main window, click Account.

2 In the My Account window, click Check MonthlyReport.

3 Click Close.

Monitoring your system's performanceAbout System Insight

90

Page 91: Help

This chapter includes the following topics:

1 About total protection

1 About keeping your computer secure

1 About solving connection problems

1 About responding to emergencies

1 About monitoring protection features

1 About viewing details of system vulnerabilities

About total protectionNorton 360 offers total protection of your PC thatincludes Antivirus and Spyware Protection, onlineidentity theft protection, backup, and PC tuneupcapabilities. It provides a complete protection againsta wide range of threats, leaving you free to work andplay confidently on your PC.

After you install Norton 360 and set up a backupstorage destination, it then does all the rest. You donot have to do anything else to be protected. However,Norton 360 also lets you customize your firewallsettings or adware protection, or set your own schedulefor automatic activities.

3Maintaining totalprotection

Page 92: Help

Norton 360 is grouped into the following fourcategories of protection:

Blocks and removes virusesand spyware from email anddownloaded sites, protectsagainst emerging threats,scans, cleans emailattachments, and securesconnections and datatransmission between yourcomputer and the Internet

PC Security

Helps to guard againstidentity theft, verifiesauthenticity of Web sites

Identity Protection

Backs up all your importantfiles and data to a variety ofstorage locations

Backup

Finds and fixes commoncomputer problems, cleansup unwanted cookies andfiles, and defragments thehard disk to optimize PCperformance

PC Tuneup

About keeping your computer secureNorton 360 automatically protects your PC when youinstall it and updates itself regularly to maintainprotection. However, you can increase the security ofyour PC further by learning how to avoid threatsagainst your PC and your data.

To avoid email threats, do the following:

1 Open only those email attachments that come froma trusted source and that you expect to receive.

Maintaining total protectionAbout keeping your computer secure

92

Page 93: Help

1 Delete all unwanted messages without openingthem.

1 Do not respond to email that you suspect is spam.Delete it.

1 Be wary of any email that requests confidentialinformation, and confirm the authenticity of therequest before you reply.

To protect yourself from phishing attempts, do thefollowing:

1 When you visit a Web site, type the address directlyinto your browser rather than clicking a link.

1 Provide personal information only on trusted sites.Examples include the sites that have "https" in theWeb address or that have a lock icon at the bottomof the browser window.

1 Do not provide personal information to anyunsolicited requests for information.

To avoid viruses, worms, and Trojan horses, do thefollowing:

1 Transfer files to your PC only from a well-knownsource or a trusted source.

1 Do not send or receive files over instant messagingconnections.

1 Terminate an instant messaging connection if aperson on your buddy list sends strange messages,files, or Web links.

To avoid spyware, do the following:

1 Do not approve suspicious error messages fromwithin your Web browser.

1 Be suspicious of "free deal" offers because spywaremay come as part of such a deal.

1 Carefully read the End User License Agreement forthe programs that you install. Also, do not installa program if other programs are installed as partof the required program.

93Maintaining total protectionAbout keeping your computer secure

Page 94: Help

About solving connection problemsNorton 360 uses an Internet connection to supportseveral of its protection features. If you use a proxyserver to connect to the Internet, you must configurethe proxy settings of Norton 360. You can configureNetwork Proxy Settings in the AdministrativeSettingswindow.

If you cannot connect to the Internet after you installNorton 360, you can use the Support features to helpyou troubleshoot your connection problem.

About responding to emergenciesNorton 360 automatically downloads definition updatesregularly and secures your computer from latestviruses and unknown threats. In addition, Norton 360monitors your Internet activities to protect yourcomputer from the Internet-based threats that exploitsoftware vulnerabilities.

However, security issues can arise, and you need todecide which action to take.

If you think that your computer is infected with a virusor with destructive software, you can take the followingactions:

Helps you to scan the possiblevirus-infected areas of acomputer that the viruses andother security risks often target

Because this scan does not scanyour entire computer, it takeslesser time to run than a FullSystem Scan.

Quick Scan

Maintaining total protectionAbout solving connection problems

94

Page 95: Help

Checks all boot records, files,and running programs to protectyour computer from viruses andspyware

It also runs other tasks (such asLiveUpdate, Cleanup, DiskOptimization, and Backup) toprovide a high level of protectionand improve the performance ofyour computer. Consequently,when you run a Full System Scanwith administrator privileges, itscans more files than when yourun it without administratorprivileges. This scan might takemore time than the other scans.

Full System Scan

Checks for vulnerabilities andrisks, and protects yourcomputer by running thefollowing checks:1 LiveUpdate

1 Virus and Spyware Scan

1 InternetExplorer TemporaryFiles

1 Windows Temporary Files

1 Internet Explorer History

1 Disk Optimization

1 Registry Cleanup

1 Backup

Custom Scan

When you right-click a folder, the shortcut menudisplays Norton 360 and then Scan Now option. Youcan use this command to scan any particular folder.

When you right-click a file, the shortcut menu displaysNorton 360 and then Insight Network Scan option.You can use this command to scan a file using bothlocal definitions and definitions that are hosted in theCloud.

95Maintaining total protectionAbout responding to emergencies

Page 96: Help

About monitoring protection featuresYour Symantec product maintains records of allprotection-related actions that it takes and theactivities that it monitors. You can review the historyand the logs through Security History. You can viewsummary and results of activities and scans. You canalso monitor other security tasks.

About Security HistorySecurity History provides a centralized location inwhich you can do the following activities:

1 View the summary of alerts and event messages.

1 View the results of scans that are run on yourcomputer.

1 View the items that you submitted to SymantecSecurity Response.

1 Manage Quarantine items.

1 Monitor the security tasks that your productsperform in the background.

Security History lets you monitor the security tasksthat your product performs in the background. Inaddition, the alerts that you receive can be reviewedat any time in Security History. If you cannot reviewan alert when you receive it, you can review it later inSecurity History.

The alerts, scan results, and other security items thatare related to various product features appear undertheir respective categories in the Security Historywindow. For example, the security items that arerelated to the Quarantine feature appear under theQuarantine category. In addition, the SecurityHistorywindow displays details of each item in the Detailspane.

Based on their functionalities, Security History broadlyorganizes all categories into the All Activity,ComputerProtection, Internet, Miscellaneous, or PCTuneup groups.

Maintaining total protectionAbout monitoring protection features

96

Page 97: Help

By default, the following information categories areavailable in the Security History window:

1 Recent History

1 Full History

1 Scan Results

1 Resolved Security Risks

1 Unresolved Security Risks

1 Quarantine

1 SONAR Activity

1 Firewall – Network and Connections

1 Firewall – Activities

1 Intrusion Prevention

1 Download Insight

1 AntiSpam

1 Email Errors

1 Sites reported to Symantec

1 Identity

1 Norton Community Watch

1 Norton Product Tamper Protection

1 Silent Mode

1 Norton Error Reporting

1 Performance Alert

1 Registry Cleanup

1 File Cleanup

1 Disk Optimization

1 Backup

1 LiveUpdate

You can view the security items based on the categoryof events that you select and the search string that youprovide. Norton 360 restricts the number of searchresults that appear on each page in the SecurityHistory window. Therefore, Security History dividesthe items that are returned for any search criteria anddisplays them on separate pages. You can use the

97Maintaining total protectionAbout monitoring protection features

Page 98: Help

pagination scroll at the bottom of the window tonavigate to different pages sequentially. In case youwant to view a specific page, you can use the Gotopageoption to open the page. The maximum number ofitems that appear per page is 100.

Norton 360 also lets you save the security eventshistory. You can view the security event informationwhenever you want. If you want to analyze the securityevents for a particular day, you can save the SecurityHistory logs for that day. You can later import the fileinto Security History and analyze the data.

Viewing items in Security History

Security History provides a record of all the activitiesthat Norton 360 performed on your computer.

You can view all the activities including:

1 Security History alerts and event messages

1 Results of different scans

1 Information that you submitted to SymantecSecurity Response

1 Quarantined items

1 Norton 360 firewall activities

1 Norton 360 PC Tuneup activities

1 Norton 360 backup and restore activities

1 Security tasks that Norton 360 performed in thebackground

The items that are related to the various productfeatures appear under their respective categories inthe SecurityHistory window. For example, the securityitems that are related to the Quarantine feature appearunder Quarantine category in the Security Historywindow. In addition, the Security History windowdisplays details of each item in the respective category.

To view items in Security History

1 In the Norton 360 main window, click Tasks.

Maintaining total protectionAbout monitoring protection features

98

Page 99: Help

2 In the Tasks window, under General Tasks, clickCheck Security History.

99Maintaining total protectionAbout monitoring protection features

Page 100: Help

3 In SecurityHistory window, in the Show drop-downlist, select the category of items that you want toview. Your options are:

The Recent History view inthe Security History window

Recent History

displays the alerts that youreceived during the last sevendays. It lists the history ofcertain recent securityevents.

The Full History view in theSecurity History window

Full History

displays the completeSecurity History.

You can scan your computerto check if any virus, spyware,

Scan Results

malware, or security risk hasinfected your computer.

The Scan Results view in theSecurity History windowdisplays the details about thescans that are run on yourcomputer.

Maintaining total protectionAbout monitoring protection features

100

Page 101: Help

The security risks include thesuspicious programs that cancompromise the security ofyour computer.

The Resolved Security Risksview in the Security Historywindow displays a list ofsecurity risks that Norton 360has detected and thenrepaired, quarantined, orremoved. The quarantineditems are listed in theQuarantine view. You canalso view the quarantineditems in theQuarantine view.

Resolved Security Risks

The security risks include thesuspicious programs that cancompromise the security ofyour computer.

The Unresolved SecurityRisks view in the SecurityHistorywindow displays a listof security risks that Norton360 was not able to repair,remove, or quarantine.

Security History does not letyou clear logs for theunresolved security risks.

Unresolved Security Risks

101Maintaining total protectionAbout monitoring protection features

Page 102: Help

The Security HistoryQuarantine provides a safelocation on your computerwhere you can isolate itemswhile you decide an action totake on them.

The Quarantine view in theSecurity History windowdisplays all of the securityrisks that are isolated in theSecurity History Quarantine.

Quarantine

Symantec Online Network forAdvanced Response (SONAR)identifies new threats basedon the suspicious behavior ofapplications. SONAR detectsand protects your computeragainst malicious code evenbefore virus definitions areavailable throughLiveUpdate.

The SONAR Activity view inthe Security History windowdisplays details about thesecurity risks that SONARdetects. This category alsolists any activity thatmodifies the configuration orthe settings of yourcomputer.

The More Details option forthis category provides detailsabout the resources that thisactivity affects.

SONAR Activity

Maintaining total protectionAbout monitoring protection features

102

Page 103: Help

The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.

The Firewall - Network andConnections category in theSecurity History windowdisplays information aboutthe networks that yourcomputer connects to. It alsodisplays the actions that youhave taken to trust or torestrict networks andcomputers.

This category also displays ahistory of all of the TCP/IPnetwork connections thatwere made with yourcomputer. Networkconnections are logged whenthe connection is closed.

The Security History -AdvancedDetailswindow forthis category lets you modifytrust or restrict settings forcomputers and networks.

Firewall - Network andConnections

103Maintaining total protectionAbout monitoring protection features

Page 104: Help

The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.The firewall maintains rulesto control Internet access toand from your computer.

The Firewall - Activities viewin the Security Historywindow displays the rulesthat firewall creates. Therules that you create alsoappear in this view.

The Security History -AdvancedDetailswindow forthis category shows thecreated Program rules. It alsolets you allow a blockedprogram rule.

Firewall - Activities

Intrusion Prevention scans allthe network traffic thatenters and exits yourcomputer for known threats.

The Intrusion Preventionview in the Security Historywindow displays detailsabout recent IntrusionPrevention activities.

The Security History -AdvancedDetailswindow forthis category lets you controlwhether or not to be notifiedwhen Intrusion Preventiondetects an IntrusionPrevention signature.

Intrusion Prevention

Maintaining total protectionAbout monitoring protection features

104

Page 105: Help

Download Insight processesany executable file that youdownload for analysis of itsreputation level. It theninforms you about theprocessing results based onthe Download Insightsettings.

The Download Insight viewin the Security Historywindow displays details of allevents that Download Insightprocesses and notifies. Thisview also containsinformation about the actionsthat you take based on thereputation data of the events.

Download Insight

Norton AntiSpam protectsyour computer from exposureto unsolicited email.

The AntiSpam view in theSecurity History windowdisplays details about theemail messages thatAntiSpam has processed.

AntiSpam

105Maintaining total protectionAbout monitoring protection features

Page 106: Help

Email errors include anyfailure that occurs whenNorton 360 tries to send,download, or scan an emailmessage that you send orreceive.

The Email Errors view in theSecurity History displaysdetails about any Email Erroralerts that you receive whenan Email error occurs. Detailsinclude the Error ID and theErrormessage. This view alsodisplays information aboutsubject, sender address, andthe recipient address that arerelated to the email messagein the alert.

Email Errors

In some cases, you mighthave submitted evaluation ofcertain Web pages toSymantec.

This view in the SecurityHistory window displays allthe Web sites that youreported to Symantec toverify authenticity.

Sites reported to Symantec

Maintaining total protectionAbout monitoring protection features

106

Page 107: Help

The various features ofIdentity Safe help youmanage your identities andprovide additional securitywhile you perform onlinetransactions.

The Identity view in theSecurity History windowdisplays the Antiphishingdefinitions that Norton 360downloads when you runLiveUpdate to obtain thelatest virus definitions.

Identity

The Norton CommunityWatch feature lets yousubmit any suspicioussecurity or suspiciousapplication data to Symantecfor analysis. Symantecassesses the data todetermine the new threats.

The Norton CommunityWatch view in the SecurityHistorywindow displays a listof files that you havesubmitted to Symantec foranalysis. Files, at variousstages of submission, alsoappear in the list.

Norton Community Watch

107Maintaining total protectionAbout monitoring protection features

Page 108: Help

Norton Product TamperProtection lets you protectyour Norton product from anyattack or modification byunknown, suspicious, ormalicious applications.

The Norton Product TamperProtection view in theSecurity History windowdisplays details aboutunauthorized attempts tomodify Symantec processes.The tasks that your Symantecproduct blocks also appear inthe list.

Norton Product TamperProtection

SilentMode suppresses alertsand notifications andtemporarily suspends mostof the background activities.

The Silent Mode view in theSecurity History windowdisplays the summary of theSilent Mode sessions.

The summary includes thefollowing information:1 The type of Silent Mode

such as Silent Mode orQuiet Mode

1 The type of program thatturns on Silent Mode suchas disk burning or TVrecording

1 The name ofUser-Specified programthat turns on Silent Mode

1 Whether Silent Mode isturned on or turned off

Silent Mode

Maintaining total protectionAbout monitoring protection features

108

Page 109: Help

Errors occur in some cases.For example, an error canoccur when you runLiveUpdate or scan a Webpage. Engine errors, timeouterrors, and program errorsare some of the types oferrors.

The Norton Error Reportingview in the Security Historywindow displays any errorthat Norton 360 hasgenerated.

Norton Error Reporting

The performance alertfeature lets you view,monitor, and analyze theimpact of the systemactivities on your computer.

The Performance Alert viewin the Security Historywindow provides detailsabout the impact of theprocesses that run on yourcomputer. The details includethe process name, theresources used, the extent ofresource utilization, and theoverall impact of the processon your computer. Inaddition, logs related toperformance alerts and theprograms that you haveexcluded from performancealerts also appear in the list.

Performance Alert

109Maintaining total protectionAbout monitoring protection features

Page 110: Help

The windows registry cancontain the entries that referto files that do not exist. Suchbroken registry items canslow down your computer.Registry Cleanup scans yourcomputer and cleans anybroken registry entries thatit finds.

TheRegistry Cleanup view inthe Security History windowdisplays the list of theRegistry Cleanup activitiesthat been performed in yourcomputer.

Registry Cleanup

The File Cleanup featureremovesunwanted temporaryfiles including leftoverInternet browser files,Internet search words, andother temporary files.

The File Cleanup view in theSecurity History windowshows the list of the FileCleanup activities that wereperformed on your computer.

File Cleanup

Disk optimization is a processin which the physicallocations of files arestreamlined. Files andmetadata are re-arranged toimprove data access time.

The disk optimization view inthe Security History windowshows the list of the diskoptimization activities thatwere performed on yourcomputer.

Disk Optimization

Maintaining total protectionAbout monitoring protection features

110

Page 111: Help

TheBackup view displays thelist of the backup and restoreactivities that you performed.

Backup

LiveUpdate obtains the latestvirus definition updates andthe program updates to allthe Symantec products thatyou installed on yourcomputer. These updatesprotect your computer fromnewly discovered threats.

The LiveUpdate view in theSecurity History windowshows the details of theLiveUpdate activities on yourcomputer. The details includethe severity, the status, andthe duration of theLiveUpdate sessions on yourcomputer.

LiveUpdate

4 Click a row to view details for that item.If you want to view additional information, clickMoreDetails. You can view the advanced details inthe Security History-Advanced Details windowand take actions as needed. For some categories, theMoreDetails option opens the File Insight windowthat displays the details about the selected SecurityHistory event. You must use the Options link in theSecurity History window to select an action thatNorton 360 must perform on any item in thesecategories. The Options link is also available in theFile Insight window for certain items.

About the Details window

The SecurityHistory -AdvancedDetails window letsyou view more information about the items that youselect in the various Security History views. You can

111Maintaining total protectionAbout monitoring protection features

Page 112: Help

also perform any action that is available for the selecteditem.

The following table lists the categories that providethe advanced details about the Security History items:

Displays the followinginformation about the item:1 Severity

This category displays therisk level of the selecteditem. The various levels ofsecurity risks are High,Medium, Low, and Info.

1 Activity

This category displays theactivity that has causedSecurity History to identifythe item as a security threat.

1 Date & Time

This category displays thedate and time of the activity.

1 Status

This category displays thestatus of the action that hasbeen taken on the item.

1 Recommended Action

This category displays theactions that you should taketo resolve the security threat.

Alert Summary

Displays the detailedinformation of the item

Some of the detailed informationincludes risk level, risk category,submission date of the risk, riskstatus, risk description, andrecommended actions for theitems.

Advanced Details

Maintaining total protectionAbout monitoring protection features

112

Page 113: Help

Displays the actions that areavailable for the selected item

The options in the Actions viewvary depending on the optionsthat are available in the Showdrop-down list in the SecurityHistory window.

The following are some of theActions options:1 Restore & exclude this file

This action returns theselected Quarantine item toits original location withoutrepairing it. The quarantineditem is also excluded frombeing detected in the futurescans.

This option is available in theQuarantine view.

1 Remove this file fromhistory

This action removes theselected Quarantine itemfrom the Security History log.

This option is available in theQuarantine view.

1 Submit to Symantec

This action sends theselected Quarantine item toSymantec. You can use thisoption if you suspect that anitem is infected, even if scanshave not identified it as arisk.

This option is available in theQuarantine view.

Actions

113Maintaining total protectionAbout monitoring protection features

Page 114: Help

Displays the links that providethe information that is relatedto the selected item

For some Security History items,this view lets you access therelevant settings pane of theNorton 360 window.

Risk Management

About the File Insight window

The File Insight window provides details about anyFile of Interest that is available on your computer. Thisoption of file analysis is available for the files that youdownload, scan, or use to perform an activity.

You can access the File Insight window in differentways. For example, you can use the variousnotifications, alerts, scan and performance-relatedwindows, and the shortcut menu of the various filesthat are present on your computer to open the window.Security History provides a centralized location whereyou can access the File Insight windows of the variousevents that are related to Security Risks, DownloadInsight, and Performance.

Maintaining total protectionAbout monitoring protection features

114

Page 115: Help

The File Insight window lets you view more details ofevents that belong to some of the following categoriesin the Security History window:

Lets you view the detailedinformation about the resolvedsecurity risks in an organizedway.

The Resolved Security Riskscategory includes the infectedfiles that Norton 360 repairs,removes, or quarantines. Thiscategory mostly includes themedium-level or the high-levelrisks that are either quarantinedor blocked.

The File Insightwindow providesdetails about the risk level, theorigin, and the activity report ofthe resolved security risks onyour system.

Resolved Security Risks

Lets you view the detailedinformation about theunresolved security risks in anorganized way.

The Unresolved Security Riskscategory includes the infectedfiles for which Norton 360 wasnot able to take any action. Thiscategory mostly includes thelow-level risks that require yourattention for a suitable action.

The File Insightwindow providesdetails about the risk level, theorigin, and the activity report ofthe unresolved security risks onyour system.

Unresolved SecurityRisks

115Maintaining total protectionAbout monitoring protection features

Page 116: Help

Lets you view the detailedinformation about quarantinedsecurity risks in an organizedway.

The Quarantine categoryincludes the infected files thatare isolated from the rest of yourcomputer while they await yourattention for a suitable action.

The File Insightwindow providesdetails about the risk level, theorigin, and the activity report ofquarantined security risks onyour system.

Quarantine

Lets you view the reputationdetails of a file that youdownload.

You can use these details todetermine the safety level of thefile and then decide the actionthat you want to perform.

Download Insight

Lets you view the performancedetails of any File of Interest thatis available on your computer.

The information includes thegeneral details, the origin andlineage information, theresource usage, and the actionsthat the file has performed onyour system.

Performance Alert

When you click the More link on the far right of a barin the File Insight window, Norton 360 displays vitalinformation in the details area. The informationincludes the general details, origin and lineageinformation, the resource usage, and the actions thatthe file has performed on your system. The following

Maintaining total protectionAbout monitoring protection features

116

Page 117: Help

bars in the File Insight window provide the variousdetails about a file:

Displays the information such asthe confidence level, communityusage of a file and how long agothe file was released.

You can view details such as thesignature and the date on whichthe file was created. You candetermine if a file is a startupfile and the date on which thefile was last used.

Details

Provides the lineage details of afile.

w If the lineage details of afile are not available, Norton 360disables this Origin bar.

Origin

Provides the details about theresource usage of a process andthe effect of the process on theoverall CPU utilization of yourcomputer.

Activity

In addition to viewing details, you can use the LearnMore link to access the online tutorial page to get moreinformation about the file. In some cases, you can usethe Locate this file option in the File Insight windowto find the location of the file on your computer. Thisoption is available only for certain security risks.Norton 360 might provide an icon next to the Locatethis file option. You can use this icon to copy the datafrom the File Insight window to the Clipboard. Afteryou copy the content to the Clipboard, you can open adocument, paste the data, and save the document.

The Options link is available in the FileInsight windowthat is related to certain security risks. You can use

117Maintaining total protectionAbout monitoring protection features

Page 118: Help

this link to select a suitable action to be performed onthe security risk.

About the Threat Detected window

The ThreatDetected window appears whenever Norton360 detects a security risk on your computer. You canuse this window to view details about the risk and selectan action for the risk. Sometimes, you may want toaccess the Threat Detected window for the same riskagain. In that case, the window can be opened at anytime from Security History. Security History is thecentralized location where you can access the ThreatDetected windows of risks that belong to some of thefollowing categories:

This category includes thesecurity risks or the infectedfiles that Norton 360 hasdetected and then repaired,quarantined, or removed.

Resolved Security Risks

This category includes thesecurity risks or the infectedfiles that Norton 360 was notable to repair, remove, orquarantine.

Unresolved SecurityRisks

This category includes thesecurity risk items that areisolated from the rest of yourcomputer while they await yourattention for a suitable action.

Quarantine

The action options in the ThreatDetected window fora risk vary depending on the risk type and its severity

Maintaining total protectionAbout monitoring protection features

118

Page 119: Help

level. The following are some of the options that areavailable in this window:

Returns the security risk that isquarantined to the originallocation on your computer

Restore

Returns the selected Quarantineitem to its original locationwithout repairing it and excludesthe item from being detected inthe future scans

Restore & exclude thisfile

Removes the security risk fromyour computer and quarantinesit

Remove this file

Excludes the security risk fromfuture scan

Exclude this program

Removes the selected securityrisk item from the SecurityHistory log

Remove from history

Takes you to the SymantecSecurity Response Web site

Get help

Sends the security risk toSymantec

Submit to Symantec

Searching in Security History

You can search the items that are listed in SecurityHistory. You can use the Quick Search option to finditems using a keyword or the name of a security risk.If you want to view all of the Security History itemsthat pertain to a particular security risk, you can filterthe items using QuickSearch. For example, if you want

119Maintaining total protectionAbout monitoring protection features

Page 120: Help

to view all of the alerts that Auto-Protect has generated,you can type Auto-Protect and filter the list.

You can clear the search results and return to thecurrent Security History list by clicking the black cross(x) icon in the Quick Search box.

The Quick Search option works on the current viewonly. If you want your search to include all of the itemsin Security History, you must select the Full Historyview.

To search in Security History

1 In the Security History window, in the QuickSearch text box, type the name of the item for whichyou want to search.

2 Click Go.

Exporting or Importing Security History information

Norton 360 lets you export the Security History eventsto a file. The Security History contents with summaryinformation of the events that you export get saved.You can view the security event information wheneveryou want.

For example, you can analyze the security events on aparticular day. You can use the Quick Search optionto obtain a list of all of the items that are related to aparticular security risk. You can then use the Exportoption to save the list in the Security History log. Youcan later import the log file and analyze the data.

Security History stores the information in a separatefile. When the file size reaches its maximum size limit,information that is related to new events overwritesthe information that is related to older events. You canexport the log periodically, if you want to keep theentire Security History information.

You can save your log file in one of the following fileformats:

1 Security History Log Files (.mcf)

Maintaining total protectionAbout monitoring protection features

120

Page 121: Help

The .mcf file format is the Security History Log Filesformat and is proprietary to Symantec.

When you use this file type option, you can viewthe file in the Security History window.

1 Text Files (.txt)

The data is saved in a comma-separated text format.

When you use this file type option, you can openand view the file externally without using SecurityHistory.

You can import only the log files that have .mcf fileextension. When you import a log file, the exported listof Security History information in the log file appears.This list replaces the current security events list. Youcan select an option in the Show drop-down list to viewthe option-specific details that are saved in the log file.To revert to the current Security History list you mustclose the log file.

To export Security History information

1 In the Norton 360 main window, click Tasks.

2 In the Tasks window, under General Tasks, clickCheck Security History.

3 In the Security History window, in the Showdrop-down list, select an option.

4 Click Export.

5 In the Save As dialog box that appears, navigate toa location and specify the name for the file.The category name in the Show drop-down listappears as the default file name. You can provide afile name of your choice.

6 In the Save as type box, select the format in whichyou want to save your log file.

7 Click Save.

To import Security History information

1 In the Norton 360 main window, click Tasks.

2 In the Tasks window, under General Tasks, clickCheck Security History.

3 In the Security History window, click Import.

121Maintaining total protectionAbout monitoring protection features

Page 122: Help

4 In the Open dialog box that appears, browse to thefolder that has the file you want to import.

5 Select the .mcf file and click Open.You can only open log files of .mcf format in theSecurity History window. You can open and viewlog files of .txt file externally without using SecurityHistory.In the import mode, you cannot make modificationsto the information. For example, you cannot clearthe logs. You can revert to the current SecurityHistory list by clicking the Closefile: file_name.mcflink.

Managing items in the Quarantine

The Security History Quarantine provides a safelocation on your computer where you can isolate itemswhile you decide an action to take on them.Quarantined items are isolated from the rest of yourcomputer so that they cannot spread or reinfect yourcomputer. In some cases, you may have an item thatyou think is infected, but is not identified as a risk bythe Norton 360 scans. You can manually place the itemin the Quarantine.

You cannot open quarantined items accidentally andspread the virus, but you can evaluate the quarantineditems for possible submission to Symantec.

The Security History Quarantine includes the followinggroups of items:

Includes the items suchas spyware and adwarethat are generally low riskand that another programrequires to functionproperly.

You can restore theseitems if necessary.

Security risks

Maintaining total protectionAbout monitoring protection features

122

Page 123: Help

Includes viruses andother high-risk items.

Security threats

Once an item has been quarantined, you have severaloptions. All of the actions that you take on quarantineditems must be performed in the Security HistoryQuarantine.

To perform an action on a quarantined item

1 In the SecurityHistory window, in the Quarantineview, select the item on which you want to performthe action.

2 In the right pane, click Options.You can use the More Details link to view moredetails about the item before you select an actionfor it. The link opens the File Insight window thatcontains more information about the risk.

123Maintaining total protectionAbout monitoring protection features

Page 124: Help

3 In the Threat Detected window, select the actionthat you want to perform. Some of the options are:

Returns the security risk thatis quarantined to the originallocation on your computer

This option is available onlyfor the detected viral threats.

Restore

Returns the selectedQuarantine item to itsoriginal location withoutrepairing it and excludes theitem from being detected inthe future scans

This option is available onlyfor the detected non-viralthreats.

Restore & exclude this file

Removes the selected itemfrom the Security History log

Remove from history

Sends the selected item toSymantec for evaluation ofthe security risk

In some cases, Norton 360might not identify an item asa security threat, but youmight suspect that the itemis infected. In such cases, youcan use this option to submitthe item to Symantec forfurther analysis.

Submit to Symantec

You can also navigate to this window by using theOptions link in the File Insight window for somerisks.

4 Follow the on-screen instructions.

Maintaining total protectionAbout monitoring protection features

124

Page 125: Help

Adding an item to the Quarantine

Security History Quarantine provides a safe locationon your computer in which you can isolate items whileyou decide an action to take on them.

The Quarantine view in the SecurityHistory windowdisplays a list of quarantined items. You can view thename and the risk status of each quarantined item.

You can manually add an item to the Security HistoryQuarantine. You can use the AddtoQuarantine optionin the Quarantine view in the SecurityHistory windowto quarantine the items that you suspect are infected.This action has no effect on the items that are alreadyquarantined.

w You cannot add a known Good File to Quarantine.

To add an item to the Quarantine

1 In the SecurityHistory window, in the Quarantineview, click Add to Quarantine.

2 In the Manual Quarantine dialog box, in theDescription text box, type a short name for the itemthat you want to add.This text appears in the Quarantine, so you shoulduse a recognizable description.

3 Click Browse.

4 In the Select File toQuarantine dialog box, browseto the item that you want to add, select it, and thenclick Open.

5 Click Add.

6 Click Close.

Restoring an item from the Quarantine

Some programs rely on other programs that areclassified as security risks to function. The programmay not function if a particular security file is removed.All of the removed security risks are automaticallybacked up in the Security History Quarantine. Thisway, Norton 360 lets you restore any risk to regain the

125Maintaining total protectionAbout monitoring protection features

Page 126: Help

functionality of a program that requires the riskprogram to run.

For example, a shareware or freeware program thatyou download may use adware to keep its price low. Inthis case, you can allow the security risk program toremain on your computer or restore it if SpywareProtection has removed it.

Some quarantined items are successfully disinfectedafter Norton 360 rescans them. You can also restoresuch items.

w If you restore an item to a directory other than itsoriginal location, it may not function properly.Therefore, it is recommended that you reinstall theprogram.

To restore an item from the Quarantine

1 In the SecurityHistory window, in the Quarantineview, select the item that you want to restore.

2 Click Options.

3 In the Threat Detected window, click Restore.In case of non-viral threats, you can use the Restore& exclude this file option. This option returns theselected Quarantine item to its original locationwithout repairing it and excludes the item frombeing detected in the future scans.

4 In the Quarantine Restore window, click Yes.In case of non-viral threats, you can use the optionthat is available in this window to exclude thesecurity risk. Norton 360 does not detect thesecurity risks that you exclude in the future scans.

5 Click Close.

Removing an item from the Quarantine

You can configure Norton 360 to remove a security riskfrom your computer. You can use the Remove this fileoption to remove the security risk and places it in theSecurity History Quarantine. Some programs may relyon the security risk item that you quarantine to

Maintaining total protectionAbout monitoring protection features

126

Page 127: Help

function. In this case, you can restore the security riskto regain the functionality of a program that requiresthe risk program to run.

w The Remove this file option is only available for thesecurity risks that are manually quarantined.

To remove an item from the Quarantine

1 In the SecurityHistory window, in the Quarantineview, select the item that you want to remove.

2 Click Options.

3 In the Threat Detected window, click Remove thisfile.This option is available for the security risks thatare manually quarantined.

4 In the Security Risk Removal window, clickRemove.

5 Click Finish.

Manually submitting an item to Symantec

When a virus or other risk is detected, it isautomatically submitted to Symantec SecurityResponse for analysis. If you have turned off the optionto submit risks automatically, you can manually submitthem from the Security History Quarantine. You musthave an Internet connection to submit an item.

When you submit files to Symantec automatically ormanually, you contribute to the effectiveness of yourSymantec product. For example, you can submit anitem that has not been detected during scanning thatyou believe may be a security risk. Symantec SecurityResponse analyzes the file. If it is identified as asecurity risk, it is added to a future definition update.

Personally identifiable information is never includedin submissions.

In some cases it is necessary for Symantec SecurityResponse to block submissions of a particular type orvolume. These items appear as Not Submitted inSecurity History.

127Maintaining total protectionAbout monitoring protection features

Page 128: Help

To manually submit an item to Symantec

1 In the SecurityHistory window, in the Quarantineview, select the item that you want to submit toSymantec.

2 Click Options.

3 In the Threat Detected window, click Submit toSymantec.

4 In the dialog box that appears, click OK.

About viewing details of systemvulnerabilities

The Intrusion Prevention feature of Norton 360provides a proactive solution to prevent the threatsthat might exploit the vulnerabilities of the programsor the operating system of your computer. Norton 360now provides the Vulnerability Protection featurethat enables you to view details of the protectionfeature against possible attacks on thesevulnerabilities. Vulnerability Protection displays anextensive list of the programs on your computer thatcontain vulnerabilities. In addition, it provides detailsabout the vulnerability and the solution that IntrusionPrevention provides to identify any attack on thevulnerability. You can use Vulnerability Protectionto view the correlation between the vulnerabilities thatyour computer is protected against and the programsthat may contain these vulnerabilities.

About Vulnerability ProtectionVulnerability Protection is a component of IntrusionPrevention System. Vulnerability Protection providesinformation about the susceptibility of the programsthat may be on your computer against maliciousattacks. It also provides information about the knownattacks that they are protected from.

Maintaining total protectionAbout viewing details of system vulnerabilities

128

Page 129: Help

Vulnerabilities are flaws in your programs or youroperating system that can create weaknesses in overallsecurity of your system. Improper computerconfigurations or security configurations also createvulnerabilities. External attackers exploit thesevulnerabilities and perform malicious actions on yourcomputer. Examples of such malicious attacks areactive desktop monitoring, keylogging, and hacking.Such attacks can slow down the performance of yourcomputer, cause program failure, or expose yourpersonal data and confidential information to thehackers.

Norton 360 provides the signature-based solutions toprotect your computer from the most common Internetattacks. Attack signatures contain the information thatidentifies an attacker’s attempt to exploit a knownvulnerability in your operating system or yourcomputer programs. The Intrusion Prevention featureof Norton 360 uses an extensive list of attack signaturesto detect and block suspicious network activity.

Vulnerability Protection lets you view the correlationbetween the vulnerabilities that your computer isprotected against and the programs that may containthese vulnerabilities. For example, if Internet Explorerdoes not handle certain HTTP responses, it can resultin a vulnerability that can be exploited. In this case,Vulnerability Protection lists Internet Explorer as avulnerable program. It also provides details about thesignatures that Intrusion Prevention uses to detect anyattempt to exploit this vulnerability.

Viewing the list of vulnerable programs

The Vulnerability Protection window lets you viewthe extensive list of programs with the knownvulnerabilities that Norton 360 protects you against.

For each program, you can view details such as thename of the program, its vendor, and the number ofvulnerabilities that the program contains. You can also

129Maintaining total protectionAbout viewing details of system vulnerabilities

Page 130: Help

view more details about the vulnerabilities by clickingon the program name.

To view the list of vulnerable programs

1 In the Norton 360 main window, click Tasks.

2 In the Tasks window, under General Tasks, clickCheck Vulnerability Protection.

3 After you finish viewing the list, click Close.

Viewing details about a vulnerable application

The VulnerabilityProtection window displays the listof the programs on your computer that are susceptibleto malicious attacks. In addition, you can view detailsof the vulnerabilities that a program contains. TheProgram Vulnerability Details window displays thenames of the attack signatures that IntrusionPrevention uses to detect any attempts to exploit thevulnerabilities in the program.

You can click an attack signature to get additionalinformation about the signature in the SymantecSecurity Response Web site.

The Intrusion Signatures window of IntrusionPrevention lets you view a list of attack signatures.Intrusion Prevention relies on this list of attacksignatures to detect and block suspicious activity. Youcan uncheck a signature from the list, if you do notwant Norton 360 to monitor the signature. TheProgram Vulnerability Details list does not includeany signature that you disable in the IntrusionSignatures window. By default, all the signatures inthe IntrusionSignatures window are turned on. Unlessyou have a good reason to disable a signature, youshould leave the signatures turned on. If you disable asignature, your computer may be vulnerable to attack.

To view details about a vulnerable application

1 In the Norton 360 main window, click Tasks.

2 In the Tasks window, under General Tasks, clickCheck Vulnerability Protection.

Maintaining total protectionAbout viewing details of system vulnerabilities

130

Page 131: Help

3 In the Vulnerability Protection window, in theProgram column, click the program name for whichyou want to view the details.

4 In the ProgramVulnerabilityDetails window, viewthe signature details of the program.

5 If you want to view additional information aboutthe signature, then click the signature name.

6 After you finish viewing the vulnerability details,in the ProgramVulnerabilityDetails window, clickClose.

7 In the VulnerabilityProtection window, click Close.

131Maintaining total protectionAbout viewing details of system vulnerabilities

Page 132: Help

Maintaining total protectionAbout viewing details of system vulnerabilities

132

Page 133: Help

This chapter includes the following topics:

1 About the Norton 360 scan

1 About Computer Scan

1 About Insight Network scan

1 About Reputation Scan

1 About Scan Facebook Wall

1 About SONAR Protection

1 About scanning Office documents

1 About Silent Mode

1 Running a scan at the command prompt

About the Norton 360 scanNorton 360 scans secure your computer from all typesof viruses and unknown threats using the latest virusdefinitions. It also scans all the Internet activities thatare performed on your computer to protect yourcomputer from the Internet-based threats that exploitsoftware vulnerabilities.

Norton 360 automatically performs different types ofscans to secure your computer from latest threats. It

4Scanning yourcomputer

Page 134: Help

also lets you run different types of scans manually tosecure your computer.

By using Norton 360, you can run the following typesof scans:

Computer Scan uses the latestvirus definitions that areavailable locally in the computer.

If you suspect that yourcomputer is infected, you canrun three types of computerscans manually to prevent virusinfections on your computer. Thethree types of scans that areavailable under Computer Scanare Quick Scan, Full SystemScan, and Custom Scan.

Computer Scan

Insight Network Scan uses thevirus definitions that areavailable locally and hosted inthe Cloud. InsightNetwork Scandetects the files that aresuspicious or vulnerable on yourcomputer using thereputation-based threatdetection. Norton 360 performsan Insight Network Scan onlywhen the Insight Protectionoption is turned on. By default,the Insight Protection option isturned on.

You can see this InsightProtection option under Scansand Risks tab in the Antivirussettings window.

Insight Network Scan

Scanning your computerAbout the Norton 360 scan

134

Page 135: Help

Reputation Scan displays thereputation information of thefiles. It displays the reputationinformation such as communitysummary, local summary, trustlevel, prevalence. ReputationScan displays the detailedreputation information of thegood files and the number of badfiles that have been detected orremoved.

Reputation Scan also internallyperforms Computer Scan andInsight Network Scan to detectthe threats. The different typesof scans that are available underReputation Scan areQuick Scan,Full System Scan, and CustomScan.

w Norton 360 ReputationScan is applicable only for theexecutable files and the installerfiles.

Reputation Scan

135Scanning your computerAbout the Norton 360 scan

Page 136: Help

Scan Facebook Wall lets youscan the links and URLs that areavailable on your Facebookprofile.

When you click the ScanFacebook Wall option, Norton360 takes you to the Facebooklogin Web page. After you log into your Facebook profile, NortonSafe Web asks you to grantpermission to access yourFacebook wall. To do so, use thegrant us permission to accessyour stream option available onthe Facebook Web page, andthen follow the on-screeninstructions. After you grantpermission, Norton safe Webscans all the available links onyour Facebook wall each timeyou use Scan Facebook Walloption. It then displays thesecurity status of the scannedURLs.

Scan Facebook Wall

Norton 360 also performs Idle Time Scans. Idle TimeScans detect the time when you are not using yourcomputer and intelligently run scans depending on thescan history of your computer. Norton 360 keeps yourcomputer secure from latest threats by automaticallyrunning scans on your computer by using the Idle TimeScans feature. You can use Idle Time Scans to protectyour computer against virus infections withoutcompromising the performance of your computer. IdleTimeScans automatically detect the idle state of yourcomputer and runs a Quick Scan or a Full System Scan.

Scanning your computerAbout the Norton 360 scan

136

Page 137: Help

About Computer ScanNorton 360 automatically downloads latest virusdefinition regularly and secures your computer fromall types of viruses and unknown threats. When Norton360 performs a Computer Scan, it uses the latest virusdefinitions that Symantec provides.

The threat detections that are based on the localdefinition are specified with a specific name. Forexample, if a Trojan horse is detected, the scan resultsof the Computer Scan displays the threat as Trojan.Foo.You can click the Run Scans option available in theTasks window to access the different types of computerscans.

If you suspect that your computer is infected, you canrun three types of computer scans manually to preventvirus infections on your computer.

You can run the following types of Computer Scans:

Scans the important locations ofyour computer that the virusesand other security threats oftentarget.

Quick Scan takes less time toscan than a Full System Scanbecause this scan does not scanyour entire computer.

Quick Scan

137Scanning your computerAbout Computer Scan

Page 138: Help

Scans your computer for alltypes of viruses and securitythreats.

Full System Scan thoroughlyexamines your entire computerfor viruses, spyware, anddifferent security vulnerabilities.It also runs LiveUpdate, Virusand Spyware Scan, diskoptimization, and backup. Inaddition, it cleans up theInternet Explorer temporary filesand Windows temporary files.

Full System Scan

Checks for softwarevulnerabilities, backups, anddisk optimization.

UsingCustomScan, you can runLiveUpdate and Virus andSpyware Scan. You can also backup your data, free disk space bycleaning up disk clutter, andoptimize your disk volume.

Custom Scan

Computer Scan provides details about the scanneditems. You can view the details such as total numberof files that are scanned, total security risks detected,total security risks resolved, and the total items thatrequire attention. It also provides you the differentways to resolve any items that were not automaticallyresolved during the scan. You can also view the severityof the risk, the name of the risk, and the status of therisk about the resolved items.

Running a Quick ScanA Quick Scan helps you to scan the possiblevirus-infected areas of a computer that the viruses andother security risks often targets. Because this scan

Scanning your computerAbout Computer Scan

138

Page 139: Help

does not scan your entire computer, it takes less timeto run than a Full System Scan.

When Norton 360 performs Quick Scan for the firsttime, it automatically runs LiveUpdate, and cleans upthe Internet Explorer temporary files and Windowstemporary files.

When the Insight Protection option is turned on,Norton 360 simultaneously performs a traditionalQuick Scan and an Insight Network Quick Scan. Bydefault, the Insight Protection option is turned on.

You can also export the scanned results to yourpersonal folder. For example, the Export Virus andSpyware Scan Results link in the Activities and ScanDetails window lets you save the results of virus andspyware scan status.

For some activities, you can also see more detailedinformation about the scanned results. For examplethe Details link in the Activities and Scan Detailswindow lets you view more detailed information aboutthe scanned results.

To run a Quick Scan

1 In the Norton 360 main window, move the mousepointer over PCSecurity, and then click RunScans.

2 In the Scans window, under Computer Scan, clickQuick Scan.

3 Click Go.You can use the following options:

Suspends the scan temporarily

Click Resume to continue thescan.

Pause

Skips the currently running taskSkip

Terminates a Quick ScanCancel

139Scanning your computerAbout Computer Scan

Page 140: Help

4 In the Activities and Scan Details window, clickClose.

Running a Full System ScanA Full System Scan thoroughly examines your entirecomputer for viruses, spyware, and different securityvulnerabilities.

A Full System Scan runs LiveUpdate, virus and spywarescan, disk optimization, and backup. In addition, itcleans up the Internet Explorer temporary files andWindows temporary files.

You can also export the scanned results to yourpersonal folder. For example, Export Virus andSpywareScanResults link lets you save the results ofvirus and spyware scan status.

A Full System Scan helps you to do the following:

1 Obtain latest protection and program updates.

1 Optimize disks to improve the performance of yourcomputer.

1 Back up your data.

You can back up your files regularly to protect thevaluable information on your computer.

To run a Full System Scan

1 In the Norton 360 main window, move the mousepointer over PCSecurity, and then click RunScans.

2 In the Scans window, under Computer Scan, clickFull System Scan.

Scanning your computerAbout Computer Scan

140

Page 141: Help

3 Click Go.Norton 360 displays the Manage Backup Setswindow. You can save the default backup set orcreate a new backup set to continue Full SystemScan.You can use the following options:

Suspends the scan temporarily.

Click Resume to continue thescan.

Pause

Skips the currently running task.Skip

Terminates a Full System Scan.Cancel

4 In the Activities and Scan Details window, clickClose.

Running customized scansNorton 360 helps you to choose your own combinationsof scans for viruses, spyware, and securityvulnerabilities.

Using the CustomScan option, you can run LiveUpdateand Virus and Spyware Scan. You can also back up yourdata, free disk space by cleaning up disk clutter, andoptimize your disks.

You can also export the scanned results to yourpersonal folder. For example, the Export Virus andSpywareScanResults link lets you save the results ofvirus and spyware scan status.

To run customized scans

1 In the Norton 360 main window, move the mousepointer over PCSecurity, and then click RunScans.

141Scanning your computerAbout Computer Scan

Page 142: Help

2 In the Scans window, under Computer Scan, clickCustom Scan.Check or uncheck the combinations that you wantNorton 360 to perform. To select all thecombinations check the Scans option.

3 Click Go.Norton 360 displays the Manage Backup Setswindow if you have checked Backup. You can savethe default backup set or create a new backup setto continue customized scan.

4 In the Scans window, check the scan items that youwant to run, and then click Go.You can use the following options:

Suspends the scan temporarily

Click Resume to continue thescan.

Pause

Skips the currently running task.Skip

Terminates the customized scan.Cancel

5 In the Activities and Scan Details window, clickClose.

About Insight Network scanThe Insight Network scan uses the Cloud technologywherein a remote server on the Web contains the latestvirus definitions. Norton 360 scans your computer forthe latest security threats. When Norton 360 performsthe Insight Network scan, it uses the virus definitionsthat are available locally and in the Cloud. Norton 360provides additional protection by using the most recentdefinitions in the Cloud, apart from the definitions thatare available locally on your computer.

Scanning your computerAbout Insight Network scan

142

Page 143: Help

Norton 360 performs an Insight Network scan onlywhen the Insight Protection option is turned on. Bydefault, the Insight Protection option is turned on.You can see this InsightProtection option under Scansand Risks tab in the Antivirus settings window.

When the Insight Protection option is turned on,Norton 360 performs a traditional scan and an InsightNetwork scan simultaneously. The traditional scanuses the definitions from the local system, and theInsight Network scan uses the definitions that arehosted in the Cloud.

Threat detection based on the Cloud definitions isidentical to the threat detection that is based on thelocal definitions. However, the Cloud definitions arespecified with additional data about the threats that itdetects which indicates that it has been obtained fromthe Internet. Definitions in the Cloud provide a genericname for the risk detected, but the local definitionsprovide the specific name for the risk detected. Forexample, if a Trojan horse is detected, the scan resultsof the Insight Network might display Cloud.Trojan.However, the scan results of the local definition mightdisplay Trojan.Foo.

If the traditional scan completes while the InsightNetwork scan is still running, you can view the InsightNetwork Scan progress status.

The Insight Network scan supports Quick Scan, InsightNetwork context-menu scan, Instant Messenger Scan,and Download Insight scan. It does not support EmailScan, Full System Scan, and Auto-Protect scan.

If the Insight Protection option is turned on, you canmanually run the following types of Insight Networkscans:

1 Insight Network Quick Scan

Norton 360 simultaneously performs a traditionalQuick Scan and an Insight Network Quick Scan toscan the areas of your computer that the virusesoften target. Norton 360 also performs an Insight

143Scanning your computerAbout Insight Network scan

Page 144: Help

Network Quick Scan simultaneously with an IdleQuick Scan.

w The Insight Network scan does not support a QuickScan that runs as a part of an Idle Full System Scan.

1 Insight Network context-menu scan

When you right-click a file, the shortcut menudisplays Norton 360 and then Insight NetworkScan. You can use this command to scan a file usingboth local definitions and definitions that arehosted in the Cloud.

w This Insight Network Scan command is availableonly for single file.

Turning off or turning on Insight ProtectionInsightProtection option lets Norton 360 perform anInsight Network scan on your computer

When the Insight Protection option is turned on,Norton 360 performs a traditional scan and an InsightNetwork scan simultaneously. The traditional scanuses the definitions from the local system, and theInsight Network scan uses the definitions that arehosted in the Cloud. Norton 360 performs only atraditional scan if the Insight Protection option isturned off.

Norton 360 performs an Insight Network scan onlywhen the Insight Protection option is turned on. Bydefault, the Insight Protection option is turned on.

The Insight Network scan supports only InsightNetwork Quick Scan, and Insight Networkcontext-menu scan. Insight Network scan does notsupport a Quick Scan that runs as a part of an Idle FullSystem Scan. It also does not support Full System Scan,Email Scan, single file Office document scan, andAuto-Protect scan.

To turn off or turn on the Insight Protection

1 In the Norton 360 main window, click Settings.

Scanning your computerAbout Insight Network scan

144

Page 145: Help

2 In the Settings window, under Detailed Settings,click Antivirus.

3 In the Antivirus settings window, click Scans andRisks tab.

4 In the Insight Protection row, do one of thefollowing:

1 To turn off Insight Protection, move the On/Offswitch to the right to the Off position.

1 To turn on Insight Protection, move the On/Offswitch to the left to the On position.

5 In the Settings window, click Apply.

About Reputation ScanReputation Scan provides information on thetrust-worthiness of all programs and running processeson your computer. It helps you detect the files that aresuspicious or vulnerable on your computer using thereputation-based threat detection. Norton 360 lets yourun different types of Reputation Scan and detectsuspicious programs on your computer.

Reputation Scan filters the files on the basis of certainfiltering criteria and performs an Insight NetworkScan on the filtered files. Reputation Scan filters thefiles as reputation files. It filters .exe files, .scr files,.sys files, .dll files, .drv files, .ocx files, and .msi filesand analyzes these files.

When you perform a Reputation Quick Scan or FullSystem Scan, Norton 360 considers the Files of Interestthat are available on your computer.

After it has filtered the reputation files, Norton 360performs an InsightNetworkScan. When Norton 360performs an Insight Network Scan, it also performs aComputer Scan. Norton 360 uses the Computer Scanto perform the signature-based threat detection. Itcompares the signature of the filtered reputation filesagainst the known threat signatures to identify threatson your computer. If a security threat is detected,

145Scanning your computerAbout Reputation Scan

Page 146: Help

Norton 360 automatically removes the threat fromyour computer.

Norton 360 uses the Insight Network Scan to detectsuspicious or vulnerable files on your computer usingthe reputation-based threat detection. The InsightNetwork Scan uses the Cloud technology wherein aremote Symantec server on the Web stores the latestreputation information. It checks the Cloud for thereputation information on the filtered files.

