Symantec, theSymantec Logo,LiveUpdate, Norton360, andNorton
are trademarks orregistered trademarks ofSymantec Corporation
or its affiliates in the U.S. and other countries. Portions of this
product Copyright 1996-2011 Glyph & Cog, LLC. Other names may
be trademarks of their respective owners.
The productdescribed inthis documentis distributed underlicenses
restricting itsuse, copying, distribution,and decompilation/reverse
engineering. No part of this document may be reproduced in any
form byany meanswithout priorwritten authorizationof Symantec
Corporation and its licensors, if any.
THE DOCUMENTATION ISPROVIDED “AS IS”AND ALL EXPRESS
OR IMPLIED CONDITIONS, REPRESENTATIONS AND
WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULARPURPOSE OR
NON-INFRINGEMENT, AREDISCLAIMED, EXCEPT TOTHE EXTENT
THAT SUCH DISCLAIMERS ARE HELD TO BELEGALLY INVALID.
SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR
INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION
WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS
DOCUMENTATION. THE INFORMATION CONTAINED IN THIS
DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be
commercial computersoftware asdefined inFAR 12.212and subject
to restrictedrights asdefined inFAR Section52.227-19 "Commercial
Computer Software - Restricted Rights" and DFARS 227.7202, et
seq. “Commercial Computer Software and Commercial Computer
Software Documentation”, as applicable, and any successor
regulations. Any use, modification, reproduction release,
performance, display or disclosure of the Licensed Software and
Documentation bythe U.S.Government shallbe solely in accordance
with the terms of this Agreement.
Symantec Corporation
350 Ellis Street,
Mountain View, CA 94043
Norton 360 offers proven performance and delivers
today’s fastand light all-in-onesolution to protect your
PC and all your online activities. It protects against
viruses, worms, hackers, and botnet. With a single
subscription, you can protect up to three PCs. It
safeguards against online identity theft, protects
important files, and keeps your PC tuned and running
at peak performance.
Norton 360 is completely automated and easy to use.
It works quietly in the background to maintain your
overall system integrity with minimal effect on PC
Page 8
Getting Started
8
About Norton 360
performance. By offering an unmatched combination
of performance and protection, Norton 360 helps you
get themost out of your PCand your online experience.
About Norton 360 main window
The Norton 360 main window acts as a security
management interface. You can access the main
features and monitor the performance of your
computer from the main window.
As you use your computer, Norton 360 monitors how
well your computer and activities are protected from
threats, risks, and damage. Norton 360 displays the
protection statusof your computer in themain window.
Depending on the security status of your computer, at
the top left of the Norton 360 main window, Norton
360 shows your System Status as Secure, Attention,
or At Risk. If your system status is marked as
Attention or At Risk, at the bottom of the main
window, clickFix Now to resolve allthe security threats
on your computer.
The options that are available in the main window
summarize the most essential security and the
productivity issues that challenge users. They are:
PC Security
Identity
Backup
Includes all virus, spyware,
firewall, and other security
features.
Includes the protection
against phishing and
fraudulent Web sites.
Includes the automatic and
the customizable backups
and restore capability.
Page 9
About Norton 360
9Getting Started
PC Tuneup
Includes the performance
tuning features, such as
cleaning up unwanted files
and performing Registry
Cleanup .
Depending on the security status of the different
components of your computer, the status areas of the
four protection categories are marked as Protected,
Attention, or At Risk.
When the System Status or protection categories
statuses are marked as At Risk or Attention, at the
bottom of the main window, click Fix Now to resolve
all the security threats on your computer.
Norton 360 also provides you easy links at the top of
the main window to themost frequent tasks.They are:
Tasks
Settings
Lets you access the Tasks
window to run general tasks,
backup tasks, and PC Tuneup
tasks.
Lets you access the Settings
window to configure settings
such as Firewall, Antispam,
and Backup.
Page 10
Getting Started
10
About Norton 360
Performance
Feedback
Account
Support
Lets you open the
Performance window in
Norton 360.
The Performance window
chronicles all installs,
downloads, optimizations,
detections, alerts, and
instances of Quick Scan that
occurred on your computer
since installing Norton 360.
The window also displays a
detailed graphical
representation of the CPU
and memory usage by your
Norton product.
Lets you give feedback about
the Norton product that you
use.
Lets you access the MyAccount window to manage
your Norton Account.
Lets you access support
options, product upgrade
options, subscription status,
and product version number.
You can also access the
online Help from the Support
drop-down menu. Help
provides links to information
that assists you with the
specific tasks that you want
to complete. The online Help
guides you to configure all of
the product features.
The bottom section of the Norton 360 main window
provides you up-to-date virus and threat information.
Page 11
About Norton 360
When your system status is At Risk or Attention, this
section automaticallyprovides youthe FixNow option
to fix all the issues at once.
11Getting Started
Page 12
Getting Started
12
About Norton 360
The bottom section of the Norton 360 main window
helps you do the following:
Activity Map
Page 13
About Norton 360
Lets you access the world
map with hotspots of
cybercrimes and the latest
threats.
The Activity Map shows the
top cities in the world where
most of the cybercrime
activities occur. These cities
are represented as yellow
dots on the map. You can
click a continent in the world
map to view its cities with the
highest number of threats.
The details on the Activity
Map are updated from a
Symantec server on a regular
basis. Your computer must be
connected to the Internet to
receive the activity map
updates.
You can view the date and
time that the Activity Map
was last updated. You can
also use the Map Details link
to get a brief idea of the
Activity Map.
When you click Map Details,
the Activity Map shows a
series of latest viruses and
threats that your product
protects your computer from.
You can use the info link next
to each item to view its
details in an overlay window.
You can also use the ViewDetails link in the overlay
window to know more about
the threat in a Symantec Web
page.
13Getting Started
Page 14
Getting Started
14
About Norton 360
Manage
Mobile
Lets you access Norton
Management.
Norton Management lets you
manage your Norton products
installed on all of your
devices from one location. To
sign up or to log into Norton
Management, click the
Manage icon at the bottom
of the main window. You can
use your existing Norton
Account login information to
access Norton Management.
The Norton Management
agent should be installed on
each device that you want to
add to Norton Management.
Norton Management
w
may not be available in some
versions of Norton 360.
Lets you download the
Norton Mobile Security for
Android.
Norton Mobile Security helps
protect your mobile devices
against loss, theft, viruses,
and other mobile threats. You
can use Norton Mobile
Security on all your devices
that use the Android
operating system.
Norton Mobile Security
w
may not be available in some
versions of Norton 360.
Page 15
Online Family
About Norton 360
15Getting Started
Page 16
Getting Started
16
About Norton 360
Lets you monitor your child’s
activities on the Internet.
Norton Online Family
w
may not be available with
some versions of Norton 360.
In such case, you may not be
able to access Norton Online
Family options.
When you click Online Family
icon on the main window, the
bottom section of the Norton
360 main window displays
Norton Online Family sign in
options. Norton Online Family
provides you advanced
controls to monitor your
child's online activities.
You can use the link on the
bottom section of the Norton
360 main window to set up
your account with Norton
Online Family.
Symantec recommends that
you use your Norton Account
login credentials to sign in to
Norton Online Family. If you
register your product with
your Norton Account, your
Norton Account email
address is auto-filled in the
email address text box.
After you set up your
account, you can sign in to
your account on the bottom
section of the Norton 360
main window and view your
child’s Internet activities. The
bottom section of the Norton
360 main window shows
details such as your child’s
Page 17
About Norton 360
latest search terms, and the
latest alerts. After you sign
in, you can use the GetDetails option in the bottom
section of the Norton 360
main window to view more
details on the Norton Online
Family Web site.
17Getting Started
Page 18
Getting Started
18
About Norton 360
Safe Web
Page 19
About Norton 360
Lets you check the safety of
a Web site.
You can also perform a safe
search.
This option may not be
w
available with some versions
of Norton 360. In such case,
you may not be able to access
this option.
When you click Safe Web icon
on the main window, the
bottom section of the Norton
360 main window displays
Norton Safe Web options.
You can use the Check Site
option in the bottom section
of the Norton 360 main
window to analyze the
security levels of any Web
site that you want to visit.
When you type a Web site
address in the text box and
click Check Site, it shows the
Symantec’s ratings for the
Web site.
You can use the Safe Search
option in the bottom section
of the Norton 360 main
window to search for
information on the Internet.
The Norton Safe Search uses
Ask.com to generate the
search results. Norton Safe
Search provides a site safety
status and a Norton rating for
each of the search results
generated.
You can also use the View
recent Norton Safe Web
19Getting Started
Page 20
Getting Started
20
Activation protects you
Your activation status or subscription status appears
at the bottom of the main window. You can use the
Activate Now option to activate or subscribe your
Norton product.
Activation protects you
Product activation protects users from pirated or
counterfeit software. It protects you by limiting the
use of a product to those users who have acquired the
product legitimately. Product activation requires a
product keyfor each installation of aproduct. You must
activate the product within a limited time period after
you install it.
If youare connected tothe Internet, product activation
takes place automatically when you start the product
for the first time after installation. After activation,
the Norton Account window appears. You can create
your Norton Account and register your product.
If you are not connected to the Internet, you can click
Try Later in the Activation not complete window to
start your product. The Activation window reappears
every time you start your product until you activate
your product. If you choosenot to activate at thattime,
you receive an alert that reminds you to activate the
product. Youcan also activateyour product by clicking
the Trial Period Status link in the Norton 360 main
window.
activity option in the bottom
section of the Norton 360
main window to view the
recent Norton Safe Web
statistics on malicious sites
and URLs. You can also view
the list of new malicious
URLs.
Page 21
If you do not activate the product within the time
w
period that the alert specifies, the product stops
working. You can activate it after the time period has
elapsed, but you are not protected until you activate
the product.
Activating Norton 360
To use all of the features in Norton 360, you must first
activate your product. Product activation reduces
software piracy and ensures that you have authentic
Symantec software. You can renew your subscription
after the end of your subscription period.
If youare connected tothe Internet, product activation
takes place automatically when you start the product
for the first time after installation. During activation,
the Norton Account window appears. You can create
your Norton Account and register your product. You
can also view details, such as your Product Key and
recent updates to the product. If you skip the NortonAccount window, the product is activated, but the
Product Key is not saved in the Norton Account. You
can print the Product Key for the future, if you need
to reinstall your product.
If youdid not activateyour product during installation,
Norton 360 prompts for activation each time you start
the product. Also, you receive an activation alert
regularly until you activate the product.
You mustactivate your product within the time period
w
that the alert specifies, oryour product stopsworking.
You can activate your product directly from the
activation alert. You can also activate your product
from the Trial Period Status link in the main window
or from the My Account window. In some cases, you
might need to enter your Product Key to activate your
product. You canactivate or renew the subscription of
your productfrom any non-admin user accountas well.
Activation should take only a few minutes.
Activation protects you
21Getting Started
Page 22
Getting Started
22
Activation protects you
To activate Norton 360, your computer must be
connected to the Internet. If you use a proxy server to
connect to the Internet, you must configure the proxy
settings. To configure proxy settings, goto the Norton
360 main window, and then click Settings >
To activate your Norton 360 from the My Account
window
1
In the Norton 360 main window, click Account.
2
In the My Account window, click Activate Norton
360 or Renew Subscription.
The Renew Subscription option is available if you
have already activated your product.
3
Follow the on-screen instructions.
4
In the window that appears, click Done.
