HP 2003 User Manual

User’s Guide
Norton™ Personal Firewall User’s Guide
The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
Documentation version 6.0 PN: 10025076
Copyright Notice
Copyright • 2002 Symantec Corporation. All Rights Reserved. Any technical documentation that is made available by Symantec Corporation is the
copyrighted work of Symantec Corporation and is owned by Symantec Corporation. NO WARRANTY. The technical documentation is being delivered to you AS-IS and
Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice.
No part of this publication may be copied without the express written permission of Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014.
Standard Template Library
This product utilizes the Standard Template Library, a C++ library of container classes, algorithms, and iterators.
Copyright • 1996-1999. Silicon Graphics Computer Systems, Inc. Permission to use, copy, modify, distribute and sell this software and its documentation for
any purpose is hereby granted without fee, provided that the above copyright notice appears in all copies and that both that copyright notice and this permission notice appear in supporting documentation. Silicon Graphics makes no representations about the suitability of this software for any purpose. It is provided “as is” without express or implied warranty.
Copyright • 1994. Hewlett-Packard Company Permission to use, copy, modify, distribute and sell this software and its documentation for
any purpose is hereby granted without fee, provided that the above copyright notice appears in all copies and that both that copyright notice and this permission notice appear in supporting documentation. Hewlett-Packard Company makes no representations about the suitability of this software for any purpose. It is provided “as is” without express or implied warranty.
Trademarks
Symantec, the Symantec logo, Norton Personal Firewall, and LiveUpdate are U.S. registered trademarks of Symantec Corporation.
Microsoft, MS-DOS, MSN, Windows and the Windows logo are registered trademarks of Microsoft Corporation. AOL and CompuServe are registered trademarks of America Online, Inc. Pentium is a registered trademark of Intel Corporation.
Other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged.
Printed in the United States of America. 10987654321
SYMANTEC LICENSE AND WARRANTY
IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE USING THE SOFTWARE. SYMANTEC CORPORATION AND/OR ITS SUBSIDIARIES (“SYMANTEC”) IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THE INDIVIDUAL, THE COMPANY, OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE (REFERENCED BELOW AS “YOU” OR “YOUR”) ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT. THIS IS A LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU AND SYMANTEC. BY OPENING THIS PACKAGE, BREAKING THE SEAL, CLICKING ON THE “AGREE” OR “YES” BUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY, OR LOADING THE SOFTWARE, YOU AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, CLICK ON THE “I DO NOT AGREE” OR “NO” BUTTON, OR OTHERWISE INDICATE REFUSAL, MAKE NO FURTHER USE OF THE SOFTWARE, AND RETURN THE FULL PRODUCT WITH PROOF OF PURCHASE TO THE DEALER FROM WHOM IT WAS ACQUIRED WITHIN SIXTY (60) DAYS OF PURCHASE, AND YOUR MONEY WILL BE REFUNDED.
1. LICENSE:
The software which accompanies this license (collectively the “Software”) is the property of Symantec or its licensors and is protected by copyright law. While Symantec continues to own the Software, you will have certain rights to use the Software after your acceptance of this license. This license governs any releases, revisions, or enhancements to the Software that Symantec may furnish to you. Except as may be modified by a Symantec license certificate, license coupon, or license key (each a “License Module”) which accompanies, precedes, or follows this license, your rights and obligations with respect to the use of this Software are as follows:
YOU MAY:
A. use one copy of the Software on a single computer. If a License Module accompanies, precedes, or follows this license, you may make that number of copies of the Software licensed to you by Symantec as provided in your License Module. Your License Module shall constitute proof of your right to make such copies.
B. make one copy of the Software for archival purposes, or copy the Software onto the hard disk of your computer and retain the original for archival purposes; C. use the Software on a network, provided that you have a licensed copy of the Software for each computer that can access the Software over that network; and D. after written notice to Symantec, transfer the Software on a permanent basis to another person or entity, provided that you retain no copies of the Software and the transferee agrees to the terms of this license.
YOU MAY NOT:
A. copy the printed documentation which accompanies the Software;
B. sublicense, rent or lease any portion of the Software; reverse engineer, decompile, disassemble, modify, translate, make any attempt to discover the source code of the Software, or create derivative works from the Software;
C. use a previous version or copy of the Software after you have received a disk replacement set or an upgraded version. Upon upgrading the Software, all copies of the prior version must be destroyed;
D. use a later version of the Software than is provided herewith unless you have purchased upgrade insurance or have otherwise separately acquired the right to use such later version;
