Symantec 10514879 - Norton Confidential, Norton Confidential User Manual

Page 1
User Guide
PN: 10748234
Page 2
Norton Confidential For Macintosh®
Documentation version 1.0
Copyright © 2006 Symantec Corporation. All rights reserved.
The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, Rights in Commercial Computer Software or Commercial Computer Software Documentation, as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.
Symantec, the Symantec Logo, Norton, LiveUpdate, and Norton Confidential are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Macintosh, Mac, Mac OS, the Mac logo, and Panther are registered trademarks, and Tiger is a trademark of Apple Computer, Inc. Firefox is a registered trademark of Mozilla Corporation. Other names may be trademarks of their respective owners.
The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DI SCLAIM ED, EXCE PT TO THE EXTENT THAT SUC H DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURN ISHING P ERFORMANCE, OR USE OF TH IS DOC UMENTATION. THE INFORMATION CONTAINED IN TH IS DOC UMENTATION IS SUBJECT TO CHANGE WITHOUT NOTIC E.
Symantec Corporation
20330 Stevens Creek Blvd.
Cupertino, CA 95014 USA
http://www.symantec.com
Printed in the United States of America.
10 9 8 7 6 5 4 3 2 1
Page 3
Symantec Software License Agreement Norton Confidential For Macintosh®
IMPORTANT: PLEASE READ THE TE RMS AND CONDITIONS OF THIS LICENSE AGREEMENT (LIC ENSE AG REEM ENT) CAREF ULLY BEFORE USING THE SOFTWARE. SYMANTEC CORPORATION AND/OR ITS SUBSIDIARIES (SYMANTEC) IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THE INDIVIDUAL, THE COMPANY, OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE (REFERENCED BELOW AS YOU OR YOUR) ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT. THIS IS A LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU AND SYMANTEC. BY OPENING THIS PACKAGE, BREAKING THE SEAL, CLICKING THE “ACCEPT OR YES BUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY, OR LOADING THE SOFTWARE, YOU AGREE TO THE TERMS AND CON DITIONS OF THIS LICENSE AGREE MENT. IF YOU DO NOT AGRE E TO THE SE TERMS AND CONDITIONS, CLICK THE I DO NOT ACCEPT OR NO BUTTON OR OTHERWISE INDICATE REFUSAL, MAKE NO FURTHER USE OF THE SOFTWARE, AND CONTACT SYMANTEC CUSTOMER SERVICE FOR INFORMATION ON HOW TO OBTAIN A REFUND OF THE MONEY YOU PAID FOR THE SOFTWARE (LESS SHIPPIN G, HANDLIN G, AND ANY APPLICABLE TAXES EXCEPT IN CERTAIN STATES AND COUNTRIES WHERE SHIPPING, HANDLING, AND TAXES ARE REFUNDABLE) AT ANY TIME DURING THE SIXTY (60) DAY PERIOD FOLLOWING THE DATE OF PURCHASE.
1. License
The software and documentation, including any product packaging (Documentation), that accompanies this License Agreement (collectively the Software) is the property of Symantec or its licensors, and is protected by copyright law. While Symantec continues to own the Software, You will have certain rights to use the Software after Your acceptance of this License Agreement. This License Agreement governs any releases, revisions, or enhancements to the Software, that Symantec may furnish to You. Your rights and obligations with respect to the use of this Software are as follows.
You may:
A. use one copy of the Software on a single computer. If a greater number of copies and/or number of computers is specified within the Documentation or the applicable transaction documentation from the authorized distributor or reseller from which you obtained the Software, you may use the Software in accordance with such specifications;
B. make one copy of the Software for archival purposes, or copy the Software onto the hard disk of Your computer and retain the original for archival purposes;
C. use the Software on a network, provided that You have a licensed copy of the Software for each computer that can access the Software over that network;
D. transfer the Software on a permanent basis to another person or entity, provided that You retain no copies of the Software and the transferee agrees to the terms of this license; and
