Symantec, theSymantec Logo,Norton, SONAR,LiveUpdate, Norton
AntiSpam, NortonAntiVirus, NortonInternet Security, Norton 360,
and NortonSystemWorks aretrademarks orregistered trademarks
of Symantec Corporation or its affiliates in the U.S. and other
countries. Windows is a trademark of Microsoft Corporation.
Portions of this product Copyright [1996-2008] Glyph & Cog, LLC.
Other names may be trademarks of their respective owners.
The productdescribed inthis document isdistributed under licenses
restricting itsuse, copying, distribution,and decompilation/reverse
engineering. No part of this document may be reproduced in any
form byany meanswithout priorwritten authorizationof Symantec
Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED"AS IS" AND ALLEXPRESS
OR IMPLIED CONDITIONS, REPRESENTATIONS AND
WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULARPURPOSE OR
NON-INFRINGEMENT, AREDISCLAIMED, EXCEPT TOTHE EXTENT
THAT SUCH DISCLAIMERS ARE HELD TO BELEGALLY INVALID.
SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR
INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION
WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS
DOCUMENTATION. THE INFORMATION CONTAINED IN THIS
DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
Symantec Corporation
350 Ellis Street,
Mountain View, CA 94043
http://www.symantec.com
Printed in the United States of America.
10 9 8 7 6 5 4 3 2 1
Page 3
Norton License Agreement
Norton™ Internet Security
IMPORTANT: PLEASE READ THE TERMS
AND CONDITIONS OF THIS LICENSE
AGREEMENT (“LICENSE AGREEMENT”)
CAREFULLY BEFORE USING THE
SOFTWARE (AS DEFINED BELOW).
SYMANTEC CORPORATION, IF YOU ARE
LOCATED IN THE AMERICAS; OR
SYMANTEC ASIA PACIFICPTE LTD, IF YOU
ARE LOCATED IN THE ASIA PACIFIC RIM
OR JAPAN;OR SYMANTEC LIMITED,IF YOU
ARE LOCATED IN EUROPE, THE MIDDLE
EAST OR AFRICA (“SYMANTEC”) IS
WILLING TO LICENSE THE SOFTWARE TO
YOU AS THEINDIVIDUAL, THE COMPANY,
OR THE LEGAL ENTITY THAT WILL BE
UTILIZING THE SOFTWARE(REFERENCED
BELOW AS “YOU” OR “YOUR”) ONLY ON
THE CONDITION THAT YOU ACCEPT ALL
OF THE TERMS OF THIS LICENSE
AGREEMENT. THIS IS A LEGAL AND
ENFORCEABLE CONTRACTBETWEEN YOU
AND SYMANTEC. BY OPENING THIS
PACKAGE, BREAKINGTHE SEAL, CLICKING
THE “I AGREE” OR “YES” BUTTON OR
OTHERWISE INDICATING ASSENT
ELECTRONICALLY, OR LOADING THE
SOFTWARE, YOU AGREE TO THE TERMS
AND CONDITIONS OF THIS LICENSE
AGREEMENT. IF YOU DO NOT AGREE TO
THESE TERMS AND CONDITIONS, CLICK
THE “CANCEL” OR “NO” OR “CLOSE
WINDOW” BUTTON OR OTHERWISE
INDICATE REFUSAL, MAKE NO FURTHER
USE OF THE SOFTWARE, AND CONTACT
YOUR VENDOROR SYMANTECCUSTOMER
SERVICE, USING THE CONTACT DETAILS
IN SECTION 10 OF THIS LICENSE
AGREEMENT, FORINFORMATION ON HOW
TO OBTAINA REFUND OFTHE MONEY YOU
PAID FORTHE SOFTWARE (LESSSHIPPING,
HANDLING, AND ANY APPLICABLE TAXES
EXCEPT IN CERTAIN STATES AND
COUNTRIES WHERESHIPPING, HANDLING,
AND TAXES ARE REFUNDABLE) AT ANY
TIME DURINGTHE SIXTY (60)DAY PERIOD
FOLLOWING THE DATE OF PURCHASE.
1. License:
The software (including any accompanying
features and services) and documentation
(including any product packaging) (the
“Documentation”), that accompanies this
License Agreement (collectively the
“Software”) is the property of Symantec or
its licensors, and is protected by copyright
law. Although Symantec continues to own
the Software, after Your acceptance of this
License Agreement You will have certain
rights touse the Software duringthe Service
Period. The “Service Period” shall begin on
the date of Your initial installation of the
Software on a computer, mobile or mobile
computing device (a “Device”), regardless of
the number ofcopies that You are permitted
to use in accordance with Section 1.A of this
License Agreement, and shall last for the
period oftime setforth in theDocumentation
or theapplicable transactiondocumentation
from the authorized distributor or reseller
from which You obtained the Software. The
Software may automatically deactivate and
become non-operational at the end of the
Service Period, and You will not be entitled
to receive any feature or content updates to
the Software unless the Service Period is
renewed. Subscriptions for renewals of the
Service Periodwill be availablein accordance
with Symantec’s support policy posted at
This License Agreement governs any
releases, revisions,updates orenhancements
to the Software that Symantec may make
available to You. Except as may be modified
by the Documentation, and subject to
Symantec’s right to terminate for Your
breach pursuant to Section 9, Your rights
and obligations under this License
Agreement with respect to the use of this
Software are as follows.
