Symantec Norton Antivirus User Guide

Norton
AntiVirus
For Mac
User Guide
Norton™ AntiVirus For Macintosh®
The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
Documentation version 11.0
Copyright © 2007 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo, Norton, LiveUpdate, and Norton AntiVirus are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Macintosh, Mac, Mac OS, the Mac logo, Safari, Tiger, and Leopard are trademarks of Apple Computer, Inc. Firefox is a registered trademarkof Mozilla Corporation. Other names may be trademarks of their respective owners.
The product described in this document is distributed under licenses restrictingits use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S.Government shall be solely in accordance with the terms of this Agreement.
Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014
http://www.symantec.com
Printed in the United States of America.
10 9 8 7 6 5 4 3 2 1
Symantec Software License Agreement
Norton™ AntiVirus For Macintosh®
by copyright law. Although Symantec
IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT (“LICENSE AGREEMENT”) CAREFULLY BEFORE USING THE SOFTWARE (AS DEFINED BELOW). SYMANTEC CORPORATION, IF YOU ARE LOCATED IN THE AMERICAS; OR SYMANTEC ASIA PACIFIC PTE LTD, IF YOU ARE LOCATED IN THE ASIA PACIFIC RIM OR JAPAN; OR SYMANTEC LIMITED, IF YOU ARE LOCATED IN EUROPE, THE MIDDLE EAST OR AFRICA (“SYMANTEC”) IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THE INDIVIDUAL, THE COMPANY, OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE (REFERENCED BELOW AS “YOU” OR “YOUR”) ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT. THIS IS A LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU AND SYMANTEC. BY OPENING THIS PACKAGE,BREAKING THE SEAL, CLICKING THE “ACCEPT” OR “ YES” BUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY, OR LOADING THE SOFTWARE, YOU AGREE TO THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, CLICK THE “I DO NOT ACCEPT” OR “NO” BUTTON OR OTHERWISE INDICATEREFUSAL, MAKE NO FURTHER USE OF THE SOFTWARE, AND CONTACTSYMANTEC CUSTOMER SERVICE FOR INFORMATION ON HOW TO OBTAIN A REFUND OF THE MONEY YOU PAID FOR THE SOFTWARE (LESS SHIPPING, HANDLING, AND ANY APPLICABLE TAXES EXCEPT IN CERTAIN STATES AND COUNTRIES WHERE SHIPPING, HANDLING, AND TAXES ARE REFUNDABLE) AT ANY TIME DURING THE SIXTY (60) DAY PERIOD FOLLOWING THE DATE OF PURCHASE.
1. License
The software and documentation, including any product packaging (“Documentation”), that accompanies this License Agreement (collectively the “Software”) is the property of Symantec or its licensors, and is protected
continues to own the Software, You will have certain rights to use the Software after Your acceptance of this License Agreement. This License Agreement governs any releases, revisions, or enhancements to the Software, that Symantec may furnish to You. Subject to Symantec's right to terminate for Your breach pursuant to Section 9, Your rights and obligations under this License Agreement with respect to the use of this Software (excluding the Content Updates described in Section 2) shall be perpetual and shall be as follows.
You may:
A. use one copy of the Software on a single computer. If a greater number of copies and/or number of computers is specified within the Documentation or the applicable transaction documentation from the authorized distributor or reseller from which You obtained the Software, You may use the Software in accordance with such specifications;
B. make one copy of the Software for back-up or archival purposes, or copy the Software onto the hard disk of Your computer and retain the original for back-up or archival purposes;
C. use the Software on a network, provided that Youhave a licensed copy of the Software for each computer that can access the Software over that network;
D. permanently transfer all of Yourrights in the Software granted under this License Agreement to another person or entity, provided that You retain no copies of the Software and the transferee agrees to the terms of this License Agreement. Partial transfer of Your rights under this License Agreement shall not be permitted. For example, if the applicable documentation grants You the right to use multiple copies of the Software, only a transfer of the rights to use all such copies of the Software would be valid; and
E. use the Software in accordance with any additional permitted uses set forth below.
You may not:
A. sublicense, rent or lease any portion of the Software;
B. reverse engineer, decompile, disassemble, modify, translate, make any attempt to discover the source code of the Software or create derivative works from the Software;