E. use the Software in accordance with any additional permitted uses set forth below.
You may not:
A. sublicense, rent or lease any portion of the Software;
B. reverse engineer, decompile, disassemble, modify, translate, make any attempt to discover the source code of the Software or create derivative works from the Software;
C. use the Software as part of a facility management, timesharing, service provider or service bureau arrangement; or
D. use the Software in any manner that is not permitted pursuant to this license.
2. Content Updates:
Certain Software utilize content that is updated from time to time, including but not limited to the following Software: antivirus and crimeware software utilize updated virus definitions; antispam software utilize updated antispam rules; content filtering and antiphishing
Page 4
software utilize updated URL lists; some firewall software utilize updated firewall rules; vulnerability assessment products utilize updated vulnerability data and web site authentication software utilize updated lists of authenticated web pages; these updates are collectively referred to as Content Updates (or alternatively referred to as Protection Updates or Security Updates at times). You shall have the right to obtain Content Updates for any period for which You have purchased a subscription for Content Updates for the Software (including any subscription included with your original purchase of the Software), except for those Content Updates that Symantec elects to make available by separate paid subscription, or for any period for which You have otherwise separately acquired the right to obtain Content Updates. Symantec reserves the right to designate specified Content Updates as requiring purchase of a separate subscription at any time and without notice to You; provided, however, that if You purchase a subscription that includes particular Content Updates on the date of purchase, You will not have to pay an additional fee to continue receiving such Content Updates through the term of such subscription even if Symantec designates such Content Updates as requiring separate purchase. This License Agreement does not otherwise permit You to obtain and use Content Updates.
3. Product Installation; Required Activation:
A. During the installation process, the Software may uninstall or disable other security products, or features thereof, if such products or features are incompatible with the Software or for purposes of improving the overall functionality of the Software.
B. There may be technological measures in this Software that are designed to prevent unlicensed or illegal use of the Software. You agree that Symantec may use these measures to protect Symantec against software piracy. This Software may contain enforcement technology that limits the ability to install and uninstall the Software on a computer to not more than a finite number of times for a finite number of computers. This License Agreement and the Software containing enforcement technology require activation as further set forth in the Documentation. The Software will only operate for a finite period of time prior to Software activation by You. During activation, You may be required to provide Your unique product key accompanying the Software and computer
configuration in the form of an alphanumeric code over the Internet to verify the authenticity of the Software. If You do not complete the activation within the finite period of time set forth in the Documentation, or as prompted by the Software, the Software will cease to function until activation is complete; at which time the Software functionality will be restored. In the event that You are not able to activate the Software over the Internet, or through any other method specified during the activation process, You may contact Symantec Customer Support using the information provided by Symantec during activation, or as set forth below.
4. Privacy; Data Protection:
From time to time, the Software will collect certain information from the computer on which it is installed, which may include:
Information regarding installation of the Software. This information indicates to Symantec whether installation of the Software was successfully completed and is collected by Symantec for the purpose of evaluating and improving Symantecs product installation success rate. This information will not be correlated with any personally identifiable information.
Information on potential security risks as well as URLs of websites visited that the Software deems potentially fraudulent. This information is collected by Symantec for the purpose of evaluating and improving the ability of Symantecs products to detect malicious behavior, potentially fraudulent websites and other Internet security risks. This information will not be correlated with any personally identifiable information.
Portable executable files that are identified as malware. These files are submitted to Symantec using the Softwares automatic submission function. The collected files could contain personally identifiable information that has been obtained by the malware without your permission. Files of this type are being collected by Symantec only for the purpose of improving the ability of Symantecs products to detect malicious behavior. Symantec will not correlate these files with any personally identifiable information. Such automatic submission function may be deactivated after installation by following the instructions in the Documentation for applicable products.
The name given during initial setup to the computer on which the Software is being
Page 5
installed. If collected, the name will be used by Symantec as an account name for such computer under which you may elect to receive additional services and/or under which you may use certain features of the Software. You may change the account name at any time after installation of the Software (recommended).
Other information used for purposes of analyzing and improving the functionality of Symantecs products. This information will not be correlated with any personally identifiable information.