Norton 360 obtains specific information such as filename and hash key about the filtered reputation filesand sends this information to the Cloud. The Cloudanalyzes the file information and provides a trust levelfor each file. The Symantec server sends back thereputation information to your computer. If any of thefiltered files is suspicious or vulnerable, Norton 360assigns Bad or Poor trust level. Apart from reputationinformation, Norton 360 also checks for the latest virusdefinitions on the Cloud.

w Your computer must be connected to the Internet toaccess the latest reputation information and virusdefinitions from the Cloud. If your computer is notconnected to the Internet, Norton 360 uses thereputation information that is available locally.

When you perform a Reputation Scan, Norton 360considers only the following categories of files:

This category includesWindows executable files(.exe) and script files (.scr).

Executable files

This category includesWindows System files (.sys),dynamic link library files(.dll), and device driver files(.drv).

System files

Scanning your computerAbout Reputation Scan

146

Page 147: Help

This category includesActiveX control files (.ocx).

Developer files

This category includesWindows Installer Packagefiles (.msi).

Miscellaneous files

Norton 360 lets you scan specific areas of yourcomputer based on the type of Reputation Scan thatyou select. You can manually run the following typesof Reputation Scan:

Scans the important locationsof your computer that theviruses and other securitythreats often target.

When you perform a QuickScan , Norton 360 considersthe Files of Interest thatrelated to loaded programsand the running processes.

Quick Scan

Scans all the Files of Interestthat are available on yourcomputer.

When you perform a FullSystem Scan, Norton 360searches for Files of Intereston all the locations on yourcomputer. The locationsinclude all drives, runningprocesses, loaded programs,and startup files.

Full System Scan

147Scanning your computerAbout Reputation Scan

Page 148: Help

Scans a specific file, folder,drive, or removable drive.

When you perform a customscan,Norton 360 considersonly the filtered reputationfiles.

Custom Scan

Symantec rates a file based on the statistical evaluationthat is done on the file using the Norton CommunityWatch data and Symantec’s analysis. Symantec assignsthe following confidence levels to reputation files:

Symantec has a highindication that the file istrusted.

Good

Symantec does not haveenough information aboutthe file to assign a trust levelto the file.

The file is neither safe norunsafe.

Unproven

Symantec has a fewindications that the file is nottrusted.

This file is suspicious and canharm your computer.

Poor

Symantec has a highindication that the file is nottrusted.

This file is suspicious and canharm your computer.

Bad

When your Reputation Scan is complete, you can viewthe summary of the scan results in the Reputation

Scanning your computerAbout Reputation Scan

148

Page 149: Help

Scan window. You can view the reputation informationsuch as the file name, trust level, age of the file, andcommunity usage for each reputation file. The trustlevel determines whether a file is safe or unsafe. If afile has Poor or Bad trust level, Norton 360 lets youquarantine the file.

Running a Reputation Full System ScanWhen you perform a Full System Scan, Norton 360scans all the Files of Interest that are available on yourcomputer. This fileset includes the files that relate tothe running processes, startup files, and loadedprograms.

To run a Reputation Full System Scan

1 In the Norton 360 main window, move the mousepointer over PCSecurity, and then click RunScans.

2 In the Scans window, under ReputationScan, clickFull System Scan.

3 Click Go.In the Reputation Scan window, you can analyzethe trust level, age, and prevalence of the scanneditems.

4 If there are files with Poor or Bad trust level, clickthe red cross (x) icon to quarantine them.

5 Click Close.

Running a Reputation Quick ScanWhen you perform a Quick Scan, Norton 360 scansonly the running processes and the loaded programs.Reputation Quick Scan does not scan your entirecomputer and it takes lesser time to run than aReputation Full System Scan.

To run a Reputation Quick Scan

1 In the Norton 360 main window, move the mousepointer over PCSecurity, and then click RunScans.

2 In the Scans window, under ReputationScan, clickQuick Scan.

149Scanning your computerAbout Reputation Scan

Page 150: Help

3 Click Go.In the Reputation Scan window, you can analyzethe trust level, age, and prevalence of the scanneditems.

4 If there are files with Poor or Bad trust level, clickthe red cross (x) icon to quarantine them.

5 Click Close.

Running a Reputation Custom ScanNorton 360 lets you scan specific areas on yourcomputer by using the Reputation Custom Scan. Youcan scan any of your computer's drives, removabledrives, folders or files. For example, if you want tocheck the trust level of a specific file, you can scan theparticular file.

To run a Reputation custom scan

1 In the Norton 360 main window, move the mousepointer over PCSecurity, and then click RunScans.

2 In the Scans window, under ReputationScan, clickCustom Scan.

3 Click Go.

4 In the Reputation Custom Scan window, do one ofthe following:

1 Click Drive Scan, select the drive that you wantto scan, and then click Scan.

1 Click FolderScan, select the folder that you wantto scan, and then click OK.

1 Click File Scan, select the file that you want toscan, and then click Open.

In the Reputation Scan window, you can analyzethe trust level, age, and prevalence of the scanneditems.

5 If there are files with Poor or Bad trust level, clickthe red cross (x) icon to quarantine them.

6 Click Close.

Scanning your computerAbout Reputation Scan

150

Page 151: Help

About the Reputation Scan resultsNorton 360 lets you run different Reputation Scans todetect any suspicious programs or vulnerable programson your computer. Norton 360 lets you manually runthe following types of Reputation Scan:

1 Reputation Quick Scan

1 Reputation Full System Scan

1 Reputation Custom Scan

When you run a Reputation Quick Scan, Norton 360considers the Files of Interest which include runningprocesses and loaded programs. When you run aReputation Full System Scan, Norton 360 considers allthe Files of Interest that are available on yourcomputer. When you run a Reputation Custom Scan,Norton 360 lets you select the drive, folder, or file thatyou want to scan.

Reputation Scan filters the files on the basis of certainfiltering criteria and performs an Insight NetworkScan on the filtered files. Reputation Scan filters .exefiles, .scr files, .sys files, .dll files, .drv files, .ocx files,and .msi files and analyzes these files.

Norton 360 displays the reputation information of thescanned files in the Reputation Scan window. TheReputation Scan window displays the following:

1 Community Summary details

Community Summary displays the average trustlevel, average age, and average community usagedetails of the files that are collected from millionsof Norton Community Watch customers.

1 Local Summary details

Local Summary displays the average trust level,age, and community usage details of the reputationfiles based on your last Reputation Scan.

You can use the Community Summary and LocalSummary details to analyze the reputation detailsof the files on your computer.

151Scanning your computerAbout Reputation Scan

Page 152: Help

w Your computer must be connected to the Internetto view the Community Summary and LocalSummary details. Norton 360 connects to theSymantec servers to collect the reputationinformation.

1 Graphical statistics of the reputation informationcollected

Norton 360 consolidates the reputation informationof your most recent scan and represents thereputation information using different graphicalformats. When you click on a specific section on agraph, Norton 360 filters the results and displaysthe related files in the search results table. Forexample, if you want to view all files that have Poortrust level, click on the relevant section in the TrustLevel graph. The table at the bottom section of theReputationScan window lists all the files that havePoor trust level. You can click the Reset option toreset a graph.

1 Reputation information of each scanned item

For each scanned item, you can view the followingdetails:

Indicates the file name andfile type.

You can click a file name toview additional details aboutthe file in the File Insightwindow.

File Name

Scanning your computerAbout Reputation Scan

152

Page 153: Help

Indicates the trust level thatis assigned to a file.

Symantec analyzes specificinformation about a file suchas the digital signature andthe hash value to determinethe trust level of a file.Symantec rates a file basedon the statistical evaluationthat is done on the file usingtheNortonCommunityWatchdata and Symantec’sanalysis.

Symantec assigns thefollowing trust levels toreputation files:

1 Good: Symantec has ahigh indication that thefile is trusted.

1 Unproven: Symantecdoesnot have enoughinformation about the fileto assign a trust level tothe file.

1 Poor: Symantec has a fewindications that the file isnot trusted.

1 Bad: Symantec has a highindication that the file isnot trusted.

If you have a file that hasPoor or Bad trust level,Norton 360 displays a redcross (x) icon next to the trustlevel. You can click on the redcross (x) icon and quarantinethe suspicious file.

Trust Level

153Scanning your computerAbout Reputation Scan

Page 154: Help

Indicates the age of the filebased on the data thatmillions of NortonCommunity Watch customersshared and Symantec’sresearch analysis.

The search results aregrouped in to the followingcategories:

1 1-7 Days: Shows the filesthat are newly found onyour computer for thepast one week.

1 7-30 Days: Shows thefiles that are found onyour computer for thepast one month.

1 30+Days: Shows the filesthat are found on yourcomputer for more thanone month.

Age

Scanning your computerAbout Reputation Scan

154

Page 155: Help

Indicates the communityusage level of the file.

The search results aregrouped in to the followingcategories:

1 Very Few Users: Showsthe files that have verylow user prevalence.

1 Few Users: Shows thefiles that have averageuser prevalence.

1 Many Users: Shows thefiles that have very highuser prevalence.

You can also use thecommunity usage of a file todetermine the legitimacy ofthe file. Symantec uses astringent statistical methodto evaluate thetrustworthiness of a file andto classify the file as a Goodfile.

Prevalence

Indicates the date on whichNorton 360 determined theexistence of the file on yourcomputer.

Date Discovered

About Scan Facebook WallNorton Safe Web protects your computer while youuse Facebook. It scans each URL that is available onyour Facebook Wall and displays the Norton ratingicons for the scanned URLs.

You can also check if a URL is safe or unsafe and thenshare the URL with your friends on Facebook. NortonSafe Web scans the URL that you post on Facebook and

155Scanning your computerAbout Scan Facebook Wall

Page 156: Help

gives you the safety status for the URL. This way, youare not only protected from unsafe sites but you alsolet other Facebook users know the security status ofany Web site.

However, Norton Safe Web requires your permissionto scan the URLs that are available on your FacebookWall. When you log in to Facebook, Norton Safe Webasks for your permission to access your Facebook Wall.You can choose to allow or deny permission to letNorton Safe Web access your Facebook Wall.

The auto-scan feature in Norton Safe Web applicationpage helps you protect your Facebook Wall. NortonSafe Web scans the News Feed on your Facebook Wallperiodically and protects you from malicious links.When Norton Safe Web detects a malicious link, itnotifies you. To activate Norton Auto-Scan, go to yourNorton Safe Web page on Facebook and click EnableAuto-Scan.

To remove the malicious link from your Facebook Wall,go to your profile and remove the malicious link. Ifyour friend has posted the malicious link, you can usethe WARN YOUR FRIENDS option in the message toalert your Facebook friend. You can also click SeeNorton Safe Web Report to view Norton ratings andother details about this malicious link. When nomalicious activity is detected on your Facebook Wall,Norton Safe Web posts a message every week notifyingthat your Facebook Wall is safe.

If you later decide to remove Norton Safe Web fromyour Facebook profile, you can use the ApplicationSettings option of Facebook.

Scanning your computerAbout Scan Facebook Wall

156

Page 157: Help

The following are the safety states that Norton SafeWeb provides after it scans the links on your FacebookWall:

Indicates that the site is safe tovisit and Norton Trusted.

The sites with this rating do notharm your computer and so youcan visit this site.

Safe

Indicates that the site hassecurity risks.

The sites with this rating mayinstall malicious software onyour computer. Symantecrecommends that you do notvisit this site.

Warning

Indicates that Norton Safe Webhas not yet tested this site andit does not have sufficientinformation about this site.

Untested

Indicates that the site may havesecurity threats. Symantecrecommends you to be cautiouswhile you visit such Web sites.

Caution

Scanning your Facebook WallThe Norton Safe Web feature scans your Facebook Walland analyzes the security levels of all the availablelinks on your Facebook Wall. It then displays thesecurity status of the scanned URLs. However, NortonSafe Web requires your permission to scan yourFacebook Wall.

157Scanning your computerAbout Scan Facebook Wall

Page 158: Help

To scan your Facebook Wall

1 In the Norton 360 main window, move the mousepointer over PCSecurity, and then click RunScans.

2 In the Scans window, under Scan Facebook Wall,click Scan Facebook Wall.

3 Click Go.

4 In the Facebook login Web page, log in to yourFacebook profile.

5 In the Request for permission page, click Allow.

6 In the Web page that appears, click Pleasegrantuspermission to access your News Feed and Wall.

7 Follow the on-screen instructions to let Norton SafeWeb access your Facebook Wall.

About SONAR ProtectionSymantec Online Network for Advanced Response(SONAR) provides real-time protection against threatsand proactively detects unknown security risks on yourcomputer. SONAR identifies emerging threats basedon the behavior of applications. SONAR identifiesthreats quicker than the traditional signature-basedthreat detection techniques. SONAR detects andprotects you against malicious code even before virusdefinitions are available through LiveUpdate.

SONAR monitors your computer for malicious activitiesthrough heuristic detections.

SONAR automatically blocks and removeshigh-certainty threats. Norton 360 notifies you whenhigh-certainty threats are detected and removed.SONAR provides you the greatest control whenlow-certainty threats are detected. You can alsosuppress the SONAR notifications by disabling theShow SONAR Block Notifications option.

The ViewDetails link in the notification alert lets youview the summary of the resolved high-certaintythreats. You can also view the details under Resolved

Scanning your computerAbout SONAR Protection

158

Page 159: Help

Security Risks category in the Security Historywindow.

Turning off or turning on SONAR ProtectionSONAR protects you against malicious code even beforevirus definitions are available through LiveUpdate. Bydefault, SONAR Protection is turned on to proactivelydetect unknown security risks on your computer.

When you turn off SONAR Protection, you areprompted with a protection alert. This protection alertlets you specify the amount of time for which you wantSONAR Protection to be turned off.

w When Auto-Protect is turned off, SONAR Protection isalso disabled. In this case, your computer is notprotected against emerging threats.

To turn off or turn on SONAR Protection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Antivirus.

3 On the AutomaticProtection tab, under RealTimeProtection, in the SONAR Protection row, do oneof the following:

1 To turn off SONAR Protection, move the On/Offswitch to the right to the Off position.

1 To turn on SONAR Protection, move the On/Offswitch to the left to the On position.

4 In the Settings window, click Apply.

About scanning Office documentsNorton 360 protects all Office documents that youreceive through email messages, through Internetdownload, and through inserted floppy disks or otherremovable media. By automatically scanning all Officefiles, Norton 360 maintains a higher level of security.Norton 360 scans the Office document when you openthem.

159Scanning your computerAbout scanning Office documents

Page 160: Help

By default, Microsoft Office Automatic Scan option,under Computer Scans, in the Antivirus settingswindow is turned off. Turn on this option to scanMicrosoft Office files automatically.

You can use Microsoft Office Automatic Scan optionunder Computer Scans, to scan documents of thefollowing Microsoft Office applications:

Microsoft Wordwinword.exe

Microsoft Excelexcel.exe

Microsoft PowerPointpowerpnt.exe

Microsoft Visiovisio.exe

Microsoft Accessmsaccess.exe

Microsoft Projectwinproj.exe

Norton 360 scans the Office documents and protectagainst threats, including virus macros and infectedembedded objects.

Turning on or turning off Microsoft Office AutomaticScan

Norton 360 maintains a higher level of security byautomatically scanning all Office files. You can turnon the Microsoft Office Automatic Scan option toprotect your computer against the virus macros andembedded objects.

To Turn on or turn off Microsoft Office Automatic Scan

1 In the Settings window, under Detailed Settings,click Antivirus.

2 In the Antivirus settings window, click Scans andRisks tab.

Scanning your computerAbout scanning Office documents

160

Page 161: Help

3 Under Computer Scans, in the Microsoft OfficeAutomatic Scan row, do one of the following:

1 To turn on Microsoft Office Automatic Scan,move the On/Off switch to the left to the Onposition.

1 To turn off Microsoft Office Automatic Scan,move the On/Off switch to the right to the Offposition.

4 In the Settings window, click Apply, and then clickClose.

About Silent ModeNorton 360 provides many solutions and features tohandle viruses and other security threats. Norton 360displays alerts and notifications to inform you howviruses and other security threats are detected andresolved. When you perform important tasks on yourcomputer, you likely prefer not to receive any alertmessages. Norton 360 suppresses alerts andnotifications and temporarily suspends most of thebackground activities based on the type of Silent Modethat is turned on.

Norton 360 has following types of Silent Mode:

The Silent Mode that youmanually turn on for a specifiedduration.

Silent Mode

The Silent Mode that Norton 360turns on automatically when itdetects a full-screen applicationand turns off when you stopusing the full-screen application.

Full Screen Detection

161Scanning your computerAbout Silent Mode

Page 162: Help

The Silent Mode that Norton 360turns on automatically when itdetects a disk burning task or aMedia Center TV recording task.Norton 360 also turns on QuietMode automatically when yourun a program that you includedin theQuietModePrograms list.Norton 360 turns off Quiet Modewhen the disk burning sessionor TV program recording sessionis complete. Norton 360 alsoturns off Quiet Mode when itstops detecting runninginstances of the programs thatyou included in the Quiet ModePrograms list.

Quiet Mode

The Norton 360 icon displays the turn-on status ofSilent Mode in the notification area, at the far right ofthe taskbar. The icon changes to a crescent-patternedicon when Silent Mode is turned on. Norton 360 alsonotifies you after Silent Mode is turned off.

You can view the summary of the Silent Mode sessionsunder the Recent History, Full History, and SilentMode categories in the Security History window.

The summary includes the following information:

1 The turn-on or turn-off status of Silent Mode

1 The type of Silent Mode, such as Silent Mode orQuiet Mode

1 The type of program that turns on Silent Mode,such as disk burning or TV recording

1 The name of a user-specified program that turnson Silent Mode

1 The time and date when Silent Mode is turned onor turned off

Scanning your computerAbout Silent Mode

162

Page 163: Help

About the Silent Mode that you turn on manuallyNorton 360 lets you manually turn on Silent Mode fora specified duration. When Silent Mode is turned on,Norton 360 suppresses alerts and suspends backgroundactivities for the duration that you specify. You canverify the turn-on status of Silent Mode in thenotification area, at the far right of the taskbar. TheNorton 360 icon in the notification area changes to acrescent-patterned icon to display the turn-on statusof Silent Mode. Turning on Silent Mode manuallybefore you perform your tasks helps you prevent alerts,notifications, or background activities interruptingyou for the specified duration.

You can turn on Silent Mode for a period of one hour,two hours, four hours, six hours, or one day. After thespecified duration, Norton 360 turns off Silent Mode.You can also manually turn off Silent Mode at any time.Norton 360 notifies you after Silent Mode is turned off.The activities that are suspended during Silent Moderun after Silent Mode is turned off.

Turning on or turning off Silent Mode manually

You can manually turn on Silent Mode for a specifiedduration before you perform any important task onyour computer. You can turn on Silent Mode for aperiod of one hour, two hours, four hours, six hours,or one day. The Norton 360 icon displays the turn-onstatus of Silent Mode in the notification area, at thefar right of the taskbar. Norton 360 notifies you afterSilent Mode is turned off. After Silent Mode is turnedoff, Norton 360 also displays alerts if it detected anysecurity activities that occurred during the Silent Modesession.

You can turn on or turn off Silent Mode from theAdministrative Settings window, Quick Controls inthe Settings window, or from the Norton Taskswindow. You can also turn on or turn off Silent Modeby using the Norton 360 icon in the notification area.

163Scanning your computerAbout Silent Mode

Page 164: Help

To turn onSilentMode from theAdministrative Settingswindow

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Silent Mode Settings, in the Silent Moderow, move the On/Off switch to the left to the Onposition.

4 In the Settings window, click Apply.

5 In the TurnonSilentMode dialog box, in the Selectthe duration drop-down list, select how long youwant to turn on Silent Mode, and then click OK.

To turn off SilentMode from theAdministrative Settingswindow

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Silent Mode Settings, in the Silent Moderow, move the On/Off switch to the right to the Offposition.

4 In the Settings window, click Apply.

To turn on Silent Mode from the Norton Tasks window

1 In the Norton 360 main window, click Performance.

2 In the Performance window, click Norton Tasks.

3 In the Norton Tasks window, next to Silent Mode,move the On/Off switch to the left to the Onposition.

4 In the TurnonSilentMode dialog box, in the Selectthe duration drop-down list, select how long youwant to turn on Silent Mode, and then click OK.

5 Click Close.

To turn off Silent Mode from the Norton Tasks window

1 In the Norton 360 main window, click Performance.

2 In the Performance window, click Norton Tasks.

Scanning your computerAbout Silent Mode

164

Page 165: Help

3 In the Norton Tasks window, next to Silent Mode,move the On/Off switch to the right to the Offposition.

4 Click Close.

To turn on Silent Mode from the notification area

1 In the notification area on the Windows taskbar,right-click the Norton 360 icon, and then click Turnon Silent Mode.

2 In the TurnonSilentMode dialog box, in the Selectthe duration drop-down list, select how long youwant to turn on Silent Mode, and then click OK.

To turn off Silent Mode from the notification area

4 In the notification area on the Windows taskbar,right-click the Norton 360 icon, and then click Turnoff Silent Mode.

About the Silent Mode that turns on automaticallyWhen you watch a movie, play games, or make apresentation, you run the application in the full-screenmode. Norton 360 detects the application that you runin the full-screen mode and automatically enablesSilent Mode. When Silent Mode is enabled, Norton 360suppresses most of the alerts and suspends backgroundactivities. Only those activities run that are involvedin protecting your computer from viruses and othersecurity threats. Minimum background activities alsoensure high performance of your computer. Theactivities that are suspended run after you finish usingthe application in the full-screen mode.

Silent Mode also helps you maintain an uninterruptedMedia Center Extender session. A Media CenterExtender session is an extended session of Media Centerto an entertainment device, such as a television. Thealerts and notifications that appear during a MediaCenter Extender session disconnect the session betweenthe host computer and the entertainment device.Norton 360 identifies a Media Center Extender sessionas an active full-screen application and turns on Silent

165Scanning your computerAbout Silent Mode

Page 166: Help

Mode. When Silent Mode is enabled, Norton 360suppresses alerts and notifications and suspendsbackground activities to provide an uninterruptedMedia Center Extender session.

Turning off or turning on Full Screen Detection

You can use the Full Screen Detection option in theSettings window to turn on or turn off Silent Modeautomatically when Norton 360 detects a full-screenapplication. By default, the Full Screen Detectionoption remains turned on after you install Norton 360.

To turn off Full Screen Detection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Silent Mode Settings, in the Full ScreenDetection row, move the On/Off switch to the rightto the Off position.

4 In the Settings window, click Apply.

To turn on Full Screen Detection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Silent Mode Settings, in the Full ScreenDetection row, move the On/Off switch to the leftto the On position.

4 In the Settings window, click Apply.

About Quiet ModeNorton 360 automatically enables Quiet Mode whenyou perform a few tasks that require higher utilizationof your system resources. When Quiet Mode is turnedon, Norton 360 suspends the background activities andlets the task use the maximum resources for betterperformance.

Scanning your computerAbout Silent Mode

166

Page 167: Help

You can choose to set Norton 360 to automaticallyenable Quiet Mode when you do the following tasks:

1 IMAPI 2.0 Disk Burn

1 Media Center TV Recording

1 User-Specified Programs

In addition, you can configure Norton 360 to enableQuiet Mode when you run a program of your choice.

167Scanning your computerAbout Silent Mode

Page 168: Help

The following table explains about the various options:

When you use a Media Centerapplication to burn a CD or aDVD, Norton 360 automaticallyenables Quiet Mode, if the IMAPI2.0 Disk Burn option is turnedon. By default, the IMAPI 2.0Disk Burn option is turned on.When Quiet Mode is enabled,Norton 360 suspendsbackground activities to improvethe performance of yourdisk-burning session. However,Norton 360 continues to displayalerts and notifications duringthe session.

Norton 360 supports thefollowing Media Centerdisk-burner applications to turnon Quiet Mode:1 IMAPI 2.0

1 J. River MEDIA CENTER(version 13.0.125 and later)

Norton 360 turns on Quiet Modeas soon as you start burning aCD or a DVD using a MediaCenter application. Norton 360turns Quiet Mode off after thedisk-burning session iscomplete. You cannot turn offQuiet Mode during thedisk-burning session by turningoff the IMAPI 2.0 Disk Burnoption in the Settings window.

IMAPI 2.0 Disk Burn

Scanning your computerAbout Silent Mode

168

Page 169: Help

When you use a Media Centerapplication to record a TVprogram, Norton 360automatically enables QuietMode, if the Media Center TVRecording option is turned on.By default, theMedia Center TVRecording option is turned on.When Quiet Mode is enabled,Norton 360 suspendsbackground activities to improvethe performance of your TVprogram recording session.However, Norton 360 continuesto display alerts andnotifications during the session.

Norton 360 supports thefollowing Media Centerapplications to turn on QuietMode:1 Windows Media Center

For Windows Media Centerto enable Quiet Mode duringTV program session, youmight need to restart yourcomputer after you installNorton 360.

1 J. River MEDIA CENTER(version 13.0.125 and later)

Norton 360 turns on Quiet Modeas soon as you start recording aTV program. After Quiet Mode isturned on, it turns off after therecording session is complete.You cannot turn off Quiet Modeduring the TV program recordingsession by turning off theMediaCenter TV Recording option inthe Settings window.

Media Center TVRecording

169Scanning your computerAbout Silent Mode

Page 170: Help

Norton 360 automatically turnson Quiet Mode when it detects aTV program recording session ora disk-burning session. Inaddition, you can manually addthe programs for which you wantNorton 360 to turn on QuietMode to the Quiet ModePrograms list. When Norton 360detects a running instance of aprogram that you added in thelist, it automatically turns onQuiet Mode. When Quiet Modeis turned on, Norton 360suspends the backgroundactivities but does not suppressalerts and notifications.

You can also add or remove arunning program to the QuietMode Programs list.

User-Specified Programs

Turning off or turning on the Quiet Mode options

You can turn off or turn on the Quiet Mode options,such as IMAPI 2.0 Disk Burn or Media Center TVRecording in the Settings window. By default, the QuietMode options are turned on. If you perform a task foran option that you turned on, Norton 360 detects thetask and automatically turns on Silent Mode. Forexample, you turn on the IMAPI2.0DiskBurn optionand start burning a disk using a Media Centerapplication. In this case, Norton 360 detects thedisk-burning session and turns on Quiet Mode.

Norton 360 turns on Quiet Mode as soon as you startrecording a TV program or burning a CD or a DVD.Once Quiet Mode is turned on, it turns off only afterthe TV program recording session or disk-burningsession is complete. You cannot turn off Quiet Modeduring the sessions by using the options in the Settingswindow.

Scanning your computerAbout Silent Mode

170

Page 171: Help

To turn off or turn on IMAPI 2.0 Disk Burn

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Quiet Mode on Detection of:, do one of thefollowing:

1 To turn off detection, in the IMAPI 2.0 DiskBurn row, move the On/Off switch to the rightto the Off position.

1 To turn on detection, in the IMAPI2.0DiskBurnrow, move the On/Off switch to the left to theOn position.

4 In the Settings window, click Apply.

To turn off or turn on Media Center TV Recording

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Quiet Mode on Detection of:, do one of thefollowing:

1 To turn off detection of a TV program recordingsession, in the MediaCenterTVRecording row,move the On/Off switch to the right to the Offposition.

1 To turn on detection of a TV program recordingsession, in the MediaCenterTVRecording row,move the On/Off switch to the left to the Onposition.

4 In the Settings window, click Apply.

About User-Specified Programs

Norton 360 automatically turns on Quiet Mode whenit detects a TV program recording session or adisk-burning session. In addition, you can manuallyadd the programs for which you want Norton 360 toturn on Quiet Mode to the Quiet Mode Programs list.When Norton 360 detects a running instance of aprogram that you added in the list, it automatically

171Scanning your computerAbout Silent Mode

Page 172: Help

turns on Quiet Mode. When Quiet Mode is turned on,Norton 360 suspends the background activities butdoes not suppress alerts and notifications.

You can also add a running program to the QuietModePrograms list. However, when you add a runningprogram, Norton 360 does not detect the currentrunning instance of the program to turn on Quiet Mode.Norton 360 turns on Quiet Mode the next time whenyou execute the program.

You can also remove a running program from the QuietModePrograms list. However, if Quiet Mode is turnedon, it turns off only after the running instances of allthe programs in the list are complete. You cannot turnoff Quiet Mode by removing a program from the listwhen it runs.

You can view the details of the programs that you addto the Quiet Mode Programs list or remove from thelist in the Security History window.

Adding programs to User-Specified Programs

You can manually add the programs for which you wantNorton 360 to turn on Quiet Mode to the Quiet ModePrograms list. When you execute the program that youadded to the list, Norton 360 detects the program andturns on Quiet Mode.

You can also add a running program to the QuietModePrograms list. However, when you add a runningprogram, Norton 360 does not detect the currentrunning instance of the program to turn on Quiet Mode.Norton 360 turns on Quiet Mode the next time whenyou execute the program.

You can only add the programs that have .exe fileextension to the Quiet Mode Programs list.

To add a program

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

Scanning your computerAbout Silent Mode

172

Page 173: Help

3 Under SilentModeSettings, in the User-SpecifiedPrograms row, click Configure.

4 In the Quiet Mode Programs window, click Add.

5 In the Add Program dialog box, navigate to thelocation of the file that you want to add to the QuietMode Programs window.

6 Select the file, and then click Open.

7 In the Quiet Mode Programs window, click OK.

Removing programs from User-SpecifiedPrograms

You can remove a program from the Quiet ModePrograms list. After you remove a program, Norton360 does not turn on Quiet Mode the next time whenit detects a running instance of the program.

You can also remove a running program from the QuietModePrograms list. However, if Quiet Mode is turnedon, it turns off only after the running instances of allthe programs in the list are complete. You cannot turnoff Quiet Mode by removing a program from the listwhen it runs.

To remove a program

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under SilentModeSettings, in the User-SpecifiedPrograms row, click Configure.

4 In the Quiet Mode Programs window, select theprogram that you want to delete, and then clickRemove.

5 In the confirmation dialog box, click Yes.

6 In the Quiet Mode Programs window, click OK.

173Scanning your computerAbout Silent Mode

Page 174: Help

Running a scan at the command promptYou can scan with Norton 360 from the commandprompt without opening the Norton 360 main window.You type the path and name of the file that you wantto scan or customize the scan by adding a specificcommand. The following commands are available:

NAVW32 launches helpand terminates.

/?

Scans all drives/A

Scans the local drives/L

Enables (+) or disables(-) subfolders scanning

/S[+|-]

Enables (+) or disables(-) boot recordscanning and masterboot record scanning(for example, NAVW32C: /B+ or NAVW32 C:/B-)

/B[+|-]

Scans only the bootrecords

/BOOT

Runs a Quick Scan/QUICK

Enables (+) or disables(-) a Quick Scan

/SE[+|-]

Enables (+) or disables(-) scanning of stealthitems

/ST[+|-]

Scanning your computerRunning a scan at the command prompt

174

Page 175: Help

Uses a task file as inputto the list of items toscan

Task file path shouldfollow the ':' (forexample,TASK:C:\Documentsand Settings\AllUsers\ApplicationData\Symantec\Norton360\Tasks\Full.sca)

/TASK:[taskfile.sca]

Uses a task file as inputto the list of items toscan

Task file path shouldfollow the ':' (forexample,TASK:C:\Documentsand Settings\AllUsers\ApplicationData\Symantec\Norton360\Tasks\Full.sca)

w Assumes the taskfile as a temporary fileand deletes the taskfile at the end ofprocessing.

/TTASK:[taskfile.sca]

Scans the files thatmatches specified wildcard

[folder_path]\*[?]

Scans the specifieddrive, folder, or file

[drive|folder|file]

175Scanning your computerRunning a scan at the command prompt

Page 176: Help

Performs Quick Scan inthe background.

w Norton 360displays the scanswindow only when athreat is detected.

/SESCAN

To run a scan from the command prompt

1 At the command prompt, type the path in whichNorton 360 is located and the executable's file name.The following examples show the syntax of a scancommand:

1 "\Program Files\Norton360\Engine\version\NAVW32"/command_name

Where version represents the version numberof Norton 360 and command_name representsthe command.

1 "\Program Files\Norton360\Engine\version\NAVW32"[path]file_name

Where version represents the version numberof Norton 360 and [path] file_name representsthe location, name, and extension of the file.

2 Press Enter.

Scanning your computerRunning a scan at the command prompt

176

Page 177: Help

This chapter includes the following topics:

1 What to do if a security risk is found

What to do if a security risk is foundYour product provides many solutions and features forhandling viruses and other security threats that itdetects.

In addition, your product provides solutions forsecurity risks, such as spyware and adware.

About detecting viruses, spyware, and other risksViruses and other security threats can be detectedduring a manual or customized scan. Auto-Protectdetects these threats when you perform an action withan infected file. Threats can also appear during aninstant messenger session, when you send an emailmessage, or during a manual or customized scan.

Security risks, such as spyware and adware, can alsobe detected when these activities are performed.

The files that can potentially infect your system whenyour computer first starts up are scanned first.

These files include the following:

1 Files that are associated with the processes that arecurrently running in memory

1 Files with startup folder entries

5Responding tosecurity issues

Page 178: Help

1 Files with system start INI file entries

1 Files with system start batch file entries

1 Files that the system start registry keys refers

If an infected file is detected during this portion of themanual scan, it is repaired or removed. Anyunnecessary references are also removed from yourcomputer. Before attempting to repair, quarantine, ordelete any infected file that has a process running inmemory, your product attempts to terminate theprocess. You are alerted and prompted to close allunnecessary programs before the process is terminated.

You can view information about detected viruses andother security threats in Security History.

Security History also includes information aboutspyware, adware, and other security risks.

Reviewing Auto-Protect notificationsAuto-Protect scans files for viruses, worms, and Trojanhorses when you perform an action with them, suchas moving them, copying them, or opening them.

It also scans for spyware, adware, and other securityrisks.

If Auto-Protect detects suspicious activity, it logs anotification in Security History that tells you that arisk was found and resolved.

If Auto-Protect detect one or more viruses it eitherrepairs or deletes the viruses and notifies you. Thenotification provides information on which file wasrepaired or deleted and which virus, Trojan horse, orworm infected the file. No further action is necessary.

To review Auto-Protect notifications

1 In the Norton 360 main window, click Tasks.

2 In the Tasks window, under General Tasks, clickCheck Security History.

Responding to security issuesWhat to do if a security risk is found

178

Page 179: Help

3 In the Show drop-down list, select the category forwhich you want to review Auto-Protect alerts.Your options are:

Review Auto-Protectnotifications that youreceived in the last sevendays.

Recent History

Review all of theAuto-Protect notificationsthat you have received.

Full History

Review all of the resolvedhigh-certainty securitythreats.

The Resolved SecurityRisks category includesthe infected files thatNorton 360 repairs,removes, or quarantines.

Resolved Security Risks

Review the list ofunresolved security risks.

The Unresolved SecurityRisks category includesthe infected files forwhich Norton 360 wasnot able to take anyaction. This categorymostly includes thelow-level risks thatrequire your attention fora suitable action.

Unresolved Security Risks

4 In the right pane, click the Options link.If one or more security risks such as spyware arefound, you can take action on these items, ifrequired.

179Responding to security issuesWhat to do if a security risk is found

Page 180: Help

5 In the Threat Detected window, select theappropriate action on the risk.The following are some of the options that areavailable in the Threat Detected window:

Returns the security riskthat is quarantined to the

Restore

original location on yourcomputer.

This option is availableonly for the detected viralthreats.

Returns the selectedQuarantine item to its

Restore & Exclude this file

original location andexcludes the item frombeing detected in thefuture scans.

This option is availableonly for the detectednon-viral threats.

Excludes the security riskfrom future scan.

Exclude this program

Norton 360 adds thesecurity risk to theappropriate exclusionslist.

Removes the security riskfrom your computer andquarantines it.

Remove this file (may causebrowser to close)(recommended)

This option is availablefor the security risks thatrequire your attention.

Responding to security issuesWhat to do if a security risk is found

180

Page 181: Help

Removes the selectedsecurity risk from thecomputer andquarantines it.

This option is availablefor the security risks thatrequire your attention formanual removal.

This option is alsoavailable for the securityrisks that are manuallyquarantined.

Remove this file (may causebrowser to close)

Removes the selectedsecurity risk item fromthe Security History log.

Remove from history

Takes you to theSymantec SecurityResponse Web site.

This option is availablefor the security risks thatrequire your attention formanual removal. You canrefer the SymantecSecurity Response Website for manual removalinstructions or otherinformation about therisk.

Get help (recommended)

181Responding to security issuesWhat to do if a security risk is found

Page 182: Help

Sends the security risk toSymantec.

In some cases, Norton360 might not identify anitem as a security threat,but you might suspectthat the item is infected.In such cases, you canuse this option to submitthe item to Symantec forfurther analysis.

Submit to Symantec

About responding to risks detected during a scanAt the end of a scan, the Activities and Scan Detailswindow lists each activity and a brief summary of thescan results. For some activities, you can also see moredetailed information about the scanned results byclicking the Details link. You can use the Showdrop-down list that is available in the SecurityHistorywindow to resolve any items that were notautomatically resolved during the scan.

The Recommended Action section in the SecurityHistory window displays the action that you shouldtake to resolve the security threat.

About actions when Norton 360 cannot repair a fileOne of the common reasons that Norton 360 cannotautomatically repair or delete an infected file is thatyou do not have the current definition updates. RunLiveUpdate, and then scan again.

Before running LiveUpdate to receive protectionupdates, ensure that Quick Scan is turned on (it isturned on by default). After LiveUpdate retrieves thelatest definition updates, Quick Scan automaticallychecks for the infections that have processes running

Responding to security issuesWhat to do if a security risk is found

182

Page 183: Help

in memory. It also checks for the infections that thestart-up files and folders refer.

If that does not work, read the information on theSecurity History - Advanced Details window toidentify the types of files that cannot be repaired. You

183Responding to security issuesWhat to do if a security risk is found

Page 184: Help

can take one of the following actions, depending on thefile type:

You canview thefile typeof thedetectedrisk. Thisinformationhelps youto decidetheactionthat canbe takendependingon thefile type.

Forexample,you canview theinfectedfiles withthefollowingfile nameextensions(any filecan beinfected):1 .exe

1 .doc

1 .dot

1 .xls

Infected files

Responding to security issuesWhat to do if a security risk is found

184

Page 185: Help

Replaceusingyouroperatingsystemdisks.

Hard disk master boot record, boot record, orsystem files (such as IO.SYS or MSDOS.SYS) andfloppy disk boot record and system files

185Responding to security issuesWhat to do if a security risk is found

Page 186: Help

Responding to security issuesWhat to do if a security risk is found

186

Page 187: Help

This chapter includes the following topics:

1 About Norton 360 alerts and messages

1 About managing messages and alerts

1 Types of risks

1 Types of threats

1 Types of viruses

About Norton 360 alerts and messagesMost of the time, Norton 360 quietly protects yourcomputer from viruses and other risks and threats sothat you can use your PC with confidence. The greenbadge on the Norton 360 status icon in the lower-rightcorner of your computer screen indicates that yourprotection is up to date. You can use your computerwith confidence. If the badge color changes to orangeor red, it means you should open Norton 360 to learnabout the problems that Norton 360 has encountered.

About managing messages and alertsNorton 360 displays messages in several ways and inseveral locations.

6Understandingalerts andmessages

Page 188: Help

You might see messages in the following locations:

Several types of Norton 360messages appear in thenotification area, at the farright of the taskbar. Forexample, your PC was turnedoff, or it has not beenconnected to the Internet fora while. In this case, you seea message that yourprotection may not be up todate.

A different alert appears if asecurity setting was turnedoff. This message warns youthat your PC might not besecure and helps you to turnon the setting.

In most cases you can clickthe alert to open Norton 360and fix the problems.

Notification area on yourWindows desktop

Alerts and other messagesappear at the top of the mainwindow. The color of themessage indicates itsurgency. If the message coloris green, your computer isprotected. If the messagecolor is orange or red, youmust take appropriate actionto ensure that you stayprotected.

Norton 360 main windowoverall status

Understanding alerts and messagesAbout managing messages and alerts

188

Page 189: Help

Norton 360 displaysindividual status areas foreach protection feature, suchas PC Security, IdentityProtection, Backup, and PCTuneup. The status areasshow how many issues needto be resolved for eachfeature. You can use ViewDetails under each statusarea for more informationabout those issues. You canuse the Fix Now option to fixall the issues that need to beresolved to secure yourcomputer.

Norton 360 protectioncategories and details

In Windows Vista andWindows 7, Norton 360displays the security statusof your computer in theNorton 360 gadget in theWindows sidebar.

Norton 360 gadget in theWindows sidebar

Types of risksA risk is anything that can be exploited to harm yourPC and its data, or that can be used to steal your data.Norton 360 protects your system from a variety ofrisks.

Risks fall into several categories:

These programs aredeliberately designed tocause damage to your PC.They include threats such asviruses, worms, and Trojanhorses. Malicious software issometimes called malware.

Malicious software

189Understanding alerts and messagesTypes of risks

Page 190: Help

These programs concealthemselves on your PC. Theymonitor what you do, or lookthrough the information thatis stored on your PC, andsend the information back totheir creators.

Spyware

These risks consist of flawsin legitimate software thatcan be exploited, either tocause damage, block data, orsteal information.Vulnerabilities are usuallyexploited through networkconnections.

Vulnerabilities

Types of threatsThreats consist of the software that has beendeliberately designed to destroy, modify, disclose, orblock your data.

Threats fall into the following categories:

Viruses are the smallprograms that attachthemselves tootherprogramsand replicate themselves.

Viruses

Worms are like viruses in thatthey copy themselves fromPC to PC, but they do notattach themselves to otherprograms.

Worms

Understanding alerts and messagesTypes of threats

190

Page 191: Help

These destructive programsclaim to be some other typeof program, but they causedamage when they run.

Trojan horses

Norton 360 scans your PC for viruses, worms, Trojanhorses, and other software that is intentionallydestructive. It also monitors your Internet connectionto protect you from the Internet-based threats thatexploit software vulnerabilities.

Types of virusesA virus is a small program that is designed to alter theway your PC operates, without your knowledge orpermission.

To be a virus, a program must do the following:

1 Run on its own, without you having to take anyaction

1 Make copies of itself so that it can spread to otherPCs

Although not all viruses are intended to cause damage,even harmless viruses can affect the performance andstability of your PC. Norton 360 attempts to removeall viruses from your PC.

Viruses fall into the following recognized categories:

These viruses infect programfiles. When infected files run,they can attach the virusesthat they carry to otherprogram files. Norton 360scans all program files onyour PC to find and eliminatefile infectors.

File infectors

191Understanding alerts and messagesTypes of viruses

Page 192: Help

These viruses attachthemselves to the systemareas of your PC and becomeactive as soon as your PCstarts. They can attachthemselves to disks or otherstorage devices that isconnected to your PC. Norton360 scans the system areasof your PC to find and removeboot viruses.

Boot viruses

These viruses use thetechniques of both boot andfile infector viruses. Norton360 scans for such virusesand eliminates them.

Multipartite viruses

These viruses attachthemselves to the data filesthat contain executablecomponents, such as somespreadsheet, presentation,and word-processing files.These viruses that are spreadwhen a program runs theexecutable portion of a datafile. Norton 360 scans datafiles for macro viruses andremoves them.

Macro viruses

Norton 360 scans your PC for both known viruses andunknown viruses.

Known viruses are automatically detected and repaired.Unknown viruses are detected by analyzing eachexecutable file for various characteristics common toviruses. In addition, Norton 360 automatically updatesitself over the Internet to expand and refine its list ofknown viruses.

Understanding alerts and messagesTypes of viruses

192

Page 193: Help

This chapter includes the following topics:

1 Turning on or turning off automatic tasks

1 About scheduling automatic tasks

1 About scheduling backups

1 Specifying Idle Time Out duration

1 Choosing scans

Turning on or turning off automatic tasksNorton 360 runs automatic tasks as it quietly works toprotect your PC. These automatic tasks includescanning for viruses, monitoring your Internetconnection, updating backups, and downloadingprotection updates. These activities run in thebackground when your PC is turned on.

If any item needs your attention, Norton 360 displaysa message that tells you the current status or asks youto do something. If you do not see any messages, thenNorton 360 is doing its job and your PC is protected.

You can open Norton 360 at any time to see the statusof your PC at a glance or to view protection details.

From time to time, you will see a small message in thelower-right corner of your Windows desktop that tellsyou that a background activity is in progress. You can

7Doing routinetasks

Page 194: Help

see the results of those latest activities the next timeyou open the Norton 360 main window. When you wantto see a current report of Norton 360 activities, youcan view the summary in the MonthlyReport window.

To turn on or turn off automatic tasks

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Tasks Scheduling.

3 In the TaskScheduling window, on the AutomaticTasks tab, do the following:

1 Check the feature that you want to runautomatically.

Check the Tasks check box to check all thefeatures at once.

1 Uncheck the feature that you do not want to runautomatically.

Uncheck the Tasks check box to uncheck all thefeatures at once.

4 Click Apply.

5 Click Close.

About scheduling automatic tasksYou can use the Task Scheduling settings to specifyhow often Norton 360 scans your system for securityand performance issues. You can also access backupscheduling options from Task Scheduling settings.

Scheduling security and performance scansUse the Task Scheduling settings to have Norton 360examine your system automatically for security andperformance issues. You can specify when and howoften Norton 360 performs those examinations.

Doing routine tasksAbout scheduling automatic tasks

194

Page 195: Help

You have the following options for scheduling securityand performance scans:

Examine your PC for securityand performance issueswhenever your PC is idle.

This setting provides themaximum protection.

Automatic (Recommended)

Examine your PC one or moretimes each week for securityand performance issues.

You can pick the days of theweek and the time of day onwhich the scan performs.

Weekly

Examine your PC once eachmonth for security andperformance issues.

You can pick the day of themonth and the time of day onwhich the scan performs.

Monthly

Do not perform a scheduledsecurity or performance scanof your PC.

If you choose this option, youshould perform manualsecurity and performancescans of your PC periodicallyto maintain protection.

Manual Schedule

Your computer's performance is maximized if youschedule your critical operations to occur when yourcomputer is idle. When you schedule your scans weeklyor monthly and check the Runonlyatidletime option,Norton 360 scans your computer when it is idle.Symantec recommends that you check Runonlyatidle

195Doing routine tasksAbout scheduling automatic tasks

Page 196: Help

time to experience better performance of yourcomputer.

To schedule security and performance scans

1 In the Norton 360 main window, click Settings.

2 In the Settings window, click Tasks Scheduling.

3 On the Scheduling tab, in the Schedule drop-downlist, select an option.When you click Weekly or Monthly, you must selectthe time and day to run the automatic tasks. Youalso have the option of specifying that the automatictasks must run only when the PC is idle.

4 Click Apply.

5 Click Close.

About scheduling backupsYou can configure backup scheduling on the When tabin the Manage Backup Sets window to specify whenand how often should Norton 360 back up your files.

You have the following backup scheduling options:

Backs up the changed fileswhenever your PC is idle

This setting provides the bestbackup protection.

Automatic (Recommended)

Backs up the changed filesone or more times each week

You can pick the days of theweek and the time of day onwhich Norton 360 shouldperform backups.

Weekly

Doing routine tasksAbout scheduling backups

196

Page 197: Help

Backs up the changed filesonce each month

You can pick the day of themonth and the time of day onwhich Norton 360 shouldperform backups.

Monthly

Does not perform anyscheduled backups ofchanged files

If you choose this option, youshould manually back up yourchanged files regularly.

Manual Backup

Your computer's performance is maximized if youschedule your critical operations to occur when yourcomputer is idle. When you schedule backup weeklyor monthly and check Run only at idle time, Norton360 backs up your files when your computer is idle.Symantec recommends that you check Runonlyatidletime to experience better performance of yourcomputer.

Specifying Idle Time Out durationYou can set the duration after which Norton 360 shouldidentify your computer as idle. You can select a value(in minutes) between 1 minute and 30 minutes. Whenyou do not use your computer for the specifiedduration, Norton 360 identifies your computer as idle.Norton 360 then runs the activities that are scheduledto run at idle time.

After you specify the Idle Time Out duration, you canview the Idle Countdown bar in the Norton Taskswindow. The IdleCountdown bar displays the idle stateof your computer.

197Doing routine tasksSpecifying Idle Time Out duration

Page 198: Help

To specify Idle Time Out duration from the Settingswindow

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the Idle Time Out row, in the drop-down list,select the duration that you want to specify.You might need to scroll the window to view theoption.

4 In the Settings window, click Apply.

To specify Idle TimeOut duration from theNorton Taskswindow

1 In the Norton 360 main window, click Tasks.

2 In theTasks window, under PCTuneupTasks, clickCheck Norton Tasks.

3 In the Norton Tasks window, in the Idle Timeoutdrop-down list, select the duration that you want tospecify.

4 Click Close.

Choosing scansIn most cases, Norton 360 automatically checks yoursystem and chooses the best settings to keep yoursystem secure. Sometimes, however, you might wantto run some specific checks. You can choose the specificchecks that you want to run by using the optionsavailable in the Scans window.

You can run the following individual checks:

Downloads the latestprotection and programupdates

LiveUpdate

Scans your PC for viruses,spyware, and related threats,and removes them

Virus and Spyware Scan

Doing routine tasksChoosing scans

198

Page 199: Help

Removes the old temporaryfiles that are left behind byInternet use

Internet Explorer TemporaryFiles

Removes the old temporaryfiles that are left behind byWindows activities

Windows Temporary Files

Removes the traces of anyInternet searches that areperformed on your PC

Internet Explorer History

Eliminates the file clutter andrearrange the placement offiles on your PC disks toimprove performance

Disk Optimization

Removes the broken entriesfrom the Windows registry

Registry Cleanup

Identifies the files to bebacked up and performs abackup if necessary

Backup

To choose scans

1 In the Norton 360 main window, move the mousepointer over PCSecurity, and then click RunScans.

2 In the Scans window, under Computer Scan, clickCustom Scan, and then click Go.

3 In the window that appears, select the scans thatyou want to run, and then click Go.

4 In the Activities and Scan Details window, clickClose.

199Doing routine tasksChoosing scans

Page 200: Help

Doing routine tasksChoosing scans

200

Page 201: Help

This chapter includes the following topics:

1 About the Smart Firewall

1 About Intrusion Prevention

1 About Download Insight

1 About Norton AntiSpam

About the Smart FirewallThe Smart Firewall monitors the communicationsbetween your computer and other computers on theInternet. It also protects your computer from suchcommon security problems as the following:

Warns you of connectionattempts from othercomputers and ofattempts by programs onyour computer to connectto other computers

Improper connection attempts

Cloaks the inactive portson your computer therebyproviding protectionagainst attacks throughhacking techniques suchas port scanning

Port scans

8Keeping secure onthe Internet

Page 202: Help

Monitors the networktraffic to or from yourcomputer for suspiciousbehavior and stops anyattack before theythreaten your system

Intrusions

A firewall blocks hackers and other unauthorizedtraffic, while it allows authorized traffic to pass.Turning off Smart Firewall reduces your systemprotection. Always ensure that the Smart Firewall isturned on.

About firewall rulesA firewall is a security system that uses rules to blockor allow connections and data transmission betweenyour computer and the Internet. Firewall rules controlhow the Smart Firewall protects your computer frommalicious programs and unauthorized access. Thefirewall automatically checks all traffic that comes inor out of your computer against these rules.

