Symantec 11022527 User Manual

Page 1
6.0
Product Manual
Care for our Environment; It's the right thing to do.
Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual is made from recycled materials.
Page 2
Norton 360Product Manual
The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
Documentation version 6.0
Copyright © 2011 Symantec Corporation. All rights reserved.
Symantec, theSymantec Logo,LiveUpdate, Norton360, andNorton are trademarks orregistered trademarks ofSymantec Corporation or its affiliates in the U.S. and other countries. Portions of this product Copyright 1996-2011 Glyph & Cog, LLC. Other names may be trademarks of their respective owners.
The productdescribed inthis documentis distributed underlicenses restricting itsuse, copying, distribution,and decompilation/reverse engineering. No part of this document may be reproduced in any form byany meanswithout priorwritten authorizationof Symantec Corporation and its licensors, if any.
THE DOCUMENTATION ISPROVIDED AS ISAND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULARPURPOSE OR NON-INFRINGEMENT, AREDISCLAIMED, EXCEPT TOTHE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BELEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computersoftware asdefined inFAR 12.212and subject to restrictedrights asdefined inFAR Section52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. Commercial Computer Software and Commercial Computer Software Documentation, as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation bythe U.S.Government shallbe solely in accordance with the terms of this Agreement.
Symantec Corporation 350 Ellis Street, Mountain View, CA 94043
http://www.symantec.com
Page 3

Contents

Chapter 1 Getting Started . . . .. . . .. . . . .. . . .. . . .. . . ... . . .. . . .. . . .. 7
About Norton 360 . .. . . .. . . .. . . .. . . . .. . . .. . . .. . . . .. . . .. . 7
Activation protects you . . .. . . .. . . . .. . . .. . . .. . . . .. . . . 20
About your Norton Account . .. . . .. . . .. . . ... . . .. . . .. 24
About Norton Community Watch .. . .. . . . .. . . .. . . . 32
About Norton Bootable Recovery
Tool .. . . .. . . .. . . ... . . .. . . .. . . .. . . . .. . . .. . . .. . . . .. . . 34
About updating Norton 360 ... . . .. . . ... . . .. . . .. . . . 38
About Network Proxy Settings .. .. . . . .. . . .. . . .. . . . 48
About Norton 360 status . .. . . .. . . ... . . .. . . .. . . .. . . . . 52
Chapter 2 Monitoring your system's
performance .. .. . . .. . . .. . . ... . . .. . . .. . . .. . . . .. . 59
About System Insight .. . . .. . . .. . . ... . . .. . . .. . . .. . . . .. 59
Chapter 3 Maintaining total protection .. . . .. . . ... . . .. . . . 103
About total protection . . . .. . . .. . . .. . . . .. . . .. . . .. . . . 103
About keeping your computer secure .. . . .. . . .. . 104
About solving connection problems .. . .. . . .. . . . 106
About responding to emergencies . .. . . .. . . . .. . . . 106
About monitoring protection
features .. ... . . .. . . .. . . .. . . . .. . . .. . . .. . . . .. . . .. . . 108
About viewing details of system
vulnerabilities .. . .. . . .. . . .. . . . .. . . .. . . .. . . . .. . . 144
Chapter 4 Scanning your computer . . . .. . . .. . . .. . . . .. . . .. . 149
About the Norton 360 scans . . . . .. . . .. . . .. . . . .. . . . 149
About Computer Scan . . .. . . .. . . . .. . . .. . . .. . . ... . . .. 152
Page 4
Contents4
About Insight Network scan .. . .. . . .. . . .. . . ... . . .. 168
About Reputation Scan .. . . .. . . .. . . . .. . . .. . . .. . . ... 170
About Scan Facebook Wall . .. . . .. . . . .. . . .. . . .. . . .. 182
About SONAR Protection .. . . .. . . . .. . . .. . . .. . . . .. . . 185
About scanning Office documents ... . . .. . . ... . . . 189
About Silent Mode .. .. . . . .. . . .. . . .. . . ... . . .. . . .. . . .. 191
About boot time protection .... . . .. . . .. . . . .. . . .. . . 204
Running a scan at the command
prompt .. . .. . . .. . . .. . . . .. . . .. . . .. . . . .. . . .. . . .. . . . 205
Chapter 5 Responding to security issues . .. . ... . . .. . . .. . 209
What to do if a security risk is found . .. . . . .. . . . 209
Chapter 6 Understanding alerts and
messages . ... . . .. . . .. . . .. . . . .. . . .. . . .. . . . .. . . .. 219
About Norton 360 alerts and
messages ... . . .. . . .. . . ... . . .. . . .. . . .. . . . .. . . .. . . . 219
About managing messages and
alerts ... . . .. . . . .. . . .. . . .. . . ... . . .. . . .. . . ... . . .. . . 219
Types of risks .. . .. . . .. . . . .. . . .. . . .. . . . .. . . .. . . .. . . ... 221
Types of threats . .. . ... . . .. . . .. . . .. . . . .. . . .. . . .. . . ... 222
Types of viruses . .. . .. . . . .. . . .. . . .. . . . .. . . .. . . .. . . ... 223
Chapter 7 Doing routine tasks . .. . . .. . . .. . . ... . . .. . . .. . . .. . . 225
Turning on or turning off automatic
tasks . .. . . .. . . .. . . ... . . .. . . .. . . .. . . . .. . . .. . . .. . . . . 225
About custom task . .. . . .. . . .. . . . .. . . .. . . .. . . ... . . .. . 226
About scheduling automatic tasks . .. . . .. . . .. . . . 228
About scheduling backups .. . . .. . . .. . . . .. . . .. . . .. . 230
Specifying Idle Time Out duration . . ... . . .. . . .. . 231
Chapter 8 Keeping secure on the Internet . . . . .. . . .. . . .. 233
About the Smart Firewall .. .. . . . .. . . .. . . .. . . ... . . . 233
About Intrusion Prevention . .. . . .. . . . .. . . .. . . .. . . 260
About Download Insight .. . . .. . . .. . . . .. . . .. . . .. . . .. 269
About Norton AntiSpam . . . . .. . . .. . . .. . . . .. . . .. . . .. 279
About configuring POP3 and SMTP
ports . .. . . .. . . .. . . .. . . ... . . .. . . .. . . .. . . . .. . . .. . . .. 294
About Metered Broadband Mode . .. . ... . . .. . . .. . 296
Page 5
Chapter 9 Securing your sensitive data . .. . . .. . . .. . . ... . . 301
About securing your sensitive data . .. . . .. . . .. . . 301
Chapter 10 Protecting your home network . . ... . . .. . . .. . . 375
About the Network Security Map . .. . . . .. . . .. . . .. 375
Chapter 11 Keeping your PC tuned up .. .. . . . .. . . .. . . .. . . .. 401
About PC Tuneup . . .. . . .. . . . .. . . .. . . .. . . . .. . . .. . . .. . 401
About disk and file fragmentation .. .. . . .. . . .. . . 402
Optimizing your permanent disks
manually .. . . .. . . .. . . ... . . .. . . .. . . .. . . . .. . . .. . . .. 402
About using optimization efficiently . .. . . .. . . . . 403
About cleaning up disk clutter . . ... . . .. . . .. . . .. . . 404
Running a scan to clean up disk
clutter . .. . ... . . .. . . .. . . .. . . . .. . . .. . . .. . . . .. . . .. . . 405
Running Registry Cleanup .. .. . . .. . . .. . . ... . . .. . . . 406
Running Diagnostic Report .. . .. . . ... . . .. . . .. . . .. . 406
About Startup Manager ... . . .. . . .. . . . .. . . .. . . .. . . .. 407
Chapter 12 Protecting your media and data .... . . .. . . .. . 411
About Norton Backup and Restore . . . .. . . .. . . ... 411
About backups . .. . . . .. . . .. . . .. . . . .. . . .. . . .. . . ... . . .. . 412
About backup preparation . . . . .. . . .. . . .. . . . .. . . .. . 413
About backup set . . . .. . . ... . . .. . . .. . . .. . . . .. . . .. . . .. . 417
Backing up your files . .. . . .. . . .. . . . .. . . .. . . .. . . ... . . 446
Restoring files .... . . . .. . . .. . . .. . . ... . . .. . . .. . . .. . . . .. 447
About Norton Backup Drive . .. . . .. . . .. . . .. . . . .. . . 456
About solutions to the backup
problems . . . .. . . .. . . . .. . . .. . . .. . . ... . . .. . . .. . . .. . 460
About online backup considerations . .. . . .. . . .. . 464
Turning off or turning on backup . .. . . .. . . .. . . .. 469
Turning off or turning on backup setting
options .. . .. . . ... . . .. . . .. . . .. . . . .. . . .. . . .. . . . .. . . 471
5Contents
Chapter 13 Customizing settings ... . . .. . . .. . . ... . . .. . . .. . . .. 475
About Norton 360 Settings ... . . .. . . ... . . .. . . .. . . .. 475
Customizing Norton 360 Settings .. . . ... . . .. . . .. 480
Turning on or turning off Quick Controls
services ... . . ... . . .. . . .. . . .. . . . .. . . .. . . .. . . ... . . . 481
Page 6
Contents6
About Antivirus settings . . . .. . . .. . . .. . . . .. . . .. . . .. 482
About Firewall settings .. . .. . . .. . . .. . . . .. . . .. . . .. . . 506
About Norton AntiSpam settings . .. . . .. . . ... . . .. 515
About My Network settings . . .. . . .. . . ... . . .. . . .. . . 519
About backup settings . . . ... . . .. . . .. . . .. . . . .. . . .. . . 521
About Identity Protection settings ... . . .. . . .. . . . 524
About Task Scheduling settings . .. . . .. . . ... . . .. . 528
About Administrative Settings . . . .. . . .. . . .. . . ... . 532
Chapter 14 Finding additional solutions .. .. . . . .. . . .. . . .. . 553
Finding the version number of your
product .. . . .. . . .. . . ... . . .. . . .. . . .. . . . .. . . .. . . .. . . 553
Finding the End-User License
Agreement .. . . .. . . ... . . .. . . .. . . .. . . . .. . . .. . . .. . 554
About upgrading your product . .. . . .. . . ... . . .. . . . 554
About Norton Autofix . .. . . .. . . .. . . . .. . . .. . . .. . . ... . 557
Staying informed about protection
issues . .. . . .. . . .. . . ... . . .. . . .. . . .. . . . .. . . .. . . .. . . . 559
About Support . .. . . .. . . .. . . . .. . . .. . . .. . . ... . . .. . . .. . . 560
Uninstalling Norton 360 . .. . . .. . . .. . . ... . . .. . . .. . . 566
Index . .. . ... . . .. . . .. . . .. . . . .. . . .. . . .. . . . .. . . .. . . .. . . ... . . .. . . .. . . .. . . . .. . . .. . . . 569
Page 7

Getting Started

This chapter includes the following topics:
1 About Norton 360
1 Activation protects you
1 About your Norton Account
1 About Norton Community Watch
1 About Norton Bootable Recovery Tool
1 About updating Norton 360
1 About Network Proxy Settings
1 About Norton 360 status
1