Symantec may disclose the collected information if asked to do so by a law enforcement official as required or permitted by law or in response to a subpoena or other legal process. In order to promote awareness, detection and prevention of Internet security risks, Symantec may share certain information with research organizations and other security software vendors. Symantec may also use statistics derived from the information to track and publish reports on security risk trends. By using the Software, you acknowledge and agree that Symantec may collect, transmit, store, disclose and analyze such information for these purposes.
5. Sixty (60) Day Money Back Guarantee:
If You are the original licensee of this copy of the Software and are not completely satisfied with it for any reason, please contact Symantec Customer Service for a refund of the money You paid for the Software (less shipping, handling, and any applicable taxes except in certain states and countries where shipping, handling and taxes are refundable) at any time during the sixty (60) day period following the date of purchase.
6. Limited Warranty:
Symantec warrants that the media on which the Software is distributed will be free from defects for a period of sixty (60) days from the date of delivery of the Software to You. Your sole remedy in the event of a breach of this warranty will be that Symantec will, at its option, replace any defective media returned to Symantec within the warranty period or refund the money You paid for the Software. Symantec does not warrant that the Software will meet Your requirements or that operation of the Software will be uninterrupted or that the Software will be error-free.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY FROM STATE TO STATE AND COUNTRY TO COUNTRY.
7. Disclaimer of Damages:
SOME STATES AND COUNTRIES, INCLUDING MEMBER COUNTRIES OF THE EUROPEAN ECONOMIC AREA, DO NOT ALLOW THE LIMITATION OR EXC LUSION OF LIABILITY FOR INCID ENTAL OR CO NSEQUENTIAL DAMAGES, SO THE BELOW LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH HE REIN FAILS OF ITS ESSENTIAL PURPOSE, IN NO EVENT WILL SYMANTEC OR ITS LICENSORS BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INDIRECT, OR SIMILAR DAMAGES, INCLUDING ANY LOST PROFITS OR LOST DATA ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE EVEN IF SYMANTEC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
IN NO CASE SHALL SYMANTECS OR ITS LICENSORS LIABILITY EXCEED THE PURCHASE PRICE FOR THE SOFTWARE. The disclaimers and limitations set forth above will apply regardless of whether You accept the Software.
8. U.S. Government Restricted Rights:
The Software is deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS
227.7202, Rights in Commercial Computer Software or Commercial Computer Software Documentation, as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Software by the U.S. Government shall be solely in accordance with the terms of this License Agreement.
Page 6
9. Export Regulation:
You acknowledge that Symantec products and controlled technology may be subject to the export and import control laws of the United States and any country where the product or controlled technology is manufactured or received. By using Symantec products and controlled technology You agree that You will not violate any such laws. You agree not to export any Symantec product or controlled technology to any prohibited country, entity, or person for which an export license or other governmental approval is required. Obtaining necessary licenses and approvals is solely Your obligation. You agree that You will not export or sell any Symantec product or controlled technology for use in connection with chemical, biological, or nuclear weapons, or missiles capable of delivering such weapons.
10. General:
If You are located in North America or Latin America, this License Agreement will be governed by the laws of the State of California, United States of America. Otherwise, this License Agreement will be governed by the laws of England and Wales. This License Agreement is the entire agreement between You and Symantec relating to the Software and: (i) supersedes all prior or contemporaneous oral or written communications, proposals, and representations with respect to its subject matter; and (ii) prevails over any conflicting or additional terms of any quote, order, acknowledgment, or similar communications between the parties. Notwithstanding the foregoing, nothing in this License Agreement will diminish any rights You may have under existing consumer protection legislation or other applicable laws in Your jurisdiction that may not be waived by contract. This License Agreement shall terminate upon Your breach of any term contained herein and You shall cease use of and destroy all copies of the Software. The disclaimers of warranties and damages and limitations on liability shall survive termination. The Software is delivered Ex Works California, U.S.A. or Dublin, Ireland respectively (ICC INCOTERMS 2000). This License Agreement may only be modified by the Documentation or by a written document that has been signed by both You and Symantec. Should You have any questions concerning this License Agreement, or if You desire to contact Symantec for any reason, please write to: (i) Symantec Customer Service, 555 International Way, Springfield, OR 97477, U.S.A., (ii)
Symantec Consumer Support, PO Box 5689, Dublin 15, Ireland, or (iii) Symantec Customer Service, 1 Julius Ave, North Ryde, NSW 2113, Australia.