During the Service Period, You
may:
A.use one copy of the Software on a single
Device. If a greater number of copies and/or
number of Devices is specified within the
Documentation orthe applicabletransaction
documentation from the authorized
distributor or reseller from which You
obtained the Software, You may use the
Page 4
Software in accordance with such
specifications;
B. makeone copy of the Softwarefor back-up
or archival purposes, or copy the Software
onto the hard diskof Your Device and retain
the originalfor back-up orarchival purposes;
C. use the Software on a network, provided
that Youhave a licensedcopy of the Software
for each Devicethat can accessthe Software
over that network;
D. permanently transferall of Yourrights in
the Software granted under this License
Agreement to another person or entity,
provided that You retain no copies of the
Software and the transferee agrees to the
terms of this License Agreement. Partial
transfer of Your rights under this License
Agreement shall not be permitted. For
example, if the applicable documentation
grants You the right to use multiple copies
of the Software, only atransfer of the rights
to use all such copies of the Software would
be valid; and
E. use the Software in accordance with any
additional permitted uses which may be set
forth below.
You may not, nor may you permit
any other person to:
A. sublicense,rent or leaseany portion of the
Software;
B. reverseengineer, decompile, disassemble,
modify, translate, make any attempt to
discover the source code of the Software or
create derivative works from the Software;
C. use the Software as part of a facility
management, timesharing, service provider
or service bureau arrangement; or
D. usethe Software inany manner that isnot
permitted pursuant to this License
Agreement.
2. Software Feature and Content
Updates:
A. You shall have the right to receive new
features to the Software as Symantec, in its
sole discretion,makes suchfeatures available
with the Software during Your Service
Period. Symantec continually strives to
improve theusability and performanceof its
products and services. In order to optimize
the SoftwareSymantec may, at its discretion
and without notice, add, modify or remove
features from the Software at any time.
B. Certain Software uses content that is
updated fromtime totime, includingbut not
limited to the following Software: antivirus
and crimeware software use updated virus
definitions; antispyware software uses
updated spyware definitions; antispam
software uses updated antispam rules;
content filtering and antiphishing software
use updatedURL lists;some firewall software
use updated firewall rules; vulnerability
assessment products use updated
vulnerability data and web site
authentication software uses updated lists
of authenticated web pages; these updates
are collectively referred to as “Content
Updates” (or alternatively referred to as
“Protection Updates” or “Security Updates”
at times). You shall have theright to receive
Content Updates for the Software during
Your Service Period.
3. Product Installation; Required
Activation:
A. During the installation process, the
Software may uninstall or disable other
security products,or features thereof,if such
products or features are incompatible with
the Software or for purposes of improving
the overall functionality of the Software.
B. There may be technological measures in
this Software that are designed to prevent
unlicensed orillegal use ofthe Software. You
agree thatSymantec mayuse thesemeasures
to protectSymantec against software piracy.
This Software may contain enforcement
technology that limits the ability to install
and uninstallthe Software ona Device tonot
more than a finite number of times for a
finite number of Devices. This License
Agreement and the Software containing
enforcement technology may require
activation as further set forth in the
Documentation. If so, the Softwarewill only
operate for a finite period of time prior to
Software activation by You. During
activation, You may be required to provide
Your unique activation code accompanying
the Softwareand Device configuration in the
form of an alphanumeric code over the
Internet to verify the authenticity of the
Software. If You do not complete the
activation within the finite periodof time set
forth in the Documentation, or as prompted
Page 5
by the Software, the Software will cease to
function until activation is complete; at
which time the Software functionality will
be restored. In the event that You are not
able to activate the Software over the
Internet, or through any other method
specified during the activation process, You
may contact Symantec Customer Support
using theinformation providedby Symantec
during activation, or as set forth below.
4. Technical Support:
Certain technical support features may be
offered from within the Software andwhich
may include live chat with a technical
support agent and/or assistance from a
technical supportagent viaremote computer
access (any such technical support offered
from within the Software shall be referred
to in this License Agreement as the
“Technical Support”). If such features are
offered and You choose to access such
Technical Support the following terms shall
apply. Any such Technical Support shall be
provided in Symantec’s sole discretion
without any guarantee or warranty of any
kind. It is solely Your responsibility to
complete a backup of all Your existing data,
software and programsbefore receiving any
Technical Support.In thecourse of providing
the Technical Support, Symantec may
determine that the technical issue is beyond
the scopeof theTechnical Support.Symantec
reserves the right to refuse, suspend or
terminate any of the Technical Support in
its sole discretion.
5. Sixty (60) Day Money Back
Guarantee:
If You are the original licensee of this copy
of the Software and are not completely
satisfied with it for any reason, please make
no further use of the Software and contact
Symantec Customer Service, using the
contact details set out in Section 10 of this
License Agreement, for a refund of the
money You paid for the Software (less
shipping, handling,and any applicabletaxes
except in certain statesand countries where
shipping, handlingand taxes are refundable)
at any time during the sixty (60) day period
following the date of purchase.
6. Limited Warranty:
Symantec warrants that any media
manufactured by Symantec on which the
Software is distributed will be free from
defects for a period of sixty (60) days from
the date of delivery of the Software to You.