The Smart Firewall uses two kinds of firewall rules:

Control network access forprograms on your computer.

Program rules

Control all the incoming and theoutgoing network traffic.

Traffic rules

About the order in which firewall rules are processed

For example, you have a Program rule for the SymantecpcAnywhere application that blocks the use of theapplication with any other computer. You add anotherrule for the same application that allows its use witha specific computer. You then move the new rule beforethe original rule in the program rule list. Norton 360processes the new rule first and lets you use Symantec

Keeping secure on the InternetAbout the Smart Firewall

202

Page 203: Help

pcAnywhere with that specific computer. It thenprocesses the original rule and prevents its use withany other computer.

About Traffic rules

Norton 360 includes a number of predefined Trafficrules. These rules provide network functionality andprotection from known Internet risks. Examples ofdefault Traffic rules include the following:

Permit all types ofoutbound and safe typesof inbound ICMP (InternetControl MessageProtocol) messaging.

ICMP messages providestatus and controlinformation.

Default Allow Specific InboundICMP

Default Allow Specific OutboundICMP

203Keeping secure on the InternetAbout the Smart Firewall

Page 204: Help

Permit the use of theNetBIOS name serviceand the NetBIOSdatagram service that theMicrosoft Network usesin file and printer sharing.

NetBIOS is an acronymfor Network BasicInput/Output System.NetBIOS provides nameservice, session service,and datagram service.Name service providesresolution of names,Session service managessessions forconnection-orientedservices, and Datagramservice distributesdatagrams forconnection-orientedservices.

Default Allow Inbound NetBIOSName (Shared Networks)

Default Allow Inbound NetBIOS(Shared Networks)

Permit the use of theBootp service.

Bootp is short forBootstrap Protocol, whichenables a computer todiscover its own IPaddress.

Default Allow Inbound Bootp

Default Allow Outbound Bootp

The Traffic Rules tab displays a list of predefinedtraffic rules. Some of the default Traffic rules areread-only and are locked. You cannot modify theserules.

The rules appear in the order of their priority levels.Rules that appear higher in the list override the rulesthat appear lower in the list.

Keeping secure on the InternetAbout the Smart Firewall

204

Page 205: Help

You can add a new Traffic rule on this tab. You can alsodo the following activities:

You can change the settings ofa Traffic rule that does notfunction the way you want.

However, you cannot modifysome of the default rules thatare locked.

See “Modifying Traffic rules andProgram rules” on page 219.

Modify a Traffic rule

You can disable a Traffic rule.

However, you cannot turn offsome of the default rules thatare locked.

See “Turning off a Traffic ruletemporarily” on page 221.

Turn off a Traffic rule

You can change the priority of aTraffic rule by changing where itappears in the list.

w Only advanced users ornovice users at the direction oftechnical support, shouldperform this action.

See “Changing the order offirewall rules” on page 220.

Change the priority of aTraffic rule

About Program rules

Program rules control Internet access for the programsthat are on your computer. You can use the Firewallsettings to create and modify rules for programs.

On the Program Rules tab, you can do the following:

1 Add a program.

1 Rename a program.

205Keeping secure on the InternetAbout the Smart Firewall

Page 206: Help

1 Modify the rules for a program.

1 Add a rule for a program.

1 Modify the access settings of a program rule.

1 Modify the priority of a program rule by changingthe sequence of rules in the list.

1 Remove a program rule.

1 Remove a program.

You can create Program rules in the following ways:

Lets the firewallautomatically configureaccess for programs thefirst time that users runthem. This method is theeasiest way to createfirewall rules.

Automatically customize Internetaccess settings

Manages the list ofprograms that can accessthe Internet.

Use Firewall settings

Keeping secure on the InternetAbout the Smart Firewall

206

Page 207: Help

Lets the firewall notifyyou when a programattempts to access theInternet. You can thenallow or block Internetaccess for the program.

In some instances, suchas when you watch amovie, you might prefernot to be alerted with anymessages. In such cases,you can use the SilentMode to silence thefirewall alerts. In thiscase, the firewall behavesthe same as whenAutomatic ProgramControl is turned on.Norton 360 does notprompt you with anyfirewall alerts in thisstate.

The firewall notifies youonly if you have changedthe General Settingsoptions of Smart Firewallfrom their default,recommended settings.

Respond to alerts

Adding a program to Firewall settings

You can add programs to Firewall settings to controltheir ability to access the Internet. Manually configuredFirewall settings for programs override any settingsthat Automatic Program Control makes. However,Symantec recommends you to retain the settings thatAutomatic Program Control makes as and when yourun your programs.

207Keeping secure on the InternetAbout the Smart Firewall

Page 208: Help

w Firewall settings for programs are not migrated fromprevious versions of Norton 360. If you want to restoreany programs that you manually added in the previousversion, you must add them again in the currentversion.

To add a program to Firewall settings

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the Program Rules tab, click Add.

4 In the Select a program dialog box, browse to theexecutable file for the program that you want toadd.

5 Click Open.

6 In the ProgramControl alert, select the access levelthat you want this program to have. Your optionsare:

Allow all access attemptsby this program.

Allow

Deny all access attemptsby this program.

Block

Create the rules thatcontrol how this programaccesses the Internet.

You can set the followingcriteria for a rule:

Manually configure Internetaccess (Recommended)

1 Action

1 Connections

1 Computers

1 Communications

1 Advanced

1 Description

7 Click OK.

Keeping secure on the InternetAbout the Smart Firewall

208

Page 209: Help

Customizing a program

After you use Norton 360 for a while, you might needto change the access settings for certain programs.

To customize a program

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the ProgramRules tab, in the Program column,select the program that you want to change.

4 In the drop-down list next to the program that youwant to change, select the access level that you wantthis program to have. Your options are:

Allow all access attemptsby this program.

Allow

Deny all access attemptsby this program.

Block

Create the rules thatcontrol how this programaccesses the Internet.

Custom

The Auto option is the default option that isassigned automatically to a program whenAutomatic Program Control is turned on.

5 Click Apply.

Removing a program

You can remove programs from Firewall settings ifnecessary.

The firewall settings for the programs are not migratedfrom previous versions of Norton 360. If you removedany programs in the previous version and do not wantthem in the current version, you must remove themagain.

209Keeping secure on the InternetAbout the Smart Firewall

Page 210: Help

To remove a program from Firewall settings

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the ProgramRules tab, in the Program column,select the program that you want to remove.

4 Click Remove.

5 In the Confirmation dialog box, click Yes.The confirmation dialog box appears only when theAutomatic Program Control option is turned off.

6 Click Apply.

Adding Traffic rules and Program rulesFirewall settings automatically create most of thefirewall rules that you need. You can add custom rulesif necessary.

w Only experienced users should create their own firewallrules.

You can add the following types of firewall rules:

1 Traffic rules

1 Program rules

To add a Traffic rule

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the Traffic Rules tab, click Add.

4 Follow the instructions in the Add Rule Wizard.

To add a Program rule

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the ProgramRules tab, in the Program column,select the program to which you want to add a rule.

Keeping secure on the InternetAbout the Smart Firewall

210

Page 211: Help

4 Click Modify.You can also use the Access drop-down list next tothe program to modify the access level for theprogram. Accordingly, Smart Firewall modifies orcreates the relevant rule for the program.

5 In the Rules window, click Add.

6 Follow the instructions in the Add Rule Wizard.

Using the Add Rule Wizard

The AddRule Wizard leads you through the steps thatare necessary to create firewall rules.

To use the Add Rule Wizard

1 Open the Add Rule Wizard by creating a Trafficrule or a Program rule.

211Keeping secure on the InternetAbout the Smart Firewall

Page 212: Help

2 In the first panel of the AddRuleWizard, select theaction that you want for this rule. Your options are:

Allow communication ofthis type.

Allow

For example, consider aTraffic rule with thefollowing criteria: allinbound connectionsfrom Internet address192.168.1.1 through port8080. When you selectAllow, Smart Firewallallows all connections,which satisfies the othercriteria of this Trafficrule.

Prevent communicationof this type.

Block

For example, consider aTraffic rule with thefollowing criteria: allinbound connectionsfrom Internet address192.168.1.1 through port8080. When you selectBlock, Smart Firewallblocks all connections,which satisfies the othercriteria of this Trafficrule.

Keeping secure on the InternetAbout the Smart Firewall

212

Page 213: Help

Monitor

213Keeping secure on the InternetAbout the Smart Firewall

Page 214: Help

Update the Firewall –Activities category in theevent log each time thatcommunication of thistype takes place. Thisoption lets you monitorhow often this firewallrule is used. Norton 360notifies you every timethat the traffic matchingthe monitor rule criteriapasses through yourcomputer. You can usethe links in thesenotifications to view thelogs. You can view theevent log under Firewall– Activities category inthe Security Historywindow.

Norton 360 createsseparate action rules toallow or block theprograms that have onlyaMonitor rule associatedwith them. The Monitorrule must be of higherorder than the action rulefor successful log entry ofthe network event that isrelated to the program.

The monitor rule only logsthe traffic events. Youneed to create anotherAllow or Block rule tohandle the networktraffic.

You can monitor andallow or block the trafficby enabling theAdvancedoption in the Add Rule

Keeping secure on the InternetAbout the Smart Firewall

214

Page 215: Help

Wizard or the ModifyRule Wizard.

3 Click Next.

4 Select the type of connection for the rule. Youroptions are:

The rule applies tooutbound connectionsfrom your computer toanother computer.

Connections to other computers

The rule applies toinbound connectionsfrom another computer toyour computer.

Connections from othercomputers

The rule applies toinbound and to outboundconnections.

Connections to and from othercomputers

215Keeping secure on the InternetAbout the Smart Firewall

Page 216: Help

5 Click Next, and then select the computers that applyto the rule. Your options are:

The rule applies to allcomputers.

Any computer

This rule applies only tocomputers in the localsubnet.

Anorganization’snetworkis divided into subnets tofacilitate efficientInternet communications.A subnet represents all ofthe computers in thesame LAN.

Any computer in the localsubnet

The rule applies only tothe computers, sites, ordomains that you specify.

You can specify thenames and addresses ofcomputers that apply tothe rule. The details ofthe specified computersappear in the list. You canalso remove computersfrom the list.

When you select thisoption, the Add optionbecomes available. Youcan then specify orremove a computer byusing the Add or theRemove options.

Only the computers and siteslisted below

Keeping secure on the InternetAbout the Smart Firewall

216

Page 217: Help

6 Click Next, and then select the protocols for therule. Your options are:

The rule applies to TCP(Transmission Control

TCP

Protocol)communications.

The rule applies to UDP(User Datagram Protocol)communications.

UDP

The rule applies to TCPand to UDPcommunications.

TCP and UDP

The rule applies to ICMP(InternetControlMessage

ICMP

Protocol)communications.

This option is availableonly when you add aTraffic rule, modify aTraffic rule, or modify aProgramrule that handlesICMP traffic.

The rule applies to ICMP(InternetControlMessage

ICMPv6

Protocol for InternetProtocol version 6)communications.

This option is availableonly when you add aTraffic rule, modify aTraffic rule, or modify aProgramrule that handlesICMP traffic.

217Keeping secure on the InternetAbout the Smart Firewall

Page 218: Help

The rule applies to allsupported protocols.

When you select thisoption, you cannotspecify the types ofcommunications or portsthat apply to the rule.

All

7 Select the ports for the rule. Your options are:

The rule applies tocommunications that useany port.

All types of communication (allports, local and remote)

The rule applies to theports that you specify.You can specify the portsby selecting from thelisted ports or by addingspecific ports or portranges.

Only communications thatmatch all types and ports listedbelow

w If you select ICMPor ICMPv6 protocol, youcan specify thecommands. To do so,select a command fromthe list of knowncommandsor add specificcommands or commandranges.

When you select thisoption, the Add optionbecomes available. Youcan use theAdd option orthe Remove option tospecify or remove a portor a command.

Keeping secure on the InternetAbout the Smart Firewall

218

Page 219: Help

8 Click Next.

9 Check Create a Security History log entry if youwant Norton 360 to create an entry in the firewallevent log.Norton 360 creates an entry when a networkcommunication event matches this rule. You canview the event log in the Security History windowunder Firewall – Activities. If you selected theMonitor option in the Action window, then theCreate a Security History log entry option isautomatically checked. You cannot uncheck the boxto turn off this option as it is the default setting.

10 Check Apply this rule if you want to apply this ruleto Ipv6 NAT Traversal traffic.

11 Click Next, and then, in the text box, type a namefor this rule.

12 Click Next, and then review the new rule settings.

13 Click Finish.

14 When you have finished adding rules, click OK.

Modifying Traffic rules and Program rulesYou can change an existing firewall rule if it does notfunction the way that you want. You can use the Modifyoption to change the settings of an existing firewallrule. When you change a rule, the firewall uses the newcriteria of the modified rule to control network traffic.

You cannot modify some of the default rules that arelocked. However, you can view the settings of theserules by using the View option.

To modify a Traffic rule

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the Traffic Rules tab, select the rule that youwant to change.

4 Click Modify.

219Keeping secure on the InternetAbout the Smart Firewall

Page 220: Help

5 In the Modify Rule window, make the necessarychanges to modify any aspect of the rule.

6 When you have finished changing the rule, clickOK.

To modify a Program rule

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the ProgramRules tab, select the program thatyou want to change.

4 Click Modify.You can also use the Access drop-down list next tothe program to modify the access level for theprogram. Accordingly, Smart Firewall modifies orcreates the relevant rule for the program.

5 In the Rules window, select the rule that you wantto change.

6 Click Modify.

7 In the Modify Rule window, make the necessarychanges to modify to change any aspect of the rule.

8 When you have finished changing the rule, clickOK.

9 In the Rules window, click OK.

Changing the order of firewall rulesEach list of firewall rules is processed from the topdown. You can adjust how the firewall rules areprocessed by changing their order.

w Do not change the order of the default Traffic rulesunless you are an advanced user. Changing the orderof default Traffic rules can affect firewall functionalityand reduce the security of your computer.

To change the order of Traffic rules

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

Keeping secure on the InternetAbout the Smart Firewall

220

Page 221: Help

3 On the Traffic Rules tab, select the rule that youwant to move.

4 Do one of the following:

1 To move this rule before the rule above it, clickMove Up.

1 To move this rule after the rule below it, clickMove Down.

5 When you are done moving the rules, click Apply.

To change the order of Program rules

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the ProgramRules tab, select the program thatcontains the rule that you want to move.

4 Click Modify.

5 In the Rules window, select the rule that you wantto move.

6 Do one of the following:

1 To move this rule before the rule above it, clickMove Up.

1 To move this rule after the rule below it, clickMove Down.

7 When you are done moving the rules, click OK.

8 In the Settings window for Firewall, click Apply.

Turning off a Traffic rule temporarilyw You cannot turn off some of the default firewall rules

that appear in the list. You can only view the settingsof these rules by using the View option.

You can temporarily turn off a Traffic rule if you needto allow specific access to a computer or a program.You must remember to turn on the rule again whenyou are done working with the program or computerthat required the change.

221Keeping secure on the InternetAbout the Smart Firewall

Page 222: Help

To turn off a Traffic rule temporarily

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the Traffic Rules tab, uncheck the box next tothe rule that you want to turn off.

4 Click Apply.

Allowing a blocked programSometimes the Norton 360 firewall blocks certainprograms from accessing the Internet. Such programsmight include certain streaming-media programs,network games, or custom business applications thatare provided by your employer. If you know that theprogram's Internet activity is not a threat to yoursecurity, you can unblock the program's Internetaccess.

To allow a blocked program

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the ProgramRules tab, select the program thatyou want to allow access to the Internet.

4 In the Access drop-down list for the program entry,click Allow.

5 Click Apply.

Removing a firewall ruleYou can remove some of the firewall rules if necessary.However, you cannot modify some of the default Trafficrules that appear in the list. You can view the settingsof these rules by using the View option.

w Do not remove a default firewall rule unless you are anadvanced user. Removing a default firewall rule canaffect firewall functionality and reduce the security ofyour computer.

Keeping secure on the InternetAbout the Smart Firewall

222

Page 223: Help

To remove a Traffic rule

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the Traffic Rules tab, select the rule that youwant to remove.

4 Click Remove.

5 In the Confirmation dialog box, click Yes.

To remove a Program rule

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the ProgramRules tab, in the Program column,select the program that contains the rule that youwant to remove.

4 Click Remove to remove all the program rules thatare associated with the program.

5 To remove a specific rule that is associated with theprogram, click Modify.

6 In the Rules window, select the rule that you wantto remove.

7 Click Remove.

8 In the Confirmation dialog box, click Yes.

9 Click OK.

About Norton Firewall DiagnosisThere may be times when firewall may block thenetwork traffic that you want to allow based on itsconfiguration settings. In such cases, you may haveissues in accessing the Internet, the Network, oranother computer to perform tasks such as sharingresources.

When you experience network connection problems,Norton Firewall acts quickly in identifying the causeof failure and provides its diagnosis. Norton 360

223Keeping secure on the InternetAbout the Smart Firewall

Page 224: Help

displays the Firewall Diagnostics Wizard when youencounter network connection problems.

w Norton Firewall Diagnosis is available only in Windows7.

The Wizard contains the problem diagnosis report thatis unique for different cases of network blocks. Forinstance, a network block can occur in any of thefollowing cases:

1 The one click option to stop all network traffic isactive

1 The uncommon protocol that is handling the trafficis blocked

1 The currently active firewall rule is conditioned toblock the traffic that you want to allow

1 The traffic has violated the process policy of thefirewall

1 The traffic has violated the traffic policy of thefirewall

1 The traffic comes from the restricted zone ofnetworks or computers

1 The traffic matches an Intrusion Prevention attacksignature

You can use the FirewallDiagnosticsWizard as a guideto troubleshoot the network connection problem byyourself.

For each case of network block, the Wizard containsthe firewall’s analysis of the cause and the possiblesolutions to fix the block.

Norton 360 recommends that you use the FirewallDiagnostics Wizard to remove any type of block. Thesolutions in the Wizard let you analyze the issue andtake a suitable action to resolve the problem.

Using the Wizard to troubleshoot the problem has thefollowing advantages:

1 It automatically tries to fix the problem by itself

1 It lets you modify the settings that are related tothe block

Keeping secure on the InternetAbout the Smart Firewall

224

Page 225: Help

1 It lets you view the log details related to the networkblock event

1 It provides you the option to turn off firewall as thelast means to resolve the issue

About Intrusion PreventionIntrusion Prevention scans all the network traffic thatenters and exits your computer and compares thisinformation against a set of attack signatures. Attacksignatures contain the information that identifies anattacker's attempt to exploit a known operating systemor program vulnerability. Intrusion Prevention protectsyour computer against most common Internet attacks.

For more information about the attacks that IntrusionPrevention blocks, go to the following URL:

http://www.symantec.com/business/security_response/attacksignatures

If the information matches an attack signature,Intrusion Prevention automatically discards the packetand breaks the connection with the computer that sentthe data. This action protects your computer from beingaffected in any way.

Intrusion Prevention scanning of every request fromall the devices that access your computer increases thescan time which slows down the network speed of yourcomputer. You can reduce the scan time and improvethe network speed of your computer by excluding thetrusted devices from Intrusion Prevention scanning.If you are sure that a device on your network is safe,you can change the trust level of the device to FullTrust. These trusted devices can be excluded fromIntrusion Prevention scan.

Intrusion Prevention relies on an extensive list ofattack signatures to detect and block suspiciousnetwork activity. Norton 360 runs LiveUpdateautomatically to keep your list of attack signatures upto date. If you do not use Automatic LiveUpdate, youshould run LiveUpdate once a week.

225Keeping secure on the InternetAbout Intrusion Prevention

Page 226: Help

Turning off or turning on Intrusion Preventionnotifications

You can choose whether you want to receivenotifications when Intrusion Prevention blockssuspected attacks. Whether or not you receivenotifications, Intrusion Prevention activities arerecorded in Security History. The Security Historyentries include information about the attackingcomputer and information about the attack.

You can choose whether you want to receivenotifications when Intrusion Prevention blockssuspected attacks based on a particular signature.

To turn off or turn on Intrusion Prevention notifications

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the Notifications row, doone of the following:

1 Move the On/Off switch to the right to the Offposition.

1 Move the On/Off switch to the left to the Onposition.

4 Click Apply.

To turn off or turn on an individual Intrusion Preventionnotification

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionSignaturesrow, click Configure.

4 In the IntrusionSignatures window, click an attacksignature, and then click Properties.

5 In the Signature Properties window, uncheck orcheck Notify me when this signature is detected.

Keeping secure on the InternetAbout Intrusion Prevention

226

Page 227: Help

6 Click OK.

7 In the Intrusion Signatures window, click OK.

8 In the Settings window for Firewall, click Apply.

Excluding or including attack signatures in monitoringIn some cases, benign network activity may appearsimilar to an attack signature. You may receiverepeated notifications about possible attacks. If youknow that the attacks that trigger these notificationsare safe, you can create exclusion for the attacksignature that matches the benign activity.

Each exclusion that you create leaves your computervulnerable to attacks.

If you have excluded the attack signatures that youwant to monitor again, you can include them in the listof active signatures.

To exclude attack signatures from being monitored

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionSignaturesrow, click Configure.

4 In the Intrusion Signatures window, uncheck theattack signatures that you want to exclude.

5 Click OK.

To include the attack signatures that were previouslyexcluded

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionSignaturesrow, click Configure.

4 In the Intrusion Signatures window, check theattack signatures that you want to include.

227Keeping secure on the InternetAbout Intrusion Prevention

Page 228: Help

5 Click OK.

Turning off or turning on AutoBlockWhen an attack is detected, the connection isautomatically blocked to ensure that your computer issafe. If the attack comes from a computer that haspreviously tried to access your computer by usinganother attack signature, Norton 360 activatesAutoBlock. AutoBlock blocks all traffic between yourcomputer and the attacking computer for a set amountof time. During this period, AutoBlock also blocks thetraffic that does not match an attack signature.

AutoBlock stops traffic between your computer and aspecific computer. If you want to stop all traffic to andfrom your computer, you can use the Block AllNetwork Traffic option.

If AutoBlock blocks a computer or computers that youneed to access, you can turn off AutoBlock.

To turn off or turn on AutoBlock

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionAutoBlockrow, click Configure.

4 In the Intrusion AutoBlock window, underAutoBlock, do one of the following:

1 To turn off Intrusion AutoBlock, click Off.

1 To turn on Intrusion AutoBlock, click On[Recommended].

5 Click OK.

Unblocking AutoBlocked computers

In some cases, AutoBlock may recognize normalactivity as an attack. The list of computers that

Keeping secure on the InternetAbout Intrusion Prevention

228

Page 229: Help

AutoBlock has currently blocked may include thecomputer that you should be able to communicate with.

If a computer that you need to access appears on thelist of blocked computers, you can unblock it. You maywant to reset your AutoBlock list if you have changedyour protection settings. To reset the AutoBlock list,you can unblock all of the computers that are on thelist at one time.

To unblock AutoBlocked computers

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionAutoBlockrow, click Configure.

4 In the Intrusion AutoBlock window, underComputers currently blocked by AutoBlock, doone of the following:

1 To unblock one computer, select its IP address,and then click Unblock.

1 To unblock all computers on the AutoBlock list,click Unblock All.

5 Click OK.

Permanently blocking a computer that has been blocked byAutoBlock

You can permanently block a computer that has beenblocked by AutoBlock. The permanently blockedcomputer is removed from the AutoBlock list and addedas a Restricted computer in the Network Security Mapof Home Networking.

To permanently block a computer that has been blockedby AutoBlock

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

229Keeping secure on the InternetAbout Intrusion Prevention

Page 230: Help

3 On the IntrusionandBrowserProtection tab, underIntrusionPrevention, in the IntrusionAutoBlockrow, click Configure.

4 In the Intrusion AutoBlock window, underComputers currently blockedbyAutoBlock, clickthe computer that you want to block permanently.

5 Click Restrict.

6 Click OK.

Turning off and turning on Browser ProtectionYou can choose whether you want to protect your Webbrowser by allowing Norton 360 to block unknownprograms from accessing your computer.

By default, the Browser Protection option is turnedon. In this case, Norton 360 proactively blocks new orunknown malware programs before they attack yourcomputer. By protecting your Web browser, Norton360 secures your sensitive information and preventsthe attackers from controlling your system remotely.This feature checks for browser vulnerabilities inInternet Explorer 6, Internet Explorer 7, or Firefoxbrowsers.

w Always keep the Browser Protection setting turned onto protect your Web browser against attacks bymalicious Web sites.

To turn off or turn on Browser Protection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the Intrusion and Browser Protection tab, inthe BrowserProtection row, do one of the following:

1 To turn off Browser Protection, move the On/Offswitch to the right to the Off position.

1 To turn on Browser Protection, move the On/Offswitch to the left to the On position.

4 Click Apply.

Keeping secure on the InternetAbout Intrusion Prevention

230

Page 231: Help

5 If you turned off Browser Protection, in theProtection Alert dialog box, in the Select theduration drop-down list, select how long you wantto turn off Browser Protection.

6 Click OK.

About Intrusion Prevention exclusion listThe Intrusion Prevention System in Norton 360 scansall the network traffic that enters and exits yourcomputer. When a device on your network requestsaccess to your computer, Intrusion Prevention scansthis request to ensure that it is not a virus attack. Ifthe information matches an attack signature, IntrusionPrevention blocks the traffic from the suspicious deviceand protects your computer. Scanning every requestfrom all the devices that access your computerincreases the scan time which slows down the networkspeed of your computer.

If you are sure that a device on your network is safe,you can change the trust level of the device to FullTrust. You can configure the trust level of a deviceusing the Network Security Map. You can exclude thesetrusted devices from Intrusion Prevention scan.Excluding Full Trust devices from the IntrusionPrevention scan saves the scan time and improves thenetwork speed of your computer. When you exclude adevice that is set to Full Trust, Norton 360 does notscan any information that is received from this device.The Full Trust devices that are excluded from IntrusionPrevention scan are added to Intrusion Preventionexclusion list.

When a device on your network attempts to infect yourcomputer, AutoBlock stops all access requests fromthis device. If you add this device to the IntrusionPrevention exclusion list, Norton 360 removes thedevice from the exclusion list.

w Ensure that the IP address of the devices that are addedto Intrusion Prevention exclusion list never changes.

231Keeping secure on the InternetAbout Intrusion Prevention

Page 232: Help

If you find that any of the devices that you excludedfrom the Intrusion Prevention scan is infected, you canpurge the saved exclusion list. When you purge theexclusion list, Norton 360 removes all the trusteddevices from the exclusion list.

Removing all devices from Intrusion Preventionexclusion list

If you are sure that a device on your network is safe,you can change the trust level of the device to FullTrust. These trusted devices can be excluded fromIntrusion Prevention scan. Excluding Full Trust devicesfrom Intrusion Prevention scan saves the scan timeand improves the network speed of your computer.When you exclude a Full Trust device from IntrusionPrevention scan, Norton 360 does not scan anyinformation that is received from this device. The FullTrust devices that are excluded from IntrusionPrevention scan are added to Intrusion Preventionexclusion list.

If you find that any of the devices that you excludedfrom Intrusion Prevention scan is infected, you canpurge the saved exclusion list and remove all thedevices.

You can purge the saved exclusion list under thefollowing circumstances:

1 Any of the devices that you excluded from IntrusionPrevention scan is infected.

1 Any of the devices that you excluded from IntrusionPrevention scan attempts to infect your computer.

1 Your home network is infected.

When a device on your network attempts to infect yourcomputer, AutoBlock stops all the access requests fromthis device. If you add this device to the IntrusionPrevention exclusion list, Norton 360 removes thedevice from the exclusion list.

Keeping secure on the InternetAbout Intrusion Prevention

232

Page 233: Help

When you remove all the devices from the savedexclusion list, Intrusion Prevention scans every requestfrom all the devices that access your computer.

To remove all the devices from the Intrusion Preventionexclusion list

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 Click the Intrusion and Browser Protection tab.

4 Under Intrusion Prevention, in the Exclusion Listrow, click Purge.

5 In the confirmation dialog box, click Yes.

6 In the Settings window for Firewall, click Close.

About Download InsightDownload Insight provides information about thereputation of any executable file that you downloadfrom the supported portals. The reputation detailsindicate whether the downloaded file is safe to install.You can use these details to decide the action that youwant to take on the file.

Some of the supported portals are:

1 Internet Explorer

1 QQ (Chat)

1 MSN Messenger (Chat)

1 Limewire (P2P)

1 MSN Explorer (Browser, E-mail & Chat)

1 Opera (Browser)

1 Outlook (E-mail)

1 Thunderbird (E-mail)

1 Windows Mail (E-mail)

1 Firefox (Browser)

1 Chrome (Browser)

1 BitTorrent (P2P)

233Keeping secure on the InternetAbout Download Insight

Page 234: Help

1 AOL (Browser)

1 Yahoo Messenger (Chat)

1 Safari (Browser)

1 FileZilla (File Manager)

1 Outlook Express (E-mail)

When you download a file, Norton 360 analyzes thefile based on its reputation details. Download Insightuses the file analysis results to provide you thereputation details of the file.

The basic reputation levels of the files are good, bad,unproven, and poor. Based on the reputation levels,the files can be broadly classified as follows:

Includes the files that are eitherNorton trusted or User trusted.

Safe files have good reputationlevels. These files do not harmyour computer. By default,Auto-Protect allows theexecution of the safe files.

Safe

Includes the files that Norton360 identifies as a security riskor a threat.

Unsafe files are characterized bybad reputation levels and Norton360 removes them from yourcomputer.

Unsafe

Keeping secure on the InternetAbout Download Insight

234

Page 235: Help

Includes the files that areneither safe nor unsafe.

Unknown files have unproven orpoor reputation. These filesmight harm your computer. Inthe case of an unknown file,Download Insight notifies youthat it is unsure of thereputation level of the file. Youcan use the View Details link inthe notifications to view moredetails of the file.

For unknown files, Norton 360lets you decide the action thatyou want to perform on the file.For example, you can run a file,stop the file from running, installthe file, cancel file installation,or remove the file from yourcomputer.

Unknown

By default, Download Insight lets you install safe files.For files of unknown reputation levels, DownloadInsight prompts you to select an action that you wantto perform on the file. In case of an unsafe file,Download Insight informs you that Norton 360 hasdetected the file as a threat and has removed the file.

Based on the reputation details that the DownloadInsight notifications provide for the files that needattention, you can take an action on the file. TheDownloadInsight window provides the various optionsthat let you select an action. The options that appearin the window vary depending on the reputation levelof the downloaded file. The following are some of theoptions that are available in this window:

Lets you retain a file on yourcomputer but prevent it frombeing executed

Stop this program fromrunning

235Keeping secure on the InternetAbout Download Insight

Page 236: Help

Lets you quarantine a file onyour computer

Remove this file frommysystem

Lets you execute and run anexecutable file

Run this programanyway

Security History logs details of all events thatDownload Insight processes and notifies. It alsocontains information about the safety level of the fileand the action that you take on the file, if any. You canview these details in the Download Insight categoryin Security History.

When you turn off Auto-Protect, Norton 360automatically turns off Download Insight. In this case,your computer is not adequately protected fromInternet threats and security risks. Therefore, ensurethat you always keep Auto-Protect turned on to protectyour computer from security risks.

When Silent Mode is turned on, Norton 360 suppressesthe Download Insight notifications.

Turning off or turning on Download IntelligenceDownload Insight protects your computer against anyunsafe file that you may run or execute after youdownload it using a supported Web browser. By default,Download Insight is turned on. In this case, DownloadInsight notifies you about the reputation levels of anyexecutable file that you download. The reputationdetails that Download Insight provides indicatewhether the downloaded file is safe to install.

There may be times when you want to turn offDownload Insight. For example, if you want todownload an unsafe file. In this case, you must turn offDownload Insight so that Norton 360 lets you downloadthe file and does not remove it from your computer.

You can use the DownloadIntelligence option to turnoff or turn on Download Insight.

Keeping secure on the InternetAbout Download Insight

236

Page 237: Help

To turn off Download Intelligence

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the Intrusion and Browser Protection tab, inthe Download Intelligence row, move the On/Offswitch to the right to the Off position.

4 In the Settings window, click Apply.

5 In the Select the duration drop-down list, selecthow long you want to turn off Download Insight,and then click OK.

To turn on Download Intelligence

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the Intrusion and Browser Protection tab, inthe Download Intelligence row, move the On/Offswitch to the left to the On position.

4 In the Settings window, click Apply.

Configuring the Download Insight Notifications optionYou can use the DownloadInsightNotifications optionto choose when you want Download Insight to displaynotifications.

By default, the DownloadInsightNotifications optionis set to On. In this case, Norton 360 notifies you eachtime you download an executable file.

When the Download Insight Notifications option isset to RisksOnly, Download Insight notifies only whenyou download an infected or a suspicious executablefile.

Setting the Download Insight Notifications to RisksOnly does not turn off analysis of all the otherexecutable files that you download. Whether or notyou receive notifications of all files, Security Historykeeps a record of all the Download Insight activities.

237Keeping secure on the InternetAbout Download Insight

Page 238: Help

You can review the summary of the Download Insightalerts and notifications in Security History.

To configure the Download Insight Notifications option

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

3 On the IntrusionandBrowserProtection tab, underDownload Intelligence, in the Download InsightNotifications row, do one of the following:

1 To receive Download Insight notifications onlyfor the infected or the suspicious executable filesthat you download, move the DownloadInsightNotifications switch to the right to the RisksOnly position.

1 To receive Download Insight notifications forall files that you download, move the DownloadInsight Notifications switch to the left to theOn position.

4 In the Settings window, click Apply.

Configuring the Download Insight Full Report optionThe Download Insight Full Report settings let youspecify when and for what type of file you want to beprompted to select a suitable action. For instance, youcan specify the type of downloaded files for whichDownload Insight asks you to decide what to do withthe file and how frequently these prompts for a suitableaction must appear.

Keeping secure on the InternetAbout Download Insight

238

Page 239: Help

You can use the following options to configureDownload Insight Full Report:

When you set the DownloadInsight Full Report option toAlways, Download Insightprompts you for a suitable actionin case of safe and unknownfiles. In this case, the DownloadInsight window appearswhenever you try to launch anydownloaded file that has a safeor an unknown reputation score.In this window, you can viewdetails about the file and theoptions that let you select asuitable action for the file.

In the case of unsafe files,Norton 360 identifies them asthreats and removes them.

Always

239Keeping secure on the InternetAbout Download Insight

Page 240: Help

When you set the DownloadInsight Full Report option toUnproven Only, DownloadInsight prompts you to select asuitable action for unknown filesonly. In this case, the DownloadInsight window appearswhenever you try to launch anydownloaded file that has anunknown reputation score. Inthis window, you can viewdetails about the file and theoptions that let you select asuitable action for the file.

Unproven Only is default optionofDownload Insight Full Report.In this case, Norton 360 allowsthe execution of the safe fileswithout prompting you for asuitable action. In the case ofunsafe files, Norton 360identifies them as threat andremoves them.

Unproven Only

Keeping secure on the InternetAbout Download Insight

240

Page 241: Help

When you set the DownloadInsight Full Report option toNever, Download Insight doesnot prompt you to select asuitable action for any type offile. In this case, the DownloadInsightwindow does not appearwhenever you try to launch anydownloaded file.

However, Norton 360 continuesto process the files for analysisof its reputation level. Based onthe reputation level, Norton 360takes an appropriate action. Itallows the execution of the safeand the unknown files. In thecase of unsafe files, Norton 360identifies them as threat andremoves them.

The alert messages that yousuppress and the activity detailscan be reviewed at any time inSecurity History.

Never

To configure the Download Insight Full Report option

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Firewall.

241Keeping secure on the InternetAbout Download Insight

Page 242: Help

3 On the IntrusionandBrowserProtection tab, underDownload Intelligence, in the Download InsightFull Report row, do one of the following:

1 If you want Download Insight to prompt you fora suitable action in case of safe and unknownfiles, move the Download Insight Full Reportswitch to the Always position.

1 If you want Download Insight to prompts you toselect a suitable action for unknown files only,move the Download InsightFullReport switchto the Unproven Only position.

1 If you do not want Download Insight to promptyou to select a suitable action for any type of file,move the Download InsightFullReport switchto the Never position.

4 In the Settings window, click Apply.

About Norton AntiSpamNorton AntiSpam lets you categorize the emailmessages that you receive in your email programs intospam email and legitimate email. It filters legitimateemail into the Inbox folder and spam email into theJunk folder or the Norton AntiSpam folder.

Norton AntiSpam uses Symantec enterprise-class,spam-filtering technology to classify the spam emailmessages from legitimate email messages. NortonAntiSpam uses a real-time filter delivery mechanismand filters email messages using various local filtersat different levels. The local filters classify the emailmessages as spam or legitimate. If the local filtersclassify the email message as legitimate, NortonAntiSpam collects information such as signature andURL hashes of the email message. Norton AntiSpamthen sends this information to the Symantec Webserver for additional analysis.

When the email message is classified as spam, NortonAntiSpam changes the subject of the email message

Keeping secure on the InternetAbout Norton AntiSpam

242

Page 243: Help

and sends it to your email client. The email clientidentifies the change in the subject of the emailmessage and moves it to the Junk folder or the NortonAntiSpam folder.

The Norton AntiSpam local filters use Whitelisttechnique, Blacklist technique, and patented filteringtechnology to classify email messages as spam orlegitimate. For these filters to work efficiently, NortonAntiSpam requires antispam definition updates atregular intervals through LiveUpdate. These updatescontain signature information of spam and legitimateemail messages. The updates also contain any new rulethat Symantec creates to filter spam email messages.

Norton AntiSpam uses predefined email rules and theuser-defined Allowed List and Blocked List, to expeditethe scanning of email. It accepts email messages fromthe list of allowed email senders and blocks emailmessages from the list of blocked email senders.

Norton AntiSpam also automatically imports the listsof addresses from supported email programs duringthe initial integration. It helps you keep your list ofallowed and blocked email senders in sync with yourcurrent address books. When Norton AntiSpam importsthe addresses from your Outlook address book orWindows Mail address book, it also imports theaddresses that are available in the Safe Sender and theBlocked Sender lists.

w Turning off Norton AntiSpam increases your exposureto receive unsolicited email messages. Always ensurethat Norton AntiSpam is turned on. It secures youremail client from unwanted online content.

You can review all the antispam statistics under theAntiSpam category in the Security History window.

Spam filtering featuresWith the increase in usage of email, many users receivea number of unwanted and unsolicited commercialemail messages that are known as spam. Not only does

243Keeping secure on the InternetAbout Norton AntiSpam

Page 244: Help

spam make it difficult to identify valid email messages,but some spam contains offensive messages andimages.

Norton 360 provides several powerful features toreduce your exposure to unwanted online content.

Adds several options to the toolbar insupported email programs, if youchoose

See “About your email programtoolbar” on page 247.

Integration withemail programs

1 Uses a user-defined address listto expedite the scanning of email

1 Accepts all email messages fromsenders in the Allowed List

1 Treats all email messages fromsenders in the Blocked List asspam

1 Allows and blocks email messagesfrom entire domains as well asindividual email addresses

See “About Norton AntiSpam settings”on page 471.

Allowed and BlockedLists

Automatically imports lists ofaddresses from supported emailprograms to keep your list of allowedemail senders and blocked emailsenders in sync, if you choose

See “Identifying authorized senders”on page 250.

Automatic import ofaddresses

Lets you check the Symantec Webservers to filter the spam emailmessages which the local filtersclassify as legitimate

See “About Web Query” on page 254.

Web Query

Keeping secure on the InternetAbout Norton AntiSpam

244

Page 245: Help

Updates the copies of Symantec spamdefinition files automatically

Automatedupdateofspam definitions

Configuring Client IntegrationThe Client Integration tab lists the supported emailprograms, or clients, that are installed on yourcomputer and their associated address books. Whenyou select an email program, Norton 360 adds a NortonAntiSpam drop-down list or a few options to thetoolbar of the supported email program. You can usethe NortonAntiSpam drop-down list or the options toclassify the email messages as spam or legitimate. Youcan also use these options to empty the spam folderand to open the Settings window to configure theNorton AntiSpam settings. If your email program doesnot have a Junk folder, it also adds a Norton AntiSpamfolder in the folders area. You can use the NortonAntiSpam folder to sort and store spam messages.However, if your email client has a Norton AntiSpamfolder from the previous version of Norton 360, NortonAntiSpam uses the Norton AntiSpam folder and notthe Junk folder.

w Integration of Norton AntiSpam toolbar is notsupported in Windows Mail in Windows Vista.

When you classify an email message as spam orlegitimate, Norton AntiSpam lets you send themisclassified email message as feedback to Symantec.You can use the Feedback option to send themisclassified email message to Symantec for analysis.

You can also import into the Norton AntiSpam AllowedList and Blocked List, the list of addresses that arepresent in the supported email program. NortonAntiSpam automatically adds the new email addressesfrom the address book of your supported email programonce in a day when your computer is idle. However, ifyou want to manually import addresses, use the Importoption in the Allowed List window.

245Keeping secure on the InternetAbout Norton AntiSpam

Page 246: Help

When you open your email client, the welcome screenappears. If you do not want the welcome screen toappear in the future, check the Don't show this againoption before you click Close. Norton 360 notifies thesuccessful integration of Norton AntiSpam with youremail client.

Norton AntiSpam also automatically imports the listsof addresses from the supported email programs duringthe initial client integration. It helps you keep your listof allowed and blocked email senders in sync with yourcurrent address books. When Norton AntiSpam importsthe addresses from your Outlook address book orWindows Mail address book, it also imports theaddresses that are available in the Safe Sender and theBlocked Sender lists.

Norton 360 supports Norton AntiSpam integrationwith the following email programs:

1 Microsoft Outlook 2002/2003/2007/2010

1 Outlook Express 6.0 or later

1 Windows Mail in Windows Vista

w Norton 360 supports only the 32-bit version ofMicrosoft Outlook 2010.

Norton 360 does not add any options to theWindows Mail toolbar. However, it identifies thespam email messages and moves them into the Junkfolder or the Norton AntiSpam folder.

w After successful integration, Outlook Express restartsautomatically.

To configure Client Integration

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Client Integration tab, turn on or turn offthe programs with which you want NortonAntiSpam to integrate.

4 Select one or more address books to be importedautomatically into your Allowed List.

Keeping secure on the InternetAbout Norton AntiSpam

246

Page 247: Help

5 Click Apply to save the changes.

About your email program toolbar

Norton AntiSpam adds a drop-down list or a fewoptions to the toolbar of supported email programs.

w Integration of Norton AntiSpam toolbar is notsupported in Windows Mail in Windows Vista.

You can use the following options:

Marks the selected email as spam and movesthe email message into the Junk folder or theNorton AntiSpam folder

When you reclassify an email message as spam,Norton 360 provides you the option to send themisclassified email message as feedback toSymantec. This option appears only if theFeedback option on the Addresses tab, in theAntiSpam Settings window, is set as Ask Me.

When you reclassify an email message as spam,Norton 360 displays a message whether or notto add the sender's email address to the BlockedList. This message appears depending on theoption that you select in the drop-down listpresent at the bottom of the Blocked Listwindow.

This isSpam

247Keeping secure on the InternetAbout Norton AntiSpam

Page 248: Help

Marks the selected email as allowed (not spam)and moves the email message into the Inbox

When you reclassify an email message aslegitimate, Norton 360 provides you the optionto send the misclassified email message asfeedback to Symantec. This option appears onlyif the Feedback option on the Addresses tab, inthe AntiSpam Settings window, is set as AskMe.

When you reclassify an email message aslegitimate, Norton 360 displays a messagewhether or not to add the sender's email addressto the Allowed List. This message appearsdepending on the option that you select in thedrop-down list present at the bottom of theAllowed List window.

This isnot Spam

Removes all email that has been placed in theJunk folder or the Norton AntiSpam folder

EmptySpamFolder

Displays the Norton AntiSpam settings sectionof the Norton 360 Settings window

OpenNortonAntiSpam

Setting Address Book ExclusionsWhen you add an email address to the Address BookExclusions list, Norton AntiSpam does not import theaddress into the Allowed List and Blocked List. If youdelete an email address from the Allowed List orBlocked List, Norton AntiSpam automatically adds theaddress to the Address Book Exclusions list. However,when you delete an email address that you manuallyadded to the Allowed List or Blocked List, NortonAntiSpam does not add the address to the Address BookExclusions list.

You cannot add a domain name to the Address BookExclusions list. When you delete a domain name from

Keeping secure on the InternetAbout Norton AntiSpam

248

Page 249: Help

the Allowed List or Blocked List, Norton AntiSpam doesnot add the domain name to the Address BookExclusions list.

w You can specify Address Book Exclusions before youimport the address book. Add all email addresses tothe Address Book Exclusions list that you do not wantto import from the address book of your email program.

To add entries to the Address Book Exclusions list

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Addresses tab, in the Address BookExclusions row, click Configure.

4 In the AddressBookExclusions window, click Add.

5 In the AddEmailAddress dialog box, type the emailaddress.Optionally, type the name that corresponds to theemail address for easy identification.

6 Click OK to close the AddEmailAddress dialog box.

7 Click OK to save and close the Address BookExclusions window.

To edit or delete entries in the Address Book Exclusionslist

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Addresses tab, in the Address BookExclusions row, click Configure.

4 In the AddressBookExclusions window, select theitem with which you want to work.

5 Do one of the following:

1 To edit an entry, click Edit to open the EditEmailAddress window, edit the details, and thenclick OK.

1 To delete an entry, click Remove.

249Keeping secure on the InternetAbout Norton AntiSpam

Page 250: Help

6 Click OK to save and close the Address BookExclusions window.

Identifying authorized sendersWhen you know that you want to receive any emailmessages from a specific address or domain, you canadd it to the Allowed List.

Norton AntiSpam automatically imports the addressbook entries and Safe Sender List entries once in a daywhen your computer is idle.

If you have added a new supported email program, youcan import its address book manually to your AllowedList immediately or at any time. You can also addnames and domains to the Allowed List individually.

w Before you import the address book, you can specifyyour Address Book Exclusions. Norton AntiSpam doesnot import the email addresses that you add to theAddress Book Exclusions list.

To import an address book

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Addresses tab, in the AllowedList row, clickConfigure.

4 In the Allowed List window, click Import.

5 Click OK to save and close the AllowedList window.

To add entries to your Allowed List

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Addresses tab, in the AllowedList row, clickConfigure.

4 In the Allowed List window, click Add.

5 In the Add Email Address dialog box, in theAddress Type drop-down list, specify whether youadd an email address or a domain name.

Keeping secure on the InternetAbout Norton AntiSpam

250

Page 251: Help

6 Do one of the following:

1 To add an email address, type the email addressthat you want to allow, and optionally, the nameof the sender.

1 To add a domain name, type the address of thedomain (for example, symantec.com), andoptionally, the name of the domain.

7 Click OK to close the AddEmailAddress dialog box.

8 Click OK to save and close the AllowedList window.

To edit or delete entries in the Allowed List

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Addresses tab, in the AllowedList row, clickConfigure.

4 In the Allowed List window, select the item withwhich you want to work.

5 Do one of the following:

1 To edit an entry, click Edit to open the EditEmail Address dialog box, edit the details, andclick OK.

1 To delete an entry, click Remove.

When you delete an entry that was imported,Norton AntiSpam automatically adds it to theAddress Book Exclusions list.

6 Click OK to save and close the AllowedList window.

Identifying senders of spamIf you do not want to receive any email messages froma specific address or domain, you can add it to theBlocked List. Norton AntiSpam marks all emailmessages from this address or domain as spam.

w Norton AntiSpam also automatically imports the listsof addresses that are available in the Blocked Senderlists of your email program into the Blocked List duringthe initial client integration or address book import.

251Keeping secure on the InternetAbout Norton AntiSpam

Page 252: Help

Norton AntiSpam lets you type invalid email addressesto the Blocked List.

w Always add unknown email addresses and domains tothe Blocked List, so that you do not receive unsolicitedemail messages from such addresses or domains.

To import addresses to the Blocked List

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Addresses tab, in the AllowedList row, clickConfigure.

4 In the Allowed List window, click Import.

5 Click OK to save and close the AllowedList window.

To add entries to the Blocked List

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Addresses tab, in the BlockedList row, clickConfigure.

4 In the Blocked List window, click Add.

5 In the Add Email Address dialog box, in theAddress Type drop-down list, specify whether youadd an email address or a domain name.

6 Do one of the following:

1 To add an email address, type the email addressthat you want to block, and the name of thesender.

1 To add a domain, enter the address of the domain(for example, symantec.com), and the name ofthe domain.

7 Click OK to close the AddEmailAddress dialog box.

8 Click OK to save and close the BlockedList window.

To edit or delete entries in the Blocked List

1 In the Norton 360 main window, click Settings.

Keeping secure on the InternetAbout Norton AntiSpam

252

Page 253: Help

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Addresses tab, in the BlockedList row, clickConfigure.

4 In the Blocked List window, select the item withwhich you want to work.

5 Do one of the following:

1 To edit an entry, click Edit to open the EditEmail Address dialog box, edit the details, andthen click OK.

1 To delete an entry, click Remove.

When you delete an entry that was imported,Norton AntiSpam automatically adds it to theAddress Book Exclusions list.

6 Click OK to save and close the BlockedList window.

Setting the Feedback optionEmail messages in the email client might sometimesget wrongly classified as spam or legitimate. TheFeedback option lets you send the misclassified emailmessage as feedback to Symantec for analysis.

w The Feedback option is available only when MicrosoftOutlook or Outlook Express is installed on yourcomputer.

To set the Feedback option

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

253Keeping secure on the InternetAbout Norton AntiSpam

Page 254: Help

3 On the Addresses tab, in the Feedback row, selectany one from the following three options:

Automatically sends themisclassified email message toSymantec when you classify anemail message as spam orlegitimate

On

Prompts you before NortonAntiSpam sends themisclassified email message toSymantec when you classify anemail message as spam orlegitimate

Ask Me

Does not send the misclassifiedemail message to Symantec

Off

4 Click Apply to save the changes.

About Web QueryWith the increase in usage of email, many users receivea number of unwanted and unsolicited commercialemail messages that are known as spam. Not only doesspam make it difficult to identify valid email messages,but some spam contains offensive messages andimages. The Web Query is a feature of Norton AntiSpamthat Norton 360 uses to classify the email messagesmore effectively.

An effective spam filtration is possible when each emailmessage that you receive is scanned through differentfilters. With only one or two levels of email filters, ahigh percentage of legitimate emails are misclassifiedas spam or spam is misclassified as legitimate. To avoidsuch misclassification, Norton AntiSpam employsdifferent filters. Each email filter uses a unique

Keeping secure on the InternetAbout Norton AntiSpam

254

Page 255: Help

approach to filter spam email messages from legitimateemail messages.

The email messages that you receive in your emailprogram undergo scanning through different localfilters of Norton AntiSpam. The local filters useWhitelist technique, Blacklist technique, and patentedfiltering technology to classify email messages aslegitimate or spam. If the local filters classify an emailmessage as spam, Norton AntiSpam changes the subjectof the email message. Norton AntiSpam then sends theemail message to your email client. However, if thefilters classify the email message as legitimate, NortonAntiSpam collects information such as signature andURL hashes of the email message. Norton AntiSpamthen sends this information to the Web Query filterfor additional analysis.