About Norton 360

Norton 360 offers proven performance and delivers todays fastand light all-in-onesolution to protect your PC and all your online activities. It protects against viruses, worms, hackers, and botnet. With a single subscription, you can protect up to three PCs. It safeguards against online identity theft, protects important files, and keeps your PC tuned and running at peak performance.
Norton 360 is completely automated and easy to use. It works quietly in the background to maintain your overall system integrity with minimal effect on PC
Page 8
Getting Started
8
About Norton 360
performance. By offering an unmatched combination of performance and protection, Norton 360 helps you get themost out of your PCand your online experience.
About Norton 360 main window
The Norton 360 main window acts as a security management interface. You can access the main features and monitor the performance of your computer from the main window.
As you use your computer, Norton 360 monitors how well your computer and activities are protected from threats, risks, and damage. Norton 360 displays the protection statusof your computer in themain window.
Depending on the security status of your computer, at the top left of the Norton 360 main window, Norton 360 shows your System Status as Secure, Attention, or At Risk. If your system status is marked as Attention or At Risk, at the bottom of the main window, clickFix Now to resolve allthe security threats on your computer.
The options that are available in the main window summarize the most essential security and the productivity issues that challenge users. They are:
PC Security
Identity
Backup
Includes all virus, spyware, firewall, and other security features.
Includes the protection against phishing and fraudulent Web sites.
Includes the automatic and the customizable backups and restore capability.
Page 9
About Norton 360
9Getting Started
PC Tuneup
Includes the performance tuning features, such as cleaning up unwanted files and performing Registry Cleanup .
Depending on the security status of the different components of your computer, the status areas of the four protection categories are marked as Protected, Attention, or At Risk.
When the System Status or protection categories statuses are marked as At Risk or Attention, at the bottom of the main window, click Fix Now to resolve all the security threats on your computer.
Norton 360 also provides you easy links at the top of the main window to themost frequent tasks.They are:
Tasks
Settings
Lets you access the Tasks window to run general tasks, backup tasks, and PC Tuneup tasks.
Lets you access the Settings window to configure settings such as Firewall, Antispam, and Backup.
Page 10
Getting Started
10
About Norton 360
Performance
Feedback
Account
Support
Lets you open the Performance window in Norton 360.
The Performance window chronicles all installs, downloads, optimizations, detections, alerts, and instances of Quick Scan that occurred on your computer since installing Norton 360. The window also displays a detailed graphical representation of the CPU and memory usage by your Norton product.
Lets you give feedback about the Norton product that you use.
Lets you access the My Account window to manage your Norton Account.
Lets you access support options, product upgrade options, subscription status, and product version number.
You can also access the online Help from the Support drop-down menu. Help provides links to information that assists you with the specific tasks that you want to complete. The online Help guides you to configure all of the product features.
The bottom section of the Norton 360 main window provides you up-to-date virus and threat information.
Page 11
About Norton 360
When your system status is At Risk or Attention, this section automaticallyprovides youthe FixNow option to fix all the issues at once.
11Getting Started
Page 12
Getting Started
12
About Norton 360
The bottom section of the Norton 360 main window helps you do the following:
Activity Map
Page 13
About Norton 360
Lets you access the world map with hotspots of cybercrimes and the latest threats.
The Activity Map shows the top cities in the world where most of the cybercrime activities occur. These cities are represented as yellow dots on the map. You can click a continent in the world map to view its cities with the highest number of threats. The details on the Activity Map are updated from a Symantec server on a regular basis. Your computer must be connected to the Internet to receive the activity map updates.
You can view the date and time that the Activity Map was last updated. You can also use the Map Details link to get a brief idea of the Activity Map.
When you click Map Details, the Activity Map shows a series of latest viruses and threats that your product protects your computer from. You can use the info link next to each item to view its details in an overlay window. You can also use the View Details link in the overlay window to know more about the threat in a Symantec Web page.
13Getting Started
Page 14
Getting Started
14
About Norton 360
Manage
Mobile
Lets you access Norton Management.
Norton Management lets you manage your Norton products installed on all of your devices from one location. To sign up or to log into Norton Management, click the Manage icon at the bottom of the main window. You can use your existing Norton Account login information to access Norton Management. The Norton Management agent should be installed on each device that you want to add to Norton Management.
Norton Management
w
may not be available in some versions of Norton 360.
Lets you download the Norton Mobile Security for Android.
Norton Mobile Security helps protect your mobile devices against loss, theft, viruses, and other mobile threats. You can use Norton Mobile Security on all your devices that use the Android operating system.
Norton Mobile Security
w
may not be available in some versions of Norton 360.
Page 15
Online Family
About Norton 360
15Getting Started
Page 16
Getting Started
16
About Norton 360
Lets you monitor your childs activities on the Internet.
Norton Online Family
w
may not be available with some versions of Norton 360. In such case, you may not be able to access Norton Online Family options.
When you click Online Family icon on the main window, the bottom section of the Norton 360 main window displays Norton Online Family sign in options. Norton Online Family provides you advanced controls to monitor your child's online activities.
You can use the link on the bottom section of the Norton 360 main window to set up your account with Norton Online Family.
Symantec recommends that you use your Norton Account login credentials to sign in to Norton Online Family. If you register your product with your Norton Account, your Norton Account email address is auto-filled in the email address text box.
After you set up your account, you can sign in to your account on the bottom section of the Norton 360 main window and view your childs Internet activities. The bottom section of the Norton 360 main window shows details such as your childs
Page 17
About Norton 360
latest search terms, and the latest alerts. After you sign in, you can use the Get Details option in the bottom section of the Norton 360 main window to view more details on the Norton Online Family Web site.
17Getting Started
Page 18
Getting Started
18
About Norton 360
Safe Web
Page 19
About Norton 360
Lets you check the safety of a Web site.
You can also perform a safe search.
This option may not be
w
available with some versions of Norton 360. In such case, you may not be able to access this option.
When you click Safe Web icon on the main window, the bottom section of the Norton 360 main window displays Norton Safe Web options.
You can use the Check Site option in the bottom section of the Norton 360 main window to analyze the security levels of any Web site that you want to visit. When you type a Web site address in the text box and click Check Site, it shows the Symantecs ratings for the Web site.
You can use the Safe Search option in the bottom section of the Norton 360 main window to search for information on the Internet. The Norton Safe Search uses Ask.com to generate the search results. Norton Safe Search provides a site safety status and a Norton rating for each of the search results generated.
You can also use the View
recent Norton Safe Web
19Getting Started
Page 20
Getting Started
20

Activation protects you

Your activation status or subscription status appears at the bottom of the main window. You can use the Activate Now option to activate or subscribe your Norton product.
Activation protects you
Product activation protects users from pirated or counterfeit software. It protects you by limiting the use of a product to those users who have acquired the product legitimately. Product activation requires a product keyfor each installation of aproduct. You must activate the product within a limited time period after you install it.
If youare connected tothe Internet, product activation takes place automatically when you start the product for the first time after installation. After activation, the Norton Account window appears. You can create your Norton Account and register your product.
If you are not connected to the Internet, you can click Try Later in the Activation not complete window to start your product. The Activation window reappears every time you start your product until you activate your product. If you choosenot to activate at thattime, you receive an alert that reminds you to activate the product. Youcan also activateyour product by clicking the Trial Period Status link in the Norton 360 main window.
activity option in the bottom section of the Norton 360 main window to view the recent Norton Safe Web statistics on malicious sites and URLs. You can also view the list of new malicious URLs.
Page 21
If you do not activate the product within the time
w
period that the alert specifies, the product stops working. You can activate it after the time period has elapsed, but you are not protected until you activate the product.
Activating Norton 360
To use all of the features in Norton 360, you must first activate your product. Product activation reduces software piracy and ensures that you have authentic Symantec software. You can renew your subscription after the end of your subscription period.
If youare connected tothe Internet, product activation takes place automatically when you start the product for the first time after installation. During activation, the Norton Account window appears. You can create your Norton Account and register your product. You can also view details, such as your Product Key and recent updates to the product. If you skip the Norton Account window, the product is activated, but the Product Key is not saved in the Norton Account. You can print the Product Key for the future, if you need to reinstall your product.
If youdid not activateyour product during installation, Norton 360 prompts for activation each time you start the product. Also, you receive an activation alert regularly until you activate the product.
You mustactivate your product within the time period
w
that the alert specifies, oryour product stopsworking.
You can activate your product directly from the activation alert. You can also activate your product from the Trial Period Status link in the main window or from the My Account window. In some cases, you might need to enter your Product Key to activate your product. You canactivate or renew the subscription of your productfrom any non-admin user accountas well. Activation should take only a few minutes.
Activation protects you
21Getting Started
Page 22
Getting Started
22
Activation protects you
To activate Norton 360, your computer must be connected to the Internet. If you use a proxy server to connect to the Internet, you must configure the proxy settings. To configure proxy settings, goto the Norton 360 main window, and then click Settings >
Administrative Settings > Network Proxy Settings > Configure.
To activate Norton 360 from the alert
1
In the alert, click Activate Now or Renew Now.
2
Click OK.
3
Follow the on-screen instructions.
4
In the window that appears, click Done.
To activate your Norton 360 from the My Account window
1
In the Norton 360 main window, click Account.
2
In the My Account window, click Activate Norton 360 or Renew Subscription.
The Renew Subscription option is available if you have already activated your product.
3
Follow the on-screen instructions.
4
In the window that appears, click Done.
To activate your product from the main window
1
In the Norton 360 main window, do one of the following:
1 If you purchased a subscription version of a
retail product, click Activate Now.
1 If the productcame installed on your computer,
click Activate Online Now.
1 If you want to renew the subscription of your
product, click Renew.
2
Follow the on-screen instructions to activate or subscribe your product.
Where to find your product key
The productkey is aunique keythat helps youto install and activate the Symantec product on your computer.
Page 23
Activation protects you
The productkey isa 25-characteralphanumeric string that is shown in five groups of five characters each, separated by hyphens. The location ofthe product key varies depending on how you acquired the product.
The locations of the product key are as follows:
23Getting Started
If you purchased a retail copy of the product on CD
If you purchased the product on DVD
If you downloaded the product from the Symantec Store
If your computer came with the product already installed
If you received a product key card
The product key is either on a sticker on the CD sleeve or on an insert in the product package.
The product key is on the DVD package.
The product key is stored on your computer as part of the download process and is included in the confirmation email from the Symantec Store.
The product key is provided as part of the activation process. Be sure to save your product key by creating or signing in to your Norton Account, or by printing the key. You may need the product key if you ever want to reinstall your product.
The product key is printed on the card along with instructions on how to use it. Be sure to save your product key by creating or signing in to your Norton Account. You need the product key if you ever want to reinstall the product.
Page 24
Getting Started
24