Page 7
Chapter 1 Installation
Before you begin . . .. . .. . . .. . .. . . .. . . .. . .. . . .. . .. . . .. . . . 9
Installing Norton Confidential . .. . .. . . .. . .. . . .. . . .. . 10
Setting up Norton Confidential . .. . . .. . .. . . .. . .. . . .. 12
After installation .. . . .. . .. . . .. . .. . . .. . . .. . .. . . .. . .. . . .. 16
Chapter 2 Getting started
Opening and quitting Norton Confidential . .. . . .. . 19
For more information .. . . .. . .. . . .. . .. . . .. . . .. . .. . . .. . 20
Service and support solutions
Index
Contents
Page 8
Contents8
Page 9
This chapter includes the following topics:
1 Before you begin
1 Installing Norton Confidential
1 Setting up Norton Confidential
1 After installation
Before you begin
Before you install Norton Confidential, you should read the Read Me file for the latest installation information.
To install Norton Confidential, you will be required to enter an administrator account name and password. An administrator account is created when you set up your Mac.
See “Checking your
user account type
on page 10.
If you're not sure if your account is an administrator account, check your user account type.
Reading the Read Me file
The Read Me file contains a summary of what's new and changed in Norton Confidential, as well as installation tips. It contains information that was unavailable at the time the User Guide was published.
To read the Read Me file
1
Insert the product CD into your optical disk drive.
1
Installation
Page 10
2
In the CD window, double-click Norton Confidential Read Me.
Checking your user account type
There are two common types of user accounts that you can create on your Mac: administrator accounts and standard accounts.
A user who has an administrator account name and password is allowed to perform tasks such as installing software and changing system settings on your Mac. A standard account user cannot perform administrative tasks.
Many tasks require that you enter an administrator account name and password. If you do not know if your account is an administrator account, you can check it in System Preferences.
To check your user account type
1
On the Apple menu, click System Preferences.
2
Click Accounts.
3
View your account name and type.
Installing Norton Confidential
Before beginning the installation, you should quit any programs and save any work that is open on your Mac.
You can install from the product CD, or from a file that you download.
To install Norton Confidential
1
Do one of the following:
1 If you install from a CD, insert the product CD into
the optical disk drive.
1 If you downloaded your copy of Norton Confidential,
double-click the file that you downloaded.
2
Double-click Norton Confidential Installer.
3
In the Welcome to the Norton Confidential Installer window, click Continue.
Installation
Installing Norton Confidential
10
Page 11
4
Review the Important Information text, and then click Continue.
5
Read the Software License Agreement, and then click Continue.
6
In the dialog that appears, click Agree. If you do not agree, you cannot continue the installation.
7
In the Select a Destination window, select your Mac OS X startup disk, and then click Continue. You must install Norton Confidential on a startup disk.
8
Choose what you want to install by doing one of the following:
1 To install all of the components of Norton
Confidential, click Install.
If you have other Symantec products that include Norton Confidential that are installed on your computer, this button may be labeled Upgrade instead of Install.
1 To select the features you want to install, click
Customize, use the checkboxes to select the features you want to install, and then click Install.
To get the most out of Norton Confidential, you should install all of the components.
9
In the Authenticate window, type your administrator account name and password, and then click OK.
10
In the dialog that informs you that the installation requires a restart of your computer, click Continue Installation.
11
In the dialog that asks you if you want to run LiveUpdate, do one of the following:
1 If your computer is connected to the Internet, to
ensure that the software is up-to-date, click Yes to run LiveUpdate.
1 If your computer is not connected to the Internet,
click No.
11Installation
Installing Norton Confidential
Page 12
12
In the Installation Successful window, click Restart.
See “Setting up
Norton Confidential
on page 12.
