Symantec 20043811 - Norton Internet Security 2010, Norton Internet Security 2010 User Manual

Page 1
User Guide
See back cover for Quick Installation.
We protect more people from more online threats than anyone in the world.
Care for our Environment, It's the right thing to do.
Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products.
Page 2
Norton Internet SecurityUser Guide
The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
Documentation version 17.0
Copyright © 2009 Symantec Corporation. All rights reserved.
Symantec, theSymantec Logo,Norton, Ghost,GoBack, LiveUpdate, Norton AntiSpam, Norton AntiVirus, Norton Internet Security, Norton 360,and NortonSystemWorks aretrademarks or registered trademarks ofSymantec Corporation or its affiliates in the U.S. and other countries. Windows is a trademark of Microsoft Corporation. Portions of this product Copyright [1996-2008] Glyph & Cog, LLC. Other names may be trademarks of their respective owners.
Symantec, theSymantec Logo,Norton, the Norton Logo, and Norton Online Backupare trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Microsoft, Windows, and Windows Vista are trademarks or registered trademarksof MicrosoftCorporation. Mozillaand Firefox are registered trademarks of Mozilla Foundation. Safari is a trademark of Apple Inc., registered in the U.S. and other countries. Other names may be trademarks of their respective owners.
The productdescribed inthis documentis distributedunder licenses restricting itsuse, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form byany meanswithout priorwritten authorization of Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED,EXCEPT TO THEEXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
Symantec Corporation 350 Ellis Street, Mountain View, CA 94043
http://www.symantec.com
Printed in the United States of America.
10 9 8 7 6 5 4 3 2 1
Page 3
Norton License Agreement
Norton Internet Security
IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT (LICENSE AGREEMENT) CAREFULLY BEFORE USING THE SOFTWARE (AS DEFINED BELOW). SYMANTEC CORPORATION, IF YOU ARE LOCATED IN THE AMERICAS; OR SYMANTEC ASIA PACIFIC PTE LTD, IF YOU ARE LOCATED IN THE ASIA PACIFIC RIM OR JAPAN; OR SYMANTEC LIMITED,IF YOU ARE LOCATED IN EUROPE, THE MIDDLE EAST OR AFRICA (SYMANTEC) IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THE INDIVIDUAL, THE COMPANY, OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE (REFERENCED BELOW AS YOUOR YOUR) ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT. THIS IS A LEGAL AND ENFORCEABLE CONTRACTBETWEEN YOU AND SYMANTEC. BY OPENING THIS PACKAGE, BREAKING THE SEAL, CLICKING THE I AGREEOR YESBUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY, OR LOADING THE SOFTWARE, YOU AGREE TO THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, CLICK THE CANCELOR NOBUTTON OR OTHERWISE INDICATE REFUSAL, MAKE NO FURTHER USEOF THE SOFTWARE,AND CONTACT YOUR VENDOR OR SYMANTEC CUSTOMER SERVICE, USINGTHE CONTACT DETAILS IN SECTION 10 OF THIS LICENSE AGREEMENT, FOR INFORMATIONON HOW TO OBTAIN A REFUND OFTHE MONEY YOU PAID FOR THE SOFTWARE (LESSSHIPPING, HANDLING, AND ANY APPLICABLE TAXES EXCEPT IN CERTAIN STATES AND COUNTRIES WHERE SHIPPING,HANDLING, AND TAXES ARE REFUNDABLE) AT ANY TIME DURING THE SIXTY (60)DAY PERIOD FOLLOWING THE DATE OF PURCHASE.
1. License:
The software (including any accompanying features and services) and documentation (including any product packaging) (the
Documentation), that accompanies this License Agreement (collectively the Software) is the property of Symantec or its licensors, and is protected by copyright law. Although Symantec continues to own the Software, after Your acceptance of this License Agreement You will have certain rights to use the Software during the Service Period. The Service Periodshall begin on the date of Your initial installation of the Software, regardless of the number of copies that You are permitted to use in accordance with Section 1.A of this License Agreement, and shall last for the period of time set forth in the Documentation or the applicable transaction documentation from the authorized distributoror resellerfrom which You obtained the Software. The Software may automatically deactivate and become non-operational at the end of the Service Period, andYou will not be entitled to receive any feature or content updates to the Software unless the Service Period is renewed. Subscriptions for renewals of the Service Periodwill beavailable in accordance with Symantecs support policy posted at
http://www.symantec.com/ techsupp/support_policy.html.
This License Agreement governs any releases, revisions,updates orenhancements to the Software that Symantec may make available to You. Except as may be modified by the Documentation, and subject to Symantecs right to terminate for Your breach pursuant to Section 9, Your rights and obligations under this License Agreement with respect to the use of this Software are as follows.