The Web Query filter analyzes the signature and URLhashes of the email message and then sends theanalysis report to Norton AntiSpam. If the emailmessage is identified as spam, Norton AntiSpam altersthe subject of the email message and sends it to youremail program. Based on predefined email rules, theemail program then moves the email message to theJunk folder or the Norton AntiSpam folder.

w Symantec recommends that you keep the Web Queryoption turned on. Turning off the Web Query optionincreases your exposure to the spam email messagesthat contain phishing or spam URLs.

You can turn on or turn off the Web Query option inthe Norton 360 AntiSpam Settings window.

Turning off or turning on Web Query

Norton AntiSpam uses local filters to identify spamemail messages. The email messages that the localfilters do not identify as spam are then scannedadditionally through the Web Query filter. Web Queryfilter analyzes the signature and URL hashes of theemail messages to classify them as legitimate email orspam email.

255Keeping secure on the InternetAbout Norton AntiSpam

Page 256: Help

If the email message is identified as spam, then NortonAntiSpam alters the subject of the email message.Norton AntiSpam then sends the email message to youremail program. Based on predefined email rules, theemail program then moves the email message to theJunk folder or the Norton AntiSpam folder.

w Symantec recommends you to keep the Web Queryoption turned on. Turning off the Web Query optionincreases your exposure to the spam email messagesthat contain phishing or spam URLs.

To turn off the Web Query filter

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Addresses tab, in the WebQuery row, movethe On/Off switch to the right to the Off position.

4 Click Apply to save the changes.

To turn on the Web Query filter

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click AntiSpam.

3 On the Addresses tab, in the WebQuery row, movethe On/Off switch to the left to the On position.

4 Click Apply to save the changes.

Keeping secure on the InternetAbout Norton AntiSpam

256

Page 257: Help

This chapter includes the following topics:

1 About securing your sensitive data

About securing your sensitive dataThe Internet provides the fastest and the easiest wayto exchange information. In spite of the manyadvantages that the Internet provides, you arevulnerable to information theft and identity theft.Information can be stolen and misused in several ways.

Following are a few of the most common methods ofinformation theft:

1 Online financial transactions

1 Unsafe online storage of sensitive information

1 Misuse of your identity while you communicateonline

The Identity Safe feature in Norton 360 offers severalpowerful ways to tackle identity theft. Identity Safe isthe best tool that you can use to safeguard your identitywhile you are online.

About Safe SurfingWhen you install Norton 360, it adds the NortonToolbar to Internet Explorer and Firefox. Norton 360protects your Internet Explorer browser and Firefox

9Securing yoursensitive data

Page 258: Help

browser when you turn on the options under SafeSurfing.

Safe Surfing comprises the Antiphishing and theNorton Safe Web features. Antiphishing analyzes thesecurity levels of the Web sites you visit and displaysthe results in the Norton Site Safety pop-up. TheNorton Safe Web feature provides you a safe Websearch environment by displaying the site-rating iconsnext to every search result.

w The Antiphishing and Norton Safe Web features aresupported only in Internet Explorer versions 5.0 orlater and Firefox versions 3.0 or later.

When you turn off Antiphishing and Norton Safe Webfeatures, Identity Safe may autofill fraudulent Websites with your confidential information. Symantecrecommends that you do not browse the Web whenAntiphishing and Norton Safe Web features are turnedoff.

About Antiphishing

Antiphishing protects you from visiting unsafe Websites. When Antiphishing is turned on, the Antiphishingcomponent analyzes the security level of the Web sitesthat you visit. It then displays the results in the NortonSiteSafety pop-up. Antiphishing also blocks navigationto the Web sites that are confirmed to be fraudulent.

Antiphishing provides you the following informationabout the Web pages:

1 If it is safe to enter confidential information

1 If the Web page is known to be fraudulent

1 If the Web page is authentic and Symantec approved

1 If the Web page is known to belong to a suspicioussite

1 If the Web page is known to give annoying results

The Site Safety bar in Internet Explorer and Firefoxlets you view more details about the status of the Webpage.

Securing your sensitive dataAbout securing your sensitive data

258

Page 259: Help

In addition, the Norton Site Safety pop-up includesinformation about Norton Authenticated Web pages.Web site hackers often mimic company Web sites tocreate fraudulent Web sites. Norton Site Safetyidentifies the fraudulent Web sites and lets you knowthe Web sites that are authenticated. The authenticatedWeb sites are categorized as SiteApproved Web sites.These sites usually belong to large financial institutionsor are shopping sites, with the pages that requestpersonal information.

Symantec analyzes the pages of these sites and verifiesthat they belong to the company that it represents. Youcan be confident that the information that you providegoes to the company with which you want to dobusiness.

You can report the evaluation of a Web page yoususpect to be fraudulent to Symantec for furtherevaluation. Use the Report Site option from NortonToolbar to report a Web page. You can also report theevaluation of a Web page that Antiphishing reports asfraudulent or suspicious site as a safe site. The Webpage that you report must be open in your browser'swindow to report it to Symantec.

Even when you turn off the Antiphishing option,Norton 360 protects you from Internet threats throughits Norton Safe Web features. When Antiphishing isturned off, you cannot use the Report Site link in theNorton menu to submit the evaluation of the Web pageto Symantec.

The Norton Site Safety pop-up displays the followingmessages:

1 Site is Safe

1 Site is Unsafe

1 Site Untested

1 Norton Secured

1 Site is Safe - Shopping Site Information

1 Caution

259Securing your sensitive dataAbout securing your sensitive data

Page 260: Help

1 Site Approved

1 Fraudulent Site

1 Suspicious Site

1 Page Not Analyzed

Turning off or turning on Antiphishing

Antiphishing protects you from visiting unsafe Websites. The Antiphishing feature in Norton 360 analyzesthe security level of all the Web sites that you visit anddisplays the results in the Norton Site Safety pop-up.Antiphishing also blocks navigation to Web sites thatare confirmed to be fraudulent.

The Norton Site Safety pop-up helps you understandif the Web site that you visit is safe or unsafe.

You can turn off or turn on Antiphishing from theSettings window for Identity Protection.

To turn off or turn on Antiphishing

1 In the Norton 360 main window, move the mousepointer over Identity Protection, and then clickManage Identity Protection.

2 In the Settings window for Identity Protection,under Safe Surfing, do one of the following

1 To turn off Antiphishing, in the Antiphishingrow, move the On/Off switch to the right to theOff position.

1 To turn on Antiphishing, in the Antiphishingrow, move the On/Off switch to the left to theOn position.

3 Click Apply.

Reporting an incorrect evaluation of a Web page

On rare occasions, Antiphishing may report anevaluation of a Web page that you suspect to be inerror. For example, you might visit a site that you shopwith regularly and Antiphishing says that the page isfraudulent. On the contrary, you might visit a Web

Securing your sensitive dataAbout securing your sensitive data

260

Page 261: Help

page that you suspect is a phishing page, butAntiphishing reports that no fraud was detected. Ineither case, you can report the page to Symantec forfurther evaluation.

w The Web page you want to report must be open in yourbrowser's window to report it to Symantec.

To report an incorrect evaluation of a suspicious Webpage

1 On the Norton Toolbar, on the Norton menu, clickReport site.

2 In the dialog box that appears, verify that the Webpage address that is shown matches the page thatyou want to report.

3 Do one of the following:

1 If the address is correct, click Submit.

1 If the address is not correct, click Cancel.

Ensure that you are on the Web page in questionand repeat this procedure, because the address inthe dialog box is not editable.

4 In the confirmation dialog box, click Close.

To report an incorrect evaluation of a safe Web page

1 On the Norton Toolbar, on the Norton menu, clickReport Site.

2 In the dialog box that appears, verify that the Webpage address that is shown matches the page thatyou want to report.

3 Do one of the following:

1 If the address is correct, click Submit.

1 If the address is not correct, click Cancel.Ensure that you are on the Web page in questionand repeat this procedure, because the addressin the dialog box is not editable.

4 In the confirmation dialog box, click Close.

261Securing your sensitive dataAbout securing your sensitive data

Page 262: Help

About Norton Safe Web

Norton Safe Web protects your computer while youbrowse the Internet using Internet Explorer or Firefox.It analyzes the security levels of the Web sites you visitand indicates if the Web sites are free from threats. Itprovides you a safe environment on the Web bydisplaying the site rating icons next to each searchresult. The site rating icons lets you know if a Web siteis malicious or not even before you visit it. For onlineshopping Web sites, Norton Safe Web also indicateswhether the Web site offers safe online shoppingexperience.

You can view the site safety status of any Web siteusing the FullReport option on the NortonSiteSafetypop-up. You can also use the Community Buzz optionon Norton menu to view the safety status.

w The Community Buzz option is available only inEnglish-language versions of Windows.

The Norton Safe Web site offers the following features:

1 Displays the community rating

1 Lets you add your reviews

1 Lets you view user reviews

1 Displays a list of keywords that are tagged to theWeb site

1 Displays the general information and the threatinformation

If you use a proxy server to connect to the Internet,you must configure the Network Proxy Settings ofNorton 360.

When you search the Internet using Google, Yahoo, orBing search engines, Norton Safe Web displays Nortonrating icons next to the search results. As you movethe mouse pointer over an icon, a pop-up appears withsite safety and shopping safety information. Thepop-up displays brief information about the safety ofthe site. Norton Safe Web also provides a detailedreport of the site safety.

Securing your sensitive dataAbout securing your sensitive data

262

Page 263: Help

You can click the icon or the FullReport option in thepop-up window to view the detailed report. The reportis displayed on the Norton Safe Web site.

Norton Safe Web provides the following Web site safetystates when you browse through the Internet:

You can see Norton Secured iconnext to the search results.

Symantec has analyzed this pageand determined that the Website is VeriSign trusted and issafe to visit.

Norton Secured

You can see a green OK icon nextto the search results.

When you visit a Web site withthis status, you can see a similarstatus icon on the NortonToolbar. Norton Safe Web hasanalyzed this site anddetermined that it is safe to visit.

Site is Safe

You can see a gray questionmark icon next to the searchresults.

When you visit this Web site, theNorton Toolbar shows a greenOK icon. Norton Safe Web hasnot analyzed this site and it doesnot have sufficient informationabout this site. As Symantec hasnot tested the site, it isrecommended that you do notvisit this site.

Site Untested

263Securing your sensitive dataAbout securing your sensitive data

Page 264: Help

You can see a red cross (x) iconnext to the search results.

When you visit a Web site withthis status, you can see a similarstatus icon on the NortonToolbar. Norton Safe Web hasanalyzed this site anddetermined that the site isunsafe to visit. This Web sitemay attempt to install malicioussoftware on your computer.

Site is Unsafe

You can see a yellow exclamationmark icon next to the searchresults.

When you visit a Web site withthis status, you can see a similarstatus icon on the NortonToolbar. Norton Safe Web hasanalyzed this site anddetermined that this site hassome threats that are classifiedas Annoyance Factors. Theseannoyance factors are notdangerous, but it can installunwanted applications on yourcomputer without yourpermission.

Caution

In addition to the site safety information, Norton SafeWeb provides the following shopping safetyinformation:

Norton Safe Web has analyzedthis Web site and determinedthat you can have a safeshopping experience.

Safe

Securing your sensitive dataAbout securing your sensitive data

264

Page 265: Help

Norton Safe Web does not havesufficient information about thesite to provide a shopping safetyrating.

Untested

Norton Safe Web has analyzedthis Web site and determinedthat the site has shopping risks.

Symantec recommends that youdo not visit this page. The sitemay sell counterfeit itemswithout proper indication.

Risky

Norton Safe Web has analyzedthis site and has only someinformation about the site toprovide shopping safetyinformation.

The information is not sufficientto declare that the site is safe toshop.

Limited

When you visit any Web site that has an unsafe status,Norton Safe Web blocks that Web page. If you still wantto view the site, use the Continuetositeanyway optionthat appears on the blocked page. You can use theMalicious Site Warning Page option under SafeSurfing section of the Identity Protection settings toturn off or turn on this setting. If you turn off thisoption, Norton Safe Web does not block the unsafe Websites. However, NortonToolbar still displays the statusof these sites as unsafe even when the option is turnedoff.

In addition, Norton Safe Web protects your computerwhile you use Facebook. It scans each URL that isavailable on your Facebook Wall and displays theNorton rating icons for the scanned URLs. You can alsolet other Facebook users know about the security statusof any Web site.

265Securing your sensitive dataAbout securing your sensitive data

Page 266: Help

To scan your Facebook Wall using Norton Safe Web,use the ScanFacebookWall option. The option appearswhen you click RunScans option in the Tasks window.

Turning off or turning on Norton Safe Web

Norton Safe Web protects your computer while youbrowse the Internet using Internet Explorer or Firefox.It analyzes the security levels of the Web sites that youvisit and indicates if the Web sites are free fromthreats. It provides you a safe environment on the Webby displaying the site rating icons next to each searchresult. The site rating icons lets you know if a Web siteis malicious or not even before you visit it.

You can turn off or turn on Norton Safe Web from theSettings window for Identity Protection.

To turn off or turn on Norton Safe Web

1 In the Norton 360 main window, move the mousepointer over Identity Protection, and then clickManage Identity Protection.

2 In the Settings window for Identity Protection,under Safe Surfing, do one of the following

1 To turn off Norton Safe Web, in the NortonSafeWeb row, move the On/Off switch to the rightto the Off position.

1 To turn on Norton Safe Web, in the NortonSafeWeb row, move the On/Off switch to the left tothe On position.

3 Click Apply.

Searching the Web using Norton Safe Search

Norton Safe Search enhances your Web searchexperience. When you search the Internet using NortonSafe Search, it uses Ask.com to generate the searchresults. Norton Safe Search provides the site safetystatus and Norton rating for each of the search resultsgenerated.

Securing your sensitive dataAbout securing your sensitive data

266

Page 267: Help

By default, the Norton Safe Search box is disabled.After you install Norton 360 and open Internet Exploreror Firefox for the first time, an alert message isdisplayed. The alert message prompts you to enableNorton Safe Search. You can choose to enable or disableNorton Safe Search.

As you type a few letters in the search box, Norton SafeSearch displays the search suggestions in the searchbox pop-up. You can see the search suggestions afteryou type three or more characters in the search box.It also provides you the intelligent search-as-you-typefeature that displays search suggestions when you typea few letters of the search phrase.

In addition, Norton Safe Search provides the followingfeatures:

When you search the Internetusing Norton Safe Search, itanalyzes the security levels ofthe Web sites and displays thesearch results.

You can use the Filter OutUnsafe Sites option in theNorton Safe Search Web page tofilter the unsafe Web sites fromthe search results.

Unsafe Site Filter

267Securing your sensitive dataAbout securing your sensitive data

Page 268: Help

Norton Safe Search enables youto erase all the data that arerelated to your search activitiesfrom the Ask.com server. ThePrivacy Safeguard feature ofNorton Safe Search removes thesearch data, such as your IPaddress, user identifier, andsession identifier from theAsk.com server.

You can turn on or turn offPrivacy Safeguard using theTurnOn Privacy Safeguard and TurnOff Privacy Safeguard optionsrespectively.

Erase Search History

w Norton Safe Search is available for some regionsincluding the United States, the United Kingdom,Canada, Australia, and Germany. The PrivacySafeguard feature is available only for the UnitedStates, the United Kingdom, and Canada.

You can use Norton Safe Search even when you turnoff the Identity Safe features.

To search the Web using Norton Safe Search

1 Start Internet Explorer or Firefox.

2 On the Norton Toolbar, in the Norton Safe Searchbox, type the search item that you want to search.

3 Do one of the following:

1 Click Search.

1 In the pop-up window that appears, select asearch suggestion that matches your searchstring.

About Identity SafeIdentity Safe helps you manage your identities andprovide additional security while you perform onlinetransactions.

Securing your sensitive dataAbout securing your sensitive data

268

Page 269: Help

The following features in Identity Safe provide securestorage of your sensitive information:

Stores login information, suchas your online bank account,email user ID, or password.

Manage Logins

Stores your personalinformation, such as addresses,date of birth, and credit cardinformation.

Manage Cards

Stores the details, such aspassport numbers and socialsecurity numbers.

Manage Notes

In addition to being a depository of sensitiveinformation, Identity Safe provides the followingfeatures:

1 Protects you from identity theft when you conductonline transactions

Antiphishing also helps to protect you frommalicious Web sites when you conduct onlinetransactions.

1 Manages your card information when you havemultiple credit cards to maintain

1 Safeguards the data that you save on your computer

By saving your data with a local profile, you canprevent your sensitive Identity Safe data on yourcomputer from being misused. A local profile isspecific to each of the Windows User Accountspresent on your computer.

1 Provides you the ease of carrying and using yourIdentity Safe data when you are on the move

By saving your data using a portable profile, youcan access your sensitive Identity Safe data fromany computer that has Norton 360 installed. A

269Securing your sensitive dataAbout securing your sensitive data

Page 270: Help

portable profile is a profile that you save on anexternal drive.

Norton 360 adds the Norton Toolbar to InternetExplorer and Firefox. The Norton Toolbar has thefollowing components:

1 Norton menu

1 Norton Safe Search

1 Safe Web indicator

1 Identity Safe menu

When you have cards or logins in Identity Safe, theIdentitySafe menu displays the list of cards and logins.

w If you turn off Identity Safe, you cannot access yourlogins and Identity Safe features from the NortonToolbar.

Norton 360 lets you view and access some of theIdentity Safe features even after the product expires.This way, you can still view your login details evenafter Norton 360 expires. However, it is not safe tobrowse the Internet after Norton 360 expires as youare vulnerable to online thefts and phishing attacks.

When your product expires, you cannot access theIdentity Safe features from the Identity Protectionsection of the Settings window. You can view andaccess these features using the Identity Safe menu orthe Norton menu that is available on the NortonToolbar.

The following are the activities that you can performafter the product expires:

1 Log in and log out of local profile or portableprofiles.

1 Switch from one profile to another profile.

1 Back up an Identity Safe profile and save it as .NPMfile.

1 Export your current Identity Safe profile to theexternal drive that is connected to your computer.

Securing your sensitive dataAbout securing your sensitive data

270

Page 271: Help

1 Open the Manage Logins window and view thelogins that you saved.

1 Auto-restore a profile when corruption is detected.

Turning off or turning on Identity Safe

Identity Safe helps you manage your identities andprovide additional security while you perform onlinetransactions. You can use the various features inIdentity Safe to manage your personal data, such asaddresses, date of birth and credit card information.The logins, cards, and notes help you store and useyour information in a secure way.

You can turn off or turn on the Identity safe from theQuick Controls in the Settings window or from theSettings window for Identity Protection.

w After you turn on Identity Safe, you must log in toIdentity Safe to access the various features.

To turn off or turn on Identity Safe from Quick Controls

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Quick Controls, doone of the following:

1 To turn off Identity Safe, uncheck IdentitySafe.

1 To turn on Identity Safe, check Identity Safe.

To turn off Identity Safe from Settings window

1 In the Norton 360 main window, move the mousepointer over Identity Protection, and then clickManage Identity Protection.

2 In the Settings window for Identity Protection, inthe Identity Safe row, move the On/Off switch tothe right to the Off position.

3 Click Apply.

To turn on Identity Safe from Settings window

1 In the Norton 360 main window, move the mousepointer over Identity Protection, and then clickManage Identity Protection.

271Securing your sensitive dataAbout securing your sensitive data

Page 272: Help

2 In the Settings window for Identity Protection, inthe Identity Safe row, move the On/Off switch tothe left to the On position.

3 Click Apply.

About Identity Safe profiles

You can create a local profile for each Windows UserAccount on your computer. The data that you save andthe Identity Safe settings that you make are specific tothat local profile. You cannot access the data that yousave in one Windows User Account from anotherWindows User Account. This way Identity Safe protectsyour sensitive data from the misuse of multiple usersof your computer.

w Symantec recommends that you create separatepassword-protected Windows User Accounts if youwant to share your PC across multiple users.

In addition to the profile that you create on a WindowsUser Account, you can save your Identity Safe data onan external drive. The profile that you create on aremovable drive is called portable profile.

When you create a portable profile, Norton 360 createsa folder that is labeled Norton Identity Safe Data inthe root directory. This folder contains the details ofthe portable profile data and the backup data. You cansee the details of the portable profile data and thebackup data in the IDDStore.dat file andIDDStore_bak.dat file, respectively.

You can use portable profiles on any PC on whichNorton 360 is installed. However, you can access yourportable profile only if you know the password for it.

In addition to the features such as saving logins, cards,and notes, you can do the following using your localprofile and portable profile:

1 Back up and restore your Identity Safe data.

The data that you back up are stored as .NPM files.You can also restore the previously backed up data

Securing your sensitive dataAbout securing your sensitive data

272

Page 273: Help

present in your local profiles and portable profiles,interchangeably.

1 Export your Identity Safe profile to the externaldrive that you insert.

1 Import your Identity Safe profile from an olderversion of the product to the upgraded version.

1 Rename the profile that you create.

1 Export Identity Safe data of your local profile andportable profile to a text file.

1 Restore and reset your Identity Safe password.

About creating Identity Safe profiles

Identity Safe lets you create one local profile perWindows User Account and one portable profile perexternal drive. You can create and save data in aportable profile in the same way you create and savedata in a local profile. You can also provide a name tothe profile so that you can easily identify the profileyou are logged in to.

When you insert an external drive, Identity Safeautomatically detects the presence of the drive andoffers you the option to create a portable profile. Incase you have already configured a portable profile inthe drive, you have the option to switch to the portableprofile. You can use multiple external drives at a time.However, you can create only one portable profile perexternal drive.

w Ensure that the external drive on which you create anew profile has at least 5 megabytes (MB) of free space.

Norton 360 supports the following external drives onwhich you can create your portable profiles:

1 Universal Serial bus (USB) flash drives

1 Portable USB hard drives

1 Cameras

1 MP3 players

1 Cell phones

273Securing your sensitive dataAbout securing your sensitive data

Page 274: Help

1 Zip drives

However, Norton 360 does not support devices such asfloppy drives, CD drives, DVD drives, and devices thatrequire Media Transfer Protocol or Picture TransferProtocol.

You can create and set up Identity Safe in the followingareas of Norton 360:

1 The Identity Safe menu on the Norton ToolbarWhen you click the Identity Safe menu, a dialogbox appears. You can use the dialog box to createan Identity Safe profile. Also, if you visit anytransactional Web site or a Web page that has formsbefore you create any profile, Norton 360 displaysa pop-up message. The alert message prompts youto create a profile and set a password for it. You canuse the Set up now option in the pop-up messageto create a profile.

1 The Identity Protection section in the Norton 360Settings window

Immediately after you create a profile with acorresponding password, Identity Safe lets you do thefollowing:

1 Create and save a card with general details, contactdetails, and credit card details.

The general details include name and gender, andcontact details include phone numbers and emailaddresses.

1 Import the logins that you saved in InternetExplorer.

Creating a local profile or a portable profile

Norton 360 provides the IdentitySafeSetup option tocreate local profile and portable profile. The optiondoes not appear after you successfully create localprofile and a portable profile.

The option does not appear in the following cases:

Securing your sensitive dataAbout securing your sensitive data

274

Page 275: Help

1 If you have not connected an external drive, theoption disappears after you create the local profile.

1 If you have connected one or more external drives,the option disappears after you create portableprofile on all the external drives.

When you insert an external drive, Identity Safeautomatically detects the presence of the drive andoffers you the option to create a portable profile.

After you create an Identity Safe profile, you can usethe Create your Norton Identity Safe profile windowto set a password for the profile. You can also providea name for the profile.

If you create a local profile, the Windows User Accountname appears as the profile name by default. But if youcreate a portable profile, the phrase My removablemedia appears as the profile name. You can renameboth your local profile and portable profile if necessary.Symantec recommends that you provide a portableprofile name that you can easily identify.

If you create a portable profile while you are loggedinto a local profile, Identity Safe automatically logsyou out of the local profile.

w An Identity Safe profile is created only after you set apassword for it.

To create a local profile or a portable profile

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

2 Under IdentitySafe, in the IdentitySafeSetup row,click Configure.

275Securing your sensitive dataAbout securing your sensitive data

Page 276: Help

3 In the dialog box that appears, do one of thefollowing:

1 To create a local profile, click Onmycomputer.

1 To create a portable profile, click On myremovable drive drive: drive name.The drive represents the drive in which yourexternal drive is connected and the drive nameis the name of your external drive.

The option appears only when you connect anexternal drive to your PC. The dialog boxdisplays this option for each external drive thatyou have connected to the PC.

4 In the Create your Norton Identity Safe profilewindow, in the Profile Name box, type a name forthe profile.

5 In the Password box, type a password. The passwordstrength is reflected in the graphic on the right sideof this page.

6 In the Confirm Password box, type your passwordagain.

7 In the Password Hint box, provide a hint thatreminds you of the password if you forget it.If your password and hint are the same, Norton 360warns you not to have a password hint same as yourpassword.

Securing your sensitive dataAbout securing your sensitive data

276

Page 277: Help

8 Choose one of the following options:

Prompts for your Identity Safepassword every time you log into Identity Safe.

You can change this setting inthe Password & Securitywindow.

Require my password atthe beginning of eachsession

Prompts for your Identity Safepassword whenever it tries toautofill any login.

You can change this setting inthe Password & Securitywindow.

Require my passwordbefore each login is filled

Cancels the Identity Safe setupprocess.

You can use this option if youdecide to create a profile later.

Don’t set up now

To create a profile you can select either of the firsttwo options that are mentioned in the table.

9 In the Edit Card window that appears, you cancreate your first Identity card if you want.

Importing logins

Identity Safe lets you import the logins that you havesaved in Internet Explorer. Immediately after youcreate an Identity Safe profile and save a password forit, the Profile Created dialog box appears. The dialogbox gives you a confirmation that the profile is created.

You can use this dialog box to import your logins. Theimported logins appear in the Identity Safe menu onthe NortonToolbar and in the ManageLogins window.You can use the imported logins the same way that youuse the logins that you create.

277Securing your sensitive dataAbout securing your sensitive data

Page 278: Help

To import logins

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

2 Under IdentitySafe, in the IdentitySafeSetup row,click Configure.

3 Set up Identity Safe.

4 In the Profile Created dialog box, click Yes.

Renaming your Identity Safe profile

Identity Safe lets you name the profiles you createusing Profilename option present in the SetupNortonIdentity Safe dialog box. Later, if you want to renameyour profiles, you can use the Rename Profile optionpresent in the Settings window for Identity Protection.When you log in to Identity Safe next time, the newname is displayed in the Login to Identity Safe dialogbox.

w The dialog box displays only your portable profile’sname.

To rename your profile

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

2 Under Identity Safe, in the Rename Profile row,click Configure.

3 In the Enteranewprofilename box, enter the namethat you want to use to name your profile.

4 Click OK.

Exporting Identity Safe data to portable profiles

Identity Safe lets you export your current profile to anexternal drive that you connect to your PC.

Securing your sensitive dataAbout securing your sensitive data

278

Page 279: Help

w Norton 360 does not support external drives such asfloppy drives, CD drives, DVD drives, and devices thatrequire Media Transfer Protocol or Picture TransferProtocol.

If you already have a profile configured in the externaldrive, this option does not appear in the Identity Safesettings of the current profile.

To export your Identity Safe data to portable profile

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

2 Under Identity Safe, in the Log in to Identity Saferow, click Configure, and log in to the profile thatyou want to export.

3 Under Identity Safe, in the Export Identity SafeData to Portable Profile row, click Configure.This option appears until you have connected anexternal drive that does not have a portable profile.

4 In the ValidateYourPassword dialog box, type thepassword of your current profile that you are loggedin.

5 Click OK.

6 In the dialog box that appears, in the Profile namebox, type a name of your choice.By default, Identity Safe displays My removablemedia as your portable profile’s name.

7 In the Export to box, type, or browse to the locationinto which you want to save your current profile’ssettings.

8 Click Export Identity Safe Data.

9 In the confirmation dialog box, click OK.

Exporting Identity Safe data

Identity Safe lets you export you cards, logins, andnotes whenever you want to. You can use the ExportIdentity Safe Data dialog box to export your IdentitySafe data.

279Securing your sensitive dataAbout securing your sensitive data

Page 280: Help

Norton 360 exports your confidential information toan unencrypted .csv (comma-separated value) formatand anyone can read it. You must not use this featureto create the backup of your Identity Safe data.

To export Identity Safe data

1 Do one of the following:

1 In Windows XP, click Start > Run.

1 In Windows Vista, click Start > Start Search.

1 In Windows 7, click Start > Search programsand files.

2 Type the path to the folder in which Norton 360 islocated and the executable’s file name.The following example shows the syntax:"C:\Program Files\Norton360\Engine\version\coExport.exe"

3 Click OK.

4 In the Export IdentitySafeData dialog box, do oneof the following:

1 If you want to export your local profile, selectLocal Profile.

1 If you want to export your portable profile, selectPortable Profile.

The Local Profile and Portable Profile optionsappear only if you insert an external drive witha portable profile configured in the externaldrive.

5 In the ExportIdentitySafepassword box, type yourIdentity Safe password.

6 Browse to the folder into which you want your datato be saved, and then click OK.

7 Type the name that you want to assign to the file,and then click OK.

8 In the confirmation dialog box, click OK.

Securing your sensitive dataAbout securing your sensitive data

280

Page 281: Help

Restoring or resetting Identity Safe password

There may be instances when you may need to eitherrestore your Identity Safe data or reset Identity Safesettings.

You may need to restore or reset on the followingoccasions:

1 You experience a computer failure.

Your Identity Safe data might have been damaged.If Identity Safe does not recognize your correctpassword, you can restore your data. If you are surethat your password is correct, first try to restoreyour Identity Safe data. Some data may be lost, butall critical information such as logins, cards, andnotes are retained.

1 You forget your Identity Safe password.

Norton 360 lets you enter an incorrect passwordtwice. If your attempts are unsuccessful, Norton360 provides you the option to restore Identity Safedata or reset your Identity Safe password.

If you cannot restore the Identity Safe data, or if youforget your Identity Safe password, you can reset yourIdentity Safe password. If you reset the Identity Safepassword, you lose all Identity Safe data that youstored, such as your login information, cards, andnotes.

To restore your Identity Safe data

1 In the Identity Safe dialog box, click RestoreIdentity Safe.

2 In the Restore Identity Safe Data dialog box, typeyour Identity Safe password, and click OK.

3 In the Identity Safe Data At Risk dialog box, clickYes, restore Identity Safe.

4 In the confirmation dialog box, click OK.

To reset your Identity Safe password

1 In the IdentitySafe dialog box, click ResetIdentitySafe Password.

281Securing your sensitive dataAbout securing your sensitive data

Page 282: Help

2 In the Identity Safe Data at Risk dialog box, clickYes, reset my password to continue with IdentitySafe setup.

Switching profiles

When you insert an external drive with a portableprofile, Identity Safe automatically detects the presenceof the drive. If you are already logged in to a profile,you can either switch to the profile in the external driveor use your current profile.

w Norton 360 automatically logs you out of your currentprofile when you switch to another portable profile.

To switch to your portable profile

4 In the A new profile has been found on yourremovable media dialog box, do one of thefollowing:

1 If you want to log in to your portable profile,click Switch profiles.

The option displays the drive in which yourexternal drive is connected. It also displays thename of your portable profile.

1 If you want to continue to be logged into yourcurrent profile, click Use current profile.

Locating your missing profiles

When you create a portable profile, Norton 360 createsa folder, Norton Identity Safe Data, in the rootdirectory. It also creates an index file, which is aninvisible file that tracks the location of the NortonIdentity Safe Data folder. The Missing Profile dialogappears when Norton 360 is unable to locate the NortonIdentity Safe Data folder.

Securing your sensitive dataAbout securing your sensitive data

282

Page 283: Help

To locate your missing profiles

4 In the Missing Profile dialog box, do one of thefollowing:

1 In the New location box, type, or browse to thelocation into which you have moved yourportable profile, and then click Profile wasmoved.

If the path that you type does not contain theportable profile, an error message appears.

1 If you deleted your portable profile, click Profilewas deleted.

Accessing Identity Safe

You can access the Identity Safe from the followingsections of Norton 360:

1 From the Identity Safe section in the Settingswindow for Identity Protection

1 From the Norton Toolbar

1 From the IdentityProtection section in the Norton360 main window

With Norton 360, you can access and configure someof the Identity Safe features even after the productexpires. The following are the features that you canview or access after the product expires:

You can view theManage Loginswindow using the Identity Safemenu on the Norton Toolbar.

Although the product is expired,you can still view all the loginsthat you saved for a Web page.However, you cannot save, add,or update logins after theproduct expires.

Manage Logins

283Securing your sensitive dataAbout securing your sensitive data

Page 284: Help

You can use this feature to takea backup of your Identity Safedata.

The data that you back up aresaved in .NPM format.

Backup Identity Safe data

You can use this option to exportyour current profile to anexternal drive that is connectedto your PC even after the productexpires.

Export Identity SafeDatato Portable Profile

In addition, you can do the following after the productexpires:

1 Log in and log out of local profile and portableprofiles.

1 Switch from one profile to another profile.

1 Auto-restore a profile when corruption is detected.

1 Use the IdentitySafeOptions window to configurethe Identity Safe settings.

1 Specify the security level of the Identity Safepassword that you saved. However, you cannotchange the password after the product is expired.

1 Use the Autofill Exclusions window to view theWeb pages for which you wanted Identity Safe notto save your logins or automatically fill the form.However, you cannot use the Do not Autofill thispage option after Norton 360 expires.

w You must be logged in to Identity Safe to access theIdentity Safe features.

To access Identity Safe Settings from the main window

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

2 Under Identity Safe, for the Identity Safe featurethat you want to open, click Configure.

Securing your sensitive dataAbout securing your sensitive data

284

Page 285: Help

To access Identity Safe Settings from the Settingswindow

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Identity Protection.

3 Under Identity Safe, for the Identity Safe featurethat you want to open, click Configure.

Toaccess Identity SafeSettings from theNortonToolbar

1 Start Internet Explorer or Firefox.

2 On the Norton Toolbar, in the Norton menu, clickSettings.

3 For the Identity Safe feature that you want to open,click Configure.

To access Identity Safe Settings after the productexpires

1 Start Internet Explorer or Firefox.

2 Click Identity Safe menu on the Norton Toolbarand log in to either local profile or portable profile.

3 On the Norton Toolbar, click Identity Safe >Manage > Settings.

Logging in to and out of Identity Safe

Norton 360 provides various ways by which you canlog in to or log out of Identity Safe.

You can log in to or log out of Identity Safe from thefollowing areas of Norton 360:

1 The Identity Safe section in the Settings windowfor Identity Protection

1 The Identity Protection section in the Norton 360main window

1 The Norton Toolbar

To secure your Identity Safe data when you are awayfrom your computer, log out of Identity Safe to prohibitaccess by others.

285Securing your sensitive dataAbout securing your sensitive data

Page 286: Help

When you have connected your external drives, incertain instances, Identity Safe automatically logs youout of the profile that you are logged in to.

Identity Safe automatically logs you out of your currentprofile under the following circumstances:

1 When you are logged in to a portable profile or alocal profile and click IdentitySafeSetup to createa new profile

1 When you are logged in to a portable profile andsafely or unsafely remove your external drive

1 When you switch from one profile to another profile

To view or edit your confidential data, you must belogged in to Identity Safe.

To log in to Identity Safe

1 In the Norton 360 main window, move the mousepointer over Identity Protection and click Log into Identity Safe.

2 If you have not inserted any external drive with aportable profile configured, in the LogintoIdentitySafe dialog box, type your Identity Safe password.

3 If you insert an external drive that has a portableprofile, in the Select the Identity Safe profile youwant to use dialog box, do one of the following:

1 To log in to the local profile, in the Profiledrop-down list, select the local profile and typeyour password in the Password box.

1 To log in to the portable profile, select theportable profile from the drop-down list and typeyour password in the Password box.

The Profile drop-down list displays the driveinto which you have connected your externaldrive. It also displays the portable profile name.

4 Click Log in now.

Securing your sensitive dataAbout securing your sensitive data

286

Page 287: Help

To log out of Identity Safe

4 In the Norton 360 main window, move the mousepointer over Identity Protection and click Log outof Identity Safe. You can also log out from theSettings window for Identity Protection.

To log in to Identity Safe from the Norton Toolbar

1 Start Internet Explorer or Firefox.

2 On the Norton Toolbar, click Identity Safe.

3 If you have not inserted any external drive with aportable profile configured, in the LogintoIdentitySafe dialog box, type your Identity Safe password.

4 If you insert an external drive that has a portableprofile, in the Select the Identity Safe profile youwant to use dialog box, do one of the following:

1 To log in to the local profile, in the Profiledrop-down list, select the local profile and typeyour password in the Password box.

1 To log in to the portable profile, select theportable profile from the drop-down list and typeyour password in the Password box.

5 Click Log in now.

To log out of Identity Safe from the Norton Toolbar

1 Start Internet Explorer or Firefox.

2 On the Norton Toolbar, click Identity Safe, andthen click Log out of Profile: Profile name.Where Profile name represents the name of yourprofile.

Configuring Identity Safe Settings

You can use the various features in Identity Safe tomanage your personal sensitive information. Thelogins, cards, and notes help you store and use yourinformation in a secure way.

287Securing your sensitive dataAbout securing your sensitive data

Page 288: Help

To configure Identity Safe Settings

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

Securing your sensitive dataAbout securing your sensitive data

288

Page 289: Help

2 Under Identity Safe, identify the feature that youwant to use, and click Configure. Your options are:

Lets you view the Web pageswhere you asked Identity Safe

Autofill Exclusions

not to save your logins orautomatically fill the form.

You can use the autofill optionon a Web page that you excludedto remove the Web page URLsfrom the Autofill Exclusions list.You can use the Identity Safemenu on the Norton Toolbar tomake online decisions aboutautofill.

Lets you back up the IdentitySafe data in .NPM file format.

Backup Identity SafeData

w You should back up all ofyour Identity Safe dataperiodically.

Lets you export the profile thatyou are currently using to theexternal drive connected.

Export Identity SafeDatato Portable Profile

If you already have a profileconfigured in the external drive,this option does not appear inthe Identity Safe settings of thecurrent profile. The optionappears until you haveconnected an external drive thatdoes not have a portable profile.

289Securing your sensitive dataAbout securing your sensitive data

Page 290: Help

Lets you set the options that letIdentity Safe securely collect andstore your Web page logininformation.

In addition, you can do thefollowing activities:1 Configure the region for your

card information.1 Specify how you want Norton

Identity Safe to use theautofill feature.

1 Set the options that makeIdentity Safe to display amessage to notify you thatyou have inserted an externaldrive.

1 Set the options that makeIdentity Safe to warn youabout the unsafe removal ofexternal drives.

Identity Safe Options

Lets you change the passwordsettings and Identity Safepassword security level.

w You should change yourIdentity Safe passwordfrequently to keep your IdentitySafe data from being misused.

Identity Safe Password &Security

Securing your sensitive dataAbout securing your sensitive data

290

Page 291: Help

Lets you manage your personalinformation such as name, dateof birth, email address, andcredit card information in oneplace.

You can use the information thatyou store to automatically fillforms. This feature lets youprovide sensitive informationwithout typing it when you areonline. In this way, Identity Safeprotects you from keyloggersthat steal and misuse youridentity.

Manage Cards

Lets you manage your variouslogin information.

Logins include information suchas your email login credentialsand Internet bankingcredentials.

When you save all of your logininformation in the Identity Safe,you can do the following:1 Easily track all your logins

1 Quickly launch your loginWeb pages

1 View or update yourpassword for the Web page

1 Use folders to organize yourlogins

1 Change your login settings

Manage Logins

291Securing your sensitive dataAbout securing your sensitive data

Page 292: Help

Lets you store and managesensitive information.

In Manage Notes, you can savesocial security number, driver'slicense number, insurance policynumber, and passport number.You can also save privateaccounts, lock combinations,documents, notes, frequent fliernumbers, bank account number,security challenge questions,and legal and financialinformation.

Manage Notes

Lets you rename the profile thatyou are currently using.

Rename Profile

Lets you restore the Identity Safedata from the backed up .npmfile.

You can use this option after youhave reset your Identity Safeoptions, but you want to revertto your backed up Identity Safedata.

When you restore a backed upfile of any profile, Norton 360overwrites the Identity Safe dataof the profile that you arecurrently logged in.

For example, you restore thebacked up file of your portableprofile while you are logged intoa local profile. In this case,Norton 360 overwrites your localprofile’s Identity Safe data withyour portable profile’s IdentitySafe data.

Restore Identity SafeData

Securing your sensitive dataAbout securing your sensitive data

292

Page 293: Help

About Manage logins

The Manage Logins feature in Identity Safe lets youview all the logins that you want Identity Safe tomanage. Login information includes information suchas your email login credentials and Internet bankingcredentials.

Identity Safe provides you the option to save yourlogins when you enter your login information in a Website's login page. You can instantly save your logininformation in Identity Safe.

Identity Safe offers the following features:

1 Safely stores Web page login information

1 Lets you save multiple IDs or accounts andpasswords for a Web site

1 Lets you organize your logins under variouscategories

1 Intelligently searches for a particular login

1 Lets you save the Web site name with a name otherthan the default name

1 Displays the login ID and lets you show or hide thepassword

1 Displays the strength of the password for your login

1 Lets you quickly launch the Web site login page

1 Fills in your login automatically when you revisitWeb pages

1 Lets you manually add logins

1 Lets you change the URL of your saved logins

1 Lets you view the last time you made changes tothe settings of your saved logins

1 Lets you view and fill the login details that yousaved for a Web page even after Norton 360 expires.To do so, use the IdentitySafe menu on the NortonToolbar.

To manage your logins, you must be logged in toIdentity Safe.

293Securing your sensitive dataAbout securing your sensitive data

Page 294: Help

Saving logins

Logins are saved when you enter them for the firsttime. You can save multiple logins for the same Webpage. You can also save the same login for differentWeb pages.

When you provide your login credentials on a Web site,Identity Safe displays the Save your login pop-updialog box. You can use the Save in drop-down list tosave your login in a general folder. The folders thatyou create appear in the Saveyourlogin pop-up dialogbox.

After Identity Safe saves a login, it automatically fillsthe login details next time you visit the Web page.

You must be logged in to Identity Safe to save and useautofill passwords. If the password or user name fieldis blank, Identity Safe does not prompt you to save thelogin.

Identity Safe lets you view and fill the details that yousaved even after the product expires. You can use theIdentitySafe menu on the NortonToolbar to view thelogins. Although you can continue to view your savedlogins after Norton 360 expires, you cannot save or addany new logins.

When you try to save a login after the product expires,a pop-up appears and suggests you to renew thesubscription of the product. You can use the pop-up torenew the subscription.

To save a login

1 Go to the Web page for which you want to save yourlogin.

2 Type your login details, and then click the optionor link that logs you in.

Securing your sensitive dataAbout securing your sensitive data

294

Page 295: Help

3 In the Save your login dialog box, do one of thefollowing:

1 If you do not want to save your login in a folder,click Save this login now.

1 If you want to save your login in a specific folder,use the following options, and then click Savethis login now.

The default site domain andpage title appear.

Save as

You can modify the site name.

Organizes your logins in variousfolders.

Save in

You can use any of the foldersthat you have already created tosave your login. When you savea login in a folder and later saveanother login for the same Webpage, the folder name isautomatically displayed. Forexample, you save a login forSymantec in a folder calledSymantec. Next time when youadd another login for Symantec,the Symantec folder isautomatically displayed in theSave in drop-down list.

In addition, you can create afolder using the Save indrop-down list. To do so, type aname for your folder where youwant to save your login details.The folder that you createappears in the Manage Loginswindow.

You can create folders and group all of the loginsyou have saved and their related Web pages. The

295Securing your sensitive dataAbout securing your sensitive data

Page 296: Help

logins appear on the NortonToolbar, in the IdentitySafe menu, in the same order in which you groupedthem.

To save additional logins for a Web page

1 Go to the Web page for which you want to saveanother login.Your login credentials automatically appear on theWeb page.

2 Clear the login credentials that appear on the Webpage.

3 Type the new login, and then click the option or linkthat logs you in.

4 In the Add a login dialog box, take the appropriateaction to organize your login, and then click Savethis login now.

Managing logins

Manage Logins lets you view all of the logins that youwant Identity Safe to manage.

Manage Logins offers you the following features:

1 Organizes your logins under various categories

You can organize your logins under differentfolders. If you have created folders in the ManageLogins window, you have the option to choose afolder under which you want to save your login.

1 Intelligently searches for a particular login.

Manage Logins offers you the intelligentfind-as-you-type search feature. Results are filteredbased on the characters that you type.

1 Lets you save the Web site name with a name otherthan the default name

You can also change the site name when you saveyour login.

1 Lets you add a login manually

You can add a login for a Web site or for a non-Website. Examples of non-Web site logins are your PC

Securing your sensitive dataAbout securing your sensitive data

296

Page 297: Help

credentials or login credentials for any otherapplication.

1 Lets you change the user name or password for yourlogins

Manage Logins uses the updated user name andpassword the next time you visit the login Webpage. Ensure that the updated user name orpassword is valid.

1 Displays the login ID and lets you show or hide thepassword

In the hide password mode, Identity Safe displaysonly eight characters, regardless of the length ofyour password. Also, when you create a login andchoose not to save any password at that moment,Identity Safe displays eight characters. If you wantto set the password later, you can use the Showoption and type the password in the Password box.

1 Displays the strength of the password for your login

Manage Logins also provides you a graphicalrepresentation of the strength of the password foryour login.

1 Lets you view the details of the date and time whenyou last made to the Manage Logins settings

To create a new folder

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

2 Under Identity Safe, in the Manage Logins row,click Configure.

3 In the Manage Logins window, click New folder.

4 In the New Folder dialog box, in the Enter newfolder name box, type a folder name.

5 Click OK.

To add a login manually

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

297Securing your sensitive dataAbout securing your sensitive data

Page 298: Help

2 Under Identity Safe, in the Manage Logins row,click Configure.

3 In the Manage Logins window, click New Login.

4 In the New Login dialog box, type the URL of theWeb site or a name for which you want to use thislogin.If it is a URL, ensure that you prefix it with HTTP.

5 Click OK.

6 In the Username dialog box, in the Enter newusername box, type the user name of the login, andthen, click OK.

7 In the confirmation dialog box, click OK.The confirmation dialog box prompts you to set apassword for the login that you created.

8 Click OK.

To set a password for the login that you addedmanually

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

2 Under Identity Safe, in the Manage Logins row,click Configure.

3 In the ManageLogins window, under Logins, selectthe login for which you want to set a password.

4 Under Details, next to Password box, click Show.The ValidateYourPassword window appears. Thiswindow appears only if you have changed theIdentity Safe password security level to Ask formypasswordbeforefillingoutaLogin in the Password& Security window

5 In the Password box, type your Identity Safepassword.

6 Click Validate my password.

7 In the ManageLogins window, in the Password box,type the password of your login.

8 Click OK.

Securing your sensitive dataAbout securing your sensitive data

298

Page 299: Help

To delete a login or a folder

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

2 Under Identity Safe, in the Manage Logins row,click Configure.

3 In the ManageLogins window, under Logins, selectthe Web site name or the folder that you want todelete.

4 Click Delete.

5 In the confirmation dialog box, click OK.

Managing your URL details

Manage Logins lets you view the URL of the logins thatyou saved. You can view the URL of the Web site loginsthat you save in Manage Logins.

When you save a login, you can do the following:

1 Quickly launch the Web site login page using theURL

1 Change the URL of the login manually

Ensure that the URL you change belongs to thesame domain as the current URL.

1 View the details of the date and time when you lastmade to the Manage Logins settings

To quick-launch a login Web page

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

2 Under Identity Safe, in the Manage Logins row,click Configure.

3 In the ManageLogins window, under Logins, selectthe login for which you want to launch the Web site.

4 Under Details, click the URL that is available nextto the Address option to launch the Web site.

5 Click OK to close the Manage Logins window.

299Securing your sensitive dataAbout securing your sensitive data

Page 300: Help

To change the URL of your login

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

2 Under Identity Safe, in the Manage Logins row,click Configure.

3 In the ManageLogins window, under Logins, selectthe login for which you want to launch the Web site.

4 Under Details, click Change that is available nextto the Address option.

5 In the dialog box that appears, type the new URL inthe Update URL box.Ensure that the URL you modify is valid and isprefixed with HTTP.

6 Click OK.

7 In the Manage Logins window, click OK.

Changing the user name and password

Identity Safe lets you change the user name andpassword for the logins that you have saved in theManage Logins window. The updated information isautomatically filled the next time you visit that Webpage.

To change the user name

1 In the Norton 360 main window, move the mousepointer over Identity protection, and then clickManage Identity Protection.

2 Under Identity Safe, in the Manage Logins row,click Configure.

3 In the ManageLogins window, under Logins, selectthe Web site name for which you want to changethe user name.

4 Under Details, next to Username box, clickChange.

5 In the Username dialog box, in the Enter newusername box, type the new user name.

6 Click OK.

Securing your sensitive dataAbout securing your sensitive data

300

Page 301: Help

To change the password

1 In the Norton 360 main window, move the mousepointer over Identity protection, and then clickManage Identity Protection.

2 Under Identity Safe, in the Manage Logins row,click Configure.

3 In the ManageLogins window, under Logins, selectthe Web site name for which you want to changethe password.

4 Under Details, next to the Password box, clickShow.The ValidateYourPassword window appears. Thiswindow appears only if you have changed theIdentity Safe password security level to Ask formypasswordbeforefillingoutaLogin in the Password& Security window.

5 In the Validate Your Password window do thefollowing:

1 In the Password box, type your Identity Safepassword.

1 Click Validate my password.

6 In the ManageLogins window, in the Password box,type the new password.

7 Click OK.

Updating the password for a login

Good security practice requires that you regularlychange the password for a login. You can keep yourlogin credentials in Identity Safe updated every timeyou change your password for a Web page. The updatedinformation is automatically filled the next time youvisit that login's associated Web page.

You can also update your new login information inIdentity Safe when you are on the Web page. IdentitySafe asks you if you want to update your logins.

301Securing your sensitive dataAbout securing your sensitive data

Page 302: Help

To update the password for a login

1 Go to the Web page for which you want to changethe password information.

2 Clear the password entry that Identity Safeautofilled.

3 Type the new password, and then click the buttonor link that logs you in.

4 In the Update your login dialog box, click Yes.

About Manage Cards

Manage Cards lets you manage your personalinformation such as name, date of birth, email address,and credit card information in one place.

You can use the information that you store in the cardsto do the following:

1 Automatically fill forms

1 Provide sensitive information without having totype it while you are online

In this way, Identity Safe protects you from keyloggersthat steal and misuse your identity.

w Some Web sites have forms with fields for credit cardsor other personal information. The IdentitySafe menuon the NortonToolbar lists the cards that you createdfor autofill. You can choose a card from the list to fillthe forms automatically.

You can add, view, edit, and duplicate the details of anycard that you create. You can also delete a card if it isno longer needed.

In addition, Manage Cards provides you the followingfeatures:

1 Lets you upload an image for each card so that youcan identify the card quickly

1 Lets you password-protect the card to protectyourself from misuse of your sensitive informationand personal information

Securing your sensitive dataAbout securing your sensitive data

302

Page 303: Help

1 Recognizes the Web pages that have forms andimmediately displays a pop-up window with the listof cards

1 Provides you a quick view of any of your cards thatis not password-protected

Identity Safe provides additional security for yourpassword-protected cards by not displaying thesummary of the card

When you are on a Web page that has forms, a pop-upappears with the cards that you saved. You can selectthe card that you want to use to fill the Web page. Youcan also use the IdentityCards option in IdentitySafemenu to select the cards. The next time that you visitthe same Web page, Identity Safe offers to autofill theform with the same card details. If you upload anyimage for your card while you create it, the IdentityCards option displays the image along with the nameof your card.