You must restart to complete the installation process. When your computer restarts, the Setup Assistant automatically appears and guides you through the setup process.
If you can't eject the CD
If you cannot eject the CD after you restart your computer, try one of the following actions:
1 Before you eject the CD, quit any applications and close
any open documents that are on the CD.
1 Restart your computer.
Press and hold the eject button on the keyboard when your Macintosh restart chime sounds.
1 On a Macintosh computer that has a slot-loading
CD-ROM drive, press and hold the mouse button to eject the CD while you start your computer.
For more information on how to eject a CD, refer to the Mac Help.
Setting up Norton Confidential
After you install the Norton Confidential and restart your computer, the Setup Assistant guides you through the product setup steps. The Setup Assistant introduces you to the features and benefits of Norton Confidential.
Throughout the Setup Assistant, you can click the More Info button to get more information about the feature or options in the window. You can also go back to previous windows by clicking the Back button.
You can view and change all of the settings in the Setup Assistant at any time in the Norton Confidential settings windows. You can click the Help button (question mark) on any settings window for information on changing feature settings.
Installation
Setting up Norton Confidential
12
Page 13
To set up Norton Confidential
1
In the Norton Confidential Setup Assistant, read the Introduction window, and then click Continue.
2
In the About Phishing Protection window, use the buttons to enable or disable Phishing Protection, and then click Continue. If you disabled Phishing Protection, you can skip to step 4.
3
In the Phishing Protection Options window, use the checkboxes to select Firefox Web browser options, and then click Continue. Phishing Protection currently works only with the Firefox Web browser. If you do not have a supported version of Firefox installed on your Mac, Norton Confidential installs it.
4
In the Information Guard window, use the buttons to enable or disable Information Guard, and then click Continue. If you choose not to enable Information Guard now, you can enable the feature and add personal information items later by using Norton Confidential. If you disabled Information Guard, you can skip to step 8.
5
See “Guidelines for
entering guarded information
on page 14.
If you enabled Information Guard, type the personal information that you want to protect in the fields that are provided, and then click Add.
6
In the Information Guard: Add Items window, do one of the following:
1
To add more information to guard, click Add.
1 To delete the item, select a guarded information
item from the list, and then click Remove.
7
When you are done adding Information Guard entries, click Continue.
13Installation
Setting up Norton Confidential
Page 14
8
In the File Guard window, do one of the following:
1
To enable File Guard, select Enable File Guard and specify some confidential files.
If you specified items of confidential information earlier, select the Find and guard files in your home directory... checkbox.
1
To disable File Guard, select Disable File Guard.
If you disable File Guard now, you can enable the feature and guard files later by using Norton Confidential.
9
When you are done enabling or disabling File Guard, click Continue. If you disabled File Guard, you can skip to step 12.
10
If you enabled File Guard, click Add File, select a file from the file browser, and then click Add.
11
When you are done adding files to guard, click Continue.
12
In the Vulnerability Protection window, use the button to enable or disable Vulnerability Protection, and then click Continue.
13
In the Finish Setup window, do all the following actions:
1 Review the list of features that are enabled or
disabled to ensure that they are set the way you want.
1 Use the checkbox to choose whether to put the
Norton Confidential icon in the Dock.
1 Use the checkbox to choose whether to register
Norton Confidential.
14
When you are done with the Setup Assistant, click Finish.
15
In the Authenticate window, enter an administrator account name and password, and then click OK.
Guidelines for entering guarded information
Before you add information to Information Guard, you should think about the information you want to guard. You might want to guard information such as the following:
Installation
Setting up Norton Confidential
14
Page 15
1 User names and passwords
1 Phone numbers
1 Credit card numbers
1 Social security or other ID numbers
When you add a guarded information item, text that you type in the Description field is displayed next to the guarded information item to remind you what the item is. A category name that you type or select in the Category field is used to identify the guarded information item in any alerts.
You can increase the accuracy of Norton Confidential detection by using the following guidelines for entering information into Information Guard:
1 Enter a minimum of four characters to protect.
1 Enter a maximum of 30 characters to protect.
1 Add numeric information to Information Guard as an
uninterrupted sequence of numbers, without dashes or other characters. For example, the phone number 888-555-1234 should be entered into Information Guard without dashes as follows: 8885551234. Norton Confidential detects the guarded number regardless of how you enter it in the Web site.