During the Service Period, You may:
A. use one copy of the Software on a single computer. If a greater number of copies and/or number of computers is specified within the Documentation or the applicable transaction documentation from the authorized distributoror resellerfrom which You obtained the Software, You may use the Software in accordance with such specifications;
Page 4
B. makeone copyof theSoftware for back-up or archival purposes, or copy the Software onto the hard disk of Your computer and retain the original for back-up or archival purposes;
C. use the Software on a network, provided that Youhave alicensed copyof the Software for each computer that can access the Software over that network;
D. permanently transfer all of Your rights in the Software granted under this License Agreement to another person or entity, provided that You retain no copies of the Software and the transferee agrees to the terms of this License Agreement. Partial transfer of Your rights under this License Agreement shall not be permitted. For example, if the applicable documentation grants You the right to use multiple copies of the Software, only a transfer of the rights to use all such copies of the Software would be valid; and
E. use the Software in accordance with any additional permitted uses which may be set forth below.
You may not, nor may you permit any other person to:
A. sublicense,rent or lease any portion of the Software;
B. reverse engineer, decompile, disassemble, modify, translate, make any attempt to discover the source code of the Software or create derivative works from the Software;
C. use the Software as part of a facility management, timesharing, service provider or service bureau arrangement; or
D. usethe Software in any manner that is not permitted pursuant to this License Agreement.
2. Software Feature and Content Updates:
A. You shall have the right to receive new features to the Software as Symantec, in its sole discretion,makes suchfeatures available with the Software during Your Service Period. Symantec continually strives to improve the usability and performanceof its products and services. In order to optimize the SoftwareSymantec may,at its discretion
and without notice, add, modify or remove features from the Software at any time.
B. Certain Software uses content that is updated fromtime to time, including but not limited to the following Software: antivirus and crimeware software use updated virus definitions; antispyware software uses updated spyware definitions; antispam software uses updated antispam rules; content filtering and antiphishing software use updatedURL lists;some firewallsoftware use updated firewall rules; vulnerability assessment products use updated vulnerability data and web site authentication software uses updated lists of authenticated web pages; these updates are collectively referred to as Content Updates(or alternatively referred to as Protection Updatesor Security Updates at times). You shall have the right to receive Content Updates for the Software during Your Service Period.
3. Product Installation; Required Activation:
A. During the installation process, the Software may uninstall or disable other security products,or features thereof, if such products or features are incompatible with the Software or for purposes of improving the overall functionality of the Software.
B. There may be technological measures in this Software that are designed to prevent unlicensed orillegal use of the Software. You agree thatSymantec may use these measures to protectSymantec againstsoftware piracy. This Software may contain enforcement technology that limits the ability to install and uninstall the Software on a computer to not more than a finite number of times for a finite number of computers. This License Agreement and the Software containing enforcement technology may require activation as further set forth in the Documentation. If so, the Software will only operate for a finite period of time prior to Software activation by You. During activation, You may be required to provide Your unique product key accompanying the Software and computer configuration in the form of an alphanumeric code over the Internet to verify the authenticity of the Software. If You do not complete the activation within the finite period of time set forth in the Documentation, or as prompted by the Software, the Software will cease to
Page 5
function until activation is complete; at which time the Software functionality will be restored. In the event that You are not able to activate the Software over the Internet, or through any other method specified during the activation process, You may contact Symantec Customer Support using theinformation providedby Symantec during activation, or as set forth below.
4. Privacy; Data Protection:
From time to time, the Software may collect certain information from the computer on which it is installed, which may include:
Information regarding installation of the Software. This information indicates to Symantec whether installation of the Software was successfully completed and is collected by Symantec for the purpose of evaluating and improving Symantecs product installation success rate. This information will not be correlated with any personally identifiable information.
Portable executable files that are identified as potentialmalware, including information on the actions taken by such files at the time of installation. These files are submitted to Symantec using the Softwares automatic submission function.The collectedfiles could contain personally identifiable information that has been obtained by the malware without Your permission. Files of this type are being collected by Symantec only for the purpose of improving the ability of Symantecs products to detect malicious behavior. Symantec will not correlate these files with any personally identifiable information. Such automatic submission function maybe deactivatedafter installation by following the instructions in the Documentation for applicable products.
The name given during initial setup to the computer on which the Software is being installed. If collected, the name will be used by Symantec as an account name for such computer under which You may elect to receive additional services and/or under which You may use certain features of the Software. Youmay change the account name at anytime afterinstallation ofthe Software (recommended).
Status information regarding installation and operation of the Software. This information indicates to Symantec whether installation of the Software wassuccessfully
completed as well as whether the Software has encountered an error. The status information could contain personally identifiable information only if such information is included in the name of the file or folder encountered by the Software at the time of installation or error. The status information iscollected bySymantec forthe purpose of evaluating and improving Symantecs product performance and installation success rate. This information will not be correlated with any personally identifiable information.