About your Norton Account

If you are still unable to locate your product key, you can recover it using Norton Account
About problems during activation
If you cannot connect to the Symantec servers to activate your product, first check your Internet connection. You then need to see if you have parental control software, either installed or through your ISP, that might block the connection.
A connectivity problem can occur if you use parental control software. If you suspect that parental controls might block the connection, you can configure the parental controls so that they do not block the activation procedure. You need to log in to your parental control software or to the Internet through your ISP as an administrator to change your configuration.
If you use a proxy server to connect to the Internet, you must configure the proxy settings. To configure the proxy settings, go to theNorton 360 mainwindow, and then click Settings > Administrative Settings > Network Proxy Settings > Configure.
To recover or access your product key log on to https://account.norton.com. If you are not registered, register for Norton Account. You can find the product key on the Products tab in the Norton Account page.
About your Norton Account
When you create a Norton Account, you can manage all of your Norton products inone place. Youcan store your product keys in your Norton Account and also buy additionalproduct keys. Youcan alsoregister your product with the Norton Account. It takes only a few
Page 25
About your Norton Account
moments to create your Norton Account. You must be connected to the Internet to create a Norton Account.
After you create a Norton Account, you can access and manage your account information and product information from anywhere. It helps to reinstall your products and download the latest version of the products. If you install your producton more thanone PC, you can use the same Norton Account. To access your Norton Account, go to the following URL:
https://account.norton.com
You cancreate a Norton Account inthe following ways:
1 During activation
You can create your Norton Account and register your product from the Norton Account window that appears when you activate the product. You must provide your account information in the Norton Account window that appears.
1 Any time after activation
You can create a Norton Account from the Access Norton Account link available in the My Account
window.
25Getting Started
Page 26
Getting Started
26
About your Norton Account
After you log in to your Norton Account, you can manage your product information with the following options:
Products
Order History
Saves the information for all of the Norton products that you own.
The Products tab provides you the information about the Norton products that you own and the expiration date. You can click the arrow icon against a product for more information such as product key and the registration date. You can also buy a new product key to protect additional computers. You can use the Update option to check and download the latest product version using Norton Update Center.
Contains order information of the Norton products you bought from Norton online store.
Page 27
About your Norton Account
27Getting Started
Profile
Saves your account information and your billing details.
The Profile options are:
1 Account Information
You can update your Norton Account information and your shipping address on the Account Information tab. After you update, click Update to save the changes.
1 Billing Information
You can save your credit card information and your billing address on the Billing Information tab. It makes it easier for saving online orders. After you update, click Update to save the changes.
1 Change Password
You can change your current Norton Account password on the Change Password tab.
You can use the icons at the bottom of your Norton Account Web page to access and use the following:
Norton Online Family
Norton Online Family monitors and manages your child's Internet activities and computer usage.
Page 28
Getting Started
28
About your Norton Account
Norton Online Backup
Norton Safe Web
Norton.com
Norton Update Center
Norton Online Backup provides a secure and easy-to-use online backup solution that safeguards your important data against system crash, accidental deleting, virus infection, and other disasters.
Norton Safe Web checks the safety of a Web site and lets you perform a safe Web search.
The Symantec Web site provides more information about the various products of Symantec, the latest updates on Internet security, and various support options.
Norton Update Center checks and lets you download the latest version of your Norton product.
If you forget your Norton Account password, you can get a temporary password by clicking the Forgotyour password link in the Norton Account sign-in Web page. Youneed to provide your emailaddress. You need to use the same email address that you provided when you created your Norton Account. Symantec sends a temporary password to your email address. You can use the temporary password for a limited time period. You must reset your password after you log in to your Norton Account.
Page 29
Creating a Norton Account
Your Norton Account stores the product key and the billing information of your product. You can also register your product with the Norton Account.
In addition, Norton Account helps you to do the following:
1 Access the product key and other product
information when you need it.
1 Reinstall your Norton product.
1 Buy additionalproduct keys for your homeor office.
1 Check and download the latest version of the
product by using Norton Update Center.
1 Save online orders and update billing information.
1 Manage your online backup.
Your computer must be connected to the Internet to create a Norton Account. If you use a proxy server to connect to the Internet, you must configure the proxy settings. To configure the proxy settings, go to the Norton 360 main window, and then click Settings >
Administrative Settings > Network Proxy Settings > Configure.
You can also create a Norton Account when you activate your product. When you create your Norton Account fromthe product, your product getsregistered in your account. If you have an existing Norton Account, you can provide the same email address in the NortonAccount window in yourproduct. Thisway, you can register your current product and add it to the list of Norton products in your existing Norton Account. Ifyou upgrade your registered product to the latest available version, your product remains registered to the same Norton Account. In this case, you cancontinue using thesame NortonAccount login credentials.
Symantec products that are older than the 2006
w
product year do not appear in your Norton Account.
About your Norton Account
29Getting Started
Page 30
Getting Started
30
About your Norton Account
To create a Norton Account from the Norton Account Web page
1
In the Norton 360 main window, click Account.
2
In the My Account window, click Access Norton Account.
3
In theNorton Account Web page that appears, click Sign up now.
4
In the Norton Account Sign Up Web page, provide the details about your account information, and then click Sign Up.
To create a Norton Account and register your product after activation
1
In the Norton 360 main window, click Account.
2
In the My Account window, click Access Norton Account.
3
In theComplete Your Activation window, type your email address, and then click Next.
4
In theCreate your Norton Account window, provide your account details, and then click Next. Your productinformation gets saved in yourNorton Account only after you log in to your Norton Account.
5
In the window that appears, click Done.
To log in to your Norton Account and access your product information,visit https://account.norton.com.
Accessing your Norton Account
The product key for each Norton product is conveniently storedin your Norton Account. Afteryou have created your Norton Account successfully, you can access your account from anywhere in the world. You can log in to your Norton Account any time by visiting the following URL:
https://account.norton.com
You can easily find and update your account, product, and billing information from your Norton Account.
Page 31
About your Norton Account
You can also change your Norton Account password, if required. Your computer must be connected to the Internet to access your Norton Account.
Symantec products that are older than the 2006
w
product year do not appear in your Norton Account.
To access Norton Account
1
In the Norton 360 main window, click Account.
2
In the My Account window, click Access Norton Account.
3
In the Norton Account Web page that appears, type your emailaddress andpassword, and click SignIn.
Creating a temporary password for Norton Account
If youforget the password of yourNorton Account, you can create a temporary password to sign in to your Norton Account. The temporary password is sent to the email address that you provided when youcreated your Norton Account.
After you sign in to your Norton Account by using the temporary password,you are prompted to changeyour password.
To create a temporary password for Norton Account
1
In the Norton 360 main window, click Account.
2
In the My Account window, click Access Norton Account.
3
In theNorton Account Web page thatappears, under Forgot your password?, click Recover it here.
4
In the Forgot your Password Web page, verify the email addressthat is providedin theEmail Address text box, and then click Continue. A temporarypassword is sent to youremail address. You can use this temporary password to sign in to your Norton Account.
31Getting Started
Page 32
Getting Started
32

About Norton Community Watch

About Norton Community Watch
Norton Community Watch helps in identifying new security risks by submitting selected security and application data to Symantec for analysis. Symantec assesses the data to determine the new threats and their sources. The collective efforts from Norton security product users help in quick identification of solutions for these threats and risks. Norton Community Watchimproves usersecurity and product functionality. Inaddition, it helpsSymantec to analyze the execution, schedule, and efficiency of Norton-specific tasks and settings on your computer.
Norton Community Watch collects and submits the following types of data:
1 Identified malicious software such as portable
executable files and running processes
1 Any Web site URL that your product identifies as
fraudulent
1 All the Web site URLs that you visited before the
detection of a risk
1 The applications and processes that run on your
computer regularly and during any security risk detection
1 Response instances that your computer sends to
any potential security risk
1 General system information and performance
attributes from the computer
1 General information about your computer such as
idle time, standby, and screensaver settings
After thepotential security risksare assessed from the submitted data, Symantec sends the information back to Norton 360. The Norton features such as Norton Insight and Insight Network use this information to identify files and processes at risk.
You should participate in Norton Community Watch submissions to provide valuable contribution to the entire community that uses Norton security products.
Page 33
About Norton Community Watch
No personally identifiable information is exposed during data collection and submission. Symantec maintains an adequate level of protection for the collected information. The Detailed Error Data Collection option under Norton Community Watch in the AdministrativeSettings window lets you allow or deny the detailed data submissions. The detailed data mayvary depending on the Norton-specificerrors and components. You can configure the option to manage the data submissions.
Norton CommunityWatch collectsand submits detailed
w
data aboutthe Norton-specific errors and components only. It does not collect or store any personal information of any user.
If youchose notto join Norton Community Watchwhen you installed your Norton product, you can turn it on later. You can use the Norton Community Watch option in the Administrative Settings window. You can also review the data, which Norton Community Watch collects and submits to Symantec, in the Security History window.
Turning off or turning on Norton Community Watch
You can use the Norton Community Watch option to send information about a suspicious file to Symantec for analysis. Symantec assesses the data to determine the newthreats and their sources. TheNorton features such as Norton Insight and Insight Network use the Symantec assessed information to detect the security threats.
Norton CommunityWatch collectsand submits detailed
w
data aboutthe Norton-specific errors and components only. It does not collect or store any personal information of any user.
You canuse Security History to reviewthe information that has been sent to Symantec.
To turn off or turn on Norton Community Watch
1
In the Norton 360 main window, click Settings.
33Getting Started
Page 34
Getting Started
34

About Norton Bootable Recovery Tool

2
In the Settings window, under Detailed Settings, click Administrative Settings.
3
In the Administrative Settings window, in the Norton Community Watch row, do one of the
following:
1 To turnoff Norton CommunityWatch, move the
On/Off switch to the right to the Off position.
1 To turnon Norton Community Watch, movethe
On/Off switch to the left to the On position.
4
Click Apply.
About Norton Bootable Recovery Tool
Norton Bootable Recovery Tool scans and removes viruses, spyware, and other security risks from your computer. Your computer might be infected with a virus ifyou experienceany ofthe following symptoms:
1 You cannot install Norton 360.
1 You cannot start your computer.
1 Your computer is extremely slow.
Norton Bootable Recovery Tool is integrated with Windows Preinstallation Environment (WinPE). Therefore, youcan run Norton Bootable RecoveryTool only froma CD,DVD, orUSB key. You must use Norton Bootable Recovery Tool Wizard to create the Norton Bootable Recovery Tool CD, DVD, or USB key.
You cannot run Norton Bootable Recovery Tool in
w
WinPE for more than 72 hours. If you run Norton Bootable Recovery Tool for more than 72 hours, your computer restarts without any notification.
You can use the Norton Bootable Recovery Tool CD, DVD, orUSB key to recover a computer thatis infected with viruses and other security threats. This security program isnot a replacement for continuous,real-time protection from viruses and latest security risks. To protect your computer from future infections, be sure
Page 35
About Norton Bootable Recovery Tool
to installor continue using Norton 360that you already purchased.
Norton Bootable Recovery Tool detects and resolves the following security threats:
35Getting Started
Viruses
Trojan horses
Hacking tools
Spyware
Programs that infect another program, boot sector, partition sector, or document by inserting themselves or attaching themselves to that medium. Most viruses just replicate; many also do damage.
Programs containing malicious codes that are disguised as or hiding in something benign, such as a game or utility.
Tools that are used by a hacker to gain unauthorized access to your computer. One type of hacking tool, a keystroke logger, tracks and records your individual keystrokes and can send this information back to the hacker.
Programs that can scan systems or monitor activity and relay the information to other computers or locations in cyberspace.
Page 36
Getting Started
36
About Norton Bootable Recovery Tool
Adware
Trackware
Programs that facilitate the delivery of advertising content through their own window, or by using another program's interface.
Programs that track system activity, gather system information, or track user habits, and relay this information to third-party organizations. The information that is gathered by such programs is neither personally identifiable nor confidential. Trackware programs are installed with the user's consent, and may also be packaged as part of other software that is installed by the user.
Downloading the Norton Bootable Recovery Tool Wizard
If your attempt to install a Norton product fails, you can download the Norton Bootable Recovery Tool Wizard. This easy-to-use wizard helps you create Norton Bootable Recovery Tool on a CD, DVD, or USB key. You can use Norton Bootable Recovery Tool to scan your computer and remove any security threats that prevent successful installation.
It is recommended that you download and install Norton Bootable Recovery Tool Wizard on a computer that does not have any security threats and create Norton Bootable Recovery Tool. If you create Norton Bootable RecoveryTool on an infected computer,there is a chance that the recovery CD, DVD, or USB key might get infected.
Page 37
About Norton Bootable Recovery Tool
To use Norton Bootable Recovery Tool, you must use
w
the product key of the Norton product that you purchased. Ifyou usea trial version of Norton 360, you need to create a Norton Account to receive a product key to use Norton Bootable Recovery Tool.
You can download Norton Bootable Recovery Tool Wizard in one of the following ways:
1 From the Start menu.
1 From the Norton Support Web site.
To download the Norton Bootable Recovery Tool Wizard from the Start menu
1
On the Windows taskbar, do one of the following:
1 In WindowsXP, click Start > Programs > Norton
360 > Norton Recovery Tools.
1 In Windows Vista or Windows 7, click Start >
All Programs > Norton 360 > Norton Recovery
Tools.
2
Follow the on-screen instructions.
To download the Norton Bootable Recovery Tool Wizard from the Internet
1
Open your Web browser, and go to the following URL: http://www.norton.com/recoverytool_n360
2
Follow the on-screen instructions.
To download the Norton Bootable Recovery Tool Wizard from Norton 360
1
In the Norton 360 main window, click Scan Now.
2
In theComputer Scan pane, do oneof the following:
1 Click Quick Scan.
1 Click Full System Scan.
3
At the bottom of the scan window, next to If you think there are still risks, click click here.
4
In the Norton Rescue Tools Web page, click Download Norton Bootable Recovery Tool.
5
Follow the on-screen instructions.
37Getting Started
Page 38
Getting Started
38