1 Enter the entire sequence of numbers or text that you
want to guard. Or enter as much of the sequence as you are comfortable entering. Partial, common or short sequences of numbers and text have a greater chance of being detected in normal network traffic and can result in false detection alerts. For example, if you have guarded the last four digits of your credit card number as "0000," you may want to enter a more unique or longer sequence of your credit card number.
1 Don't enter your email address as a guarded
information item. You email address is often sent and received in normal email correspondence. Guarding your email address using Information Guard may trigger an excessive number of alerts.
1 Create separate guarded information items for those
items that require DBCS (double-byte character sets)
15Installation
Setting up Norton Confidential
Page 16
and for those that require SBCS (single-byte character sets). Separate guarded information items for DBCS and SBCS items result in better detection of your guarded information.
You can enter a guarded information item that contains both double-byte and single-byte characters. However, Information Guard may not always detect an item that contains both double-byte and single-byte characters when it is transmitted from your Mac. Computers use double-byte characters sets to represent languages such as Japanese and Chinese that employ thousands of distinct characters.
After installation
When you have installed Norton Confidential, you should check for late-breaking news about your new software. You can also register your software with Symantec.
Registering Norton Confidential
Registration qualifies you for technical support, disk and manual replacements, and other valuable services. After you fill out the online registration form, you can update your privacy options.
To register Norton Confidential
1
Make sure your computer is connected to the Internet.
2
Do one of the following:
1 In the Applications folder on your Macintosh, open
the Symantec Solutions folder, and then double-click Register Your Software.
1 On the Norton Confidential menu bar, choose the
Norton Confidential menu, and then choose Register Norton Confidential.
3
On the registration Web page, select Norton Confidential for Macintosh, version 1.0, and then click continue.
Installation
After installation
16
Page 17
4
On the register your software Web page, fill in the required personal information, and then click submit registration.
5
If you want to view and change your preferences regarding mail, email, or telephone calls, click GO.
6
When you are done selecting your preferences, click Submit at the bottom of the window.
Reading Late Breaking News
Norton Confidential creates a Late Breaking News link. You can click this link to see the latest information for your installed software.
To read Late Breaking News
1
Make sure your computer is connected to the Internet.
2
In the Symantec Solutions folder, double-click Late Breaking News.
17Installation
After installation
Page 18
Installation
After installation
18
Page 19
This chapter includes the following topics:
1 Opening and quitting Norton Confidential
1 For more information
Opening and quitting Norton Confidential
Norton Confidential protects the computer on which it is installed. You do not have to start the program to be protected. If Norton Confidential detects a situation that requires your attention, an alert opens to help you resolve it. By default, protection features are enabled and Norton Confidential monitors your computer, notifying you about security risks as they occur.
Norton Confidential keeps track of the activities and alerts that are generated by each feature. If you are away from your Mac, you can use the Activity Log to see what happened while you were gone.
2
Getting started
Page 20
To open Norton Confidential
4
Do one of the following:
1
In the Applications folder, open the Symantec Solutions folder, and then double-click Norton Confidential.
1
From the Norton QuickMenu, choose Open Norton Confidential.
1
If it appears in the Dock, click the Norton Confidential icon.
You cannot quit Norton Confidential if any dialogs or alerts are open.
To quit Norton Confidential
1
Close any Norton Confidential dialogs and alerts.
2
Do one of the following:
1
On the Norton Confidential menu, choose Quit Norton Confidential.
1
Press Command-Q.
For more information
The product documentation provides assistance for using Norton Confidential. You can find the information that you need on your computer and on the Web.
Accessing help
You can access a list of help topics by opening Norton Confidential help. To search for specific information, in the search field at the top of the help window, type the a search term, and then press Return.
To access help
4
Do one of the following:
1 To access a list of help topics, on the menu bar, click
Help, and then choose Norton Confidential Help.
