Symantec Norton Antivirus - 2010 User Guide

User Guide
See back cover for Quick Installation.
We protect more people from more online threats than anyone in the world.
Care for our Environment, It's the right thing to do.
Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products.
The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
Documentation version 17.0
Copyright © 2009 Symantec Corporation. All rights reserved.
Symantec, theSymantecLogo, Norton, Ghost, GoBack,LiveUpdate, Norton AntiSpam, Norton AntiVirus, Norton Internet Security, Norton 360,andNorton SystemWorks are trademarksor registered trademarks ofSymantecCorporationorits affiliates in theU.S.and other countries. WindowsisatrademarkofMicrosoft Corporation. Portions of this product Copyright [1996-2008] Glyph & Cog, LLC. Other names may be trademarks of their respective owners.
Symantec, theSymantecLogo, Norton, the NortonLogo, and Norton Online Backuparetrademarks or registered trademarksof Symantec Corporation or its affiliates in the U.S. and other countries. Microsoft, Windows, and Windows Vista are trademarks or registered trademarksofMicrosoft Corporation. Mozilla andFirefox are registered trademarks of Mozilla Foundation. Safari is a trademark of AppleInc.,registered in the U.S.and other countries. Other names may be trademarks of their respective owners.
The productdescribedin this document isdistributed under licenses restricting itsuse,copying,distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form byanymeans without prior writtenauthorization of Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED"AS IS"ANDALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULARPURPOSEOR NON-INFRINGEMENT, AREDISCLAIMED, EXCEPT TOTHE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BELEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
Symantec Corporation 350 Ellis Street, Mountain View, CA 94043
http://www.symantec.com
Printed in the United States of America.
10 9 8 7 6 5 4 3 2 1
Norton License Agreement
Norton AntiVirus
IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT (LICENSE AGREEMENT) CAREFULLY BEFORE USING THE SOFTWARE (AS DEFINED BELOW). SYMANTEC CORPORATION, IF YOU ARE LOCATED IN THE AMERICAS; OR SYMANTEC ASIA PACIFICPTE LTD, IF YOU ARE LOCATED IN THE ASIA PACIFIC RIM OR JAPAN;OR SYMANTEC LIMITED,IFYOU ARE LOCATED IN EUROPE, THE MIDDLE EAST OR AFRICA (SYMANTEC) IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THEINDIVIDUAL,THE COMPANY, OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE(REFERENCED BELOW AS YOUOR YOUR) ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT. THIS IS A LEGAL AND ENFORCEABLE CONTRACTBETWEENYOU AND SYMANTEC. BY OPENING THIS PACKAGE, BREAKINGTHE SEAL, CLICKING THE I AGREEOR YESBUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY, OR LOADING THE SOFTWARE, YOU AGREE TO THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, CLICK THE CANCELOR NOBUTTON OR OTHERWISE INDICATE REFUSAL, MAKE NO FURTHERUSE OF THESOFTWARE, AND CONTACT YOUR VENDOR OR SYMANTEC CUSTOMER SERVICE,USING THE CONTACT DETAILS IN SECTION 10 OF THIS LICENSE AGREEMENT, FORINFORMATION ON HOW TO OBTAINA REFUND OFTHE MONEY YOU PAID FORTHE SOFTWARE (LESSSHIPPING, HANDLING, AND ANY APPLICABLE TAXES EXCEPT IN CERTAIN STATES AND COUNTRIES WHERESHIPPING, HANDLING, AND TAXES ARE REFUNDABLE) AT ANY TIME DURINGTHE SIXTY (60)DAYPERIOD FOLLOWING THE DATE OF PURCHASE.
1. License:
The software (including any accompanying features and services) and documentation (including any product packaging) (the
Documentation), that accompanies this License Agreement (collectively the Software) is the property of Symantec or its licensors, and is protected by copyright law. Although Symantec continues to own the Software, after Your acceptance of this License Agreement You will have certain rights touse the Software duringthe Service Period. The Service Periodshall begin on the date of Your initial installation of the Software, regardlessof the number ofcopies that You are permitted to use in accordance with Section 1.A of this License Agreement, and shall last forthe period of time set forth in the Documentation or the applicable transaction documentation from the authorized distributororreseller from which You obtained the Software. The Software may automatically deactivate and become non-operational at the end of the Service Period, andYouwillnot be entitled toreceive any feature or content updates to the Software unless the Service Period is renewed. Subscriptions for renewals of the Service Periodwillbeavailable in accordance with Symantecs support policy posted at
http://www.symantec.com/ techsupp/support_policy.html.
This License Agreement governs any releases, revisions,updatesor enhancements to the Software that Symantec may make available to You. Except as may be modified by the Documentation, and subject to Symantecs right to terminate for Your breach pursuant to Section 9, Your rights and obligations under this License Agreement with respect to the use of this Software are as follows.
During the Service Period, You may:
