Symantec 21197367 User Manual

User Guide
See back cover for Quick Installation.
Care for our Environment, It's the right thing to do.
Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products.
NortonInternet Security User Guide
The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
Documentation version 19.0
Copyright © 2011 Symantec Corporation. All rights reserved.
Symantec, theSymantec Logo,Norton, SONAR,LiveUpdate, Norton AntiSpam, NortonAntiVirus, NortonInternet Security, Norton 360, and NortonSystemWorks aretrademarks orregistered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Windows is a trademark of Microsoft Corporation. Portions of this product Copyright [1996-2008] Glyph & Cog, LLC. Other names may be trademarks of their respective owners.
The productdescribed inthis document isdistributed under licenses restricting itsuse, copying, distribution,and decompilation/reverse engineering. No part of this document may be reproduced in any form byany meanswithout priorwritten authorizationof Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED"AS IS" AND ALLEXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULARPURPOSE OR NON-INFRINGEMENT, AREDISCLAIMED, EXCEPT TOTHE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BELEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
Symantec Corporation 350 Ellis Street, Mountain View, CA 94043
http://www.symantec.com
Printed in the United States of America.
10 9 8 7 6 5 4 3 2 1
Norton License Agreement
NortonInternet Security
IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT (LICENSE AGREEMENT) CAREFULLY BEFORE USING THE SOFTWARE (AS DEFINED BELOW). SYMANTEC CORPORATION, IF YOU ARE LOCATED IN THE AMERICAS; OR SYMANTEC ASIA PACIFICPTE LTD, IF YOU ARE LOCATED IN THE ASIA PACIFIC RIM OR JAPAN;OR SYMANTEC LIMITED,IF YOU ARE LOCATED IN EUROPE, THE MIDDLE EAST OR AFRICA (SYMANTEC) IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THEINDIVIDUAL, THE COMPANY, OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE(REFERENCED BELOW AS YOUOR YOUR) ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT. THIS IS A LEGAL AND ENFORCEABLE CONTRACTBETWEEN YOU AND SYMANTEC. BY OPENING THIS PACKAGE, BREAKINGTHE SEAL, CLICKING THE I AGREEOR YESBUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY, OR LOADING THE SOFTWARE, YOU AGREE TO THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, CLICK THE CANCELOR NOOR CLOSE WINDOWBUTTON OR OTHERWISE INDICATE REFUSAL, MAKE NO FURTHER USE OF THE SOFTWARE, AND CONTACT YOUR VENDOROR SYMANTECCUSTOMER SERVICE, USING THE CONTACT DETAILS IN SECTION 10 OF THIS LICENSE AGREEMENT, FORINFORMATION ON HOW TO OBTAINA REFUND OFTHE MONEY YOU PAID FORTHE SOFTWARE (LESSSHIPPING, HANDLING, AND ANY APPLICABLE TAXES EXCEPT IN CERTAIN STATES AND COUNTRIES WHERESHIPPING, HANDLING, AND TAXES ARE REFUNDABLE) AT ANY TIME DURINGTHE SIXTY (60)DAY PERIOD FOLLOWING THE DATE OF PURCHASE.
1. License:
The software (including any accompanying features and services) and documentation
(including any product packaging) (the Documentation), that accompanies this License Agreement (collectively the Software) is the property of Symantec or its licensors, and is protected by copyright law. Although Symantec continues to own the Software, after Your acceptance of this License Agreement You will have certain rights touse the Software duringthe Service Period. The Service Periodshall begin on the date of Your initial installation of the Software on a computer, mobile or mobile computing device (a Device), regardless of the number ofcopies that You are permitted to use in accordance with Section 1.A of this License Agreement, and shall last for the period oftime setforth in theDocumentation or theapplicable transactiondocumentation from the authorized distributor or reseller from which You obtained the Software. The Software may automatically deactivate and become non-operational at the end of the Service Period, and You will not be entitled to receive any feature or content updates to the Software unless the Service Period is renewed. Subscriptions for renewals of the Service Periodwill be availablein accordance with Symantecs support policy posted at
http://www.symantec.com/norton/ support/technical_support_policy.jsp.