Information contained in email messages that you send through the Software to Symantec to report as spamor as incorrectly identified as spam. These email messages may contain personally identifiable information and will be sent to Symantec only with your permission, and will not be sent automatically. If you send such messages to Symantec, Symantec will use them only for the purpose of improving the detection ability of Symantecs antispam technology. Symantecwill notcorrelate these files with any other personally identifiable information.
The IPaddress ofthe computeron whichthe Software isinstalled, as well as other general, statistical information used for license administration, product analysis, and for improving product functionality. This information will not be correlated with any personally identifiable information.
The collected information as set out above is necessary for the purpose of optimizing the functionalityof Symantecsproducts and may be transferred to the Symantec group in the United States or other countries that may haveless protectivedata protectionlaws than the region in which You are situated (including the European Union), but Symantec has taken steps so that the collected information,if transferred,receives an adequate level of protection.
Symantec may disclose the collected information if asked to do so by a law enforcement officialas requiredor permitted by law or in response to a subpoena or other legal process.In orderto promoteawareness, detection andprevention ofInternet security risks, Symantec may share certain information withresearch organizationsand other security software vendors. Symantec may also use statistics derived from the information to track and publish reports on security risk trends. By using the Software,
Page 6
You acknowledge and agree that Symantec may collect, transmit, store, disclose and analyze suchinformation forthese purposes.
5. Sixty (60) Day Money Back Guarantee:
If You are the original licensee of this copy of the Software and are not completely satisfied with it for any reason, please make no further use of the Software and contact Symantec Customer Service, using the contact details set out in Section 10 of this License Agreement, for a refund of the money You paid for the Software (less shipping, handling, and any applicable taxes except in certain states and countries where shipping, handlingand taxesare refundable) at any time during the sixty (60) day period following the date of purchase.
6. Limited Warranty:
Symantec warrants that any media manufactured by Symantec on which the Software is distributed will be free from defects for a period of sixty (60) days from the date of delivery of the Software to You. Your sole remedy in the event of a breach of this warranty will be that Symantec will, at its option, replace any defective media returned to Symantec within the warranty period or refund the money You paid for the Software. Symantec does not warrant that the Software will meet Your requirements or that operation of the Software will be uninterrupted or that the Software will be error-free.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE ABOVE WARRANTY IS EXCLUSIVE AND INLIEU OF ALL OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY FROM STATE TOSTATE AND COUNTRYTO COUNTRY.
7. Disclaimer of Damages:
SOME STATES AND COUNTRIES DO NOT ALLOW THE LIMITATION OR EXCLUSION
OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE BELOW LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH HEREIN FAILS OF ITS ESSENTIALPURPOSE, IN NO EVENT WILL SYMANTEC OR ITS LICENSORS BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INDIRECT, OR SIMILAR DAMAGES, INCLUDINGANY LOST PROFITS OR LOST DATA ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE EVEN IFSYMANTECHAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
IN NO CASE SHALL SYMANTECS OR ITS LICENSORSLIABILITY EXCEED THE PURCHASE PRICE WHICH YOU PAID FOR THE APPLICABLE SERVICE PERIOD. The disclaimers and limitations set forth above will apply regardless of whether You accept the Software.
8. U.S. Government Restricted Rights:
The Software is deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, Rights in Commercial Computer Softwareor Commercial Computer Software Documentation,as applicable,and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Software by the U.S. Government shall be solely in accordance with the terms of this License Agreement.
9. Export Regulation:
You acknowledge that the Software and related technical data and services (collectively "Controlled Technology") may be subject to the import and export laws of the UnitedStates, specificallythe U.S. Export Administration Regulations (EAR), and the laws of any country where Controlled Technology is imported or re-exported. You agree to comply with all relevant laws and will not export any Controlled Technology in contravention to U.S. law nor to any prohibited country, entity, or person for
Page 7
which an export license or other governmental approval is required. All Symantec product is prohibited for export or re-exportto Cuba,North Korea, Iran, Syria and Sudan and to any country subject to relevant trade sanctions. USE OR FACILITATION OF SYMANTEC PRODUCT IN CONNECTION WITH ANY ACTIVITY INCLUDING, BUT NOT LIMITED TO, THE DESIGN, DEVELOPMENT, FABRICATION, TRAINING, OR TESTING OF CHEMICAL, BIOLOGICAL, OR NUCLEAR MATERIALS, OR MISSILES, DRONES,OR SPACE LAUNCH VEHICLES CAPABLE OF DELIVERING WEAPONS OF MASS DESTRUCTION IS PROHIBITED, IN ACCORDANCE WITH U.S. LAW.