A. use one copy of the Software on a single computer. If a greater number of copies and/or number of computers is specified within the Documentation or the applicable transaction documentation from the authorized distributororreseller from which You obtained the Software, Youmay usethe Software in accordance with such specifications;
B. makeonecopyof the Software forback-up or archival purposes, or copy the Software onto the hard disk of Your computer and retain the original for back-up or archival purposes;
C. use the Software on a network, provided that Youhavealicensed copy of theSoftware for each computer that can access the Software over that network;
D. permanently transferallofYour rights in the Software granted under this License Agreement to another person or entity, provided that You retain no copies of the Software and the transferee agrees to the terms of this License Agreement. Partial transfer of Your rights under this License Agreement shall not be permitted. For example, if the applicable documentation grants You the right to use multiple copies of the Software, only atransfer ofthe rights to use all such copies of the Software would be valid; and
E. use the Software in accordance with any additional permitted uses which may be set forth below.
You may not, nor may you permit any other person to:
A. sublicense,rentorleaseany portion of the Software;
B. reverseengineer, decompile, disassemble, modify, translate, make any attempt to discover the source code of the Software or create derivative works from the Software;
C. use the Software as part of a facility management, timesharing, service provider or service bureau arrangement; or
D. usetheSoftwarein any manner thatisnot permitted pursuant to this License Agreement.
2. Software Feature and Content Updates:
A. You shall have the right to receive new features to the Software as Symantec, in its sole discretion,makessuch features available with the Software during Your Service Period. Symantec continually strives to improve theusability and performanceofits products and services. In order to optimize the SoftwareSymantecmay,at its discretion
and without notice, add, modify or remove features from the Software at any time.
B. Certain Software uses content that is updated fromtimeto time, including butnot limited to the following Software: antivirus and crimeware software use updated virus definitions; antispyware software uses updated spyware definitions; antispam software uses updated antispam rules; content filtering and antiphishing software use updatedURLlists; some firewall software use updated firewall rules; vulnerability assessment products use updated vulnerability data and web site authentication software uses updated lists of authenticated web pages; these updates are collectively referred to as Content Updates(or alternatively referred to as Protection Updatesor Security Updates at times). You shall have theright to receive Content Updates for the Software during Your Service Period.
3. Product Installation; Required Activation:
A. During the installation process, the Software may uninstall or disable other security products,orfeaturesthereof, if such products or features are incompatible with the Software or for purposes of improving the overall functionality of the Software.
B. There may be technological measures in this Software that are designed to prevent unlicensed orillegaluseofthe Software. You agree thatSymantecmay use these measures to protectSymantecagainstsoftware piracy. This Software may contain enforcement technology that limits the ability to install and uninstall the Software ona computerto not more than a finite number of times for a finite number of computers. This License Agreement and the Software containing enforcement technology may require activation as further set forth in the Documentation. If so, the Softwarewill only operate for a finite period of time prior to Software activation by You. During activation, You may be required to provide Your unique product key accompanying the Software and computer configurationin the form of an alphanumeric code over the Internet to verify the authenticity of the Software. If You do not complete the activation within thefiniteperiodof time set forth in the Documentation, or as prompted by the Software, the Software will cease to
function until activation is complete; at which time the Software functionality will be restored. In the event that You are not able to activate the Software over the Internet, or through any other method specified during the activation process, You may contact Symantec Customer Support using theinformationprovided by Symantec during activation, or as set forth below.
4. Privacy; Data Protection:
From time to time, the Software may collect certain information from the computer on which it is installed, which may include:
Information regarding installation of the Software. This information indicates to Symantec whether installation of the Software was successfully completed and is collected by Symantec for the purpose of evaluating and improving Symantecs product installation success rate. This information will not be correlated with any personally identifiable information.