About updating Norton 360

Using the Norton Bootable Recovery Tool
If the installation of yourNorton product fails, you can use the Norton Bootable Recovery Tool to scan and remove any security threats that prevent successful installation. If your computer is infected and you are not able to start your Windows operating system, you can use Norton Bootable Recovery Tool to remove threats and recover your computer.
Norton Bootable Recovery Tool is available on the product CD that you purchased. You can use the product CD as a recovery media.
To use Norton Bootable Recovery Tool, you must use
w
the product key of the Norton product that you purchased. Ifyou usea trial version of Norton 360, you need to create a Norton Account to receive a product key to use Norton Bootable Recovery Tool.
To use the Norton Bootable Recovery Tool
1
Insert the recovery media and start your computer from the recovery media. The recovery media can be a Norton Bootable Recovery Tool CD, DVD, USB key, or the product CD.
2
Read the Norton License Agreement, type your product key, and then click I Agree. If youuse a non-QWERTY keyboard, usethe Virtual Keyboard option to enter your product key.
3
In the Norton Bootable Recovery Tool window, click Norton Advanced Recovery Scan.
4
Click Start Scan.
5
After the scan is complete, remove the recovery media from the drive or USB port, and restart your computer.
About updating Norton 360
Norton 360 uses the Internet to automatically obtain updates to its virus definition files and its program
Page 39
files. Theseupdates continually enhance the technology that Norton 360 uses to keep your PC protected.
Automatic updates require an Internet connection. If you use a proxy server to connect to the Internet, you must configure the proxy settings in your product. If you do not normally keep your PC connected to the Internet, you can manually update Norton 360 after you connect to the Internet. Updating Norton 360 on a regular basis ensures that you have the latest definition updates and program updates.
About LiveUpdate
Symantec products download the latest definition updates andprogram updatesregularly from Symantec servers. Thedefinition updates protect your computer from the latest viruses and unknown security threats. Using the LiveUpdate technology, Symantec products help you to obtain and install these updates.
LiveUpdate takes little time to download and process the definition updates and program updates. You can choose Smart Definitions to minimize download time, installation time, and memory consumption as Smart Definitions area subset ofvirus definitions. The Smart Definitions option is availableon the Scansand Risks tab in the Antivirus settings window. You can cancel the LiveUpdate session at any time.
LiveUpdate obtains these updates for your computer by using your Internet connection. If your network uses proxy servers to connect to Internet, LiveUpdate uses the proxy settings in your product to download the latest updates. You can use the Network Proxy Settings option in the Administrative Settings window to configure the proxy settings of your network.
About updating Norton 360
39Getting Started
About Program and Definition Updates
LiveUpdate obtains program updates and definition updates for your computer by using your Internet connection.
Page 40
Getting Started
40
About updating Norton 360
w
Program updates are minor improvements to your installed product.These differfrom product upgrades, which are newer versions of the entire product. Program updates are usually created to extend the operating system or hardware compatibility, adjust a performance issue, or fix program errors. Program updates are released on an as-needed basis.
Some program updates may require that you restart your computer after you install them.
LiveUpdate automatesthe process of downloading and installing programupdates. It locates and obtains files from an Internet site, installs them, and then deletes the older files and downloaded definitions from the temporary folder after processing the updates.
Definition updates are the files that keep your Symantec productsup to date with thelatest antithreat technology. The definition updates that you receive depend on which product you use.
The type of definition updates that each of the Symantec products receive are as follows:
Norton AntiVirus, Norton AntiVirus Online
Users of these products receive the latest virus definitions from Symantec that protects your computer from all types of security threats.
Page 41
About updating Norton 360
41Getting Started
Norton Internet Security, Norton Internet Security Online
Norton 360, Norton 360 Online
In addition to the virus and security risk updates, users of these products receive definition updates for security protection. For the products that contain protection against phishing, users receive definition updates against phishing.
The security definition updates provide the latest predefined firewall rules, the updated lists of applications that access the Internet, Intrusion Prevention signatures, and Symantec spam definition files. These lists are used to identify unauthorized access attempts to your computer.
Users of these products receive the latest virus definitions from Symantec that protects your computer from all types of security threats.
In addition, users of these products receive Symantec spam definition files and definition updates against phishing.
Page 42
Getting Started
42
About updating Norton 360
Norton Security Suite, Norton Business Suite
About Smart Definitions
Norton 360 downloads and installs virus definitions regularly to protect your computer from the latest security threats.For fasterdownloads and installation purpose, Norton 360 classifies these virus definitions into two sets.
The virus definitions are classified into the following two sets:
Complete Set
Users of these products receive the latest virus definitions from Symantec that protects your computer from all types of security threats.
In addition, users of these products receive Symantec spam definition files and definition updates against phishing.
Contains all the virus definitions for each threat that is known to Symantec.
Page 43
About updating Norton 360
43Getting Started
Core Set
Contains the most important virus definitions that are required for latest security threats as viewed by Symantec.
The Core Set is a subset of the Complete Set, and it is approximately 30 percent smaller than the Complete Set. The Core Set minimizes download time, installation time, and system start time. It also occupies lesser amount of disk space as compared to the Complete Set virus definitions. Therefore, the Core Set results in faster performance of your computer.
The Core Set virus definitions are called as Smart Definitions. Norton360 provides the SmartDefinitions option to choose between Core Set virus definitions and Complete Set virus definitions for LiveUpdate sessions. Theoption is availableon theScans and Risks tab in the Antivirus settings window.
During Automatic LiveUpdate or each time that you run LiveUpdate manually, Norton 360 checks if the Smart Definitions option is turned on or off. It then downloads and installs the desired set of virus definitions based on the option settings. By default, the SmartDefinitions option is turnedon, whichmeans that theCore Set virus definitions aredownloaded and installed.
Turning off or turning on Smart Definitions
Smart Definitionsare a subset of virus definitions that contains most important definitions for the latest security threats.
As the Smart Definitions are of considerably smaller size, it results in lesser download time, lesser
Page 44
Getting Started
44
About updating Norton 360
installation time, lesser boot time, and lesser memory consumption. It also occupies lesser amount of disk space as compared to the full set of virus definitions. Therefore, Smart Definitions result in faster performance of your computer.
Norton 360 checks the Smart Definitions option settings during each LiveUpdate session. If the option is turned on, the Smart Definitions are downloaded and installed.If the option is turnedoff, all of the virus definitions are downloaded and installed.
To turn off or turn on Smart Definitions
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings, click Antivirus.
3
In the Antivirus settings window, click the Scans and Risks tab.
4
In the Smart Definitions row, do one of the following:
1 To turn off Smart Definitions, move the On/Off
switch to the right to the Off position.
1 To turn on Smart Definitions, move the On/Off
switch to the left to the On position.
5
In the Settings window, click Apply.
6
Click Close.
Turning off or turning on Automatic LiveUpdate
You can have LiveUpdate check for definition updates and product updates automatically on a set schedule, by turning on the Automatic LiveUpdate option. You can alsorun LiveUpdatemanually when the Automatic LiveUpdate option is turned on. However, you must run LiveUpdatemanually to obtain updates ifyou have turned off the Automatic LiveUpdate option.
To access the Automatic LiveUpdate option, go the Norton 360 main window and then click Settings > Antivirus > Antispyware and Updates. You can also
Page 45
About updating Norton 360
turn off or turn on the Automatic LiveUpdate option from Quick Controls in the Settings window.
If you are connected to the Internet, Automatic
w
LiveUpdate downloadsproduct updatesand definition updates everyhour. If youhave an Integrated Services Digital Network (ISDN) router that is set to automatically connectto your Internet service provider (ISP), itmay incur chargeseach time. If you donot want this setup, you can turn off the automatic connection on your ISDN router, or turn off the Automatic LiveUpdate option.
To turn on Automatic LiveUpdate from Quick Controls
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Quick Controls, check Automatic LiveUpdate.
To turn off Automatic LiveUpdate from Quick Controls
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Quick Controls, uncheck Automatic LiveUpdate.
3
In the Select the duration drop-down list, select how long you want to turn off Automatic LiveUpdate, and then click OK.
45Getting Started
Checking for updates manually
If youdisconnect yourPC from the Internet, Symantec recommends that you check for Norton 360 updates after you reconnect.
To check for updates manually
1
In the Norton 360 main window, click PC Security, and then click Run LiveUpdate.
2
In the Norton LiveUpdate window, when the LiveUpdate is completed successfully, click Close.
Checking for the latest virus and spyware definitions date
Virus definition files contain the information that allows Norton 360 to recognize and alert you to the
Page 46
Getting Started
46
About updating Norton 360
presence of a specific virus or security threat. Norton 360 showsthe date on which youlast updated the virus and spyware definitions.
You canalso check the latest virusdefinition date. The Definitions Update section in the PCSecurity Details window displays the status and date of the last virus definition updates.
To check for the latest virus and spyware definition date
1
In the Norton 360 main window, click PC Security, and then click View Details.
2
In the PC Security Details window, under DefinitionsUpdate, view thelatest virusdefinitions
details. The Status column shows the date on which you last downloaded and installed the latest definition updates.
About keeping your protection up to date
Definition updates are available to you as long as you maintain an active product status. The ways in which you can acquire the product and maintain your status are as follows:
If you purchased a subscription version of a retail product
The product includes a limited-time subscription to definition updates. When the subscription is due to expire, you are prompted to renew. Follow the on-screen instructions to complete your subscription renewal.
After your product expires, you cannot obtain updates of any kind and all the security features are turned off. If you do not renew your product, you are no longer protected against security threats. Though LiveUpdate continues to check for updates after expiration, you must renew your product to enable all the security features.
Page 47
About updating Norton 360
47Getting Started
If you purchased a product as a service, or it came installed on your computer
If you receive this service through your service provider
About Pulse Updates
In addition to the definition updates that Automatic LiveUpdate downloads, Norton 360 uses streaming technology to download the latest virus definitions. These downloads are called Pulse Updates. The Pulse Updates are lighter and faster than Automatic LiveUpdate. Theykeep yourcomputer secure from the ongoing threats that exist on the Internet. Pulse Updates protect you against the rapidly-changing environment ofsecurity threatswithout compromising your computer's performance. Pulse Updates should always be turned on to get the latest updates.
Pulse Updates checks for definition updates every 5 minutes. Ifdefinition updates are available, LiveUpdate downloads the streamed virus definitions. Pulse Updates provide the updates in between the full updates, which Automatic LiveUpdate downloads automatically every hour. Norton 360 merges the new stream that is downloaded with the last updates that are installed. The Pulse Updates downloads provide additional and fast protection for the latest threats in between thefull updates without disrupting youronline experience.
If you do not activate your service or renew your subscription, you cannot obtain updates of any kind and the software no longer functions.
Your product status is always active as long as your security service is active with your service provider.
If your security service is not active, you cannot obtain updates of any kind and the software no longer functions.
Page 48
Getting Started
48