Adding cards

The cards in the Manage Cards window help you toautomatically fill forms on Web sites with a single click.You can create cards to store information, such aspersonal details, contact details, and credit card details.You can provide a card name to help you identify aspecific card.

If you have more than one credit card, you can createmultiple cards with different sets of information. Whenyou visit a transactional Web site, you can provide thecredit card details that are present in any of the cardsthat you created.

You can also create anonymous cards for use onunfamiliar Web sites where you may be uncomfortableproviding your personal information. You canautomatically fill online forms when you visit a Website.

303Securing your sensitive dataAbout securing your sensitive data

Page 304: Help

To add a card

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

2 Under IdentitySafe, in the ManageCards row, clickConfigure.

3 In the Manage Cards window, click Add Card.

Securing your sensitive dataAbout securing your sensitive data

304

Page 305: Help

4 Use the following tabs to type your card details:

Provide details such as cardname, name, gender, and date

General

of birth. You can set a passwordand provide additional securityfor your card. You can also typetheOpenIDURL of your personalWeb page, if any.

Online form filling is languagespecific. In the Country/Regionbox, the country United Statesis selected by default. Youshould change your region andcreate a new card before you fillonline forms for any otherlanguage.

You can change the region in theIdentity Safe Options window.

You can also browse to a Webpage of any region and thencreate a card. Use the ManageCardsoption in theNortonmenuon theNorton Toolbar. The cardis created with the Web pageregion. You can use this card tofill the Web page form.

Provide your contact informationon this tab. Contact information

Contact

includes your email address,postal address, and phonenumbers.

305Securing your sensitive dataAbout securing your sensitive data

Page 306: Help

Provide your credit card detailson this tab. You can enter thestandard credit card details,such as the type of the card,expiration date, and cardnumber. You cannot enter acredit card number of more than16 digits.

Credit Card

5 If you want to update the image for your card, clickthe Update Image link and upload the image.When you click UpdateImage, Norton 360 displaysa list of images. You can either select an image fromthe list or upload an image of your choice. Bydefault, Identity Safe uploads the CreditCard imagefor the cards you create.

6 Click Save.

Editing, deleting, or duplicating cards

All the cards that you have saved in Identity Safe arelisted in Manage Cards. You can select, view, duplicate,and edit the details of any card that you created. Youcan delete a card if it is no longer needed. You can alsoduplicate a saved card and change only the fields thatyou want to change.

You can view a summary of the card that you created.You can select any of the cards that are present in thelist of cards at the bottom of the ManageCards window.When you select a card, you can view a summary of thecard.

w When you lock your card with a password, IdentitySafe provides additional security to your card. Youcannot view the summary of the locked card. Youcannot edit, delete, or duplicate a card unless youprovide the password.

If you have multiple cards, use the scroll arrows tobrowse the list.

Securing your sensitive dataAbout securing your sensitive data

306

Page 307: Help

When you create, duplicate, or edit a card, the card'sregion is set to the user's default region. If you browseto a Web page other than the default region and usethe card on that form, the fields may not fill correctly.For example, your card has a default United Statesregion but you are on a France Web page. In this case,you must use the card with France as the region to fillthe Web page form.

You should change your region and create a new cardbefore you fill online forms for any other language.You can change the region in the IdentitySafeOptionswindow.

You can also browse to a Web page of any region andthen create a card. Use the Manage Cards option inthe Norton menu on the Norton Toolbar. The card iscreated with the Web page region. You can use thiscard to fill the Web page form.

To edit a card

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

2 Under IdentitySafe, in the ManageCards row, clickConfigure.

3 On the Manage Cards window, select the card thatyou want to edit.

4 Click Edit Card.

5 Modify the fields that you want to change.

6 Click Save.

To delete a card

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

2 Under IdentitySafe, in the ManageCards row, clickConfigure.

3 On the Manage Cards window, select the card thatyou want to delete.

4 Click Delete Card.

307Securing your sensitive dataAbout securing your sensitive data

Page 308: Help

5 In the confirmation dialog box, click OK.

To duplicate a card

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

2 Under IdentitySafe, in the ManageCards row, clickConfigure.

3 On the Manage Cards window, select the card thatyou want to duplicate.

4 Click Duplicate Card.

5 Change the fields that you want to change.

6 If you want to update the image for your card, clickthe Update Image link and upload the image.When you click UpdateImage, Norton 360 displaysa list of images. You can either select an image fromthe list or upload an image of your choice. Bydefault, Identity Safe uploads the CreditCard imagefor the cards you create.

7 Click Save.

About Manage Notes

Identity Safe stores and manages your sensitiveinformation. It becomes difficult to manage all of theidentity numbers that you use when you browse theWeb. Manage Notes stores all your sensitive IDs in avery secure way and lets you use them easily when youare online. Use Manage Notes to include informationsuch as social security number, driver's license number,insurance policy number, and legal and financialinformation.

Managing Notes

You can use Manage Notes to store your personalinformation, which you can retrieve and use whenneeded. You can use this information to fill out Website registration forms. You can also view, edit, anddelete the notes that you have saved.

Securing your sensitive dataAbout securing your sensitive data

308

Page 309: Help

To create Notes

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

2 Under IdentitySafe, in the ManageNotes row, clickConfigure.

3 In the ManageNotes window, under Details, selecta category from the drop-down list.If a note already exists, click New, and then underDetails, select a category from the drop-down list.

4 If you want to add a title to the note you create, inthe Title box, type a title.

5 Type any additional information in the Informationbox.

6 Click Save.

7 Click OK.

To edit Notes

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

2 Under IdentitySafe, in the ManageNotes row, clickConfigure.

3 In the ManageNotes window, on the left side, selectthe title of the information that you want to edit.

4 Click Edit, and modify the information underDetails.You can change the category, modify the title, andedit the information that you have already typed.

5 Click Save.

6 Click OK.

To delete Notes

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

2 Under IdentitySafe, in the ManageNotes row, clickConfigure.

309Securing your sensitive dataAbout securing your sensitive data

Page 310: Help

3 In the Manage Notes window, under Title, selectthe title of the information that you want to delete.

4 Click Delete.

5 In the confirmation dialog box, click OK.

6 Click OK.

About Autofill Exclusions

The Autofill Exclusions feature lets you view the Webpages for which you asked Identity Safe to not saveyour logins or automatically fill forms. Identity Saferemembers your decision and does not prompt you touse the logins or cards that are available in IdentitySafe.

When you do not want Identity Safe to automaticallyfill the details, you can use Do not Autofill this pageoption. This option is available in the Identity Safemenu on the Norton Toolbar.

If you later decide to autofill a Web page that youexcluded, you can remove the Web page URL from theAutofill Exclusions dialog box.

Specifying Autofill exclusions

Identity Safe offers to automatically fill in your loginson those Web pages for which you have saved thelogins. However, you can configure Identity Safe to notuse logins and cards to automatically fill details in aWeb page.

w If you choose Neverforthispage in the Saveyourloginpage that appears when you log in to a Web page, thesite is listed under this option.

You must be logged in to Identity Safe to delete a URLfrom the Autofill Exclusions list.

To specify autofill exclusions before you log in to aWebsite

1 Go to the Web page that you want to exclude fromautofill.

Securing your sensitive dataAbout securing your sensitive data

310

Page 311: Help

2 On the Norton Toolbar, click Identity Safe.

3 On the Identity Safe menu, click Do not Autofillthis page.The option appears only when you are on a Web sitethat has forms or login information.

To specify autofill exclusions after you log in to a Website

1 Go to the Web page that you want to exclude fromautofill.

2 Type your login, and then click the option or linkthat logs you in.

3 In the Saveyourlogin dialog box that appears, clickNever for this page.The URL is added to the Autofill Exclusions dialogbox.

Deleting entries fromyour Autofill Exclusions list

If you decide to autofill a Web page that you excluded,you can remove the Web page URL from the AutofillExclusions list.

w You must be logged in to Identity Safe to delete a URLfrom the Autofill Exclusions dialog box.

To edit your Autofill Exclusions list

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

2 Under IdentitySafe, in the AutofillExclusions row,click Configure.

3 Select the Web page where you want to restoreautomatic fill-in of the login, and then click Delete.

4 Click Apply.

5 Click OK.

About Backup and Restore

You can back up your Identity Safe data for securitypurposes, data recovery, or when you transfer your

311Securing your sensitive dataAbout securing your sensitive data

Page 312: Help

Identity Safe data to a new computer. The backup filesare saved as .NPM files.

You can protect your backup files with a password.Symantec recommends that you use a password to keepyour Identity Safe data more secure. The backuppassword need not be the same as your Identity Safepassword. You must provide the password when yourestore the Identity Safe data that you backed up.

You can also restore the data that you have previouslybacked up.

w Restoring your data overwrites your data in IdentitySafe, and replaces it with the contents of the backupfile.

Backing up your data

You can back up your Identity Safe data for securitypurposes, data recovery, or when you transfer yourIdentity Safe data to a new computer.

You can retrieve Identity Safe data when your productexpires.

To back up your data

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

2 Under Identity Safe, in the Backup Identity SafeData row, click Configure.

3 In the Backup Identity Safe Data dialog box, type,or browse to the location to which you want yourdata saved.

4 Type the name that you want to assign to the filewith a .NPM suffix.

5 If you want to back up your data with a passwordfor more security, type and verify the password.

6 Click OK.

7 In the confirmation dialog box, click OK.

Securing your sensitive dataAbout securing your sensitive data

312

Page 313: Help

Restoring your data

You can restore your backed up Identity Safe data ifyou delete it by mistake. You can also restore yourIdentity Safe data if you want to transfer it to a newcomputer.

When you restore, Norton 360 replaces any existingIdentity Safe data with the contents of the backup file.

w Restoring your data overwrites your data in IdentitySafe, and replaces it with the contents of the backupfile.

To restore your data

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

2 Under Identity Safe, in the Restore Identity SafeData row, click Configure.

3 In the Restore Identity Safe Data dialog box, clickYes.

4 In the Restore Identity Safe Data dialog box, typeor browse to the location of the file from which youwant to restore the data.

5 If you backed up your data with a password, typethat password.

6 Click OK.

7 In the confirmation dialog box, click OK.

About Identity Safe Options

Identity Safe Options allows you to configure the wayyou want Identity Safe to collect, store, and display thelogin information for the Web pages you visit. You canconfigure Identity Safe to display your cards that you

313Securing your sensitive dataAbout securing your sensitive data

Page 314: Help

created for the Web sites that have forms. You can alsoselect the region for the new cards that you create.

Lets you do the following:

1 Configure Identity Safe tocollect and store your logininformation for the Webpages, and fill the loginswhen you revisit those Webpages.

1 Configure Identity Safe todisplay your logins each timeyou visit a Web page that hasmultiple logins.

Logins

Securing your sensitive dataAbout securing your sensitive data

314

Page 315: Help

Identity Cards

315Securing your sensitive dataAbout securing your sensitive data

Page 316: Help

Lets you do the following:1 Displays the cards that you

create.

When you are on a Web pagethat has forms, a pop-upwindow lists the cards thatare available. The windowalso tells you the card thatyou used to fill the formpreviously, if applicable. Youcan select a card from the listand use the information inthe card to fill your form.

1 Select the region for creatinga new card.

The region that you selectappears on the General tabof the Manage Cardswindow. You cannot modifythe region in the ManageCards window itself.

Online form filling islanguage-specific.Dependingon your region, a defaultvalue appears in theCountry/Region box.

When you create a card, thecard's region is set to thedefault region of the user. Ifyou browse a Web page otherthan the default region anduse the card on that Webpage, the fields may not fillcorrectly. For example, yourcard has a default UnitedStates region but you are ona France Web page. In thiscase, you must use the cardwith France as the region tofill the Web page form.w Symantec recommends

Securing your sensitive dataAbout securing your sensitive data

316

Page 317: Help

that you change your regionand create a new card beforeyou fill forms on a Web sitethat uses a different region.

You can also browse to aWeb page of any region andthen create a card. Use theManage Cards option in theNorton menu on the NortonToolbar. The card is createdwith the Web page region.You can use this card to fillthe Web page form.

1 Use the autofill feature whenyou visit unsafe Web sites.

You may lose your sensitivedata when you use them onunsafe Web sites. IdentitySafe fills your logins or carddetails on unsafe Web sitesdepending on the option thatyou set.

You can use theAutofill sitescontaining security threatsoption to specify how youwant Norton Identity Safe torespond to the Web sites thathave security threats. To doso, use the Yes, No, or Askoptions.

317Securing your sensitive dataAbout securing your sensitive data

Page 318: Help

1 Display a message when youinsert an external drive.

At times, you may want touse your portable profilewhile you are logged intoanother profile. When youinsert an external drive witha portable profile configured,Identity Safe displays adialog box. You can use thisdialog box to switch to yourportable profile. The settingof this option is specific toWindows User Account.

You can choose to turn on orturn off this setting using thePrompt to log into portableprofile upon deviceconnectionoption. Symantecrecommends that you alwaysturn on this option.

1 Warns you about the unsaferemoval of the externaldrives.

You should never detachyour external drive manually.In case you manually ejectthe external drive, IdentitySafe displays a warningmessage. The setting of thisoption is specific to WindowsUser Account.

You can use the Warn aboutunsafe portable profileremoval option to turn on orturn off this setting.Symantec recommends thatyou always turn on thisoption.

Securing your sensitive dataAbout securing your sensitive data

318

Page 319: Help

About Identity Safe Password & Security options

You can use Identity Safe Password & Security tochange your Identity Safe password. You can also usethis option to set the level of security that you wantfor Identity Safe password usage.

The following options let you change the Identity Safepassword and set security levels for your password:

Change your Identity Safepassword and set a newpassword hint using theChange Password option.

Identity Safe Password

319Securing your sensitive dataAbout securing your sensitive data

Page 320: Help

Password Security

Securing your sensitive dataAbout securing your sensitive data

320

Page 321: Help

Specify the Identity Safepassword security level.

Identity Safe provides fourlevels of security to protectyour Identity Safe password.Choose one of the followingoptions:1 Ask for my password at

the beginning of eachLogin session

Prompts for your IdentitySafe password the firsttime you access IdentitySafe.

As long as you are loggedin to Windows, you do notneed to provide thepassword again.

You should use thisoption to make your logincredentials more secure.

1 Ask for my passwordbefore filling out a Login

Prompts for your IdentitySafe password with everyonline form before itautofills any login.

You can specify thatindividual logins requirethe entry of your IdentitySafe password beforeautofill occurs.

1 Automatically log out ofIdentity Safe if computeris inactive for: <nn>minutes

Automatically logs youout of Identity Safe whenyour computer is idle forthe time that you specify.

321Securing your sensitive dataAbout securing your sensitive data

Page 322: Help

This option is useful if youare frequently in an areawhere other people haveaccess to your computer.

1 No password needed.Automatically log me inwhenWindows is started

Set this option if you wantto automatically log in toIdentity Safe whenWindows is launched.

Symantec recommendsthat you do not choosethis option.

The setting of this optionis specific to WindowsUser Account.w You must validateyour Norton Identity Safepassword each time youchange the security levelof the profile to a settingthat is less secure thanthe current security level..This option does notappear if you are loggedin to your portable profile.

Changing the Identity Safe password

You should change your Identity Safe Passwordregularly to prevent unauthorized access to yourpersonal information in Identity Safe. You can changethe password by using the Identity Safe Password &Security option in Settings window for IdentityProtection Settings.

w You can set your password hint here if you did notprovide it when you configured Identity Safe.

Securing your sensitive dataAbout securing your sensitive data

322

Page 323: Help

To change the Identity Safe password

1 In the Norton 360 main window, move the mousepointer over IdentityProtection and click ManageIdentity Protection.

2 Under IdentitySafe, in the IdentitySafePassword& Security row, click Configure.

3 In the Password & Security window, click ChangePassword.

4 In the ChangeIdentitySafePassword window, typethe current password and the new password, andconfirm the new password.

5 Click OK.

6 In the confirmation dialog box, click OK.

323Securing your sensitive dataAbout securing your sensitive data

Page 324: Help

About Norton ToolbarWhen you install Norton 360, it adds Norton Toolbarto Internet Explorer and Firefox. You have thefollowing options:

Lets you access IdentityProtection and other settings.

The following options areavailable in the Norton menu:1 Report Site

1 Minimize Toolbar

1 Settings

1 Manage Logins

1 Manage Cards

1 Manage Notes

1 Community Buzz

1 Go to Norton Safe Webwebsite

1 Enable Norton Safe Web

1 Enable Norton Safe Search

1 My Norton Account

1 Launch Tutorial

1 Help

w The Minimize Toolbaroption appears only in theInternet Explorer browser. Also,the Community Buzz option isavailable only inEnglish-language versions ofWindows.

Norton menu

Securing your sensitive dataAbout securing your sensitive data

324

Page 325: Help

Lets you perform an enhancedInternet search using NortonSafe Search.

You can type a search string inthe Norton Safe Search box andperform a search. When yousearch using the search box, apop-up window appears anddisplays the relevant searchresults.

Norton 360 uses the Ask searchengine to display the searchresults. By default, the NortonSafe Search box is hidden. Afteryou install Norton 360 andconnect to Internet usingInternet Explorer or Firefox, analert message is displayed. Thealert message prompts you toenable Norton Safe Search. Youcan choose to enable or disableNorton Safe Search.

Norton Safe Search

Lets you know if the Web siteyou visit is safe or unsafe.

When the options under SafeSurfing are turned on,Antiphishing and Norton SafeWeb analyze the security level ofthe Web sites you visit. It thendisplays the results in theNorton Site Safety pop-up.

Safe Web indicator

325Securing your sensitive dataAbout securing your sensitive data

Page 326: Help

Lets you view the logins andcards that you have saved inIdentity Safe.

Some Web sites have forms tofill or require login information.You can use the Identity Safemenu to fill the details to suchWeb sites. The Identity Safemenu displays the list of alllogins and cards that you saved.You can select a login from thelist and a use it to log in to theWeb page. You can also select acard from the list and use to fillforms.

You can use the Manage optionto manage your logins, cards,and notes and to access theIdentity Protection Settingswindow. In addition, you can alsoedit and delete a login using theIdentity Safe menu.

w You should be logged in toyour Identity Safe profile toaccess the Identity Safe menu.

Identity Safe menu

Norton 360 lets you install the NortonToolbar for freeeven after you uninstall the product. When youuninstall Norton 360, it offers to leave the NortonToolbar without any cost to search and browse safelyover the Internet. However, when you choose to installthe Norton Toolbar, the only features that you haveare Norton Safe Search and Norton Safe Web.

w Your computer must be connected to the Internet toavail this option. Norton 360 does not offer to leavethe NortonToolbar if you upgrade your product to thelatest version or choose to reinstall another Nortonproduct.

Securing your sensitive dataAbout securing your sensitive data

326

Page 327: Help

Hiding and showing the Norton Toolbar

You can hide the Norton Toolbar if you do not want tosee the evaluation of every Web page that you visit.When you hide the toolbar, Norton 360 does not displaythe Norton Site Safety pop-up. However, Norton 360notifies you about suspicious and known fraudulentpages or if an error needs your attention.

To hide or show the Norton Toolbar

1 At the top of your browser window, click View.

2 On the Toolbars submenu, do one of the following:

1 Uncheck Norton Toolbar to hide the toolbar.

1 Check Norton Toolbar to show the toolbar.

Accessing Identity Safe settings from the Norton Toolbar

Both Internet Explorer and Firefox include the NortonToolbar, which provides direct access to Identity Safesettings. The Identity Safe options in the Norton menuon the Norton Toolbar provide quick links to IdentitySafe settings. The Identity Safe menu on the NortonToolbar provides quick links to login settings.

To access the Identity Safe settings from the Nortonmenu

1 Start Internet Explorer or Firefox.

327Securing your sensitive dataAbout securing your sensitive data

Page 328: Help

2 On the NortonToolbar, in the Norton menu, selectone of the following:

Lets you report to Symantecabout the current Antiphishingevaluation.

Report Site

Lets you minimize the NortonToolbar.

Minimize Toolbar

When you check this option, theIdentity Safe phrase and theSafe Web phrase disappear andonly the Identity Safe and SafeWeb indicators remain.

In addition, the size of theNorton Safe Search box isreduced.

w The Minimize Toolbaroption appears only in theInternet Explorer browser.

Lets you open the Settingswindow for Identity Protection

Settings

and configure the Identity Safeoptions.

Lets you access the logins thatyou saved in theManage Loginswindow.

Manage Logins

The Manage Logins optionappears only if you have set upIdentity Safe.

You must be logged in to IdentitySafe to use this option.

Securing your sensitive dataAbout securing your sensitive data

328

Page 329: Help

Lets you access the cards thatyou saved in the Manage Cardswindow.

The Manage Cards optionappears only if you have set upIdentity Safe. You can alsochoose a card to fill the onlineforms when you are on a Webpage.

You must be logged into IdentitySafe to use this option.

Manage Cards

Lets you access the notes thatyou saved in the Manage Noteswindow.

The Manage Notes optionappears only if you have set upIdentity Safe.

You must be logged into IdentitySafe to use this option.

Manage Notes

329Securing your sensitive dataAbout securing your sensitive data

Page 330: Help

Lets you view the communitysite rating of the Web sites youvisit.

You can click Community Buzzto know further details about theWeb sites. Norton Safe Webrates the sites and providesdetailed reports. In addition, youcan see user reviews and postyour reviews about the Websites.

When you have not opened anyWeb site, you can clickCommunity Buzz to visit theNorton Safe Web site. You canprovide the address of any Website and find the security details,Norton rating, and communityreviews of the Web site.

w The Community Buzzoption is available only inEnglish-language versions ofWindows.

Community Buzz

Lets you open the Norton SafeWeb sitehttp://www.safeweb.norton.com.

Go to Norton Safe Webwebsite

Securing your sensitive dataAbout securing your sensitive data

330

Page 331: Help

Lets you turn on the Norton SafeWeb feature which provides asafe online browsing experience.

The following are the uniquefeatures of Norton Safe Web:

1 Displays the site safetyrating icons for the searchresults in the search Webpage

1 Displays the site safetyrating icons when you are ona Web page

Enable Norton Safe Web

Lets you view the Norton SafeSearch box.

You can type a search string inthe Norton Safe Search box andperform a search. The search boxdisplays relevant searchsuggestions in a pop-up window.

By default, the Norton SafeSearch box is hidden. After youinstall Norton 360 and openInternet Explorer or Firefox, analert message is displayed. Thealert message prompts you toenable Norton Safe Search. Youcan choose to enable or disableNorton Safe Search. If you wantto disable Norton Safe Search,you can use the Disable NortonSafe Search option.

Enable Norton SafeSearch

Lets you open the Web sitehttps://www.mynortonaccount.com/amsweb.

Norton Account lets you registeryour product with Symantec andmanage all of your Nortonproducts in one place.

My Norton Account

331Securing your sensitive dataAbout securing your sensitive data

Page 332: Help

Lets you use the online tutorialto learn more about IdentitySafe.

Launch Tutorial

Lets you view the Norton menuhelp page.

Help

Accessing the Identity Safe menu

The Identity Safe menu on the NortonToolbar lets youview and manage the logins, cards, and notes that yousaved. You can also access the Identity Safe Settingswindow using the IdentitySafe menu. In addition, youcan navigate to any Web page for which you have savedthe login credentials.

When you visit any login Web page without settingyour Identity Safe password, a pop-up appears in theIdentitySafe menu. You can use the Setupnow optionthat is available in the pop-up to set your Identity Safepassword.

Identity Safe menu lets you view the logins that yousaved even after the product expires. You can use thisoption to autofill the login details of the saved login.As Antiphishing is disabled when the product isexpired, it is not recommended to autofill the logindetails. In addition, you can view the IdentityProtection Settings window. However, you cannotview, access, or configure all the features in the IdentityProtection Settings after Norton 360 expires.

To access your logins from the Identity Safe menu

1 Start Internet Explorer or Firefox.

Securing your sensitive dataAbout securing your sensitive data

332

Page 333: Help

2 On the Norton Toolbar, in the Identity Safe menu,select one of the following:

Lets you create an autofillexclusion for the Web page loginor forms.

Do not Autofill this page

You can use this option whenyou do not want Identity Safe toautomatically fill the details ofthe saved logins or cards.

w The option appears onlywhen you are on a Web site thathas forms or login information.

Lets you open the ManageLogins window, the Manage

Manage

Notes window, and the ManageCards window.

You can use this option to accessyour logins, cards, notes, andIdentity Protection Settingswindow.

Lets you log out of or log in toIdentity Safe.

Log out of Profile: Profilename

You should log out of IdentitySafe to secure your Identity Safedata when you are away fromyour computer. The optionshows the name of your profilethat you are currently loggedinto.

Lets you use a saved login for aWeb page from the list of loginsthat is displayed.

Available Logins for thispage

333Securing your sensitive dataAbout securing your sensitive data

Page 334: Help

Lets you use a card while you areon a Web page that has forms.

The option displays the cardsthat you saved from which youcan choose the one you want touse to fill the form. If you uploadan image for your card while youcreate it, the option displays theimage along with the name ofthe card.

Identity Cards

Securing your sensitive dataAbout securing your sensitive data

334

Page 335: Help

Lets you open the Web page forwhich you have saved logins.

You can also view the logins thatare organized into folders. Thefolder displays the site names ofthe Web pages. You can view thesite names that you providedwhen you saved your login inIdentity Safe.

The following options areavailable when you right-clickany of the saved login:1 Open in New Tab

You can use this option toopen a Web page with asaved login on a new tab ofthe browser window. Thenew tab opens with the logindetails autofilled andauto-submitted. You can usethis option even after theproduct expires.

The Open in New Tab optionis available only in InternetExplorer 7 or later, andFirefox browsers.

1 Edit

You can use this option toedit the details of the loginsthat you saved. This optionlets you open the ManageLogins window where youcan view and edit the logindetails.

1 Delete

You can use this option tomanually delete any of thelogins present in the IdentitySafe menu.

site name/folder name

335Securing your sensitive dataAbout securing your sensitive data

Page 336: Help

Securing your sensitive dataAbout securing your sensitive data

336

Page 337: Help

This chapter includes the following topics:

1 About the Network Security Map

About the Network Security MapA home network typically consists of the computersand other devices that share your Internet connection.The Network Security Map helps you view and manageyour network.

After you configure Network Security Map, Norton 360automatically detects the devices that are connectedto your network and lists them in the Network SecurityMap. You can view devices and customize the NetworkSecurity Map to remotely monitor the computers onwhich a Norton product is installed.

w Ensure that the computers that you want to remotelymonitor have a version of a Norton product thatsupports Remote Monitoring.

You can access the Network Security Map from the MyNetwork Settings window.

You can monitor the following items in the NetworkSecurity Map:

1 Security status of the computers that are connectedto the network

1 Status of the protection features of the computersthat are connected to the network

10Protecting yourhome network

Page 338: Help

1 Subscription status and Norton product version ofthe computers that are connected to your network

1 Status of your wireless network connection

1 Connection status of the devices that are on thenetwork

1 The known, unknown, or intruder devices that areon your network

You can grant or deny permission to the networkeddevices to access your computer.

You can also modify details about a computer or devicethat is connected to your network.

Viewing devices on the Network Security MapThe NetworkSecurityMap window provides a pictorialrepresentation of the devices on the network to whichyour computer is connected. You can view the detailsof each device, such as device name, security status,and IP address.

The Network Security Map window also provides thesecurity status of the following computers:

1 The computer on which you view the remotemonitoring status (MY PC)

1 The computers that are remotely monitored

The trust level of the device appears at the bottom ofthe icon in the network map.

Norton 360 displays devices in the following order:

1 MY PC

1 Devices with online connection status

1 Devices with offline connection status

When you connect a new device to your network,Norton 360 automatically refreshes the NetworkSecurity Map window and displays the device.

Protecting your home networkAbout the Network Security Map

338

Page 339: Help

w Norton 360 requires you to configure the SymantecSecurity Driver to open the Network Security Map. Youcannot install the Symantec Security Driver when yourun LiveUpdate. You can either allow the NortonLiveUpdate to complete or close the Norton LiveUpdatesession before you install the Symantec Security Driver.

To view devices on the Network Security Map

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 If the Product Configuration panel appears, clickContinue.The Product Configuration panel appears whenyou click Network Security Map for the first time.The ProductConfiguration panel helps you installSymantec Security Driver that is required to viewthe NetworkSecurityMap window. The process ofinstallation of the Symantec Security Driverdisrupts your network connection temporarily.

4 Under Network Security Map, click Configure.The Network Security Overview window lets youview the summary of features of the NetworkSecurity Map. The Network Security Overviewwindow appears in the following instances:

1 When you open the Network Security Mapwindow for the first time.

1 When you turn on Welcome Screen at Startupin the Settings window for My Network, underNetwork Security Map.

5 If the NetworkSecurityOverview window appears,click OK.If you do not want to view the Network SecurityOverview window in the future, check Donotshowthis again before you click OK.

6 In the Network Details drop-down list, select thenetwork that lists the device for which you want tosee the details.

339Protecting your home networkAbout the Network Security Map

Page 340: Help

To view the details of a device on the Network SecurityMap

Protecting your home networkAbout the Network Security Map

340

Page 341: Help

4 In the NetworkSecurityMap window, click a deviceicon.You can use the scroll arrows to view the devicesthat are listed in the network map.The device details section that is located below thenetwork map displays the following details:

Shows the name of the deviceDevice Name

For a computer, the NetworkSecurity Map displays theNetBIOS name by default.However, the Network SecurityMap displays the name of thedevice as NEW if it meets thefollowing conditions:

1 The device does not have aNetBIOS name

1 The device has a firewall thatis enabled

You can change the device namein the Edit Device Detailswindow.

Shows the name of the networkadapter manufacturer of thedevice

Adapter Manufacturer

The adapter manufacturer'sname is based on the physicaladdress (also known as MediaControl Access address or MACaddress) of the device.

341Protecting your home networkAbout the Network Security Map

Page 342: Help

Shows the category to which thedevice belongs

The device category iconprovides details on theconnection status and securitystatus. Norton 360 labels allunknown devices as NEW andsets the category as GENERICDEVICE.

This category may includecomputer-related devices, suchas printers, media devices, andgame consoles.

You can change the devicecategory in the Edit DeviceDetails window.

Category

Shows how well your computeris protected from threats, risks,and damage

w The security statusappears only for MY PC and thecomputers that are remotelymonitored.

Security Status

Shows the connection status ofRemote Monitoring

The statuses are:

1 ON

1 OFF

You can turn off RemoteMonitoring for an individualcomputer or for all thecomputers that you remotelymonitor.

Remote Monitoring

Protecting your home networkAbout the Network Security Map

342

Page 343: Help

Shows the access level that isgranted to a remote device toconnect to your computer

The initial trust level is set basedon the configuration of yourcomputer. You can set trust levelfor all devices other thanMYPC.

Trust Level

Shows the status of theconnection

The statuses are:

1 ONLINE

1 OFFLINE

Connection

Shows the physical address (alsoknown as the Media AccessControl address or MAC address)of the computer or device

Physical Address

Shows the IP address of thecomputer or device

If you change the IP address ofa device, the updated IP addressappears in theNetwork SecurityMap window when you refreshthe list.

IP Address

Turning off or turning on Network Security OverviewThe Network Security Overview window provides abrief summary about the following features:

1 Wireless Security

1 Remote Monitoring

1 Network Map

1 Trust Controls

343Protecting your home networkAbout the Network Security Map

Page 344: Help

You can click each of the features and read thesummary to learn more about using Network SecurityMap to manage your home network. By default, theNetworkSecurityOverview window appears each timeyou open Network Security Map.

If you do not want to view the Network SecurityOverview window, you can turn it off. Turning off theNetwork Security Overview window does not affectthe performance or security of your computer.

w You can also turn off the NetworkSecurityOverviewwindow if you check Do not show this again optionthat is available at the bottom of the NetworkSecurityOverview window.

To turn off Network Security Overview

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 Under Network Security Map, in the WelcomeScreen at Startup row, move the On/Off switch tothe right to the Off position.

4 Click Apply.

5 Click Close.

To turn on Network Security Overview

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 Under Network Security Map, in the WelcomeScreen at Startup row, move the On/Off switch tothe right to the On position.

4 Click Apply.

5 Click Close.

Setting up Remote MonitoringYou can set up Remote Monitoring by allowingcomputers on your network to communicate with yourcomputer.

Protecting your home networkAbout the Network Security Map

344

Page 345: Help

w Ensure that the computers that you want to remotelymonitor have a version of a Norton product thatsupports Remote Monitoring.

Norton 360 requires a Passkey to set up RemoteMonitoring. You must type the same Passkey for allthe computers that you want to remotely monitor.

After you set up Remote Monitoring, you can connectany computer to your network and enter the samePasskey. Norton 360 automatically identifies thecomputer and connects it to the Network Security Map.

To set up Remote Monitoring

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 On the left side of the Network Security Mapwindow, under Remote Monitoring, click Setup.

5 In the Remote Monitoring Setup window, type aPasskey.The Passkey should be between 6 and 20 charactersin length. The Passkey is case sensitive.

6 Under Choose the default mode for ComputerDiscovery, select one of the following options:

Lets your computer alwaysdiscover other computers thatare connected to the network

Computer Discoveryalways on

Lets your computer discoverother computers that areconnected to the network whenthe Network Security Mapwindow is open

Computer Discovery ononly when NetworkSecurity Map screen isdisplayed

7 Click OK.

8 Set up Remote Monitoring for all other computersthat you want to monitor remotely.

345Protecting your home networkAbout the Network Security Map

Page 346: Help

Turning off Remote MonitoringWhen you turn off Remote Monitoring, you stop remotemonitoring of the computers that are connected toyour network.

You can turn off Remote Monitoring for the following:

1 All of the computers that you remotely monitor

1 An individual computer that you remotely monitor

w You can turn off Remote Monitoring only after youcomplete the Remote Monitoring Setup process.

To turn off Remote Monitoring for all computers

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 On the left side of the Network Security Mapwindow, under Remote Monitoring, click Disable.

5 In the confirmation dialog box, click Yes.

To turn off Remote Monitoring for an individualcomputer

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 In the Network Security Map window, in thenetwork map, click the computer for which you wantto disable Remote Monitoring.

5 In the device details area, next to RemoteMonitoring, click Disable.

6 In the confirmation dialog box, click Yes.

Adding a device to the Network Security MapYou can manually add a computer or device to theNetwork Security Map.

Protecting your home networkAbout the Network Security Map

346

Page 347: Help

You can add the following details when you add adevice:

1 The name or description

1 The IP address or physical address

The Network Security Map finds any computers thatare connected to your network. However, you can addthe computers and the devices that are currently notconnected.

Norton 360 adds to the Trust Control network all thedevices that you manually add to Network SecurityMap. You can select the Trust Control network in theNetwork Details drop-down list to view the devicesthat you added. You can also edit the name of thedevice.

w You cannot edit the Trust Control network details.

The default trust level of the devices that you add tothe Network Security Map is Protected. However, youcan change the trust level of the devices.

w If you trust a device that is not on your network, youcan expose your computer to potential security risks.

To add a device to the Network Security Map

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 On the left side of the Network Security Mapwindow, under Total in Network, click the plussymbol.

5 In the AddaDevice window, in the Name box, typethe name of the device that you want to add to theNetwork Security Map.The maximum character length of the device nameis 15 characters.

347Protecting your home networkAbout the Network Security Map

Page 348: Help

6 In the IP or Physical Address box, type the IPaddress or physical address of the device that youwant to add to the Network Security Map.You can use the following formats in the IP orPhysical Address box:

172.16.0.0IPv4 address

fe80::12ac:fe44:192a:14ccIPv6 address

11-22-c3-5a-fe-a4Physical address

ftp.myfiles.comResolvable host

The address that you provide is not verified untilthe device is physically found on the network.

7 Click Add Device.

Finding a computer's IP addressYou can find a computer's IP address in various ways.On Windows 2000/XP, Windows Vista, and Windows7 computers, you can use Ipconfig to find the IP addressof a computer.

Ipconfig reports the IP address of its local computeronly. You must run this program on the computer thatyou want to identify.

To find an IP address by using Ipconfig on Windows2000/XP

1 On the computer you want to identify, on theWindows taskbar, click Start > Run.

2 In the Run dialog box, type cmd.

3 Click OK.

4 At the command prompt, type ipconfig, and thenpress Enter on your keyboard.

5 Write down the IP address.

Protecting your home networkAbout the Network Security Map

348

Page 349: Help

To find an IP address by using Ipconfig onWindowsVista

1 On the computer you want to identify, on theWindows taskbar, click Start.

2 In the Start Search text box, type cmd, and thenpress Enter on your keyboard.

3 At the command prompt, type ipconfig, and thenpress Enter on your keyboard.

4 Write down the IP address.

To find an IP address by using Ipconfig on Windows 7

1 On the computer you want to identify, on theWindows taskbar, click Start.

2 In the Searchprogramsandfiles text box, typecmd,and then press Enter on your keyboard.

3 At the command prompt, type ipconfig, and thenpress Enter on your keyboard.

4 Write down the IP address.

Editing device detailsYou can change the name and category of a device thatis available on the Network Security Map. You canselect the categories such as Generic Device, Laptop,Media Device, or Game Console.

You cannot change the category of the device that youadded manually. By default, Norton 360 displays thecategory of the manually added device as USERDEFINED.

The NetworkSecurityMap window displays differenticons, depending on the category that you select. Iconshelp you identify the devices that are listed in thenetwork map.

To edit the details of the device that is on your network

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

349Protecting your home networkAbout the Network Security Map

Page 350: Help

4 In the Network Security Map window, in thenetwork map, click a device icon.

5 In the device details section, next to Device Name,click Edit.

6 In the EditDeviceDetails window, in the Name box,type a new name.The maximum character length of the device nameis 15 characters.

7 In the Category drop-down list, click one of thefollowing device categories:

1 GENERIC DEVICE

1 DESKTOP PC

1 LAPTOP

1 SERVER PC

1 NETWORK PRINTER

1 ROUTER/SWITCH

1 CABLE/DSL MODEM

1 MEDIA DEVICE

1 GAME CONSOLE

1 PDA/MOBILE PHONE

1 NETWORK STORAGE DEVICE

1 WEB CAMERA

8 Click OK.

To edit the name of the device that you addedmanually

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 In the Network Security Map window, in theNetworkDetails drop-down list, click TrustControl.

5 In the network map, select a device that you added.

6 In the device details area, next to DeviceName, clickEdit.

7 In the Edit Device Details dialog box, in the Namebox, type a new name.

Protecting your home networkAbout the Network Security Map

350

Page 351: Help

8 Click OK.

Editing network detailsYou can view the details and change the name of yournetwork in the Edit Network Details window.

w You cannot edit the Trust Control network details.

To edit network details

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 In the NetworkSecurityMap window, on the rightside of Network Details, click Edit.

5 In the Edit Network Details dialog box, in theNetwork Name box, type a new name.

6 Click OK.

Changing the trust level of your network and devicesThe trust level determines the default level of accessthat devices on your network have to your computer.Any device on your network that is not explicitlyTrusted or Restricted uses the trust level of yournetwork. The initial network trust level is set based onthe configuration of your computer.

w Ensure that you change the trust level of a device toFull Trust, if it is a known device, and is connected toyour network.

The following conditions are necessary for the trustlevel of a device to be Shared:

1 The computer should not have a public IP address.

Your computer does not have a public IP address ifit is not directly connected to the Internet.

1 The computer should be connected to a LANthrough a secure connection.

351Protecting your home networkAbout the Network Security Map

Page 352: Help

1 The network category should be private in WindowsVista.

In addition, the trust level of a device is Shared in anyof the following cases:

1 When the computer on the network has one or morefolders or printers that are shared

1 When the computer is Media Center compatible (forexample, if you have Windows XP Media CenterEdition, Windows Vista Home Premium, WindowsVista Ultimate, Windows 7 Home Premium,Windows 7 Professional, or Windows 7 Ultimate)

w If you use a wireless network that is not secure, thedefault trust level of all the devices that are on thenetwork is Protected.

The trust level of a device also depends on the trustlevel of its network. When you change the trust levelof a network, Norton 360 assigns the same trust levelto all the devices that are connected to that network.However, Norton 360 does not change the trust levelof the devices that you individually trust or restrict.

You can modify these settings if you want to changethe trust level for the following:

1 Your network

1 Devices that are connected to the Network SecurityMap

To change the trust level of your network

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 In the NetworkSecurityMap window, on the rightside of Network Details, click Edit.

5 In the Edit Network Details window, next to TrustLevel, click Edit.You can view the details of the network in the EditNetwork Details window before you change thetrust level.

Protecting your home networkAbout the Network Security Map

352

Page 353: Help

6 To select a trust level for a network, in the EditNetwork Trust Level window, click one of thefollowing:

Adds the network to the Trustedlist

FULL TRUST

All the network traffic that yourcomputer receives from aTrusted network is filtered andallowed through firewall.However, known attacks andinfections are still monitored.You should select this settingonly when you are sure that thenetwork is completely safe.

Adds the network to the Sharedlist

SHARED

All the network traffic that yourcomputer receives from a Sharednetwork is filtered. Only sharedresources on your computer,such as files, folders, andprinters are allowed. You shouldselect this setting if you want thefirewall to protect you from alltraffic except those that pertainto file and printer sharing.

Adds the network to theProtected list

PROTECTED

A network is in the ProtectedTrust Level when it has not beenclassified as Trusted, Shared, orRestricted. You remain protectedfrom known attacks and allunexpected traffic.

353Protecting your home networkAbout the Network Security Map

Page 354: Help

Adds the network to theRestricted list

The devices that are onRestricted network cannotcommunicate with yourcomputer. However, you can stilluse the network to browse Websites, send email messages, ortransmit other communications.

RESTRICTED

7 Click OK.

To change the trust level of a device

1 In the Norton 360 main window, click Settings.

2 In the Settings window, click My Network.

3 Under NetworkSecurityMap, in the TrustControlrow, click Configure.

4 In the Network Security Map window, do one ofthe following:

1 To edit the trust level of a device that youmanually added, in the network map, click thedevice.

1 To edit the trust level of a device that is on yournetwork, in the NetworkDetails drop-down list,click LocalAreaConnection, and then click thedevice.

5 In the device details section, next to Trust Level,click Edit.

Protecting your home networkAbout the Network Security Map

354

Page 355: Help

6 To select a trust level for a device, in the EditDeviceTrust Level window, click one of the following:

Adds a device to the Full Trustlist

Full Trust devices are monitoredonly for known attacks andinfections. You should select thissetting only when you are surethat the device is completelysafe.

FULL TRUST

Adds a device to the Restrictedlist

Restricted devices do not haveaccess to your computer.

RESTRICTED

Adds a device to a default trustlevel

The devices that are removedfrom the Full Trust level orRestricted trust level take thedefault trust level of thenetwork. The trust level of thenetwork can be Full Trust,Restricted, Protected, or Shared.

USE NETWORK TRUST(trust level)

7 Click OK.Norton 360 displays the trust level status of eachrestricted device on the icon of the device.

Excluding a device from Intrusion Prevention scanThe Intrusion Prevention System in Norton 360 scansall the network traffic that enters and exits yourcomputer. When a device on your network requestsaccess your computer, Intrusion Prevention scans thisrequest to ensure that it is not a virus attack. Scanningevery request from all the devices that access your

355Protecting your home networkAbout the Network Security Map

Page 356: Help

computer increases the scan time which slows downthe network speed of your computer.

If you know that a specific device on your network issafe, you can apply Full Trust level to this device. Inaddition, you can exclude this specific device fromIntrusion Prevention scan. When you exclude a devicefrom Intrusion Prevention scan, Norton 360 trusts thisdevice and does not scan any information that isreceived from this device. This improves the networkspeed of your computer and helps the trusted deviceto access your device quickly.

w You can exclude only full trusted devices that are onthe local subnet.

To exclude a device from Intrusion Prevention scan,you must ensure that the IP address of the device neverchanges. Norton 360 uses IP addresses to identifydevices on your home network. If the IP address of thedevice changes, Norton 360 cannot identify the trusteddevice that should be excluded from IntrusionPrevention scan.

w You can exclude a trusted device from IntrusionPrevention scan only if you are sure that the devicedoes not have any security threats.

When you apply Full Trust to a device and exclude itfrom Intrusion Prevention scan, the IP address andMAC address of the device are added to the TrustControl.

To exclude a device from Intrusion Prevention scan

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 Under My Network, in the Network Security Maprow, click Configure.

4 If the NetworkSecurityOverview window appears,click OK.

Protecting your home networkAbout the Network Security Map

356

Page 357: Help

5 In the Network Security Map window, do one ofthe following:

1 To edit the trust level of a device that is on yournetwork, in the network map, click the device.

1 To edit the trust level of a device that youmanually added, in the Network Detailsdrop-down list, click Trust Control, and thenclick the device.

6 In the device details section, in the TrustLevel row,click Edit.

7 In the Edit Device Trust Level window, click FULLTRUST.

8 At the bottom of the Edit Device Trust Levelwindow, check Exclude from IPS scanning.

9 In the Exclude fromIPSScanning dialog box, clickYes to confirm.

10 Click OK.

Removing devices from the Network Security MapThe Network Security Map window lists the devicesthat are connected to your network. You can remove adevice or a computer from the Network Security Map.You can purge all devices from the network map andcreate a new list of devices. For example, you can purgeall the devices that were present in your previousnetwork before you connect to a new network. Ensurethat you disable Remote Monitoring before you purgethe network map. Norton 360 cannot purge the networkmap when the Remote Monitoring is turned on. Also,ensure that you close the Network Security Mapwindow before you purge the network map. You cannotpurge the network map when the Network SecurityMap window is open.

w Norton 360 purges the devices that you add manuallyin the Trust Control network depending upon theirtrust level. It does not purge the devices that have atrust level as Full Trust or Restricted.

357Protecting your home networkAbout the Network Security Map

Page 358: Help

When you remove an individual device, the onlinedevices appear again the next time you open theNetwork Security Map. However, Norton 360permanently removes the offline devices.

To remove an individual device

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the NetworkSecurityMap row, click Configure.

4 In the Network Security Map window, do one ofthe following:

1 To remove a device that is on your network, inthe network map, click the device.

1 To remove a device that you manually added, inthe NetworkDetails drop-down list, select TrustControl, and then click the device.

5 On the left side of the Network Security Mapwindow, under Total in Network, click the minussymbol.

6 In the confirmation dialog box, click Yes.

To purge the Network Security Map

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 Under NetworkSecurityMap, in the NetworkMaprow, click Purge.

4 In the confirmation dialog box, click Yes.

Viewing the status of your wireless networkYou can view the status of your wireless network inthe Network Security Map window. The NetworkSecurity Map displays the status of your wirelessnetwork as secure or not secure. A secure networkrequires a strong wireless encryption. If your wirelessnetwork is not secure, you can turn on encryption onyour wireless router.

Protecting your home networkAbout the Network Security Map

358

Page 359: Help

For more information on how to secure your wirelessnetwork, on the left side of the NetworkSecurityMapwindow, click the Why is it not secure link. Follow theinstructions.

w You should only trust a wireless connection that issecure. Trusting a wireless connection that is notsecure puts all of the devices on your network at risk.

To view the status of your wireless network

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the Network Security Map row, click Configure4 On the left side of the Network Security Map

window, view the status of your wireless network.Your wireless network statuses are:

Indicates that your wirelessnetwork is secure

WirelessNetwork Secure

Indicates that your wirelessnetwork is not secure

Wireless Network NotSecure

Viewing the device detailsThe Network Security Map lets you view the details ofthe computers that you remotely monitor. You canview the following details:

1 The configuration status of your protectionfeatures, such as Auto-Protect, IntrusionPrevention, and Email Scanning

1 The configuration status of your definition updates,such as Automatic LiveUpdate and Pulse Updates

1 The version number of your Norton product

1 The subscription status of your Norton product

1 The configuration status of your transactionsecurity, such as Identity Safe and Antiphishing

359Protecting your home networkAbout the Network Security Map

Page 360: Help

1 The last five AntiVirus threats that are detected

To view the device details

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 In the Network Security Map row, click Configure4 In the Network Security Map window, in the

network map, click the device for which you wantto see the details.You can view the details of only the computers thatyou remotely monitor.

5 In the device details section, next to Category, clickDetails.

6 In the Device Details window, view the details ofthe device.

7 Click Close.

Modifying the communication port for NetworkSecurity Map

The Network Security Map Settings lets you configurethe communication port number that Norton Productsuse to communicate with each other over a network.By default, Norton products use 31077 as thecommunication port number.

If you change the communication port number of yourNorton product, you must change it on every computerthat is connected to your home network. In addition,when you find more computers that use the RemoteMonitoring Setup process, ensure that the same portnumber is used on every computer.

w Though you can modify the communication portnumber, it is recommended that you do not change thisport number. If you change the communication portnumber, you must use a port number in the range of1-65535.

Protecting your home networkAbout the Network Security Map

360

Page 361: Help

Tomodify the communication port forNetwork SecurityMap

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click My Network.

3 Under Network Security Map, in theCommunication Port box, type a newcommunication port number.You must use the same port number for each of thedevice that is connected to your Network SecurityMap.

4 Click Apply.

5 Click Close.

361Protecting your home networkAbout the Network Security Map

Page 362: Help

Protecting your home networkAbout the Network Security Map

362

Page 363: Help

This chapter includes the following topics:

1 About PC Tuneup

1 About disk and file fragmentation

1 Optimizing your permanent disks manually

1 About using optimization efficiently

1 About cleaning up disk clutter

1 Running a scan to clean up disk clutter

1 Running Registry Cleanup

1 Running Diagnostic Report

1 About Startup Manager

About PC TuneupNorton 360 offers total protection of your PC thatincludes PC Tuneup capability, which increases yourPC performance. PC Tuneup keeps your computer tunedup for peak performance.

Norton 360 keeps your PC tuned up and runningsmoothly by using various techniques, such asoptimizing your hard disk and deleting unusedtemporary files.

11Keeping your PCtuned up

Page 364: Help

PC Tuneup detects and fixes common computerproblems, cleans up unwanted cookies and files, anddefragments the hard disk to optimize PC performance.

About disk and file fragmentationYour PC's hard disk stores all of your files, applications,and the Windows operating system. Over time, the bitsof information that make up your files gradually spreadover the disk. This process is known as fragmentation.The more you use your computer, the more fragmentedyour disks become.

When a fragmented file is accessed, the diskperformance is slower. The performance is slowerbecause the drive head locates, loads, saves, and keepstrack of all of the fragments of the file. If free space isalso fragmented, the drive head might have to trackadequate free space to store temporary files or newlyadded files.

Norton 360 optimizes your permanent disks to improveyour PC's efficiency and speed. The optimizationprocess rearranges the scattered file fragments intoadjacent or contiguous clusters. When the drive headaccesses all of the file data in one location, the file isread into the memory faster. Optimization alsoconsolidates free space to avoid fragmenting newlyadded files. It adds extra space after major datastructures so that they can grow without immediatelybecoming fragmented again.

Optimizing your permanent disks manuallyOptimizing your PC's permanent disks can improveperformance and reliability. Norton 360 automaticallychecks your permanent disks for fragmentation andoptimizes them if they are more than 10 percentfragmented. You can always check the latest reportsto see if optimization is necessary.