Portable executable files that are identified as potentialmalware,includinginformation on the actionstaken by such files atthe time of installation. These files are submitted to Symantec using the Softwares automatic submission function.Thecollected files could contain personally identifiable information that has been obtained by the malware without Your permission. Files of this type are being collectedbySymantec only forthe purpose of improving the ability of Symantecs products to detect malicious behavior. Symantec will not correlate these files with any personally identifiable information. Such automatic submission function maybedeactivated after installation by following the instructions in the Documentation for applicable products.
The name given during initial setup to the computer on which the Software is being installed. If collected, the name will be used by Symantec as an account name for such computer under which You may elect to receive additional services and/or under which You may use certain features of the Software. Youmaychange the account name at anytimeafterinstallation of the Software (recommended).
Status information regarding installation and operation of the Software. This information indicates to Symantec whether installation ofthe Software wassuccessfully
completed as well as whether the Software has encountered an error. The status information could contain personally identifiable information only if such information is included in the name of the file or folderencounteredbythe Software at the time of installation or error. The status information iscollectedbySymantec for the purpose of evaluating and improving Symantecs product performance and installation success rate. This information will not be correlated with any personally identifiable information.
Information contained in email messages that you send through the Software to Symantec toreport as spamor as incorrectly identified as spam. These email messages may contain personally identifiable information and will be sent to Symantec only with your permission, and will not be sent automatically. If you send such messages to Symantec, Symantec will use them only for the purpose of improving the detection ability of Symantecs antispam technology. Symantecwillnot correlate these files with any other personally identifiable information.
The IPaddressofthe computer on whichthe Software isinstalled,aswell as other general, statistical information used for license administration, product analysis, and for improving product functionality. This information will not be correlated with any personally identifiable information.
The collected information as set out above is necessary for the purpose of optimizing the functionalityofSymantecs products and may be transferred to the Symantec group in the United States or other countries that may havelessprotective data protection laws than the region in which You are situated (including the European Union), but Symantec has taken steps so that the collected information,iftransferred, receives an adequate level of protection.
Symantec may disclose the collected information if asked to do so by a law enforcement officialasrequired or permitted by law or in response to a subpoena or other legal process.Inorder to promote awareness, detection andpreventionof Internet security risks, Symantec may share certain information withresearchorganizations and other security software vendors. Symantec may also use statistics derived from the information to track and publish reports on security risk trends. By using the Software,
You acknowledge and agree that Symantec may collect, transmit, store, disclose and analyze suchinformationfor these purposes.
5. Sixty (60) Day Money Back Guarantee:
If You are the original licensee of this copy of the Software and are not completely satisfied with it for any reason, please make no further use of the Software and contact Symantec Customer Service, using the contact details set out in Section 10 of this License Agreement, for a refund of the money You paid for the Software (less shipping, handling,and any applicabletaxes except in certain statesand countries where shipping, handlingandtaxesare refundable) at any time during the sixty (60) day period following the date of purchase.
6. Limited Warranty:
Symantec warrants that any media manufactured by Symantec on which the Software is distributed will be free from defects for a period of sixty (60) days from the date of delivery of the Software to You. Your sole remedy in the event of a breach of this warranty will be that Symantec will, at its option, replace any defective media returned to Symantec within the warranty period or refund the money You paid forthe Software. Symantec does not warrant that the Softwarewill meet Yourrequirements or that operation of the Software will be uninterrupted or that the Software will be error-free.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE ABOVE WARRANTY ISEXCLUSIVE AND INLIEUOF ALL OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY FROM STATETO STATE ANDCOUNTRY TO COUNTRY.