Your sole remedy in the event of a breach of
this warranty will be that Symantec will, at
its option, replace any defective media
returned to Symantec within the warranty
period or refund the money You paid for the
Software. Symantec does not warrant that
the Softwarewill meet Yourrequirements or
that operation of the Software will be
uninterrupted or that the Software will be
error-free.
TO THE MAXIMUM EXTENT PERMITTED
BY APPLICABLE LAW, THE ABOVE
WARRANTY ISEXCLUSIVE AND INLIEU OF
ALL OTHER WARRANTIES, WHETHER
EXPRESS OR IMPLIED, INCLUDING THE
IMPLIED WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE, AND
NON-INFRINGEMENT OF INTELLECTUAL
PROPERTY RIGHTS. THIS WARRANTY
GIVES YOU SPECIFIC LEGAL RIGHTS. YOU
MAY HAVE OTHER RIGHTS, WHICH VARY
FROM STATETO STATE AND COUNTRYTO
COUNTRY.
7. Disclaimer of Damages:
SOME STATES AND COUNTRIES DO NOT
ALLOW THE LIMITATION OR EXCLUSION
OF LIABILITY FOR INCIDENTAL OR
CONSEQUENTIAL DAMAGES, SO THE
BELOW LIMITATION OR EXCLUSION MAY
NOT APPLY TO YOU.
TO THE MAXIMUM EXTENT PERMITTED
BY APPLICABLE LAW AND REGARDLESS
OF WHETHER ANY REMEDY SET FORTH
HEREIN FAILSOF ITS ESSENTIALPURPOSE,
IN NO EVENT WILL SYMANTEC OR ITS
LICENSORS BE LIABLE TO YOU FOR ANY
SPECIAL, CONSEQUENTIAL, INDIRECT,OR
SIMILAR DAMAGES,INCLUDING ANY LOST
PROFITS OR LOST DATA ARISING OUT OF
THE USE OR INABILITY TO USE THE
SOFTWARE EVENIF SYMANTECHAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
IN NO CASE SHALL SYMANTEC’S OR ITS
LICENSORS’ LIABILITY EXCEED THE
PURCHASE PRICE WHICH YOU PAID FOR
THE APPLICABLE SERVICE PERIOD. The
Page 6
disclaimers and limitations set forth above
will apply regardless of whether You accept
the Software.
8. U.S. Government Restricted
Rights:
For U.S. Government procurements, the
Software is deemed to be commercial
computer software asdefined in FAR12.212
and subject to restricted rightsas defined in
FAR Section 52.227-19 "Commercial
Computer Software - Restricted Rights" and
DFARS 227.7202, “Rights in Commercial
Computer Softwareor Commercial Computer
Software Documentation”,as applicable,and
any successor regulations. Any use,
modification, reproduction release,
performance, display or disclosure of the
Software by the U.S. Government shall be
solely in accordance with the terms of this
License Agreement.
9. Export Regulation:
You acknowledge that the Software and
related technical data and services
(collectively "Controlled Technology") may
be subject to the import and export laws of
the UnitedStates, specifically theU.S. Export
Administration Regulations (EAR), and the
laws of any country where Controlled
Technology is imported or re-exported. You
agree to comply with all relevant laws and
will not export any Controlled Technology
in contravention to U.S. law nor to any
prohibited country, entity, or person for
which an export license or other
governmental approval is required. All
Symantec product is prohibited for export
or re-exportto Cuba, NorthKorea, Iran, Syria
and Sudan and to any country subject to
relevant trade sanctions. USE OR
FACILITATION OF SYMANTEC PRODUCT
IN CONNECTION WITH ANY ACTIVITY
INCLUDING, BUT NOT LIMITED TO, THE
DESIGN, DEVELOPMENT, FABRICATION,
TRAINING, OR TESTING OF CHEMICAL,
BIOLOGICAL, OR NUCLEAR MATERIALS,
OR MISSILES,DRONES, OR SPACE LAUNCH
VEHICLES CAPABLE OF DELIVERING
WEAPONS OF MASS DESTRUCTION IS
PROHIBITED, IN ACCORDANCE WITH U.S.
LAW.
10. General:
This License Agreement will begoverned by
the laws of the State of California, United
States of America. This License Agreement
is the entire agreement between You and
Symantec relating to the Software and: (i)
supersedes allprior orcontemporaneous oral
or written communications, proposals, and
representations with respect to its subject
matter; and (ii) prevails overany conflicting
or additional terms of any quote, order,
acknowledgment, orsimilar communications
between the parties. Notwithstanding the
foregoing, nothingin thisLicense Agreement
will diminishany rightsYou may haveunder
existing consumer protection legislation or
other applicable laws in Your jurisdiction
that may not be waived by contract. This
License Agreement shall terminate upon
Your breach of any term contained in this
License Agreement and You shall cease use
of and destroy all copies of theSoftware and
Documentation. The disclaimers of
warranties and damages and limitations on
liability shall survive termination. This
License Agreement may onlybe modified by
the Documentationor bya writtendocument
that has been signed by both You and
Symantec. Should You have any questions
concerning thisLicense Agreement,or if You
desire to contact Symantec for any reason,
please write to Symantec Customer Service,
555 International Way, Springfield, OR
97477, U.S.A. or visit the Support page at t
www.symantec.com.