Keeping your PC tuned upAbout disk and file fragmentation

364

Page 365: Help

Some programs, such as movie-editing programs orprograms that require large amounts of disk space, canwork more efficiently if your disks are optimized. Ifyou prefer not to wait until Norton 360 performsautomatic optimization, you can optimize your disksmanually.

To optimize your permanent disks manually

1 In the Norton 360 main window, move the mousepointer over PC Tuneup, and then click Run DiskOptimization.

2 When the activity is complete, in the ActivitiesandScan Details window, click Close.

About using optimization efficientlyNorton 360 automatically optimizes the permanentdisk in your PC as necessary and does not require youto take any action to accomplish that task. You can,however, adopt some practices that help Norton 360perform automatic optimization more efficiently.

The following practices can help make automaticoptimization more efficient:

Norton 360 performs diskoptimization when your PC isidle. If you turn off your PCwhenever you finish yourwork, Norton 360 cannotperform automaticoptimization. If you turn offyour PC during optimization,Norton 360 restarts theoptimization process whenyou turn on your PC again.

Occasionally leave your PCturned on when you do notuse the PC

365Keeping your PC tuned upAbout using optimization efficiently

Page 366: Help

Norton 360 automaticallyoptimizes the hard disk asneeded. You can also set aschedule for optimization.

Set a schedule foroptimization

Large files are often morefragmented than the smallerfiles. These fragmented filesaffect the performance ofyour computer.

Remove the large files thatyou no longer need

About cleaning up disk clutterOver time, the permanent disk in your PC canaccumulate many temporary and unneeded files.Eventually, these files can significantly reduce theavailable disk storage space and affect the performanceof your PC. Norton 360 automatically cleans upaccumulated disk clutter.

The temporary files that clutter your PC can come fromthe following sources:

When you install software onyour PC, the installationprocess creates temporaryfiles as part of theinstallation process. In somecases, the installer might notclean up these temporaryfiles when the installationfinishes.

Software installations

Keeping your PC tuned upAbout cleaning up disk clutter

366

Page 367: Help

When you browse a Webpage, your browserdownloads the text andgraphics that comprise thecontents of the page. Whenyou finish viewing the page,the browser can leave thedownloaded contents on yourPC. The downloaded contentshelp to display the Web pagemore quickly if you view thepage again. These browserfiles accumulate over time.

Web browsing

During normal operation,some programs createtemporary files to improveefficiency while you work. Ifa program ends unexpectedlybecause of a software error,those temporary files can beleft behind.

Program errors

Running a scan to clean up disk clutterA cleanup scan searches your PC's permanent disk fortemporary and unused files to improve performanceand increase available disk space. Norton 360automatically removes the temporary and the unusedfiles from your PC.

Various activities, such as extensive Web browsing ora series of software installations produce temporaryfiles. You can run a manual cleanup scan to remove thetemporary files immediately.

To clean up your disk clutter

1 In the Norton 360 main window, move the mousepointer over PC Tuneup, and then click Run FileCleanup.

367Keeping your PC tuned upRunning a scan to clean up disk clutter

Page 368: Help

2 When the activity is complete, in the ActivitiesandScan Details window, click Close.

Running Registry CleanupThe Windows registry can contain the entries that referto files that do not exist. Such broken registry itemscan slow down your computer. Registry Cleanup scansyour computer and cleans any broken registry entriesthat it finds.

To run Registry Cleanup

1 In the Norton 360 main window, click Tasks.

2 In the Tasks window, under PCTuneupTasks, clickRun Registry Cleanup.

3 When the activity is complete, in the ActivitiesandScan Details window, click Close.

Running Diagnostic ReportNorton 360 Diagnostic Report gathers informationabout your computer, which includes the operatingsystem, programs, and hardware. You can use thisreport to find and fix the issues.

Norton 360 Diagnostic Report is a real-time report witha timestamp. Norton 360 does not generate this reportautomatically. You need to use the Run DiagnosticReport option and manually generate the report.

You can save, email, or print the report when neededfor review.

To run Diagnostic Report

1 In the Norton 360 main window, move the mousepointer over PC Tuneup, and then click RunDiagnostic Report.

2 When the activity is complete, view the details inDiagnostic Report window, and then click Close.

Keeping your PC tuned upRunning Registry Cleanup

368

Page 369: Help

About Startup ManagerSome programs are configured to launch during startupof your computer. The number of startup itemsincreases as you install new applications, and the timethat is required to start your computer increases as aresult. Norton 360 Startup Manager helps to managethe startup items on your computer. For any startupprogram that the Startup Manager lists, you can viewthe detailed information such as Community Usageand Resource Usage. You can also click the applicationname and view the File Insight details. These detailswould help you determine whether or not to enable anapplication during startup.

Startup Manager lets you view the list of programs thatare included to the startup items. Based on yourpriority, you can configure Startup Manager to run ornot run these programs when your computer starts.You can also choose to delay the start of the programsand run them manually from the Startup Manager.This way, you can enhance the performance of yourcomputer.

You can disable a program and measure theperformance of your computer the next time you startyour computer at startup.

Disabling or enabling startup itemsWhenever you start your computer, there are someprograms that automatically start and run in parallel.These programs are called startup items. The startupitems increase the start time of your computer.

Startup Manager helps you manage the startup itemsof your computer efficiently. If you do not want aprogram to automatically start when you turn on yourcomputer, you can disable the program in the StartupManager. You can also delay a startup item that youwant to start at a later time.

369Keeping your PC tuned upAbout Startup Manager

Page 370: Help

To disable startup items

1 In the Norton 360 main window, move the mousepointer over PC Tuneup, and click Run StartupManager.

2 In the On/Off column, uncheck a program that youdo not want to automatically start when you turnon your computer.

3 Click Apply to save the changes.

4 Click Close.

To enable startup items

1 In the Norton 360 main window, move the mousepointer over PC Tuneup, and click Run StartupManager.

2 In the On/Off column, check a program that youwant to automatically start when you turn on yourcomputer.

3 Click Apply to save the changes.

4 Click Close.

Delaying and running delayed startup itemsNorton 360 Startup Manager monitors and lists theprograms that automatically start when you turn onyour computer. To reduce the start time of yourcomputer and improve the performance, you can delaythe start of some of the programs when you turn onyour computer.

To delay startup items

1 In the Norton 360 main window, move the mousepointer over PCTuneup, and then click RunStartupManager.

2 In the Delay Start column, check a program thatyou want to delay.

3 Click Apply to save the changes.

4 Click Close.

Keeping your PC tuned upAbout Startup Manager

370

Page 371: Help

To run delayed startup items manually

1 In the Norton 360 main window, move the mousepointer over PCTuneup, and then click RunStartupManager.

2 In the StartupManager window, click RunDelayedItems Now.

3 Wait for the program to start, and then in theStartup Manager window, click Close.

371Keeping your PC tuned upAbout Startup Manager

Page 372: Help

Keeping your PC tuned upAbout Startup Manager

372

Page 373: Help

This chapter includes the following topics:

1 About Norton Backup and Restore

1 About backups

1 About Backup preparation

1 About backup set

1 Backing up your files

1 Restoring files

1 About Norton Backup Drive

1 About solutions to the backup problems

1 About online backup considerations

1 Turning off or turning on backup

1 Turning off or turning on backup setting options

About Norton Backup and RestoreThe Norton Backup and Restore feature protects yourimportant data and media files by regularly backingup the files. If something catastrophic happens to yourPC, you can restore your valuable information fromthe backups that Norton 360 has made.

12Protecting yourmedia and data

Page 374: Help

About backupsOne of the most important ways to protect the valuableinformation on your PC is to back up your filesregularly. In case you lose your data, Norton 360 letsyou restore them later. For example, you accidentallyerase an important file or your PC has a hardwaremalfunction that destroys some files. In this case, youcan restore your lost files from your backup.

You can also use backup to keep your PC's permanentdisk from becoming filled with old and seldom-usedfiles. After you have backed up such files, you canremove them from your PC and restore them later ifyou need to use them again.

Norton 360 lets you to conveniently back up your filesto any media that Windows recognizes as a storagedrive. The backup destination may include externaldrive, network storage folders, CD, DVD, Blu-ray disc,iPod, flash drive, cameras, smart-phones, or a host ofother devices.

For any file that you have backed up, Norton 360 letsyou view the status through the icon overlays and theBackup tab in Properties page. The icon overlays ona file show the backup status of your protected files.You can view details such as the last backup time ofeach backup set in the Backup tab of the file Propertiespage. You can turn off these options if you do not wantto view these icon overlays and the Backup details.

Norton 360 also provides a safe and a private onlinestorage environment to which you can back up yourfiles. The online storage location is different from thelocation where you normally store files in your PC.Disasters that damage or destroy your PC cannot harmyour backups because they are stored in a differentlocation. In addition, when you use the Norton 360online backup, you can restore your files from anycomputer at any time. Norton 360 must be installed inthe PC to access your Norton Account.

Protecting your media and dataAbout backups

374

Page 375: Help

No matter which backup method you choose, you canalways add or remove items from the set of files thatyou select to back up. You can add or remove anindividual file from the backup sets by using theshortcut menu that appears when you right-click a file.

About Backup preparationAfter you install Norton 360, you must configureNorton 360 backup to back up your important files onyour computer. You can back up your important fileswith Norton 360 either automatically or at a time thatyou specify. You can always change the backup settingsyou initially make.

Choose the following settings when you make a backup:

You can perform the varioustasks that are related to thebackup sets such as creating,deleting, and renamingbackup sets.

You can also preview thedetails that are related to anyparticular backup set such asthe size and the availablefiles.

Summary

375Protecting your media and dataAbout Backup preparation

Page 376: Help

You can choose from a varietyof file types, such as photos,documents, and music. Youcan also specify individualfiles.

You have the followingoptions:1 Backup Sources

Lets you select a sourcefrom which you want toback up your files

Norton Backup iscomprehensive or shortdepending on thelocations that you select.

1 File Types

Lets you include orexclude a backup filecategory

You can add a file or afolder to the backup orexclude a file or a folderfrom the backup. You canalso use Add or excludefiles and folders optionto view the added andexcluded files and folders.In addition, you can usethe Edit file types optionto edit file extensionswithin each file category.When you check Edit filetypes, you can add, edit,or remove the fileextensions in eachBackup category by usingthe Configure option.

What

Protecting your media and dataAbout Backup preparation

376

Page 377: Help

You can choose any storagelocation that Norton 360offers for your backuplocation, depending on yourPC and the connecteddevices.

You can choose to store yourbackups on external media,such as CD, DVD, Blu-raydisc, or iPod. You can alsostore your backups on anetwork drive, removableflash memory drive, orpermanent disk in your PC.

w Backing up your files toa location where your sourcefiles are available is not safe.You may lose your dataduring hardwaremalfunctions.

You can delete the previouslybacked-up files. You can alsodecide if you want to verifyyour backups by checking theVerify all backups option.

Norton 360 also provides asecure online backup servicethat you can use to store yourbacked-up files in a safelocation on the Internet. Thisservice protects yourinformation even ifsomething catastrophichappens to your PC.

Where

377Protecting your media and dataAbout Backup preparation

Page 378: Help

You can have Norton 360back up your files when yourcomputer is idle. You can alsoset a regular backup scheduleor manually back up yourfiles.

When

The online backup service that is provided with theNorton 360 requires you to create a Norton Accountfirst. When you back up files online, Norton 360requests your Norton Account name and password,which prevents unauthorized access to your backed-upfiles.

Before Norton 360 runs a backup, it examines the fileson your computer so that it can back up your files moreefficiently. During this initial examination, Norton 360counts the number of files that may need to be backedup. Norton 360 also records the types and sizes of thosefiles. This process usually takes no more than a fewminutes the first time you run a backup.

About backup setNorton 360 lets you create multiple sets of backupconfigurations. The configuration is a set of rules andis called a backup set. You can specify the files that youintend to back up, the backup destination, and the timewhen you want to back up your files. You can usemultiple backup sets to back up different combinationsof files or file categories to different locations.

Multiple backup set creation helps you to use yourlimited Secure Online Storage judiciously. For example,you can create a backup set to back up your picturefiles and music files to a CD. You can also createanother backup set to back up your Microsoft Officedocuments and your financial files to your SecureOnline Storage.

You can do the following tasks:

Protecting your media and dataAbout backup set

378

Page 379: Help

1 You can create multiple backup sets with differentset of rules. For example, you can create a backupset to back up your pictures to your local fixed disk.You can also create another backup set to back upyour videos to a CD. You can configure differentschedules for each backup set.

1 You can modify a backup set to include or excludefiles or file categories or to use another backupdestination to back up your files. You can changethe schedule of a backup set. You can also renamea backup set if the name does not describe thebackup set after you modify the rules.

1 You can delete a backup set if it is no longer needed.You can create a new backup set to start backingup your files from the beginning.

The Summary tab of the ManageBackupSets windowdisplays the set of rules that you have configured foreach backup set. You can select a backup set from theBackupSetName drop-down list to view the rules. Thisway, you can keep a record of the files or file categoriesthat Norton 360 backs up to different destinations. Youcan also modify the rules if required. In addition, youcan view the date and time of the last backup activityfor a backup set.

Creating a new backup setYou can create multiple backup sets with differentconfigurations. For example, you can create a backupset to back up your pictures to your local fixed disk.You can create another backup set to back up yourvideos to a CD. You can also configure differentschedules for each backup set.

When you create a new backup set, Norton 360 appliesthe default configuration for the backup set. You canchange the configuration if the default configurationdoes not meet your needs.

You can identify each backup set with a backup setName. The default name of a backup set is DefaultSet.You can save a backup set with the default name as

379Protecting your media and dataAbout backup set

Page 380: Help

well. But, whenever you create a new backup set, youmust provide a name for the backup set. The maximumcharacter length of a backup set Name is 32alphanumeric characters. You cannot create more than10 backup sets.

To create a new backup set

1 In the Norton 360 main window, move the mousepointer over Backup, and then click ManageBackupSets.

2 On the Summary tab, under Things you can do,click Create new backup set.

3 In the window that appears, type a name for yourbackup set, and then click OK.

4 On the What tab, under File Types, select a filecategory.

5 In the Manage Backup Sets window, click SaveSettings.

Modifying or renaming a backup setWhen you create a new backup set, Norton 360 appliesthe default configuration for the backup set. You canchange the configuration if the default configurationdoes not meet your needs.

You can modify a backup set to include or exclude filesor file categories or choose another backup destinationto back up your files. You can change the schedule ofa backup set. You can also rename a backup set if thename does not describe the backup set after you modifythe configuration.

w The maximum character length of a backup set Nameis 32 alphanumeric characters.

To modify a backup set

1 In the Norton 360 main window, move the mousepointer over Backup, and click Manage BackupSets.

Protecting your media and dataAbout backup set

380

Page 381: Help

2 On the Summary tab, in the Backup Set Namedrop-down list, select the backup set that you wantto modify.

3 Under BackupSetSummary, view the details of thebackup set, and do the following:

1 To include or exclude files or file categories in abackup set, click What, and change the settings.

1 To change the backup destination, click Where,and change the settings.

1 To change the backup schedule, click When, andchange the settings.

4 In the Manage Backup Sets window, click SaveSettings.

To rename a backup set

1 In the Norton 360 main window, move the mousepointer over Backup, and click ManageBackupSet.

2 On the Summary tab, in the Backup Set Namedrop-down list, select the backup set that you wantto rename.

3 Under Thingsyoucando, click Renamebackupset.

4 In the window that appears, change the name of thebackup set, and then click OK.

5 In the Manage Backup Sets window, click SaveSettings.

About backup file categories

When Norton 360 performs a backup, it first examinesthe permanent disk of your PC for files to back up andsorts them into various categories. It then backs up thefiles that fall into these categories.

381Protecting your media and dataAbout backup set

Page 382: Help

Norton 360 uses the following file categories:

This category includes, but isnot limited to: PhotographicJPEG and JIFF images (.jpg,.jpeg, .jpe, .jP2, .j2k, .j2c,.jpf); Graphic InterchangeFormat image files (.gif);Bitmap Graphics files (.bmp,.pct); Tagged Image Formatfiles (.tif, .tiff); AdobePhotoDeluxe images (.pdd);Windows Metafile (.wmf);Portable (Public) NetworkGraphic files (.png);Photoshop files (.psd);Macintosh Quickdraw/PICTDrawing files (.pict);Encapsulated PostScript files(.eps); MS Foxpro Screen files(.sct); Run Length EncodedBitmap files (.rle);Device-Independent BitmapGraphic files (.dib); BorlandJBuilder Project files (.jpx);Japan Picture Format files(.jpc); Image Alchemy HSITemporary Raw Bitmap files(.raw); Pixar Picture files(.pxr); CAD files (.vda); PixarPicture File (.pxr); TARGA File(.tga); Adobe IllustratorVector Graphic (.ai); KodakPhoto CD (.pcd); Kodak RAWBitmap Image (.kdc); AdobeInDesign Document (.indd);Paint Shop Pro Image (.psp);Corel Vector Graphic Drawing(.cdr); and Targa Bitmap files(.icb, .vst).

Pictures

Protecting your media and dataAbout backup set

382

Page 383: Help

This category includes, but isnot limited to: MPEG AudioStream, Layer III files (.mp3);MPEG-4 Video files (.mp4);MPEG-4 Audio Layer files(.m4a); Apple Protected AACfiles (.m4p); Real NetworksRealMedia Streaming Mediafiles (.ra); RealMediaStreaming Media files (.rm);RealMedia Metafile files(.ram); MIDI files (.rmi); MSWindows Media Audio files(.wma); MPEG-2 AdvancedAudio Coding files (.aac);Monkey's Audio LosslessAudio Compression Formatfiles (.ape); Free LosslessAudio Codec files (.flac);Waveform Audio files (.wav);MP3 Playlist files (.m3u);Musical Instrument DigitalInterface MIDI Sound files(.mid; .midi); Fast Tracker 2Extended Module files (.xm);ScreamTracker v3 Sound files(.s3m); MPEG Audio Stream,Layer I (.mp1); WindowsMedia Player Playlist (.wpl);Playlist (.pls); Audio Codec 3File (.a3c); Audio InterchangeFile Format (.aif, .aifc, .aiff);and MPEG Audio Stream,Layer II (.mp2).

Music

383Protecting your media and dataAbout backup set

Page 384: Help

This category includes, but isnot limited to: MicrosoftMoney files (.mny, .mn1,.mn2, .mn3, .mn4, .mn5,.mn6, .mn7, .mn8, .mn9,.mn10, .mn11, .mn12, .mn13,.mn14, .mn15, .mbf);TurboTax Tax Return files(.tax); H&R Tax Return files(.t01, .t02, .t03, .t04, .t05,.t06); TaxACT files (.ta0, .ta1,.ta2, .ta3, .ta4, .ta5, .ta8,.ta9); QuickBooks files (.qba,.qbb, .qbi, .qbw, .qbx, .qph,.qdf, .qdb, .qif, .qsd, .qel,.qph, q00, q01, .q02, .q03,.q04, .q05, .Q98); Olicom Faxfiles (.ofx); Quicken Data File(.qdt); Simply Accounting File(.sdb); and Open FinancialConnectivity files (.ofc).

Financial Files

Protecting your media and dataAbout backup set

384

Page 385: Help

This category includes, but isnot limited to: MicrosoftWindows Media files (.wmv);Apple QuickTime Video Clipfiles (.mov); MPEG 1 SystemStream files (.mpg, .mpeg);Macromedia Flash Formatfiles (.swf); Audio VideoInterleave files (.avi); MSAdvanced Streaming Formatfiles (.asf); Beijer E-Designerfiles (.mpa); MPEG Movie Clipfiles (.mpe); MPEG-4 Videofiles (.m4v); Digital Video File(.dv); Ogg Vorbis CompressedVideo File (.ogm); Open MediaFormat File (.omf) MPEG-1Video File (.m1v); MPEG-2Program Stream Format File(.m2p); MPEG-2 Video OnlyFile (.m2v); QuickTime Movie(.moov); MPEG-1 Video File(.mpv); QuickTime Movie (.qt);VDOScript File (.vdo); andDVD Video Movie File (.vob).

Video

385Protecting your media and dataAbout backup set

Page 386: Help

This category includes, but isnot limited to: MicrosoftWord documents andtemplates (doc, .dot);Microsoft Excel Worksheetand templates (.xls, .xlt,.xlam); Microsoft PowerPointPresentation and Slideshowfiles (.ppt, .pps); MicrosoftProject files (.mpp); AdobeAcrobat files (.pdf); Text files(.txt); PostScript files (.ps);HyperText Markup Languagefiles (.htm, .html); MicrosoftHTML documents (.mht);WildTangent Branded .PNGfiles (.wpg);Comma-Separated Variablestext files (.csv); andWordPerfect PC Suitedocuments (.wpd).

Office Documents

This category includes, but isnot limited to: MicrosoftOutlook Personal Folder files(.pst); Microsoft ExchangeMail messages (.msg);Microsoft Outlook ExpressE-mail or Windows Mail(.dbx); Netscape Mail E-mailMessage files (.snm); MediaStream Broadcast (.msb);Mailbox Message File (.mbx);Microsoft Outlook RulesWizard File (.rwz); MicrosoftOutlook Express ElectronicMail (.eml); First ReaderSaved Message Folder (.fol);and (.MsMessageStore).

Email

Protecting your media and dataAbout backup set

386

Page 387: Help

This category includes, but isnot limited to: MicrosoftOutlook Address Book files(.wab); Microsoft PersonalAddress Book files (.pab);Palm Address Book files(.aba); Beijer E-Designer files(.mpa); Palm Date Book files(.tda); vCard files (.vcf);Microsoft Outlook AddressBook (.oab); MicrosoftPhonebook (.pbk); PalmDateBook File (.dba); andSharp Organizer TelephoneBank (.ozp).

Contacts

This category includes, but isnot limited to: InternetLocation files (.url) thatappear on the InternetExplorer Favorites menu.

Internet Favorites

This category includes thefiles that you specifically addto the backup. The categoryalso includes the files thatNorton 360 cannot add to anyof its file categories.

Other File Types

About backup file extensions

A file extension is a string of characters that isappended to the name of a file and is used to identifythe file format. Norton 360 uses the file extension toback up the files that are present on your computerinto different categories. Each backup file categorycontains a list of default file extensions. When you runa backup, Norton 360 identifies the files that are basedon the file extensions and backup file categories. Forexample, if you want to back up the documents with a

387Protecting your media and dataAbout backup set

Page 388: Help

.fm file extension in the Office Documents category,you can add the .fm file extension to the category.

The Edit file types option on the What tab of theManage Backup Sets window lets you add, edit, orremove file extensions in each backup category. Whenyou check Edit file types, the Configure option thatappears next to each backup category lets you edit fileextensions in that category.

You can use the Edit file types option on the What tabof the ManageBackupSets window to do the following:

1 You can view the file extensions that are alreadylisted in a backup file category.

This option helps to ensure that the list has theextensions of files that you intended to back up.

1 You can add a file extension to the list or edit a fileextension that is present in the list.

This option helps to ensure that the next time whenyou run backup, Norton 360 must back up the fileswith the extensions that you added.

1 You can remove a file extension from the existinglist or a file extension that you added.

This option helps to ensure that Norton 360 doesnot back up the unintended files, the next time yourun backup.

1 You can reset a file category to its default fileextensions.

This option helps to restore the changes you madeto a backup file category.

w The file extensions are independent of a backup set. Ifyou change a file extension in a backup file category,the change applies to all backup sets.

Adding or editing a file extension in a backup filecategory

Each backup file category contains a list of fileextensions. However, you can add a file extension to abackup file category. Norton 360 identifies the files

Protecting your media and dataAbout backup set

388

Page 389: Help

with the file extension that you added and backs themup to that file category. For example, if you want toback up the documents with a .fm file extension in theOffice Documents category, you can add the .fm fileextension to that category.

You can also edit an existing file extension or a fileextension that you added.

The maximum character length of a file extension is10 characters.

To add a file extension to a backup file category

1 In the Norton 360 main window, move the mousepointer over Backup, and click Manage BackupSets.

2 On the What tab, next to FileTypes, check Edit filetypes.

3 Under File Types, next to a file category, clickConfigure.

4 In the window that appears, click Add New.

5 Type the file extension that you want to add.

6 Click OK.

7 Click Save.

To edit a file extension in a backup file category

1 In the Norton 360 main window, move the mousepointer over Backup, and click Manage BackupSets.

2 On the What tab, next to FileTypes, check Edit filetypes.

3 Under File Types, next to a file category, clickConfigure.

4 In the window that appears, select the file extensionthat you want to edit, and then click Edit.

5 Edit the file extension.

6 Click OK.

7 Click Save.

389Protecting your media and dataAbout backup set

Page 390: Help

Removing a file extension fromabackup category

Each backup file category contains a list of fileextensions. However, you can remove a default fileextension or a file extension that you added to a backupfile category. Norton 360 identifies the files with thefile extension that you removed and does not back themup the next time that you run backup. For example,you do not want to back up the documents with a .rtffile extension in the Office Documents category. Inthis case, you can remove the .rtf file extension fromthat category.

To remove a file extension from a backup category

1 In the Norton 360 main window, move the mousepointer over Backup, and then click ManageBackupSets.

2 On the What tab, next to FileTypes, check Edit filetypes.

3 Under File Types, next to a file category, clickConfigure.

4 In the window that appears, select the file extension,and then click Remove.

5 Click Save.

Resetting a backup category to default fileextensions

You can reset a file category to its default list of fileextension. When you reset a file category, Norton 360restores the default file extension that you removedpreviously and remove the file extensions that youadded.

To reset a backup category to default file extensions

1 In the Norton 360 main window, move the mousepointer over Backup, and then click ManageBackupSets.

2 On the What tab, next to File Types, check Edit filetypes.

Protecting your media and dataAbout backup set

390

Page 391: Help

3 Under File Types, next to a file category, clickConfigure.

4 In the window that appears, click Reset Defaults.

5 Click Save.

Deleting previously backed up files

You can delete the files that you backed up previouslyfrom your backup location. You can also delete the filesif the files are no longer useful for you and you have alimited space on your backup location. You can alsodelete backed up files if you changed the file categoryfor a backup set. You may want to delete previouslybacked up files before you run a backup.

You can also uncheck the backup category if you nolonger want to back up the files that you deleted.

Deleting previously backed up files is particularlyhelpful if you want to free some space on your SecureOnline Storage.

To delete previously backed up files

1 In the Norton 360 main window, move the mousepointer over Backup, and then click ManageBackupSets.

2 On the Where tab, click Delete backed up files.

3 In the window that appears, in the drop-down list,select the backup set from which you want to deletethe previously backed up files.This window appears when you have more than onebackup set.

4 Click OK.

5 In the window that appears, in the left pane, clickthe folder that contains the file or folder.

6 In the right pane, uncheck the file or folder that youwant to exclude.You can check Backup Item to select all files thatare listed under Backup Item.

7 Click Delete Selected.

8 In the confirmation dialog box, click Yes.

391Protecting your media and dataAbout backup set

Page 392: Help

9 Click Close.

Adding files and folders to a backup set

You are not limited to backing up the files that Norton360 automatically detects and places into its filecategories. You can add files to the set of files to bebacked up, and you can exclude files from being backedup as well.

Norton 360 lets you select a file or folder from yourcomputer that you want to include in your backup. TheAdd or exclude files and folders option on the Whattab in the Manage Backup Sets window provides youthe options to add files and folders to a backup set.

You can also right-click a file or a folder and add it toa backup set using the Norton 360 option on theshortcut menu. The shortcut menu is available afteryou configure your backup and when the ManageBackupSets window and the RestoreFiles window areclosed. When you add a file to the backup set, Norton360 lists the information in the window that appearswhen you click Addorexcludefilesandfolders option.You can view all the files and folders that you addedto the backup.

You can also remove an addition from the list of itemsthat is included or excluded from backup by using theRemove from list option. This option is available inthe window that appears when you click Addorexcludefiles and folders.

To add a file to a backup set

1 In the Norton 360 main window, move the mousepointer over Backup, and click Manage BackupSets.

2 On the What tab, click Add or exclude files andfolders.

3 In the window that appears, click Include File.

4 In the file selection window that appears, navigateto file that you want to add, click to select it, andthen click Open.

Protecting your media and dataAbout backup set

392

Page 393: Help

5 Click OK.

6 In the Manage Backup Sets window, click SaveSettings to save the settings.

To add a folder to a backup set

1 In the Norton 360 main window, move the mousepointer over Backup, and click Manage BackupSets.

2 On the What tab, click Add or exclude files andfolders.

3 In the window that appears, click Include Folder.

4 In the folder selection window that appears,navigate to the folder that you want to add, and thenclick OK.

5 Click OK.

6 In the Manage Backup Sets window, click SaveSettings to save the settings.

To add a file or folder to a backup set in WindowsExplorer

1 In Windows Explorer, right-click the file or folder,select Norton 360 > Add to Backup.The Add to Backup option in the shortcut menu isenabled only after you configure your backup andwhen the ManageBackupSets window and RestoreFiles window are closed.

2 Click the backup set to which you want to add thefile or the folder.

Excluding files and folders from a backup set

Norton 360 lets you exclude backing up the files thatNorton 360 automatically detects and places into itsfile categories or a complete file category. The Add orexcludefilesandfolders option on the What tab in theManageBackupSets window provides you the optionsto exclude files and folders to a backup set.

You can exclude a file or folder from the backup setfrom Windows Explorer by using the shortcut menu.The shortcut menu is available after you configure your

393Protecting your media and dataAbout backup set

Page 394: Help

backup and when the Manage Backup Sets windowand the Restore Files window are closed. When youexclude a file from the backup set, Norton 360 lists theinformation in the window that appears when you clickAdd or exclude files and folders option. You can viewall the files that you excluded from the backup.

You can also remove an exclusion from the list of itemsthat is included or excluded from backup by using theRemove from list option. This option is available inthe window that appears when you click Addorexcludefiles and folders.

To exclude a file from a backup set

1 In the Norton 360 main window, move the mousepointer over Backup, and click Manage BackupSets.

2 On the What tab, click Add or exclude files andfolders.

3 In the window that appears, click Exclude File.

4 In the file selection window that appears, navigateto the file that you want to exclude, and then clickOpen.

5 Click OK.

6 In the Manage Backup Sets window, click SaveSettings to save the settings.

To exclude a folder from a backup set

1 In the Norton 360 main window, move the mousepointer over Backup, and click Manage BackupSets.

2 On the What tab, click Add or exclude files andfolders.

3 In the window that appears, click Exclude Folder.

4 In the folder selection window that appears,navigate to the folder that you want to exclude, andthen click OK.

5 Click OK.

6 In the Manage Backup Sets window, click SaveSettings to save the settings.

Protecting your media and dataAbout backup set

394

Page 395: Help

To exclude a file or folder fromabackup set inWindowsExplorer

1 In Windows Explorer, right-click the file, clickNorton 360 > Exclude from Backup.The Exclude from Backup option in the shortcutmenu is enabled only after you configure yourbackup and when the ManageBackupSets and theRestore Files windows are closed.

2 Click the backup set from which you want to excludethe file or the folder.

About backup locations

Norton 360 can back up your files to several kinds ofstorage locations. The speed, safety, and quantity ofyour backup depend on the choice of your location. Noone backup location is the best in all situations and forall users.

You can choose any storage location that Norton 360offers for your backup location, depending on your PCand the connected devices. Use the information in the

395Protecting your media and dataAbout backup set

Page 396: Help

following table to choose a location that best meetsyour needs for safety, speed, and storage capacity:

Secure Online Storage

Protecting your media and dataAbout backup set

396

Page 397: Help

Your subscription to Norton 360comes with an allocation ofstorage space on a secure serverthat is located on the Internet.This location is the safest, mostsecure backup choice availablebecause it stores yourinformation in a remote location.As a consequence, even thedisasters that might damage ordestroy your PC cannot affectyour backups. Online backupscan take place automatically, aslong as your PC has an activeInternet connection. However,you require a reasonably fastInternet connection.

You can configure the Internetbandwidth that backup uses toback up your files usingBandwidth Throttle on theWhere tab of the ManageBackup Sets window.

You can alter the followingbandwidth throttle states:1 Fastest (recommended)

1 High usage

1 Moderate usage

1 Low usage

Using Secure Online Storage forbackups is a good choice if yourbackup can fit within yourstorage allocation. Secure OnlineStorage is also helpful if youwant the convenience ofautomatic backups, or you wantthe security that an off-sitebackup location provides.However, you can buy moreonline storage space, if required.

397Protecting your media and dataAbout backup set

Page 398: Help

This choice backs your files upto a special folder on drive C ofyour PC. Backing up to drive C isvery quick and convenient, andis only limited to the amount offree space available on yourdrive. You can run automaticbackups with this choice.

Backing up to drive C is aconvenient but an unsafe backupmethod. Any mechanicalproblem that the drive mightexperience can damage bothyour original files and yourbackups.

If you use drive C for quick andautomatic backups, you mustback up your files occasionallyto a different drive or anotherlocation.

C: (Local Fixed Disk)

This choice provides for fast,convenient backups. You can runautomatic backups and alwayshave access to your backed upfiles as long as the drive isconnected to your PC.

Although using another drive issafer than using drive C, doingso still leaves your data at riskfrom any PC hardwaremalfunctions.

If you choose to back up toanother drive, you should alsoback up your files occasionallyto some other location.

Other internal or externaldrive

Protecting your media and dataAbout backup set

398

Page 399: Help

This choice requires that youhave recordable CDs, DVDs, orBlu-ray discs and an optical drivein your PC to record on thosediscs. You must be present toinsert and remove discs whenrequested. Therefore, you cannotselect automatic scheduling ofbackups when you back up toCDs, DVDs, or Blu-ray discs.

Backing up to CDs, DVDs, orBlu-ray discs is slower thanbacking up to other media.Backing up to CDs, DVDs, orBlu-ray discs is also lessconvenient because you must bepresent during the backup.

By using Norton 360, you canback up your data to any of thefollowing optical media types ifyour optical drive supports them:1 CD-R

1 CD-RW

1 DVD+R

1 DVD-R

1 DVD+R DL

1 DVD-R DL

1 DVD+RW

1 DVD-RW

1 DVD RAM

1 BD-R

1 BD-RE

You should store your backupdiscs in a safe place elsewhereto provide protection against adisaster that occurs at yourcomputer's location.

CD, DVD, or Blu-ray discs

399Protecting your media and dataAbout backup set

Page 400: Help

You can use this choice if yourPC is connected to a localnetwork that offers a storagelocation to which you haveaccess. Depending on the speedof your network, this choice canbe almost as fast as backing upto an internal drive or externaldrive.

This choice does not appear ifyour PC is not connected to anetwork that offers a storagedevice to which you have access.

To back up your data to anexternal network drive, you mustmap the external network driveto your computer. When you mapa drive, you must also specify adrive letter for the connection.

Network drive

Flash drives and the other datastorage devices that areattached to your PC can alsoserve as backup locations.Norton 360 displays suchdevices as external disk drives.If such a device is alwaysattached to your PC, you can useit for automatic backups.

The amount of storage spacethat is available on these devicescan be less than on hard disks.If you use a flash drive forbackups, you should also backup your files occasionally toanother storage location.

Flash drive andremovable storagedevices, including iPod

Protecting your media and dataAbout backup set

400

Page 401: Help

Choosing a backup location

Norton 360 provides several kinds of storage locationsfor backups. You can choose a different location if yourbackup needs change or if you want to store yourbackups in several locations for added security.

When you select Secure Online Storage as the backuplocation, Norton 360 prompts you to register to yourNorton Account. You must be connected to the Internetto register to your Norton Account.

w You must activate your Norton 360 with a valid licensekey to use the online storage space.

To choose a backup location

1 Make sure that the device to which you want to backup your data is connected to your PC and turned on.

2 In the Norton 360 main window, move the mousepointer over Backup, and click Manage BackupSets.

3 On the Where tab, select the location and devicewhere you want your backups to be stored.If the device or location does not appear on the list,click Refresh.

4 Click Save Settings.

Viewing or changing a backup schedule

Norton 360 lets you schedule backups when it isconvenient for you. You can schedule your backups torun late at night or whenever you know that your PCis not needed for any other activity.

401Protecting your media and dataAbout backup set

Page 402: Help

You have the following backup schedule choices:

Choose this option to back upyour PC when it is turned onbut not otherwise in use. Thischoice is the recommendedchoice for most users. Norton360 checks your computer tobe idle every four hours torun an automatic backup.Note that the backup locationmust be available at the timethat the automatic backuptakes place.

w You cannot back upyour data to a CD or DVD ifyou select this option.

Automatic (Recommended)

Choose this option to pickone or more days of the week,and the time of day, for yourbackups to occur.

Weekly

Choose a day of the month,and the time of day, for yourbackups to occur. You canchoose any day of the monthbetween 1 and 30, as well asa special choice, Last. Sincenot all months have 31 days,choosing Last performs thebackup on the last day of themonth, irrespective of thenumber of days.

Monthly

Choose this option to haveNorton 360 back up your filesonly when you start thebackup yourself.

Manual Backup

Protecting your media and dataAbout backup set

402

Page 403: Help

Your computer's performance is maximized if youschedule to perform your critical operations when yourcomputer is idle. When you schedule backup weeklyor monthly and check the Runonlyatidletime option,Norton 360 backs up your files when your computer isidle. Symantec recommends you to check the Runonlyat idle time option to experience better performanceof your computer.

To view or change a backup schedule

1 In the Norton 360 main window, move the mousepointer over Backup, and then click ManageBackupSets.

2 On the When tab, select an option in the Scheduledrop-down list.

3 Click Save Settings.

Deleting a backup setYou can delete a backup set if it is no longer needed.You cannot delete a backup set if only one backup setis available. However, you can create a new backup setbefore you delete the old backup set.

When a backup set is deleted, the Backup details of thefiles that are included in that backup set also change.For example, the icon overlays and the Backup tab inthe file properties of the file no longer appear.

To delete a backup set

1 In the Norton 360 main window, move the mousepointer over Backup, and then click ManageBackupSets.

2 On the Summary tab, in the Backup Set Namedrop-down list, select the backup set that you wantto delete.

3 Under Things you cando, click Delete this backupset.

4 In the confirmation dialog box, click Yes.

403Protecting your media and dataAbout backup set

Page 404: Help

Backing up your filesAfter you provide Norton 360 with your preferredbackup settings, running a backup is very easy. In fact,if you scheduled all backup sets to run backupsautomatically, you do not need to do anything at all.Norton 360 performs automatic backups for all backupsets when your PC is turned on but not engaged inperforming any other tasks. However, Norton 360 doesnot back up your files automatically if the backupdestination is a CD, DVD, or Blu-ray disc. Backing upto these destinations needs your intervention.

Whether you have set Norton 360 to back up your PCautomatically or not, you can always run a backup. Forexample, you have added or modified important filesand you want to be sure they are safe. In this case, youcan run a backup manually. You can also run a backupat the end of the day if you do not want to wait for anautomatic backup to occur.

You can view the details of your backup activity underthe backup category in the Security History window.

To back up your files

1 In the Norton 360 main window, move the mousepointer over Backup, and then click Run BackupNow.

2 Follow any instructions for performing the backupthat Norton 360 provides.For example, if you choose to back up your files toCDs, then Norton 360 asks you to insert a recordableCD.

3 In the Activities and Scan Details window, clickClose.

Restoring filesThe reason to have a good backup is to restore yourfiles from the backup if the need arises. Norton 360

Protecting your media and dataBacking up your files

404

Page 405: Help

provides an easy method to restore your backed-upfiles.

By default, Norton 360 displays the backup location ofthe most recent backup set you ran and the originallocations of the files.

When you restore files, you can change any of thefollowing settings:

You can choose any of thebackup sets to restore thefiles.

If you backed up your data inan external media, you mustconnect it to your computerto restore those files. Norton360 lists all the backup setsthat you ran backup for andthat your PC can currentlydetect.

Restore From

You can restore the backedup files in a backup set thatyou selected. You can use theSearch option to search forfiles by name and add theselected file to restore. Youcan also check the RestoreAll Files and Categoriesoption next to the Filesheading to select all filecategories. In addition, youcan browse for backed upfiles based on file categoriesand folders by using theBrowse for Files and Foldersoption.

You can filter the backed upfiles in a backup set by thebackup file categories.

Files

405Protecting your media and dataRestoring files

Page 406: Help

You can restore to theoriginal locations of the files,or navigate to a new locationwhere you can restore yourfiles. Norton 360 displays thetotal number of files and thetotal size of the files that youhave selected for restoration.

If files with the same nameare present at the originallocation, the files that yourestore replace those files.

Restore To

w If you backed up files to CDs or DVDs, do not restorefiles by copying them directly to your PC from thebackup disks. When Norton 360 backs files up to CDsor DVDs, it sometimes has to split files between twodiscs. Directly copying a file back from a disc, therefore,may only copy part of the file. Such a file appears tobe damaged when you try to use it. Instead, let Norton360 restore your files for you.

To restore files

1 In the Norton 360 main window, move the mousepointer over Backup, and then click Restore Files.

2 In the Restore Files window, do one or more of thefollowing:

1 Under Restore From, change where to restorefrom.

1 Under Files, specify what to restore.

1 Under Restore To, change where to restore thefiles to.

3 Click Restore Files.

4 Follow the on-screen instructions to finish restoringyour files.

Protecting your media and dataRestoring files

406

Page 407: Help

Choosing where to restore files fromWhen Norton 360 restores files, it displays the backuplocation of the most recent backup set you ran. Youcan change the location to restore files from a differentbackup location. For example, you have backed up filesto drive C and then later backed up files to CDs. Youcan then choose to restore files from either drive C orfrom the CDs.

To choose where to restore files from

1 In the Norton 360 main window, move the mousepointer over Backup, and click Restore Files.

2 In the Restore Files window, under Restore From,click View All.

3 In the window that appears, click the backup setthat you want to restore, and then click OK.If the backup set is not visible, make sure that themedia in which you had backed up your files isconnected, and click Refresh.If you have activated online backup, the windowalso contains the backup set that contains the filesthat you backed up online from another computer.For example, you can view the backup set containingthe files that you backed up from your homecomputer. However, the other computer must haveNorton 360 registered with the same NortonAccount.

4 Make any other necessary changes to your restoresettings, and click Restore Files.

5 Follow the on-screen instructions to finish restoringyour files.

Selecting files to restoreWhen you restore backed-up files with Norton 360, youmight not need to restore all the files from a backup.You can restore the files that may have been damaged,accidentally erased, or modified incorrectly. Norton360 provides several ways for you to select only thefiles that you need to restore.

407Protecting your media and dataRestoring files

Page 408: Help

When you click the Browse for Files and Foldersoption, you can view a list of all the backed-up files.You can easily select the files that you want to restoreby checking them. You can filter the files by itscategories available in the left pane in the RestoreFileswindow.

The various options that are available under Categoryin the left pane of the window are:

You can view all the backed-upfiles in a backup set.

All file types

You can view all the filecategories in the left pane thatyou have previously backed up.When you click a file category,you can view all the backed-upfiles of that file category in theright pane.

File Categories

You can view all the backed-upfolders containing files availablein a backup set.

Folders

You can view all the files andfolders that you select to restore.

Selected Files

You can also search for a particular file by using theSearch option. You can exclude each item in the rightpane if you want to exclude it from restoration byunchecking it.

You can use any of the following methods, and you cancombine methods, to select files to restore:

You can restore all thebacked-up files withoutexcluding any file within abackup set.

Restore all files andcategories

Protecting your media and dataRestoring files

408

Page 409: Help

You can search by file name,or by part of a file name fromthe list of backed up files andrestore them. You can alsouse wildcard characters, suchas asterisks (*) or questionmarks (?) to search file namesor folder names. For example,you can type *.doc to searchall the Microsoft Worddocuments.

Restore files by searching

You can see a list of the filesthat are included in each filecategory, and choose whichof those files to restore.

Restore individual files withina file category

You can select the files and the file categories that youwant to restore in the Restore Files window.

To select all the backed-up files to restore

1 In the Norton 360 main window, move the mousepointer over Backup, and click Restore Files.

2 In the Restore Files window, next to Files, checkRestore All Files and Categories.All of the backed-up files and folders in the backupset get selected for restore.

To select files to restore by searching

1 In the Norton 360 main window, move the mousepointer over Backup, and click Restore Files.

2 Under Files, in the Search text box, type all or partof a file name, or the extension of the file.

3 Click Search.The window that appears displays the file namesthat contain the text that you typed.

4 Check the files that you want to restore, and thenclick OK.

5 Repeat steps 2 through 4 to add more files to thelist of those that Norton 360 restores.

409Protecting your media and dataRestoring files

Page 410: Help

To select an individual file within a file category torestore

1 In the Norton 360 main window, move the mousepointer over Backup, and click Restore Files.

2 In the Restore Files window, under Files, clickBrowse for Files and Folders.

3 In the left pane, under ShowResults for, click a filecategory from which you want to restore files.

4 In the right pane, do one of the following:

1 Check the files that you want to restore.

1 If you want to restore all the files in thatcategory or folder, check the check box in theheader close to Backup Item.

5 Repeat steps 3 through 4 to add more files to thelist of those that Norton 360 restores.You can use the Selected Files option in the leftpane under ShowResultsfor to view all the selectedfiles that you want to restore.

6 Click OK.

Choosing a restore destinationWhen you restore files from a backup, you can choosewhere Norton 360 places the restored files. You canrestore the files to a separate folder of your choice ortheir original location. By default, Norton 360 selectsthe original locations of the files.

w Restoring files to their original locations deletes newerversions of the same files that are stored in thoselocations. If you do not want to replace those files withthe restored files, you must move the newer versionssomewhere else before you restore. You can also restorethem to a different location.

You can change the restore destination from any PCat any time.

Protecting your media and dataRestoring files

410

Page 411: Help

w Some drives use older Windows file systems, such asFAT-16 or FAT-32, which cannot store files larger than4 GB. For such large files to restore, make sure thatyour restore destination is formatted with a file systemthat supports large files, such as NTFS.

To change a restore destination

1 In the Norton 360 main window, move the mousepointer over Backup, and then click Restore Files.

2 In the RestoreFiles window, under RestoreTo, clickChange.

3 In the window, click New Location.

4 Do one of the following:

1 Type a restore location in the space provided.

1 Click Browse, use the browse window to navigateto the location to which you want to restore files,and then click OK.

5 Make any other necessary changes to your restoresettings, and then click Restore Files.

6 Follow the on-screen instructions to finish restoringyour files.

About Norton 360 Autorun RestoreNorton 360 Autorun Restore helps you restore the filesthat are backed up on an optical disc. You can also usethis feature to restore your backed up files to acomputer that does not have Norton 360 installed.

When you insert an optical disc that contains thebacked-up files, the Autorun Restore featureautomatically opens the Portable Restore window.

w If you disable Windows auto-run option, you mustmanually launch the Autorun Restore feature.

The Portable Restore window provides you thefollowing information:

1 The name of the backup set

1 The size of the backed-up files

1 The date and time you backed up the files

411Protecting your media and dataRestoring files

Page 412: Help

You can select the files that you want to restore. Youcan restore the files to their original location. Bydefault, Autorun restores the files you select toC:\Restored Files\. You can customize the locationwhere you want to restore the selected files.

You can also launch the Norton 360 main window ifNorton 360 version 3.0 or later is installed on yourcomputer. If Norton 360 version 3.0 or later is notinstalled on your computer, Autorun tells you that theproduct is not installed on your computer.

You can also use the following link to obtain moreinformation:

http://www.symantec.com/norton/360

Restoring files by using Norton 360 Autorun Restore

Norton 360 Autorun Restore lets you restore your filesbacked-up on an optical disk. Autorun can restore yourbacked-up files to a computer that does not haveNorton 360 installed on it.

You can restore your backed-up files to their originallocations or custom locations. You can also use theLaunch Norton 360 option in the Portable Restorewindow to open the Norton 360 main window. Norton360 version 3.0 or later must be installed on yourcomputer to open Norton 360.

To restore files using Norton 360 Autorun Restore

1 Insert an optical disc that contains the backed-upfiles.

2 If the Windows autorun option is disabled, doubleclick the ARestore icon to launch the AutorunRestore feature.

3 In the Portable Restore window, click Select Filesto Restore option.

4 In the window that appears, in the left pane, underCategory, click a file category from which you wantto restore files.

Protecting your media and dataRestoring files

412

Page 413: Help

5 In the right pane, check the files that you want torestore.If you want to restore all the files, click All filetypes, and then check the check box in the headerclose to Backup Item.

6 Under Restore to, click one of the following:

1 Original LocationChoose this option if you want to restore the filesto the original location.

1 Custom LocationChoose this option if you want to restore the filesto a new location. By default, Autorun restoresthe files you select to C:\Restored Files\.

7 Click Restore Selected.

8 Follow the on-screen instructions to finish restoringyour files.

About Norton Backup DriveNorton 360 provides the Norton Backup Drive in yourWindows Explorer after you configure your backup.Norton Backup Drive contains a list of backupdestinations where your files are backed up. Eachbackup destination contains the backup sets to whichthe backup destination is configured.

Norton Backup Drive displays the files that you backedup to a media device. You must connect and turn onthe media device before you view your files.

You can also view the files that you backed up to SecureOnline Storage. You must be connected to the Internetand logged in to Norton Account.

w The Norton Backup Drive appears in Windows Explorerwhen the ManageBackupSets window and the RestoreFiles window are closed. The Norton Backup Drive isaccessible only to system administrator.

You can do the following with Norton Backup Drive:

413Protecting your media and dataAbout Norton Backup Drive

Page 414: Help

1 View the files that are backed up in different backupdestinations.

To view the files that you backed up to a mediadevice, you must connect the device to yourcomputer.

1 Drag a file from a backup set on the Norton BackupDrive to restore to your computer.

1 Select and delete a file from a backup set on theNorton Backup Drive.

Norton 360 does not back up the file you deletedthe next time you run backup.

1 Open a file to view the content of the file before yourestore or delete it on the Norton Backup Drive.

1 Use the Search command on the Start menu or theSearchToolbar option to locate files in the NortonBackup Drive.

w Norton Backup Drive appears in Windows Exploreronly when the Backup option in the Backup Settingswindow is turned on.

Viewing backup files on the Norton Backup DriveYou can use the Norton Backup Drive to view the filesthat are backed up. You can view the Norton BackupDrive after you configure backup and when the BackupSettings window is closed.

If you backed up your files to a media device, ensurethat the device is connected to your PC and turned on.You can then view the files on the Norton Backup Drive.

If you backed up your files to Secure Online Storage,you must be connected to the Internet. You must alsobe logged in to Norton Account to view the files on theNorton Backup Drive.

To view backup files on the Norton Backup Drive

1 In Windows Explorer, click Norton Backup Drive.

2 Select the backup destination, and navigate to thebackup set that contains the files that you backedup.

Protecting your media and dataAbout Norton Backup Drive

414

Page 415: Help

Restoring a file from a backup set on the NortonBackup Drive

To restore a file, you can drag it from a backup set onthe Norton Backup Drive to your computer. You canalso click to open and view the contents of the filebefore you restore it.

To restore a file fromabackup set on theNortonBackupDrive

1 In Windows Explorer, click Norton Backup Drive.

2 Select the backup destination, and navigate to thebackup set destination that contains the file thatyou backed up.

3 Do one of the following:

1 Right-click to select the files to restore in NortonBackup Drive, and then click Restore.

The files are restored to the original location byoverwriting the existing files.