About Network Proxy Settings

Even if you do not turn on Pulse Updates, LiveUpdate collects all the missed streams and, it updates your computer during full definition updates.
Turning off or turning on Pulse Updates
Pulse Updates provide frequent, lightweight updates every 5 minutes in between the full updates. Always ensure that the Pulse Updates option is turned on. It protects you from the latest threats without compromising yoursystem performance or disrupting your online experience.
You must be connected to the Internet to obtain latest definition updates by using Pulse Updates. You can turn on or turn off Pulse Updates only if Automatic LiveUpdate is turned on.
To turn off or turn on Pulse Updates
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings, click Antivirus.
3
In the Antivirus settings window, click Antispyware and Updates.
4
Under AutomaticLiveUpdate, in thePulse Updates row, do one of the following:
1 To turn off Pulse Updates, move the On/Off
switch to the right to the Off position.
1 To turn on Pulse Updates, move the On/Off
switch to the left to the On position.
5
In the Settings window, click Apply.
6
Click Close.
About Network Proxy Settings
A proxy server regulates access to the Internet, and prevents external computers from accessing your network. If you are on a network that uses a proxy server toconnect to the Internet, youcan provide proxy server details to Norton 360. Youcan use the Network
Page 49
About Network Proxy Settings
Proxy Settings window to specify the automatic configuration URL, the proxy settings, and the authentication details. Norton 360 uses the proxy settings and authentication details to connect to the Internet automatically, whenever required. For example, LiveUpdate uses the specified proxy server settings to retrieve updates. You mustensure that you specify the proxy server details for LiveUpdate to run successfully.
In some cases, your network uses an automatic configuration URL or script for managing Internet access. In this case, you must provide the URL of the required Proxy Automatic Configuration (PAC) file. A PAC filecontains the code that letsyour browser know about the proxy settings for different Web sites over the Internet.It also containsthe wordswhich you want to filter and block while you access the Internet. You can also choose the option that lets your browser to automatically detect the proxy settings. If you want your manual settings in the network, ensure that you disable the Automatic Configuration options.
49Getting Started
Page 50
Getting Started
50
About Network Proxy Settings
Network Proxy Settings window lets you specify the following settings:
Automatic Configuration
Lets you specify the automatic configuration URL or script to manage Internet access.
You have the following options:
1 Automatically detect
settings
Lets your browser detect the network settings automatically.
If you do not want to override your manual settings for network connections, you must disable this option.
1 Use automatic configuration
script
Lets your browser use the automatic configuration URL or script to manage Internet access.
Use the URL box to provide the HTTP URL or the script to the required PAC file (such as file://C:/Proxy.pac).
Page 51
About Network Proxy Settings
51Getting Started
Proxy Settings
Authentication
Lets you provide the details of your Proxy Settings.
Under Proxy Settings, check Use
a proxy server for your HTTP connections, and do the
following:
1 In the Address box, type the
URL or IP address of your proxy server.
1 In the Port box, type the port
number of your proxy server. You can specify a value from
1 to 65535.
Lets you connect to the Internet through a server that requires authentication.
Use the Username box and Password box to type the authentication details.
Configuring Network Proxy Settings
When youuse a proxy server toconnect to the Internet, you mustspecify the proxy server details.The Network Proxy Settings window lets you enter automatic configuration settings,proxy settings, and proxy server authentication settings. The Network Proxy settings let youconnect to theInternet whileyou perform tasks such asactivating the productor accessingthe support options.
To configure Network Proxy Settings
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings, click Administrative Settings.
3
In theNetwork Proxy Settings row, click Configure.
Page 52
Getting Started
52

About Norton 360 status

4
In the Network Proxy Settings window, do the following:
1 If youwant your browser to automaticallydetect
network connection settings, under Automatic Configuration, check Automatically detect settings.
1 If the proxy server requires an automatic
configuration URL, under Automatic Configuration, check Use automatic configuration script. Type the URL (such as file://C:/Proxy.pac) in the URL box.
1 If yournetwork uses a proxy server,under Proxy
Settings, check Use a proxy server for your HTTPconnections. In the Address box, type the
URL or IP address of your proxy server, and in the Portbox, type the port numberof your proxy server. You can specify a value from 1 to 65535.
1 If your proxy server requires a user name and
password, under Authentication, check I need authentication to connect through my firewall or proxy server. Type the user name in the Username box and password in the Password
box.
5
In theNetwork Proxy Settings window, click Apply.
About Norton 360 status
Norton 360 displays the security status of your computer at the top of the main window. Based on the security status of your computer, Norton 360 shows your systemstatus as Protected, Attention, orAt Risk.
The system status indicator displays one of the following statuses:
Protected
Indicates that your computer is protected from threats, risks, and damages.
Page 53
About Norton 360 status
53Getting Started
See “Responding to
security status indicators
on page 53.
Attention
At Risk
Indicates that your computer requires attention.
At the bottom section of the Norton 360 main window, click Fix Now to resolve the security threats on your computer.
Indicates that your computer is at risk.
At the bottom section of the Norton 360 main window, click Fix Now to resolve the security threats on your computer.
Norton 360displays individual securitystatus for each protection category, such as PC Security, Identity, Backup, and PC Tuneup. Based on the security status of the different components of your computer, the status areas of the four protection categories are marked as Protected, Attention, or At Risk.
When your system status or protection categories statuses are marked as At Risk or Attention, at the bottom section of the Norton 360 main window, click Fix Now to resolve all the security threats on your computer.
Responding to security status indicators
When your system encounters a threat or a risk, the product displays the security status at the top of the main window.When a status indicator displaysa status, you can take appropriate action to improve your protection status. Your protection is based on the programs that are installed on your computer. To improve your protection status, ensure that your installed programs are up to date.
Page 54
Getting Started
54
About Norton 360 status
When your system status or protection categories statuses are marked as At Risk or Attention, you can resolve the security issues directly from the main window.
To respond to security status indicators
1
In the Norton 360 main window, click Fix Now.
2
Follow the on-screen instructions.
About the Norton 360 icon
When you install Norton 360, it places an icon in the notification area at the far right of the taskbar. This icon indicates the current security status of your computer. Norton360 displaysan animatedicon when it activelyfixes any issuesor wants to inform youabout any warning or urgent issues.
You can see the following representations of Norton 360 icon in the notification area:
Icon with a green check mark badge
Icon with an orange exclamation mark badge
Icon with a red cross mark badge
Icon with a crescent-shaped edge
Represents that your computer is fully protected
Represents that there are some issues against your computer protection that require your attention
Represents that there are some urgent issues against your computer protection that require immediate resolution
Represents that the Silent Mode feature is turned on
This icon also displays the current protection status badge.
Page 55
You can right-click the icon to see a shortcut menu for Norton 360.You can choose items onthe shortcutmenu to open the Norton 360 window, to fix any issues that Norton 360 detects, or to get additional help.
About Norton 360 shortcut menu
Norton 360 works in the background to keep your PC secure. The Norton 360 icon is available in the notification area at the far right of the taskbar. The icon reassures you that your protection is up to date. It changes its color if any change in status occurs.
The messages that appear in the notification area may require aresponse from you, such asopening awindow. More often, messages inform you about current activities, and they disappear after a few seconds.
You can right-click the Norton 360 icon to access specific Norton360 activities. Depending on thecurrent activities, your options include the following:
About Norton 360 status
55Getting Started
Open Norton 360
Run QuickScan
Run LiveUpdate
Use this option to launch the Norton 360 main window to complete tasks, view current status, or access other features.
Use this option to run a Quick Scan to protect possible virus-infected areas of your computer.
Use this option to run LiveUpdate to check for definition updates and program updates.
Page 56
Getting Started
56
About Norton 360 status
Run Backup Now
View Recent History
Get Support
Turn on/Turn off Silent Mode
Enable/Disable Smart Firewall
Enable/Disable Antivirus Auto-Protect
Check for New Version
Use this option to create a backup of your files.
You can specify when and how often Norton 360 backs up your files.
Use this option to review the information about the security events for all of the categories.
Use this option to resolve your problem easily using Norton Autofix.
Use this option to turn on or turn off Silent Mode.
Use this option to turn on or turn off the firewall.
Use this option to turn on or turn off Antivirus Auto-Protect.
Use this option to check and download the latest version of the product.
Viewing details of protection features
In theNorton 360main window, you can seea summary of eachof the four protection featuresthat Norton 360 provides. You can view additional details about each protection feature.
Page 57
About Norton 360 status
To view details of a protection feature
1
In the Norton 360 main window, click on a protection feature, and then click View Details. In the window that appears, you can view the following details:
1 The current status of the protection feature.
1 A list of the checks that the feature performs,
and the results of each check. In some cases, the
results ofa check caninclude a link that provides
additional information.
1 A list of actions that you can perform.
2
After you view details, click Close.
57Getting Started
Page 58
Getting Started
58
About Norton 360 status
Page 59