E. use, if you received the software distributed on media containing multiple Symantec products, any Symantec software on the media for which you have not received a permission in a License Module; or
F. use the Software in any manner not authorized by this license.
2. CONTENT UPDATES:
Certain Symantec software products utilize content that is updated from time to time (antivirus products utilize updated virus definitions; content filtering products utilize updated URL lists; firewall products utilize updated firewall rules; vulnerability assessment products utilize updated vulnerability data, etc.; collectively, these are referred to as “Content Updates”). You may obtain Content Updates for any period for which you have purchased a subscription for Content Updates for the Software (including any subscription included with your original purchase of the Software), purchased upgrade insurance for the Software, entered into a maintenance agreement that includes Content Updates, or otherwise separately acquired the right to obtain Content Updates. This license does not otherwise permit you to obtain and use Content Updates.
3. SIXTY DAY MONEY BACK GUARANTEE:
If you are the original licensee of this copy of the Software and are dissatisfied with it for any reason, you may return the complete product, together with your receipt, to Symantec or an authorized dealer, postage prepaid, for a full refund at any time during the sixty (60) day period following the delivery to you of the Software.
4. LIMITED WARRANTY:
Symantec warrants that the media on which the Software is distributed will be free from defects for a period of sixty (60) days from the date of delivery of the Software to you. Your sole remedy in the event of a breach of this warranty will be that Symantec will, at its option, replace any defective media returned to Symantec within the warranty period or refund the money you paid for the Software. Symantec does not warrant that the Software will meet your requirements or that operation of the Software will be uninterrupted or that the Software will be error-free. THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF INTELLECTUAL
PROPERTY RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY FROM STATE TO STATE AND COUNTRY TO COUNTRY.
5. DISCLAIMER OF DAMAGES:
SOME STATES AND COUNTRIES, INCLUDING MEMBER COUNTRIES OF THE EUROPEAN ECONOMIC AREA, DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES SO THE BELOW LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH HEREIN FAILS OF ITS ESSENTIAL PURPOSE, IN NO EVENT WILL SYMANTEC OR ITS LICENSORS BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INDIRECT OR SIMILAR DAMAGES, INCLUDING ANY LOST PROFITS OR LOST DATA ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE EVEN IF SYMANTEC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
IN NO CASE SHALL SYMANTEC'S OR ITS LICENSORS’ LIABILITY EXCEED THE PURCHASE PRICE FOR THE SOFTWARE. The disclaimers and limitations set forth above will apply regardless of whether you accept the Software.
6. U.S. GOVERNMENT RESTRICTED RIGHTS:
RESTRICTED RIGHTS LEGEND. All Symantec products and documentation are commercial in nature. The software and software documentation are “Commercial Items”, as that term is defined in 48 C.F.R. section 2.101, consisting of “Commercial Computer Software” and “Commercial Computer Software Documentation”, as such terms are defined in 48 C.F.R. section 252.227-7014(a)(5) and 48 C.F.R. section 252.227-7014(a)(1), and used in 48 C.F.R. section 12.212 and 48 C.F.R. section 227.7202, as applicable. Consistent with 48 C.F.R. section 12.212, 48 C.F.R. section 252.227-7015, 48 C.F.R. section 227.7202 through 227.7202-4, 48 C.F.R. section 52.227-14, and other relevant sections of the Code of Federal Regulations, as applicable, Symantec’s computer software and computer software documentation are licensed to United States Government end users with only those rights as granted to all other end users, according to the terms and conditions contained in this license agreement. Manufacturer is Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014.
7. GENERAL:
If You are located in North America or Latin America, this Agreement will be governed by the laws of the State of California, United States of America. Otherwise, this Agreement will be governed by the laws of England. This Agreement and any related License Module is the entire agreement between You and Symantec relating to the Software and: (i) supersedes all prior or contemporaneous oral or written communications, proposals and representations with respect to its subject matter; and (ii) prevails over any conflicting or additional terms of any
quote, order, acknowledgment or similar communications between the parties. This Agreement may only be modified by a License Module or by a written document which has been signed by both You and Symantec. This Agreement shall terminate upon Your breach of any term contained herein and You shall cease use of and destroy all copies of the Software. The disclaimers of warranties and damages and limitations on liability shall survive termination. Should You have any questions concerning this Agreement, or if You desire to contact Symantec for any reason, please write: (i) Symantec Customer Service, 555 International Way, Springfield, OR 97477, USA, or (ii) Symantec Customer Service Center, PO BOX 5689, Dublin 15, Ireland.
This product utilizes the Standard Template Library, a C++ library of container classes, algorithms, and iterators. Copyright • 1996-1999. Silicon Graphics Computer Systems, Inc. Copyright • 1994. Hewlett-Packard Company.