1 Drag the file from the backup set to the restoredestination.

Deleting a file from a backup set on the NortonBackup Drive

You can select and delete a file from a backup set onthe Norton Backup Drive. Norton 360 does not back upthe deleted file the next time you run a backup. Youcan also click the file to open and view the file contentbefore you restore it.

To delete a file from a backup set on the Norton BackupDrive

1 In Windows Explorer, click Norton Backup Drive.

2 Select the backup destination, and navigate to thebackup set destination that contains the file thatyou backed up.

415Protecting your media and dataAbout Norton Backup Drive

Page 416: Help

3 Do one of the following:

1 Right-click to select the files to delete, and thenclick Delete.

1 Select the file, and then press Delete.

About solutions to the backup problemsThe following table provides some tips to help youavoid backup problems.

The following tips apply to allbackups:1 Perform backups

regularly. The more oftenyou back up, the lesschance there is that youcan lose importantinformation.Anautomaticbackup schedule isrecommended, since thattends to back up thosefiles that have mostrecently changed. Ascheduled weekly backupis a good second choice.

1 If you use automaticbackups, leave your PCturned on when not inuse. Automatic backupstake place when your PCis turned on but not inuse.

1 Regularly check thebackup results thatNorton 360 provides toensure that all of the filesthat should be backed upare backed up.

All backups

Protecting your media and dataAbout solutions to the backup problems

416

Page 417: Help

The following tips apply tobackups to CDs or DVDs:1 Have extra discs on hand

when you back up. Thistip helps you to avoidoccasional disc flaws orsituations where theamount of backed up datais more than youanticipated.

1 Label your backup discswith the complete details,so that you can find theright disc when you needto restore files.

1 Do not copy files directlyfrom the backup discs toyour PC. You mayinadvertently copy onlypart. Instead, use theNorton 360 restorefeature or use the Norton360 Autorun Restorefeature.

Backing up to CDs or DVDs

417Protecting your media and dataAbout solutions to the backup problems

Page 418: Help

The following tips apply tobackups to external drives:1 Some drives use older

Windows file systems,such as FAT-16 or FAT-32that cannot store fileslarger than 4 GB. For suchlarge files to back up,ensure that your backupdrive is formatted with afile system that supportslarge files, such as NTFS.

1 If you use automatic orscheduled backups, makesure that the externaldrives are connected andturned on.

1 To avoid accidentallycorrupting your backedup files, do not use abackup drive for purposesother than for backing up.

Backing up to external drives,including flash drives

Protecting your media and dataAbout solutions to the backup problems

418

Page 419: Help

The following tips apply tobackups to online storage:1 Make sure that your PC

does not automaticallydisconnect from theInternet when it is not inuse.

1 Regularly check theamount of space that youhave left in your SecureOnline Storage, andconsider purchasing morestorage space before youneed it.

1 Online backups work bestwith a fast Internetconnection. If yourbackups take too long,consider backing up onlythe files that you regularlywork. Then periodicallyback up to CDs, DVDs,Blu-ray discs, or externaldrives to back up yourlarger, seldom-used files.

1 If you back up more thanone PC to your onlinestorage, give each PC adifferent nickname.Giving a differentnickname to each PChelps you identify the PCand the backups thatcorresponds to each PC.

Backing up to your SecureOnline Storage

Getting additional help with backup problemsIf you run into problems with your Symantec productthat you cannot solve, or have questions about theproduct, additional help is available.

419Protecting your media and dataAbout solutions to the backup problems

Page 420: Help

To get additional help with backup problems

1 In the Norton 360 main window, click Support, andthen click Get Support.

2 In the OneClickSupport window, choose one of thefollowing:

1 Click BeginSupportSession to have Norton 360attempt to diagnose and repair the problem. Youmay also be put in touch with an online supporttechnician to help you if you choose that option.

1 Click Support Web Site to launch the supportWeb site and search the Symantec KnowledgeBase for solutions to your problem.

About online backup considerationsNorton 360 provides you with secure backup storagespace on a server that is accessible to your PC throughits Internet connection. When your backup location isdistant from your PC, your data is safe from localdisasters, such as a fire, flood, or earthquake.

Protecting your media and dataAbout online backup considerations

420

Page 421: Help

Although online backup is convenient and safe, beforechoosing it for your backup method, consider thefollowing limitations:

Speed limitations

421Protecting your media and dataAbout online backup considerations

Page 422: Help

The amount of time that it takesto transfer your backup to theSecure Online Storage dependson the speed of your Internetconnection. If you have manyfiles to back up, the first backupcan take hours or days,depending on the speed of yourInternet connection.

You can configure the Internetbandwidth that backup uses toback up your files using theBandwidth Throttle option. Thisoption is available on theWheretab of the Manage Backup Setswindow.

You can alter the followingbandwidth throttle states:1 Fastest (recommended)

1 High usage

1 Moderate usage

1 Low usage

Furthermore, many home andsmall business Internetconnections are asymmetrical,meaning that their uploadspeeds are slower than theirdownload speeds. A single largefile, such as a high-qualityphotograph, may take severalminutes or longer to upload toyour Secure Online Storage.

If you have many large files andasymmetrical or slow Internetconnection, consider the use ofone of the other backuplocations that Norton 360provides. You can then use yourSecure Online Storage to back

Protecting your media and dataAbout online backup considerations

422

Page 423: Help

up your smaller files, such asyour financial documents andword-processing documents.

If a backup is in progress, youshould leave your PC turned on,so that the backup can finish.However, if a backup isinterrupted, then the next timeit starts, it resumes where it leftoff and continues until itfinishes.

Norton 360 provides sufficientonline storage to handle manyof your backup needs, and youcan purchase more storage whenyou need it. Nonetheless, theamount of space in your SecureOnline Storage is much smallerthan the typical permanent diskthat most recent PCs have.Online backups are ideal for thefiles that you regularly work on.You can back up large files andthe files that seldom change toa different location.

In addition, you shouldperiodically look over the filesthat you have in your SecureOnline Storage. Eliminate thosefiles that you no longer need, tomake additional storage spaceavailable.

Storage limitations

About online backup activationNorton 360 uses your Norton Account to keep track ofthe following:

1 The PCs that you back up to online storage

423Protecting your media and dataAbout online backup considerations

Page 424: Help

1 The amount of online storage space that is availableto you

Your product needs to be activated to use the onlinebackup feature. The first time you configure onlinebackup, Norton 360 connects to your Norton Accountand requests that you sign in to the account. You mayhave established a Norton Account when you installedNorton 360 or when you installed another Nortonproduct.

To sign in to your Norton Account, you use the emailaddress and the password that you supplied when youcreated your Norton Account. You only need to sign into your Norton Account the first time that youconfigure online backup. Norton 360 retains youraccount information so you do not have to sign in again.If you do not have a Norton Account when youconfigure online backup for the first time, Norton 360lets you create one.

You can share the online storage space that is allocatedfor your Norton Account among your computers. Forexample, you have two computers having Norton 360installed on it and registered with the same NortonAccount. 2 GB of online storage space is allocated foryour Norton Account. You can share the storage spaceamong your two computers. You use 1 GB of onlinestorage space for your first computer. When youactivate the online storage for your second computerusing the same Norton Account, that computer can usethe remaining 1 GB of space.

Purchasing more online storage spaceYour Norton 360 subscription comes with an allotmentof secure online storage space. When Norton 360performs an online backup, it calculates the amountof space that it needs for the backup. If your onlinestorage does not contain sufficient space for thebackup, Norton 360 notifies you and provides you anoption to buy more space.

Protecting your media and dataAbout online backup considerations

424

Page 425: Help

You do not have to wait until Norton 360 tells you thatyou need more online storage space. You can purchaseadditional space at any time.

You must be connected to the Internet to purchasemore online storage space.

It can take about 30 seconds for the status on the MyAccount page to display the amount of space that youpurchased.

To purchase additional online storage space whenbacking up

1 When Norton 360 notifies you that it needs moreonline storage space, click Buy More Storage.Your Web browser opens to a secure page, on whichyou can purchase additional online storage space.

2 Follow the instructions on the secure Web page topurchase additional online storage space.

To purchase additional online storage space at othertimes

1 In the Norton 360 main window, move the mousepointer over Backup, and click Buy More Storage.Your Web browser opens to a secure page, on whichyou can purchase additional online storage space.

2 Follow the instructions on the Web page to purchaseadditional online storage space.

Turning off or turning on backupWhen the Backup option is turned on, Norton 360automatically backs up your files when your computeris idle. However, if you want to temporarily disablebackup, you can turn it off from within the program.

When you turn off backup, the backup status in theNorton 360 main window changes from Protected toDisabled. In the Disabled state, Norton 360 disablesall automatic backup of files. You can use the RunBackupNow option in the main window if you want toback up your files from all the backup sets.

425Protecting your media and dataTurning off or turning on backup

Page 426: Help

You can turn off or turn on backup from the Settingswindow, BackupSettings window, or from the BackupDetails window.

To turn off or turn on backup from the Settings window

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Quick Controls, doone of the following:

1 To turn off backup, uncheck Backup.

1 To turn on backup, check Backup.

To turn off or turn on backup from the Backup Settingswindow

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Backup Settings.

3 In the Settings window for backup settings, do oneof the following:

1 To turn off backup, move the On/Off switch tothe right to the Off position.

1 To turn on backup, move the On/Off switch tothe left to the On position.

4 In the Settings window, click Apply.

To turn off or turn on backup from the Backup Detailswindow

1 In the Norton 360 main window, move the mousepointer over Backup, and click View Details.

2 In the Backup Details window, under Things YouCan Do, do one of the following:

1 To turn off backup, click Turn Off Backup.

1 To turn on backup, click Turn On Backup.

Protecting your media and dataTurning off or turning on backup

426

Page 427: Help

Turning off or turning on backup settingoptions

Norton 360 provides you various options to manageyour backup settings. Norton 360 backup settings letyou access the backup details of a particular file bystatus icon overlays without opening the product. Youcan use the icon overlays to view the backup status ofa file or folder. You can also use the Properties pageof a file to know the backup status of your backup sets.

When the Backup Status Overlays option is turnedon, Norton 360 adds a backup status icon to the files,based on the following conditions:

1 The files belong to a backup file category that youincluded in any of the backup sets.

1 The files are located at a source that you includedin any of the backup sets.

The following table lists the backup status overlay iconsfor the files on your computer:

Indicates that the file has beenbacked up

This icon changes to blue iconwith arrows if you modify thefile.

Green icon with a checkmark

Indicates that the file has notbeen backed up

This icon changes to green whenNorton 360 automatically backsup the file during idle time.

Blue icon with arrows

427Protecting your media and dataTurning off or turning on backup setting options

Page 428: Help

Indicates that the file has beenexcluded from backup

Norton 360 displays a disabledbackup status on a file when youexclude the file from any of thebackup sets.

Gray icon with a slashmark

Norton 360 Backup provides the Norton Backup Drivein your Windows Explorer after you configure yourbackup. Norton Backup Drive contains a list of backupdestinations where your files are backed up.

You can use the ContextMenu option to add or excludea file or a folder to your backup sets when youright-click it. You can use this option after youconfigure Backup in the ManageBackupSets window.

You can use the Property Page option to view moredetails about the backup status icons. When youright-click a file that you backed up and view the FileProperties, you can see its backup details on theBackup tab. The Backup tab lists the state of the filefor each backup set and the last backup time.

You can turn off these options if you do not want tosee the icons and backup statuses.

To turn off backup setting options

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Backup Settings.

Protecting your media and dataTurning off or turning on backup setting options

428

Page 429: Help

3 In the Settings window for backup settings, do oneof the following:

1 To turn off icon overlays, in the Backup StatusOverlays row, move the On/Off switch to theright to the Off position.

1 To turn off NortonBackupDrive, in the NortonBackup Drive row, move the On/Off switch tothe right to the Off position.

1 To turn off right-click backup menu, in theContext Menu row, move the On/Off switch tothe right to the Off position.

1 To turn off Backup tab in the Properties page,in the Property Page row, move the On/Offswitch to the right to the Off position.

4 In the Settings window, click Apply.

To turn on backup setting options

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Backup Settings.

3 In the Settings window for backup settings, do oneof the following:

1 To turn on icon overlays, in the Backup StatusOverlays row, move the On/Off switch to theleft to the On position.

1 To turn on NortonBackupDrive, in the NortonBackup Drive row, move the On/Off switch tothe left to the On position.

1 To turn on right-click backup menu, in theContext Menu row, move the On/Off switch tothe left to the On position.

1 To turn on Backup tab in the Properties page,in the Property Page row, move the On/Offswitch to the left to the On position.

4 In the Settings window, click Apply.

429Protecting your media and dataTurning off or turning on backup setting options

Page 430: Help

Protecting your media and dataTurning off or turning on backup setting options

430

Page 431: Help

This chapter includes the following topics:

1 About Norton 360 Settings

1 Customizing Norton 360 Settings

1 Turning on or turning off Quick Controls services

1 About Antivirus settings

1 About Firewall settings

1 About Norton AntiSpam settings

1 About My Network Settings

1 About backup settings

1 About Identity Protection settings

1 About Task Scheduling settings

1 About Administrative Settings

About Norton 360 SettingsThe Detailed Settings in the Settings window let youadjust protection settings and network settings. Youcan also customize schedules for security scans andbackups.

13Customizingsettings

Page 432: Help

You can configure the following Detailed Settings inthe Settings window:

Specify how certain types ofviruses and spyware, as well asother threats, are handled inNorton 360.

You can specify whetherincoming emails are checked andinstant messenger is scanned.You can also specify which filesand signatures are excludedfrom scans, and how low-riskthreats are handled. In addition,you can configure Real TimeProtection, Antispyware, andLiveUpdate.

Antivirus

Specify in detail how to handleincoming and outgoingconnections for your PC.

You can specify Traffic rules andrules for specific programs. Youcan also specify how you wantNorton 360 to handle intrusionattempts and browserprotection.

Firewall

Secure your email client fromunwanted online content.

You can configure NortonAntiSpam to define which clientit should integrate with and howit should handle the email thatit scans on those clients. You canspecify if you want NortonAntiSpam to check the Symantecservers to filter the spam emailmessages which the local filtersclassify as legitimate.

AntiSpam

Customizing settingsAbout Norton 360 Settings

432

Page 433: Help

View all the devices available inyour network and specify thetrust level of the devices that areconnected to your network.

You can hide or show theNetwork Security Overviewwindow at startup and configurethe communication port thatNorton products use tocommunicate with each other.You can also purge the NetworkSecurity Map.

My Network

Lets you download and installNorton Safety Minder andconfigure Norton Online Family.

Norton Online Family is aparental control application thatprovides a smart way to keepyour children safe when they areonline. Norton Safety Minder isan application that needs to beinstalled on each computer thatyour child uses to monitor theInternet activities. You can usethe Parental Controls link tovisit Norton Online Family Webpage to download Norton SafetyMinder. Click Download NortonSafety Minder to downloadNorton Safety Minder. Follow theon-screen instructions tocomplete the installation.

If you have already installedNorton Safety Minder, you canclick Parental Control to openthe Parental Control window.

Parental Controls

433Customizing settingsAbout Norton 360 Settings

Page 434: Help

Configure Identity Safe to secureyour online identities andtransaction data.

You can also configure SafeSurfing options.

Identity Protection

Specify when and how oftenNorton 360 examines yourcomputer for viruses and otherrisks.

Tasks Scheduling

Use the options in this windowto configure the security of yourproduct.

You can specify your proxysettings in Norton 360. You canalso configure Idle TimeOptimizer, PerformanceMonitoring, and Power SavingMode. In addition, you canconfigure Silent Mode, Idle TimeOut duration, Automatic TasksDelay duration, NortonCommunity Watch, and FirefoxCleanup.

Administrative Settings

Specify the files and folders thatyou want to back up, the backuplocation, and the backupschedule.

You can also turn off or turn onoptions such as Backup StatusOverlays,Norton Backup Drive,Context Menu, and PropertyPage.

Backup Settings

Customizing settingsAbout Norton 360 Settings

434

Page 435: Help

The Quick Controls in the Settings window let youturn on or turn off the following services:

Turns on or turns off Silent Mode

You can turn on Silent Mode fora period of one hour, two hours,four hours, six hours, or one day.

Silent Mode

Turns on or turns offAntiphishing and Norton SafeWeb features

When you turn on Safe Surfing,it protects your computer whileyou browse with InternetExplorer or Firefox.

Safe Surfing

Turns on or turns off IdentitySafe

When you turn off Identity Safe,Norton 360 no longer lets youmanage your logins, cards, andnotes.

Identity Safe

Turns on or turns off Backup

When you turn on Backup, yourcomputer starts backing up withyour specified settings.

Backup

Turns on or turns off iconoverlays on files

Icon overlays show the backupstatus of your files.

Backup Status Overlays

Turns on or turns off theautomatic updates that guardagainst new and emergingthreats

Automatic LiveUpdate

435Customizing settingsAbout Norton 360 Settings

Page 436: Help

Turns on or turns off SmartFirewall

When you turn on SmartFirewall, it monitorscommunications between yourcomputer and the othercomputers on the Internet. Italso protects your computerfromcommonsecurity problems.

Smart Firewall

Turns on or turns off NortonTamper Protection

When you turn on NortonTamper Protection, it protectsNorton 360 from attacks ormodifications by unknown,suspicious, or threateningapplications.

Norton TamperProtection

Customizing Norton 360 SettingsThe default Norton 360 settings provide a safe,automatic, and efficient way to protect your computer.However, if you want to change or customize yourprotection settings, you can access most features fromthe Settings window.

You can configure Norton 360 settings in the followingways:

1 You can use the On/Off switch to turn on or turnoff a feature. When you turn off a feature, the colorof the On/Off switch turns red, which indicates thatyour computer is vulnerable to security threats.When you turn on a feature, the color of the On/Offswitch turns green, which indicates that yourcomputer is protected against security threats.

1 You can drag the slider of a protection feature toyour preferred setting. Most often, Norton 360

Customizing settingsCustomizing Norton 360 Settings

436

Page 437: Help

provides the slider setting for you to decide whetherto resolve security threats automatically or ask youbefore it takes an action.

1 You can configure a protection feature by eitherselecting the options that are provided for theconfiguration or by providing the requiredinformation. Most of these options are available ascheck boxes for you to check or uncheck.

You can also use the DefaultAll option to reset theconfiguration to the default level.

1 You can select a preferred option from thedrop-down list.

1 You can check or uncheck the Quick Controlsoptions to turn on or turn off a feature.

Norton 360 also provides the Use Defaults option inmost of the Settings window. You can use this optionto reset the configuration to the default level.

To customize Norton 360 settings

1 In the Norton 360 main window, click Settings.

2 In the Settings window, click the protection featurethat you want to customize.

3 In the window that appears, set the option to yourpreferred settings.You may need to click a tab to access the settingsthat are listed under that tab.

4 In the Settings window, do one of the following:

1 To save the changes, click Apply.

1 To close the window without saving the changes,click Close.

Turning on or turning off Quick Controlsservices

In the Settings window, you can turn on or turn off thefollowing Quick Controls services:

1 Silent Mode

437Customizing settingsTurning on or turning off Quick Controls services

Page 438: Help

1 Safe Surfing

1 Identity Safe

1 Backup

1 Backup Status Overlays

1 Automatic LiveUpdate

1 Smart Firewall

1 Norton Tamper Protection

You can move the mouse pointer over a service nameto see a description of that service. You should leaveall of the services turned on except Silent Mode.

To turn on or turn off Quick Controls services

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Quick Controls, doone of the following:

1 To turn on a service, check its check box.

1 To turn off a service, uncheck its check box.

If an alert or a message appears, select theduration from the drop-down menu, and thenclick OK.

About Antivirus settingsNorton 360 always protects you from known virusesand the latest virus outbreak. The Antivirus settingsmonitor your PC for the presence of viruses andspyware, as well as other threats, and eitherquarantines or remove them.

The Antivirus settings protect your computer againstthe security risks that can compromise your personalinformation and privacy. The different type of scans,such as Computer Scans, Email Antivirus Scan, andInstant Messenger scan detects and prevents from anyvirus infection on your computer.

Customizing settingsAbout Antivirus settings

438

Page 439: Help

The Antivirus settings obtain the latest virusdefinitions through definition updates and keep yourcomputer secure from the latest security threats.

You can use the following Antivirus settings:

The Automatic Protectionsettings let you control thescanning and monitoring of yourcomputer.

It protects your computer bycontinuously checking forviruses and other security risks.Your options are:1 Real Time Protection

You can use the Real TimeProtectionoptions to protectyour computer bycontinuously checking forviruses and other securityrisks.

You can use the Real TimeProtection options to controlthe scanning and monitoringof your computer.

1 Boot Time Protection

You can use the Boot TimeProtection option to providean enhanced security levelfrom the time you start yourcomputer. This optionensures better security byrunning all the necessarycomponents that arerequired for computerprotection as soon as yourestart your computer.

Automatic Protection

439Customizing settingsAbout Antivirus settings

Page 440: Help

Scans and Risks

Customizing settingsAbout Antivirus settings

440

Page 441: Help

Scans and Risks settings let youcustomize the scans that Norton360 performs on your computer.

You can use the following Scansand Risks options:1 Computer Scans

Norton 360 lets you rundifferent types of scans todetect and prevent any virusinfection on your computer.

You can use the variousComputer Scans options tocustomize the scans thatNorton 360 performs on yourcomputer. You can alsospecify scanning ofcompressed files andMicrosoft Office documents.

1 Scan Performance Profiles

Scan Performance Profilessettings let you configurehow Norton 360 should scanyour computer based on thedigital signature and trustlevel of the files.

1 Email Antivirus Scan

Email Antivirus Scan protectsyou from the threats that aresent or received in emailattachments.

This option lets you definehow Norton 360 shouldbehave when it scans emailmessages. Based on theoptions you choose, Norton360 automatically scans theemail messages that yousend or receive.

1 Instant Messenger Scan

The Instant Messenger Scan

441Customizing settingsAbout Antivirus settings

Page 442: Help

option lets you customizescanning of the files that youreceive from instantmessenger programs.

You can select the supportedinstant messenger programsfrom which you may receivefiles. Norton 360 scans thefiles that you receive fromthe selected instantmessenger programs.

1 Exclusions / Low Risks

Exclusions options specifythe items such as folders,files, and drives that youexclude from Norton 360scans. Scans, signatures, andlow-risk items are someitems that you can excludefrom scanning

Exclusions options let youchoose which categories ofrisks you want Norton 360 todetect.w Exclusions reduce yourlevel of protection andshould be used only if youhave a specific need.

Customizing settingsAbout Antivirus settings

442

Page 443: Help

1 Insight Protection

The Insight Network scanuses the Cloud technologywherein a remote server onthe web contains the latestvirus definitions. Norton 360scans your computer for thelatest security threats. WhenNorton 360 performs theInsight Network scan, it usesthe virus definitions that areavailable locally and in theCloud. Norton 360 providesadditional protection byusing the most recentdefinitions in the Cloud,apart from the definitionsthat are available locally onyour computer.

443Customizing settingsAbout Antivirus settings

Page 444: Help

Antispyware protects yourcomputer against the securityrisks that can compromise yourpersonal information andprivacy.

Norton 360 protects yourcomputer from vulnerabilitiesthrough the latest definition andprotection updates. Your optionsare:1 Antispyware

Antispyware protects yourcomputer against thesecurity risks that cancompromise your personalinformation and privacy

This option lets you choosewhich categories of risk youwant Norton 360 to detectfor manual, email, andinstant messenger scanning.

1 Updates

Norton 360 protects yourcomputer fromvulnerabilities through thelatest definition andprotection updates.Definition updates containthe information that letsNorton 360 to recognize andalert you to the presence ofa specific virus or securitythreat

You can use the Updatesoptions to obtain the latestvirus definitions throughdefinition updates and keepyour computer secure fromthe latest security threats.

Antispyware andUpdates

Customizing settingsAbout Antivirus settings

444

Page 445: Help

About Automatic Protection settingsThe Boot Time Protection option on the AutomaticProtection tab provides an enhanced security levelfrom the time you start your computer. This optionensures better security by running all the necessarycomponents that are required for computer protectionas soon as you start your computer.

The Real Time Protection settings on the AutomaticProtection tab let you control the scanning andmonitoring of your computer. It protects your computerby continuously checking for viruses and other securityrisks.

You can use the Real Time Protection options todetermine what gets scanned and what the scan looksfor. It also provides you with advanced protection byproactively detecting unknown security risks on yourcomputer. You can determine what happens when asecurity risk or risk-like activity is encountered.

445Customizing settingsAbout Antivirus settings

Page 446: Help

You can use the following Real Time Protectionoptions:

Auto-Protect

Customizing settingsAbout Antivirus settings

446

Page 447: Help

Auto-Protect loads intomemory and providesconstant protection while youwork. It checks for virusesand other security risks everytime that you run programson your computer.

Auto-Protect checks forviruses when you insert anyremovable media, access theInternet, or use the documentfiles that you receive orcreate. It also monitors yourcomputer for any unusualsymptoms thatmight indicatean active threat.

You can stay protected byusing the following options:1 Caching

Improves theperformance of yourcomputer

If you turn on this option,Norton 360 keeps arecord of the files that areaccessed often. Norton360 does not scan thoserecorded files, even whenyou restart yourcomputer.

1 Removable Media Scan

Checks for boot viruseswhen you accessremovable media

After the removablemedia has been scannedfor boot viruses, it is notscanned again until it isreinserted or formatted.If you still suspect that a

447Customizing settingsAbout Antivirus settings

Page 448: Help

boot virus infects yourremovable media, ensurethat Auto-Protect isturned on to rescan theremovable media. Youthen insert the removablemedia and open it fromMy Computer forAuto-Protect to rescan it.You can also scan itmanually to verify that itis not infected.

Customizing settingsAbout Antivirus settings

448

Page 449: Help

SONAR Protection

449Customizing settingsAbout Antivirus settings

Page 450: Help

Symantec Online Network forAdvanced Response (SONAR)provides the real-timeprotection against threatsand proactively detectsunknown security risks onyour computer.

SONAR identifies theemerging threats that arebased on the behavior ofapplications. SONAR isquicker than the traditionalsignature-based threatdetection techniques. It alsodetects and protects yourcomputer against maliciouscode even before virusdefinitions are availablethrough LiveUpdate.

SONAR Protection includesthe following options:1 SONAR Advanced Mode

Norton 360 provides youthe greatest control overlow-certainty threats onlyif this option is turned on.

1 Remove RisksAutomatically

This option lets thelow-certainty threatsbehave as high-certaintythreats when SONARAdvancedMode option isenabled. In this case,Norton 360 automaticallyremoves the threats andnotifies you.

1 Remove Risks if I AmAway

This option lets Norton

Customizing settingsAbout Antivirus settings

450

Page 451: Help

360 to automaticallyremove low-certaintythreats if it does not getany response from youwhen SONAR AdvancedMode option is enabled.

1 Show SONAR BlockNotifications

This option lets youenable or disable SONARBlock notifications.Norton 360 suppressesthe SONAR Blocknotifications when you setthe Show SONAR BlockNotifications option toLog Only.

About Scans and Risks settingsScans and Risks settings let you customize the scansthat Norton 360 performs on your computer. You canconfigure a Norton 360 scan based on the digitalsignature and trust level of the files on your computer.You can define how Norton 360 should behave whenit scans email messages and customize scanning of thefiles that you receive from instant messenger programs.

451Customizing settingsAbout Antivirus settings

Page 452: Help

You can use the following Scans and Risks settings:

Computer Scans

Customizing settingsAbout Antivirus settings

452

Page 453: Help

Norton 360 lets you run differenttypes of scans to detect andprevent any virus infection onyour computer. The scans areQuick Scan, Full System Scan,and Customized Scan. You canuse the various Computer Scansoptions to customize the scansthat Norton 360 performs onyour computer. You can alsospecify scanning of compressedfiles and Microsoft Officedocuments.

The Computer Scans optionsalso let you specify scans todetect rootkits, other stealthitems, tracking cookies, andunknown security threats. Youroptions are:1 Smart Definitions

Lets you install only the CoreSet virus definitions.

You can choose SmartDefinitions to minimizedownload time, installationtime, and memoryconsumption as SmartDefinitions are a subset ofvirus definitions.

1 Compressed Files Scan

Scans and repairs the filesinside compressed files

When you turn on thisfeature, Norton 360 scansand detects viruses andother security risks in thefiles within compressed files.

1 Microsoft Office AutomaticScan

Scans the Microsoft Office

453Customizing settingsAbout Antivirus settings

Page 454: Help

files when you open them.

If you install Microsoft Office2000 or later after Norton360 is installed, you mustturn on this option to scanMicrosoft Office filesautomatically.

1 Rootkits and Stealth ItemsScan

Scans for rootkits and othersecurity risks that might behidden on your computer.

1 Network Drives Scan

Scans the network drivesthat are connected to yourcomputer.

Norton 360 performs aNetwork Drives Scan duringVirus and Spyware Scanunder Full System Scan andCustomized Scan. By default,the Network Drives Scanoption is turned on. If youturn off this option, Norton360 does not scan networkdrives.

1 Heuristic Protection

Scans your computer toprotect against unknownsecurity threats.

Norton 360 uses heuristictechnology to checksuspicious characteristics ofa file to categorize it asinfected. It compares thecharacteristics of a file to aknown infected file. If the filehas sufficient suspiciouscharacteristics, then Norton360 identifies the file asinfected with a threat.

Customizing settingsAbout Antivirus settings

454

Page 455: Help

1 Tracking Cookies Scan

Scans for the small files thatprograms might place onyour computer to track yourcomputing activities.

1 Idle Time Scans

Scans your computer whenit is idle.

When your computer is idle,Norton 360 runs a scandepending on the scanhistory of your computer.After the scan is complete,you can view the summary ofthe scan results and takeappropriate action when youstart using your computeragain.

1 Number of Threads forManual Scan

Lets you select the numberof threads that Norton 360uses for manual scanThreads are subsets of aprocess that share theprocess resources butexecute independently ofeach other. Threads help inparallel execution of aprogram to allow theprogram to operate faster ina multiprocessorenvironment.

455Customizing settingsAbout Antivirus settings

Page 456: Help

The Scan Performance Profilessettings let you configure howNorton 360 should scan yourcomputer based on the digitalsignature and trust level of thefiles.

w You must configure theScan Performance Profilessettings before you run a scanor before a scan is scheduled torun. Norton 360 scans yourcomputer according to theconfiguration you specified inthe Scan Performance Profilessettings.

You can configure the followingScan Performance Profilessettings:1 Full Scan

Configure a complete scan ofyour computer.

1 Standard Trust

Configure a scan thatexcludes the files that areNorton Trusted.

1 High Trust

Configure a scan thatexcludes the Norton andCommunity Trusted files andthe files that have knowndigital signatures.

Scan PerformanceProfiles

Customizing settingsAbout Antivirus settings

456

Page 457: Help

Email Antivirus Scan protectsyou from the threats that aresent or received in emailattachments.

You can use the Email AntivirusScan options to define howNorton 360 should behave whenit scans email messages. Basedon the options you choose,Norton 360 automatically scansthe email messages that yousend or receive.

Email Antivirus Scan

Instant Messenger Scan optionslet you customize the scanningof the files that you receive frominstant messenger programs.

You can select the supportedinstant messenger programsfrom which you may receive files.Norton 360 scans the files thatyou receive from the selectedinstant messenger programs.

Instant Messenger Scan

457Customizing settingsAbout Antivirus settings

Page 458: Help

Exclusion / Low Risks

Customizing settingsAbout Antivirus settings

458

Page 459: Help

Exclusions options specify theitems such as folders, files, anddrives that you exclude fromNorton 360 scans. Scans,signatures, and low-risk itemsare some items that you canexclude from scanning.

Exclusions options also let youchoose which categories of risksyou want Norton 360 to detect.Your options are:1 Low Risks

Lets you manage the low-riskitems that are found in yourcomputer.

You can specify how youwant Norton 360 to respondto low-risk items.

1 Items to Exclude fromScans

Lets you determine whichdisks, folders, or files youwant to exclude from riskscanning.

You can add new exclusionitems or edit the added itemsin the excluded-items list.You can also remove itemsfrom the excluded-items list.

1 Items to Exclude fromAuto-Protect and SONARDetection

Lets you determine whichdisks, folders, or files youwant to exclude fromAuto-Protect scans andSONAR scans.

You can add the new itemsthat need to be excluded ormodify the items that youalready excluded. You can

459Customizing settingsAbout Antivirus settings

Page 460: Help

also remove items from theexcluded-items list.

1 Signatures to Exclude fromAll Detections

Lets you select known risksby name and remove a riskname from theexcluded-items list

You can also view the riskimpact that is based on theperformance, privacy,removal, and stealth impact.

w Exclusions reduce yourlevel of protection and should beused only if you have a specificneed.

The Insight Network scan usesthe Cloud technology wherein aremote server on the Webcontains the latest virusdefinitions. Norton 360 scansyour computer for the latestsecurity threats. When Norton360 performs the InsightNetwork scan, it uses the virusdefinitions that are availablelocally and in the Cloud. Norton360 provides additionalprotection by using the mostrecent definitions in the Cloud,apart from the definitions thatare available locally on yourcomputer.

Insight Protection

About Antispyware and Updates settingsAntispyware protects your computer against thesecurity risks that can compromise your personalinformation and privacy.

Customizing settingsAbout Antivirus settings

460

Page 461: Help

Security risks, such as spyware and adware, cancompromise your personal information and privacy.Spyware and adware programs are closely related. Insome cases, their functionalities may overlap; but whilethey both collect information about you, the types ofinformation that they collect can differ.

Norton 360 protects your computer from vulnerabilitiesthrough the latest program updates and definitionupdates. Automatic LiveUpdate and Pulse Updatesobtain the latest virus definitions through definitionupdates and keep your computer secure from the latestsecurity threats.

You can use the following Antispyware and Updatessettings:

Antispyware options let youchoose which categories of riskyou want Norton 360 to detectfor manual, email, and instantmessenger scanning.

Antispyware

461Customizing settingsAbout Antivirus settings

Page 462: Help

Norton 360 protects yourcomputer from vulnerabilitiesthrough the latest program anddefinition updates. Definitionupdates contain the informationthat lets Norton 360 recognizeand alert you to the presence ofa specific virus or securitythreat. You can use the Updatesoptions to obtain the latest virusdefinitions through definitionupdates and keep your computersecure from the latest securitythreats. Your options are:

1 Automatic LiveUpdate

Automatic LiveUpdateautomatically checks fordefinition updates andprogram updates to yourvirus protection when youare connected to theInternet.

1 Pulse Updates

In addition to the definitionupdates that AutomaticLiveUpdate downloads,Norton 360 uses streamingtechnology to download thelatest virus definitions. Thesedownloads are called PulseUpdates. The Pulse Updatesare lighter and faster, andkeep your computer securefrom the ongoing threats onthe World Wide Web.

Updates

Customizing settingsAbout Antivirus settings

462

Page 463: Help

About Firewall settingsFirewall settings in Norton 360 check your PC's Internetconnection to protect it from unwanted communicationactivity and Internet intrusions.

The following tabs are available on the Settings windowfor Firewall:

Lets you activate the generalfirewall features andcustomize the ports that yourcomputer uses to access Webpages

The general settings let youcontrol how firewall handlesthe uncommon protocols andthe network traffic to andfrom your computer.According to the generalsettings, the firewall allowsor blocks the incoming or theoutgoing connectionattempts and the sharing ofresources with yourcomputer. You can also usethe general settings to let thefirewall control connectionattempts to or from theblocked and the inactiveports in your computer.

General Settings

Lets you control settings forthe programs that access theInternet

Program Rules

463Customizing settingsAbout Firewall settings

Page 464: Help

Lets you determine how thefirewall handles incomingandoutgoing networkconnections of various kinds

You can change the settingsto allow or deny specifictypes of connections withyour PC.

Traffic Rules

Prevents intrusion attemptsand protects your Webbrowser from attacks bymalicious Web sites

You can use the DownloadIntelligence option that isavailable on this tab toprotect your computeragainst any unsafe file thatyou download. This featuresupports only downloadsusing the HTTP protocol andInternet Explorer and Firefox3.0 browser.

Intrusion and BrowserProtection

Customizing settingsAbout Firewall settings

464

Page 465: Help

Lets you activate theadvanced protection featuresof Smart Firewall

The advanced settings let youturn on or turn off theAutomatic Program Controlfeature. Automatic ProgramControl automaticallyconfigures Internet accesssettings for the Web-enabledprograms that you run for thefirst time.

The Automatic Learn IPv6NAT Traversal Traffic optionis available only whenAutomatic Program Controlis turned on. Norton 360provides the Automatic LearnIPv6 NAT Traversal Trafficoption to control the networktraffic that uses Teredo tocommunicate with yourcomputer.

When you turn off AutomaticProgram control, you can turnon Advanced EventsMonitoring. You can use theAdvancedEventsMonitoringoptions to configure theInternet access settings forInternet-enabled programsthe first time that they run.

Advanced Settings

About Firewall General settingsSmart Firewall General settings let you activate thegeneral firewall features and customize the ports that

465Customizing settingsAbout Firewall settings

Page 466: Help

your computer uses to access Web pages. Your optionsare:

Determines how the SmartFirewall handles uncommonprotocols

Uncommon Protocols

Returns the Smart Firewall to itsdefault state

You can use the Reset option toensure that all recommendedfirewall rules and settings areconfigured.

w If you reset the firewall,you remove any custom rules orsettings that you haveconfigured. Therefore, Norton360 prompts you with aconfirmation dialog box whenyou reset firewall.

Firewall Reset

Ensures that blocked andinactive ports do not respond toconnection attempts

Active ports are prevented fromresponding to connectionattempts that have incorrectsource or destinationinformation.

Stealth Blocked Ports

Customizing settingsAbout Firewall settings

466

Page 467: Help

Automatically allows the Internettraffic that matches theconnections that an applicationopens

Check this option to do thefollowing:1 Analyze the network traffic

that enters your computer.1 Block the suspicious

applications that try toconnect to your computer.

Stateful Protocol Filter

Allows the computers on thenetwork to share resources suchas files, folders, and printers(that are locally attached)

Automatic File/PrinterSharing Control

Blocks all networkcommunications to and fromyour computer

Block All Network Traffic

About the Intrusion and Browser Protection settingsIntrusion Prevention scans all the network traffic thatenters and exits your computer and compares thisinformation against a set of attack signatures. Attacksignatures contain the information that identifies anattacker's attempt to exploit a known operating systemor program vulnerability. Intrusion Prevention protectsyour computer against most common Internet attacks.

If the information matches an attack signature,Intrusion Prevention automatically discards the packetand breaks the connection with the computer that sentthe data. This action protects your computer from beingaffected in any way.

Intrusion Prevention relies on an extensive list ofattack signatures to detect and block suspiciousnetwork activity. Norton 360 runs LiveUpdateautomatically to keep your list of attack signatures up

467Customizing settingsAbout Firewall settings

Page 468: Help

to date. If you do not use Automatic LiveUpdate, youshould run LiveUpdate once a week.

Norton 360 also provides the Web Browser Protectionfeature to protect your Web browser from maliciousprograms.

w The Browser Protection feature is available for InternetExplorer 6 or later and Firefox.

With increasing Internet use, your Web browser isprone to attack by malicious Web sites. These Web sitesdetect and exploit the vulnerability of your Webbrowser to download malware programs to your systemwithout your consent or knowledge. These malwareprograms are also called drive-by downloads. Norton360 protects your Web browser against drive-bydownloads from malicious Web sites.

The Intrusion and Browser Protection settings alsoinclude the Download Intelligence option to protectyour computer against any unsafe file that youdownload. Download Intelligence provides informationabout the reputation level of any executable file thatyou download using the Web browser. DownloadIntelligence supports only downloads using the HTTPprotocol, Internet Explorer 6 browser or later, andFirefox 3.0 browser or later. The reputation details thatDownload Intelligence provides indicate whether thedownloaded file is safe to install. You can use thesedetails to decide whether you want to install theexecutable file.

About Advanced SettingsSmart Firewall Advanced settings let you activate theadvanced protection features of Smart Firewall byturning off Automatic Program Control.

Automatic Program Control automatically configuresInternet access settings for the Web-enabled programsthat are run for the first time. The Automatic LearnIPv6 NAT Traversal Traffic option is available onlywhen Automatic Program Control is turned on. You

Customizing settingsAbout Firewall settings

468

Page 469: Help

can use this option to specify how Norton 360 mustcontrol any network traffic that uses Teredo tocommunicate with your computer.

When you turn off Automatic Program control, youcan turn on Advanced Events Monitoring. You can usethe AdvancedEventsMonitoring options, to configurethe Internet access settings for Internet-enabledprograms the first time that they run. When you turnon the Advanced Events Monitoring feature, you areprompted with numerous firewall alerts. You can allowor deny any of the events that may harm yourcomputer. When the event occurs for the first time, afirewall alert appears and you can allow or block theevent. When you allow the event, the event detailsappear under the relevant category that is available inAdvanced Events Monitoring. The application thattriggers the allowed event is added to the Trusted listof its corresponding category in Advanced EventsMonitoring. You can remove the application from thelist. In this case, firewall alert appears when theapplication triggers the event next time.

The Advanced Events Monitoring settings consist ofthe following categories that provides your computerwith advanced protection:

Monitors themaliciousprogramsthat launch Internet-enabledprograms

Program Component

Monitors themaliciousprogramsthat attach to safe programswithout being detected

Program Launch

Monitors the Trojan horses ormalicious programs that launchtrusted applications in hiddenmode through command-lineparameters

CommandLine Execution

469Customizing settingsAbout Firewall settings

Page 470: Help

Monitors the Trojan horses ormalicious programs that injectcode into an application'sprocess without triggeringfirewall alerts

Code Injection

Monitors the Trojan horses andother malicious programs thatmanipulate an application'sbehavior to connect to theInternet without triggeringfirewall alerts

Window Messages

Monitors the Trojan horses andother malicious programs thatbypass network traffic

These programs penetrate theWindows TCP/IP layer to sendand receive data withouttriggering firewall alerts.

Direct Network Access

Monitors themaliciousprogramsthat use the documentedinterfaces that the trustedapplications provide to transmitdata outside the networkwithout triggering firewall alerts

Active Desktop Change

Monitors themalicious keyloggerprograms that access personalinformation of a user on aparticular computer bymonitoring their keystrokeactivities

Key Logger Monitor

Monitors themaliciousprogramsthat manipulate an application'sbehavior by instantiatingcontrolled COM objects

COM Control

Customizing settingsAbout Firewall settings

470

Page 471: Help

About Norton AntiSpam settingsWith the increase in usage of email, many users receivea number of unwanted and unsolicited commercialemail messages that are known as spam. Not only doesspam make it difficult to identify valid email messages,but some spam contains offensive messages andimages.

Norton AntiSpam incorporates several powerfulfeatures to reduce your exposure to unwanted onlinecontent.

Norton AntiSpam settings help you configure thefollowing:

1 The email client with which Norton AntiSpamshould integrate

1 The list of allowed email senders

1 The list of blocked email senders

1 The email addresses and domains that NortonAntiSpam should not import into the list of allowedand blocked email senders

1 The option to send feedback to Symantec aboutmisclassified email

1 The option to filter email messages through WebQuery to maintain high spam detection efficiency

471Customizing settingsAbout Norton AntiSpam settings

Page 472: Help

You can configure Norton AntiSpam settings on thefollowing tabs:

The options on the Addressestab let you configure the list ofallowed and blocked emailsenders. You can define whetherfeedback about a misclassifiedemail message should be sent toSymantec. You can alsoconfigure the option to filter theemailmessages through theWebQuery filter. In addition, you canconfigure the Address BookExclusions list.

Addresses

The options on the ClientIntegration tab let you integrateNorton AntiSpam with youremail clients to keep you freefrom unsolicited emailmessages. You can also specifywhether or not to display a briefintroduction of Norton AntiSpameach time you start your emailprogram. In addition, you canspecify which address book youwant Norton AntiSpam tointegrate with.

Client Integration

About Addresses settingsThe Addresses tab in the AntiSpam Settings windowprovides options to configure AntiSpam settings.

Customizing settingsAbout Norton AntiSpam settings

472

Page 473: Help

You can use the following options on the Addressestab:

Lets you exclude the emailaddresses that must not beautomatically added from youraddress book to the Allowed List

Address Book Exclusions

Lets you add specific addressesand domains (for example,@symantec.com) fromwhichyouwant to receive email messages

Allowed List

Lets you add specific addressesand domains from which you donot want to receive emailmessages

Norton AntiSpam marks all emailmessages from these addressesor domains as spam.

Blocked List

Lets you send feedback aboutthe misclassified email messageto Symantec

w The option is available onlywhen Microsoft Outlook orOutlook Express is installed onyour computer.

Feedback

Lets you check the SymantecWeb servers to filter the spamemail messages which the localfilters classify as legitimate

Web Query

About Client Integration settingsThe Client Integration tab in the AntiSpam Settingswindow lists the supported email programs, or clients,

473Customizing settingsAbout Norton AntiSpam settings

Page 474: Help

that are installed on your computer and theirassociated address books.

You have the following options on the ClientIntegration tab:

Norton 360 supports NortonAntiSpam integration withMicrosoft Outlook and OutlookExpress. In Windows Vista,Norton 360 also supports NortonAntiSpam integration withWindows Mail.

When you turn on an emailclient, Norton AntiSpamintegrates with the email client.

Email Clients

Norton 360 supports NortonAntiSpam integration with theaddress books of email clientsfrom which you want NortonAntiSpam to import emailaddresses.

You can also import into theAllowed List the list of addressesthat are present in an emailprogram. You do not have tointegrate Norton AntiSpam withyour email clients to import theaddresses into the Allowed List.

Address Books

The WelcomeScreen option under the Miscellaneousrow provides a brief introduction of Norton AntiSpameach time you start your email program. You can turnoff the Welcome Screen option if you do not want thewelcome screen to appear.

Customizing settingsAbout Norton AntiSpam settings

474

Page 475: Help

About My Network SettingsThe Network Security Map settings let you configurethe communication port that Norton products use tocommunicate with each other. You can also specifywhether to display the Network Security Overviewwindow when you open Network Security Map.

You can use the Configure option in the NetworkSecurity Map row to access Network Security Mapwindow. The NetworkSecurityMap window providesa pictorial representation of the devices on the networkto which your computer is connected. You can view thedetails of each device before you set up RemoteMonitoring. The ProductConfiguration panel appearswhen you click the Configure option for the first time.The ProductConfiguration panel helps you install thecomponent that is required to view Network SecurityMap.

You have the following options:

Manages the trust level of the devicesthat you manually add to your homenetwork

Trust Control is a special networkthat lists all the devices that youmanually add to the Network SecurityMap, irrespective of their connectionstatus. You can select the TrustControl network in the NetworkDetails drop-down list to view thedevices that you added. You can alsoreclassify the devices that you addedto the Network Security Map astrusted or restricted. You cannot editthe details of Trust Control network.

Trust Control

475Customizing settingsAbout My Network Settings

Page 476: Help

Removes all of the devices that arelisted in Network Map

You can purge Network Map if youwant to create a new list of devices.For example, you can purge all of thedevices that were present on yourprevious network before you connectto a new network. Ensure that youdisable Remote Monitoring beforeyou purge the Network Map. Norton360 cannot purge the Network Mapwhen the Remote Monitoring isturned on.

w Norton 360 purges the devicesthat you add manually in the TrustControl network depending upontheir trust level. It does not purge thedevices that have a trust level of FullTrust or Restricted.

Network Map

Customizing settingsAbout My Network Settings

476

Page 477: Help

Shows the communication port thatNorton products use to communicatewith each other over the network

If you change the communicationport number on your computer, youmust change it on each computerthat is connected to your NetworkSecurity Map. In addition, when youfind more computers that use theRemote Monitoring Setup process,ensure that the same port number isused on every computer.

w Though this communicationport is configurable, Symantecrecommends that you do not changethe port number to avoid potentialconflicts with other well-knownnetworking ports. If you change thecommunication port number, youmust use a port number in the range1-65535.

CommunicationsPort

Displays the Network SecurityOverview window when you openNetwork Security Map

Welcome Screen atStartup

About backup settingsYou can use the backup settings in Norton 360 toconfigure your system backup.

Norton 360 Backup lets you perform the followingtasks:

1 Select the files that are required to be backed up.

1 Choose the location to store the backed up files.

1 Assign a schedule to run a backup.

In addition to the backup tasks, Norton 360 backupsettings let you easily access the backup status of a

477Customizing settingsAbout backup settings

Page 478: Help

particular file without opening the product. TheBackup Settings window provides you the option toturn off or turn on the Backup.

Under Backup, you have the following options:

Lets you configure what, where,and when to back up yourimportant files

You can use the Configureoption to specify the source,destination, and schedule of thebackup.

Manage Backup

Lets you view the backup statusof a file by adding the statusoverlay to the file’s icon

The status overlays that appearsare:1 Green icon with a check mark

Indicates that the file hasbeen backed up

This icon changes to blueicon with arrows if youmodify the file.

1 Blue icon with arrows

Indicates that the file has notbeen backed up

This icon changes to greenwhen Norton 360automatically backs up thefile during idle time.

1 Gray icon with a slash mark

Indicates that the file hasbeen excluded from backup

Norton 360 displays adisabled backup status on afile when you exclude the filefrom any of the backup sets.

Backup Status Overlays

Customizing settingsAbout backup settings

478

Page 479: Help

Lets you view the list of backupdestinations where your files arebacked up in the WindowsExplorer

You can also add a file to abackup set and delete a file froma backup set. In addition, youcan restore a file from a backupset on the Norton Backup Driveto your customized location.

Norton Backup Drive

Lets you add or exclude a file ora folder to a backup set by usingthe right-click shortcut menu

You can use this option after youconfigure Backup in theManageBackup Sets window. It listsdown all the available backupsets for easy backups.

Context Menu

Lets you view the backup statusof each backup set on theBackup tab in the file Propertiespage that you included in yourbackup

It lists down all the availablebackup sets along with the dateand time that it was last backedup. It also shows thecorresponding icon overlay thatindicates if the file is included orexcluded in a particular backupset.

Property Page

479Customizing settingsAbout backup settings

Page 480: Help

Lets you specify the amount oflocal disk space that you want toreserve.

When you perform an onlinebackup, Norton 360 creates atemporary file in your local diskfor file transfer. At times, thisfile becomes large and consumesa large amount of free spaceavailable on your local drive.

When the available free diskspace on your computer reachesthe specified limit, Norton 360notifies you and does notperform an online backup. Youmust free some disk space andthen perform an online backup.By default, Norton 360 reserves2048 MB (2 GB) of your localdisk space.

Reserved FreeDisk SpaceDuring Online Backup (inMB)

About Identity Protection settingsIdentity thieves often use fraudulent Web sites toattempt to trick you into divulging private information.These sites may be disguised as shopping sites orfinancial transaction sites. Norton 360 helps guardagainst identity theft by verifying the Web sites youvisit.

Antiphishing, Norton Safe Web, and Identity Safefeatures in Norton 360 let you safely browse theInternet and securely perform online transactions.

When you install Norton 360, it adds the NortonToolbar to Internet Explorer and Firefox. Norton 360protects your Internet Explorer browser and Firefoxbrowser when you turn on the Safe Surfing option.

Antiphishing tells you the following things about theWeb pages that you visit:

Customizing settingsAbout Identity Protection settings

480

Page 481: Help

1 If it is safe to enter confidential information

1 If the Web page is known to be fraudulent

1 If the Web page is authentic and Symantec approved

1 If the Web page is known to belong to a suspicioussite

1 If the Web page is known to give annoying results

Norton Safe Web lets you know that a Web site ismalicious before you visit it. It provides you a safe Websearch environment by displaying the site rating iconsnext to every search result.

