The software described in this book is furnished under a license agreement and may be used
only in accordance with the terms of the agreement.
Documentation version 8.0
PN: 07-30-00469
Copyright Notice
Copyright 2001 Symantec Corporation
All Rights Reserved.
Any technical documentation that is made available by Symantec Corporation is the copyrighted
work of Symantec Corporation and is owned by Symantec Corporation.
NO WARRANTY. The technical documentation is being delivered to you
AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the
technical documentation or the information contained therein is at the risk of the user.
Documentation may include technical or other inaccuracies or typographical errors. Symantec
reserves the right to make changes without prior notice.
No part of this publication may be copied without the express written permission of Symantec
Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014.
Trademarks
Symantec, the Symantec logo, Norton, Norton SystemWorks, Emergency Disk, LiveUpdate,
Norton AntiVirus, Norton Utilities, and Rescue Disk are trademarks of Symantec Corporation.
Windows is a registered trademark of Microsoft Corporation. AOL and CompuServe are
registered trademarks of America Online, Inc. Prodigy Internet is a trademark of Prodigy.
Pentium is a registered trademark of Intel Corporation.
Other product names mentioned in this manual may be trademarks or registered trademarks of
their respective companies and are hereby acknowledged.
Printed in the United States of America.
10987654321
SYMANTEC LICENSE AND WARRANTY
IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS
OF THIS LICENSE AGREEMENT CAREFULLY BEFORE USING
THE SOFTWARE. SYMANTEC CORPORATION AND/OR ITS
SUBSIDIARIES (“SYMANTEC”) IS WILLING TO LICENSE THE
SOFTWARE TO YOU AS THE INDIVIDUAL, THE COMPANY,
OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE
SOFTWARE (REFERENCED BELOW AS “YOU OR YOUR”)
ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF
THE TERMS OF THIS LICENSE AGREEMENT. THIS IS A LEGAL
AND ENFORCEABLE CONTRACT BETWEEN YOU AND
SYMANTEC. BY OPENING THIS PACKAGE, BREAKING THE
SEAL, CLICKING ON THE “AGREE” OR “YES” BUTTON OR
OTHERWISE INDICATING ASSENT ELECTRONICALLY, OR
LOADING THE SOFTWARE, YOU AGREE TO THE TERMS
AND CONDITIONS OF THIS AGREEMENT. IF YOU DO NOT
AGREE TO THESE TERMS AND CONDITIONS, CLICK ON
THE “I DO NOT AGREE”, “NO” BUTTON, OR OTHERWISE
INDICATE REFUSAL, MAKE NO FURTHER USE OF THE
SOFTWARE, AND RETURN THE FULL PRODUCT WITH
PROOF OF PURCHASE TO THE DEALER FROM WHOM IT
WAS ACQUIRED WITHIN SIXTY (60) DAYS OF PURCHASE,
AND YOUR MONEY WILL BE REFUNDED.
1. License.
The software which accompanies this license (collectively the
"Software") is the property of Symantec or its licensors and is
protected by copyright law. While Symantec continues to own
the Software, you will have certain rights to use the Software
after your acceptance of this license. This license governs any
releases, revisions, or enhancements to the Software that
Symantec may furnish to you. Except as may be modified by a
Symantec license certificate, license coupon, or license key
(each a “License Module”) which accompanies, precedes, or
follows this license, your rights and obligations with respect to
the use of this Software are as follows:
You may :
A. use one copy of the Software on a single computer. If a
License Module accompanies, precedes, or follows this
license, you may make that number of copies of the Software
licensed to you by Symantec as provided in your License
Module. Your License Module shall constitute proof of your
right to make such copies.
B. make one copy of the Software for archival purposes, or
copy the Software onto the hard disk of your computer and
retain the original for archival purposes;
C. use the Software on a network, provided that you have a
licensed copy of the Software for each computer that can
access the Software over that network; and
D. after written notice to Symantec, transfer the Software on a
permanent basis to another person or entity, provided that you
retain no copies of the Software and the transferee agrees to
the terms of this license.
You may not:
A. copy the printed documentation which accompanies the
Software;
B. sublicense, rent or lease any portion of the Software;
reverse engineer, decompile, disassemble, modify, translate,
make any attempt to discover the source code of the Software,
or create derivative works from the Software;
C. use a previous version or copy of the Software after you
have received a disk replacement set or an upgraded version.
Upon upgrading the Software, all copies of the prior version
must be destroyed;
D. use a later version of the Software than is provided
herewith unless you have purchased upgrade insurance or
have otherwise separately acquired the right to use such later
version;
E. use, if you received the software distributed on media
containing multiple Symantec products, any Symantec
software on the media for which you have not received a
permission in a License Module; or
F. use the Software in any manner not authorized by this
license.
2. Content Updates:
Certain Symantec software products utilize content that is
updated from time to time (antivirus products utilize updated
virus definitions; content filtering products utilize updated URL
lists; firewall products utilize updated firewall rules;
vulnerability assessment products utilize updated vulnerability
data, etc.; collectively, these are referred to as "Content
Updates"). You may obtain Content Updates for any period for
which you have purchased a subscription for Content Updates
for the Software (including any subscription included with
your original purchase of the Software), purchased upgrade
insurance for the Software, entered into a maintenance
agreement that includes Content Updates, or otherwise
separately acquired the right to obtain Content Updates. This
license does not otherwise permit you to obtain and use
Content Updates.
3. Sixty Day Money Back Guarantee:
If you are the original licensee of this copy of the Software and
are dissatisfied with it for any reason, you may return the
complete product, together with your receipt, to Symantec or
an authorized dealer, postage prepaid, for a full refund at any
time during the sixty (60) day period following the delivery to
you of the Software.
4. Limited Warranty:
Symantec warrants that the media on which the Software is
distributed will be free from defects for a period of sixty (60)
days from the date of delivery of the Software to you. Your
sole remedy in the event of a breach of this warranty will be
that Symantec will, at its option, replace any defective media
returned to Symantec within the warranty period or refund the
money you paid for the Software. Symantec does not warrant
that the Software will meet your requirements or that
operation of the Software will be uninterrupted or that the
Software will be error-free.
THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL
OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED,
INCLUDING THE IMPLIED WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE
AND NONINFRINGEMENT OF INTELLECTUAL PROPERTY
RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL
RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY
FROM STATE TO STATE AND COUNTRY TO COUNTRY.
5. Disclaimer of Damages:
SOME STATES AND COUNTRIES, INCLUDING MEMBER
COUNTRIES OF THE EUROPEAN ECONOMIC AREA, DO NOT
ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR
INCIDENTAL OR CONSEQUENTIAL DAMAGES SO THE
BELOW LIMITATION OR EXCLUSION MAY NOT APPLY TO
YOU.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE
LAW AND REGARDLESS OF WHETHER ANY REMEDY SET
FORTH HEREIN FAILS OF ITS ESSENTIAL PURPOSE, IN NO
EVENT WILL SYMANTEC OR ITS LICENSORS BE LIABLE TO
YOU FOR ANY SPECIAL, CONSEQUENTIAL, INDIRECT OR
SIMILAR DAMAGES, INCLUDING ANY LOST PROFITS OR
LOST DATA ARISING OUT OF THE USE OR INABILITY TO
USE THE SOFTWARE EVEN IF SYMANTEC HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
IN NO CASE SHALL SYMANTEC'S OR ITS LICENSORS’
LIABILITY EXCEED THE PURCHASE PRICE FOR THE
SOFTWARE. The disclaimers and limitations set forth above
will apply regardless of whether you accept the Software.
6. U.S. Government Restricted Rights:
RESTRICTED RIGHTS LEGEND. All Symantec products and
documentation are commercial in nature. The software and
software documentation are "Commercial Items", as that term
is defined in 48 C.F.R. section 2.101, consisting of "Commercial
Computer Software" and "Commercial Computer Software
Documentation", as such terms are defined in 48 C.F.R. section
252.227-7014(a)(5) and 48 C.F.R. section 252.227-7014(a)(1),
and used in 48 C.F.R. section 12.212 and 48 C.F.R. section
227.7202, as applicable. Consistent with 48 C.F.R. section
227.7202 through 227.7202-4, 48 C.F.R. section 52.227-14, and
other relevant sections of the Code of Federal Regulations, as
applicable, Symantec's computer software and computer
software documentation are licensed to United States
Government end users with only those rights as granted to all
other end users, according to the terms and conditions
contained in this license agreement. Manufacturer is Symantec
Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014.
7. General:
If You are located in North America or Latin America, this
Agreement will be governed by the laws of the State of
California, United States of America. Otherwise, this
Agreement will be governed by the laws of England. This
Agreement and any related License Module is the entire
agreement between You and Symantec relating to the Software
and: (i) supersedes all prior or contemporaneous oral or
written communications, proposals and representations with
respect to its subject matter; and (ii) prevails over any
conflicting or additional terms of any quote, order,
acknowledgment or similar communications between the
parties. This Agreement may only be modified by a License
Module or by a written document which has been signed by
both You and Symantec. This Agreement shall terminate upon
Your breach of any term contained herein and You shall cease
use of and destroy all copies of the Software. The disclaimers
of warranties and damages and limitations on liability shall
survive termination. Should you have any questions
concerning this Agreement, or if you desire to contact
Symantec for any reason, please write: (i) Symantec Customer
Service, 175 W. Broadway, Eugene, OR 97401, USA, or (ii)
Symantec Customer Service Center, PO BOX 5689, Dublin 15,
Ireland.
What to do if a virus is found
Is Norton AntiVirus
installed?
Yes
Has Norton AntiVirus
detected a virus?
Yes
See “What to do if a virus
is found” on page 63.
No
See “Installing
Norton AntiVirus” on
page 17.
No
See “Scan disks, folders,
and files” on page 55.
See “Keep current with
LiveUpdate” on page 39.
What to do if a virus is found
6
CONTENTS
What to do if a virus is found
Chapter 1About Norton AntiVirus
What’s new in Norton AntiVirus ........................................................11
How viruses work ..............................................................................12
Delete a scan schedule ................................................................62
8
Chapter 5What to do if a virus is found
If a virus is found during a scan ........................................................ 64
Review the repair details .............................................................64
Use the Repair Wizard ................................................................. 64
If a virus is found by Auto-Protect ....................................................65
If you are using Windows 98/98SE/Me ......................................65
If you are using Windows NT/2000/XP .....................................66
If you have files in Quarantine .......................................................... 67
If Norton AntiVirus cannot repair a file ............................................. 69
If your computer does not start properly .......................................... 69
If you need to use Rescue Disks ................................................ 70
If you need to use Emergency Disks .......................................... 71
Look up virus names and definitions ................................................72
Look up viruses on the Symantec Web site ............................... 73
Chapter 6Troubleshooting
Service and support solutions
CD Replacement Form
Index
9
10
CHAPTER
About Norton AntiVirus
Norton AntiVirus provides comprehensive virus prevention, detection, and
elimination software for your computer. It finds and repairs infected files to
keep your data safe and secure. Easy updating of the virus definition
service over the Internet keeps Norton AntiVirus prepared for the latest
threats.
What’s new in Norton AntiVirus
Norton AntiVirus 2002 introduces access to Norton AntiVirus tools through
Windows Explorer, more extensive email support, increased automation of
virus repair with improved nonobtrusive feedback, and Windows XP
support.
■Norton AntiVirus tools in Windows Explorer: For users with Internet
Explorer 5.0 or higher and for Windows NT users with the Windows
Desktop Update, Norton AntiVirus 2002 adds a button to the Windows
Explorer toolbar that allows you to view protection status, manage the
Quarantine area of your computer, view the Activity Log, view the
virus encyclopedia, and scan for viruses.
■Expanded email protection: Norton AntiVirus now supports email
programs that use POP3 and SMTP communications protocols without
having to change the email program’s configuration. You can choose
to scan both incoming and outgoing emails.
■Automated virus repair: Norton AntiVirus can scan and repair your files
entirely in the background, requiring no intervention from you. You
receive a report containing the results of the scan.
■Norton AntiVirus provides complete anti-virus protection for your
Windows XP operating system.
1
11
About Norton AntiVirus
How viruses work
A computer virus is a parasitic program written intentionally to alter the
way your computer operates without your permission or knowledge. A
virus attaches copies of itself to other files and, when activated, may
damage files, cause erratic system behavior, or display messages.
Computer viruses infect system files and documents created by programs
with macro capabilities. Some system viruses are programmed specifically
to corrupt programs, delete files, or erase your disk.
Macro viruses spread quickly
Macros are simple programs that are used to do things such as automate
repetitive tasks in a document or make calculations in a spreadsheet.
Macros are written in files created by such programs as Microsoft Word and
Microsoft Excel.
Macro viruses are malicious macro programs that are designed to replicate
themselves from file to file and can often destroy or change data. Macro
viruses can be transferred across platforms and spread whenever you open
an infected file.
Trojan horses hide their true purposes
Trojan horses are programs that appear to serve some useful purpose or
provide entertainment, which encourages you to run them. But the
program also serves a covert purpose, which may be to damage files or
place a virus on your computer.
A Trojan horse is not a virus because it does not replicate and spread like a
virus. Because Trojan horses are not viruses, files that contain them cannot
be repaired. To ensure the safety of your computer, Norton AntiVirus
detects Trojan horses so you can delete them from your computer.
12
Worms take up space
Wor ms are programs that replicate without infecting other programs. Some
worms spread by copying themselves from disk to disk. They search for
specific types of files on a hard disk or server volume, and try to damage
or destroy those files. Other worms replicate only in memory, creating
myriad copies of themselves, all running simultaneously, which slows
down the computer. Like Trojan horses, worms are not viruses and
therefore cannot be repaired. They must be deleted from your computer.
How viruses spread
A virus is inactive until you launch an infected program, start your
computer from a disk that has infected system files, or open an infected
document. For example, if a word processing program contains a virus, the
virus activates when you run the program. Once a virus is in memory, it
usually infects any program you run, including network programs (if you
can make changes to network folders or disks).
Viruses behave in different ways. Some viruses stay active in memory until
you turn off your computer. Other viruses stay active only as long as the
infected program is running. Turning off your computer or exiting the
program removes the virus from memory, but does not remove the virus
from the infected file or disk. That is, if the virus resides in an operating
system file, the virus activates the next time you start your computer from
the infected disk. If the virus resides in a program, the virus activates the
next time you run the program.
How viruses work
To prevent virus-infected programs from getting onto your computer, scan
files with Norton AntiVirus before you copy or run them. This includes
programs you download from news groups or Internet Web sites and any
email attachments that you receive.
13
About Norton AntiVirus
How Norton AntiVirus works
Norton AntiVirus monitors your computer for known and unknown
viruses. A known virus is one that can be detected and identified by name.
An unknown virus is one for which Norton AntiVirus does not yet have a
definition.
Norton AntiVirus protects your computer from both types of viruses, using
virus definitions to detect known viruses, and Bloodhound technology and
Script Blocking to detect unknown viruses. Virus definitions, Bloodhound
technology, and Script Blocking are all used during scheduled scans and
manual scans, and are used by Auto-Protect to constantly monitor your
computer.
The virus definition service stops known viruses
The virus definition service consists of files that Norton AntiVirus uses to
recognize viruses and intercept their activity. You can look up virus names
in Norton AntiVirus, and access an encyclopedia of virus descriptions on
the Symantec Web site. For more information, see “Look up virus names
and definitions” on page 72.
Bloodhound technology stops unknown viruses
Bloodhound is the Norton AntiVirus scanning technology for detecting new
and unknown viruses. It detects viruses by analyzing an executable file’s
structure, behavior, and other attributes such as programming logic,
computer instructions, and any data contained in the file. It also sets up
simulated environments in which to load documents and test for macro
viruses.
Script Blocking stops script-based viruses
A script is a list of instructions that can be executed without user
interaction. Scripts can be opened with text editors or word processing
programs, so they are very easy to change.
Script Blocking detects Visual Basic and Java script-based viruses without
the need for specific virus definitions. It monitors the scripts for virus-like
behavior and alerts you if it is found.
14
Auto-Protect keeps you safe
Norton AntiVirus Auto-Protect loads into memory when Windows starts,
providing constant protection while you work.
Using Auto-Protect, Norton AntiVirus automatically:
■Eliminates viruses and Trojan horses, including macro viruses, and
repairs damaged files
■Checks for viruses every time you use software programs on your
computer, insert floppy disks or other removable media, or use
document files that you receive or create
■Monitors your computer for any unusual symptoms that may indicate
an active virus
■Protects your computer from Internet-borne viruses
How to maintain protection
When Norton AntiVirus is installed, you have complete virus protection.
However, new viruses are created constantly. Viruses can spread when you
start your computer from an infected disk or when you run an infected
program. There are several things you can to do avoid viruses and to
recover quickly should a virus strike.
How to maintain protection
Avoid viruses
It is important that you practice regular file maintenance and that you keep
Norton AntiVirus up-to-date.
To avoid viruses:
■Write-protect removable media.
■Stay informed about viruses by logging on to the Symantec Security
■Use LiveUpdate regularly to update your programs and virus definition
■Keep Norton AntiVirus Auto-Protect turned on at all times to prevent
Response Web site (securityresponse.symantec.com) where there is
extensive, frequently updated information on viruses and virus
protection.
service files. For more information, see “Keep current with LiveUpdate”
on page 39.
viruses from infecting your computer.
15
About Norton AntiVirus
■If Norton AntiVirus Auto-Protect is not turned on, scan removable
media before you use them. For more information, see “Scan disks,
folders, and files” on page 55.
■Schedule scans to occur automatically. For more information, see
“Schedule automatic virus scans” on page 60.
Prepare for emergencies
It is also important that you are prepared in case your computer is infected
by a virus.
To prepare for emergencies:
■Back up files regularly and keep more than just the most recent
backup.
■If you are using Windows NT, Windows 2000, or Windows XP and
your computer cannot start from a CD, create a set of Emergency
Disks, from which you can start your computer and scan for viruses.
For more information, see “Create Emergency Disks” on page 19.
■If you are using Windows 98 or Me, create a set of Rescue Disks, with
which you can start your computer in DOS mode and use Norton
AntiVirus to fix virus-related problems and recover from a system
crash. For more information, see “About Rescue Disks” on page 34.
16
CHAPTER
Installing
Norton AntiVirus
Before installing Norton AntiVirus, take a moment to review the system
requirements listed in this chapter. Windows 98 and Windows Me users
should have some blank 1.44 MB disks available to make Rescue Disks.
System requirements
To use Norton AntiVirus, your computer must have one of the following
Windows operating systems:
■Windows 98, 98SE
■Windows Me
■Windows NT 4.0 Workstation with service pack 6 or higher
■Windows 2000 Professional
■Windows XP Professional or Windows XP Home Edition
2
Your computer must also meet the following minimum requirements.
Windows 98/Me
■Intel Pentium processor at 133MHz for Windows 98; 150 MHz for
Windows Me
■32 MB of RAM
■50 MB of available hard disk space
■Internet Explorer 4.01 service pack 1 or higher
■CD-ROM or DVD-ROM drive
17
Installing Norton AntiVirus
Windows NT 4.0 Workstation
■Service pack 6 or higher
■Intel Pentium processor at 133MHz or higher
■32 MB of RAM
■50 MB of available hard disk space
■Internet Explorer 4.01 service pack 1 or higher
■CD-ROM or DVD-ROM drive
Windows 2000 Professional
■Intel Pentium processor at 133MHz or higher
■64 MB of RAM
■50 MB of hard disk space
■Internet Explorer 4.01 service pack 1 or higher
■CD-ROM or DVD-ROM drive
Windows XP Home Edition/Professional
■Intel Pentium processor at 300MHz or higher
■128 MB of RAM
■50 MB of hard disk space
■Internet Explorer 4.01 service pack 1 or higher
■CD-ROM or DVD-ROM drive
Before installation
Before you install Norton AntiVirus, prepare your computer. If your
computer cannot start from a CD, create Emergency Disks.
Prepare your computer
If you have a previous version of Norton AntiVirus or any other anti-virus
programs on your computer, you must uninstall them before installing
Norton AntiVirus. For more information, see “If you need to uninstall
Norton AntiVirus” on page 27.
To uninstall other anti-virus programs, see the user documentation that
came with the program.
18
You must close all other Windows programs before installing Norton
AntiVirus.
Create Emergency Disks
Emergency Disks are used to start your computer and scan for viruses in
case of a problem. If your computer can start from a CD, you can use the
Norton AntiVirus CD in place of Emergency Disks and do not need to
create them. If you cannot start your computer, you can use these
instructions to create Emergency Disks on another computer. For more
information, see “If you need to use Emergency Disks” on page 71.
Use the Norton AntiVirus CD to create Emergency Disks. You will need
several formatted 1.44 MB disks.
To create Emergency Disks
1Insert the Norton AntiVirus CD into the CD-ROM drive.
2Click Browse CD.
3Double-click the Support folder.
4Double-click the Edisk folder.
5Double-click Ned.exe.
6In the welcome window, click OK.
7Label the first disk as instructed and insert it into drive A.
8Click Yes.
9Repeat steps 7 and 8 for the subsequent disks.
10 When the procedure is complete, click OK.
11 Remove the final disk from drive A and store the Emergency Disk set
in a safe place.
Before installation
19
Installing Norton AntiVirus
Install Norton AntiVirus
Install Norton AntiVirus from the Norton AntiVirus CD.
To install Norton AntiVirus
1Insert the Norton AntiVirus CD into the CD-ROM drive.
2In the Norton AntiVirus 2002 window, click Install Norton AntiVirus.
If your computer is not set to automatically open a CD, you will have
to open it yourself. For more information, see “If the opening screen
does not appear” on page 23.
3If you are installing in Windows 98, 98SE, or Me, Norton AntiVirus
scans your computer’s memory for viruses before installing. If a virus is
found, you are prompted to use your Emergency Disks to remove the
virus before continuing. For more information, see “If you need to use
Emergency Disks” on page 71.
4The opening installation window reminds you to close all other
Windows programs. Click Next.
20
5In the License Agreement window, click I accept the license
agreement.
If you decline, you cannot continue with the installation.
Install Norton AntiVirus
Click Next.
6
7Select a folder into which you want to install Norton AntiVirus, then
click Next.
21
Installing Norton AntiVirus
Confirm the installation location, then click Next.
8
9After Norton AntiVirus is installed, scroll through the Readme text, then
click Next.
22
10 Click Finish to exit the installation.
If the opening screen does not appear
Sometimes, a computer’s CD-ROM drive does not automatically start a CD.
To start the installation from the Norton AntiVirus CD
1On your desktop, double-click My Computer.
2In the My Computer dialog box, double-click the icon for your
CD-ROM drive.
3From the list of files, double-click CDSTART.EXE.
After installation
If your computer needs to be restarted after Norton AntiVirus is installed, a
prompt appears giving you the option to do so immediately. After restart
or, if your computer does not need to be restarted, after installation is
complete, the Information Wizard appears.
Note: If you bought your computer with Norton AntiVirus already installed,
the Information Wizard appears the first time you start Norton AntiVirus.
You must accept the license agreement that appears in the Information
Wizard for Norton AntiVirus to be activated.
After installation
Restart your computer
After installation, you may receive a prompt telling you that your computer
needs to be restarted for the updates to take effect.
To restart your computer
■In the dialog box, click Yes.
If you click No, configuration of Norton AntiVirus is not complete until
you restart your computer.
23
Installing Norton AntiVirus
Use the Information Wizard
The Information Wizard lets you register your copy of Norton AntiVirus,
get information about the virus protection subscription service, select
post-install tasks to be done automatically, and review your Norton
AntiVirus settings. If you do not complete the Information Wizard, Norton
AntiVirus uses the default settings for post-install tasks and program
options.
Note: If you choose not to register the software using the Information
Wizard or if registration fails for some reason, you can register on the
Symantec Web site at www.symantec.com or by using the Product
Registration option on the Help menu. On the Web site, go to the Products
page for the registration link.
To use the Information Wizard
1In the welcome window, click Next.
If you purchased your computer with Norton AntiVirus already
installed, you must accept the license agreement in order to use
Norton AntiVirus.
2Click I accept the license agreement, then click Next.
3In the first Registration window, select the country from which you are
registering and the country in which you live (if different), then click
Next.
4If you would like information from Symantec about Norton AntiVirus,
select the method by which you want to receive that information, then
click Next.
5Enter your name and whether you want Norton AntiVirus registered to
you or your company, then click Next.
6Enter your address, then click Next.
7Answer the survey questions to help Symantec improve its products
and services, then click Next when you are done or to skip the survey.
8Select whether you want to register Norton AntiVirus through the
Internet or by mail, then click Next.
If you submitted your registration through the Internet, a dialog box
displays the serial number for your product.
9Write down the number or click Print to get a copy of your
registration information for future reference.
24
After installation
Click Next.
10
11 Select whether you want to use your existing profile the next time you
register a Symantec product, or type the information as part of
registration.
12 Click Finish.
13 Review the subscription service information, then click Next.
14 Select the post-install tasks that you want Norton AntiVirus to perform
automatically. Your options are:
■ Run LiveUpdate to ensure that you have the latest virus definitions.
For more information, see “Keep current with LiveUpdate” on
page 39.
■ Perform a full system scan. For more information, see “Scan disks,
folders, and files” on page 55.
■ Schedule a weekly scan of your local hard drives. You must have
Microsoft Scheduler installed to use this option. If you select this
option, you can change the schedule for this scan as desired. For
more information, see “Schedule automatic virus scans” on page 60.
■ If you are installing in Windows 98 or Windows Me, you also have
the option to create a Rescue Disk set. For more information, see
“About Rescue Disks”on page 34.
15 Click Next.
25
Installing Norton AntiVirus
Review the configuration settings for Norton AntiVirus. If you want to
16
change any of the settings, do so using Norton AntiVirus Options. For
more information, see “Customize Norton AntiVirus” on page 43.
17 Click Finish.
If you selected any post-install tasks, they start automatically.
Read the Readme file
The Readme file contains technical tips and information about product
changes that occurred after this guide went to press. It is installed on your
hard disk in the same location as the Norton AntiVirus product files.
To read the Readme file
1Using Windows Explorer, navigate to the location where your Norton
AntiVirus files are installed.
If you installed Norton AntiVirus in the default location, the files are in
C:\Program Files\Norton AntiVirus.
2Double-click Readme.txt to open the file in Notepad or WordPad.
The Readme file includes instructions for printing it if you want to do
so.
3Close the word processing program when you are done reading the
file.
26
If you need to uninstall Norton AntiVirus
If you need to uninstall Norton AntiVirus
If you need to remove Norton AntiVirus from your computer, use the
Uninstall Norton AntiVirus option on the Windows Start menu.
Note: During uninstall, Windows may indicate that it is installing software.
This is a standard Microsoft installation message and can be disregarded.
To uninstall Norton AntiVirus
1On the Windows taskbar, click Start > Programs > Norton AntiVirus
> Uninstall Norton AntiVirus.
27
Loading...
+ 63 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.