Monitoring your system's performance

This chapter includes the following topics:
1 About System Insight

About System Insight

Norton 360 continuously monitors your computer to keep itfree ofany problems and run at peak efficiency. Norton 360 constantly scans the vital areas of your computer includingmemory, registrykeys, and running processes. It monitors the important activities such as general file operation, network traffic, and Internet browsing. In addition, Norton 360 ensures that the activities that it performs on your computer do not degrade the overall performance of your computer.
System Insight provides you a centralized location where youcan viewand monitorthe activitiesthat you perform on your system. System Insight displays such information in the Performance window.
You canuse the Performance window for the following:
1 To view monthly history of the important system
activities that you performed orthat occurred over a period of the last three months.
The Events graph that appears at the top of the window provides a pictorial representation of important system activities. The activities include application installations, application downloads, disk optimizations,threat detections,performance
2
Page 60
Monitoring your system's performance
60
About System Insight
alerts, or Quick Scans. The graph displays the activities as icon or stripe, and the description for each icon or stripe is provided at the bottom of the graph. Thepop-up that appears when youmove the mouse pointerover an icon provides youthe details about the activity. The View Details link in the pop-up lets you view additional details about the activity in the Security History window. You can use thetabs at thetop of the graph toobtain details for the current month and details for the last two months.
1 To rearrange the organization of files on your
computer. Optimizing your system helps you maximize the
usable free space on a disk by grouping files based on how they are accessed. The Optimize option at the top of the Events graph lets you defragment your system.
1 To viewand analyzethe effectof Norton360 on the
performance of your computer. The Performance graph that appearsat the bottom
of the window provides a graphical representation of yourCPU usageand memory usage. The CPU tab displays agraph that represents the overall system CPU usage and Norton-specific CPU usage. When you click at any point on the CPU graph and memory graph, Norton 360 displays a list of the processes thatconsume maximumresources at that point. It also displays the percentage of usage for each process. You can click a process that is available in the list to get more information about the process in the File Insight window. The Memory tab displays a graph that represents overall memoryusage and Norton-specific memory usage. You can select any of the Zoom options to obtain magnified view or historical data of the graphs.
1 To view the details of Norton-specific jobs that are
currently running in the background
Page 61
About System Insight
The NortonTasks window provides thedetails such as the timestamp, the duration, and the status of the background jobs. The details also include the type of power the job needs to run and if a job ran during idle time. You can select different power sources for thebackground jobs. You can also start or stop a background job at any time.
1 To view details about the known good files and the
known bad files The NortonInsight Network window lets you view
the total number of files that Symantec analyzes within the Norton Community. You can also view the total number of computersthat are availablein the community to provide the data. You can view the number of trusted files that are available on your computer.
1 To view the details of the Files of Interest
The NortonInsight - Application Ratings window provides details on the trust level, prevalence, resource usage, and stability ratings for the Files of Interest.
You can use the Performance Monitoring option to monitor the performance of your computer. To access the PerformanceMonitoring option, go to the Norton 360 main window, click Settings > Administrative Settings > Performance Monitoring.
61Monitoring your system's performance
Accessing the Performance window
System Insight provides you a centralized location where youcan view and monitor yoursystem activities. System Insight displays such information in the Performance window. You canaccess the Performance window to view details about the important system activities, CPU usage and memory usage, and Norton-specific background jobs. You can also view Norton Insight details and defragment your boot volume.
Page 62
Monitoring your system's performance
62
About System Insight
To access the Performance window
4
In theNorton 360 main window, clickPerformance.
About monitoring system activities
System Insight provides information about the important systemactivities that you performed orthat occurred overa period of the lastthree months. System Insight displays the information in the Performance window. The Events graph at the top of the Performance window displays each activityas icon or stripe. The description for each icon or stripe appears at the bottom of the graph. You can use the tabs at the top ofthe graph toobtain details for the currentmonth and for the last two months. The activities include:
Installs
Provides the details about the installation activities that you performed on your system over a period of the last three months
The details include the application that you installed, the date on which you installed the application, and the total number of installations on that date.
Page 63
About System Insight
63Monitoring your system's performance
Downloads
Optimized
Detections
Provides the details about the application-download activities that you performed on your system over a period of the last three months
The details include the date on which you downloaded a file and the total number of downloads on that date. You can click the file name link to view additional details about the downloaded file such as the Download Insight report, file name, reputation level, and recommended action.
Indicates the optimization activities that you performed on your system over a period of the last three months
Provides the details about the threat detection activities that Norton 360 performed on your system over a period of the last three months
The details include the date on which Norton 360 detected a threat and the total number of threats that Norton 360 detected on that date. The View Details link provides additional details about the risk such as the risk impact and the origin of the risk. The details also include the action that a threat has performed on your system and the action that Symantec recommends you to resolve the threat.
Page 64
Monitoring your system's performance
64
About System Insight
Alerts
Quick Scans
Provides the details about the performance alerts that Norton 360 displayed over a period of the last three months
The details include the monitored date and the number of performance alerts generated. The View Details link provides additional details about performance-related activities, program name, program location, and system resources utilization.
Provides the details about Quick Scans that Norton 360 performed on your system over a period of the last three months
The details include the date on which a Quick Scan was performed and the number of Quick Scans that were performed on that date. The View Details link provides additional details such as the scan time, total items scanned, total risk detected, total risks resolved, and recommended action.
Viewing details of your system activities
System Insight lets you view details of the system activities thatyou performedor thatoccurred overthe last three months in the Performance window. The activities include application installations, application downloads, disk optimizations, threat detections, performance alerts, or Quick Scans. You can use the tabs at the top of the Events graph to obtain details for the current month and for the last two months. The
Page 65
Events graph at the top of the Performance window displays each activity as iconor stripe. The description for each icon or stripe appears at the bottom of the graph. The pop-up that appears when you move the mouse pointer over an icon provides you the details about theactivity. The detailsinclude thedate on which an activity was performed and the number of such activities that you performed on that date. The View Details link provides additional details of the activity in the Security History window.
To view details of your system activities
1
In theNorton 360 main window, clickPerformance.
2
In thePerformance window, at the top ofthe Events graph, click the tab for a month to view the details.
3
In the Events graph, move the mouse pointer over the icon or the stripe for an activity.
4
In the pop-up that appears, view the details of the activity.
5
If the View Details option appears in the pop-up, click View Details to view additional details in the Security History window.
About performance alerting
Norton 360 monitors your system performance. If it detects an increased usage of system resources by any program or process, it notifies you with performance alerts. Performance alerting works only when the
Performance Monitoring option and Performance Alerting option are turned on.
Performance alerting notifies you with information about the program name and resources that the program uses excessively. The Details& Settings link in the performance notification alert lets you view additional details about the resource consumption by the program. The File Insight window opens and displays the details of thefile, the originof the file, the process ID, and the complete resource usage list of the program. Fromthe FileInsight window, you canchoose
About System Insight
65Monitoring your system's performance
Page 66
Monitoring your system's performance
66
About System Insight
to excludethe program frombeing monitored.You can use the Settings option in the File Insight window to turn off the Performance Alerting option.
Performance alerts are not displayed when your
w
computer is idle or in Silent Mode.
For each system resource, such as CPU, memory, and hard disk, there is a resource consumption threshold defined. Whenthe resource consumptionof a program exceeds the defined threshold limit, Norton 360 alerts you with a performance alert.
You can use the Resource Threshold Profile for Alerting option to configure the threshold limit. To access the Resource Threshold Profile for Alerting option, go to the Norton 360 main window, and then click Settings > Administrative Settings >
Performance Monitoring > Resource Threshold Profile for Alerting.
You can use the Use Low Resource Profile On Battery Power option to let Norton 360 automatically change
the resource threshold profile to low when your computer runs on battery power.
You can use High-Usage Alert for option to configure Norton 360 to alert for high usage of CPU, memory, disk, and handles.
In addition, you can add programs to the Program Exclusions list using the Program Exclusions option. When you add a program to the Program Exclusions list, Norton 360 does not alert you when the program exceeds the defined resource consumption threshold limit.
You can view all the performance-related logs under the Performance Alert category in the Security History window.
Page 67
Configuring performance alerts
You can use the Performance Alerting option to receive performance alertswhen there is anincreased usage of system resources by any program or process.
You can use the following options to configure performance alerts:
About System Insight
67Monitoring your system's performance
Off
On
Turns off performance alerts.
Select this option if you do not want Norton 360 to notify you with performance alerts.
Turns on performance alerts.
Select this option if you want Norton 360 to notify you with performance alerts when a program or process exceeds the threshold limit of the system resource usage.
By default, the Performance Alerting option is turned on.
Page 68
Monitoring your system's performance
68
About System Insight
Log Only
Monitors and records the system resource usage.
Select this option if you want Norton 360 to only monitor the system resource usage of every program or process running on your computer.
When a program or process exceeds the threshold limit of the system resource usage, Norton 360 records these details in the Security History window. You can view the details that are related to performance alerts under Performance Alert category in the Security History window.
To configure performance alerts
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings, click Administrative Settings.
3
Under Performance Monitoring, in the PerformanceAlerting row, doone ofthe following:
1 To turn off performance alerts, move the
PerformanceAlerting switch tothe Off position.
1 To turn on performance alerts, move the
PerformanceAlerting switch to the On position.
1 To suppress the performance alerts, move the
Performance Alerting switch to the Log Only position.
Page 69
4
Under High-UsageAlert for, doone of the following:
1 If you want Norton 360 to monitor the CPU
usage, move the CPU switch to the left to theOn
position.
1 If you want Norton 360 to monitor the memory
usage, move the Memory switch to the left to
the On position.
1 If you want Norton 360 to monitor the disk
usage, movethe Diskswitch tothe left to the On
position.
1 If you want Norton 360 to monitor the handle
count, move the Handles switch to the left to
the Onposition. Bydefault, this option is turned
off.
5
Click Apply, and then click Close.
Configuring the resource threshold profile
The threshold limit for the system resources determines at which point Norton 360 should notify you withperformance alerts.When a specific program exceeds the threshold limit of using your system resource, Norton 360 notifies you with a performance alert.
To configure the resource threshold profile
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings, click Administrative Settings.
About System Insight
69Monitoring your system's performance
Page 70
Monitoring your system's performance
70
About System Insight
3
Under Performance Monitoring, in the Resource Threshold Profile for Alerting row, select one of
the following options:
Low
Medium
High
4
Click Apply and then click Close.
Configures a low threshold limit for alerting.
Symantec recommends you to select this option when your computer runs on battery power.
Configures a medium threshold limit for alerting.
By default, the threshold limit is set to medium.
Configures a high threshold limit for alerting.
Symantec recommends you to select this option when your computer runs tasks that require high resource.
Turning off or turning on the Use Low Resource Profile On Battery Power option
When your computer runs on battery power, it is important that all active software programs consume minimum resourceusage. Byreducing resource usage, your computer gains longer battery life and becomes more energy efficient.
You can configure a low threshold profile and ensure that all programs consume minimum resource usage. When the resource usage of a program or a process exceeds the low threshold limit, Norton 360 notifies you with a performance alert. You can choose to close
Page 71
About System Insight
the program or the process manually and free the resource.
If the Use Low Resource Profile On Battery Power option isturned on,Norton 360automatically changes the threshold profile to low when your computer runs on battery power. By default, this option is turned on.
Symantec recommends that you keep the Use Low
w
Resource Profile On Battery Power option turned on.
To turn off the Use Low Resource Profile On Battery Power option
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings, click Administrative Settings.
3
Under Performance Monitoring, in the Use Low Resource Profile On Battery Power row, move the On/Off switch to the right to the Off position.
4
Click Apply, and then click Close.
To turn on the Use Low Resource Profile On Battery Power option
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings, click Administrative Settings.
3
Under Performance Monitoring, in the Use Low Resource Profile On Battery Power row, move the On/Off switch to the left to the On position.
4
Click Apply, and then click Close.
71Monitoring your system's performance
Excluding programs from performance alerts
Norton 360 lets you exclude programs from performance alerts. You can add the programs that consume high CPU, memory, or disk usage to the Program Exclusions list. When you add a program to the ProgramExclusions list, Norton 360 does not alert you when the program exceeds the resource consumption threshold limit.
Page 72
Monitoring your system's performance
72
About System Insight
To exclude a program from performance alerts
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings, click Administrative Settings.
3
Under Performance Monitoring, in the Program Exclusions row, click Configure.
4
In the Program Exclusions window, click Add.
5
In the Select a program dialog box, browse to the executable file for the program that you want to add.
6
Click Open.
7
In the Program Exclusions window, click Apply.
8
Click OK.
9
In the Settings window, click Apply.
10
Click Close.
Removing programs from Program Exclusions
The ProgramExclusions window lists allthe programs that areexcluded from performance alerts. Ifyou want, you can remove any of the programs that you already added to the Program Exclusions window. When you remove a program, the program appears in the performance alert the next time it crosses the defined threshold limit for resource consumption.
To remove a program from Program Exclusions
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings, click Administrative Settings.