When you turn on Norton Safe Web, you can see thefollowing site rating icons next to the search results:

Indicates the site is VeriSigntrusted

Norton Secured icon

Indicates that the site is safe tovisit

Green OK

Indicates that the site mayattempt to install malicioussoftware in your computer andis unsafe to visit

Red cross (x) mark

Indicates that the site mayprovide annoying results

Yellow exclamation mark

Indicates that Norton Safe Webhas not analyzed the site and itdoes not have sufficientinformation

Grey question mark

The Identity Safe feature in Norton 360 lets you saveand protect your logins. However, the feature remainsinactive until you create an Identity Safe password andlog in to Identity Safe. The password protects you by

481Customizing settingsAbout Identity Protection settings

Page 482: Help

restricting unauthorized access to your data in IdentitySafe.

You can set up Identity Safe in the following areas ofNorton 360:

1 The Cards & Log-ins menu on the Norton Toolbar

1 The Identity Safe section in the Settings windowfor Identity Protection

1 The Identity Protection section in the Norton 360main window

Identity Safe provides you the following features for asecure online transaction experience:

Table 13-1 Identity Safe features

AdviceDescriptionFeature

When you saveall of your logininformation inIdentity Safe, youcan do thefollowing:1 Easily track

all of yourlogins

1 Quicklylaunch yourlogin Webpages

Lets youmanage yourlogininformation

Thisinformationincludessuch thingsas youremail logincredentialsand Internetbankingcredentials.

Manage Logins

Customizing settingsAbout Identity Protection settings

482

Page 483: Help

AdviceDescriptionFeature

You can use theinformation thatyou store in thecards to do thefollowing:1 Automatically

fill forms1 Provide

sensitiveinformationwithouthaving totype it whileyou areonline

In this way,Identity Safeprotects youfrom keyloggersthat steal andmisuse youridentity.

Lets youmanage yourpersonalinformationin one place

Manage Cards

483Customizing settingsAbout Identity Protection settings

Page 484: Help

AdviceDescriptionFeature

It becomesdifficult tomanage variousidentitynumbers.Manage Notesstores all of yoursensitive IDs in avery secure wayand lets youeasily use themwhile you areonline.

Lets youstore andmanagesensitiveinformation

In ManageNotes, youcan includeinformationsuch asSocialSecuritynumber,driverslicensenumber,insurancepolicynumber, andlegal andfinancialinformation.

Manage Notes

About Task Scheduling settingsThe Task Scheduling settings let you specify the tasksthat Norton 360 should run automatically when yourcomputer is idle. They also help you to schedule youractivities that are related to security, performance, andbackup.

Customizing settingsAbout Task Scheduling settings

484

Page 485: Help

Task Scheduling includes the following settings:

Lets you specify the tasks thatshould run in the backgroundautomatically when yourcomputer is idle

These automatic tasks includeactivities that are related to PCSecurity and PC Tuneup.

Your options are:1 InternetExplorer Temporary

Files1 Windows Temporary Files

1 Internet Explorer History

1 Disk Optimization

1 Registry Cleanup

Automatic Tasks

485Customizing settingsAbout Task Scheduling settings

Page 486: Help

Scheduling

Customizing settingsAbout Task Scheduling settings

486

Page 487: Help

Lets you schedule PC Securityand PC Tuneup related activities

You can specify how oftenNorton 360 should scan yoursystem for security andperformance issues and when itshould perform backups.

You have the following optionsfor scheduling custom PCSecurity and PC Tuneupactivities:1 Automatic (Recommended)

This option is therecommendedoption.Norton360 detects the time your PCis idle and then automaticallyruns the tasks.

1 Weekly

You can schedule to run yourtasks on a weekly basis. Youmust specify the day andtime. You can also specifythat the schedule must runonly when the PC is idle.

1 Monthly

You can schedule to run yourtasks on a monthly basis. Youmust specify the time andthe day of the month. Youcan also specify that theschedule must run only whenthe PC is idle.

1 Manual Schedule

You can run the tasksmanually.

Your computer's performance ismaximized if you schedule yourcritical operations to occur whenyour computer is idle. Norton360 identifies your computer as

487Customizing settingsAbout Task Scheduling settings

Page 488: Help

idle when there is no detectablemouse or keyboard activity for aperiod that you specify as idletimeout duration. When youschedule your scans weekly ormonthly and check the Run onlyat idle time option, Norton 360scans your computer when it isidle. Symantec recommends youto check the Run only at idletime option to experience betterperformance of your computer.

You can also navigate to theBackup Settings window withthe Click here to schedulebackup option. You canconfigure the BackupScheduling option on the Whentab.

About Administrative SettingsYou can use Administrative Settings window toconfigure various important options of Norton 360.

Customizing settingsAbout Administrative Settings

488

Page 489: Help

You have the following options:

Lets you configure Norton 360to defragment your boot volumeor the local disk that containsthe boot volume when yourcomputer is idle

When the option is turned on,Norton 360 automaticallyschedules the optimization afteryou install an application onyour computer. Optimizationspeeds up your computer’sperformance by defragmentingthe fragmented parts of the disk.

Idle Time Optimizer

Lets you view how Norton 360has protected you for the past30 days

This report includes theactivities that Norton 360performed to protect yourcomputer. You can turn on theMonthly Report option to letNorton 360 automaticallydisplay the Monthly Report oncein every 30 days.

Monthly Report

Lets you automatically downloadthe latest version of the Norton360

You can easily upgrade to thelatest version of Norton 360when prompted. By default, thisoption is turned on. Symantecrecommends you to install thelatest product version as it mightcontain new features, and itensures better protectionagainst security threats.

Automatic Download ofNew Version

489Customizing settingsAbout Administrative Settings

Page 490: Help

Lets you specify the automaticconfiguration details, proxysettings, and the authenticationdetails to connect to the Internet

Programs such as LiveUpdateand Norton Insight use thespecified proxy server settingsto connect to the Symantecserver over the Internet.LiveUpdate uses proxy settingsto retrieve updates. NortonInsight uses proxy settings toobtain specific informationabout the files such as trust levelor digital signature.

Network Proxy Settings

Customizing settingsAbout Administrative Settings

490

Page 491: Help

Lets you submit selectedsecurity and application data toSymantec for analysis

Norton Community Watchprotects you against newpotential risks. It collects theinformation about new securitythreats from your computer andsubmits the information toSymantec for analysis. Symantecassesses the data to identify thenew threats and resolves it.

The Detailed Error DataCollection option is availablewhen the Norton CommunityWatch option is turned on.

Detailed Error Data Collectionlets you allow or deny some ofthe detailed data submissions.These detailed data may varydepending on theNorton-specific errors andcomponents. You can use theAlways, Never and Ask Meoptions to configure thesubmissions.

NortonCommunityWatch

Lets you configure Norton 360to show or hide the notificationsthat appear whenNorton-specific automaticbackground tasks are run.

Norton Task Notification

491Customizing settingsAbout Administrative Settings

Page 492: Help

Performance Monitoring

Customizing settingsAbout Administrative Settings

492

Page 493: Help

Lets you monitor theperformance of your computer

When the PerformanceMonitoring option is turned on,Norton 360 monitors the CPUusage and memory usage of yourcomputer. It also monitors theimportant system activities thatyou performed over the periodof the last three months.

In addition, Norton 360 notifiesyou with performance alertswhen there is a high usage ofyour system resource by aprogram or process.

You have the following optionswhen the PerformanceMonitoring option is turned on:1 Performance Alerting

Lets you configure Norton360 to detect and notify youabout the increased usage ofyour computer resources byany program or process.

Norton 360 alerts you withthe information about theprogram name and theresources that the programuses. The Details & Settingslink in the notification alertlets you view additionaldetails about the resourceconsumption by the programin the File Insight window.

When this option is set toOn,Norton 360 notifies you withthe performance alerts andsaves the event in theSecurity History log. Whenthis option is set to LogOnly,

493Customizing settingsAbout Administrative Settings

Page 494: Help

Norton 360 saves the eventin the Security History logbut does not alert you withthe notifications. You canalso turn off this option ifyou do not want to viewperformance alerts. Bydefault, this option is turnedon.

1 Resource Threshold Profilefor Alerting

Lets you configure theresource threshold profile fordisplaying performancealerts.

When the resourceconsumption of a programexceeds the definedthreshold limit, Norton 360notifies you with aperformance alert.

You can set your thresholdlevel to Low, Medium, orHigh. Medium is the defaultsetting.

Customizing settingsAbout Administrative Settings

494

Page 495: Help

1 Low-Resource Profile UseOn Battery Power

Lets you configure Norton360 to change the resourcethreshold to low profile whenyour computer runs onbattery power.

It ensures betterperformance of yourcomputer on battery power.When this option is turnedoff, Norton 360 uses thethreshold level that you setin the Resource ThresholdProfile For Alerting option.By default, this option isturned on.

495Customizing settingsAbout Administrative Settings

Page 496: Help

1 High-Usage Alert for:2 CPU

When this option isturned on, Norton 360detects and notifies youabout the increasedusage of the CPUresource by any programor process. By default,this option is turned on.

2 Memory

When this option isturned on, Norton 360detects and notifies youabout the increasedusage of memory by anyprogram or process. Bydefault, this option isturned on.

2 Disk

When this option isturned on, Norton 360detects and notifies youabout the increasedusage of your disk by anyprogram or process. Bydefault, this option isturned off.

2 Handles

When this option isturned on, Norton 360detects and notifies youabout the increasedusage of handles by anyprogram or process. Ahandle is a pointer thatenables a program toaccess or identify aresource. By default, thisoption is turned off.

Customizing settingsAbout Administrative Settings

496

Page 497: Help

1 Program Exclusions

Lets you select specificprograms to exclude fromappearing in performancealerts.

You can use the Configureoption to list the programsfor which you do not want toget performance alerts.

Lets you save your battery powerby suspending a list ofbackground jobs when yourcomputer is on battery power

By default, this option is turnedon.

Power Saving Mode

497Customizing settingsAbout Administrative Settings

Page 498: Help

Lets you secure the product andprotect it from unauthorizedchanges

You have the following options:1 Non-Admins Access to

Settings

Lets you access andconfigure all the options inthe Settings window from anon-admin user account aswell

By default, this option isturned off. You need to log into your computer as anadministrator to turn on thisoption. You cannot accessthe Settings window if theSettings window is openedin some other user accounton your computer.

1 Norton Product TamperProtection

Lets you protect your Nortonproduct from an attack ormodification by unknown,suspicious, or threateningapplications

1 Settings PasswordProtection

Lets you protect Norton 360settings with a password. Itprotects the product settingsfrom unauthorized access

1 Product State Monitoring

Lets you monitor or ignorethe protection status ofAntivirus, Firewall, IdentityProtection, andMiscellaneous features ofNorton 360

Product Security

Customizing settingsAbout Administrative Settings

498

Page 499: Help

Silent Mode Settings

499Customizing settingsAbout Administrative Settings

Page 500: Help

Lets you turn on or turn offSilent Mode

You have the following options:1 Silent Mode

When you turn on the SilentMode option, you enableSilent Mode for a specifiedduration. Norton 360suppresses all alerts andsuspends the backgroundactivities for the durationthat you specify.

1 Full Screen Detection

When you turn on the FullScreen Detection option,Norton 360 automaticallydetects the applications thatyou run in full-screen modeand enables Silent Mode.Norton 360 suppresses mostof the alerts and suspendsthe background activities.The only activities that runare those that protect yourcomputer from viruses andother security threats.

1 QuietModeonDetection of:2 IMAPI 2.0 Disk Burn

When you use a MediaCenter application toburn a CD or DVD, Norton360 detects the activity,and automatically turnson Quiet Mode. WhenQuiet Mode is turned on,Norton 360 suppressesthe background activitiesbut continues to displayalerts and notifications.

2 Media Center TVRecording

Customizing settingsAbout Administrative Settings

500

Page 501: Help

When you use a MediaCenter application torecord a TV program,Norton 360 detects theactivity, andautomatically turns onQuiet Mode. When QuietMode is turned on,Norton 360 suppressesthe background activitiesbut continues to displayalerts and notifications.

2 User-SpecifiedPrograms

When you run anapplication that is listedin the User-SpecifiedPrograms list, Norton360 detects the activity,and automatically turnson Quiet Mode. WhenQuiet Mode is turned on,Norton 360 suppressesthe background activitiesbut continues to displayalerts and notifications.

You can configure the listof programs for whichyou want to turn on QuietMode.

Lets you configure Norton 360to notify you about special offerson the latest Norton products,add-ons, and other usefulinformation from Symantec.

Special OfferNotification

501Customizing settingsAbout Administrative Settings

Page 502: Help

Lets you delay the automaticrunning of Norton-specificbackground tasks when youresume your computer fromhibernate mode or standbymode.

Automatic ResumeDelay

Lets you specify duration forrunning Norton-specificprograms on your computer thatrun automatically when you turnon your computer

It does not delay Norton 360protection. You can specifyAutomatic Tasks Delay durationfor a period of 1 minute to 20minutes. The default duration is20 minutes.

Automatic Tasks Delay

Lets you specify the Idle Timeoutduration after Norton 360identifies your computer as idle

You can specify Idle Timeout fora period of 1 minute to 30minutes. The default duration is10 minutes.

Idle Time Out

Customizing settingsAbout Administrative Settings

502

Page 503: Help

Lets your PC run smoothly andefficiently by deleting theunused temporary files andbrowsing history if you useFirefox Web browser

Norton 360 automatically cleansup Internet Explorer temporaryfiles, history, and bookmarks asa background activity.

You have the following options:1 Firefox Temporary File

Cleanup

Lets you clean up thetemporary files that getaccumulated when you visitWeb pages in the Firefox Webbrowser

1 Firefox History Cleanup

Lets you clean up the historyand bookmarks that getaccumulated when you visitWeb pages on the FirefoxWeb browser

Firefox Cleanup

About Norton Product Tamper ProtectionNorton Product Tamper Protection prevents outsideprograms from making changes to the Norton product.This security feature also prevent Windows SystemRestore from changing Norton files, which results inthe Restoration Incomplete message.

Norton Product Tamper Protection protects Norton360 from an attack or modification by any virus orother unknown threat. You can protect your productfrom accidental modification or deletion by keepingthe NortonProductTamperProtection option turnedon.

503Customizing settingsAbout Administrative Settings

Page 504: Help

If you want to temporarily turn off Norton ProductTamper Protection, you can turn it off for a specifiedduration.

w You cannot run System Restore on your computer whenNortonProductTamperProtection is turned on. Youmust temporarily turn off Norton Product TamperProtection to run a successful System Restore.

Turning off or turning on Norton Product Tamper Protection

Norton Product Tamper Protection protects the Norton360 files from an attack or modification by any virusor other unknown threat. You can protect your productfrom accidental modification or deletion by keepingthe NortonProductTamperProtection option turnedon.

If you want to temporarily turn off Norton ProductTamper Protection, you can turn it off for a specifiedduration. You can turn off or turn on Norton ProductTamperProtection from the AdministrativeSettingswindow. You can also turn off or turn on NortonProduct Tamper Protection from Quick Controls inthe Settings window.

w You cannot run System Restore on your computer whenNortonProductTamperProtection is turned on. Youmust temporarily turn off Norton Product TamperProtection to run a successful System Restore.

To turn off Norton Product Tamper Protection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Product Security, in the Norton ProductTamper Protection row, move the On/Off switchto the right to the Off position.

4 Click Apply.

5 In the Security Request dialog box, in the Selectthe duration drop-down list, select how long youwant to turn off Norton Product Tamper Protection.

Customizing settingsAbout Administrative Settings

504

Page 505: Help

6 Click OK.

7 In the Settings window, click Close.

To turn on Norton Product Tamper Protection

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under Product Security, in the Norton ProductTamper Protection row, move the On/Off switchto the left to the On position.

4 Click Apply, and then click Close.

About securing Norton 360 Settings using a passwordYou can configure Norton 360 to prevent unauthorizedaccess to your product settings. If you share yourcomputer with others and do not want them to modifyyour Norton 360 Settings, you can secure Norton 360Settings using a password. The Settings PasswordProtection option lets you secure your Norton 360Settings by setting up a password.

By default, Settings Password Protection option isturned off. You must turn on the Settings PasswordProtectionoption to set up a password for your productsettings. You can access the Settings PasswordProtection option under Product Security, in theAdministrativeSettings window. The password mustbe between 8 and 256 characters in length.

After you set up a password for Norton 360 Settings,you must enter the password each time to access orconfigure your product settings. If you forget yoursettings password, you can reset the password in thewindow that appears when you choose to uninstallNorton 360. You do not need to uninstall the productto reset your password. You can use the reset settingspassword option in the Select your UninstallPreference window to reset your password.

505Customizing settingsAbout Administrative Settings

Page 506: Help

w The reset settings password option appears in theSelect your Uninstall Preference window only whenthe SettingsPasswordProtection option is turned on.

You can turn off the Settings Password Protectionoption if you no longer require password protectionfor your Norton 360 Settings.

Securing your Norton 360 Settings using a password

You can secure your Norton 360 Settings fromunauthorized access by setting up a password for yourproduct settings. The Settings Password Protectionoption in the AdministrativeSettings window lets yousecure your Norton 360 Settings using a password.

After you set up a password for Norton 360 settingsyou must enter the password each time to view orconfigure your product settings.

By default, the Settings Password Protection optionis turned off. You must turn on the SettingsPasswordProtection option to set up a password for your productsettings.

w The password must be between 8 and 256 charactersin length.

To secure your Norton 360 Settings using a password

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 Under ProductSecurity, in the SettingsPasswordProtection row, move the On/Off switch to the leftto the On position.

4 Do one of the following:

1 In the Settings Password Protection row, clickConfigure.

1 In the Settings window, click Apply.

5 In the dialog box that appears, in the Password box,type a password.

Customizing settingsAbout Administrative Settings

506

Page 507: Help

6 In the Confirm Password box, type the passwordagain.

7 Click OK.

8 In the Settings window, click Close.

Turning off Norton 360 Settings password

You can protect your Norton 360 Settings with apassword using the Settings Password Protectionoption. If the Settings Password Protection option isturned on, you need to enter the Settings passwordeach time to view or configure your Norton 360settings. You cannot access the product settingswithout providing your Settings password.

w In case you forget your Settings password, you canreset it using the resetsettingspassword option in theSelect Uninstall Preference window.

You can turn off the Settings Password Protectionoption if you do not require password protection forNorton 360 settings.

To turn off Norton 360 Settings password

1 In the Norton 360 main window, click Settings.

2 In the Settings window, under Detailed Settings,click Administrative Settings.

3 In the dialog box that appears, in the Password box,type your Settings password, and then click OK.

4 In the Settings window, under Product Security,in the SettingsPasswordProtection row, move theOn/Off switch to the right to the Off position.

5 Click Apply, and then click Close.

Resetting your Norton 360 Settings password

If you forget your Norton 360 Settings password, youcan reset the password. You can reset your Norton 360Settings password using the reset settings passwordoption in the Select Uninstall Preference window.

507Customizing settingsAbout Administrative Settings

Page 508: Help

To access the SelectUninstallPreference window, youmust choose to uninstall Norton 360. However, youneed not uninstall the product to reset your Settingspassword.

w The reset settings password option appears in theSelect Uninstall Preference window only if theSettings Password Protection option in theAdministrative Settings window is turned on.

To reset your Norton 360 Settings password

1 On the Windows taskbar, click Start > ControlPanel.

2 In WindowsControlPanel, do one of the following:

1 In Windows XP, double-click Add or RemovePrograms.

1 In Windows Vista, click ProgramsandFeatures.

1 In Windows 7, click Programs > Programs andFeatures.

The Programs option in Windows 7 is availablewhen you select the Category option in the Viewby drop-down list.

3 In the list of currently installed programs, do oneof the following:

1 In Windows XP, click Norton360, and then clickChange/Remove.

1 In Windows Vista or Windows 7, click Norton360, and then click Uninstall/Change.

4 At the bottom of the Select Your UninstallPreference window, click reset settingspassword.

5 In the dialog box that appears, in the ResetPassword Key box, type the randomly generatedkey that is displayed against Reset Password Key.

6 In the New Password box, type the new password.

7 In the Confirm New Password box, type the newpassword again.

8 Click OK.

Customizing settingsAbout Administrative Settings

508

Page 509: Help

This chapter includes the following topics:

1 Finding the version number of your product

1 Finding the End-User License Agreement

1 About upgrading your product

1 About simple solutions

1 Staying informed about protection issues

1 Service and support solutions

1 Uninstalling Norton 360

Finding the version number of your productIf you want to upgrade your Norton product or wantto reach the customer support for assistance, you mustknow your product version number. You can find theversion number of your product on your computer.

To find the version number of your product

1 In the Norton 360 main window, click Support.

2 In the Support menu, click About.You can note the version number of your productin the window that appears.

14Finding additionalsolutions

Page 510: Help

Finding the End-User License AgreementEnd-User License Agreement (EULA) is a legaldocument that you agree to while installing theproduct. EULA contains information such as therestriction on sharing or usage of the software, theuser rights on the software, and the supportinformation.

You may need to read the EULA of your product toknow about the usage policies or to be aware of theterms and conditions. You can find the EULA of yourproduct on your computer.

To find the End-User License Agreement

1 In Windows Explorer, double-click the drive whereNorton 360 is located.

2 Double-click Program Files > Norton 360 > MUI >version > 09 > 01.Where version represents the version number ofinstalled Norton 360.

3 Do one of the following:

1 If you are a North American user, double-clickEULA_NorthAmerica.htm.

1 If you are an International user, double-clickEULA_ International.htm.

About upgrading your productNorton 360 helps you upgrade your product if you havean active subscription. You can upgrade your currentproduct to the later version without any cost as longas you have an active subscription with the currentproduct. You can access this option from the Supportdrop-down menu in the Norton 360 main window. If anew version of your product is available, Norton 360lets you download the new version.

If you choose to install the latest version of the product,Norton 360 downloads and seamlessly installs the latest

Finding additional solutionsFinding the End-User License Agreement

510

Page 511: Help

version. Ensure that you have saved all your importantdata before you install the new version of the product.

If you download and install the latest version of yourproduct, your subscription status remains the same asyour previous version of product. For example, youhave 200 days of subscription left with your currentversion of product and you upgrade your product tothe latest version. In this case, the subscription statusof your upgraded product remains 200 days only.

If a new version is not available, the Web page informsyou that no new version is available and your productis up to date. Symantec recommends that you have thelatest version of the product, as it contains new andenhanced features for better protection against securitythreats.

Product upgrade is different from the program updatesand the definition updates that are minorimprovements to your installed product. The maindifferences are as follows:

1 Product upgrade lets you download and install anew version of the entire product.

1 Definition updates are the files that keep yourSymantec products up to date with the latestantithreat technology.

1 Program updates are enhancements to Norton 360that Symantec issues periodically.

If a new version of the product is not available, ensurethat you have all the latest program updates anddefinition updates. LiveUpdate automates the processof obtaining and installing program and definitionupdates. You can use LiveUpdate to obtain the latestupdates.

The upgrade process might not work if your Webbrowser is incompatible to communicate with theSymantec servers.

w Your product must be activated and you need anInternet connection to check and install new productversion.

511Finding additional solutionsAbout upgrading your product

Page 512: Help

Checking for a new version of the productYou can upgrade your product to the latest version ifyou have an active subscription. If you have a newversion available, you can download and install thenew version of your product. You can also let Norton360 notify you when a new version of your product isavailable. You can do so by turning on the AutomaticDownload of New Version option in theAdministrative Settings window. The latest versionof your product may contain new and enhancedfeatures for better protection against security threats.

When you check for a new version, details about yourproduct such as product name and version are sent toSymantec servers. The servers then check whether anew version of the specified product is available or not.

If a new version is available, you can download andinstall it from the Web page. If a new version is notavailable, the Web page informs you about it. In suchcase, you can run LiveUpdate to obtain latest programand definition updates and keep the existing versionof your product up to date.

The upgrade process might not work if your Webbrowser is incompatible to communicate with theSymantec servers. You can use Internet Explorerversions 5.5 or later and Firefox versions 3.0 or later.

w You need an Internet connection to check and installnew product version.

To check for a new version of the product

1 In the Norton 360 main window, click Support.

2 In the Support menu, click CheckforNewVersion.This option is available only if your product isactivated. The Web page that appears displayswhether a new version of the product is availableor not.

3 Follow the on-screen instructions to download thenew product.

Finding additional solutionsAbout upgrading your product

512

Page 513: Help

About simple solutionsOne Click Support provides additional product supportwith one-click access from the Norton 360 mainwindow. One Click Support performs a Quick Scan ofyour computer and repairs problems without yourintervention. You can solve common problems withthe Begin Support Session option in the One ClickSupport window. If the problem persists, you can usethe Launch Support Web Site option to go to theNorton support Web site for help by telephone, email,or chat.

In addition, the Norton Support Web site providesaccess to the knowledge base articles. By using thesearticles, you can easily find solutions to your technicalproblems.

The support technicians can help you solve morecomplex problems by using remote-assistancetechnology.

w Support offerings can vary based on the language orproduct.

When you click Get Support, Norton 360 checks yourInternet connection. To access One Click Support, makesure that your computer is connected to the Internet.If you use a proxy server to connect to the Internet,you must configure the proxy settings of Norton 360.

Solving a problem using One Click SupportOne Click Support performs a Quick Scan of yourcomputer and repairs problems without yourintervention. If a problem persists, you can use theNorton support Web site for additional online supportand contact options.

Your computer must be connected to the Internet toaccess One Click Support. If you use a proxy server toconnect to the Internet, you must configure the proxysettings in Norton 360.

513Finding additional solutionsAbout simple solutions

Page 514: Help

To solve a problem if your computer is connected to theInternet

1 In the Norton 360 main window, click Support.

2 In the Support drop-down menu, click GetSupport.

3 In the One Click Support window, click BeginSupport Session.

4 Follow the on-screen instructions.

5 In the One Click Support window, do one of thefollowing:

1 If the problem is not fixed automatically, clickLaunch Support Web Site, and follow theon-screen instructions to find additional support.

1 If the problem is fixed, click Close.

To solve a problem if your computer is unable to connectto the Internet

1 In the Norton 360 main window, click Support.

2 In the Support drop-down menu, click GetSupport.

3 Follow the on-screen instructions in the CheckingYour Connection window.

4 If the problem persists, in the Checking YourConnection window, click Continue.

5 In the window that appears, click Yes to release andrenew your IP settings.

6 If your hosts file has been modified, Norton 360 willprompt you to correct it. Click Yes to correct thehosts file.

7 If the problem still persists, in the Checking YourConnection window, do one of the following:

1 On the left pane, select a region and then yourcountry. You can use the contact details thatappear on the right pane to contact our technicalsupport team.

1 Click Retry to try again.

Finding additional solutionsAbout simple solutions

514

Page 515: Help

Staying informed about protection issuesIf you need help using Norton 360, you can find helpfulinformation on the Symantec Web site. It containsmany useful and informative features that areespecially designed to complement Norton 360,including the following:

1 Detailed background information about currentthreats and outbreaks.

1 Newsletter to which you can subscribe.

1 Protection blog that lets you post your owncomments and view comments from experts.

w The Symantec Web site is constantly updated andenhanced, so the available resources may vary.

To stay informed about protection issues

1 Open your Web browser, and go to the followingURL:http://www.symantec.com

2 In the Symantec Web site, click Norton.

515Finding additional solutionsStaying informed about protection issues

Page 516: Help

3 In the menu that appears, do the following:

1 Click the Viruses&Risks tab, and then click anyitem on the left pane to know more details aboutit.

1 Click the Community tab, and then use one ofthe following:

Register as a user andparticipate in discussions.

You can create your own threadsof topics or take help from theexisting forum discussions.

Norton Forums

Read the messages thatprominent leaders post frominside and outside Symantec andobtain information straight fromthe source.

You can add comments or askquestions on the blogs that youare interested in.

Norton Blogs

Check about Norton in otherWeb sites and social networksthat are available.

Other NortonCommunities

Service and support solutionsUse the information that is contained in these topicswhen you need support for your product.

About online supportOne Click Support offers a range of technical supportand customer service options. You can access theseoptions by clicking the Support option in the Norton360 main window. If you cannot access One Click

Finding additional solutionsService and support solutions

516

Page 517: Help

Support, then you can access our support options byvisiting the following URL:

http://www.symantec.com/techsupp/

Under the Norton Support section, click NortonProductSupport and follow the on-screen instructions.You can also select the language of your choice fromthe Select your language drop-down list.

The Symantec Web site also contains answers to themost common customer questions. The Top TechIssues option provides you the links to the frequentlyasked questions. You can also use the Search optionto search for articles by using a keyword.

You can find the current Symantec consumer supportpolicies on our Web site at the following address:

www.symantec.com/supportpolicy

w If you received this product when you purchased yourcomputer, your computer manufacturer may beresponsible for providing your support.

About Symantec Support Web siteThe Symantec Support Web site provides a full rangeof self-help options.

By using Symantec Support Web site, you can do thefollowing:

1 Find help with your product download, productsubscription, product activation, productinstallation, and other issues.

1 Find and download the latest product manual.

1 Manage your products and services using NortonAccount.

1 Search Norton Forum to find the additional producthelp about installing, configuring, andtroubleshooting errors. You can also post yourquestions in the forum and get answers fromexperts. To post your questions, you need to firstregister for Norton Forum.

517Finding additional solutionsService and support solutions

Page 518: Help

1 Find information about the latest virus threats andremoval tools.

In addition to the self-help options, you can use theContact Us option at the bottom of the Web page tocontact a support representative by chat, email, orphone.

w Availability of support varies by region, language, orproduct. For additional support, go to the followingURL:

www.symantec.com/globalsupport

You can also contact the Symantec Technical Supportteam in the following ways:

Chat in real time with asupport representative.

For more complex technicalissues, chat offers the optionto allow a supportrepresentative to connectremotely to your computerand resolve your problem.

Chat

Submit your question on ourWeb site and receive aresponse by email.

Email support has a slowerresponse time than chat orphone.

Email

Speak to a supportrepresentative in real time.

Phone

Using the Symantec Support Web site

The Symantec Support Web site contains answers tothe most common customer questions. You can findthe latest product manual, knowledge base articles,and virus removal tools.

Finding additional solutionsService and support solutions

518

Page 519: Help

Symantec Support Web site contains problem-solvingarticles that are presented in an easy step-by-stepformat. The articles are categorized and listed on theleft side of the Web page. Using the categories, you canbrowse through the available support topics. You canalso use the SearchSupport box to find solution usinga keyword.

Symantec Support Web site also contains useful linksto the product manual, the Norton Account, the NortonForum, and the spyware help under AdditionalResources.

To use the Symantec Support Web site

1 In the Norton 360 main window, click Support.

2 In the Support drop-down menu, click GetSupport.

3 In the One Click Support window, click SupportWeb Site.The Norton Support Web page appears.

4 Follow the on-screen instructions.

ClubNorton

ClubNorton is your one-stop resource center forInternet security. As a Norton customer, Symantecwants to make your experience with your computersafe, enjoyable, and productive. Whether you use yourcomputer to manage your personal finances, shoponline, or share your latest digital photos with friendsand family, ClubNorton makes your experience a goodone. Our goal is to consistently provide the proper toolsand information to keep you up to date.

For more information, go to the following URL andselect your country or region in the Select YourCountry/Region drop-down menu:

www.clubnorton.com

The ClubNorton Web page includes a regularly updatedarticle library, a glossary, the Norton Forums, and theNorton Update Center. You can also find the followinguseful links in the Web page:

519Finding additional solutionsService and support solutions

Page 520: Help

1 Symantec Security Check

1 Subscription Troubleshooter

1 Home & Home Office Security

1 Product Manuals

1 Product Updates

1 Product Reviews

1 Order Status

1 Returns

1 Rebates

About keeping your subscription currentSubscription period lengths vary by Symantec product.To maintain uninterrupted protection, you must keepyour subscription up to date. If you do not renew yoursubscription, you cannot obtain updates of any kindand the software no longer functions.

When you run LiveUpdate near the end of yoursubscription period, you are prompted to subscribe fora nominal charge. Follow the on-screen instructionsto renew your subscription.

When you renew your subscription, the definitionupdates and new product features are availablethroughout the subscription period. Please note thatfeatures may be added, modified, or removed duringthis period.

Worldwide service and supportWorldwide service and support solutions vary bycountry. For the Symantec local offices please see thedetails and addresses that are listed below. To contactone of our Support offices, please go to the followingWeb site and select your language.

Finding additional solutionsService and support solutions

520

Page 521: Help

www.symantec.com/globalsupport

Contact informationRegion

1 Symantec Corporation

555 International Way

Springfield, OR 97477

U.S.A.

www.symantec.com/globalsupport

North America

1 Symantec Australia

Level 2, 1 Julius Avenue

North Ryde, NSW 2113

Sydney

Australia

www.symantec.com/globalsupport

Australia and NewZealand

1 Symantec Ltd

PO Box 5689 Blanchardstown

Dublin 15 Ireland

www.symantec.com/globalsupport

Europe, MiddleEast, and Africa

1 Symantec Brasil

Sevico e Suporte Symantec

Av. Dr. Chucri Zaidan, 920, 14º andar

CEP 04583-904

São Paulo - SP

Brasil

www.symantec.com/globalsupport

1 Portuguese language support:

www.symantec.com/globalsupport

1 Spanish language support:

www.symantec.com/globalsupport

Latin America

521Finding additional solutionsService and support solutions

Page 522: Help

Uninstalling Norton 360You can remove Norton 360 from your computer in thefollowing ways:

1 From Windows Control Panel

1 From the Start menu

w You should print out the Uninstalling Norton 360 Helptopic before continuing with the uninstallation. Youcannot access online Help during uninstallation.

If you want to reinstall Norton 360 on your computer,you must uninstall Norton 360 from your computer.You can reinstall the product using the installation filethat you downloaded from Symantec Web site or fromthe product disc. To reinstall Norton 360, follow theinstallation procedures that are available in the userguide.

To uninstall Norton 360 from Windows Control Panel

1 On the Windows taskbar, click Start > ControlPanel.

2 In Windows ControlPanel, do one of the following:

1 In Windows XP, click AddorRemovePrograms.

1 In Windows Vista, click ProgramsandFeatures.

1 In Windows 7, click Programs > Programs andFeatures.

The Programs option in Windows 7 is availablewhen you select the Category option in the Viewby drop-down list.

3 In the list of currently installed programs, do oneof the following:

1 In Windows XP, click Norton360, and then clickChange/Remove.

1 In Windows Vista or Windows 7, click Norton360, and then click Uninstall.

Finding additional solutionsUninstalling Norton 360

522

Page 523: Help

4 In the page that appears, under Select YourUninstall Preference, click one of the following:

Lets you retain your settings,passwords, and preferences forNorton features before youuninstall Norton 360

Select this option if you want toreinstall Norton 360 or anotherNorton product.

I plan to reinstall aNorton product in thefuture. Please leave mysettings behind.

Lets you completely removeNorton 360 without saving yoursettings, passwords, andpreferences

Please remove all userdata including my storedpasswords & quarantinecontents.

5 To uninstall Norton 360, click Next.

6 Do one of the following:

1 To restart your computer now, click RestartNow, which is recommended.

1 To restart your computer later, click RestartLater.

Norton 360 is not fully uninstalled until yourestart your computer.

To uninstall Norton 360 from the Start menu

1 On the taskbar, click Start>AllPrograms>Norton360 > Uninstall Norton 360.

523Finding additional solutionsUninstalling Norton 360

Page 524: Help

2 In the page that appears, under Select YourUninstall Preference, click one of the following:

Lets you retain your settings,passwords, and preferences forNorton features before youuninstall Norton 360

Select this option if you want toreinstall Norton 360 or anotherNorton product.

I plan to reinstall aNorton product in thefuture. Please leave mysettings behind.

Lets you completely removeNorton 360 without saving yoursettings, passwords, andpreferences

Please remove all userdata including my storedpasswords & quarantinecontents.

3 To uninstall Norton 360, click Next.

4 Do one of the following:

1 To restart your computer now, click RestartNow, which is recommended.

1 To restart your computer later, click RestartLater.

Norton 360 is not fully uninstalled until yourestart your computer.

Finding additional solutionsUninstalling Norton 360

524

Page 525: Help

Aabout customer support 517activation 20

about 19Norton Account 23online backups 423problems 23troubleshooting 23

activitiesscanning 198

Add Rule Wizardusing 211

Address Book Exclusionssetting 248

addressesadding allowed 250adding blocked 251importing allowed 250settings 472

Administrative Settingsabout 488

Advanced Modeallow an event 158

adwarefound by Auto-Protect 178

adware protection settings 438Aggressive

SONAR Protection 158alerts 187

responding to 205

Allowed List 250Antiphishing

about 258hiding the toolbar 327showing the toolbar 327turning off 260turning on 260

AntiSpamabout 242Address Book Exclusions 248Allowed List 250Blocked List 251Client Integration 245configure 471Feedback 253settings 471Web Query 254

antivirus settings 438Application Ratings

check trust level 84Scan Performance Profiles 86

attack signatures 225attacks

network 202attention

infected files 182Auto-Protect

notifications 178Autofill Exclusions

about 310

Index

Page 526: Help

Autofill Exclusions (continued)deleting 311specifying 310

Automatic LiveUpdateturning off or turning on 42

Automatic Program Controlabout 205

automatic tasks 193automatic updates 37Autorun Restore

about 411restoring 412

Bbackground jobs

about 76monitoring 78

backup 199, 373additional help 419backup file categories 381Backup Set 378categories 91file extensions 387file selection 392file types 381Identity Safe data 311locations 395Norton Backup Drive 413preparation 375problem solving 416restoring 404, 407restoring selected files 407scheduling 401settings 427, 477supported media 395turning off or turning on 425

Backup and Restoreabout 311schedules 196

backup file categoriesadding or editing file

extensions 388removing file extensions 390resetting file extensions 390

backup filesdeleting 391

Backup Setabout 378adding files and folders 392creating 379deleting 403excluding files and folders 393modifying 380renaming 380

Backup Settingsabout 477turning off and turning on 427

backupsabout 374locations 401online 420online storage space 424restore destinations 410running 404

Blocked List 251blocking

spam 242boot viruses 191browser cache files 366Browser Protection

turning on and turning off 230

Ccache files 366Cards

about 302adding 303deleting 306duplicating 306update image 303

Index526

Page 527: Help

Cards (continued)updating 306

categories in Norton 360viewing details 55

CDs for backups 416cleaning up disks 363, 367cleanups

in PC Tuneup 363Client Integration

configuring 245cloud technology

Cloud 142ClubNorton

security tips 519communication port

modifying 360Computer

protecting 94computers

blocking with AutoBlock 228IP address 348

configureIdentity Safe 287

connections 94cookies protection settings 438CPU graph

about 70obtaining historical data 72resource-consuming

processes 72CPU usage

viewing 71customer support

about 517using 518

customizingAllowed List 250Blocked list 251

Ddefinition status 44

definition updates 38obtaining 46

definitionsvirus and spyware 44

details links 55detecting

security risks 177device

adding 346editing details 349excluding from Intrusion

Prevention scan 355purging from exclusion list 232remotely monitoring 338removing from the Network

Security Map 357viewing 338

deviceschanging trust level 351

Diagnostic Reportrunning 368

dialers protection settings 438disk optimization 199, 364disks

cleaning up 366fragmentation 364optimizing 364

domainsadding allowed 250adding blocked 251

Download Insightabout 233configuring alerts 238turning off notifications 237turning on notifications 237

Download Intelligenceturning off 236turning on 236

DVDs for backups 416

527Index

Page 528: Help

Eemail

menu 247program 247spam 242

error messages 187EULA

checking 510Events graph

monitoring activities 60

Ffeatures

email filtering 243Feedback

Norton AntiSpam 253file extensions

of infected files 182file infectors 191files

backing up 404fragmentation 364scanning 141selection, for backups 392

filterWeb Query 254

filteringemail 471identifying email senders 250–

251SSL 242web-based 254

firewallgeneral settings 463, 465intrusion prevention 463program rules 463protection settings 222, 463removing programs 209traffic rules 463

firewall rulesabout 202changing the order of 220creating 205, 211default 203processing order 202, 220removing 222turning on and off 221

Firewall settingsadding programs 207

foldersscanning 141

fragmentation 364Full Screen Detection

about 161Full System Scan 140

GGeneral Rules

removing 222

Hhack tools protection settings 438Help

Symantec service andsupport 516

home networksettings 475

Iicons in Norton 360 52Identity Protection

categories 91Settings 480

Identity Safeabout 268accessing 283, 327, 332backing up 312changing password 322configuring 287

Index528

Page 529: Help

Identity Safe (continued)exporting data 279information 257logging in and out 285logins 293Norton toolbar 285options 313password 319resetting password 281restoring data 313restoring password 281security 319turning off 271turning on 271

Identity Safe Optionsabout 313

Identity Safe Password & Securityoptions

about 319Identity Safe profiles

about 272creating 273creating local profile 274creating portable profile 274exporting 278locating 282renaming 278switching 282

identity theftInternet 257

Idle Time Optimizerabout 75turning off 76turning on 76

Idle Time Outsetting 197

importlogins 277

Insight Networkabout 142cloud computing 142

Insight Network (continued)Insight Network scan 142Quick Scan 142scan 142shortcut menu scan 142Single File Scan 142

Insight Protectionturning off 144turning on 144

installationproblems 35–36

integration with email clients 245integration with email

programs 247Internet

connection problems 94search Explorer history 199temporary files 199, 366

Intrusion AutoBlockblocking computers

permanently 229turning on and off 228unblocking computers 228

Intrusion Prevention 463, 467about 225exclusion list 231turning individual notifications

on and off 226turning notifications on and

off 226Intrusion Prevention scan

excluding a device 355exclusion list 231purging devices 232remove devices 232

IP addresses 348finding 348

itemssubmitting from

Quarantine 127

529Index

Page 530: Help

Jjoke programs protection

settings 438

LLiveUpdate 43

about 37Smart Definitions 40–41technology 37updating 198

locations for backup 395Login

adding manually 296changing password 300changing URL 299changing user name 300configuring 287creating new folder 296deleting 296editing 296importing 277managing 296saving 294updating 301

low resource profile on batteryturning off 67turning on 67

Mmacro viruses 191main window

messages 92status colors 187status messages 187

malware 189Manage Logins

about 293Manage Notes

about 308

Manual Repairreviewing remaining risks

in 182manual scan options 451Media Center Extender

Silent Mode 165Memory graph

about 70obtaining historical data 72

messages 92, 187Norton 360 187

Monthly Reportactivities 90

multipartite viruses 191

NNetwork

changing trust level 351discovering devices 344editing details 351forming 344joining 344managing 337

network locations 463Network Proxy Settings

about 47configuring 49

Network Security Mapabout 337adding devices 346modifying communication

port 360purging 357removing devices 357turning off 346turning off Network Security

Overview 343turning on Network Security

Overview 343viewing device details 359viewing devices 338

Index530

Page 531: Help

Network Security Map (continued)wireless network

viewing status 358Network Security Overview

turning off 343turning on 343

new versionchecking 512

newsletter 519Norton 360

about 7about securing 505Allowed and Blocked lists 243background jobs 76categories 91details 55EULA 510icons 52main window 8, 187new version 512password 506–507protecting 507registering 28securing 506shortcut menu 53status 50uninstalling 522upgrading 510version number 509

Norton 360 scanabout 133command line scanning 174Computer Scan 133Idle Time Scan 133Insight Network 142Insight Network scan 133Reputation Scan 133

Norton 360 settings 222resetting password 507

Norton Account 423about 23

Norton Account (continued)accessing 29changing password 30creating 28

Norton Account password 30Norton AntiSpam 242

about 242Address Book Exclusions 248configure 471Feedback 253settings 471SSL 242Web Query 254

Norton Backup and Restore 373Norton Backup Drive

about 413deleting files 415restoring files from a Backup

Set 415Norton Bootable Recovery Tool

about 33using 36

Norton Bootable Recovery ToolWizard

downloading 35Norton Community Watch

about 31joining 31turning off or turning on 32

Norton Firewall Diagnosisabout 223

Norton Insightabout 78Files of Interest 82refreshing trust level 82trusted files 78viewing processes 82

Norton LiveUpdateabout 37

Norton Product Tamper Protectionabout 503

531Index

Page 532: Help

Norton Product TamperProtection (continued)

turning off 504turning on 504

Norton Safe Searchsearching Web 266

Norton Safe Webabout 262turning off 266turning on 266

Norton Tasksabout 76

Norton toolbarabout 324accessing 327settings 283

Notesdeleting 308saving 308updating 308

notification area icon 92notifications

Auto-Protect 178Intrusion Prevention 226

OOffice documents

embedded objects 159scanning office documents 159turn on or turn off 160virus macros 159

One Click Supportsupport assistants 513using 513

online backupsactivation 423considerations 420purchasing more storage 424

Online transactionsidentity theft 268

Optimizationabout 73and performance 365boot volume 74running 364

optimizing 363and fragmentation 364

OptionsClient Integration 245

Ppassword

changing 322editing 296Norton Account 30saving 294updating 301

PC securitycategories 91

PC Tuneupcategories 91disk cleanup 367disk optimization 364optimization 364Startup Manager 369

PC tuneup 363, 366Performance

accessing 59alerts 63monitoring 71

performance alertsabout 63configure 64configure threshold 66excluding programs 69removing programs from

exclusion list 69turning off 64turning off low resource

profile 67turning on 64

Index532

Page 533: Help

performance alerts (continued)turning on low resource

profile 67performance improvement 364Personal data

backing up 312pop-up messages 187port scans 201problem solving 515problem solving backups 416problems

problems found during 182resolve any items 182solving 513

Product Key 21accessing 29

product passwordprotecting 506

product status 44program

patches 38Program Control

Automatic 205Program rules

removing 222program updates 38programs

removing programs 209programs, blocked 222protection

dates 44maintaining 92quick scan 138updates 37

protection featuresmonitoring 96

proxy serverconfiguring 49settings 47

Pulse Updatesabout 45

Pulse Updates (continued)using 46

QQuarantine

adding an item 125items, submitting for

analysis 127managing items 122opening 122removing items 126restoring items 125

Quarantined Items viewadding items 98

Quick Controlsturning on or turning off 437

Quick Scanrunning quick scan 138

Quiet Modeabout 161, 166disk burning 166options 170turning off 170turning on 170TV recording 166User-Specified Programs 171

RRegistry Cleanup 199, 368Remote Monitoring

setting up 344repair

actions 182infected files 182removable media 182system files 182

Reputation Scanabout 145results 151running Custom Scan 150

533Index

Page 534: Help

Reputation Scan (continued)running Full System Scan 149running Quick Scan 149

Respondingabout 94responding to emergencies 94

restore 373Autorun Restore 411–412choosing destinations 410Identity Safe data 311restoring backed-up files 404selecting Backup Set 407selecting files to restore 407

restoring itemsQuarantine 125

risksintrusions 202malware 189port scans 201spyware 189vulnerabilities 189

ruleschanging 211creating 211

running Full System ScanReputation Scan 149

running Quick ScanReputation Scan 149

SSafe Surfing

about 257Safe Web

turning off 266turning on 266

scan at the command promptcommand line scanning 174

Scan Completeappearing after a scan 182

Scan Facebook Wallabout 155

Scan Facebook Wall (continued)scanning 157

scanningproblems found during 182

Scanschoosing 198command line 174Computer Scan 137Custom Scan 137custom scan 141Full System Scan 137, 140Insight Network 142manual 43Norton Bootable Recovery

Tool 36Quick Scan 137quick scan 138

scheduling 194backup and restore 196backups 401tasks 484

searchingSecurity History 119

secure online storage 424Security History

about 96adding items to the

Quarantine 98full alert history 98importing or exporting 120manual scan results 98Quarantine 122Quick Search 119recent alert history 98searching 119security risks 98submission, items to

Symantec 98suspicious email 98viewing items 98viewing quarantined items 98

Index534

Page 535: Help

security risksadding to Quarantine 125attacks 202found by Auto-Protect 177–178port scans 201removing from the

Quarantine 126restoring from Quarantine 125

security status 51self-healing 513Service and Support 516Settings 431

Administrative Settings 488antivirus 438customizing 436firewall 222, 463, 465home network 475Identity Protection 480Quick Controls 437

settingsTask Scheduling 484

settings passwordresetting 507turning off 507

Settings Password Protectionabout 505configuring 506resetting 507turning off 507

shortcut menu 53signatures

including and excluding 227Silent Mode

about 161Full Screen Detection 165Media Center Extender 165turning off 163, 166turning on 163, 166turning on manually 163

Smart Definitionsabout 40

Smart Definitions (continued)turning on or turning off 41

Smart Firewallabout 201customizing 202

SONAR Protectionabout 158emerging threats 158heuristic technology 158SONAR Advanced Mode 158turning off 159turning on 159

spyware 189, 460found by Auto-Protect 178protection settings 438settings 445system scan 140

SSL (Secure Sockets Layer)Norton AntiSpam 242

startup files 177startup items

delaying and running 370disabling or enabling 369

Startup Managerabout 369delaying and running delayed

items 370disabling or enabling startup

items 369status 50–51submission, items to Symantec 127subscription

maintaining 520product updates 44

Supervisor user accountcreating firewall rules 205

SupportAutoFix Scan 513solving problems 513worldwide service 520

535Index

Page 536: Help

supportservice 516

Symantec Security Response 127viewing submitted files 98

Symantec Support Web siteabout 517using 518

Symantec Web siteblogs and forums 515

System Insightabout 57Events graph 57monitoring activities 60Performance graph 57

system status graphactivity details 62

TTask Scheduling

settings 484Tasks

choosing 198tasks

automatic 193Technical Support 516technical support

about 517using 518

threatsnewly discovered 44protection from 201Trojan horses 190viruses 190worms 190

trackware protection settings 438Trojan horses 190troubleshooting

technical support 516Trust Control

Intrusion Prevention and 225

trust levelchanging 351device 351network 351

Uupdates 37

automatically 42manual 43obtaining 46Pulse Updates 45summary 38

upgradingnew version 510

User-Specified Programsabout 171adding programs 172Quiet Mode 171removing programs 173

Vversion number

checking 509virus and spyware checks

scheduling 194virus and spyware Scan

running 198virus and spyware settings 445virus definitions 44virus protection

system scan 140viruses 190

boot 191file infectors 191macro 191multipartite 191protection settings 438types 191

vulnerabilities 189

Index536

Page 537: Help

Vulnerability Protectionabout 128, 130viewing programs 129

WWeb pages

launching 299protection 258reporting 260

Web Queryabout 254turning off 255turning on 255

Web sitescache files 366

Windows temporary files 199wireless network

viewing status 358worms 190

537Index

Page 538: Help

foo

Norton from Symantec products protect consumers from traditional threats with antivirus, phishing protection, and spywareprotection. They also protect against bots, drive-by downloads, and identity theft, and are light on system resources. In addition,Symantec provides services such as online backup and PC Tuneup, and is a trusted source for family online safety. For moreinformation, please click one of the following links:

Antivirus | Phishing Protection | Spyware Protection | Online Backup

Copyright © 2010 Symantec Corporation. All rights reserved. Symantec, Norton, and the Norton Logo are trademarks or registeredtrademarks of Symantec Corporation and its affiliates in the U.S. and other countries. Other names may be trademarks of theirrespective owners.


Recommended