10. General:
This License Agreement will be governed by the laws of the State of California, United States of America. This License Agreement is the entire agreement between You and Symantec relating to the Software and: (i) supersedes allprior orcontemporaneous oral or written communications, proposals, and representations with respect to its subject matter; and (ii) prevails over any conflicting or additional terms of any quote, order, acknowledgment, orsimilar communications between the parties. Notwithstanding the foregoing, nothingin thisLicense Agreement will diminishany rightsYou mayhave under existing consumer protection legislation or other applicable laws in Your jurisdiction that may not be waived by contract. This License Agreement shall terminate upon Your breach of any term contained in this License Agreement and You shall cease use of and destroy all copies of the Software and Documentation. The disclaimers of warranties and damages and limitations on liability shall survive termination. This License Agreement may only be modified by the Documentationor bya written document that has been signed by both You and Symantec. Should You have any questions concerning thisLicense Agreement,or ifYou desire to contact Symantec for any reason, please write to Symantec Customer Service, 555 International Way, Springfield, OR 97477, U.S.A. or visit the Support page at www.symantec.com.
CPS / S 3.0 / USE
Additional Terms and Conditions:
In additon to the terms and conditions set forth above, the following terms and conditions will also apply to Your use of the Software:
Technical Support:
In connection with Your use of the Software You may choose to access certain technical support features that may be offered from within the Software, which may include live chat with a technical support agent and/or assistance from a technical support agent via remote computer access (any such technical support offered from within the Software shall be referred to in this License Agreement as the Technical Support). Any such Technical Support shall be provided in Symantecs sole discretion without any guarantee orwarranty of any kind. It is solely Your responsibility to complete a backup of all Yourexisting data,software andprograms before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine that the technical issue is beyond the scope of the Technical Support. Symantec reserves the right to refuse, suspend or terminate any of the Technical Support in its sole discretion.
CPS / S 1.1 / NAV-NIS
Page 8
Page 9
Chapter 1 Overview .. . .... . ... . ... . ... . ... . ... . ... . ... . ... . .... . . 11
About Norton Internet Security ... . ... . ... . .... . .. 11
What is new in Norton Internet
Security ... . ... . ... . ... . ... . ... . .... . ... . ... . ... . .. 12
Chapter 2 Installation ... . ... . ... . .... . ... . ... . ... . ... . ... . ... . . 15
Before you begin .... . ... . ... . ... . ... . ... . ... . ... . ... . . 15
Installing Norton Internet Security . . ... . ... . ... . 16
If the opening panel does not appear . ... . ... . ... . 16
Chapter 3 Getting started ... . ... . ... . ... . ... . .... . ... . ... . ... . . 17
Starting Norton Internet Security . ... . ... . ... . ... 17
Activating your product ... . ... . ... . ... . ... . ... . ... . . 18
Exploring the main window ... . ... . ... . ... . .... . ... 20
Viewing the protection status of your
computer .... . ... . ... . ... . ... . ... . ... . ... . ... . .... 22
About the security status indicator . ... . ... . ... . .. 22
For more information .. . ... . ... . ... . .... . ... . ... . ... 23
Chapter 4 Responding to emergencies .... . ... . .... . ... . .. 27
Using the Norton Bootable Recovery Tool
if you cannot install the
product . ... . ... . ... . ... . ... . ... . ... . .... . ... . ... . . 27
Downloading the NortonBootable Recovery
Tool .. . ... . ... . ... . ... . ... . ... . ... . .... . ... . ... . ... 28
Service and Support Solutions ..... . ... . ... . ... . ... . ... . ... . .... . ... . . 29
Index . ... . ... . ... . ... . .... . ... . ... . ... . ... . ... . ... . ... . ... . .... . ... . ... . ... . ... . 35
Contents
Page 10
Quick Installation . . .... . ... . ... . ... . ... . ... . ... . ... . ... . .... . ... . ... . ... . .. 38
Contents10
Page 11
This chapter includes the following topics:
1 About Norton Internet Security
1 What is new in Norton Internet Security
About Norton Internet Security
Norton Internet Security delivers fast and light online threat protection. It guards your PC, network, online activities, and your identity with innovative detection technologies optimized to combat todays aggressive, rapid-fire attacks. Norton Internet Security makes online shopping, banking, and browsing safer and more convenient than ever.
The improved Norton Protection System features multilayered security technologies. They work together to provide the comprehensive protection that detects and removes threats before they can harm your PC. The Norton Protection System stops online identity theft, viruses, hackers, bots, spyware, Trojan horses, and more without slowing you down or getting in your way
1
Overview
Page 12
What is new in Norton Internet Security
This version of Norton Internet Security offers the following new features:
Features the multilayered technologies that work together to proactively block attacks and detect and remove threats traditional virus scanning alone cant stop.
Improved Norton Protection System
Analyzes downloaded files and applications and lets you know if they can be trusted to be safe before you install and run them
Norton Download Insight
Guards vulnerabilities in your operating system, applications, browsers, and browser plug-ins to prevent threats from sneaking in.
Improved Vulnerability Protection
Uses Symantecs global security intelligence network to provide real-time protection from the newest threats.
Norton Insight Network
Uses our exclusive, completely re-engineered SONAR technology to detect suspicious behavior on your PC and proactively stop the threats that competing antivirus solutions cant catch.