ADDITIONAL TERMS AND
CONDITIONS
Your use of the Software is subject to the
terms and conditions below in addition to
those stated above.
11. Privacy; Data Protection:
From time to time, the Software may collect
certain information from the Device on
which it is installed, which may include:
Information on potential security risks as
well as URLs of websites visited that the
Software deems potentially fraudulent. The
URLs could contain personally identifiable
information that a potentially fraudulent
website isattempting to obtain without Your
permission. This information is collected by
Symantec for the purpose of delivering the
Page 7
functionalities of the software, and also for
evaluating and improving the ability of
Symantec’s products to detect malicious
behavior, potentiallyfraudulent websitesand
other Internet security risks. URLs of
websites visited as well as search keywords
and search results only if the Norton Safe
Web feature is enabled. This information is
collected by Symantec for the purpose of
providing protection and of evaluating and
advising Youregarding potentialthreats and
risks thatmay be associatedwith a particular
Web site before You view it.
Executable files and files that contain
executable content that are identified as
potential malware,including informationon
the actions taken by such files at the time of
installation. These files are submitted to
Symantec using the Software’s automatic
submission function.The collectedfiles could
contain personally identifiable information
that has been obtained by the malware
without Your permission. Files of this type
are being collectedby Symantec onlyfor the
purpose of improving the ability of
Symantec’s products to detect malicious
behavior. Such automatic submission
function maybe deactivatedafter installation
by following the instructions in the
Documentation for applicable products.
The name given to the Device during the
initial setup of such Device. If collected, the
name willbe usedby Symantec as an account
name for the Device under which You may
elect to receive additional services and/or
under which You may use certain features
of the Software. You may change such
account name at any time after installation
of the Software (recommended).
Status information regarding installation
and operation of the Software. This
information indicates to Symantec whether
installation ofthe Software wassuccessfully
completed as well as whether the Software
has encountered an error. The status
information could contain personally
identifiable information only if such
information is included in the name of the
file or folderencountered by theSoftware at
the time of installation or error. The status
information iscollected by Symantec for the
purpose of evaluating and improving
Symantec’s product performance and
installation successrate. Symantec mayalso
use this information to optimize its
web-pages.
Information contained in email messages
that you send through the Software to
Symantec toreport as spamor as incorrectly
identified as spam. These email messages
may contain personally identifiable
information and will be sent to Symantec
only with your permission, and will not be
sent automatically. If you send such
messages to Symantec, Symantec will use
them only for the purpose of improving the
detection ability of Symantec’s antispam
technology. Symantecwill notcorrelate these
files with any other personally identifiable
information.
Information contained in a report that You
may choose to send throughthe Software to
Symantec when the Software encounters a
problem. The report includes information
regarding thestatus ofboth the Softwareand
Your Device at the time that the Software
encountered the problem. The status
information about Your Device may include
the systemlanguage, countrylocale, and the
operating systemversion for YourDevice, as
well as the processes running, their status
and performanceinformation, anddata from
files or folders that wereopen at the timethe
Software encountered the problem. The
information could contain personally
identifiable information ifsuch information
is included in, or is a part of the name of the
files or folders open atthe time the Software
encountered the problem. This information
will be sent to Symantec only with Your
permission, and will not be sent
automatically. The information is collected
by Symantec for the purpose of correcting
the encountered problem and improving
Symantec’s product performance. This
information will not be correlated with any
personally identifiable information.
The Internet Protocol (IP) address and/or
Media AccessControl (MAC) addressand the
Machine ID of the computer on which the
Software is installed to enable the Software
to function and for license administration
purposes.
Other general, statistical information used
for product analysis, and for improving
product functionality.
Unless itis expressly definedas optional, the
collected information as set out above is
necessary forthe purposeof the functionality
of Symantec’s products.
Information may be transferred to the
Symantec groupin theUnited Statesor other
Page 8
countries that mayhave less protectivedata
protection lawsthan the region in whichYou
are situated (including the European Union)
and may be accessible by Symantec
employees or contractors exclusively to be
used in accordance with the purposes
described above. For the same purposes the
information may be shared with partners
and vendors that process information on
behalf of Symantec. Symantec has taken
steps so that the collected information, if
transferred, receives an adequate level of
protection.
Subject toapplicable laws,Symantec reserves
the right tocooperate with any legal process
and any law enforcement or other
government inquiry related to your use of
this Software. This means that Symantec
may provide documents and information
relevant to a court subpoena or to a law
enforcement or other government
investigation. Inorder topromote awareness,
detection andprevention ofInternet security
risks, Symantec may share certain
information withresearch organizationsand
other security software vendors. Symantec
may also use statistics derived from the
information to track and publish reports on
security risk trends. By using the Software,
You acknowledge and agree that Symantec
may collect, transmit, store, disclose and
analyze suchinformation forthese purposes.
Norton Internet Securitydelivers fast and light online
threat protection. It guards your PC, network, online
activities, and your identity with innovative detection
technologies optimized to combat today’s aggressive,
rapid-fire attacks. Norton Internet Security makes
online shopping,banking, and browsing safer andmore
convenient than ever.
The improved Norton Protection System features
multilayered securitytechnologies. They work together
to provide the comprehensive protection that detects
and removes threats before they can harm your PC.