3
Under Performance Monitoring, in the Program Exclusions row, click Configure.
4
In the Program Exclusions window, select the program that you want to delete, and then click Remove. To remove all the programs available in the Program Exclusions window, click Remove All.
5
In the Program Exclusions window, click Apply
Page 73
6
Click OK.
7
In the Settings window, click Close.
About CPU graph and memory graph
Norton 360 monitors the overall system CPU usage and memory usage and the Norton-specific CPU usage and memory usage. Norton 360 displays the details in the CPU graphand the memory graph. The CPU graph and memory graph are real-time graphs of CPU utilization and memory utilization.
The graphs display a performance time for the last 90 minutes or for the duration since you started your computer. The graphs update the information at an interval ofevery 15 seconds. The graphsprogress from right to left, and the most recent data appear on the far right of the graph. The blue pattern in the graphs depicts theoverall system usage, and theyellow pattern depicts theNorton-specific usage. Thegray blocksthat are labeled as Idle indicate the idle period of your computer. The gray blocks include the period when your computer is in shutdown, sleep, or log out state.
The graphs show a default performance time of 90 minutes. However, you can use the Zoom options to define a region of the graph that you are interested to view. Youcan select a Zoom option to obtain magnified view or historical data of the graphs. For example, if you select the 10min option, Norton 360 displays the magnified view of CPU graph or memory graph for the last 10minutes. If youselect the 1D option, Norton 360 displays a historical data of the last one day.
When you click at any point on the CPU graph or memory graph, Norton 360 displays a list of the processes that consume maximum resources at that point. It alsodisplays the percentage ofusage for each process. You canclick a process that is available inthe list toget more informationin the File Insight window.
The File Insight window provides information about the process such as:
About System Insight
73Monitoring your system's performance
Page 74
Monitoring your system's performance
74
About System Insight
1 The file name, version number, digital signature,
the date on which the process was installed.
1 The date on which the process was last used and
whether it is a startup file.
1 The stability details.
1 The confidence level.
1 The resource usage details.
1 The actions that the process performs on your
system.
In addition, the File Insight window displays the CPU graph and the resource usage details for the running processes. The graph shows the breakdown of overall system CPU usage and the CPU usage by the process.
Viewing the CPU graph and memory graph
Norton 360 monitors the overall system CPU usage and memory usage and the Norton-specific CPU usage and memory usage. The CPU tab and the Memory tab at the top of the Performance graph display the CPU graph and the memory graph respectively.
The Zoom options provide you the magnified view of the CPU graph and memory graph. For example, if you select the 10min option, Norton 360 displays the magnified view of CPU graph or memory graph for the last 10 minutes. If you select the 1W option, Norton 360 displays the CPU graph and memory graph for the last one week.
By default, the graphs display performance time for
w
the last 90 minutes.
To view CPU graph and memory graph
1
In theNorton 360 main window, clickPerformance.
Page 75
About System Insight
2
In thePerformance window, doone of the following:
1 To view the CPU graph, click the CPU tab.
1 To view the memory graph, click the Memory
tab.
1 To magnify or shrink the graph, click 10min,
30min, 1D, 1W, or 1M next to the Zoom option.
Obtaining historical data of your CPU and memory usage
The Zoom options also provide you the historical data of the CPU graph and memory graph. For example, if you select the 1D option, Norton 360 displays thedata of CPU graph or memory graph for the last one day.
To view historical data of your CPU or memory usage
1
In theNorton 360 main window, clickPerformance.
2
In thePerformance window, doone of the following:
1 To view the CPU graph, click the CPU tab.
1 To view the memory graph, click the Memory
tab.
3
Do one of the following:
1 To obtain historical data for the last one day,
click 1D.
1 To obtain historical data for the last one week,
click 1W.
1 To obtain historical data for the last one month,
click 1M.
75Monitoring your system's performance
Identifying resource-consuming processes
You canclick at any point onthe CPU graph or memory graph to obtain a list of top three processes that consume maximumresources of your computer at that point. You can click a process that is available in the list to get more information about the process in the File Insight window.
To identify resource-consuming processes
1
In theNorton 360 main window, clickPerformance.
Page 76
Monitoring your system's performance
76
About System Insight
2
In thePerformance window, doone of the following:
1 To view the CPU graph, click the CPU tab.
1 To view the memory graph, click the Memory
3
Click at any point on the graph to obtain a list of resource-consuming processes.
4
Click the name of a process to obtain additional information about the process in the File Insight window.
About optimization
The datastorage space ona disk is divided intodiscrete units. These units are called clusters. When files are written to the disk, they are broken up into cluster-sized pieces. When all of the file pieces are located in adjacent or contiguous clusters, the file can be accessed quickly.
Your computers hard disk stores all of your files, applications, and the Windows operating system. The bits of information that make up your files gradually spread over the disk. This process is known as fragmentation. The more that you use your computer, the more fragmented the hard disk gets.
When a fragmented file is accessed, the disk performance is slower. The performance is slower because the drive head locates, loads,saves, and keeps track of all of the fragments of the file. If free space is also fragmented, the drive head might have to track adequate free space to store temporary files or newly added files.
Optimization rearranges file fragments into adjacent or contiguous clusters. When the drive head accesses all of the file data in one location, the file is read into the memory faster. Optimization also maximizes the usable freespace on a disk bygrouping most frequently used files and infrequently used files. Optimization consolidates free space to avoid fragmenting newly added files. It adds extra space after major data
tab.
Page 77
structures so that they can grow without immediately becoming fragmented again.
You can optimize your boot volume manually by using the Optimize option in the Performance window.
You canalso configure Norton 360 todefragment your boot volumeor the local disk thatcontains boot volume when your computer is idle. Norton 360 automatically schedules the optimization when it detects the installation of an application on your computer. The optimization process starts next time when your computer is idle.
You can use the Idle Time Optimizer option in the Administrative Settings window to optimize the boot volume during idle time.
Optimizing your boot volume
The Optimize option lets you optimize your boot volume to improve the boot time of your computer. Optimization ofyour bootvolume maximizes the usable free space by rearranging file fragments into adjacent and contiguous clusters. When the drive head of your hard disk accesses all of the file data in one location, the file is read into the memory faster.
When you use the Optimize option in Windows XP, Norton 360 optimizes only the boot volume (for example, C:\Windows).Therefore, it requires less time to complete optimization. However, when you use the Optimize option in Windows Vista or Windows 7, Norton 360 optimizes the drive that contains the boot volume. Therefore, it requires more time to complete optimization.
You can access the Optimize option at the top of the security statusgraph in the Performance window. You can also optimize your boot volume using the Insight
Optimizer option in the Norton Tasks window. The Insight Optimizer row in the background jobslist that
is available in the Norton Tasks window displays the details of the boot volume optimization process. You
About System Insight
77Monitoring your system's performance
Page 78
Monitoring your system's performance
78
About System Insight
can view details such as timestamp, duration, and status of the background job.
To optimize your boot volume from the Performance window
1
In theNorton 360 main window, clickPerformance.
2
In the Performance window, at the top of the security status graph, click Optimize.
To optimize your boot volume from the Norton Tasks window
1
In theNorton 360 main window, clickPerformance.
2
In the Performance window, click Norton Tasks.
3
In the Norton Tasks window, under the Norton Tasks column, click the play icon that appears before Insight Optimizer.
About the Idle Time Optimizer
Idle Time Optimizer lets you configure Norton 360 to defragment your boot volume or the local disk that contains boot volume when your computer is idle. Norton 360 automatically schedules the optimization when it detects the installation of an application on your computer and your computer is idle. If you start using your computer again, Norton 360 stops the optimization task, and starts optimizing the next time that your computer is idle. This way, the background job of optimization does not affect the performance of your computer.
Optimization rearranges file fragments into adjacent or contiguousclusters inthe harddisk. It improves the computer performance by reading the files into the memory faster.Optimization alsomaximizes the usable free space on a disk by grouping most frequently used files and infrequently used files. In addition, it consolidates free space to avoid fragmenting newly added files.
You must turn on the Idle Time Optimizer option under AdministrativeSettings in the Settingswindow
Page 79
About System Insight
to optimize the boot volume during idle time. By default, this option is turned on.
Turning off or turning on Idle Time Optimizer
Norton 360 automatically schedules the optimization when it detects the installation of a new application on your computer. Norton 360 runs this optimization only when your computer is idle.
You canuse the Idle Time Optimizer option to optimize the bootvolume during idletime. Bydefault, this option is turned on.
To turn off Idle Time Optimizer
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings, click Administrative Settings.
3
In the Idle Time Optimizer row, move the On/Off switch to the right to the Off position.
4
Click Apply, and then click Close.
To turn on Idle Time Optimizer
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings, click Administrative Settings.
3
In the Idle Time Optimizer row, move the On/Off switch to the left to the On position.
4
Click Apply, and then click Close.
79Monitoring your system's performance
About the Norton Tasks
The NortonTasks window provides aninterface where you can view and monitor all Norton-specific background tasks. Norton 360 runs most of the background tasks when your computer is idle. The Norton Tasks window provides the details of the background tasks that Norton 360 performs.
The details include:
1 The name of the Norton task
Page 80
Monitoring your system's performance
80
About System Insight
You can use the icon that appears before the name of a background job to start or stop a background task. Youcan startor stopa background task at any time.
1 The timestamp of the Norton task
You can view details such as the date on which the background job last ran and the time. These details help you decide whether tostart a backgroundtask or wait for Norton 360 to run the job during idle time.
1 The duration of the Norton task
You can view the length of time that a Norton task ran the last time. The details also help you determine the length of time a background task takes to complete if you start it.
1 The background task has run during idle time or
not This detailhelps you determineif a task has already
run during idle time or you should run it.
1 The status of the Norton task
You can view details about the completion of the task.
1 The power source that the Norton Task uses.
You can specify the type of power source that each of the Norton Tasks uses. Use the Configure link that is available next to the power source icon to configure the power source for the Norton Tasks.
Page 81
About System Insight
The Norton Tasks window lets you monitor the following Norton-specific tasks:
81Monitoring your system's performance
Automatic LiveUpdate
Backing up DefaultSet
Disk Optimizer
Full System Scan
Automatic LiveUpdate automatically checks for definition updates and program updates when your computer is connected to the Internet.
By default, Automatic LiveUpdate checks for updates every hour.
Performs a backup of the files and data that are included in your backup set.
If you created multiple backup sets, all of the backup sets appear on the Norton Tasks list. You can run a specific backup from the Norton Tasks window.
Eliminates the file clutter and rearrange the placement of files on your computer disks to improve performance.
Scans your entire computer for viruses, spyware, and different security vulnerabilities.
It also runs other activities such as LiveUpdate, Cleanup, Disk Optimization, and Backup.
Insight Optimizer
Optimizes the boot volume of your computer.
Page 82
Monitoring your system's performance
82
About System Insight
Internet Explorer History Cleaner
Internet Explorer Temporary Files
Norton Community Watch
Deletes the unnecessary Web page history that is left behind in your Internet browser's history folder.
Removes the traces of any Internet searches that are performed on your PC.
Deletes the temporary files that are left behind on the hard disk after Internet browsing.
Norton Community Watch protects your computer against potential risks. It collects the information about new security threats from your computer and submits the information to Symantec for analysis. Symantec assesses the data to identify the new threats and resolves it.
Page 83
About System Insight
83Monitoring your system's performance
Norton Insight
Pulse Updates
Allows the smart scanning of files on your computer. It improves the performance of Norton 360 scans by letting you scan fewer files without compromising the security of your computer.
Norton Insight lets you check the details of the Files of Interest that are available on your computer. You can view details such as signature of the file and the date on which the file was installed. You can also view details such as the trust level, community usage, resource usage, and the source of the file.
Pulse Updates check for definition updates every five minutes and downloads the streamed virus definitions. Pulse Updates provide the updates during the full updates, which LiveUpdate downloads automatically every few hours. Always ensure that the Pulse Updates option is turned on. It protects you from the latest threats without compromising your system performance or disrupting your online experience.
Page 84
Monitoring your system's performance
84
About System Insight
Quick Scan
Windows Registry Cleaner
Windows Temporary File Cleaner
Scans the important locations of your computer that the viruses and other security threats often target.
Quick Scan takes less time to scan than a Full System Scan because this scan does not scan your entire computer.
Deletes the inaccurate entries and obsolete entries in the Windows registry that can cause errors.
Deletes the unnecessary files that are left in Windows Temporary folders after a program is installed or updated.
The following grayed out categories of jobs run in the background to improve your system performance and protection. You can only view the last run details for the following activities.
Identity Safe Maintenance
Performs background maintenance tasks related to Identity Safe. Tasks include sending Identity Safe profile statistics and downloading the favorite icons.
AntiSpam Maintenance
Performs background maintenance tasks related to AntiSpam. Tasks include updating contacts and AntiSpam filters.
Page 85
About System Insight
85Monitoring your system's performance
Licensing Maintenance
Insight Maintenance
Product Maintenance
Performs background maintenance tasks related to licensing.
Performs background maintenance tasks related to Norton Insight. Tasks include maintaining details about the stability and trust level of files in your computer.
Performs background maintenance tasks related to Norton 360. Tasks include clearing install logs and rescanning consolidated firewall rule.
You can also manually turn on Silent Mode for a specified duration.
Monitoring background jobs of Norton 360
The Norton Tasks window provides the details of the background tasks that Norton 360 performs and lets you view and monitor the background tasks. Norton 360 runs most of the background tasks when your computer isidle. Performing all background taskswhen your computer is idle helps your computer to run at peak efficiencywhen you use your computer.However, you can manually start or stop a task at any time. You can also specify the Idle Time Out duration. After the Idle Time Out duration is reached, Norton 360 identifies thecomputer as idle and runthe background tasks. You can use the Idle Countdown bar to confirm the idle state of your computer. You can also view the CPU graph and memory graph to obtain the performance data of your computer.
Page 86
Monitoring your system's performance
86
About System Insight
To monitor background jobs
1
In theNorton 360 main window, clickPerformance.
2
In the Performance window, click Norton Tasks.
3
In the Norton Tasks window, view the details of background jobs.
4
Do one of the following:
1 To run a background job,click the play icon that
1 To stopa running background job, clickthe stop
5
Click Close.
About Power Source
You can choose the power source for Norton 360 to perform the Norton Tasks when the computer is idle. Norton Tasks are background tasks that Norton 360 performs when your computer is idle. Norton Tasks include Quick Scan, Automatic LiveUpdate, Norton Community Watch, Norton Insight, Full System Scan, Insight Optimizer, and Pulse Updates. Norton 360 consumes more power when it runs Norton Tasks.
By default,Norton 360 performs these tasksonly when your computer is connected to the external power. For example, if you are in an airport, and your computer is running on battery power, Norton 360 does not perform the Norton Tasks. In this way, you canextend the batterypower of your computer. However,you can choose thepower source for Norton 360to perform the Norton Tasks.
appears before the name of the background job.
icon that appears before the name of the background job.
Page 87
About System Insight
You can select one of the following options:
87Monitoring your system's performance
External
External and Battery
Allows the Norton Tasks to run only when your computer uses external power.
If you choose this option, Norton 360 performs the Norton Tasks when the computer is idle and connected to external power.
Allows the Norton Tasks to run irrespective if the computer uses external power or battery power.
If you choose this option, Norton 360 performs the Norton Tasks when the computer is idle. It does not consider the type of power source the computer uses.
You can configure the power source for each of the Norton Tasks.
Configuring the Power Source
You can choose the power source for Norton 360 to perform the Norton Tasks when the computer is idle. Norton Tasks are background tasks that Norton 360 performs when your computer is idle.
By default,Norton 360 performs these tasksonly when your computeris connectedto the externalpower. You can configure the power source for each of the Norton Tasks.
To configure the power source
1
In theNorton 360 main window, clickPerformance.
2
In the Performance window, in the left pane, click Norton Tasks.
Page 88
Monitoring your system's performance
88
About System Insight
3
In the Norton Tasks window, under the Power Source column, click the Configure link for the
Norton Task that you want to configure the power source.
4
In the Power Source window, select one of the following:
1 External
1 External and Battery
5
Click OK.
6
In the Norton Tasks window, click Close.
About Norton Insight
Norton Insight allows the smart scanning of files on your computer.It improves the performance ofNorton 360 scans by letting you scan fewer files without compromising the security of your computer.
Allows the Norton Task to run only when your computer uses external power.
Allows theNorton Task torun irrespective if the computer usesexternal power or battery power.
If you choose this option, Norton 360 performs the Norton Task when the computer is idle. It does not consider the type of power source the computer uses.
Page 89
About System Insight
A Norton 360 scan can identify threats on your computer in the following ways:
89Monitoring your system's performance
The Blacklist technique
At regular intervals, Norton 360 obtains definition updates from Symantec. These updates contain signatures of known threats. Each time when Norton 360 obtains the definition updates, it performs a scan of all of the files that are available on your computer. It compares the signature of the files against the known threat signatures to identify threats on your computer.
Page 90
Monitoring your system's performance
90
About System Insight
The Whitelist technique
Norton 360 obtains specific information about the Files of Interest and submits the information to Symantec during idle time. The information includes things such as file name, file size, and hash key. Symantec analyzes the information of each File of Interest and its unique hash value and provides a confidence level to the file. The Symantec server stores the hash value and confidence level details of the Files of Interest. The server provides the details immediately after you open the Norton
Insight - Application Ratings
window. Even the slightest modification of the file causes a change in the hash value and the confidence level of the file. Typically, most Files of Interest belong to the operating system or known applications, and they never change. These files do not require repeated scanning or monitoring. For example, Excel.exe is a file that never changes but you always scan it during a normal security scan.
Page 91
About System Insight
Symantec assigns the following confidence levels to Files of Interest:
91Monitoring your system's performance
Trusted
Good
Unproven
Symantec analyzes the file as trusted based on the statistical evaluation that is done on the files that are available within the Norton Community.
If the file has three green bars, Symantec rates the file as Norton Trusted.
The files that have three green bars display a Norton Trusted pop-up text when you move the mouse pointer over the green bars.
Symantec analyzes the file as good based on the statistical evaluation that is done on the files that are available within the Norton Community.
Symantec rates the trusted files as follows:
1 If the file has two green bars,
Symantec rates the file as Good.
1 If the file has one green bar,
Symantec rates the file as Favorable.
Symantec does not have enough information about the file to assign a trust level to the file.
Poor
Symantec has only a few indications that the file is not trusted.
Page 92
Monitoring your system's performance
92
About System Insight
Norton 360also provides differentprofiles toconfigure your scan performance. When you use the Full Scan profile, Norton 360 follows the Blacklist technique to scan your computer. It scans all of the files on your computer againstthe signatures that it obtainedduring definition updates. When you use the Standard Trust or HighTrust profile, Norton 360 follows the Whitelist technique to scan the files based on their confidence level. This way, Norton 360 significantly reduces the time thatis required to scan yourcomputer completely for security threats.
The Whitelist technique that Norton Insight uses also helps in heuristic detection ofsuspicious applications. Normally, the execution behavior of well-known applications appearsidentical to the execution behavior of unknownapplications. Such behavior results infalse identification of good applications as suspicious, and therefore, necessitates security applications to maintain alow heuristic detection threshold. However, keeping a low detection threshold does not provide a complete heuristic protection against malicious applications. Norton 360 uses the Whitelist technique that helps maintain a high heuristic detection threshold. It excludes well-known applications from heuristic detection to prevent false detection of well-known applicationsand to ensure a highdetection rate of malicious applications.
Viewing the files using Norton Insight
Norton Insightprovides informationabout the Files of Interest that are available on your computer. Norton 360 lets you view specific categories of files based on the option that you select in the Norton Insight - Application Ratings window.
Page 93
About System Insight
The drop-down list that is available in the Norton Insight - Application Ratings window provides you
the following options:
93Monitoring your system's performance
All Running Processes
Startup Items
All Loaded Modules
Highest Performance Impact
Highest Community Usage
Lists the processes that run on your computer at that point in time when you selected this option.
Lists the Files of Interest.All Files
Lists the programs that start when you start your computer.
Lists all the files and programs that are currently loaded on to the program memory space.
Lists the programs that consume maximum resources of your computer.
Norton 360 displays a list of top 10 resources that highly affect the performance of your computer.
Lists the files that have the maximum community usage.
Page 94
Monitoring your system's performance
94
About System Insight
User Trusted Files
Untrusted Files
Lists the Files of Interest that you manually trusted in the File Insight window.
This category does not list the files that do not belong to the File of Interest even if you manually trust the files. However, Norton 360 excludes all of the manually trusted files from Norton 360 scan when you configure
Scan Performance Profiles
to High Trust.
You can also remove the user trust from all of the Files of Interest that you manually trusted. You can use the Clear All User Trust option next to the drop-down list to remove the user trust.
Lists the files that are not Norton Trusted.
You can manually trust all the files that are not trusted by clicking the Trust All Files option next to the drop-down list.
You can view file details such as file name, trust level, community usage, resource usage, and the stability rating. There may be instances when the trust level of a file has changed or a process running might have stopped running. You can refresh the Norton Insight
- Application Ratings window to update the file list and file details. The coverage meter provides a graphical representation of the percentage of the Norton TrustedFiles and thetotal Files of Interest. The higher the percentage, the lesser time the scan takes.
Page 95
To view the files using Norton Insight
1
In the Norton 360 main window, click PC Security, and then click Run Norton Insight.
2
In the Norton Insight - Application Ratings window, selectan optionfrom theShow drop-down list to view a category of files. You may need to scroll the window to view all the files that are listed in the details area.
3
Click Close.
To refresh the list of files
4
In the Norton Insight - Application Ratings window, at the top of the file icon, click the refresh icon.
Checking the trust level of a file
Norton Insight lets you check the details of the Files of Interest that are available on your computer. You can view details such as signature of the file and the date on which the file was installed. You can also view details such as the trust level, stability details, community usage, resource usage, and the source of the file. You can use the Locate option to find the location of the file on your computer. When you right-click a file that isavailable on your computer, the shortcut menu displays Norton 360 option and then Norton File Insight option. You can use the options to check the details of a File of Interest.
Norton 360 displays the Norton File Insight option
w
only whenyou right-click aFile ofInterest. In Windows Safe mode, you cannot access this option for any file. Norton 360also categorizes any file forwhich you open the File Insight window to view details as a File of Interest.
The Symantec server stores the hash value and trust level details of the Fileof Interest. Theserver provides the file detailsimmediately after you open the Norton Insight - Application Ratings window. However, you can usethe Check Trust Now option in theFile Insight
About System Insight
95Monitoring your system's performance
Page 96
Monitoring your system's performance
96
About System Insight
window to update the trust valueof a file.You can also manually trust any well-known files. You can change the trust level of any file to User Trusted other than the files that are Norton Trusted.
You can determine the resource usage of a file that is available on your computer. The File Insight window displays theCPU graph and the systemresource usage details forthe running processes. The graphshows the breakdown of overall system CPU usage and the CPU usage or memory usage by the process.
To check the trust level of a file
1
In the Norton 360 main window, click PC Security, and then click Run Norton Insight.
2
In the Norton Insight - Application Ratings window, click a file for whichyou want to check the details.
3
In the File Insight window, view the details of the file.
4
In the File Insight window, click Close.
To check the trust level of a specific file
1
In the Norton 360 main window, click PC Security, and then click Run Norton Insight.
2
In the Norton Insight - Application Ratings window, click Check a Specific File.
3
Browse tothe location ofthe file for which youwant to check the details.
4
Select the file, and then click Open.
5
In the File Insight window, view the details of the file.
6
In the File Insight window, click Close.
To find the location of the file
4
In the File Insight window, click Locate.
To refresh the trust level of the file
4
In the FileInsight window, click Check Trust Now.
Page 97
To manually trust the file
4
In the File Insight window, in the Details tab, click Trust Now.
You can manually trust the files that are poor, unproven, or not Norton trusted.
To determine the resource usage of a running process
1
In the File Insight window, in the left pane, click Activity.
2
In theShow drop-down list,do one of the following:
1 Select Performance to view the performance
graph of the process.
1 Select Performance Alert to view the
performance alert-relateddetails of theprocess.
1 Select Network to view the network activities
of the process.
1 Select Run Key change to include registry
changes.
Configuring the Scan Performance Profiles
The Scan Performance Profiles settings let you configure how Norton 360 should scan your computer based on the digital signature and confidence level of the files.To makeNorton 360 scans lighter, faster, and more effective, you can exclude from scans the files that have known digital signatures or high confidence levels.
You can configure the Scan Performance Profiles settings to do the following:
1 Configure to Full Scan to perform a complete scan
of your computer. The complete scan includes a scan of all files on
your computer irrespective of the confidence level or digital signature of the files.
1 Configure toStandard Trust to perform ascan that
excludes the files that are Norton Trusted.
About System Insight
97Monitoring your system's performance
Page 98
Monitoring your system's performance
98
About System Insight
Norton 360 scans the files that have a confidence level other than Norton Trusted.
1 Configure to High Trust to perform a scan that
excludes thefiles that have known digitalsignatures or high confidence levels.
Norton 360 does not scan the files that have confidence levelas Norton Trusted or UserTrusted. It alsoexcludes the Good files with high confidence level from the scan. It scans the files with confidence levels as Poor Trust, Unproven Trust, Bad Trust, and the files without a class 3 digital signature.
You must configure the Scan Performance Profiles settings before you run a scan or before a scan is scheduled to run. Norton 360 scans your computer according to the configuration you specified in the Scan Performance Profiles settings.
To configure Scan Performance Profiles from the Settings window
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings, click Antivirus. On theScans and Risk tab, in the Scan Performance Profiles row, click on one of the settings. Your options are:
1 Full Scan
1 Standard Trust
1 High Trust
3
Click Apply, and then click Close.
To configure Scan Performance Profiles from the Norton Insight - Application Ratings window
1
In the Norton 360 main window, click PC Security, and then click Run Norton Insight.
Page 99
2
In the Norton Insight - Application Ratings window, movethe ScanPerformance Profiles slider to one of the settings. Your options are:
1 Full Scan
1 Standard Trust
1 High Trust
3
Click Close.
About Monthly Report
Monthly Report lets you view a summary of what Norton 360 has done for you. Norton 360 displays the monthly report every 30 days after you install your product. After 30 days of installation, Norton 360 displays the Monthly Report automatically. If you do not want Norton 360 to display the Monthly Report automatically, you can select the Do not display
monthly reports automatically option in the Norton Monthly Report window.
You can view the Monthly Report using the Check Monthly Report option that is present in the My Account window.
Norton 360lets you turn off orturn on Monthly Report from theAdministrative Settings window. The Norton MonthlyReport window displays the Tipof the month to recommend some of the products features and services.
When your product expires after the trial period, Monthly Report displays the activation status of your product. However,when your product expires afterthe subscription period, Monthly Report displays the subscription status of your product.
About System Insight
99Monitoring your system's performance
Page 100
Monitoring your system's performance
100
About System Insight
Norton 360 provides reports based on the following categories:
PC Security
Web
Backup & Tuneup
Lets you view the details of the various attacks your PC is protected from
For example, you can view the total number of viruses and spyware from which you are protected.
Lets you view the details of Antiphishing activities
For example, you can view the total number of known authenticated sites that you visited.
Lets you view the details of Backup and PC Tuneup activities. For example, you can view the total number of files that you backed up on drive C of your computer.
For example, you can view the total number of files that you backed up on drive C of your computer.
Monthly Report lets you view the latest news on Internet securityand also provides information onhow to staysafe while youare online. You can clickthe Read More option in the Norton Monthly Report window to view more information on how to stay safe online.
Loading...