Real-Time SONAR 2 (Symantec Online Network for Advanced Response)
Overview
What is new in Norton Internet Security
12
Page 13
Tells you what Norton Internet Security has done in the past month so you can stay actively aware of how its protecting you and your PC.
Monthly Report
Uses extensive online intelligence systems to proactively protect your PC without slowing it down. It provides clear and useful information about downloads, threats, and files.
Improved Norton Insight
Reports tell you what actions threats have taken and where they came from so you can avoid future attacks.
Norton Threat Insight
Reports tell you where files and applications came from, if theyre trusted before you use them, and how the files and applications might impact your PCs performance.
Norton File Insight
Adds the additional protection when you search, shop, and surf the Web to stop Internet threats before they can infect your PC.
1 Identifies unsafe and
dangerous Web sites right in your search results.
1 Analyzes downloaded files
and applications and lets you know if they can be trusted to be safe before you install and run them.
Improved Norton Safe Web
13Overview
What is new in Norton Internet Security
Page 14
Uses the same technology that many large businesses rely on to effectively block unwanted, dangerous, and fraudulent emails.
Professional-strength antispam protection
Overview
What is new in Norton Internet Security
14
Page 15
This chapter includes the following topics:
1 Before you begin
1 Installing Norton Internet Security
1 If the opening panel does not appear
Before you begin
Before you begin, you should close all open programs on your computer and ensure that you are connected to the Internet.
Norton Internet Security contains an antivirus program. If you have other antivirus programs that are installed on your computer, an uninstall panel may appear to help you remove them. Symantec strongly recommends that you remove the other antivirus programs. Follow the instructions on the uninstall panel.
Norton Internet Security contains a firewall program. If you have other firewall programs that are installed on your computer, Symantec strongly recommends that you remove them to prevent installation errors.
For more information, see the user documentation that came with the firewall program.
w
During the installation, if a firewall message appears, click Yes to use the Norton Internet Security firewall.
2
Installation
Page 16
Installing Norton Internet Security
You can install Norton Internet Security from a CD or from a file that you download.
To install Norton Internet Security
1
Do one of the following:
1 If you install from a CD, insert the CD into the
drive. In the opening panel, click Install Norton Internet Security.
1 If you downloaded your copy of Norton Internet
Security, double-click the file that you downloaded.
2
In the Norton Internet Security installation page, enter the Product Key if prompted.
3
Click the Install Options link, review the options, and then click OK.
4
Click the User License Agreement link, and read the agreement.
5
After you have read the agreement, click AGREE & INSTALL.
If the opening panel does not appear
Sometimes a computer's optical drive does not automatically run a CD.
To start the installation from the product CD
1
On your desktop, double-click My Computer.
2
In the MyComputer window, double-click the icon for your optical drive.
3
In the list of files, double-click Start.exe.
Installation
Installing Norton Internet Security
16
Page 17
This chapter includes the following topics:
1 Starting Norton Internet Security
1 Activating your product
1 Exploring the main window
1 Viewing the protection status of your computer
1 About the security status indicator
1 For more information
Starting Norton Internet Security
See “Responding to
security status indicators
on page 22.
Norton Internet Security protects any computer on which it is installed. You do not have to start the program to be protected.
At any time, you can start Norton Internet Security to adjust the settings or perform preventive maintenance. All of the program features can be accessed from the main window.
3
Getting started
Page 18
To start Norton Internet Security
4
Do one of the following:
1 In the Windows notification area, double-click
the Norton Internet Security icon.
1 On the Windows taskbar, On the Start menu,
click All Programs > Norton Internet Security > Norton Internet Security.
Activating your product
If you did not activate your product during installation, you receive an activation-needed alert regularly until you activate the product.
Product activation reduces software piracy and ensures that you use authentic Symantec software. Activation provides you specified period of subscription to your Norton product. You can also renew your subscription after the end of your subscription period.
w
You must activate your product within the time period that the alert specifies, or your product stops working.
You can activate your product directly from the activation-needed alert. Or, you can use the Activate Now option in the main window. Activation should take only a few minutes.
During activation, the Norton Account window appears. You can create your Norton Account and register your product. You can also view details, such as your Product Key, your registration date, and recent updates to the product. If you skip the NortonAccount window, the product is activated, but the Product Key is not saved in the Norton Account. You can print the Product Key to reinstall your product in the future.
Getting started
Activating your product
18
Page 19
To activate your product from the alert
1
In the alert, do one of the following:
1 If you purchased a subscription version of a
retail product, select Activate Now.
1 If the product came installed on your computer,
select Renew Now.
You can also activate or renew the subscription of your product from any non-admin user account.
2
Click OK.
3
Follow the on-screen instructions to activate or renew your product.
4
In the window that appears, click Done.
To activate your product from the main window
1
In the Norton Internet Security main window, do one of the following:
1 If you purchased a subscription version of a
retail product, click Activate Now.