7. Disclaimer of Damages:
SOME STATES AND COUNTRIES DO NOT ALLOW THE LIMITATION OR EXCLUSION
OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE BELOW LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH HEREIN FAILSOF ITS ESSENTIALPURPOSE, IN NO EVENT WILL SYMANTEC OR ITS LICENSORS BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INDIRECT,OR SIMILAR DAMAGES,INCLUDING ANY LOST PROFITS OR LOST DATA ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE EVENIF SYMANTECHASBEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
IN NO CASE SHALL SYMANTECS OR ITS LICENSORSLIABILITY EXCEED THE PURCHASE PRICE WHICH YOU PAID FOR THE APPLICABLE SERVICE PERIOD. The disclaimers and limitations set forth above will apply regardless of whether You accept the Software.
8. U.S. Government Restricted Rights:
The Software is deemed to be commercial computer software asdefinedin FAR 12.212 and subject to restricted rightsas definedin FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, Rights in Commercial Computer Softwareor Commercial Computer Software Documentation,asapplicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Software by the U.S. Government shall be solely in accordance with the terms of this License Agreement.
9. Export Regulation:
You acknowledge that the Software and related technical data and services (collectively "Controlled Technology") may be subject to the import and export laws of the UnitedStates,specificallythe U.S. Export Administration Regulations (EAR), and the laws of any country where Controlled Technology is imported or re-exported. You agree to comply with all relevant laws and will not export any Controlled Technology in contravention to U.S. law nor to any prohibited country, entity, or person for
which an export license or other governmental approval is required. All Symantec product is prohibited for export or re-exporttoCuba,North Korea, Iran, Syria and Sudan and to any country subject to relevant trade sanctions. USE OR FACILITATION OF SYMANTEC PRODUCT IN CONNECTION WITH ANY ACTIVITY INCLUDING, BUT NOT LIMITED TO, THE DESIGN, DEVELOPMENT, FABRICATION, TRAINING, OR TESTING OF CHEMICAL, BIOLOGICAL, OR NUCLEAR MATERIALS, OR MISSILES,DRONES, OR SPACELAUNCH VEHICLES CAPABLE OF DELIVERING WEAPONS OF MASS DESTRUCTION IS PROHIBITED, IN ACCORDANCE WITH U.S. LAW.
10. General:
This License Agreement will begoverned by the laws of the State of California, United States of America. This License Agreement is the entire agreement between You and Symantec relating to the Software and: (i) supersedes allprioror contemporaneous oral or written communications, proposals, and representations with respect to its subject matter; and (ii) prevails overany conflicting or additional terms of any quote, order, acknowledgment, orsimilar communications between the parties. Notwithstanding the foregoing, nothinginthis License Agreement will diminishanyrightsYou may have under existing consumer protection legislation or other applicable laws in Your jurisdiction that may not be waived by contract. This License Agreement shall terminate upon Your breach of any term contained in this License Agreement and You shall cease use of and destroy all copiesof the Software and Documentation. The disclaimers of warranties and damages and limitations on liability shall survive termination. This License Agreement may onlybe modified by the Documentationorby a written document that has been signed by both You and Symantec. Should You have any questions concerning thisLicenseAgreement, or if You desire to contact Symantec for any reason, please write to Symantec Customer Service, 555 International Way, Springfield, OR 97477, U.S.A. or visit the Support page at www.symantec.com.
CPS / S 3.0 / USE
Additional Terms and Conditions:
In additon to the terms and conditions set forth above, the following terms and conditions will also apply to Your use of the Software:
Technical Support:
In connection with Your use of the Software You may choose to access certain technical support features that may be offered from within the Software, which may include live chat with a technical support agent and/or assistance from a technical support agent via remote computer access (any such technical support offered from within the Software shall be referred to in this License Agreement asthe Technical Support).Any such Technical Support shall be provided in Symantecs sole discretion without any guarantee orwarrantyofany kind. It issolely Your responsibility to complete a backup of all Yourexistingdata, software and programs before receiving any Technical Support. In the course of providing the Technical Support, Symantec may determine that the technical issue is beyond the scope of the Technical Support. Symantec reserves the right to refuse, suspend or terminate any of the Technical Support in its sole discretion.
CPS / S 1.1 / NAV-NIS

