The software described in this book is furnished under a license agreement and may be
used only in accordance with the terms of the agreement.
Documentation version 6.0
PN: 10025076
Copyright Notice
Copyright • 2002 Symantec Corporation. All Rights Reserved.
Any technical documentation that is made available by Symantec Corporation is the
copyrighted work of Symantec Corporation and is owned by Symantec Corporation.
NO WARRANTY. The technical documentation is being delivered to you AS-IS and
Symantec Corporation makes no warranty as to its accuracy or use. Any use of the
technical documentation or the information contained therein is at the risk of the user.
Documentation may include technical or other inaccuracies or typographical errors.
Symantec reserves the right to make changes without prior notice.
No part of this publication may be copied without the express written permission of
Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014.
Standard Template Library
This product utilizes the Standard Template Library, a C++ library of container classes,
algorithms, and iterators.
Copyright • 1996-1999. Silicon Graphics Computer Systems, Inc.
Permission to use, copy, modify, distribute and sell this software and its documentation for
any purpose is hereby granted without fee, provided that the above copyright notice
appears in all copies and that both that copyright notice and this permission notice appear
in supporting documentation. Silicon Graphics makes no representations about the
suitability of this software for any purpose. It is provided “as is” without express or
implied warranty.
Copyright • 1994. Hewlett-Packard Company
Permission to use, copy, modify, distribute and sell this software and its documentation for
any purpose is hereby granted without fee, provided that the above copyright notice
appears in all copies and that both that copyright notice and this permission notice appear
in supporting documentation. Hewlett-Packard Company makes no representations about
the suitability of this software for any purpose. It is provided “as is” without express or
implied warranty.
Trademarks
Symantec, the Symantec logo, Norton Personal Firewall, and LiveUpdate are U.S.
registered trademarks of Symantec Corporation.
Microsoft, MS-DOS, MSN, Windows and the Windows logo are registered trademarks of
Microsoft Corporation. AOL and CompuServe are registered trademarks of America
Online, Inc. Pentium is a registered trademark of Intel Corporation.
Other product names mentioned in this manual may be trademarks or registered
trademarks of their respective companies and are hereby acknowledged.
Printed in the United States of America.
10987654321
SYMANTEC LICENSE AND WARRANTY
IMPORTANT: PLEASE READ THE TERMS AND
CONDITIONS OF THIS LICENSE AGREEMENT
CAREFULLY BEFORE USING THE SOFTWARE.
SYMANTEC CORPORATION AND/OR ITS SUBSIDIARIES
(“SYMANTEC”) IS WILLING TO LICENSE THE SOFTWARE
TO YOU AS THE INDIVIDUAL, THE COMPANY, OR THE
LEGAL ENTITY THAT WILL BE UTILIZING THE
SOFTWARE (REFERENCED BELOW AS “YOU” OR
“YOUR”) ONLY ON THE CONDITION THAT YOU ACCEPT
ALL OF THE TERMS OF THIS LICENSE AGREEMENT. THIS
IS A LEGAL AND ENFORCEABLE CONTRACT BETWEEN
YOU AND SYMANTEC. BY OPENING THIS PACKAGE,
BREAKING THE SEAL, CLICKING ON THE “AGREE” OR
“YES” BUTTON OR OTHERWISE INDICATING ASSENT
ELECTRONICALLY, OR LOADING THE SOFTWARE, YOU
AGREE TO THE TERMS AND CONDITIONS OF THIS
AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS
AND CONDITIONS, CLICK ON THE “I DO NOT AGREE” OR
“NO” BUTTON, OR OTHERWISE INDICATE REFUSAL,
MAKE NO FURTHER USE OF THE SOFTWARE, AND
RETURN THE FULL PRODUCT WITH PROOF OF
PURCHASE TO THE DEALER FROM WHOM IT WAS
ACQUIRED WITHIN SIXTY (60) DAYS OF PURCHASE,
AND YOUR MONEY WILL BE REFUNDED.
1. LICENSE:
The software which accompanies this license (collectively
the “Software”) is the property of Symantec or its licensors
and is protected by copyright law. While Symantec
continues to own the Software, you will have certain rights
to use the Software after your acceptance of this license.