The Norton Protection System stops online identity
theft, viruses, hackers, bots, spyware, Trojan horses,
and more without slowing you downor getting in your
way.
1
Page 12
Overview
12
About Norton Internet Security
Page 13
Installation
This chapter includes the following topics:
1 Before you begin
1 Installing Norton Internet Security
1 Installing Norton Internet Security on a Netbook
1 If the opening panel does not appear
Before you begin
Before you begin, you should close all open programs
on your computer and ensure that you are connected
to the Internet.
Norton Internet Security contains an antivirus
program. If you have other antivirus programs that
are installedon your computer,an uninstall panel may
appear to help you remove them. Symantec strongly
recommends that you remove the other antivirus
programs. Follow the instructions on the uninstall
panel.
Norton Internet Security contains a firewall program.
If you have other firewall programs that are installed
on your computer, Symantec strongly recommends
that you remove them to prevent installation errors.
For moreinformation, see the user documentationthat
came with the firewall program.
2
Page 14
Installation
14
Installing Norton Internet Security
During the installation, if a firewall message appears,
w
click Yes to use the Norton Internet Security firewall.
Installing Norton Internet Security
You can install Norton Internet Security from a CD or
from a file that you download.
To install Norton Internet Security
1
Do one of the following:
1 If you install from a CD, insert the CD into the
optical drive.
In Windows Vista or Windows XP, click Install
Norton Internet Security.
In Windows 7, click Launch Norton Install and
then click Install Norton Internet Security.
1 If you downloaded your copy of Norton Internet
Security, double-click the file that you
downloaded.
2
In the Norton Internet Security installation page,
enter the Product Key if prompted.
3
Click the Install Options link, review the options,
and then click OK.
4
Click the User License Agreement link, read the
agreement, and then click Close.
5
After you have read the agreement, click Agree &
Install.
Installing Norton Internet Security on a
Netbook
If youpurchased a box copy ofNorton Internet Security
it can be installed on a Netbook or other ultra-mobile
PC devices that meet with the system requirements of
Norton Internet Security. Your Netbook does not
contain aCD driveso you need to download the Norton
Internet Security file from the Norton Web site. Enter
Page 15
If the opening panel does not appear
the product key on the Norton Internet Security
installation card that is found in the Norton Internet
Security box
To install Norton Internet Security on a Netbook
1
Go to the following URL:
www.norton.com/(countrycode )/netbook
2
To the left of the screen click the product that you
purchased.
3
Click DOWNLOAD
4
Follow the on-screen instructions
5
When prompted, enter the product key on the
Norton Internet Security installation card that is
found in the Norton Internet Security box.
6
Click Agree & Install
7
If you require any further help, please visit
www.symantec.com/globalsupport
If the opening panel does not appear
Sometimes a computer's optical drive does not
automatically run a CD.
To start the installation from the product CD
1
On your desktop, double-click My Computer.
2
In the MyComputer window, double-click the icon
for your optical drive.
3
In the list of files, double-click Start.exe and then
click Install Norton Internet Security.
15Installation
Page 16
Installation
16
If the opening panel does not appear
Page 17
Getting started
3
This chapter includes the following topics:
1 Starting Norton Internet Security
1 Activating your product
1 Exploring the main window
1 Responding to System Status indicators
1 Monitoring the protection status of a feature
1 For more information
Starting Norton Internet Security
See “Responding to
System Status
indicators”
on page 22.
Norton Internet Security protects any computer on
which it is installed. You do not have to start the
program to be protected.
At any time, you can start Norton Internet Security to
adjust thesettings or perform preventive maintenance.
All of the program features can be accessed from the
main window.
Page 18
Getting started
18
Activating your product
To start Norton Internet Security
4
Do one of the following:
1 In the Windows notification area, double-click
the Norton Internet Security icon.
1 On the Windows taskbar, click Start > All
Programs > Norton Internet Security > Norton
Internet Security.
Activating your product
If youdid not activateyour product during installation,
you receive an activation-needed alert regularly until
you activate the product.
Product activationreduces software piracy and ensures
that you use authentic Symantec software. Activation
provides you witha specified period ofsubscription to
your Norton product. You can also renew your
subscription to continue using Norton Internet
Security.
You mustactivate your productwithin the time period
w
that the alert specifies, oryour product stopsworking.
You can activate your product directly from the
activation-needed alert or from the main window.
Activation should take only a few minutes.
To activate your product from the alert
1
In the alert, do one of the following:
1 If you purchased a subscription version of a
retail product or the product came installed on
your computer, select Activate Now(Recommended).
1 If you want to renew the subscription of your
product, select Renew Now.
You can also activate or renew the subscription of
your product from any non-admin user account.
2
Click OK.
Page 19
3
Follow the on-screen instructions to activate or
renew your product.
4
In the window that appears, click Done.
To activate your product from the main window
1
In the Norton Internet Security main window, do
one of the following:
1 If you purchased a subscription version of a
retail product, click Activate Now.
1 If the productcame installed on your computer,
click Activate Online Now.
1 If you want to renew the subscription of your
product, click Renew.
You can also activate or renew the subscription of
your product from any non-admin user account.
2
Follow the on-screen instructions to activate or
subscribe your product.
3
In the window that appears, click Done.