Contents

Chapter 1 Responding to emergencies
If you think your computer is under attack ...................................... 11
Recover from an emergency ................................................................ 12
Prevent future problems ....................................................................... 13
Chapter 2 About Norton Personal Firewall
What’s new in Norton Personal Firewall 2003 ................................ 15
Norton Personal Firewall features ...................................................... 16
About Norton Personal Firewall .................................................. 17
Chapter 3 Installing Norton Personal Firewall
System requirements ............................................................................. 19
Supported email clients ................................................................. 20
Supported instant messenger clients ......................................... 21
Before installation .................................................................................. 21
Prepare your computer .................................................................. 21
Install Norton Personal Firewall ......................................................... 22
If the opening screen does not appear ....................................... 25
Register your software .......................................................................... 25
After installation ..................................................................................... 28
Restart your computer ................................................................... 28
Use the Security Assistant ............................................................ 28
If you have Norton SystemWorks installed ...................................... 33
If you need to uninstall Norton Personal Firewall ........................... 34
Contents6
Chapter 4 Norton Personal Firewall basics
Access Norton Personal Firewall ........................................................ 35
Access Norton Personal Firewall from the system tray ......... 36
Work with Norton Personal Firewall .................................................. 37
Access Norton Personal Firewall protection features ............. 37
Use the Security Monitor .............................................................. 38
Respond to Norton Personal Firewall alerts ............................. 39
Use Alert Tracker ............................................................................ 41
Check your computer’s vulnerability to attack ........................ 42
Identify the source of communications ...................................... 43
Stop Internet communication with Block Traffic ..................... 44
Customize Norton Personal Firewall .................................................. 45
About General options ................................................................... 45
About LiveUpdate options ............................................................. 45
About Firewall options ................................................................... 45
About Web Content options .......................................................... 46
About Email options ....................................................................... 46
Password-protect options ...................................................................... 46
Reset options password ................................................................. 47
Temporarily disable Norton Personal Firewall ................................ 47
For more information ............................................................................. 48
Look up glossary terms ................................................................. 48
Use online Help ............................................................................... 48
Readme file and Release Notes .................................................... 49
Use the User’s Guide PDF ............................................................. 50
About Norton Personal Firewall on the Web ............................ 51
Explore online tutorials ................................................................. 51
Subscribe to the Symantec Security Response newsletter .... 52
Chapter 5 Keeping current with LiveUpdate
About program updates ......................................................................... 53
About protection updates ...................................................................... 54
About your subscription ........................................................................ 54
When you should update ...................................................................... 55
Request an update alert ................................................................. 55
If you run LiveUpdate on an internal network ................................. 55
If you can’t use LiveUpdate .................................................................. 56
Obtain updates using LiveUpdate ....................................................... 56
Set LiveUpdate to Interactive or Express mode ............................... 56
Turn off Express mode ................................................................... 57
Run LiveUpdate automatically ............................................................. 58
Chapter 6 Controlling access to protected computers
Control how people use your computer ............................................. 61
Connect to a network ..................................................................... 61
Enable file and printer sharing .................................................... 62
Organize computers into network zones ................................... 62
Identify computers to Norton Personal Firewall ...................... 64
Control how users access the Internet ............................................... 67
If you access the Internet via a cable or DSL router ............... 67
If multiple computers share a single Internet connection ..... 67
Control how outside users access your network ............................. 67
If you run Symantec pcAnywhere ............................................... 67
If you run a Virtual Private Network .......................................... 68
Chapter 7 Guarding against intrusion attempts
How Norton Personal Firewall protects against network
attacks ............................................................................................... 69
Norton Personal Firewall monitors communications ............. 70
Intrusion Detection analyzes communications ........................ 70
Visual Tracking locates attackers ............................................... 71
Customize firewall protection .............................................................. 72
Change the Security Level slider ................................................ 72
Change individual security settings ........................................... 73