1 If the product came installed on your computer,
click Express Renewal.
You can also activate or renew the subscription of your product from any non-admin user account.
2
Follow the on-screen instructions to activate or subscribe your product.
3
In the window that appears, click Done.
About problems during activation
If you cannot connect to the Symantec servers to activate your product, first check your Internet connection. You then need to see if you have parental control software, either installed or through your ISP, that might block the connection.
A connectivity problem can occur if you use parental control software. If you suspect that parental controls might block the connection, you can configure the parental controls so that they do not block the activation procedure. You need to log on to your
19Getting started
Activating your product
Page 20
parental control software or to the Internet through your ISP as an administrator to change your configuration.
Exploring the main window
When you start Norton Internet Security, the main window opens. The main window provides access to all Norton Internet Security features, options, Help, and Support.
To explore the main window
1
See “Starting Norton
Internet Security
on page 17.
Start Norton Internet Security.
2
On the top of the main window, click the link that you want to explore. Your options are:
Lets you submit feedback about your experience with your Norton product
Leave Feedback
Lets you manage all of your Norton product information from one location
Norton Account
Lets you view Norton Help Center, Norton One Click Support , Tutorials, Check for New Version, Subscription Status, and About Norton Internet Security information
Help & Support
Getting started
Exploring the main window
20
Page 21
3
On the left sideof themain window, clickthe option that you want to explore. Your options are:
Lets you view the security status of your computer
Security status Indicator
Lets you view and monitor all Norton-specific background tasks that Norton Internet Security runs during idle time
Norton Tasks
Lets you monitor the overall system CPU usage and the Norton-specific CPU usage
CPU usage
Lets you view and monitor your system activity
Performance
Lets you SmartScan the files on your computer
Application Ratings
4
In the center of the window, click Settings in the category pane that you want to explore. Your options are:
Helps you secure the data on your computer from viruses and other threats
Computer
Helps you secure your system from threats over the network
Network
Helps you manage your identities and provides additional security while you surf the Web or perform online transactions
Web
21Getting started
Exploring the main window
Page 22
Viewing the protection status of your computer
The Norton Internet Security main window acts as a security management interface. You can access the main features and monitor the performance of your computer from the main window.
As you use your computer, the product monitors how well your computer and activities are protected from threats, risks, and damage.
w
The product displays theprotection statusfor selected items only.
To view the protection status of your computer
See “Starting Norton
Internet Security
on page 17.
1
In the Norton Internet Security main window, move your mouse over the information icon next to an item.
2
Optionally, do any of the following:
1 To ignore the status of an item that affects your
system's overall health evaluation,click Ignore.
1 To monitor a security item that has been ignored,
click Monitor.
About the security status indicator
The Security Status Indicator summarizes your current protection levels for different activities such as emailing and Web browsing. It estimates ageneral level of protection based on the security programs that are installed on your computer. The Security Status Indicator appears on the left side of the main window.
Responding to security status indicators
When your system encounters a threat or a risk, the product displays the security status in the Norton Internet Security main window. When a status indicator displays a status, you can take appropriate
Getting started
Viewing the protection status of your computer
22
Page 23
action to improve your protection status. Your protection is based on the programs that are installed on your computer. To improve your protection status, ensure that your installed programs are up to date.
The status indicator displays the following statuses:
Indicates that your computer and activities are protected from threats, risks, and damage
Secure
Indicates that your computer and activities require attention
Take appropriate action to improve your protection status.
Attention
Indicates that your computer and activities are at risk
Take immediate action to improve your protection status.
At Risk
You can respond to the status indicators directly from the main window.
To respond to status indicators from the main window
1
In the Norton Internet Security main window, click Fix Now.
2
Follow the on-screen instructions.
For more information
The product documentation helps you use Norton Internet Security. You can find the information that you need on your computer and on the Symantec Web site.
23Getting started
For more information
Page 24
Accessing Help
Help is available throughout your Symantec product. Help provides links to information that assists you with the specific tasks that you want to complete. The online Help provides a guide to all of the product features.
To access Help
1
At the top of the main window, click Help & Support.
2
In the drop-down menu, click Help.
3
In the Help window, in the left pane, click a tab. Your options are:
Displays Help by topicContents
Lists all keywords for the Help topics in alphabetical order
Index
Opens a search box in which you can type a word or a phrase
Search
To print a Help topic
1
In the Help window, click the Contents tab.
2
In the Contents list, select the topic that you want to print, and then click Print.
3
Select whether you want to print only the selected topic, or the topic and all of the subtopics under it.
4
Click OK.
Accessing the user guide PDF
You can find the Norton Internet Security User Guide on the CD in PDF format. You must have Adobe® Reader® installed on your computer to read the PDF.
Getting started
For more information
24
Page 25
w
If you purchased this product as a download, the PDF and Adobe Readerare not included. You must download the PDF from the Symantec Web site and AdobeReader from the Adobe Web site.
To install Adobe Reader from the CD
1
Insert the CD into the optical drive.
2
In the window that appears, click Browse CD.
3
In the CD window, double-click the Manual folder.
4
Double-click the Adobe program file.
5
Follow the on-screen instructions.
After you install the Adobe Reader, you can read the PDF from the CD.
To read the user guide PDF from the CD
1
Insert the CD into the optical drive.
2
In the window that appears, click Browse CD.
3
In the CD window, double-click the Manual folder.
4
Double-click the PDF.
You can also copy the user guide to your computer and read it from there.
To read the user guide that you copied to your computer
1
Go to the location into which you copied the PDF.
2
Double-click the PDF.
Accessing the Symantec Web site
You can access the Symantec Web site from your product or from a browser.
To access the Symantec Web site in your browser
1
Open your Web browser.
2
Go to the following URL: www.symantec.com
25Getting started
For more information
Page 26
Getting started
For more information
26
Page 27
This chapter includes the following topics:
1 Using the Norton Bootable Recovery Tool if you
cannot install the product
1 Downloading the Norton Bootable Recovery Tool
Using the Norton Bootable Recovery Tool if you cannot install the product
If the installationof yourproduct fails, you can use the Norton Bootable Recovery Tool on your product disc. The Norton Bootable Recovery Tool helps you to check your computer for the risks that can prevent successful installation.
To use the Norton Bootable Recovery Tool if you cannot install the product
1
Insert your product disc into the drive.
2
Exit all programs, and restart your computer.
3
When you see the message Press any key to boot the computer from CD or DVD, press Enter.
4
In the Norton Bootable Recovery Tool window, select your language, and then click OK.
5
Type your Norton Product Key, and then click I Agree to accept the License Agreement.
6
Click Start Scan.
4
Responding to emergencies
Page 28
7
After the scan is completed, remove the disc from the drive and restart your computer.
Downloading the Norton Bootable Recovery Tool
If the installation of your product fails, you can download the Norton Bootable Recovery Tool. The Norton Bootable Recovery Tool helps you to check your computer for the risks that can prevent successful installation.
Before you begin, you should close all open programs on your computer and ensure that you are connected to the Internet.
To download the Norton Bootable Recovery Tool
1
Go to the following URL: http://www.norton.com/recoverytool
2
Follow the on-screen instructions.
Responding to emergencies
Downloading the Norton Bootable Recovery Tool
28
Page 29
About Support
If you have Norton SystemWorks, Norton 360, Norton Internet Security, or Norton AntiVirus, you can access Support through the product after it is installed.
See the section "One Click Support" for more details.
For all other products, to help you find an answer to your query or issue, we have two support options available. Details of each option are explained in the relevant section:
1 Self Help
1 Contact Support
w
Support offerings may vary based on the language or product.
One Click Support
This feature is available for Norton 360, Norton Internet Security, and Norton AntiVirus. If your product isnt installed, you can use the Self Help or Contact Support options.
One Click Support lets you access support from within your product and offers the tools that automatically diagnose and resolve common issues. You can also search for solutions or gain easy access to support by phone, as well as free support by chat and email. To access One Click Support, click Help and Support on the product interface.
Service and Support Solutions
Page 30
Self Help
The Symantec Web site contains answers to the most common customer questions. From our Web site you can:
1 Find help withyour subscription, download, product
activation, or other nontechnical issues.
1 Search our knowledge base for help with technical
issues, such as installing, configuring, or troubleshooting errors withyour Symantec product.
1 Find information about the latest virus threats and
removal tools.
You can access the Symantec support Web site at:
www.symantec.com/globalsupport
Contact Support
In addition to using our Self Help options, you can also contact a support representative by chat, email, or phone.
w
Support offerings may vary based on the language or product.
Following is an overview of our support offerings:
Chat in real time with a support representative.
For more complex technical issues, chat offers the option to allow a support representative to connect remotely to your computer and resolve the problem for you. Chat support is free, with the exception of our Virus and Spyware Solution service.
Chat
Service and Support Solutions
Self Help
30
Page 31
Submit your question on our Web site and receive a response by email.
Email support has a slower response time when compared to chat or phone. Email support is free.
Email
Speak to a support representative in real time.
Phone
To contact a support representative, please visit the Symantec support Web site at the following URL:
www.symantec.com/globalsupport
The online support option is displayed first, followed by the contact options where you can select the type of support you prefer.
Support policy
When Symantec announces that a product will no longer be marketed or sold, telephone support is discontinued six months after the termination announcement. Technical information on these products may still be available through the support Web site at the following address:
www.symantec.com/globalsupport
Symantec reserves the right to change its support policies at any time without notice. You can view the latest version of the support policy at the following URL:
www.symantec.com/supportpolicy
31Service and Support Solutions
Support policy
Page 32
About keeping your subscription current
Subscription period lengths vary by Symantec product. To maintain uninterrupted protection, you must keep your subscription up to date. If you do not renew your subscription, you cannot obtain updates of any kind and the software no longer functions.
When you run LiveUpdate near the end of your subscription period, you are prompted to subscribe for a nominal charge. Follow the instructions onthe screen to renew.
When you renew your subscription, the definition updates and new product features are available throughout the subscription period. Please note that features may be added, modified, or removed during this period.
Worldwide service and support
Support solutions vary by country. For the Symantec and International Partner locations that are outside of the United States, contact one of the support offices available in the list. You can also go to the following Web site and select your language:
http://www.symantec.com/globalsupport
For each region, please check the Web site for the appropriate phone number.
Contact informationRegion
1 Symantec Corporation
555 International Way Springfield, OR 97477 U.S.A. http://www.symantec.com/norton/support/index.jsp
North America
Service and Support Solutions
About keeping your subscription current
32
Page 33
Contact informationRegion
1 Symantec Australia
Level 2, 1 Julius Avenue North Ryde, NSW 2113 Sydney Australia http://www.symantec.com/en/aa/norton/support/index.jsp
Australia and New Zealand
1 Symantec Ltd Consumer Services & Support
PO Box 5689 Blanchardstown Dublin 15 Ireland http://www.symantec.com/en/uk/norton/support/index.jsp
Europe, Middle East, and Africa
1 Symantec Brasil
Sevico e Suporte Symantec Caixa Postal 3037 CEP 06210-970 Brasil
1 Portuguese language support:
http://www.symantec.com/pt/br/norton/support/index.jsp
1 Spanish language support:
http://www.symantec.com/es/mx/norton/support/index.jsp
Latin America
ClubSymantec
Join ClubSymantec and sign up for your free monthly newsletter to receive the latest security articles, tips, and promotions!
For more information, go to the following URL and select your country in the drop-down menu:
www.clubsymantec.com
33Service and Support Solutions
ClubSymantec
Page 34
Service and Support Solutions
ClubSymantec
34
Page 35
A
About
Norton Internet Security 11
activation
alerts 18 problems 19 procedure 18 troubleshooting 19
Adobe Reader
installing 24 using to view PDF 24
C
CD
installing product from 16
Club Symantec
security tips 33
computer
protection status 22
H
Help
accessing 24 printing 24
I
installation
from CD 16 from downloaded file 16
installation (continued)
instructions 16 problems 16, 27–28
M
main window 21
Computer 21 features 20 Help & Support 20 Identity 21 Internet 21 Leave Feedback 20 Network 21 Norton Account 20 options 20 Security Status 21 Support 20
N
newsletter 33 Norton Bootable Recovery Tool
downloading 28 using 27
Norton Internet Security
activating 18 icon 18 main window 20 starting 17
Index
Page 36
O
One Click Support 29
S
Scans
Norton Bootable Recovery
Tool 27
Security Status indicator
protection levels 22
security status indicator
responding 22
viewing 22 Self Help 30 subscription
maintaining 32 Support
contact 30
phone 30
Self Help 29 support
worldwide service 32 Support policy 31 Symantec Web site 25
accessing from yourbrowser 25
T
Technical Support
for Norton Internet Security 25
from Symantec 25
U
user guide PDF
on CD 24
opening 24
Index36
Page 37
Page 38
Quick Installation
Norton Internet Security includes protection updates and new product features as available throughout this renewable service period. With this service you receive the right to use this product on one computer or on the specified number of computers during the service period, which begins upon initial installation. This renewable service includes protection updates and new product features as available throughout the service period, subject to acceptance of the Symantec License Agreement included with this product and available for review at:
www.symantec.com
Product features may be added, modified, or removed during the service period.
Before you begin, you should close all open programs on your computer and ensure that you are connected to the Internet.
Installing Norton Internet Security
You can install Norton Internet Security from a CD or from a file that you download.
To install Norton Internet Security
1 Do one of the following:
If you install from a CD, insert the CD into the drive. In the opening panel,
click Install Norton Internet Security.
If you downloaded your copy of Norton Internet Security, double-click the
file that you downloaded.
2 In the Norton Internet Security installation page, enter the Product Key.
3 Click the Install Options link, review the options, and then click OK.
4 Click the User License Agreement link, and read the agreement.
5 After you have read the agreement, click AGREE & INSTALL.
Norton from Symantec products protect consumers from traditional threats with antivirus, antispam, and Spyware Protection. They also protect against bots, drive-by downloads, and identity theft, and are light on system resources. In addition, Symantec provides services such as online backup and PC Tuneup, and is a trusted source for family online safety. For more information, please click one of the following links:
Antivirus | Antispam | Spyware Protection | Online Backup
Copyright © 2009 Symantec Corporation. All rights reserved. Symantec, Norton, and the Norton Logo are trademarks or registered trademarks of Symantec Corporation and its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
PN: 20045380
Loading...