About problems during activation
If you cannot connect to the Symantec servers to
activate your product, first check your Internet
connection. You then need to see if you have parental
control software, either installed or through your ISP,
that might block the connection.
A connectivity problem can occur if you use parental
control software. If you suspect that parental controls
might block the connection, you can configure the
parental controls so that they do not block the
activation procedure. You need to log in to your
parental control software or to the Internet through
your ISP as an administrator to change your
configuration.
If you use a proxy server to connect to the Internet,
you must configure the proxy settings. To use the
ProxyServer option, go to the NortonInternet Security
main window, and then click Settings > Network >NetworkSecurity Settings > Proxy Server > Configure.
Activating your product
19Getting started
Page 20
Getting started
20
Exploring the main window
Exploring the main window
When you start Norton Internet Security, the main
window opens. The main window provides access to
all Norton Internet Security features, options, Help,
and Support.
To explore the main window
See “Starting Norton
Internet Security”
on page 17.
1
Start Norton Internet Security.
2
On the top of the main window, click the link that
you want to explore. Your options are:
Settings
Performance
Feedback
Account
Support
Lets you view Computer Settings,
Network Settings, Web Settings, and
General Settings.
Lets you view and monitor your
system activity.
Lets you submit feedback about your
experience with your Norton product.
Lets you manage all of your Norton
product information from one
location.
Lets you view Norton Help Center,
Get Support, Tutorials, New Version
Check, User License Agreement,
Subscription Status and About
Norton Internet Security information.
Page 21
Exploring the main window
3
In the center of the window, click the option that
you want to explore. Your options are:
21Getting started
Scan Now
LiveUpdate
Advanced
Lets you run a Computer Scan, a
Reputation Scan, or Scan Facebook
Wall.
Lets you update the latest definitions
updates and program updates for
Norton Internet Security.
Lets you see all the Norton Internet
Security features.
Page 22
Getting started
22
Responding to System Status indicators
4
On the bottom of the mainwindow, click the option
you want to explore. Your options are:
Activity Map
Norton Management
Norton Mobile Security
Online Family
Safe Web
Online Backup
w
These options may not be available with some
versions of Norton Internet Security. In such case,
you may not be able to access this option.
Lets you access the world map with
hotspots of cybercrimes and the
latest threats.
Lets you manage your Norton
products on all of your devices
from one location.
Lets you download Norton Mobile
Security to your Android device.
Lets you set up Norton Online
Family so that you can monitor
your child’s activities on the
Internet.
Lets you check the safety of a Web
site or perform a Safe Web search.
Lets you set up a Norton Online
Backup account or access your
online backup status.
Responding to System Status indicators
Norton InternetSecurity displays the overall protection
status of your computer as System Status at the top
of the main window. When the System Status needs
attention or is at risk, you can take appropriate action
to improve the System Status. Your computer
protection is based on the programs that are installed
Page 23
Monitoring the protection status of a feature
on your computer. To improve your protection status,
ensure that your installed programs are up to date.
The System Status indicator displays the following
statuses:
23Getting started
Secure
Attention
At Risk
You can respond to the System Status indicators
directly from the main window.
To respond to System Status indicators from the main
window
1
In the bottom section of the Norton Internet
Security main window, click Fix Now.
2
Follow the on-screen instructions.
Indicates that your computer and
activities are protected from
threats, risks, and damage.
Indicates that your computer and
activities require attention.
Take appropriate action to improve
your protection status.
Indicates that your computer and
activities are at risk.
Take immediate action to improve
your protection status.
Monitoring the protection status of a
feature
The Norton Internet Security main window acts as a
security management interface. You can access the
main features and monitor the performance of your
computer from the main window.
At times, you may want to turn off any option for a
particular purpose. But by doing so, the status of your
Page 24
Getting started
24
Monitoring the protection status of a feature
system changesto Attentionor AtRisk. In suchcases,
you can ignore the protection status of a particular
feature to maintain a healthy overall system status.
For example, you want to turnoff Browser Protection
for a limited period, and you still want the system
status to be Secure. In this case, you can ignore the
protection statusof BrowserProtection and then,turn
off the option. When you ignore the protection status
of a feature, it does not affect the overall SystemStatus.
You can also monitor the protection status of the
feature that has been ignored at any time.
You canignore or monitorthe protection status of only
selected featuresthat are availablein themain window.
The features are:
1 Antivirus
1 Antispyware
1 SONAR Protection
1 Smart Firewall
1 Intrusion Prevention
1 Email Protection
1 Browser Protection
1 Safe Surfing
To monitor the protection status of a feature
1
In the Norton Internet Security main window,click
Advanced.
2
In the window that appears, move your mouse
pointer over the feature name.
3
In the pop-upthat appears, do oneof the following:
1 To ignore the protection status of the feature
that affects your computer’s overall health
evaluation, click Ignore.
1 To monitor the protection status of the feature
that has been ignored, click Monitor.
Page 25
For more information
The product documentation helps you use Norton
Internet Security. You can find the information that
you need on your computer and on the Symantec Web
site.
Accessing Help
Help isavailable throughout your Norton product.Help
provides links to information that assists you with the
specific tasks that you want to complete. The online
Help provides a guide to all of the product features.
To access Help
1
At the top of the main window, click Support.
2
In the drop-down menu, click Help.
To print a Help topic
1
In the Help window, click the Printer icon.