Reset security settings to defaults .............................................. 75
Customize firewall rules ....................................................................... 75
How firewall rules are processed ................................................ 75
Create new firewall rules .............................................................. 76
Manually add a firewall rule ........................................................ 80
Change an existing firewall rule ................................................. 83
Reset firewall rules to the default settings ............................... 85
Customize Intrusion Detection ............................................................ 85
Exclude specific network activity from being monitored ...... 85
Enable or disable AutoBlock ......................................................... 87
Unblock computers ........................................................................ 87
Exclude computers from AutoBlock ........................................... 88
Restrict a blocked computer ......................................................... 88
Contents 7
Contents8
Chapter 8 Protecting your privacy
Identify private information to protect .............................................. 89
Privacy Control and SSL ................................................................ 90
Add private information ................................................................ 90
Modify or remove private information ....................................... 91
Customize Privacy Control ................................................................... 91
Set the Privacy Level ...................................................................... 91
Adjust individual Privacy Control settings ............................... 92
Chapter 9 Blocking Internet advertisements
How Ad Blocking works ........................................................................ 95
Blocking by dimensions ................................................................ 95
Blocking by location ....................................................................... 96
Enable or disable Ad Blocking ............................................................. 96
Enable or disable Popup Window Blocking ...................................... 97
Enable or disable Flash blocking ......................................................... 98
Use the Ad Trashcan .............................................................................. 98
Use text strings to identify ads to block or permit .......................... 99
How to identify Ad Blocking strings ......................................... 100
Add an Ad Blocking string .......................................................... 100
Modify or remove an Ad Blocking string ................................. 101
Chapter 10 Monitoring Norton Personal Firewall
View the Status & Settings window .................................................. 104
View the Statistics window ................................................................104
Reset information in the Statistics window ............................105
Review detailed statistics ...................................................................105
Reset detailed statistics counters .............................................. 106
Set the statistics displayed in the Detailed Statistics
window .................................................................................... 106
View Norton Personal Firewall Logs ................................................ 107
View the logs ................................................................................. 108
Refresh the logs ............................................................................. 109
Clear the logs .................................................................................109
Change the size of the logs .........................................................110
Appendix A Troubleshooting Norton Personal Firewall
Troubleshoot Norton Personal Firewall problems ......................... 112
What is wrong with this Web site? ........................................... 112
Why can’t I post information online? ....................................... 113
Why did an email message I sent never arrive? .................... 113
Why doesn’t Norton Personal Firewall notify me before
letting programs access the Internet? .............................. 114
Why can’t I print to a shared computer or connect to a
computer on my local network? ......................................... 114
Why can’t I connect to the Internet via my cable
modem? ................................................................................... 114
How can a Web site get my browser information? ................ 115
Appendix B About the Internet
How information is transmitted over the Internet ........................118
About UDP ...................................................................................... 120
About ICMP .................................................................................... 120
About IGMP .................................................................................... 120
How Web information is located on the Internet ........................... 120
Requesting a page ........................................................................ 121
Understanding URLs .................................................................... 121
How ports identify programs on servers ......................................... 122
How computers are identified on the Internet ............................... 123
Contents 9
Appendix C Understanding Internet risks
Risks from hackers ............................................................................... 125
The process of a hacker attack ................................................... 125
Risks from active content ................................................................... 128
Risks from inappropriate content and activities ............................ 129
Blocking site and newsgroup categories .................................129
Restricting access to programs .................................................. 129
Risks to your privacy ........................................................................... 129
Sending private information ...................................................... 129
Understanding cookies ................................................................ 130
Blocking cookies ........................................................................... 130
Tracking Internet use .................................................................. 131
Risks from Trojan horses and viruses .............................................. 131
The likelihood of being attacked .......................................................132
Contents10
Glossary
Service and support solutions
Index
CD Replacement Form

Responding to emergencies

If you have an emergency, these procedures can help you find the solution to your problem.

If you think your computer is under attack

If your computer is behaving unpredictably, and you have determined that the behavior is not due to a virus or a corrupted file, you may be the victim of an Internet attack.
If you suspect that someone is attacking your computer, immediately disconnect your computer from the Internet. If you have not yet installed Norton Personal Firewall, install it now.
See “Stop Internet
communication with Block Traffic”
on page 44.
If you have installed Norton Personal Firewall, you can use its security tools to block the attack, investigate the attacker, and prevent this type of attack in the future.
To block and investigate an attack
1 Open Norton Personal Firewall.
2 Click Block Traffic.
This immediately stops all incoming and outgoing communication
with other computers.
3 If you are using the Security Monitor, click Security Center.
4 In the Security Center, click Statistics.
5 Click Attacker Details.
Your browser opens the Visual Tracking Web page.
Responding to emergencies
12

Recover from an emergency

See “Identify the
source of communications”
on page 43.
6 Use Visual Tracking to identify the IP address of the computer that the
attacker used. You can use this information to report the attack to the ISP that owns the IP address.
See “Restrict a
blocked computer”
on page 88.
7 To block all future connections from this IP address, add this computer
to your Restricted Zone.
If you suspect that the attacker has already compromised your computer, install Norton Personal Firewall, then visit http://security.symantec.com for tools to repair damage and eradicate any threats that the attacker may have placed on your computer.
Recover from an emergency
Once you’ve dealt with the problem, you can install Norton Personal Firewall and perform the following activities.
Action Description
Install Norton Personal Firewall.
Update your protection.
Norton Personal Firewall can keep your computer safe from future attacks.
See “Installing Norton Personal Firewall” on page 19.
After installing, run LiveUpdate to ensure that you have the most updated protection.
See “Keeping current with LiveUpdate” on page 53.
Configure your firewall.
Periodically review program logs and statistics.
The default installation of Norton Personal Firewall should provide sufficient protection for most users, but you can customize protection by adjusting firewall settings.
See “Customize firewall protection” on page 72.
Norton Personal Firewall maintains extensive logs of all of the actions that it takes to protect your computer. Check these logs occasionally to identify potential problems.
See “Monitoring Norton Personal Firewall” on page 103.

Prevent future problems

Norton Personal Firewall can protect your computer against most Internet attacks.
To prepare your computer for emergencies:
1 Stay informed about security risks by visiting the Symantec Security
Response Web site (securityresponse.symantec.com).
1 Keep your browser up-to-date. Software publishers release new
versions to fix vulnerabilities in their browsers.
1 Use passwords intelligently. For important information, use complex
passwords that include uppercase and lowercase letters, numbers, and
symbols. Don’t use the same password in multiple places.
1 Don’t run software if you don’t trust the publisher and the source from
which you received the software.
1 Don’t open email attachments unless you are expecting an attachment
and you trust the sender.
1 Be sensible about providing personal information. Many sites ask for
more information than they need.
1 Review the privacy policies of the sites to which you are considering
sending information.
1 Tell children never to reveal details about themselves to people they
meet via instant messenger programs.
1 Back up files regularly and keep copies of the last few backups on
hand.
Responding to emergencies
Prevent future problems
13
Responding to emergencies
14
Prevent future problems

About Norton Personal Firewall

Norton Personal Firewall protects computers from Internet attacks, guards your privacy, and speeds Web surfing by eliminating ads.

What’s new in Norton Personal Firewall 2003

Norton Personal Firewall 2003 now includes:
1 Security Monitor
Gives you fast access to the most-used Norton Personal Firewall tools
1 Visual Tracking
Identifies the source of attacks and other Internet communication
1 Password protection
Provides increased security for Norton Personal Firewall options
1 Block Traffic
Lets you immediately stop other computers’ ability to communicate
with your computer
1 Alert Assistant
Helps you understand alerts and potential security issues
1 Log Viewer
Improved version helps you see all of the actions Norton Personal
Firewall takes to protect your computer
1 Privacy Control
Enhanced version blocks private information in email and instant
messages
About Norton Personal Firewall
16

Norton Personal Firewall features

Norton Personal Firewall features
Norton Personal Firewall includes a number of security tools that help keep your computer safe. You can get fast access to all Norton Personal Firewall tools from the new Security Monitor.
Internet security can be a complicated topic to understand, so Norton Personal Firewall now includes the Alert Assistant, which helps you understand security issues, suggests how you can resolve problems, and advises you on avoiding future security problems.

About Norton Personal Firewall

Norton Personal Firewall provides a barrier between your computer and the Internet. A firewall prevents unauthorized users from accessing private computers and networks connected to the Internet.
Internet
Norton Personal Firewall blocks access attempts from the Internet
About Norton Personal Firewall
Norton Personal Firewall features
Attackers can’t see your computer behind the firewall
Norton Personal Firewall allows communications that you initiate
17
Firewall
Home computer
Norton Personal Firewall includes features that prevent unauthorized access to your computer when you are on the Internet, detect possible Internet attacks, protect your personal information, and block Internet advertisements to speed your Internet browsing.
About Norton Personal Firewall
18
Norton Personal Firewall features
Norton Personal Firewall features include:
Intrusion Detection Intrusion Detection helps keep your computer safe from
Privacy Control Privacy Control gives you several levels of control over the
Ad Blocking Ad Blocking speeds up your Web surfing by eliminating
Internet attacks by scanning each piece of information that enters and exits your computer. If it identifies a potential attack, Intrusion Detection alerts you and automatically blocks the connection that contained the attack.
See “Guarding against intrusion attempts” on page 69.
kind of information that users can send via the Web, email, and instant messenger programs. You can also control how Privacy Control reacts when Web sites attempt to set and use cookies or learn about your browser.
See “Protecting your privacy” on page 89.
banner ads and other slow-loading or intrusive content. Norton Personal Firewall now also blocks ads made with Macromedia Flash and prevents sites from opening pop-up or pop-under ad windows.
See “Blocking Internet advertisements” on page 95.

Installing Norton Personal Firewall

Before installing Norton Personal Firewall, take a moment to review the system requirements listed in this chapter.