Contents

Chapter 1 Overview ... .. ... ... .. ... ... .. ... ... .. ... ... .. ... ... .. . 11
About Norton AntiVirus ... .. ... ... .. ... ... .. ... ... . 11
What is new in Norton AntiVirus . .. ... ... .. ... ... 12
Chapter 2 Installation . .. ... ... .. ... ... .. ... ... .. ... ... .. ... ... . 15
Before you begin ... .. ... ... .. ... ... .. ... ... .. ... ... .. . 15
Installing Norton AntiVirus ... .. ... ... .. ... ... .. ... 15
If the opening panel does not appear . ... .. ... ... . 16
Chapter 3 Getting started ... .. ... ... .. ... ... .. ... ... .. ... ... .. . 17
Starting Norton AntiVirus . ... ... .. ... ... .. ... ... .. . 17
Activating your product ... .. ... ... .. ... ... .. ... ... .. 18
Exploring the main window ... .. ... ... .. ... ... .. ... 20
Viewing the protection status of your
computer . .. ... ... .. ... ... .. ... ... .. ... ... .. ... ... 22
About the security status indicator ... .. ... ..... .. 22
For more information . ... ... ..... ... ..... ... ... .. ... 23
Chapter 4 Responding to emergencies . .. ... ... .. ... ... .. . 27
Using the Norton Bootable Recovery Tool
if you cannot install the
product . ... .. ... ... .. ... ... .. ... ... .. ... ... .. ... .. 27
Downloading theNortonBootable Recovery
Tool .... ... ... .. ... ... .. ... ... .. ... ... .. ... ... .. ... 28
Service and Support Solutions . .. ... ... .. ... ... .. ... ... .. ... ... .. ... .. 29
Index . ... .. ... ... .. ... ... .. ... ... ..... ... ..... ... ... .. ... ... .. ... ... .. ... ... .. .. 35
Contents10
Quick Installation . ... ... .. ... ... .. ... ... .. ... ... ..... ... ..... ... ... .. ... ... 38

Overview

This chapter includes the following topics:
1 About Norton AntiVirus
1 What is new in Norton AntiVirus

About Norton AntiVirus

Norton AntiVirus defends your PC against viruses, spyware, bots, worms, and more without slowing you down or getting in your way.
For faster, less frequent scans, intelligence-driven technology identifies and targets only files at risk. Vulnerability Protection prevents threats from exploiting security holes in your PCs software. Pulse Updates that occur every 5 minutes to 15 minutes and real-time online security checks help ensure continuous, up-to-the-minute protection against the latest threats.Unlike otherantivirussolutions, Norton AntiVirus provides easy-to-understand threat explanations and information about CPU andmemory resource usage. It helps you prevent future infections and keeps your PC running fast.
1
Overview
12

What is new in Norton AntiVirus

What is new in Norton AntiVirus
This version of Norton AntiVirus offers the following new features:
Improved Norton Protection System
Norton Download Insight
Improved Vulnerability Protection
Norton Insight Network
Real-Time SONAR 2 (Symantec Online Network for Advanced Response)
Features the multilayered technologies that work together to proactively block attacks and detect and remove threats traditional virus scanning alone cant stop.
Analyzes downloaded files and applications and lets you know if they can be trusted to be safe before you install and run them
Guards vulnerabilities in your operating system, applications, browsers, and browser plug-ins to prevent threats from sneaking in.
Uses Symantecs global security intelligence network to provide real-time protection from the newest threats.
Uses our exclusive, completely re-engineered SONAR technology to detect suspicious behavior on your PC and proactively stop the threats that competing antivirus solutions cant catch.
Loading...
+ 26 hidden pages