This License Agreement governs any releases, revisions,updates orenhancements to the Software that Symantec may make available to You. Except as may be modified by the Documentation, and subject to Symantecs right to terminate for Your breach pursuant to Section 9, Your rights and obligations under this License Agreement with respect to the use of this Software are as follows.
During the Service Period, You may:
A.use one copy of the Software on a single Device. If a greater number of copies and/or number of Devices is specified within the Documentation orthe applicabletransaction documentation from the authorized distributor or reseller from which You obtained the Software, You may use the
Software in accordance with such specifications;
B. makeone copy of the Softwarefor back-up or archival purposes, or copy the Software onto the hard diskof Your Device and retain the originalfor back-up orarchival purposes;
C. use the Software on a network, provided that Youhave a licensedcopy of the Software for each Devicethat can accessthe Software over that network;
D. permanently transferall of Yourrights in the Software granted under this License Agreement to another person or entity, provided that You retain no copies of the Software and the transferee agrees to the terms of this License Agreement. Partial transfer of Your rights under this License Agreement shall not be permitted. For example, if the applicable documentation grants You the right to use multiple copies of the Software, only atransfer of the rights to use all such copies of the Software would be valid; and
E. use the Software in accordance with any additional permitted uses which may be set forth below.
You may not, nor may you permit any other person to:
A. sublicense,rent or leaseany portion of the Software;
B. reverseengineer, decompile, disassemble, modify, translate, make any attempt to discover the source code of the Software or create derivative works from the Software;
C. use the Software as part of a facility management, timesharing, service provider or service bureau arrangement; or
D. usethe Software inany manner that isnot permitted pursuant to this License Agreement.
2. Software Feature and Content Updates:
A. You shall have the right to receive new features to the Software as Symantec, in its sole discretion,makes suchfeatures available with the Software during Your Service Period. Symantec continually strives to improve theusability and performanceof its products and services. In order to optimize
the SoftwareSymantec may, at its discretion and without notice, add, modify or remove features from the Software at any time.
B. Certain Software uses content that is updated fromtime totime, includingbut not limited to the following Software: antivirus and crimeware software use updated virus definitions; antispyware software uses updated spyware definitions; antispam software uses updated antispam rules; content filtering and antiphishing software use updatedURL lists;some firewall software use updated firewall rules; vulnerability assessment products use updated vulnerability data and web site authentication software uses updated lists of authenticated web pages; these updates are collectively referred to as Content Updates(or alternatively referred to as Protection Updatesor Security Updates at times). You shall have theright to receive Content Updates for the Software during Your Service Period.
3. Product Installation; Required Activation:
A. During the installation process, the Software may uninstall or disable other security products,or features thereof,if such products or features are incompatible with the Software or for purposes of improving the overall functionality of the Software.
B. There may be technological measures in this Software that are designed to prevent unlicensed orillegal use ofthe Software. You agree thatSymantec mayuse thesemeasures to protectSymantec against software piracy. This Software may contain enforcement technology that limits the ability to install and uninstallthe Software ona Device tonot more than a finite number of times for a finite number of Devices. This License Agreement and the Software containing enforcement technology may require activation as further set forth in the Documentation. If so, the Softwarewill only operate for a finite period of time prior to Software activation by You. During activation, You may be required to provide Your unique activation code accompanying the Softwareand Device configuration in the form of an alphanumeric code over the Internet to verify the authenticity of the Software. If You do not complete the activation within the finite periodof time set forth in the Documentation, or as prompted
by the Software, the Software will cease to function until activation is complete; at which time the Software functionality will be restored. In the event that You are not able to activate the Software over the Internet, or through any other method specified during the activation process, You may contact Symantec Customer Support using theinformation providedby Symantec during activation, or as set forth below.
4. Technical Support:
Certain technical support features may be offered from within the Software andwhich may include live chat with a technical support agent and/or assistance from a technical supportagent viaremote computer access (any such technical support offered from within the Software shall be referred to in this License Agreement as the Technical Support). If such features are offered and You choose to access such Technical Support the following terms shall apply. Any such Technical Support shall be provided in Symantecs sole discretion without any guarantee or warranty of any kind. It is solely Your responsibility to complete a backup of all Your existing data, software and programsbefore receiving any Technical Support.In thecourse of providing the Technical Support, Symantec may determine that the technical issue is beyond the scopeof theTechnical Support.Symantec reserves the right to refuse, suspend or terminate any of the Technical Support in its sole discretion.
5. Sixty (60) Day Money Back Guarantee:
If You are the original licensee of this copy of the Software and are not completely satisfied with it for any reason, please make no further use of the Software and contact Symantec Customer Service, using the contact details set out in Section 10 of this License Agreement, for a refund of the money You paid for the Software (less shipping, handling,and any applicabletaxes except in certain statesand countries where shipping, handlingand taxes are refundable) at any time during the sixty (60) day period following the date of purchase.
6. Limited Warranty:
Symantec warrants that any media manufactured by Symantec on which the Software is distributed will be free from defects for a period of sixty (60) days from the date of delivery of the Software to You. Your sole remedy in the event of a breach of this warranty will be that Symantec will, at its option, replace any defective media returned to Symantec within the warranty period or refund the money You paid for the Software. Symantec does not warrant that the Softwarewill meet Yourrequirements or that operation of the Software will be uninterrupted or that the Software will be error-free.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE ABOVE WARRANTY ISEXCLUSIVE AND INLIEU OF ALL OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY FROM STATETO STATE AND COUNTRYTO COUNTRY.
7. Disclaimer of Damages:
SOME STATES AND COUNTRIES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE BELOW LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH HEREIN FAILSOF ITS ESSENTIALPURPOSE, IN NO EVENT WILL SYMANTEC OR ITS LICENSORS BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INDIRECT,OR SIMILAR DAMAGES,INCLUDING ANY LOST PROFITS OR LOST DATA ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE EVENIF SYMANTECHAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
IN NO CASE SHALL SYMANTECS OR ITS LICENSORSLIABILITY EXCEED THE PURCHASE PRICE WHICH YOU PAID FOR THE APPLICABLE SERVICE PERIOD. The
disclaimers and limitations set forth above will apply regardless of whether You accept the Software.
8. U.S. Government Restricted Rights:
For U.S. Government procurements, the Software is deemed to be commercial computer software asdefined in FAR12.212 and subject to restricted rightsas defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, Rights in Commercial Computer Softwareor Commercial Computer Software Documentation,as applicable,and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Software by the U.S. Government shall be solely in accordance with the terms of this License Agreement.
9. Export Regulation:
You acknowledge that the Software and related technical data and services (collectively "Controlled Technology") may be subject to the import and export laws of the UnitedStates, specifically theU.S. Export Administration Regulations (EAR), and the laws of any country where Controlled Technology is imported or re-exported. You agree to comply with all relevant laws and will not export any Controlled Technology in contravention to U.S. law nor to any prohibited country, entity, or person for which an export license or other governmental approval is required. All Symantec product is prohibited for export or re-exportto Cuba, NorthKorea, Iran, Syria and Sudan and to any country subject to relevant trade sanctions. USE OR FACILITATION OF SYMANTEC PRODUCT IN CONNECTION WITH ANY ACTIVITY INCLUDING, BUT NOT LIMITED TO, THE DESIGN, DEVELOPMENT, FABRICATION, TRAINING, OR TESTING OF CHEMICAL, BIOLOGICAL, OR NUCLEAR MATERIALS, OR MISSILES,DRONES, OR SPACE LAUNCH VEHICLES CAPABLE OF DELIVERING WEAPONS OF MASS DESTRUCTION IS PROHIBITED, IN ACCORDANCE WITH U.S. LAW.
10. General:
This License Agreement will begoverned by the laws of the State of California, United States of America. This License Agreement is the entire agreement between You and Symantec relating to the Software and: (i) supersedes allprior orcontemporaneous oral or written communications, proposals, and representations with respect to its subject matter; and (ii) prevails overany conflicting or additional terms of any quote, order, acknowledgment, orsimilar communications between the parties. Notwithstanding the foregoing, nothingin thisLicense Agreement will diminishany rightsYou may haveunder existing consumer protection legislation or other applicable laws in Your jurisdiction that may not be waived by contract. This License Agreement shall terminate upon Your breach of any term contained in this License Agreement and You shall cease use of and destroy all copies of theSoftware and Documentation. The disclaimers of warranties and damages and limitations on liability shall survive termination. This License Agreement may onlybe modified by the Documentationor bya writtendocument that has been signed by both You and Symantec. Should You have any questions concerning thisLicense Agreement,or if You desire to contact Symantec for any reason, please write to Symantec Customer Service, 555 International Way, Springfield, OR 97477, U.S.A. or visit the Support page at t www.symantec.com.
ADDITIONAL TERMS AND CONDITIONS
Your use of the Software is subject to the terms and conditions below in addition to those stated above.
11. Privacy; Data Protection:
From time to time, the Software may collect certain information from the Device on which it is installed, which may include:
Information on potential security risks as well as URLs of websites visited that the Software deems potentially fraudulent. The URLs could contain personally identifiable information that a potentially fraudulent website isattempting to obtain without Your permission. This information is collected by Symantec for the purpose of delivering the
functionalities of the software, and also for evaluating and improving the ability of Symantecs products to detect malicious behavior, potentiallyfraudulent websitesand other Internet security risks. URLs of websites visited as well as search keywords and search results only if the Norton Safe Web feature is enabled. This information is collected by Symantec for the purpose of providing protection and of evaluating and advising Youregarding potentialthreats and risks thatmay be associatedwith a particular Web site before You view it.
Executable files and files that contain executable content that are identified as potential malware,including informationon the actions taken by such files at the time of installation. These files are submitted to Symantec using the Softwares automatic submission function.The collectedfiles could contain personally identifiable information that has been obtained by the malware without Your permission. Files of this type are being collectedby Symantec onlyfor the purpose of improving the ability of Symantecs products to detect malicious behavior. Such automatic submission function maybe deactivatedafter installation by following the instructions in the Documentation for applicable products.
The name given to the Device during the initial setup of such Device. If collected, the name willbe usedby Symantec as an account name for the Device under which You may elect to receive additional services and/or under which You may use certain features of the Software. You may change such account name at any time after installation of the Software (recommended).
Status information regarding installation and operation of the Software. This information indicates to Symantec whether installation ofthe Software wassuccessfully completed as well as whether the Software has encountered an error. The status information could contain personally identifiable information only if such information is included in the name of the file or folderencountered by theSoftware at the time of installation or error. The status information iscollected by Symantec for the purpose of evaluating and improving Symantecs product performance and installation successrate. Symantec mayalso use this information to optimize its web-pages.
Information contained in email messages that you send through the Software to Symantec toreport as spamor as incorrectly identified as spam. These email messages may contain personally identifiable information and will be sent to Symantec only with your permission, and will not be sent automatically. If you send such messages to Symantec, Symantec will use them only for the purpose of improving the detection ability of Symantecs antispam technology. Symantecwill notcorrelate these files with any other personally identifiable information.
Information contained in a report that You may choose to send throughthe Software to Symantec when the Software encounters a problem. The report includes information regarding thestatus ofboth the Softwareand Your Device at the time that the Software encountered the problem. The status information about Your Device may include the systemlanguage, countrylocale, and the operating systemversion for YourDevice, as well as the processes running, their status and performanceinformation, anddata from files or folders that wereopen at the timethe Software encountered the problem. The information could contain personally identifiable information ifsuch information is included in, or is a part of the name of the files or folders open atthe time the Software encountered the problem. This information will be sent to Symantec only with Your permission, and will not be sent automatically. The information is collected by Symantec for the purpose of correcting the encountered problem and improving Symantecs product performance. This information will not be correlated with any personally identifiable information.
 The Internet Protocol (IP) address and/or Media AccessControl (MAC) addressand the Machine ID of the computer on which the Software is installed to enable the Software to function and for license administration purposes.
Other general, statistical information used for product analysis, and for improving product functionality.
Unless itis expressly definedas optional, the collected information as set out above is necessary forthe purposeof the functionality of Symantecs products.
Information may be transferred to the Symantec groupin theUnited Statesor other
countries that mayhave less protectivedata protection lawsthan the region in whichYou are situated (including the European Union) and may be accessible by Symantec employees or contractors exclusively to be used in accordance with the purposes described above. For the same purposes the information may be shared with partners and vendors that process information on behalf of Symantec. Symantec has taken steps so that the collected information, if transferred, receives an adequate level of protection.
Subject toapplicable laws,Symantec reserves the right tocooperate with any legal process and any law enforcement or other government inquiry related to your use of this Software. This means that Symantec may provide documents and information relevant to a court subpoena or to a law enforcement or other government investigation. Inorder topromote awareness, detection andprevention ofInternet security risks, Symantec may share certain information withresearch organizationsand other security software vendors. Symantec may also use statistics derived from the information to track and publish reports on security risk trends. By using the Software, You acknowledge and agree that Symantec may collect, transmit, store, disclose and analyze suchinformation forthese purposes.
CPS / S 5.0 / USE

Contents

Chapter 1 Overview .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . ... . ... 11
About Norton Internet Security ... . . .. . . .. . . .. . . .. 11
Chapter 2 Installation . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . ... . .. . . .. 13
Before you begin . .. . . .. . . .. . . .. . . .. . ... . .. . . .. . . .. . . .. 13
Installing Norton Internet Security .. .. . . .. . . .. . . 14
Installing Norton Internet Security on a
Netbook .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . 14
If the opening panel does not appear . . .. . . .. . . .. . 15
Chapter 3 Getting started .... . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . . 17
Starting Norton Internet Security . .. . . .. . . .. . . .. . 17
Activating your product .. . . .. . . .. . . .. . . .. . . .. . . .. . . . 18
Exploring the main window ... . . .. . . .. . . .. . . .. . ... . 20
Responding to System Status
indicators ... . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . 22
Monitoring the protection status of a
feature . .. . . .. . . .. . . .. . . .. . ... . ... . .. . . .. . . .. . . .. . . 23
For more information . .. . . .. . ... . ... . .. . . .. . . .. . . .. . 25
Chapter 4 Responding to emergencies .. .. . . .. . . .. . . .. . . .. 27
Using the Norton Bootable Recovery
Tool .. . ... . ... . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . 27
Downloading theNorton BootableRecovery
Tool Wizard . .. . . .. . . .. . ... . .. . . .. . . .. . . .. . . .. . . . 28
Service and Support Solutions .. .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. 31
Index . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . ... . ... . .. . . .. . . .. . . .. . . .. 37
Contents10
Quick Installation .. . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . ... . ... . .. . . .. . . 40

Overview

This chapter includes the following topics:
1 About Norton Internet Security

About Norton Internet Security

Norton Internet Securitydelivers fast and light online threat protection. It guards your PC, network, online activities, and your identity with innovative detection technologies optimized to combat todays aggressive, rapid-fire attacks. Norton Internet Security makes online shopping,banking, and browsing safer andmore convenient than ever.
The improved Norton Protection System features multilayered securitytechnologies. They work together to provide the comprehensive protection that detects and removes threats before they can harm your PC. The Norton Protection System stops online identity theft, viruses, hackers, bots, spyware, Trojan horses, and more without slowing you downor getting in your way.
1
Overview
12
About Norton Internet Security
Loading...
+ 28 hidden pages