2
Click OK.
Accessing the Symantec Web site
You can access the Symantec Web site from your
product or from a browser.
To access the Symantec Web site in your browser
1
Open your Web browser.
2
Go to the following URL:
www.symantec.com
For more information
25Getting started
Page 26
Getting started
26
For more information
Page 27
Responding to
emergencies
4
This chapter includes the following topics:
1 Using the Norton Bootable Recovery Tool
1 Downloading the Norton Bootable Recovery Tool
Wizard
Using the Norton Bootable Recovery Tool
If the installation of yourNorton product fails, you can
use the Norton Bootable Recovery Tool to scan and
remove any security threats that prevent successful
installation. If your computer is infected and you are
not able to start your Windows operating system, you
can use Norton Bootable Recovery Tool to remove
threats and recover your computer.
Norton Bootable Recovery Tool is available on the
product CD that you purchased. You can use the
product CD as a recovery media.
To use Norton Bootable Recovery Tool, you must use
w
the product key of the Norton product that you
purchased. Ifyou usea trial version of NortonInternet
Security, you need to create a Norton Account to
receive aproduct key touse Norton Bootable Recovery
Tool.
Page 28
Responding to emergencies
28
Downloading the Norton Bootable Recovery Tool Wizard
To use the Norton Bootable Recovery Tool
1
Insert the recovery media and start your computer
from the recovery media.
The recovery media can be a Norton Bootable
Recovery Tool CD, DVD, USB key, or the product
CD.
2
Read the Norton License Agreement, type your
product key, and then click I Agree.
If youuse a non-QWERTY keyboard, usethe VirtualKeyboard option to enter your product key.
3
In the Norton Bootable Recovery Tool window,
click Norton Advanced Recovery Scan.
4
Click Start Scan.
5
After the scan is complete, remove the recovery
media from the drive or USB port, and restart your
computer.
Downloading the Norton Bootable Recovery
Tool Wizard
If your attempt to install a Norton product fails, you
can download the Norton Bootable Recovery Tool
Wizard. This easy-to-use wizard helps you create
Norton Bootable Recovery Tool on a CD, DVD, or USB
key. You can use Norton Bootable Recovery Tool to
scan your computer and remove any security threats
that prevent successful installation.
It is recommended that you download and install
Norton Bootable Recovery Tool Wizard on a computer
that does not have any security threats and create
Norton Bootable Recovery Tool. If you create Norton
Bootable RecoveryTool on an infected computer,there
is a chance that the recovery CD, DVD, or USB key
might get infected.
Page 29
Downloading the Norton Bootable Recovery Tool Wizard
To use Norton Bootable Recovery Tool, you must use
w
the product key of the Norton product that you
purchased. Ifyou usea trial version of NortonInternet
Security, you need to create a Norton Account to
receive aproduct key touse Norton Bootable Recovery
Tool.
You can download Norton Bootable Recovery Tool
Wizard in one of the following ways:
1 From the Start menu.
1 From the Norton Support Web site.
To download the Norton Bootable Recovery Tool Wizard
from the Start menu
1
On the Windows taskbar, do one of the following:
1 In WindowsXP, click Start >Programs > Norton
Internet Security > Norton Recovery Tools.
1 In Windows Vista or Windows 7, click Start >
All Programs > Norton Internet Security >
Norton Recovery Tools.
2
Follow the on-screen instructions.
To download the Norton Bootable Recovery Tool Wizard
from the Internet
1
Open your Web browser, and go to the following
URL:
http://www.norton.com/recoverytool
2
Follow the on-screen instructions.
To download the Norton Bootable Recovery Tool Wizard
from Norton Internet Security
1
In the Norton Internet Security main window,click
Scan Now.
2
In theComputer Scan pane, do oneof the following:
1 Click Quick Scan.
1 Click Full System Scan.
3
At the bottom of the scan window, next to If you
think there are still risks, click click here.
29Responding to emergencies
Page 30
Responding to emergencies
30
Downloading the Norton Bootable Recovery Tool Wizard
4
In the Norton Rescue Tools Web page, click
Download Norton Bootable Recovery Tool.
5
Follow the on-screen instructions.
Page 31
Service and
Support
Solutions
About Support
If you have purchased Norton Internet Security, you
can access Support from the product.
Support offerings may vary based on the language or
w
product.
Accessing Norton Autofix
This feature is available for Norton 360, Norton
Internet Security, Norton AntiVirus.
Norton Autofix offers the tools that automatically
diagnose and resolve common issues. You can also
search for solutions or gain easy access to support by
phone, as well as support by chat and email.
Availability of support varies by region. Regular
w
telephone andInternet connection fees apply incertain
countries. For full support details, please visit:
www.symantec.com/globalsupport
To access Norton Autofix
1
In the main product window, click Support.
2
In the drop-down list, click Get Support.
Page 32
Service and Support Solutions
32
About Self Help
About Self Help
Contact Support
w
The Symantec Web site contains answers to the most
common customer questions. From our Web site you
can:
1 Find helpwith your subscription, download, product
activation, or other nontechnical issues.
1 Search our Support Resources for help with
technical issues, such as installing, configuring, or
troubleshooting errors with your Norton products.
1 Find information about the latestvirus threats and
removal tools.