This license governs any releases, revisions, or
enhancements to the Software that Symantec may furnish
to you. Except as may be modified by a Symantec license
certificate, license coupon, or license key (each a “License
Module”) which accompanies, precedes, or follows this
license, your rights and obligations with respect to the use
of this Software are as follows:
YOU MAY:
A. use one copy of the Software on a single computer. If a
License Module accompanies, precedes, or follows this
license, you may make that number of copies of the
Software licensed to you by Symantec as provided in your
License Module. Your License Module shall constitute
proof of your right to make such copies.
B. make one copy of the Software for archival purposes, or
copy the Software onto the hard disk of your computer and
retain the original for archival purposes;
C. use the Software on a network, provided that you have a
licensed copy of the Software for each computer that can
access the Software over that network; and
D. after written notice to Symantec, transfer the Software
on a permanent basis to another person or entity, provided
that you retain no copies of the Software and the transferee
agrees to the terms of this license.
YOU MAY NOT:
A. copy the printed documentation which accompanies the
Software;
B. sublicense, rent or lease any portion of the Software;
reverse engineer, decompile, disassemble, modify,
translate, make any attempt to discover the source code of
the Software, or create derivative works from the Software;
C. use a previous version or copy of the Software after you
have received a disk replacement set or an upgraded
version. Upon upgrading the Software, all copies of the
prior version must be destroyed;
D. use a later version of the Software than is provided
herewith unless you have purchased upgrade insurance or
have otherwise separately acquired the right to use such
later version;
E. use, if you received the software distributed on media
containing multiple Symantec products, any Symantec
software on the media for which you have not received a
permission in a License Module; or
F. use the Software in any manner not authorized by this
license.
2. CONTENT UPDATES:
Certain Symantec software products utilize content that is
updated from time to time (antivirus products utilize
updated virus definitions; content filtering products utilize
updated URL lists; firewall products utilize updated
firewall rules; vulnerability assessment products utilize
updated vulnerability data, etc.; collectively, these are
referred to as “Content Updates”). You may obtain Content
Updates for any period for which you have purchased a
subscription for Content Updates for the Software
(including any subscription included with your original
purchase of the Software), purchased upgrade insurance
for the Software, entered into a maintenance agreement
that includes Content Updates, or otherwise separately
acquired the right to obtain Content Updates. This license
does not otherwise permit you to obtain and use Content
Updates.
3. SIXTY DAY MONEY BACK GUARANTEE:
If you are the original licensee of this copy of the Software
and are dissatisfied with it for any reason, you may return
the complete product, together with your receipt, to
Symantec or an authorized dealer, postage prepaid, for a
full refund at any time during the sixty (60) day period
following the delivery to you of the Software.
4. LIMITED WARRANTY:
Symantec warrants that the media on which the Software
is distributed will be free from defects for a period of sixty
(60) days from the date of delivery of the Software to you.
Your sole remedy in the event of a breach of this warranty
will be that Symantec will, at its option, replace any
defective media returned to Symantec within the warranty
period or refund the money you paid for the Software.
Symantec does not warrant that the Software will meet
your requirements or that operation of the Software will be
uninterrupted or that the Software will be error-free.
THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF
ALL OTHER WARRANTIES, WHETHER EXPRESS OR
IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE AND NONINFRINGEMENT OF INTELLECTUAL
PROPERTY RIGHTS. THIS WARRANTY GIVES YOU
SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER
RIGHTS, WHICH VARY FROM STATE TO STATE AND
COUNTRY TO COUNTRY.
5. DISCLAIMER OF DAMAGES:
SOME STATES AND COUNTRIES, INCLUDING MEMBER
COUNTRIES OF THE EUROPEAN ECONOMIC AREA, DO
NOT ALLOW THE LIMITATION OR EXCLUSION OF
LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL
DAMAGES SO THE BELOW LIMITATION OR EXCLUSION
MAY NOT APPLY TO YOU.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE
LAW AND REGARDLESS OF WHETHER ANY REMEDY
SET FORTH HEREIN FAILS OF ITS ESSENTIAL PURPOSE,
IN NO EVENT WILL SYMANTEC OR ITS LICENSORS BE
LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL,
INDIRECT OR SIMILAR DAMAGES, INCLUDING ANY
LOST PROFITS OR LOST DATA ARISING OUT OF THE USE
OR INABILITY TO USE THE SOFTWARE EVEN IF
SYMANTEC HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES.
IN NO CASE SHALL SYMANTEC'S OR ITS LICENSORS’
LIABILITY EXCEED THE PURCHASE PRICE FOR THE
SOFTWARE. The disclaimers and limitations set forth
above will apply regardless of whether you accept the
Software.
6. U.S. GOVERNMENT RESTRICTED RIGHTS:
RESTRICTED RIGHTS LEGEND. All Symantec products
and documentation are commercial in nature. The software
and software documentation are “Commercial Items”, as
that term is defined in 48 C.F.R. section 2.101, consisting
of “Commercial Computer Software” and “Commercial
Computer Software Documentation”, as such terms are
defined in 48 C.F.R. section 252.227-7014(a)(5) and 48
C.F.R. section 252.227-7014(a)(1), and used in 48 C.F.R.
section 12.212 and 48 C.F.R. section 227.7202, as
applicable. Consistent with 48 C.F.R. section 12.212, 48
C.F.R. section 252.227-7015, 48 C.F.R. section 227.7202
through 227.7202-4, 48 C.F.R. section 52.227-14, and
other relevant sections of the Code of Federal Regulations,
as applicable, Symantec’s computer software and
computer software documentation are licensed to United
States Government end users with only those rights as
granted to all other end users, according to the terms and
conditions contained in this license agreement.
Manufacturer is Symantec Corporation, 20330 Stevens
Creek Blvd., Cupertino, CA 95014.
7. GENERAL:
If You are located in North America or Latin America, this
Agreement will be governed by the laws of the State of
California, United States of America. Otherwise, this
Agreement will be governed by the laws of England. This
Agreement and any related License Module is the entire
agreement between You and Symantec relating to the
Software and: (i) supersedes all prior or contemporaneous
oral or written communications, proposals and
representations with respect to its subject matter; and (ii)
prevails over any conflicting or additional terms of any
quote, order, acknowledgment or similar communications
between the parties. This Agreement may only be modified
by a License Module or by a written document which has
been signed by both You and Symantec. This Agreement
shall terminate upon Your breach of any term contained
herein and You shall cease use of and destroy all copies of
the Software. The disclaimers of warranties and damages
and limitations on liability shall survive termination.
Should You have any questions concerning this
Agreement, or if You desire to contact Symantec for any
reason, please write: (i) Symantec Customer Service, 555
International Way, Springfield, OR 97477, USA, or (ii)
Symantec Customer Service Center, PO BOX 5689, Dublin
15, Ireland.
This product utilizes the Standard Template Library, a C++
library of container classes, algorithms, and iterators.
Copyright • 1996-1999. Silicon Graphics Computer
Systems, Inc. Copyright • 1994. Hewlett-Packard
Company.
Contents
Chapter 1Responding to emergencies
If you think your computer is under attack ...................................... 11
Recover from an emergency ................................................................ 12
How ports identify programs on servers ......................................... 122
How computers are identified on the Internet ............................... 123
Contents9
Appendix C Understanding Internet risks
Risks from hackers ............................................................................... 125
The process of a hacker attack ................................................... 125
Risks from active content ................................................................... 128
Risks from inappropriate content and activities ............................ 129
Blocking site and newsgroup categories .................................129
Restricting access to programs .................................................. 129
Risks to your privacy ........................................................................... 129
Sending private information ...................................................... 129
Understanding cookies ................................................................ 130
Blocking cookies ........................................................................... 130
Tracking Internet use .................................................................. 131
Risks from Trojan horses and viruses .............................................. 131
The likelihood of being attacked .......................................................132
Contents10
Glossary
Service and support solutions
Index
CD Replacement Form
Responding to
emergencies
If you have an emergency, these procedures can help you find the solution
to your problem.
If you think your computer is under attack
If your computer is behaving unpredictably, and you have determined that
the behavior is not due to a virus or a corrupted file, you may be the victim
of an Internet attack.
If you suspect that someone is attacking your computer, immediately
disconnect your computer from the Internet. If you have not yet installed
Norton Personal Firewall, install it now.
See “Stop Internet
communication
with Block Traffic”
on page 44.
If you have installed Norton Personal Firewall, you can use its security
tools to block the attack, investigate the attacker, and prevent this type of
attack in the future.
To block and investigate an attack
1Open Norton Personal Firewall.
2Click Block Traffic.
This immediately stops all incoming and outgoing communication
with other computers.
3If you are using the Security Monitor, click Security Center.
4In the Security Center, click Statistics.
5Click Attacker Details.
Your browser opens the Visual Tracking Web page.
Responding to emergencies
12
Recover from an emergency
See “Identify the
source of
communications”
on page 43.
6Use Visual Tracking to identify the IP address of the computer that the
attacker used.
You can use this information to report the attack to the ISP that owns
the IP address.
See “Restrict a
blocked computer”
on page 88.
7To block all future connections from this IP address, add this computer
to your Restricted Zone.
If you suspect that the attacker has already compromised your computer,
install Norton Personal Firewall, then visit http://security.symantec.com
for tools to repair damage and eradicate any threats that the attacker may
have placed on your computer.
Recover from an emergency
Once you’ve dealt with the problem, you can install Norton Personal
Firewall and perform the following activities.
ActionDescription
Install Norton
Personal Firewall.
Update your
protection.
Norton Personal Firewall can keep your computer safe from
future attacks.
See “Installing Norton Personal Firewall” on page 19.
After installing, run LiveUpdate to ensure that you have the
most updated protection.
See “Keeping current with LiveUpdate” on page 53.
Configure your
firewall.
Periodically review
program logs and
statistics.
The default installation of Norton Personal Firewall should
provide sufficient protection for most users, but you can
customize protection by adjusting firewall settings.
See “Customize firewall protection” on page 72.
Norton Personal Firewall maintains extensive logs of all of
the actions that it takes to protect your computer. Check
these logs occasionally to identify potential problems.
See “Monitoring Norton Personal Firewall” on page 103.
Prevent future problems
Norton Personal Firewall can protect your computer against most Internet
attacks.
To prepare your computer for emergencies:
1Stay informed about security risks by visiting the Symantec Security
Response Web site (securityresponse.symantec.com).
1Keep your browser up-to-date. Software publishers release new
versions to fix vulnerabilities in their browsers.
1Use passwords intelligently. For important information, use complex
passwords that include uppercase and lowercase letters, numbers, and
symbols. Don’t use the same password in multiple places.
1Don’t run software if you don’t trust the publisher and the source from
which you received the software.
1Don’t open email attachments unless you are expecting an attachment
and you trust the sender.
1Be sensible about providing personal information. Many sites ask for
more information than they need.
1Review the privacy policies of the sites to which you are considering
sending information.
1Tell children never to reveal details about themselves to people they
meet via instant messenger programs.
1Back up files regularly and keep copies of the last few backups on
hand.
Responding to emergencies
Prevent future problems
13
Responding to emergencies
14
Prevent future problems
About Norton
Personal Firewall
Norton Personal Firewall protects computers from Internet attacks, guards
your privacy, and speeds Web surfing by eliminating ads.
What’s new in Norton Personal Firewall 2003
Norton Personal Firewall 2003 now includes:
1Security Monitor
Gives you fast access to the most-used Norton Personal Firewall tools
1Visual Tracking
Identifies the source of attacks and other Internet communication
1Password protection
Provides increased security for Norton Personal Firewall options
1Block Traffic
Lets you immediately stop other computers’ ability to communicate
with your computer
1Alert Assistant
Helps you understand alerts and potential security issues
1Log Viewer
Improved version helps you see all of the actions Norton Personal
Firewall takes to protect your computer
1Privacy Control
Enhanced version blocks private information in email and instant
messages
About Norton Personal Firewall
16
Norton Personal Firewall features
Norton Personal Firewall features
Norton Personal Firewall includes a number of security tools that help keep
your computer safe. You can get fast access to all Norton Personal Firewall
tools from the new Security Monitor.
Internet security can be a complicated topic to understand, so Norton
Personal Firewall now includes the Alert Assistant, which helps you
understand security issues, suggests how you can resolve problems, and
advises you on avoiding future security problems.
About Norton Personal Firewall
Norton Personal Firewall provides a barrier between your computer and
the Internet. A firewall prevents unauthorized users from accessing private
computers and networks connected to the Internet.
Internet
Norton Personal
Firewall blocks access
attempts from the
Internet
About Norton Personal Firewall
Norton Personal Firewall features
Attackers can’t see
your computer
behind the firewall
Norton Personal
Firewall allows
communications that
you initiate
17
Firewall
Home computer
Norton Personal Firewall includes features that prevent unauthorized
access to your computer when you are on the Internet, detect possible
Internet attacks, protect your personal information, and block Internet
advertisements to speed your Internet browsing.
About Norton Personal Firewall
18
Norton Personal Firewall features
Norton Personal Firewall features include:
Intrusion Detection Intrusion Detection helps keep your computer safe from
Privacy ControlPrivacy Control gives you several levels of control over the
Ad BlockingAd Blocking speeds up your Web surfing by eliminating
Internet attacks by scanning each piece of information that
enters and exits your computer. If it identifies a potential
attack, Intrusion Detection alerts you and automatically
blocks the connection that contained the attack.
See “Guarding against intrusion attempts” on page 69.
kind of information that users can send via the Web, email,
and instant messenger programs. You can also control how
Privacy Control reacts when Web sites attempt to set and use
cookies or learn about your browser.
See “Protecting your privacy” on page 89.
banner ads and other slow-loading or intrusive content.
Norton Personal Firewall now also blocks ads made with
Macromedia Flash and prevents sites from opening pop-up or
pop-under ad windows.
See “Blocking Internet advertisements” on page 95.
Installing Norton
Personal Firewall
Before installing Norton Personal Firewall, take a moment to review the
system requirements listed in this chapter.
System requirements
To use Norton Personal Firewall, your computer must have one of the
following Windows operating systems installed:
1Windows 98, 98SE
1Windows Me
1Windows 2000 Professional
1Windows XP Professional or Windows XP Home Edition
Windows 95 and NT, the server editions of Windows 2000/XP, and the
Windows XP 64-bit edition are not supported.
Installing Norton Personal Firewall
20
System requirements
Your computer must also meet the following minimum requirements.
Operating System Requirements
Windows 98/
98SE/Me
Windows 2000
Professional
Windows XP
Professional or
Home Edition
Supported email clients
Norton Personal Firewall can scan email messages for private information
in any POP3-compatible email client, including:
1Microsoft
1Microsoft Outlook 97/98/2000/XP
1Netscape
1Eudora
•
•
•
Light 3.0, Eudora Pro 4.0, Eudora 5.0
1 Intel Pentium processor (or compatible) at 150 MHz or
higher
1 48 MB of RAM (64 MB recommended)
1 25 MB of available hard disk space
1 Internet Explorer 5.01 or later (5.5 recommended)
1 CD-ROM or DVD-ROM drive
1 Intel Pentium processor (or compatible) at 150 MHz or
higher
1 48 MB of RAM (64 MB recommended)
1 25 MB of available hard disk space
1 Internet Explorer 5.01 or later (5.5 recommended)
1 CD-ROM or DVD-ROM drive
1 Intel Pentium II processor (or compatible) at 300 MHz or
higher
1 48 MB of RAM (64 MB recommended)
1 25 MB of available hard disk space
1 Internet Explorer 5.01 or later (5.5 recommended)
1 CD-ROM or DVD-ROM drive
Outlook• Express 4.0/5.X
Messenger 4.X, Netscape Mail 6.0
Email scanning does not support the following email clients:
1IMAP clients
1AOL clients
1POP3s that use SSL (Secure Sockets Layer)
1Web-based email such as Hotmail and Yahoo!
1Lotus Notes mail
Supported instant messenger clients
Norton Personal Firewall can scan for private information in the following
instant messengers:
1AOL Instant Messenger, version 4.3 or later
1MSN Instant Messenger, version 3.6 or later
1Windows Messenger, version 4.0 or later
Before installation
Before you install Norton Personal Firewall, prepare your computer.
Installing Norton Personal Firewall
Before installation
21
Prepare your computer
See “If you need to
uninstall Norton
Personal Firewall”
on page 34.
If you’re using Windows XP
If you have an older version of Norton Personal Firewall, the new version
prompts you to remove the older version. If you have a recent version of
Norton Personal Firewall, you can transfer your existing settings to the
new version of the program.
Quit all other Windows programs before installing Norton Personal
Firewall. Other active programs may interfere with the installation and
reduce your protection.
Windows XP includes a firewall that can interfere with Norton Personal
Firewall protection features. You must disable the Windows XP firewall
before installing Norton Personal Firewall.
Installing Norton Personal Firewall
22
Install Norton Personal Firewall
To disable the Windows XP firewall
1On the Windows XP taskbar, click Start > Control Panel > Network
Connections.
2If you have created more than one modem or network connection,
select the active connection.
3Click Network Tasks.
4Click Change settings of this connection.
5On the Advanced tab, in the Internet Connection Firewall section,
uncheck Protect my computer and network by limiting or
preventing access to this computer from the Internet.
6Click OK to close the settings window.
7Click OK to close the Network Tasks window.
Install Norton Personal Firewall
Install Norton Personal Firewall from the Norton Personal Firewall CD.
Install a copy of Norton Personal Firewall on each computer that you want
to protect.
See “If the opening
screen does not
appear” on
page 25.
To install Norton Personal Firewall
1Insert the Norton Personal Firewall CD into the CD-ROM drive.
2In the Norton Personal Firewall CD window, click Install Norton
Personal Firewall.
If your computer is not set to automatically run a CD, you must
manually open it.
The first installation window reminds you to close all other Windows
programs.
Installing Norton Personal Firewall
Install Norton Personal Firewall
3Click Next.
4Read the License Agreement, then click I accept the license
agreement.
If you decline, you cannot continue with the installation.
5Click Next.
23
6In the Run LiveUpdate after installation window, select whether you
want to run LiveUpdate after the installation is done.
Installing Norton Personal Firewall
24
Install Norton Personal Firewall
7Click Next.
8Click Browse to select a folder into which you want to install Norton
9Click Next.
See “Register your
software” on
page 25.
10 Click Next to begin installing Norton Personal Firewall.
Personal Firewall, if it is other than the default location.
After Norton Personal Firewall is installed, the Registration Wizard
appears.
11Read the readme text, then click Next.
12Click Finish to complete the installation.
If the opening screen does not appear
Sometimes a computer’s CD-ROM drive does not automatically run a CD.
To start the installation from the Norton Personal Firewall CD
1On your desktop, double-click My Computer.
2In the My Computer window, double-click the icon for your CD-ROM
drive.
3In the list of files, double-click Cdstart.exe.
Register your software
Use the Registration Wizard to register your software online. If you skip
online registration, you can register your software later using the Product
Registration option on the Help menu.
To register your software
1In the first Registration window, select the country from which you are
registering and the country in which you live (if different), then click
Next.
Installing Norton Personal Firewall
Register your software
25
Installing Norton Personal Firewall
26
Register your software
2If you would like information from Symantec about Norton Personal
3Type your name, then click Next.
4Type your address, then click Next.
Firewall, select the method by which you want to receive that
information, then click Next.
Installing Norton Personal Firewall
Register your software
5Do one of the following:
2Answer the survey questions to help Symantec improve its
products and services, then click Next.
2Skip the survey by clicking Next.
27
6Select whether you want to register Norton Personal Firewall over the
Internet or by mail.
If you want to register by mail, your computer must be connected to a
printer that the Registration Wizard can use to print the registration
form. If you want to register using the Internet, you must be connected
to the Internet.
7Click Next.
8To get a copy of your registration information for future reference, do
one of the following:
2Write down the serial number.
2Click Print.
9Click Next.
10 Select whether you want to use your existing profile the next time that
you register a Symantec product, or type the information as part of
registration.
11Click Finish.
Installing Norton Personal Firewall
28
After installation
After installation
After Norton Personal Firewall is installed, a prompt appears giving you
the option to restart your computer immediately. After restarting, the
Security Assistant appears to guide you through the configuration of
Norton Personal Firewall.
Restart your computer
After installation, a prompt appears telling you that you must restart your
computer for the updates to take effect.
To restart your computer
4In the Installer Information dialog box, click Yes.
Configuration of Norton Personal Firewall is not complete until you
restart your computer.
Use the Security Assistant
The Security Assistant helps you quickly configure your Norton Personal
Firewall protection. The Security Assistant is divided into four categories:
1Home Networking
1Program Control
1Privacy Control
1Password Protection
Set up Home Networking
See “Connect to a
network” on
page 61.
Use Home Networking to identify computers to which you want to grant
access to your computer and those to which you want to deny access. The
Home Network Wizard can automatically configure your network and add
computers to your Trusted Zone.
Installing Norton Personal Firewall
After installation
To set up Home Networking
1In the Security Assistant Roadmap, click Home Networking.
2In the Home Networking pane, click Set up Home Networking.
3In the Home Networking Wizard, click Next.
4Follow the on-screen instructions to configure your network.
29
Set up Program Control
See “Scan for
Internet-enabled
programs” on
page 77.
Norton Personal Firewall can scan your computer for Internet-enabled
programs and create access rules for them. When the scan is complete, you
can use the results to determine which programs should have access to the
Internet and, if desired, adjust their access rules.
Installing Norton Personal Firewall
30
After installation
To set up Program Control
1In the Security Assistant Roadmap, click Program Scan.
2In the Program Scan pane, click Automatically scan programs.
Loading...
+ 121 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.