To activate your product from the main window
1
In the Norton 360 main window, do one of the
following:
1 If you purchased a subscription version of a
retail product, click Activate Now.
1 If the productcame installed on your computer,
click Activate Online Now.
1 If you want to renew the subscription of your
product, click Renew.
2
Follow the on-screen instructions to activate or
subscribe your product.
Where to find your product key
The productkey is aunique keythat helps youto install
and activate the Symantec product on your computer.
Page 23
Activation protects you
The productkey isa 25-characteralphanumeric string
that is shown in five groups of five characters each,
separated by hyphens. The location ofthe product key
varies depending on how you acquired the product.
The locations of the product key are as follows:
23Getting Started
If you purchased a retail copy
of the product on CD
If you purchased the product
on DVD
If you downloaded the
product from the Symantec
Store
If your computer came with
the product already installed
If you received a product key
card
The product key is either on
a sticker on the CD sleeve or
on an insert in the product
package.
The product key is on the
DVD package.
The product key is stored on
your computer as part of the
download process and is
included in the confirmation
email from the Symantec
Store.
The product key is provided
as part of the activation
process. Be sure to save your
product key by creating or
signing in to your Norton
Account, or by printing the
key. You may need the
product key if you ever want
to reinstall your product.
The product key is printed on
the card along with
instructions on how to use it.
Be sure to save your product
key by creating or signing in
to your Norton Account. You
need the product key if you
ever want to reinstall the
product.
Page 24
Getting Started
24
About your Norton Account
If you are still unable to
locate your product key, you
can recover it using Norton
Account
About problems during activation
If you cannot connect to the Symantec servers to
activate your product, first check your Internet
connection. You then need to see if you have parental
control software, either installed or through your ISP,
that might block the connection.
A connectivity problem can occur if you use parental
control software. If you suspect that parental controls
might block the connection, you can configure the
parental controls so that they do not block the
activation procedure. You need to log in to your
parental control software or to the Internet through
your ISP as an administrator to change your
configuration.
If you use a proxy server to connect to the Internet,
you must configure the proxy settings. To configure
the proxy settings, go to theNorton 360 mainwindow,
and then click Settings > Administrative Settings >Network Proxy Settings > Configure.
To recover or access your
product key log on to
https://account.norton.com.
If you are not registered,
register for Norton Account.
You can find the product key
on the Products tab in the
Norton Account page.
About your Norton Account
When you create a Norton Account, you can manage
all of your Norton products inone place. Youcan store
your product keys in your Norton Account and also
buy additionalproduct keys. Youcan alsoregister your
product with the Norton Account. It takes only a few
Page 25
About your Norton Account
moments to create your Norton Account. You must be
connected to the Internet to create a Norton Account.
After you create a Norton Account, you can access and
manage your account information and product
information from anywhere. It helps to reinstall your
products and download the latest version of the
products. If you install your producton more thanone
PC, you can use the same Norton Account. To access
your Norton Account, go to the following URL:
https://account.norton.com
You cancreate a Norton Account inthe following ways:
1 During activation
You can create your Norton Account and register
your product from the Norton Account window
that appears when you activate the product. You
must provide your account information in the
Norton Account window that appears.
1 Any time after activation
You can create a Norton Account from the Access
Norton Account link available in the My Account
window.
25Getting Started
Page 26
Getting Started
26
About your Norton Account
After you log in to your Norton Account, you can
manage your product information with the following
options:
Products
Order History
Saves the information for all of
the Norton products that you
own.
The Products tab provides you
the information about the
Norton products that you own
and the expiration date. You can
click the arrow icon against a
product for more information
such as product key and the
registration date. You can also
buy a new product key to protect
additional computers. You can
use the Update option to check
and download the latest product
version using Norton Update
Center.
Contains order information of
the Norton products you bought
from Norton online store.
Page 27
About your Norton Account
27Getting Started
Profile
Saves your account information
and your billing details.
The Profile options are:
1 Account Information
You can update your Norton
Account information and
your shipping address on the
Account Information tab.
After you update, click
Update to save the changes.
1 Billing Information
You can save your credit card
information and your billing
address on the BillingInformation tab. It makes it
easier for saving online
orders. After you update,
click Update to save the
changes.
1 Change Password
You can change your current
Norton Account password on
the Change Password tab.
You can use the icons at the bottom of your Norton
Account Web page to access and use the following:
Norton Online Family
Norton Online Family
monitors and manages your
child's Internet activities and
computer usage.
Page 28
Getting Started
28
About your Norton Account
Norton Online Backup
Norton Safe Web
Norton.com
Norton Update Center
Norton Online Backup
provides a secure and
easy-to-use online backup
solution that safeguards your
important data against
system crash, accidental
deleting, virus infection, and
other disasters.
Norton Safe Web checks the
safety of a Web site and lets
you perform a safe Web
search.
The Symantec Web site
provides more information
about the various products of
Symantec, the latest updates
on Internet security, and
various support options.
Norton Update Center checks
and lets you download the
latest version of your Norton
product.
If you forget your Norton Account password, you can
get a temporary password by clicking the Forgotyourpassword link in the Norton Account sign-in Web
page. Youneed to provide your emailaddress. You need
to use the same email address that you provided when
you created your Norton Account. Symantec sends a
temporary password to your email address. You can
use the temporary password for a limited time period.
You must reset your password after you log in to your
Norton Account.
Page 29
Creating a Norton Account
Your Norton Account stores the product key and the
billing information of your product. You can also
register your product with the Norton Account.
In addition, Norton Account helps you to do the
following:
1 Access the product key and other product
information when you need it.
1 Reinstall your Norton product.
1 Buy additionalproduct keys for your homeor office.
1 Check and download the latest version of the
product by using Norton Update Center.
1 Save online orders and update billing information.
1 Manage your online backup.
Your computer must be connected to the Internet to
create a Norton Account. If you use a proxy server to
connect to the Internet, you must configure the proxy
settings. To configure the proxy settings, go to the
Norton 360 main window, and then click Settings >
You can also create a Norton Account when you
activate your product. When you create your Norton
Account fromthe product, your product getsregistered
in your account. If you have an existing Norton
Account, you can provide the same email address in
the NortonAccount window in yourproduct. Thisway,
you can register your current product and add it to the
list of Norton products in your existing Norton
Account. Ifyou upgrade your registered product to the
latest available version, your product remains
registered to the same Norton Account. In this case,
you cancontinue using thesame NortonAccount login
credentials.
Symantec products that are older than the 2006
w
product year do not appear in your Norton Account.
About your Norton Account
29Getting Started
Page 30
Getting Started
30
About your Norton Account
To create a Norton Account from the Norton Account
Web page
1
In the Norton 360 main window, click Account.
2
In the My Account window, click Access Norton
Account.
3
In theNorton Account Web page that appears, click
Sign up now.
4
In the Norton Account Sign Up Web page, provide
the details about your account information, and
then click Sign Up.
To create a Norton Account and register your product
after activation
1
In the Norton 360 main window, click Account.
2
In the My Account window, click Access Norton
Account.
3
In theComplete Your Activation window, type your
email address, and then click Next.
4
In theCreate your Norton Account window, provide
your account details, and then click Next.
Your productinformation gets saved in yourNorton
Account only after you log in to your Norton
Account.
5
In the window that appears, click Done.
To log in to your Norton Account and access your
product information,visit https://account.norton.com.
Accessing your Norton Account
The product key for each Norton product is
conveniently storedin your Norton Account. Afteryou
have created your Norton Account successfully, you
can access your account from anywhere in the world.
You can log in to your Norton Account any time by
visiting the following URL:
https://account.norton.com
You can easily find and update your account, product,
and billing information from your Norton Account.
Page 31
About your Norton Account
You can also change your Norton Account password,
if required. Your computer must be connected to the
Internet to access your Norton Account.
Symantec products that are older than the 2006
w
product year do not appear in your Norton Account.
To access Norton Account
1
In the Norton 360 main window, click Account.
2
In the My Account window, click Access Norton
Account.
3
In the Norton Account Web page that appears, type
your emailaddress andpassword, and click SignIn.
Creating a temporary password for Norton Account
If youforget the password of yourNorton Account, you
can create a temporary password to sign in to your
Norton Account. The temporary password is sent to
the email address that you provided when youcreated
your Norton Account.
After you sign in to your Norton Account by using the
temporary password,you are prompted to changeyour
password.
To create a temporary password for Norton Account
1
In the Norton 360 main window, click Account.
2
In the My Account window, click Access Norton
Account.
3
In theNorton Account Web page thatappears, under
Forgot your password?, click Recover it here.
4
In the Forgot your Password Web page, verify the
email addressthat is providedin theEmail Address
text box, and then click Continue.
A temporarypassword is sent to youremail address.
You can use this temporary password to sign in to
your Norton Account.
31Getting Started
Page 32
Getting Started
32
About Norton Community Watch
About Norton Community Watch
Norton Community Watch helps in identifying new
security risks by submitting selected security and
application data to Symantec for analysis. Symantec
assesses the data to determine the new threats and
their sources. The collective efforts from Norton
security product users help in quick identification of
solutions for these threats and risks. Norton
Community Watchimproves usersecurity and product
functionality. Inaddition, it helpsSymantec to analyze
the execution, schedule, and efficiency of
Norton-specific tasks and settings on your computer.
Norton Community Watch collects and submits the
following types of data:
1 Identified malicious software such as portable
executable files and running processes
1 Any Web site URL that your product identifies as
fraudulent
1 All the Web site URLs that you visited before the
detection of a risk
1 The applications and processes that run on your
computer regularly and during any security risk
detection
1 Response instances that your computer sends to
any potential security risk
1 General system information and performance
attributes from the computer
1 General information about your computer such as
idle time, standby, and screensaver settings
After thepotential security risksare assessed from the
submitted data, Symantec sends the information back
to Norton 360. The Norton features such as Norton
Insight and Insight Network use this information to
identify files and processes at risk.
You should participate in Norton Community Watch
submissions to provide valuable contribution to the
entire community that uses Norton security products.
Page 33
About Norton Community Watch
No personally identifiable information is exposed
during data collection and submission. Symantec
maintains an adequate level of protection for the
collected information. The Detailed Error DataCollection option under Norton Community Watch
in the AdministrativeSettings window lets you allow
or deny the detailed data submissions. The detailed
data mayvary depending on the Norton-specificerrors
and components. You can configure the option to
manage the data submissions.
data aboutthe Norton-specific errors and components
only. It does not collect or store any personal
information of any user.
If youchose notto join Norton Community Watchwhen
you installed your Norton product, you can turn it on
later. You can use the Norton Community Watch
option in the Administrative Settings window. You
can also review the data, which Norton Community
Watch collects and submits to Symantec, in the
Security History window.
Turning off or turning on Norton Community Watch
You can use the Norton Community Watch option to
send information about a suspicious file to Symantec
for analysis. Symantec assesses the data to determine
the newthreats and their sources. TheNorton features
such as Norton Insight and Insight Network use the
Symantec assessed information to detect the security
threats.
data aboutthe Norton-specific errors and components
only. It does not collect or store any personal
information of any user.
You canuse Security History to reviewthe information
that has been sent to Symantec.
To turn off or turn on Norton Community Watch
1
In the Norton 360 main window, click Settings.
33Getting Started
Page 34
Getting Started
34
About Norton Bootable Recovery Tool
2
In the Settings window, under Detailed Settings,
click Administrative Settings.