You can access the Symantec support Web site at:
www.symantec.com/globalsupport
Select your country to get access to Customer Service,
Technical support, and Help against Spyware and
Viruses.
In addition to using our Self Help options, you can
contact a support representative by chat, email, or
phone.
Availability of support varies by region. Regular
telephone andInternet connection fees apply incertain
countries. For full support details, please visit:
www.symantec.com/globalsupport
Page 33
Support policy
Following is an overview of our support offerings:
33Service and Support Solutions
Chat
Email
Phone
Chat in real time with a support
representative.
For more complex technical issues,
chat offers the option to allow a
support representative to connect
remotely to your computer and
resolve your problem. Chat support
is free, with the exception of our
Virus and Spyware Solution
service.
Submit your question on our Web
site and receive a response by
email.
Email support has a slower
response time when compared to
chat or phone. Email support is
free.
Speak to a support representative
in real time.
To contact a support representative, please visit the
Symantec support Web site at the following URL:
www.symantec.com/globalsupport
The online support option is displayed first, followed
by the contact options where you can select the type
of support you prefer.
Support policy
Symantec recommendsthat you have the latestversion
of the product, as it contains new and enhanced
features for better protection against security threats.
In case of older versions, complimentary support is
offered for a minimum of 2 years. However, technical
Page 34
Service and Support Solutions
34
About keeping your subscription current
information on these products may still be available
through thesupport Web site at thefollowing address:
www.symantec.com/globalsupport
Symantec reserves the right to change its support
policies at any time without notice. You can view the
latest version of the support policy at the following
URL:
www.symantec.com/supportpolicy
About keeping your subscription current
Subscription periodlengths vary by Symantec product.
To maintain uninterrupted protection, you must keep
your subscription up to date. If you do not renew your
subscription, you cannot obtain updates of any kind
and the software no longer functions.
When you run LiveUpdate near the end of your
subscription period,you are prompted to subscribe for
a nominal charge. Follow the on-screen instructions
to renew your subscription.
When you renew your subscription, the definition
updates and new product features are available
throughout the subscription period. Please note that
features may be added, modified, or removed during
this period.
Worldwide service and support
Worldwide service and support solutions vary by
country. To contact one of our Support offices, please
go to the following Web site and select your language.
www.symantec.com/globalsupport
Page 35
ClubNorton
ClubNorton
35Service and Support Solutions
ClubNorton is your one-stop resource center for
Internet security. As a Norton customer, Symantec
wants to make your experience with your computer
safe, enjoyable, and productive. Whether youuse your
computer to manage your personal finances, shop
online, or share your latest digital photos with friends
and family, ClubNortonmakes your experience a good
one. Ourgoal is toconsistently provide the proper tools
and information to keep you up to date.
For more information, go to the following URL and
select your country or region in the Select YourCountry/Region drop-down menu:
www.clubnorton.com
The ClubNortonWeb page includes a regularlyupdated
article library, a glossary, the Norton Forums, and the
Norton Update Center.You can also find the following
useful links in the Web page:
from CD 14
from downloaded file 14
instructions 14
problems 15, 27–28
M
main window
Advanced 21
Computer 21
features 20
Help & Support 20
Internet 21
Leave Feedback 20
Norton Account 20
options 20
Support 20
N
newsletter 35
Norton Bootable Recovery Tool
using 27
Norton Bootable Recovery Tool
Wizard
downloading 28
Norton Internet Security
activating 18
icon 18
main window 20
starting 17
S
Scans
Norton Bootable Recovery
Tool 27
Page 38
Index38
security status indicator
viewing 23
Self Help 32
subscription
maintaining 34
Support
contact 32
Norton Autofix 31
Phone 32
Self Help 31
worldwide service 34
Support policy 33
Symantec Web site 25
accessing fromyour browser 25
System Status indicators
responding 22
T
Technical Support
for NortonInternet Security 25
from Symantec 25
Page 39
Page 40
Quick Installation
Norton Internet Security includes protection updates and new product features
as available throughout this renewable service period. With this service you
receive the right to use this product on one computer or on the specified number
of computers during the service period, which begins upon initial installation.
This renewable service includes protection updates and new product features
as available throughout the service period, subject to acceptance of the Symantec
License Agreement included with this product and available for review at:
www.symantec.com
Product features may be added, modified, or removed during the service period.
Before you begin, you should close all open programs on your computer and
ensure that you are connected to the Internet.
Installing Norton Internet Security
You can install Norton Internet Security from a CD or from a file that you
download.
To install Norton Internet Security
1 Do one of the following:
– If you install from a CD, insert the CD into the optical drive.
In Windows Vista or Windows XP, click Install Norton Internet Security.
In Windows 7, click Launch Norton Install and then click Install NortonInternet Security.
– If you downloaded your copy of Norton Internet Security, double-click the
file that you downloaded.
2 In the Norton Internet Security installation page, enter the Product Key.
3 Click the Install Options link, review the options, and then click OK.
4 Click the User License Agreement link, and read the agreement.
5 After you have read the agreement, click Agree & Install.
Norton from Symantec products protect consumers from traditional threats with antivirus, antispam, and Spyware Protection.
They also protect against bots, drive-by downloads, and identity theft, and are light on system resources. In addition, Symantec
provides services such as online backup and PC Tuneup, and is a trusted source for family online safety. For more information,
please click one of the following links: