Symantec, theSymantec Logo,Norton, SONAR,LiveUpdate, Norton
AntiSpam, NortonAntiVirus, NortonInternet Security, Norton 360,
and NortonSystemWorks aretrademarks orregistered trademarks
of Symantec Corporation or its affiliates in the U.S. and other
countries. Windows is a trademark of Microsoft Corporation.
Portions of this product Copyright [1996-2008] Glyph & Cog, LLC.
Other names may be trademarks of their respective owners.
The productdescribed inthis document isdistributed under licenses
restricting itsuse, copying, distribution,and decompilation/reverse
engineering. No part of this document may be reproduced in any
form byany meanswithout priorwritten authorizationof Symantec
Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED"AS IS" AND ALLEXPRESS
OR IMPLIED CONDITIONS, REPRESENTATIONS AND
WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULARPURPOSE OR
NON-INFRINGEMENT, AREDISCLAIMED, EXCEPT TOTHE EXTENT
THAT SUCH DISCLAIMERS ARE HELD TO BELEGALLY INVALID.
SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR
INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION
WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS
DOCUMENTATION. THE INFORMATION CONTAINED IN THIS
DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
Symantec Corporation
350 Ellis Street,
Mountain View, CA 94043
http://www.symantec.com
Printed in the United States of America.
10 9 8 7 6 5 4 3 2 1
Norton License Agreement
Norton™ Internet Security
IMPORTANT: PLEASE READ THE TERMS
AND CONDITIONS OF THIS LICENSE
AGREEMENT (“LICENSE AGREEMENT”)
CAREFULLY BEFORE USING THE
SOFTWARE (AS DEFINED BELOW).
SYMANTEC CORPORATION, IF YOU ARE
LOCATED IN THE AMERICAS; OR
SYMANTEC ASIA PACIFICPTE LTD, IF YOU
ARE LOCATED IN THE ASIA PACIFIC RIM
OR JAPAN;OR SYMANTEC LIMITED,IF YOU
ARE LOCATED IN EUROPE, THE MIDDLE
EAST OR AFRICA (“SYMANTEC”) IS
WILLING TO LICENSE THE SOFTWARE TO
YOU AS THEINDIVIDUAL, THE COMPANY,
OR THE LEGAL ENTITY THAT WILL BE
UTILIZING THE SOFTWARE(REFERENCED
BELOW AS “YOU” OR “YOUR”) ONLY ON
THE CONDITION THAT YOU ACCEPT ALL
OF THE TERMS OF THIS LICENSE
AGREEMENT. THIS IS A LEGAL AND
ENFORCEABLE CONTRACTBETWEEN YOU
AND SYMANTEC. BY OPENING THIS
PACKAGE, BREAKINGTHE SEAL, CLICKING
THE “I AGREE” OR “YES” BUTTON OR
OTHERWISE INDICATING ASSENT
ELECTRONICALLY, OR LOADING THE
SOFTWARE, YOU AGREE TO THE TERMS
AND CONDITIONS OF THIS LICENSE
AGREEMENT. IF YOU DO NOT AGREE TO
THESE TERMS AND CONDITIONS, CLICK
THE “CANCEL” OR “NO” OR “CLOSE
WINDOW” BUTTON OR OTHERWISE
INDICATE REFUSAL, MAKE NO FURTHER
USE OF THE SOFTWARE, AND CONTACT
YOUR VENDOROR SYMANTECCUSTOMER
SERVICE, USING THE CONTACT DETAILS
IN SECTION 10 OF THIS LICENSE
AGREEMENT, FORINFORMATION ON HOW
TO OBTAINA REFUND OFTHE MONEY YOU
PAID FORTHE SOFTWARE (LESSSHIPPING,
HANDLING, AND ANY APPLICABLE TAXES
EXCEPT IN CERTAIN STATES AND
COUNTRIES WHERESHIPPING, HANDLING,
AND TAXES ARE REFUNDABLE) AT ANY
TIME DURINGTHE SIXTY (60)DAY PERIOD
FOLLOWING THE DATE OF PURCHASE.
1. License:
The software (including any accompanying
features and services) and documentation
(including any product packaging) (the
“Documentation”), that accompanies this
License Agreement (collectively the
“Software”) is the property of Symantec or
its licensors, and is protected by copyright
law. Although Symantec continues to own
the Software, after Your acceptance of this
License Agreement You will have certain
rights touse the Software duringthe Service
Period. The “Service Period” shall begin on
the date of Your initial installation of the
Software on a computer, mobile or mobile
computing device (a “Device”), regardless of
the number ofcopies that You are permitted
to use in accordance with Section 1.A of this
License Agreement, and shall last for the
period oftime setforth in theDocumentation
or theapplicable transactiondocumentation
from the authorized distributor or reseller
from which You obtained the Software. The
Software may automatically deactivate and
become non-operational at the end of the
Service Period, and You will not be entitled
to receive any feature or content updates to
the Software unless the Service Period is
renewed. Subscriptions for renewals of the
Service Periodwill be availablein accordance
with Symantec’s support policy posted at
This License Agreement governs any
releases, revisions,updates orenhancements
to the Software that Symantec may make
available to You. Except as may be modified
by the Documentation, and subject to
Symantec’s right to terminate for Your
breach pursuant to Section 9, Your rights
and obligations under this License
Agreement with respect to the use of this
Software are as follows.
During the Service Period, You
may:
A.use one copy of the Software on a single
Device. If a greater number of copies and/or
number of Devices is specified within the
Documentation orthe applicabletransaction
documentation from the authorized
distributor or reseller from which You
obtained the Software, You may use the
Software in accordance with such
specifications;
B. makeone copy of the Softwarefor back-up
or archival purposes, or copy the Software
onto the hard diskof Your Device and retain
the originalfor back-up orarchival purposes;
C. use the Software on a network, provided
that Youhave a licensedcopy of the Software
for each Devicethat can accessthe Software
over that network;
D. permanently transferall of Yourrights in
the Software granted under this License
Agreement to another person or entity,
provided that You retain no copies of the
Software and the transferee agrees to the
terms of this License Agreement. Partial
transfer of Your rights under this License
Agreement shall not be permitted. For
example, if the applicable documentation
grants You the right to use multiple copies
of the Software, only atransfer of the rights
to use all such copies of the Software would
be valid; and
E. use the Software in accordance with any
additional permitted uses which may be set
forth below.
You may not, nor may you permit
any other person to:
A. sublicense,rent or leaseany portion of the
Software;
B. reverseengineer, decompile, disassemble,
modify, translate, make any attempt to
discover the source code of the Software or
create derivative works from the Software;
C. use the Software as part of a facility
management, timesharing, service provider
or service bureau arrangement; or
D. usethe Software inany manner that isnot
permitted pursuant to this License
Agreement.
2. Software Feature and Content
Updates:
A. You shall have the right to receive new
features to the Software as Symantec, in its
sole discretion,makes suchfeatures available
with the Software during Your Service
Period. Symantec continually strives to
improve theusability and performanceof its
products and services. In order to optimize
the SoftwareSymantec may, at its discretion
and without notice, add, modify or remove
features from the Software at any time.
B. Certain Software uses content that is
updated fromtime totime, includingbut not
limited to the following Software: antivirus
and crimeware software use updated virus
definitions; antispyware software uses
updated spyware definitions; antispam
software uses updated antispam rules;
content filtering and antiphishing software
use updatedURL lists;some firewall software
use updated firewall rules; vulnerability
assessment products use updated
vulnerability data and web site
authentication software uses updated lists
of authenticated web pages; these updates
are collectively referred to as “Content
Updates” (or alternatively referred to as
“Protection Updates” or “Security Updates”
at times). You shall have theright to receive
Content Updates for the Software during
Your Service Period.
3. Product Installation; Required
Activation:
A. During the installation process, the
Software may uninstall or disable other
security products,or features thereof,if such
products or features are incompatible with
the Software or for purposes of improving
the overall functionality of the Software.
B. There may be technological measures in
this Software that are designed to prevent
unlicensed orillegal use ofthe Software. You
agree thatSymantec mayuse thesemeasures
to protectSymantec against software piracy.
This Software may contain enforcement
technology that limits the ability to install
and uninstallthe Software ona Device tonot
more than a finite number of times for a
finite number of Devices. This License
Agreement and the Software containing
enforcement technology may require
activation as further set forth in the
Documentation. If so, the Softwarewill only
operate for a finite period of time prior to
Software activation by You. During
activation, You may be required to provide
Your unique activation code accompanying
the Softwareand Device configuration in the
form of an alphanumeric code over the
Internet to verify the authenticity of the
Software. If You do not complete the
activation within the finite periodof time set
forth in the Documentation, or as prompted
by the Software, the Software will cease to
function until activation is complete; at
which time the Software functionality will
be restored. In the event that You are not
able to activate the Software over the
Internet, or through any other method
specified during the activation process, You
may contact Symantec Customer Support
using theinformation providedby Symantec
during activation, or as set forth below.
5. Sixty (60) Day Money Back
Guarantee:
If You are the original licensee of this copy
of the Software and are not completely
satisfied with it for any reason, please make
no further use of the Software and contact
Symantec Customer Service, using the
contact details set out in Section 10 of this
License Agreement, for a refund of the
money You paid for the Software (less
shipping, handling,and any applicabletaxes
except in certain statesand countries where
shipping, handlingand taxes are refundable)
at any time during the sixty (60) day period
following the date of purchase.
6. Limited Warranty:
Symantec warrants that any media
manufactured by Symantec on which the
Software is distributed will be free from
defects for a period of sixty (60) days from
the date of delivery of the Software to You.
Your sole remedy in the event of a breach of
this warranty will be that Symantec will, at
its option, replace any defective media
returned to Symantec within the warranty
period or refund the money You paid for the
Software. Symantec does not warrant that
the Softwarewill meet Yourrequirements or
that operation of the Software will be
uninterrupted or that the Software will be
error-free.
TO THE MAXIMUM EXTENT PERMITTED
BY APPLICABLE LAW, THE ABOVE
WARRANTY ISEXCLUSIVE AND INLIEU OF
ALL OTHER WARRANTIES, WHETHER
EXPRESS OR IMPLIED, INCLUDING THE
IMPLIED WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE, AND
NON-INFRINGEMENT OF INTELLECTUAL
PROPERTY RIGHTS. THIS WARRANTY
GIVES YOU SPECIFIC LEGAL RIGHTS. YOU
MAY HAVE OTHER RIGHTS, WHICH VARY
FROM STATETO STATE AND COUNTRYTO
COUNTRY.
7. Disclaimer of Damages:
SOME STATES AND COUNTRIES DO NOT
ALLOW THE LIMITATION OR EXCLUSION
OF LIABILITY FOR INCIDENTAL OR
CONSEQUENTIAL DAMAGES, SO THE
BELOW LIMITATION OR EXCLUSION MAY
NOT APPLY TO YOU.
TO THE MAXIMUM EXTENT PERMITTED
BY APPLICABLE LAW AND REGARDLESS
OF WHETHER ANY REMEDY SET FORTH
HEREIN FAILSOF ITS ESSENTIALPURPOSE,
IN NO EVENT WILL SYMANTEC OR ITS
LICENSORS BE LIABLE TO YOU FOR ANY
SPECIAL, CONSEQUENTIAL, INDIRECT,OR
SIMILAR DAMAGES,INCLUDING ANY LOST
PROFITS OR LOST DATA ARISING OUT OF
THE USE OR INABILITY TO USE THE
SOFTWARE EVENIF SYMANTECHAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
IN NO CASE SHALL SYMANTEC’S OR ITS
LICENSORS’ LIABILITY EXCEED THE
PURCHASE PRICE WHICH YOU PAID FOR
THE APPLICABLE SERVICE PERIOD. The
disclaimers and limitations set forth above
will apply regardless of whether You accept
the Software.
8. U.S. Government Restricted
Rights:
For U.S. Government procurements, the
Software is deemed to be commercial
computer software asdefined in FAR12.212
and subject to restricted rightsas defined in
FAR Section 52.227-19 "Commercial
Computer Software - Restricted Rights" and
DFARS 227.7202, “Rights in Commercial
Computer Softwareor Commercial Computer
Software Documentation”,as applicable,and
any successor regulations. Any use,
modification, reproduction release,
performance, display or disclosure of the
Software by the U.S. Government shall be
solely in accordance with the terms of this
License Agreement.
9. Export Regulation:
You acknowledge that the Software and
related technical data and services
(collectively "Controlled Technology") may
be subject to the import and export laws of
the UnitedStates, specifically theU.S. Export
Administration Regulations (EAR), and the
laws of any country where Controlled
Technology is imported or re-exported. You
agree to comply with all relevant laws and
will not export any Controlled Technology
in contravention to U.S. law nor to any
prohibited country, entity, or person for
which an export license or other
governmental approval is required. All
Symantec product is prohibited for export
or re-exportto Cuba, NorthKorea, Iran, Syria
and Sudan and to any country subject to
relevant trade sanctions. USE OR
FACILITATION OF SYMANTEC PRODUCT
IN CONNECTION WITH ANY ACTIVITY
INCLUDING, BUT NOT LIMITED TO, THE
DESIGN, DEVELOPMENT, FABRICATION,
TRAINING, OR TESTING OF CHEMICAL,
BIOLOGICAL, OR NUCLEAR MATERIALS,
OR MISSILES,DRONES, OR SPACE LAUNCH
VEHICLES CAPABLE OF DELIVERING
WEAPONS OF MASS DESTRUCTION IS
PROHIBITED, IN ACCORDANCE WITH U.S.
LAW.
10. General:
This License Agreement will begoverned by
the laws of the State of California, United
States of America. This License Agreement
is the entire agreement between You and
Symantec relating to the Software and: (i)
supersedes allprior orcontemporaneous oral
or written communications, proposals, and
representations with respect to its subject
matter; and (ii) prevails overany conflicting
or additional terms of any quote, order,
acknowledgment, orsimilar communications
between the parties. Notwithstanding the
foregoing, nothingin thisLicense Agreement
will diminishany rightsYou may haveunder
existing consumer protection legislation or
other applicable laws in Your jurisdiction
that may not be waived by contract. This
License Agreement shall terminate upon
Your breach of any term contained in this
License Agreement and You shall cease use
of and destroy all copies of theSoftware and
Documentation. The disclaimers of
warranties and damages and limitations on
liability shall survive termination. This
License Agreement may onlybe modified by
the Documentationor bya writtendocument
that has been signed by both You and
Symantec. Should You have any questions
concerning thisLicense Agreement,or if You
desire to contact Symantec for any reason,
please write to Symantec Customer Service,
555 International Way, Springfield, OR
97477, U.S.A. or visit the Support page at t
www.symantec.com.
ADDITIONAL TERMS AND
CONDITIONS
Your use of the Software is subject to the
terms and conditions below in addition to
those stated above.
11. Privacy; Data Protection:
From time to time, the Software may collect
certain information from the Device on
which it is installed, which may include:
Information on potential security risks as
well as URLs of websites visited that the
Software deems potentially fraudulent. The
URLs could contain personally identifiable
information that a potentially fraudulent
website isattempting to obtain without Your
permission. This information is collected by
Symantec for the purpose of delivering the
functionalities of the software, and also for
evaluating and improving the ability of
Symantec’s products to detect malicious
behavior, potentiallyfraudulent websitesand
other Internet security risks. URLs of
websites visited as well as search keywords
and search results only if the Norton Safe
Web feature is enabled. This information is
collected by Symantec for the purpose of
providing protection and of evaluating and
advising Youregarding potentialthreats and
risks thatmay be associatedwith a particular
Web site before You view it.
Executable files and files that contain
executable content that are identified as
potential malware,including informationon
the actions taken by such files at the time of
installation. These files are submitted to
Symantec using the Software’s automatic
submission function.The collectedfiles could
contain personally identifiable information
that has been obtained by the malware
without Your permission. Files of this type
are being collectedby Symantec onlyfor the
purpose of improving the ability of
Symantec’s products to detect malicious
behavior. Such automatic submission
function maybe deactivatedafter installation
by following the instructions in the
Documentation for applicable products.
The name given to the Device during the
initial setup of such Device. If collected, the
name willbe usedby Symantec as an account
name for the Device under which You may
elect to receive additional services and/or
under which You may use certain features
of the Software. You may change such
account name at any time after installation
of the Software (recommended).
Status information regarding installation
and operation of the Software. This
information indicates to Symantec whether
installation ofthe Software wassuccessfully
completed as well as whether the Software
has encountered an error. The status
information could contain personally
identifiable information only if such
information is included in the name of the
file or folderencountered by theSoftware at
the time of installation or error. The status
information iscollected by Symantec for the
purpose of evaluating and improving
Symantec’s product performance and
installation successrate. Symantec mayalso
use this information to optimize its
web-pages.
Information contained in email messages
that you send through the Software to
Symantec toreport as spamor as incorrectly
identified as spam. These email messages
may contain personally identifiable
information and will be sent to Symantec
only with your permission, and will not be
sent automatically. If you send such
messages to Symantec, Symantec will use
them only for the purpose of improving the
detection ability of Symantec’s antispam
technology. Symantecwill notcorrelate these
files with any other personally identifiable
information.
Information contained in a report that You
may choose to send throughthe Software to
Symantec when the Software encounters a
problem. The report includes information
regarding thestatus ofboth the Softwareand
Your Device at the time that the Software
encountered the problem. The status
information about Your Device may include
the systemlanguage, countrylocale, and the
operating systemversion for YourDevice, as
well as the processes running, their status
and performanceinformation, anddata from
files or folders that wereopen at the timethe
Software encountered the problem. The
information could contain personally
identifiable information ifsuch information
is included in, or is a part of the name of the
files or folders open atthe time the Software
encountered the problem. This information
will be sent to Symantec only with Your
permission, and will not be sent
automatically. The information is collected
by Symantec for the purpose of correcting
the encountered problem and improving
Symantec’s product performance. This
information will not be correlated with any
personally identifiable information.
The Internet Protocol (IP) address and/or
Media AccessControl (MAC) addressand the
Machine ID of the computer on which the
Software is installed to enable the Software
to function and for license administration
purposes.
Other general, statistical information used
for product analysis, and for improving
product functionality.
Unless itis expressly definedas optional, the
collected information as set out above is
necessary forthe purposeof the functionality
of Symantec’s products.
Information may be transferred to the
Symantec groupin theUnited Statesor other
countries that mayhave less protectivedata
protection lawsthan the region in whichYou
are situated (including the European Union)
and may be accessible by Symantec
employees or contractors exclusively to be
used in accordance with the purposes
described above. For the same purposes the
information may be shared with partners
and vendors that process information on
behalf of Symantec. Symantec has taken
steps so that the collected information, if
transferred, receives an adequate level of
protection.
Subject toapplicable laws,Symantec reserves
the right tocooperate with any legal process
and any law enforcement or other
government inquiry related to your use of
this Software. This means that Symantec
may provide documents and information
relevant to a court subpoena or to a law
enforcement or other government
investigation. Inorder topromote awareness,
detection andprevention ofInternet security
risks, Symantec may share certain
information withresearch organizationsand
other security software vendors. Symantec
may also use statistics derived from the
information to track and publish reports on
security risk trends. By using the Software,
You acknowledge and agree that Symantec
may collect, transmit, store, disclose and
analyze suchinformation forthese purposes.