C. use the Software as part of a facility management, timesharing, service provider or service bureau arrangement; or
D. use the Softwarein any manner that is not permitted pursuant to this License Agreement.
2. Content Updates:
Certain Software uses content that is updated from time to time, including but not limited to the following Software: antivirus and crimeware software use updated virus definitions; antispyware software uses updated spyware definitions; antispam software uses updated antispam rules; content filtering and antiphishing software use updated URL lists; some firewall software use updated firewall rules; vulnerability assessment products use updated vulnerability data and web site authentication software uses updated lists of authenticated web pages; these updates are collectively referred to as "Content Updates" (or alternatively referred to as "Protection Updates" or "Security Updates" at times). You shall have the right to obtain Content Updates for any period for which You have purchased a subscription for Content Updates for the Software (including any subscription included with Your original purchase of the Software), except for those Content Updates that Symantec elects to make available by separatepaid subscription, or for any period for which You have otherwise separately acquired the right to obtain Content Updates. Symantec reserves the right to designate specified Content Updates as requiring purchase of a separate subscription at any time and without notice to You; provided, however, that if You purchase a subscription that includes particular Content Updates on the date of purchase, You will not have to pay an additional fee to continue receiving such Content Updates for the remaining period of Your existing subscription even if Symantec designates such Content Updates as requiring separate purchase. This License
Agreement does not otherwise permit You to obtain and use Content Updates.
3. Product Installation; Required Activation:
A. During the installation process, the Software may uninstall or disable other security products, or featuresthereof, if such products or features are incompatible with the Software or for purposes of improving the overall functionality of the Software.
B. There may be technological measures in this Software that are designed to prevent unlicensed or illegal use of the Software. You agree that Symantec may use these measures to protect Symantec against software piracy. This Software may contain enforcement technology that limits the ability to install and uninstall the Software on a computer to not more than a finite number of times for a finite number of computers. This License Agreement and the Software containing enforcement technology require activation as further set forth in the Documentation. The Software will only operate for a finite period of time prior to Software activation by You. During activation, You may be required to provide Your unique product key accompanying the Software and computer configurationin the form of an alphanumeric code over the Internet to verify the authenticity of the Software. If You do not complete the activation within the finite period of time set forth in the Documentation, or as prompted by the Software, the Software will cease to function until activation is complete; at which time the Software functionality will be restored. In the event that You are not able to activate the Software over the Internet, or through any other method specified during the activation process, You may contact Symantec Customer Support using the information provided by Symantec during activation, or as set forth below.
4. Privacy; Data Protection:
From time to time, the Software will collect certain information from the computer on which it is installed, which may include:
•Information regarding installation of the Software. This information indicates to Symantec whether installation of the Software was successfully completed and is collected by Symantec for the purpose of
evaluating and improving Symantec’s product installation success rate. This information will not be correlated with any personally identifiable information.
•Information on potential security risks as well as URLs of websites visited that the Software deems potentially fraudulent. This information is collected by Symantec for the purpose of evaluating and improving the ability of Symantec’s products to detect malicious behavior, potentially fraudulent websites and other Internet security risks. This information will not be correlated with any personally identifiable information.
•Portable executable files that are identified as malware. These files are submitted to Symantec using the Software’s automatic submission function. The collected files could contain personally identifiable information that has been obtained by the malware without your permission. Files of this type are being collected by Symantec only for the purpose of improving the ability of Symantec’s products to detect malicious behavior. Symantec will not correlate these files with any personally identifiable information. Such automatic submission function may be deactivated after installation by following the instructions in the Documentation for applicable products.
•The name given during initial setup to the computer on which the Software is being installed. If collected, the name will be used by Symantec as an account name for such computer under which you may elect to receive additional services and/or under which you may use certain features of the Software. Youmay change the account name at any time after installation of the Software (recommended).
•Other information used for purposes of analyzing and improving the functionality of Symantec’s products. This information will not be correlated with any personally identifiable information.
Symantec may disclose the collected information if asked to do so by a law enforcementofficial as required or permitted by law or in response to a subpoena or other legal process. In order to promote awareness, detection and prevention of Internet security risks, Symantec may share certain information with research organizations and other security software vendors. Symantec may also use statistics derived from the information to track and publish reports on
security risk trends. By using the Software, you acknowledge and agree that Symantec may collect, transmit, store, disclose and analyze such information for these purposes.
5. Sixty (60) Day Money Back Guarantee:
If You are the original licensee of this copy of the Software and are not completely satisfied with it for any reason, please make no further use of the Software and contact Symantec Customer Service, using the contact details set out in Section 10 of this License Agreement, for a refund of the money You paid for the Software (less shipping, handling, and any applicable taxes except in certain states and countries where shipping, handling and taxes are refundable) at any time during the sixty (60) day period following the date of purchase.
6. Limited Warranty:
Symantec warrants that the media on which the Software is distributed will be free from defects for a period of sixty (60) days from the date of delivery of the Software to You. Your sole remedy in the event of a breach of this warranty will be that Symantec will, at its option, replace any defective media returned to Symantec within the warranty period or refund the money You paid for the Software. Symantec does not warrant that the Software will meet Your requirements or that operation of the Software will be uninterrupted or that the Software will be error-free.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE ABOVE WARRANTYIS EXCLUSIVEAND IN LIEU OF ALL OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY FROM STATE TO STATE AND COUNTRY TO COUNTRY.
7. Disclaimer of Damages:
SOME STATES AND COUNTRIES DO NOT ALLOW THE LIMITATION OR EXCLUSION
OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE BELOW LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH HEREIN FAILS OF ITS ESSENTIAL PURPOSE, IN NO EVENT WILL SYMANTEC OR ITS LICENSORS BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INDIRECT, OR SIMILAR DAMAGES, INCLUDING ANY LOST PROFITS OR LOST DATA ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWAREEVEN IF SYMANTEC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
IN NO CASE SHALL SYMANTEC’S OR ITS LICENSORS’ LIABILITY EXCEED THE PURCHASE PRICE WHICH YOU PAID FOR THE SOFTWARE. The disclaimers and limitations set forth above will apply regardless of whether You accept the Software.
8. U.S. Government Restricted Rights:
The Software is deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 “Commercial Computer Software - Restricted Rights” and DFARS 227.7202, “Rights in Commercial Computer Software or Commercial Computer SoftwareDocumentation”,as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Software by the U.S. Government shall be solely in accordance with the terms of this License Agreement.
9. Export Regulation:
You acknowledge that the Software and related technical data and services (collectively “Controlled Technology”) may be subject to the import and export laws of the United States, specifically the U.S. Export Administration Regulations (EAR), and the laws of any country where Controlled Technology is imported or re-exported. You agree to comply with all relevant laws and will not export any Controlled Technology in contravention to U.S. law nor to any prohibited country, entity, or person for
which an export license or other governmental approval is required. All Symantec product is prohibited for export or re-export to Cuba, North Korea,Iran, Syria and Sudan and to any country subject to relevant trade sanctions. You hereby agree that You will not export or sell any Controlled Technology for use in connection with chemical, biological, or nuclear weapons, or missiles, drones or space launch vehicles capable of delivering such weapons.
10. General:
This License Agreement will be governed by the laws of the State of California, United States of America. This License Agreement is the entire agreement between You and Symantec relating to the Software and: (i) supersedes all prior or contemporaneous oral or written communications, proposals, and representations with respect to its subject matter; and (ii) prevails over any conflicting or additional terms of any quote, order, acknowledgment, or similar communications between the parties. Notwithstanding the foregoing, nothing in this License Agreement will diminish any rights Youmay have under existing consumer protection legislation or other applicable laws in Your jurisdiction that may not be waived by contract. This License Agreement shall terminate upon Your breach of any term contained in this License Agreement and You shall cease use of and destroy all copies of the Software and Documentation. The disclaimers of warranties and damages and limitations on liability shall survive termination. This License Agreement may only be modified by the Documentation or by a written document that has been signed by both You and Symantec. Should You have any questions concerning this License Agreement, or if You desire to contact Symantec for any reason, please write to Symantec Customer Service, 555 International Way, Springfield, OR 97477, U.S.A., or visit the Support page at www.symantec.com.

Contents

Chapter 1 Installation
Before you begin .... . . . ... . . . ... . . .... . . ... . . . ... . . . .. 9
Installing Norton AntiVirus . . . .... . . ... . . . ... . . . .. 10
After installation . . .... . . ... . . . ... . . . ... . . .... . . ... . . 12
Chapter 2 Getting started
Opening and quitting Norton AntiVirus . . . . ... . 15
For more information . ... . . ... . . . ... . . . ... . . . ... . . .. 16
Chapter 3 Service and support solutions
Service and support solutions .. . ... . . . ... . . ... . . . 19
About online support . . . ... . . . ... . . . ... . . ... . . . ... . . 19
About phone support . .... . . ... . . . ... . . . ... . . ... . . . . 20
Support for old and discontinued
versions .. . ... . . . ... . . .... . . ... . . . ... . . . ... . . .... 20
Keeping your subscription current . . ... . . .... . . . 21
Worldwide service and support . . ... . . . ... . . . ... . . 21
Index
Contents8
Loading...
+ 18 hidden pages