System requirements

To use Norton Personal Firewall, your computer must have one of the following Windows operating systems installed:
1 Windows 98, 98SE
1 Windows Me
1 Windows 2000 Professional
1 Windows XP Professional or Windows XP Home Edition
Windows 95 and NT, the server editions of Windows 2000/XP, and the Windows XP 64-bit edition are not supported.
Installing Norton Personal Firewall
20
System requirements
Your computer must also meet the following minimum requirements.
Operating System Requirements
Windows 98/ 98SE/Me
Windows 2000 Professional
Windows XP Professional or Home Edition

Supported email clients

Norton Personal Firewall can scan email messages for private information in any POP3-compatible email client, including:
1 Microsoft
1 Microsoft Outlook 97/98/2000/XP
1 Netscape
1 Eudora
Light 3.0, Eudora Pro 4.0, Eudora 5.0
1 Intel Pentium processor (or compatible) at 150 MHz or
higher
1 48 MB of RAM (64 MB recommended)
1 25 MB of available hard disk space
1 Internet Explorer 5.01 or later (5.5 recommended)
1 CD-ROM or DVD-ROM drive
1 Intel Pentium processor (or compatible) at 150 MHz or
higher
1 48 MB of RAM (64 MB recommended)
1 25 MB of available hard disk space
1 Internet Explorer 5.01 or later (5.5 recommended)
1 CD-ROM or DVD-ROM drive
1 Intel Pentium II processor (or compatible) at 300 MHz or
higher
1 48 MB of RAM (64 MB recommended)
1 25 MB of available hard disk space
1 Internet Explorer 5.01 or later (5.5 recommended)
1 CD-ROM or DVD-ROM drive
Outlook• Express 4.0/5.X
Messenger 4.X, Netscape Mail 6.0
Email scanning does not support the following email clients:
1 IMAP clients
1 AOL clients
1 POP3s that use SSL (Secure Sockets Layer)
1 Web-based email such as Hotmail and Yahoo!
1 Lotus Notes mail

Supported instant messenger clients

Norton Personal Firewall can scan for private information in the following instant messengers:
1 AOL Instant Messenger, version 4.3 or later
1 MSN Instant Messenger, version 3.6 or later
1 Windows Messenger, version 4.0 or later

Before installation

Before you install Norton Personal Firewall, prepare your computer.
Installing Norton Personal Firewall
Before installation
21

Prepare your computer

See “If you need to
uninstall Norton Personal Firewall”
on page 34.
If you’re using Windows XP
If you have an older version of Norton Personal Firewall, the new version prompts you to remove the older version. If you have a recent version of Norton Personal Firewall, you can transfer your existing settings to the new version of the program.
Quit all other Windows programs before installing Norton Personal Firewall. Other active programs may interfere with the installation and reduce your protection.
Windows XP includes a firewall that can interfere with Norton Personal Firewall protection features. You must disable the Windows XP firewall before installing Norton Personal Firewall.
Installing Norton Personal Firewall
22

Install Norton Personal Firewall

To disable the Windows XP firewall
1 On the Windows XP taskbar, click Start > Control Panel > Network
Connections.
2 If you have created more than one modem or network connection,
select the active connection.
3 Click Network Tasks.
4 Click Change settings of this connection.
5 On the Advanced tab, in the Internet Connection Firewall section,
uncheck Protect my computer and network by limiting or preventing access to this computer from the Internet.
6 Click OK to close the settings window.
7 Click OK to close the Network Tasks window.
Install Norton Personal Firewall
Install Norton Personal Firewall from the Norton Personal Firewall CD. Install a copy of Norton Personal Firewall on each computer that you want to protect.
See “If the opening
screen does not appear” on
page 25.
To install Norton Personal Firewall
1 Insert the Norton Personal Firewall CD into the CD-ROM drive.
2 In the Norton Personal Firewall CD window, click Install Norton
Personal Firewall. If your computer is not set to automatically run a CD, you must manually open it. The first installation window reminds you to close all other Windows programs.
Installing Norton Personal Firewall
Install Norton Personal Firewall
3 Click Next.
4 Read the License Agreement, then click I accept the license
agreement.
If you decline, you cannot continue with the installation.
5 Click Next.
23
6 In the Run LiveUpdate after installation window, select whether you
want to run LiveUpdate after the installation is done.
Installing Norton Personal Firewall
24
Install Norton Personal Firewall
7 Click Next.
8 Click Browse to select a folder into which you want to install Norton
9 Click Next.
See “Register your
software” on
page 25.
10 Click Next to begin installing Norton Personal Firewall.
Personal Firewall, if it is other than the default location.
After Norton Personal Firewall is installed, the Registration Wizard appears.
11 Read the readme text, then click Next.
12 Click Finish to complete the installation.