1 To access the help for a current window or task,
click the Help button.
Getting started
For more information
20
Page 21
Opening the User Guide PDF
You can find the Norton Confidential User Guide on the CD in PDF format.
To open the User Guide PDF
1
Insert the CD into the optical disk drive.
2
Double-click the PDF.
You can also copy the PDF to your computer and read it from there.
To read the User Guide that you copied to your computer
1
Open the location into which you copied the PDF.
2
Double-click the PDF.
21Getting started
For more information
Page 22
Getting started
For more information
22
Page 23
About online support
Symantec offers a range of technical support and customer service options on the Internet at the following address:
http://service.symantec.com/techsupp/
On the Symantec support Web site, you can search our technical support knowledge base for help with technical issues, such as installing, configuring, or troubleshooting your Symantec product. You can also find help with subscriptions, rebates, registration, and other nontechnical issues.
The Symantec Web site contains answers to the most common customer questions.
w
If you received this product when you purchased your computer, your computer manufacturer may be responsible for providing your support.
About phone support
If you have a question or problem that you cannot resolve on the support Web site by yourself, the Web site provides a link to information about fee-based phone support. This support is available to all registered customers. Click the link for technical support. The online options display first, followed by the telephone contact options.
Service and support solutions
Page 24
Support for old and discontinued versions
When Symantec announces that a product will no longer be marketed or sold, telephone support is discontinued 60 days later. Technical information may still be available through the support Web site at the following address:
http://service.symantec.com
Subscription policy
This renewable service includes protection updates and new product features as available throughout the service period. Please note that features may be added, modified or removed during the service period.
Service period lengths vary by Symantec product. After your initial service period ends, you must renew your service subscription before you can update and use your protection. When you run LiveUpdate near the end of your service period, you are prompted to subscribe for a nominal charge. Simply follow the instructions on the screen to renew.
Worldwide service and support
Support solutions vary by country. For Symantec and International Partner locations that are outside of the United States, contact one of the service and support offices listed below, or connect to the following address and select your language:
http://service.symantec.com
Service and support solutions
Support for old and discontinued versions
24
Page 25
For each Region, please check the Web site for the appropriate phone number.
Contact informationRegion
1 Symantec Corporation
555 International Way Springfield, OR 97477 U.S.A.
http://www.symantec.com/
North America
1 Symantec Australia
Level 2, 1 Julius Avenue North Ryde, NSW 2113 Sydney Australia
http://www.symantec.com/region/reg_ap/
Australia and New Zealand
1 Symantec Ltd Consumer Services & Support
PO Box 5689 Blanchardstown Dublin 15 Ireland
http://www.symantec.com/region/reg_eu/
Europe, Middle East, and Africa
1 Symantec Brasil
Sevico e Suporte Symantec Caixa Postal 3037 CEP 06210-970 Brasil
1 Portuguese language support:
Internet: http://www.service.symantec.com/br/techsupp/
1 Spanish language support:
Internet: http://www.symantec.com/region/mx/techsupp/
Latin America
August 28, 2006
25Service and support solutions
Worldwide service and support
Page 26
Service and support solutions
Worldwide service and support
26
Page 27
A
accounts
administrator 10 checking type 10
C
CD, can't eject 12 close 19
D
directory 19 dock 19 double-byte character set
(DBCS) 14
G
getting started 19 guarded information, entering 14
H
Help
access 20 Symantec service and
support 23 how do 19 how do I get started 19 how to 19
I
installation
post-installation tasks 16 preparing for 9 Read Me 9 setup assistant 12 tasks 10
L
late breaking news 17 logins, checking 10
N
Norton Quickmenu 19
O
open 19
Q
quit 19
R
read me file 9 register your product 16
Index
Page 28
S
Service and Support 23 setup assistant 12 single-byte character set
(SBCS) 14 start 19 start Norton Confidential 19 stop 19 Symantec Solutions 19 Symantec Web site product
registration 16
T
Technical Support 23 troubleshooting
can't eject CD 12
technical support 23 turn off 19 turn on 19
U
User Guide PDF 20–21
Index28
Loading...