3
In the Administrative Settings window, in the
Norton Community Watch row, do one of the
following:
1 To turnoff Norton CommunityWatch, move the
On/Off switch to the right to the Off position.
1 To turnon Norton Community Watch, movethe
On/Off switch to the left to the On position.
4
Click Apply.
About Norton Bootable Recovery Tool
Norton Bootable Recovery Tool scans and removes
viruses, spyware, and other security risks from your
computer. Your computer might be infected with a
virus ifyou experienceany ofthe following symptoms:
1 You cannot install Norton 360.
1 You cannot start your computer.
1 Your computer is extremely slow.
Norton Bootable Recovery Tool is integrated with
Windows Preinstallation Environment (WinPE).
Therefore, youcan run Norton Bootable RecoveryTool
only froma CD,DVD, orUSB key. You must use Norton
Bootable Recovery Tool Wizard to create the Norton
Bootable Recovery Tool CD, DVD, or USB key.
You cannot run Norton Bootable Recovery Tool in
w
WinPE for more than 72 hours. If you run Norton
Bootable Recovery Tool for more than 72 hours, your
computer restarts without any notification.
You can use the Norton Bootable Recovery Tool CD,
DVD, orUSB key to recover a computer thatis infected
with viruses and other security threats. This security
program isnot a replacement for continuous,real-time
protection from viruses and latest security risks. To
protect your computer from future infections, be sure
Page 35
About Norton Bootable Recovery Tool
to installor continue using Norton 360that you already
purchased.
Norton Bootable Recovery Tool detects and resolves
the following security threats:
35Getting Started
Viruses
Trojan horses
Hacking tools
Spyware
Programs that infect another
program, boot sector,
partition sector, or document
by inserting themselves or
attaching themselves to that
medium. Most viruses just
replicate; many also do
damage.
Programs containing
malicious codes that are
disguised as or hiding in
something benign, such as a
game or utility.
Tools that are used by a
hacker to gain unauthorized
access to your computer. One
type of hacking tool, a
keystroke logger, tracks and
records your individual
keystrokes and can send this
information back to the
hacker.
Programs that can scan
systems or monitor activity
and relay the information to
other computers or locations
in cyberspace.
Page 36
Getting Started
36
About Norton Bootable Recovery Tool
Adware
Trackware
Programs that facilitate the
delivery of advertising
content through their own
window, or by using another
program's interface.
Programs that track system
activity, gather system
information, or track user
habits, and relay this
information to third-party
organizations. The
information that is gathered
by such programs is neither
personally identifiable nor
confidential. Trackware
programs are installed with
the user's consent, and may
also be packaged as part of
other software that is
installed by the user.
Downloading the Norton Bootable Recovery Tool
Wizard
If your attempt to install a Norton product fails, you
can download the Norton Bootable Recovery Tool
Wizard. This easy-to-use wizard helps you create
Norton Bootable Recovery Tool on a CD, DVD, or USB
key. You can use Norton Bootable Recovery Tool to
scan your computer and remove any security threats
that prevent successful installation.
It is recommended that you download and install
Norton Bootable Recovery Tool Wizard on a computer
that does not have any security threats and create
Norton Bootable Recovery Tool. If you create Norton
Bootable RecoveryTool on an infected computer,there
is a chance that the recovery CD, DVD, or USB key
might get infected.
Page 37
About Norton Bootable Recovery Tool
To use Norton Bootable Recovery Tool, you must use
w
the product key of the Norton product that you
purchased. Ifyou usea trial version of Norton 360, you
need to create a Norton Account to receive a product
key to use Norton Bootable Recovery Tool.
You can download Norton Bootable Recovery Tool
Wizard in one of the following ways:
1 From the Start menu.
1 From the Norton Support Web site.
To download the Norton Bootable Recovery Tool Wizard
from the Start menu
1
On the Windows taskbar, do one of the following:
1 In WindowsXP, click Start > Programs > Norton
360 > Norton Recovery Tools.
1 In Windows Vista or Windows 7, click Start >
All Programs > Norton 360 > Norton Recovery
Tools.
2
Follow the on-screen instructions.
To download the Norton Bootable Recovery Tool Wizard
from the Internet
1
Open your Web browser, and go to the following
URL:
http://www.norton.com/recoverytool_n360
2
Follow the on-screen instructions.
To download the Norton Bootable Recovery Tool Wizard
from Norton 360
1
In the Norton 360 main window, click Scan Now.
2
In theComputer Scan pane, do oneof the following:
1 Click Quick Scan.
1 Click Full System Scan.
3
At the bottom of the scan window, next to If you
think there are still risks, click click here.
4
In the Norton Rescue Tools Web page, click
Download Norton Bootable Recovery Tool.
5
Follow the on-screen instructions.
37Getting Started
Page 38
Getting Started
38
About updating Norton 360
Using the Norton Bootable Recovery Tool
If the installation of yourNorton product fails, you can
use the Norton Bootable Recovery Tool to scan and
remove any security threats that prevent successful
installation. If your computer is infected and you are
not able to start your Windows operating system, you
can use Norton Bootable Recovery Tool to remove
threats and recover your computer.
Norton Bootable Recovery Tool is available on the
product CD that you purchased. You can use the
product CD as a recovery media.
To use Norton Bootable Recovery Tool, you must use
w
the product key of the Norton product that you
purchased. Ifyou usea trial version of Norton 360, you
need to create a Norton Account to receive a product
key to use Norton Bootable Recovery Tool.
To use the Norton Bootable Recovery Tool
1
Insert the recovery media and start your computer
from the recovery media.
The recovery media can be a Norton Bootable
Recovery Tool CD, DVD, USB key, or the product
CD.
2
Read the Norton License Agreement, type your
product key, and then click I Agree.
If youuse a non-QWERTY keyboard, usethe VirtualKeyboard option to enter your product key.
3
In the Norton Bootable Recovery Tool window,
click Norton Advanced Recovery Scan.
4
Click Start Scan.
5
After the scan is complete, remove the recovery
media from the drive or USB port, and restart your
computer.
About updating Norton 360
Norton 360 uses the Internet to automatically obtain
updates to its virus definition files and its program
Page 39
files. Theseupdates continually enhance the technology
that Norton 360 uses to keep your PC protected.
Automatic updates require an Internet connection. If
you use a proxy server to connect to the Internet, you
must configure the proxy settings in your product. If
you do not normally keep your PC connected to the
Internet, you can manually update Norton 360 after
you connect to the Internet. Updating Norton 360 on
a regular basis ensures that you have the latest
definition updates and program updates.
About LiveUpdate
Symantec products download the latest definition
updates andprogram updatesregularly from Symantec
servers. Thedefinition updates protect your computer
from the latest viruses and unknown security threats.
Using the LiveUpdate technology, Symantec products
help you to obtain and install these updates.
LiveUpdate takes little time to download and process
the definition updates and program updates. You can
choose Smart Definitions to minimize download time,
installation time, and memory consumption as Smart
Definitions area subset ofvirus definitions. The SmartDefinitions option is availableon the Scansand Risks
tab in the Antivirus settings window. You can cancel
the LiveUpdate session at any time.
LiveUpdate obtains these updates for your computer
by using your Internet connection. If your network
uses proxy servers to connect to Internet, LiveUpdate
uses the proxy settings in your product to download
the latest updates. You can use the Network ProxySettings option in the Administrative Settings window
to configure the proxy settings of your network.
About updating Norton 360
39Getting Started
About Program and Definition Updates
LiveUpdate obtains program updates and definition
updates for your computer by using your Internet
connection.
Page 40
Getting Started
40
About updating Norton 360
w
Program updates are minor improvements to your
installed product.These differfrom product upgrades,
which are newer versions of the entire product.
Program updates are usually created to extend the
operating system or hardware compatibility, adjust a
performance issue, or fix program errors. Program
updates are released on an as-needed basis.
Some program updates may require that you restart
your computer after you install them.
LiveUpdate automatesthe process of downloading and
installing programupdates. It locates and obtains files
from an Internet site, installs them, and then deletes
the older files and downloaded definitions from the
temporary folder after processing the updates.
Definition updates are the files that keep your
Symantec productsup to date with thelatest antithreat
technology. The definition updates that you receive
depend on which product you use.
The type of definition updates that each of the
Symantec products receive are as follows:
Norton AntiVirus, Norton
AntiVirus Online
Users of these products
receive the latest virus
definitions from
Symantec that protects
your computer from all
types of security threats.
Page 41
About updating Norton 360
41Getting Started
Norton Internet Security, Norton
Internet Security Online
Norton 360, Norton 360 Online
In addition to the virus
and security risk updates,
users of these products
receive definition updates
for security protection.
For the products that
contain protection
against phishing, users
receive definition updates
against phishing.
The security definition
updates provide the latest
predefined firewall rules,
the updated lists of
applications that access
the Internet, Intrusion
Prevention signatures,
and Symantec spam
definition files. These
lists are used to identify
unauthorized access
attempts to your
computer.
Users of these products
receive the latest virus
definitions from
Symantec that protects
your computer from all
types of security threats.
In addition, users of these
products receive
Symantec spam definition
files and definition
updates against phishing.
Page 42
Getting Started
42
About updating Norton 360
Norton Security Suite, Norton
Business Suite
About Smart Definitions
Norton 360 downloads and installs virus definitions
regularly to protect your computer from the latest
security threats.For fasterdownloads and installation
purpose, Norton 360 classifies these virus definitions
into two sets.
The virus definitions are classified into the following
two sets:
Complete Set
Users of these products
receive the latest virus
definitions from
Symantec that protects
your computer from all
types of security threats.
In addition, users of these
products receive
Symantec spam definition
files and definition
updates against phishing.
Contains all the virus definitions
for each threat that is known to
Symantec.
Page 43
About updating Norton 360
43Getting Started
Core Set
Contains the most important
virus definitions that are
required for latest security
threats as viewed by Symantec.
The Core Set is a subset of the
Complete Set, and it is
approximately 30 percent
smaller than the Complete Set.
The Core Set minimizes
download time, installation time,
and system start time. It also
occupies lesser amount of disk
space as compared to the
Complete Set virus definitions.
Therefore, the Core Set results
in faster performance of your
computer.
The Core Set virus definitions are called as Smart
Definitions. Norton360 provides the SmartDefinitions
option to choose between Core Set virus definitions
and Complete Set virus definitions for LiveUpdate
sessions. Theoption is availableon theScans and Risks
tab in the Antivirus settings window.
During Automatic LiveUpdate or each time that you
run LiveUpdate manually, Norton 360 checks if the
Smart Definitions option is turned on or off. It then
downloads and installs the desired set of virus
definitions based on the option settings. By default,
the SmartDefinitions option is turnedon, whichmeans
that theCore Set virus definitions aredownloaded and
installed.
Turning off or turning on Smart Definitions
Smart Definitionsare a subset of virus definitions that
contains most important definitions for the latest
security threats.
As the Smart Definitions are of considerably smaller
size, it results in lesser download time, lesser
Page 44
Getting Started
44
About updating Norton 360
installation time, lesser boot time, and lesser memory
consumption. It also occupies lesser amount of disk
space as compared to the full set of virus definitions.
Therefore, Smart Definitions result in faster
performance of your computer.
Norton 360 checks the Smart Definitions option
settings during each LiveUpdate session. If the option
is turned on, the Smart Definitions are downloaded
and installed.If the option is turnedoff, all of the virus
definitions are downloaded and installed.
To turn off or turn on Smart Definitions
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings,
click Antivirus.
3
In the Antivirus settings window, click the Scans
and Risks tab.
4
In the Smart Definitions row, do one of the
following:
1 To turn off Smart Definitions, move the On/Off
switch to the right to the Off position.
1 To turn on Smart Definitions, move the On/Off
switch to the left to the On position.
5
In the Settings window, click Apply.
6
Click Close.
Turning off or turning on Automatic LiveUpdate
You can have LiveUpdate check for definition updates
and product updates automatically on a set schedule,
by turning on the Automatic LiveUpdate option. You
can alsorun LiveUpdatemanually when the AutomaticLiveUpdate option is turned on. However, you must
run LiveUpdatemanually to obtain updates ifyou have
turned off the Automatic LiveUpdate option.
To access the Automatic LiveUpdate option, go the
Norton 360 main window and then click Settings >Antivirus > Antispyware and Updates. You can also
Page 45
About updating Norton 360
turn off or turn on the Automatic LiveUpdate option
from Quick Controls in the Settings window.
If you are connected to the Internet, Automatic
w
LiveUpdate downloadsproduct updatesand definition
updates everyhour. If youhave an Integrated Services
Digital Network (ISDN) router that is set to
automatically connectto your Internet service provider
(ISP), itmay incur chargeseach time. If you donot want
this setup, you can turn off the automatic connection
on your ISDN router, or turn off the AutomaticLiveUpdate option.
To turn on Automatic LiveUpdate from Quick Controls
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Quick Controls,
check Automatic LiveUpdate.
To turn off Automatic LiveUpdate from Quick Controls
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Quick Controls,
uncheck Automatic LiveUpdate.
3
In the Select the duration drop-down list, select
how long you want to turn off Automatic
LiveUpdate, and then click OK.
45Getting Started
Checking for updates manually
If youdisconnect yourPC from the Internet, Symantec
recommends that you check for Norton 360 updates
after you reconnect.
To check for updates manually
1
In the Norton 360 main window, click PC Security,
and then click Run LiveUpdate.
2
In the Norton LiveUpdate window, when the
LiveUpdate is completed successfully, click Close.
Checking for the latest virus and spyware definitions date
Virus definition files contain the information that
allows Norton 360 to recognize and alert you to the
Page 46
Getting Started
46
About updating Norton 360
presence of a specific virus or security threat. Norton
360 showsthe date on which youlast updated the virus
and spyware definitions.
You canalso check the latest virusdefinition date. The
Definitions Update section in the PCSecurity Details
window displays the status and date of the last virus
definition updates.
To check for the latest virus and spyware definition date
1
In the Norton 360 main window, click PC Security,
and then click View Details.
2
In the PC Security Details window, under
DefinitionsUpdate, view thelatest virusdefinitions
details.
The Status column shows the date on which you
last downloaded and installed the latest definition
updates.
About keeping your protection up to date
Definition updates are available to you as long as you
maintain an active product status. The ways in which
you can acquire the product and maintain your status
are as follows:
If you purchased
a subscription
version of a retail
product
The product includes a limited-time
subscription to definition updates. When
the subscription is due to expire, you are
prompted to renew. Follow the on-screen
instructions to complete your
subscription renewal.
After your product expires, you cannot
obtain updates of any kind and all the
security features are turned off. If you
do not renew your product, you are no
longer protected against security threats.
Though LiveUpdate continues to check
for updates after expiration, you must
renew your product to enable all the
security features.
Page 47
About updating Norton 360
47Getting Started
If you purchased
a product as a
service, or it came
installed on your
computer
If you receive this
service through
your service
provider
About Pulse Updates
In addition to the definition updates that Automatic
LiveUpdate downloads, Norton 360 uses streaming
technology to download the latest virus definitions.
These downloads are called Pulse Updates. The Pulse
Updates are lighter and faster than Automatic
LiveUpdate. Theykeep yourcomputer secure from the
ongoing threats that exist on the Internet. Pulse
Updates protect you against the rapidly-changing
environment ofsecurity threatswithout compromising
your computer's performance. Pulse Updates should
always be turned on to get the latest updates.
Pulse Updates checks for definition updates every 5
minutes. Ifdefinition updates are available, LiveUpdate
downloads the streamed virus definitions. Pulse
Updates provide the updates in between the full
updates, which Automatic LiveUpdate downloads
automatically every hour. Norton 360 merges the new
stream that is downloaded with the last updates that
are installed. The Pulse Updates downloads provide
additional and fast protection for the latest threats in
between thefull updates without disrupting youronline
experience.
If you do not activate your service or
renew your subscription, you cannot
obtain updates of any kind and the
software no longer functions.
Your product status is always active as
long as your security service is active
with your service provider.
If your security service is not active, you
cannot obtain updates of any kind and
the software no longer functions.
Page 48
Getting Started
48
About Network Proxy Settings
Even if you do not turn on Pulse Updates, LiveUpdate
collects all the missed streams and, it updates your
computer during full definition updates.
Turning off or turning on Pulse Updates
Pulse Updates provide frequent, lightweight updates
every 5 minutes in between the full updates. Always
ensure that the Pulse Updates option is turned on. It
protects you from the latest threats without
compromising yoursystem performance or disrupting
your online experience.
You must be connected to the Internet to obtain latest
definition updates by using Pulse Updates. You can
turn on or turn off Pulse Updates only if AutomaticLiveUpdate is turned on.
To turn off or turn on Pulse Updates
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings,
click Antivirus.
3
In the Antivirus settings window, click
Antispyware and Updates.
4
Under AutomaticLiveUpdate, in thePulse Updates
row, do one of the following:
1 To turn off Pulse Updates, move the On/Off
switch to the right to the Off position.
1 To turn on Pulse Updates, move the On/Off
switch to the left to the On position.
5
In the Settings window, click Apply.
6
Click Close.
About Network Proxy Settings
A proxy server regulates access to the Internet, and
prevents external computers from accessing your
network. If you are on a network that uses a proxy
server toconnect to the Internet, youcan provide proxy
server details to Norton 360. Youcan use the Network
Page 49
About Network Proxy Settings
Proxy Settings window to specify the automatic
configuration URL, the proxy settings, and the
authentication details. Norton 360 uses the proxy
settings and authentication details to connect to the
Internet automatically, whenever required. For
example, LiveUpdate uses the specified proxy server
settings to retrieve updates. You mustensure that you
specify the proxy server details for LiveUpdate to run
successfully.
In some cases, your network uses an automatic
configuration URL or script for managing Internet
access. In this case, you must provide the URL of the
required Proxy Automatic Configuration (PAC) file. A
PAC filecontains the code that letsyour browser know
about the proxy settings for different Web sites over
the Internet.It also containsthe wordswhich you want
to filter and block while you access the Internet. You
can also choose the option that lets your browser to
automatically detect the proxy settings. If you want
your manual settings in the network, ensure that you
disable the Automatic Configuration options.
49Getting Started
Page 50
Getting Started
50
About Network Proxy Settings
Network Proxy Settings window lets you specify the
following settings:
Automatic Configuration
Lets you specify the automatic
configuration URL or script to
manage Internet access.
You have the following options:
1 Automatically detect
settings
Lets your browser detect the
network settings
automatically.
If you do not want to override
your manual settings for
network connections, you
must disable this option.
1 Use automatic configuration
script
Lets your browser use the
automatic configuration URL
or script to manage Internet
access.
Use the URL box to provide
the HTTP URL or the script to
the required PAC file (such
as file://C:/Proxy.pac).
Page 51
About Network Proxy Settings
51Getting Started
Proxy Settings
Authentication
Lets you provide the details of
your Proxy Settings.
Under Proxy Settings, check Use
a proxy server for your HTTP
connections, and do the
following:
1 In the Address box, type the
URL or IP address of your
proxy server.
1 In the Port box, type the port
number of your proxy server.
You can specify a value from
1 to 65535.
Lets you connect to the Internet
through a server that requires
authentication.
Use the Username box and
Password box to type the
authentication details.
Configuring Network Proxy Settings
When youuse a proxy server toconnect to the Internet,
you mustspecify the proxy server details.The NetworkProxy Settings window lets you enter automatic
configuration settings,proxy settings, and proxy server
authentication settings. The Network Proxy settings
let youconnect to theInternet whileyou perform tasks
such asactivating the productor accessingthe support
options.
To configure Network Proxy Settings
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings,
click Administrative Settings.
3
In theNetwork Proxy Settings row, click Configure.
Page 52
Getting Started
52
About Norton 360 status
4
In the Network Proxy Settings window, do the
following:
1 If youwant your browser to automaticallydetect
network connection settings, under Automatic
Configuration, check Automatically detect
settings.
1 If the proxy server requires an automatic
configuration URL, under Automatic
Configuration, check Use automatic
configuration script. Type the URL (such asfile://C:/Proxy.pac) in the URL box.
1 If yournetwork uses a proxy server,under Proxy
Settings, check Use a proxy server for your
HTTPconnections. In the Address box, type the
URL or IP address of your proxy server, and in
the Portbox, type the port numberof your proxy
server. You can specify a value from 1 to 65535.
1 If your proxy server requires a user name and
password, under Authentication, check I need
authentication to connect through my firewall
or proxy server. Type the user name in the
Username box and password in the Password
box.
5
In theNetwork Proxy Settings window, click Apply.
About Norton 360 status
Norton 360 displays the security status of your
computer at the top of the main window. Based on the
security status of your computer, Norton 360 shows
your systemstatus as Protected, Attention, orAt Risk.
The system status indicator displays one of the
following statuses:
Protected
Indicates that your computer
is protected from threats,
risks, and damages.
Page 53
About Norton 360 status
53Getting Started
See “Responding to
security status
indicators”
on page 53.
Attention
At Risk
Indicates that your computer
requires attention.
At the bottom section of the
Norton 360 main window,
click Fix Now to resolve the
security threats on your
computer.
Indicates that your computer
is at risk.
At the bottom section of the
Norton 360 main window,
click Fix Now to resolve the
security threats on your
computer.
Norton 360displays individual securitystatus for each
protection category, such as PC Security, Identity,
Backup, and PC Tuneup. Based on the security status
of the different components of your computer, the
status areas of the four protection categories are
marked as Protected, Attention, or At Risk.
When your system status or protection categories
statuses are marked as At Risk or Attention, at the
bottom section of the Norton 360 main window, click
Fix Now to resolve all the security threats on your
computer.
Responding to security status indicators
When your system encounters a threat or a risk, the
product displays the security status at the top of the
main window.When a status indicator displaysa status,
you can take appropriate action to improve your
protection status. Your protection is based on the
programs that are installed on your computer. To
improve your protection status, ensure that your
installed programs are up to date.
Page 54
Getting Started
54
About Norton 360 status
When your system status or protection categories
statuses are marked as At Risk or Attention, you can
resolve the security issues directly from the main
window.
To respond to security status indicators
1
In the Norton 360 main window, click Fix Now.
2
Follow the on-screen instructions.
About the Norton 360 icon
When you install Norton 360, it places an icon in the
notification area at the far right of the taskbar. This
icon indicates the current security status of your
computer. Norton360 displaysan animatedicon when
it activelyfixes any issuesor wants to inform youabout
any warning or urgent issues.
You can see the following representations of Norton
360 icon in the notification area:
Icon with a green check
mark badge
Icon with an orange
exclamation mark badge
Icon with a red cross mark
badge
Icon with a
crescent-shaped edge
Represents that your computer
is fully protected
Represents that there are some
issues against your computer
protection that require your
attention
Represents that there are some
urgent issues against your
computer protection that require
immediate resolution
Represents that the Silent Mode
feature is turned on
This icon also displays the
current protection status badge.
Page 55
You can right-click the icon to see a shortcut menu for
Norton 360.You can choose items onthe shortcutmenu
to open the Norton 360 window, to fix any issues that
Norton 360 detects, or to get additional help.
About Norton 360 shortcut menu
Norton 360 works in the background to keep your PC
secure. The Norton 360 icon is available in the
notification area at the far right of the taskbar. The
icon reassures you that your protection is up to date.
It changes its color if any change in status occurs.
The messages that appear in the notification area may
require aresponse from you, such asopening awindow.
More often, messages inform you about current
activities, and they disappear after a few seconds.
You can right-click the Norton 360 icon to access
specific Norton360 activities. Depending on thecurrent
activities, your options include the following:
About Norton 360 status
55Getting Started
Open Norton 360
Run QuickScan
Run LiveUpdate
Use this option to launch the
Norton 360 main window to
complete tasks, view current
status, or access other
features.
Use this option to run a Quick
Scan to protect possible
virus-infected areas of your
computer.
Use this option to run
LiveUpdate to check for
definition updates and
program updates.
Page 56
Getting Started
56
About Norton 360 status
Run Backup Now
View Recent History
Get Support
Turn on/Turn off Silent Mode
Enable/Disable Smart
Firewall
Enable/Disable Antivirus
Auto-Protect
Check for New Version
Use this option to create a
backup of your files.
You can specify when and
how often Norton 360 backs
up your files.
Use this option to review the
information about the
security events for all of the
categories.
Use this option to resolve
your problem easily using
Norton Autofix.
Use this option to turn on or
turn off Silent Mode.
Use this option to turn on or
turn off the firewall.
Use this option to turn on or
turn off Antivirus
Auto-Protect.
Use this option to check and
download the latest version
of the product.
Viewing details of protection features
In theNorton 360main window, you can seea summary
of eachof the four protection featuresthat Norton 360
provides. You can view additional details about each
protection feature.
Page 57
About Norton 360 status
To view details of a protection feature
1
In the Norton 360 main window, click on a
protection feature, and then click View Details.
In the window that appears, you can view the
following details:
1 The current status of the protection feature.
1 A list of the checks that the feature performs,
and the results of each check. In some cases, the
results ofa check caninclude a link that provides
additional information.
1 A list of actions that you can perform.
2
After you view details, click Close.
57Getting Started
Page 58
Getting Started
58
About Norton 360 status
Page 59
Monitoring your
system's
performance
This chapter includes the following topics:
1 About System Insight
About System Insight
Norton 360 continuously monitors your computer to
keep itfree ofany problems and run at peak efficiency.
Norton 360 constantly scans the vital areas of your
computer includingmemory, registrykeys, and running
processes. It monitors the important activities such as
general file operation, network traffic, and Internet
browsing. In addition, Norton 360 ensures that the
activities that it performs on your computer do not
degrade the overall performance of your computer.
System Insight provides you a centralized location
where youcan viewand monitorthe activitiesthat you
perform on your system. System Insight displays such
information in the Performance window.
You canuse the Performance window for the following:
1 To view monthly history of the important system
activities that you performed orthat occurred over
a period of the last three months.
The Events graph that appears at the top of the
window provides a pictorial representation of
important system activities. The activities include
application installations, application downloads,
disk optimizations,threat detections,performance
2
Page 60
Monitoring your system's performance
60
About System Insight
alerts, or Quick Scans. The graph displays the
activities as icon or stripe, and the description for
each icon or stripe is provided at the bottom of the
graph. Thepop-up that appears when youmove the
mouse pointerover an icon provides youthe details
about the activity. The View Details link in the
pop-up lets you view additional details about the
activity in the Security History window. You can
use thetabs at thetop of the graph toobtain details
for the current month and details for the last two
months.
1 To rearrange the organization of files on your
computer.
Optimizing your system helps you maximize the
usable free space on a disk by grouping files based
on how they are accessed. The Optimize option at
the top of the Events graph lets you defragment
your system.
1 To viewand analyzethe effectof Norton360 on the
performance of your computer.
The Performance graph that appearsat the bottom
of the window provides a graphical representation
of yourCPU usageand memory usage. The CPU tab
displays agraph that represents the overall system
CPU usage and Norton-specific CPU usage. When
you click at any point on the CPU graph and
memory graph, Norton 360 displays a list of the
processes thatconsume maximumresources at that
point. It also displays the percentage of usage for
each process. You can click a process that is
available in the list to get more information about
the process in the File Insight window. The
Memory tab displays a graph that represents
overall memoryusage and Norton-specific memory
usage. You can select any of the Zoom options to
obtain magnified view or historical data of the
graphs.
1 To view the details of Norton-specific jobs that are
currently running in the background
Page 61
About System Insight
The NortonTasks window provides thedetails such
as the timestamp, the duration, and the status of
the background jobs. The details also include the
type of power the job needs to run and if a job ran
during idle time. You can select different power
sources for thebackground jobs. You can also start
or stop a background job at any time.
1 To view details about the known good files and the
known bad files
The NortonInsight Network window lets you view
the total number of files that Symantec analyzes
within the Norton Community. You can also view
the total number of computersthat are availablein
the community to provide the data. You can view
the number of trusted files that are available on
your computer.
1 To view the details of the Files of Interest
The NortonInsight - Application Ratings window
provides details on the trust level, prevalence,
resource usage, and stability ratings for the Files
of Interest.
You can use the Performance Monitoring option to
monitor the performance of your computer. To access
the PerformanceMonitoring option, go to the Norton
360 main window, click Settings > AdministrativeSettings > Performance Monitoring.
61Monitoring your system's performance
Accessing the Performance window
System Insight provides you a centralized location
where youcan view and monitor yoursystem activities.
System Insight displays such information in the
Performance window. You canaccess the Performance
window to view details about the important system
activities, CPU usage and memory usage, and
Norton-specific background jobs. You can also view
Norton Insight details and defragment your boot
volume.
Page 62
Monitoring your system's performance
62
About System Insight
To access the Performance window
4
In theNorton 360 main window, clickPerformance.
About monitoring system activities
System Insight provides information about the
important systemactivities that you performed orthat
occurred overa period of the lastthree months. System
Insight displays the information in the Performance
window. The Events graph at the top of the
Performance window displays each activityas icon or
stripe. The description for each icon or stripe appears
at the bottom of the graph. You can use the tabs at the
top ofthe graph toobtain details for the currentmonth
and for the last two months. The activities include:
Installs
Provides the details about the
installation activities that you
performed on your system over
a period of the last three months
The details include the
application that you installed,
the date on which you installed
the application, and the total
number of installations on that
date.
Page 63
About System Insight
63Monitoring your system's performance
Downloads
Optimized
Detections
Provides the details about the
application-download activities
that you performed on your
system over a period of the last
three months
The details include the date on
which you downloaded a file and
the total number of downloads
on that date. You can click the
file name link to view additional
details about the downloaded
file such as the Download Insight
report, file name, reputation
level, and recommended action.
Indicates the optimization
activities that you performed on
your system over a period of the
last three months
Provides the details about the
threat detection activities that
Norton 360 performed on your
system over a period of the last
three months
The details include the date on
which Norton 360 detected a
threat and the total number of
threats that Norton 360 detected
on that date. The View Details
link provides additional details
about the risk such as the risk
impact and the origin of the risk.
The details also include the
action that a threat has
performed on your system and
the action that Symantec
recommends you to resolve the
threat.
Page 64
Monitoring your system's performance
64
About System Insight
Alerts
Quick Scans
Provides the details about the
performance alerts that Norton
360 displayed over a period of
the last three months
The details include the
monitored date and the number
of performance alerts generated.
The View Details link provides
additional details about
performance-related activities,
program name, program
location, and system resources
utilization.
Provides the details about Quick
Scans that Norton 360
performed on your system over
a period of the last three months
The details include the date on
which a Quick Scan was
performed and the number of
Quick Scans that were
performed on that date. The
View Details link provides
additional details such as the
scan time, total items scanned,
total risk detected, total risks
resolved, and recommended
action.
Viewing details of your system activities
System Insight lets you view details of the system
activities thatyou performedor thatoccurred overthe
last three months in the Performance window. The
activities include application installations, application
downloads, disk optimizations, threat detections,
performance alerts, or Quick Scans. You can use the
tabs at the top of the Events graph to obtain details for
the current month and for the last two months. The
Page 65
Events graph at the top of the Performance window
displays each activity as iconor stripe. The description
for each icon or stripe appears at the bottom of the
graph. The pop-up that appears when you move the
mouse pointer over an icon provides you the details
about theactivity. The detailsinclude thedate on which
an activity was performed and the number of such
activities that you performed on that date. The ViewDetails link provides additional details of the activity
in the Security History window.
To view details of your system activities
1
In theNorton 360 main window, clickPerformance.
2
In thePerformance window, at the top ofthe Events
graph, click the tab for a month to view the details.
3
In the Events graph, move the mouse pointer over
the icon or the stripe for an activity.
4
In the pop-up that appears, view the details of the
activity.
5
If the View Details option appears in the pop-up,
click View Details to view additional details in the
Security History window.
About performance alerting
Norton 360 monitors your system performance. If it
detects an increased usage of system resources by any
program or process, it notifies you with performance
alerts. Performance alerting works only when the
Performance Monitoring option and Performance
Alerting option are turned on.
Performance alerting notifies you with information
about the program name and resources that the
program uses excessively. The Details& Settings link
in the performance notification alert lets you view
additional details about the resource consumption by
the program. The File Insight window opens and
displays the details of thefile, the originof the file, the
process ID, and the complete resource usage list of the
program. Fromthe FileInsight window, you canchoose
About System Insight
65Monitoring your system's performance
Page 66
Monitoring your system's performance
66
About System Insight
to excludethe program frombeing monitored.You can
use the Settings option in the File Insight window to
turn off the Performance Alerting option.
Performance alerts are not displayed when your
w
computer is idle or in Silent Mode.
For each system resource, such as CPU, memory, and
hard disk, there is a resource consumption threshold
defined. Whenthe resource consumptionof a program
exceeds the defined threshold limit, Norton 360 alerts
you with a performance alert.
You can use the Resource Threshold Profile forAlerting option to configure the threshold limit. To
access the Resource Threshold Profile for Alerting
option, go to the Norton 360 main window, and then
click Settings > Administrative Settings >
Performance Monitoring > Resource Threshold
Profile for Alerting.
You can use the Use Low Resource Profile On Battery
Power option to let Norton 360 automatically change
the resource threshold profile to low when your
computer runs on battery power.
You can use High-Usage Alert for option to configure
Norton 360 to alert for high usage of CPU, memory,
disk, and handles.
In addition, you can add programs to the ProgramExclusions list using the Program Exclusions option.
When you add a program to the Program Exclusions
list, Norton 360 does not alert you when the program
exceeds the defined resource consumption threshold
limit.
You can view all the performance-related logs under
the Performance Alert category in the SecurityHistory window.
Page 67
Configuring performance alerts
You can use the Performance Alerting option to
receive performance alertswhen there is anincreased
usage of system resources by any program or process.
You can use the following options to configure
performance alerts:
About System Insight
67Monitoring your system's performance
Off
On
Turns off performance alerts.
Select this option if you do
not want Norton 360 to notify
you with performance alerts.
Turns on performance alerts.
Select this option if you want
Norton 360 to notify you with
performance alerts when a
program or process exceeds
the threshold limit of the
system resource usage.
By default, the PerformanceAlerting option is turned on.
Page 68
Monitoring your system's performance
68
About System Insight
Log Only
Monitors and records the
system resource usage.
Select this option if you want
Norton 360 to only monitor
the system resource usage of
every program or process
running on your computer.
When a program or process
exceeds the threshold limit
of the system resource usage,
Norton 360 records these
details in the SecurityHistory window. You can view
the details that are related to
performance alerts under
Performance Alert category
in the Security History
window.
To configure performance alerts
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings,
click Administrative Settings.
3
Under Performance Monitoring, in the
PerformanceAlerting row, doone ofthe following:
1 To turn off performance alerts, move the
PerformanceAlerting switch tothe Off position.
1 To turn on performance alerts, move the
PerformanceAlerting switch to the On position.
1 To suppress the performance alerts, move the
Performance Alerting switch to the Log Only
position.
Page 69
4
Under High-UsageAlert for, doone of the following:
1 If you want Norton 360 to monitor the CPU
usage, move the CPU switch to the left to theOn
position.
1 If you want Norton 360 to monitor the memory
usage, move the Memory switch to the left to
the On position.
1 If you want Norton 360 to monitor the disk
usage, movethe Diskswitch tothe left to the On
position.
1 If you want Norton 360 to monitor the handle
count, move the Handles switch to the left to
the Onposition. Bydefault, this option is turned
off.
5
Click Apply, and then click Close.
Configuring the resource threshold profile
The threshold limit for the system resources
determines at which point Norton 360 should notify
you withperformance alerts.When a specific program
exceeds the threshold limit of using your system
resource, Norton 360 notifies you with a performance
alert.
To configure the resource threshold profile
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings,
click Administrative Settings.
About System Insight
69Monitoring your system's performance
Page 70
Monitoring your system's performance
70
About System Insight
3
Under Performance Monitoring, in the Resource
Threshold Profile for Alerting row, select one of
the following options:
Low
Medium
High
4
Click Apply and then click Close.
Configures a low threshold
limit for alerting.
Symantec recommends you
to select this option when
your computer runs on
battery power.
Configures a medium
threshold limit for alerting.
By default, the threshold limit
is set to medium.
Configures a high threshold
limit for alerting.
Symantec recommends you
to select this option when
your computer runs tasks
that require high resource.
Turning off or turning on the Use Low Resource Profile On
Battery Power option
When your computer runs on battery power, it is
important that all active software programs consume
minimum resourceusage. Byreducing resource usage,
your computer gains longer battery life and becomes
more energy efficient.
You can configure a low threshold profile and ensure
that all programs consume minimum resource usage.
When the resource usage of a program or a process
exceeds the low threshold limit, Norton 360 notifies
you with a performance alert. You can choose to close
Page 71
About System Insight
the program or the process manually and free the
resource.
If the Use Low Resource Profile On Battery Power
option isturned on,Norton 360automatically changes
the threshold profile to low when your computer runs
on battery power. By default, this option is turned on.
Symantec recommends that you keep the Use Low
w
Resource Profile On Battery Power option turned on.
To turn off the Use Low Resource Profile On Battery
Power option
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings,
click Administrative Settings.
3
Under Performance Monitoring, in the Use Low
Resource Profile On Battery Power row, move the
On/Off switch to the right to the Off position.
4
Click Apply, and then click Close.
To turn on the Use Low Resource Profile On Battery
Power option
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings,
click Administrative Settings.
3
Under Performance Monitoring, in the Use Low
Resource Profile On Battery Power row, move the
On/Off switch to the left to the On position.
4
Click Apply, and then click Close.
71Monitoring your system's performance
Excluding programs from performance alerts
Norton 360 lets you exclude programs from
performance alerts. You can add the programs that
consume high CPU, memory, or disk usage to the
Program Exclusions list. When you add a program to
the ProgramExclusions list, Norton 360 does not alert
you when the program exceeds the resource
consumption threshold limit.
Page 72
Monitoring your system's performance
72
About System Insight
To exclude a program from performance alerts
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings,
click Administrative Settings.
3
Under Performance Monitoring, in the Program
Exclusions row, click Configure.
4
In the Program Exclusions window, click Add.
5
In the Select a program dialog box, browse to the
executable file for the program that you want to
add.
6
Click Open.
7
In the Program Exclusions window, click Apply.
8
Click OK.
9
In the Settings window, click Apply.
10
Click Close.
Removing programs from Program Exclusions
The ProgramExclusions window lists allthe programs
that areexcluded from performance alerts. Ifyou want,
you can remove any of the programs that you already
added to the Program Exclusions window. When you
remove a program, the program appears in the
performance alert the next time it crosses the defined
threshold limit for resource consumption.
To remove a program from Program Exclusions
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings,
click Administrative Settings.
3
Under Performance Monitoring, in the Program
Exclusions row, click Configure.
4
In the Program Exclusions window, select the
program that you want to delete, and then click
Remove.
To remove all the programs available in the
Program Exclusions window, click Remove All.
5
In the Program Exclusions window, click Apply
Page 73
6
Click OK.
7
In the Settings window, click Close.
About CPU graph and memory graph
Norton 360 monitors the overall system CPU usage
and memory usage and the Norton-specific CPU usage
and memory usage. Norton 360 displays the details in
the CPU graphand the memory graph. The CPU graph
and memory graph are real-time graphs of CPU
utilization and memory utilization.
The graphs display a performance time for the last 90
minutes or for the duration since you started your
computer. The graphs update the information at an
interval ofevery 15 seconds. The graphsprogress from
right to left, and the most recent data appear on the
far right of the graph. The blue pattern in the graphs
depicts theoverall system usage, and theyellow pattern
depicts theNorton-specific usage. Thegray blocksthat
are labeled as Idle indicate the idle period of your
computer. The gray blocks include the period when
your computer is in shutdown, sleep, or log out state.
The graphs show a default performance time of 90
minutes. However, you can use the Zoom options to
define a region of the graph that you are interested to
view. Youcan select a Zoom option to obtain magnified
view or historical data of the graphs. For example, if
you select the 10min option, Norton 360 displays the
magnified view of CPU graph or memory graph for the
last 10minutes. If youselect the 1D option, Norton 360
displays a historical data of the last one day.
When you click at any point on the CPU graph or
memory graph, Norton 360 displays a list of the
processes that consume maximum resources at that
point. It alsodisplays the percentage ofusage for each
process. You canclick a process that is available inthe
list toget more informationin the File Insight window.
The File Insight window provides information about
the process such as:
About System Insight
73Monitoring your system's performance
Page 74
Monitoring your system's performance
74
About System Insight
1 The file name, version number, digital signature,
the date on which the process was installed.
1 The date on which the process was last used and
whether it is a startup file.
1 The stability details.
1 The confidence level.
1 The resource usage details.
1 The actions that the process performs on your
system.
In addition, the File Insight window displays the CPU
graph and the resource usage details for the running
processes. The graph shows the breakdown of overall
system CPU usage and the CPU usage by the process.
Viewing the CPU graph and memory graph
Norton 360 monitors the overall system CPU usage
and memory usage and the Norton-specific CPU usage
and memory usage. The CPU tab and the Memory tab
at the top of the Performance graph display the CPU
graph and the memory graph respectively.
The Zoom options provide you the magnified view of
the CPU graph and memory graph. For example, if you
select the 10min option, Norton 360 displays the
magnified view of CPU graph or memory graph for the
last 10 minutes. If you select the 1W option, Norton
360 displays the CPU graph and memory graph for the
last one week.
By default, the graphs display performance time for
w
the last 90 minutes.
To view CPU graph and memory graph
1
In theNorton 360 main window, clickPerformance.
Page 75
About System Insight
2
In thePerformance window, doone of the following:
1 To view the CPU graph, click the CPU tab.
1 To view the memory graph, click the Memory
tab.
1 To magnify or shrink the graph, click 10min,
30min, 1D, 1W, or 1M next to the Zoom option.
Obtaining historical data of your CPU and memory usage
The Zoom options also provide you the historical data
of the CPU graph and memory graph. For example, if
you select the 1D option, Norton 360 displays thedata
of CPU graph or memory graph for the last one day.
To view historical data of your CPU or memory usage
1
In theNorton 360 main window, clickPerformance.
2
In thePerformance window, doone of the following:
1 To view the CPU graph, click the CPU tab.
1 To view the memory graph, click the Memory
tab.
3
Do one of the following:
1 To obtain historical data for the last one day,
click 1D.
1 To obtain historical data for the last one week,
click 1W.
1 To obtain historical data for the last one month,
click 1M.
75Monitoring your system's performance
Identifying resource-consuming processes
You canclick at any point onthe CPU graph or memory
graph to obtain a list of top three processes that
consume maximumresources of your computer at that
point. You can click a process that is available in the
list to get more information about the process in the
File Insight window.
To identify resource-consuming processes
1
In theNorton 360 main window, clickPerformance.
Page 76
Monitoring your system's performance
76
About System Insight
2
In thePerformance window, doone of the following:
1 To view the CPU graph, click the CPU tab.
1 To view the memory graph, click the Memory
3
Click at any point on the graph to obtain a list of
resource-consuming processes.
4
Click the name of a process to obtain additional
information about the process in the File Insight
window.
About optimization
The datastorage space ona disk is divided intodiscrete
units. These units are called clusters. When files are
written to the disk, they are broken up into
cluster-sized pieces. When all of the file pieces are
located in adjacent or contiguous clusters, the file can
be accessed quickly.
Your computer’s hard disk stores all of your files,
applications, and the Windows operating system. The
bits of information that make up your files gradually
spread over the disk. This process is known as
fragmentation. The more that you use your computer,
the more fragmented the hard disk gets.
When a fragmented file is accessed, the disk
performance is slower. The performance is slower
because the drive head locates, loads,saves, and keeps
track of all of the fragments of the file. If free space is
also fragmented, the drive head might have to track
adequate free space to store temporary files or newly
added files.
Optimization rearranges file fragments into adjacent
or contiguous clusters. When the drive head accesses
all of the file data in one location, the file is read into
the memory faster. Optimization also maximizes the
usable freespace on a disk bygrouping most frequently
used files and infrequently used files. Optimization
consolidates free space to avoid fragmenting newly
added files. It adds extra space after major data
tab.
Page 77
structures so that they can grow without immediately
becoming fragmented again.
You can optimize your boot volume manually by using
the Optimize option in the Performance window.
You canalso configure Norton 360 todefragment your
boot volumeor the local disk thatcontains boot volume
when your computer is idle. Norton 360 automatically
schedules the optimization when it detects the
installation of an application on your computer. The
optimization process starts next time when your
computer is idle.
You can use the Idle Time Optimizer option in the
Administrative Settings window to optimize the boot
volume during idle time.
Optimizing your boot volume
The Optimize option lets you optimize your boot
volume to improve the boot time of your computer.
Optimization ofyour bootvolume maximizes the usable
free space by rearranging file fragments into adjacent
and contiguous clusters. When the drive head of your
hard disk accesses all of the file data in one location,
the file is read into the memory faster.
When you use the Optimize option in Windows XP,
Norton 360 optimizes only the boot volume (for
example, C:\Windows).Therefore, it requires less time
to complete optimization. However, when you use the
Optimize option in Windows Vista or Windows 7,
Norton 360 optimizes the drive that contains the boot
volume. Therefore, it requires more time to complete
optimization.
You can access the Optimize option at the top of the
security statusgraph in the Performance window. You
can also optimize your boot volume using the Insight
Optimizer option in the Norton Tasks window. The
Insight Optimizer row in the background jobslist that
is available in the Norton Tasks window displays the
details of the boot volume optimization process. You
About System Insight
77Monitoring your system's performance
Page 78
Monitoring your system's performance
78
About System Insight
can view details such as timestamp, duration, and
status of the background job.
To optimize your boot volume from the Performance
window
1
In theNorton 360 main window, clickPerformance.
2
In the Performance window, at the top of the
security status graph, click Optimize.
To optimize your boot volume from the Norton Tasks
window
1
In theNorton 360 main window, clickPerformance.
2
In the Performance window, click Norton Tasks.
3
In the Norton Tasks window, under the Norton
Tasks column, click the play icon that appearsbefore Insight Optimizer.
About the Idle Time Optimizer
Idle Time Optimizer lets you configure Norton 360 to
defragment your boot volume or the local disk that
contains boot volume when your computer is idle.
Norton 360 automatically schedules the optimization
when it detects the installation of an application on
your computer and your computer is idle. If you start
using your computer again, Norton 360 stops the
optimization task, and starts optimizing the next time
that your computer is idle. This way, the background
job of optimization does not affect the performance of
your computer.
Optimization rearranges file fragments into adjacent
or contiguousclusters inthe harddisk. It improves the
computer performance by reading the files into the
memory faster.Optimization alsomaximizes the usable
free space on a disk by grouping most frequently used
files and infrequently used files. In addition, it
consolidates free space to avoid fragmenting newly
added files.
You must turn on the Idle Time Optimizer option
under AdministrativeSettings in the Settingswindow
Page 79
About System Insight
to optimize the boot volume during idle time. By
default, this option is turned on.
Turning off or turning on Idle Time Optimizer
Norton 360 automatically schedules the optimization
when it detects the installation of a new application
on your computer. Norton 360 runs this optimization
only when your computer is idle.
You canuse the Idle Time Optimizer option to optimize
the bootvolume during idletime. Bydefault, this option
is turned on.
To turn off Idle Time Optimizer
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings,
click Administrative Settings.
3
In the Idle Time Optimizer row, move the On/Off
switch to the right to the Off position.
4
Click Apply, and then click Close.
To turn on Idle Time Optimizer
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings,
click Administrative Settings.
3
In the Idle Time Optimizer row, move the On/Off
switch to the left to the On position.
4
Click Apply, and then click Close.
79Monitoring your system's performance
About the Norton Tasks
The NortonTasks window provides aninterface where
you can view and monitor all Norton-specific
background tasks. Norton 360 runs most of the
background tasks when your computer is idle. The
Norton Tasks window provides the details of the
background tasks that Norton 360 performs.
The details include:
1 The name of the Norton task
Page 80
Monitoring your system's performance
80
About System Insight
You can use the icon that appears before the name
of a background job to start or stop a background
task. Youcan startor stopa background task at any
time.
1 The timestamp of the Norton task
You can view details such as the date on which the
background job last ran and the time. These details
help you decide whether tostart a backgroundtask
or wait for Norton 360 to run the job during idle
time.
1 The duration of the Norton task
You can view the length of time that a Norton task
ran the last time. The details also help you
determine the length of time a background task
takes to complete if you start it.
1 The background task has run during idle time or
not
This detailhelps you determineif a task has already
run during idle time or you should run it.
1 The status of the Norton task
You can view details about the completion of the
task.
1 The power source that the Norton Task uses.
You can specify the type of power source that each
of the Norton Tasks uses. Use the Configure link
that is available next to the power source icon to
configure the power source for the Norton Tasks.
Page 81
About System Insight
The Norton Tasks window lets you monitor the
following Norton-specific tasks:
81Monitoring your system's performance
Automatic LiveUpdate
Backing up DefaultSet
Disk Optimizer
Full System Scan
Automatic LiveUpdate
automatically checks for
definition updates and
program updates when your
computer is connected to the
Internet.
By default, Automatic
LiveUpdate checks for
updates every hour.
Performs a backup of the files
and data that are included in
your backup set.
If you created multiple
backup sets, all of the backup
sets appear on the Norton
Tasks list. You can run a
specific backup from the
Norton Tasks window.
Eliminates the file clutter and
rearrange the placement of
files on your computer disks
to improve performance.
Scans your entire computer
for viruses, spyware, and
different security
vulnerabilities.
It also runs other activities
such as LiveUpdate, Cleanup,
Disk Optimization, and
Backup.
Insight Optimizer
Optimizes the boot volume of
your computer.
Page 82
Monitoring your system's performance
82
About System Insight
Internet Explorer History
Cleaner
Internet Explorer Temporary
Files
Norton Community Watch
Deletes the unnecessary Web
page history that is left
behind in your Internet
browser's history folder.
Removes the traces of any
Internet searches that are
performed on your PC.
Deletes the temporary files
that are left behind on the
hard disk after Internet
browsing.
Norton Community Watch
protects your computer
against potential risks. It
collects the information
about new security threats
from your computer and
submits the information to
Symantec for analysis.
Symantec assesses the data
to identify the new threats
and resolves it.
Page 83
About System Insight
83Monitoring your system's performance
Norton Insight
Pulse Updates
Allows the smart scanning of
files on your computer. It
improves the performance of
Norton 360 scans by letting
you scan fewer files without
compromising the security of
your computer.
Norton Insight lets you check
the details of the Files of
Interest that are available on
your computer. You can view
details such as signature of
the file and the date on which
the file was installed. You can
also view details such as the
trust level, community usage,
resource usage, and the
source of the file.
Pulse Updates check for
definition updates every five
minutes and downloads the
streamed virus definitions.
Pulse Updates provide the
updates during the full
updates, which LiveUpdate
downloads automatically
every few hours. Always
ensure that the Pulse
Updates option is turned on.
It protects you from the latest
threats without
compromising your system
performance or disrupting
your online experience.
Page 84
Monitoring your system's performance
84
About System Insight
Quick Scan
Windows Registry Cleaner
Windows Temporary File
Cleaner
Scans the important locations
of your computer that the
viruses and other security
threats often target.
Quick Scan takes less time to
scan than a Full System Scan
because this scan does not
scan your entire computer.
Deletes the inaccurate entries
and obsolete entries in the
Windows registry that can
cause errors.
Deletes the unnecessary files
that are left in Windows
Temporary folders after a
program is installed or
updated.
The following grayed out categories of jobs run in the
background to improve your system performance and
protection. You can only view the last run details for
the following activities.
Identity Safe Maintenance
Performs background
maintenance tasks related to
Identity Safe. Tasks include
sending Identity Safe profile
statistics and downloading
the favorite icons.
AntiSpam Maintenance
Performs background
maintenance tasks related to
AntiSpam. Tasks include
updating contacts and
AntiSpam filters.
Page 85
About System Insight
85Monitoring your system's performance
Licensing Maintenance
Insight Maintenance
Product Maintenance
Performs background
maintenance tasks related to
licensing.
Performs background
maintenance tasks related to
Norton Insight. Tasks include
maintaining details about the
stability and trust level of
files in your computer.
Performs background
maintenance tasks related to
Norton 360. Tasks include
clearing install logs and
rescanning consolidated
firewall rule.
You can also manually turn on Silent Mode for a
specified duration.
Monitoring background jobs of Norton 360
The Norton Tasks window provides the details of the
background tasks that Norton 360 performs and lets
you view and monitor the background tasks. Norton
360 runs most of the background tasks when your
computer isidle. Performing all background taskswhen
your computer is idle helps your computer to run at
peak efficiencywhen you use your computer.However,
you can manually start or stop a task at any time. You
can also specify the Idle Time Out duration. After the
Idle Time Out duration is reached, Norton 360
identifies thecomputer as idle and runthe background
tasks. You can use the Idle Countdown bar to confirm
the idle state of your computer. You can also view the
CPU graph and memory graph to obtain the
performance data of your computer.
Page 86
Monitoring your system's performance
86
About System Insight
To monitor background jobs
1
In theNorton 360 main window, clickPerformance.
2
In the Performance window, click Norton Tasks.
3
In the Norton Tasks window, view the details of
background jobs.
4
Do one of the following:
1 To run a background job,click the play icon that
1 To stopa running background job, clickthe stop
5
Click Close.
About Power Source
You can choose the power source for Norton 360 to
perform the Norton Tasks when the computer is idle.
Norton Tasks are background tasks that Norton 360
performs when your computer is idle. Norton Tasks
include Quick Scan, Automatic LiveUpdate, Norton
Community Watch, Norton Insight, Full System Scan,
Insight Optimizer, and Pulse Updates. Norton 360
consumes more power when it runs Norton Tasks.
By default,Norton 360 performs these tasksonly when
your computer is connected to the external power. For
example, if you are in an airport, and your computer
is running on battery power, Norton 360 does not
perform the Norton Tasks. In this way, you canextend
the batterypower of your computer. However,you can
choose thepower source for Norton 360to perform the
Norton Tasks.
appears before the name of the background job.
icon that appears before the name of the
background job.
Page 87
About System Insight
You can select one of the following options:
87Monitoring your system's performance
External
External and Battery
Allows the Norton Tasks to
run only when your computer
uses external power.
If you choose this option,
Norton 360 performs the
Norton Tasks when the
computer is idle and
connected to external power.
Allows the Norton Tasks to
run irrespective if the
computer uses external
power or battery power.
If you choose this option,
Norton 360 performs the
Norton Tasks when the
computer is idle. It does not
consider the type of power
source the computer uses.
You can configure the power source for each of the
Norton Tasks.
Configuring the Power Source
You can choose the power source for Norton 360 to
perform the Norton Tasks when the computer is idle.
Norton Tasks are background tasks that Norton 360
performs when your computer is idle.
By default,Norton 360 performs these tasksonly when
your computeris connectedto the externalpower. You
can configure the power source for each of the Norton
Tasks.
To configure the power source
1
In theNorton 360 main window, clickPerformance.
2
In the Performance window, in the left pane, click
Norton Tasks.
Page 88
Monitoring your system's performance
88
About System Insight
3
In the Norton Tasks window, under the Power
Source column, click the Configure link for the
Norton Task that you want to configure the power
source.
4
In the Power Source window, select one of the
following:
1 External
1 External and Battery
5
Click OK.
6
In the Norton Tasks window, click Close.
About Norton Insight
Norton Insight allows the smart scanning of files on
your computer.It improves the performance ofNorton
360 scans by letting you scan fewer files without
compromising the security of your computer.
Allows the Norton Task to run only when your
computer uses external power.
Allows theNorton Task torun irrespective if the
computer usesexternal power or battery power.
If you choose this option, Norton 360 performs
the Norton Task when the computer is idle. It
does not consider the type of power source the
computer uses.
Page 89
About System Insight
A Norton 360 scan can identify threats on your
computer in the following ways:
89Monitoring your system's performance
The Blacklist technique
At regular intervals, Norton 360
obtains definition updates from
Symantec. These updates
contain signatures of known
threats. Each time when Norton
360 obtains the definition
updates, it performs a scan of all
of the files that are available on
your computer. It compares the
signature of the files against the
known threat signatures to
identify threats on your
computer.
Page 90
Monitoring your system's performance
90
About System Insight
The Whitelist technique
Norton 360 obtains specific
information about the Files of
Interest and submits the
information to Symantec during
idle time. The information
includes things such as file
name, file size, and hash key.
Symantec analyzes the
information of each File of
Interest and its unique hash
value and provides a confidence
level to the file. The Symantec
server stores the hash value and
confidence level details of the
Files of Interest. The server
provides the details immediately
after you open the Norton
Insight - Application Ratings
window. Even the slightest
modification of the file causes a
change in the hash value and the
confidence level of the file.
Typically, most Files of Interest
belong to the operating system
or known applications, and they
never change. These files do not
require repeated scanning or
monitoring. For example,
Excel.exe is a file that never
changes but you always scan it
during a normal security scan.
Page 91
About System Insight
Symantec assigns the following confidence levels to
Files of Interest:
91Monitoring your system's performance
Trusted
Good
Unproven
Symantec analyzes the file as
trusted based on the statistical
evaluation that is done on the
files that are available within the
Norton Community.
If the file has three green bars,
Symantec rates the file as
Norton Trusted.
The files that have three green
bars display a Norton Trusted
pop-up text when you move the
mouse pointer over the green
bars.
Symantec analyzes the file as
good based on the statistical
evaluation that is done on the
files that are available within the
Norton Community.
Symantec rates the trusted files
as follows:
1 If the file has two green bars,
Symantec rates the file as
Good.
1 If the file has one green bar,
Symantec rates the file as
Favorable.
Symantec does not have enough
information about the file to
assign a trust level to the file.
Poor
Symantec has only a few
indications that the file is not
trusted.
Page 92
Monitoring your system's performance
92
About System Insight
Norton 360also provides differentprofiles toconfigure
your scan performance. When you use the Full Scan
profile, Norton 360 follows the Blacklist technique to
scan your computer. It scans all of the files on your
computer againstthe signatures that it obtainedduring
definition updates. When you use the Standard Trust
or HighTrust profile, Norton 360 follows the Whitelist
technique to scan the files based on their confidence
level. This way, Norton 360 significantly reduces the
time thatis required to scan yourcomputer completely
for security threats.
The Whitelist technique that Norton Insight uses also
helps in heuristic detection ofsuspicious applications.
Normally, the execution behavior of well-known
applications appearsidentical to the execution behavior
of unknownapplications. Such behavior results infalse
identification of good applications as suspicious, and
therefore, necessitates security applications to
maintain alow heuristic detection threshold. However,
keeping a low detection threshold does not provide a
complete heuristic protection against malicious
applications. Norton 360 uses the Whitelist technique
that helps maintain a high heuristic detection
threshold. It excludes well-known applications from
heuristic detection to prevent false detection of
well-known applicationsand to ensure a highdetection
rate of malicious applications.
Viewing the files using Norton Insight
Norton Insightprovides informationabout the Files of
Interest that are available on your computer. Norton
360 lets you view specific categories of files based on
the option that you select in the Norton Insight -Application Ratings window.
Page 93
About System Insight
The drop-down list that is available in the Norton
Insight - Application Ratings window provides you
the following options:
93Monitoring your system's performance
All Running Processes
Startup Items
All Loaded Modules
Highest Performance Impact
Highest Community Usage
Lists the processes that run
on your computer at that
point in time when you
selected this option.
Lists the Files of Interest.All Files
Lists the programs that start
when you start your
computer.
Lists all the files and
programs that are currently
loaded on to the program
memory space.
Lists the programs that
consume maximum resources
of your computer.
Norton 360 displays a list of
top 10 resources that highly
affect the performance of
your computer.
Lists the files that have the
maximum community usage.
Page 94
Monitoring your system's performance
94
About System Insight
User Trusted Files
Untrusted Files
Lists the Files of Interest that
you manually trusted in the
File Insight window.
This category does not list
the files that do not belong
to the File of Interest even if
you manually trust the files.
However, Norton 360
excludes all of the manually
trusted files from Norton 360
scan when you configure
Scan Performance Profiles
to High Trust.
You can also remove the user
trust from all of the Files of
Interest that you manually
trusted. You can use the
Clear All User Trust option
next to the drop-down list to
remove the user trust.
Lists the files that are not
Norton Trusted.
You can manually trust all the
files that are not trusted by
clicking the Trust All Files
option next to the drop-down
list.
You can view file details such as file name, trust level,
community usage, resource usage, and the stability
rating. There may be instances when the trust level of
a file has changed or a process running might have
stopped running. You can refresh the Norton Insight
- Application Ratings window to update the file list
and file details. The coverage meter provides a
graphical representation of the percentage of the
Norton TrustedFiles and thetotal Files of Interest. The
higher the percentage, the lesser time the scan takes.
Page 95
To view the files using Norton Insight
1
In the Norton 360 main window, click PC Security,
and then click Run Norton Insight.
2
In the Norton Insight - Application Ratings
window, selectan optionfrom theShow drop-down
list to view a category of files.
You may need to scroll the window to view all the
files that are listed in the details area.
3
Click Close.
To refresh the list of files
4
In the Norton Insight - Application Ratings
window, at the top of the file icon, click the refresh
icon.
Checking the trust level of a file
Norton Insight lets you check the details of the Files
of Interest that are available on your computer. You
can view details such as signature of the file and the
date on which the file was installed. You can also view
details such as the trust level, stability details,
community usage, resource usage, and the source of
the file. You can use the Locate option to find the
location of the file on your computer. When you
right-click a file that isavailable on your computer, the
shortcut menu displays Norton 360 option and then
Norton File Insight option. You can use the options to
check the details of a File of Interest.
Norton 360 displays the Norton File Insight option
w
only whenyou right-click aFile ofInterest. In Windows
Safe mode, you cannot access this option for any file.
Norton 360also categorizes any file forwhich you open
the File Insight window to view details as a File of
Interest.
The Symantec server stores the hash value and trust
level details of the Fileof Interest. Theserver provides
the file detailsimmediately after you open the NortonInsight - Application Ratings window. However, you
can usethe Check Trust Now option in theFile Insight
About System Insight
95Monitoring your system's performance
Page 96
Monitoring your system's performance
96
About System Insight
window to update the trust valueof a file.You can also
manually trust any well-known files. You can change
the trust level of any file to User Trusted other than
the files that are Norton Trusted.
You can determine the resource usage of a file that is
available on your computer. The File Insight window
displays theCPU graph and the systemresource usage
details forthe running processes. The graphshows the
breakdown of overall system CPU usage and the CPU
usage or memory usage by the process.
To check the trust level of a file
1
In the Norton 360 main window, click PC Security,
and then click Run Norton Insight.
2
In the Norton Insight - Application Ratings
window, click a file for whichyou want to check the
details.
3
In the File Insight window, view the details of the
file.
4
In the File Insight window, click Close.
To check the trust level of a specific file
1
In the Norton 360 main window, click PC Security,
and then click Run Norton Insight.
2
In the Norton Insight - Application Ratings
window, click Check a Specific File.
3
Browse tothe location ofthe file for which youwant
to check the details.
4
Select the file, and then click Open.
5
In the File Insight window, view the details of the
file.
6
In the File Insight window, click Close.
To find the location of the file
4
In the File Insight window, click Locate.
To refresh the trust level of the file
4
In the FileInsight window, click Check Trust Now.
Page 97
To manually trust the file
4
In the File Insight window, in the Details tab, click
Trust Now.
You can manually trust the files that are poor,
unproven, or not Norton trusted.
To determine the resource usage of a running process
1
In the File Insight window, in the left pane, click
Activity.
2
In theShow drop-down list,do one of the following:
1 Select Performance to view the performance
graph of the process.
1 Select Performance Alert to view the
performance alert-relateddetails of theprocess.
1 Select Network to view the network activities
of the process.
1 Select Run Key change to include registry
changes.
Configuring the Scan Performance Profiles
The Scan Performance Profiles settings let you
configure how Norton 360 should scan your computer
based on the digital signature and confidence level of
the files.To makeNorton 360 scans lighter, faster, and
more effective, you can exclude from scans the files
that have known digital signatures or high confidence
levels.
You can configure the Scan Performance Profiles
settings to do the following:
1 Configure to Full Scan to perform a complete scan
of your computer.
The complete scan includes a scan of all files on
your computer irrespective of the confidence level
or digital signature of the files.
1 Configure toStandard Trust to perform ascan that
excludes the files that are Norton Trusted.
About System Insight
97Monitoring your system's performance
Page 98
Monitoring your system's performance
98
About System Insight
Norton 360 scans the files that have a confidence
level other than Norton Trusted.
1 Configure to High Trust to perform a scan that
excludes thefiles that have known digitalsignatures
or high confidence levels.
Norton 360 does not scan the files that have
confidence levelas Norton Trusted or UserTrusted.
It alsoexcludes the Good files with high confidence
level from the scan. It scans the files with
confidence levels as Poor Trust, Unproven Trust,
Bad Trust, and the files without a class 3 digital
signature.
You must configure the Scan Performance Profiles
settings before you run a scan or before a scan is
scheduled to run. Norton 360 scans your computer
according to the configuration you specified in the
Scan Performance Profiles settings.
To configure Scan Performance Profiles from the
Settings window
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings,
click Antivirus.
On theScans and Risk tab, in the Scan PerformanceProfiles row, click on one of the settings. Your
options are:
1 Full Scan
1 Standard Trust
1 High Trust
3
Click Apply, and then click Close.
To configure Scan Performance Profiles from the Norton
Insight - Application Ratings window
1
In the Norton 360 main window, click PC Security,
and then click Run Norton Insight.
Page 99
2
In the Norton Insight - Application Ratings
window, movethe ScanPerformance Profiles slider
to one of the settings. Your options are:
1 Full Scan
1 Standard Trust
1 High Trust
3
Click Close.
About Monthly Report
Monthly Report lets you view a summary of what
Norton 360 has done for you. Norton 360 displays the
monthly report every 30 days after you install your
product. After 30 days of installation, Norton 360
displays the Monthly Report automatically. If you do
not want Norton 360 to display the Monthly Report
automatically, you can select the Do not display
monthly reports automatically option in the Norton
Monthly Report window.
You can view the Monthly Report using the Check
Monthly Report option that is present in the My
Account window.
Norton 360lets you turn off orturn on Monthly Report
from theAdministrative Settings window. The NortonMonthlyReport window displays the Tipof the month
to recommend some of the product’s features and
services.
When your product expires after the trial period,
Monthly Report displays the activation status of your
product. However,when your product expires afterthe
subscription period, Monthly Report displays the
subscription status of your product.
About System Insight
99Monitoring your system's performance
Page 100
Monitoring your system's performance
100
About System Insight
Norton 360 provides reports based on the following
categories:
PC Security
Web
Backup & Tuneup
Lets you view the details of
the various attacks your PC
is protected from
For example, you can view
the total number of viruses
and spyware from which
you are protected.
Lets you view the details of
Antiphishing activities
For example, you can view
the total number of known
authenticated sites that you
visited.
Lets you view the details of
Backup and PC Tuneup
activities. For example, you
can view the total number
of files that you backed up
on drive C of your
computer.
For example, you can view
the total number of files
that you backed up on drive
C of your computer.
Monthly Report lets you view the latest news on
Internet securityand also provides information onhow
to staysafe while youare online. You can clickthe ReadMore option in the Norton Monthly Report window
to view more information on how to stay safe online.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.