If the opening screen does not appear

Sometimes a computer’s CD-ROM drive does not automatically run a CD.
To start the installation from the Norton Personal Firewall CD
1 On your desktop, double-click My Computer.
2 In the My Computer window, double-click the icon for your CD-ROM
drive.
3 In the list of files, double-click Cdstart.exe.

Register your software

Use the Registration Wizard to register your software online. If you skip online registration, you can register your software later using the Product Registration option on the Help menu.
To register your software
1 In the first Registration window, select the country from which you are
registering and the country in which you live (if different), then click
Next.
Installing Norton Personal Firewall
Register your software
25
Installing Norton Personal Firewall
26
Register your software
2 If you would like information from Symantec about Norton Personal
3 Type your name, then click Next.
4 Type your address, then click Next.
Firewall, select the method by which you want to receive that information, then click Next.
Installing Norton Personal Firewall
Register your software
5 Do one of the following:
2 Answer the survey questions to help Symantec improve its
products and services, then click Next.
2 Skip the survey by clicking Next.
27
6 Select whether you want to register Norton Personal Firewall over the
Internet or by mail.
If you want to register by mail, your computer must be connected to a
printer that the Registration Wizard can use to print the registration
form. If you want to register using the Internet, you must be connected
to the Internet.
7 Click Next.
8 To get a copy of your registration information for future reference, do
one of the following:
2 Write down the serial number.
2 Click Print.
9 Click Next.
10 Select whether you want to use your existing profile the next time that
you register a Symantec product, or type the information as part of
registration.
11 Click Finish.
Installing Norton Personal Firewall
28

After installation

After installation
After Norton Personal Firewall is installed, a prompt appears giving you the option to restart your computer immediately. After restarting, the Security Assistant appears to guide you through the configuration of Norton Personal Firewall.

Restart your computer

After installation, a prompt appears telling you that you must restart your computer for the updates to take effect.
To restart your computer
4 In the Installer Information dialog box, click Yes.
Configuration of Norton Personal Firewall is not complete until you restart your computer.

Use the Security Assistant

The Security Assistant helps you quickly configure your Norton Personal Firewall protection. The Security Assistant is divided into four categories:
1 Home Networking
1 Program Control
1 Privacy Control
1 Password Protection
Set up Home Networking
See “Connect to a
network” on
page 61.
Use Home Networking to identify computers to which you want to grant access to your computer and those to which you want to deny access. The Home Network Wizard can automatically configure your network and add computers to your Trusted Zone.
Installing Norton Personal Firewall
After installation
To set up Home Networking
1 In the Security Assistant Roadmap, click Home Networking.
2 In the Home Networking pane, click Set up Home Networking.
3 In the Home Networking Wizard, click Next.
4 Follow the on-screen instructions to configure your network.
29
Set up Program Control
See “Scan for
Internet-enabled programs” on
page 77.
Norton Personal Firewall can scan your computer for Internet-enabled programs and create access rules for them. When the scan is complete, you can use the results to determine which programs should have access to the Internet and, if desired, adjust their access rules.
Installing Norton Personal Firewall
30
After installation
To set up Program Control
1 In the Security Assistant Roadmap, click Program Scan.
2 In the Program Scan pane, click Automatically scan programs.
Loading...
+ 121 hidden pages