Product activation is a technology that protects users
from pirated or counterfeit software. It protects you
by limitingthe use ofa product to those userswho have
acquired the product legitimately. Product activation
requires a product key for each installation of a
product. Youmust activate the product withina limited
time period after you install it.
Getting started
14
Activation protects you
If youare connected tothe Internet, product activation
takes place automatically when you start the product
for the first time after installation. After activation,
the Norton Account window appears. You can create
your Norton Account and register your product.
If you are not connected to the Internet, you can click
Try Later in the Activation not complete window to
start your product. The Activation window reappears
every time you start your product until you activate
your product. If you choosenot to activate at that time,
you receive an alert that reminds you to activate the
product. You can also activate your product from the
Norton Internet Security main window.
If you do not activate the product within the time
w
period that the alert specifies, the product stops
working. You can activate it after the time period has
elapsed, but you are not protected until you activate
the product.
Activating your product
If youdid not activateyour product during installation,
you receive an activation-needed alert regularly until
you activate the product.
Product activationreduces software piracy and ensures
that you use authentic Symantec software. Activation
provides you witha specified period ofsubscription to
your Norton product. You can also renew your
subscription to continue using Norton Internet
Security.
You mustactivate your productwithin the time period
w
that the alert specifies, oryour product stopsworking.
You can activate your product directly from the
activation-needed alert or from the main window.
Activation should take only a few minutes.
During activation, the Norton Account window
appears. You can create your Norton Account and
register your product. You can also view details, such
as yourproduct key, your registration date,and recent
Activation protects you
updates tothe product. Ifyou skip the NortonAccount
window, the product is activated, but the product key
is not saved in the Norton Account. You can print the
product key to reinstall your product in the future.
To activate your product from the alert
1
In the alert, do one of the following:
1 If you purchased a subscription version of a
retail product or the product came installed on
your computer, select Activate Now
(Recommended).
1 If you want to renew the subscription of your
product, select Renew Now.
You can also activate or renew the subscription of
your product from any non-admin user account.
2
Click OK.
3
Follow the on-screen instructions to activate or
renew your product.
4
In the window that appears, click Done.
To activate your product from the main window
1
In the Norton Internet Security main window, do
one of the following:
1 If you purchased a subscription version of a
retail product, click Activate Now.
1 If the productcame installed on your computer,
click Activate Online Now.
1 If you want to renew the subscription of your
product, click Renew.
You can also activate or renew the subscription of
your product from any non-admin user account.
2
Follow the on-screen instructions to activate or
subscribe your product.
3
In the window that appears, click Done.
15Getting started
Where to find your product key
The productkey is aunique key that helps youto install
and activate the Symantec product on your computer.
Getting started
16
Activation protects you
The productkey isa 25-characteralphanumeric string
that is shown in five groups of five characters each,
separated by hyphens. The location ofthe product key
varies depending on how you acquired the product.
The locations of the product key are as follows:
If you purchased a retail copy
of the product on CD
If you purchased the product
on DVD
If you downloaded the
product from the Symantec
Store
If your computer came with
the product already installed
If you received a product key
card
The product key is either on
a sticker on the CD sleeve or
on an insert in the product
package.
The product key is on the
DVD package.
The product key is stored on
your computer as part of the
download process and is
included in the confirmation
email from the Symantec
Store.
The product key is provided
as part of the activation
process. Be sure to save your
product key by creating or
signing in to your Norton
Account, or by printing the
key. You may need the
product key if you ever want
to reinstall your product.
The product key is printed on
the card along with
instructions on how to use it.
Be sure to save your product
key by creating or signing in
to your Norton Account. You
need the product key if you
ever want to reinstall the
product.
About Norton Internet Security main window
17Getting started
If you are still unable to
locate your product key, you
can recover it using Norton
Account
About problems during activation
If you cannot connect to the Symantec servers to
activate your product, first check your Internet
connection. You then need to see if you have parental
control software, either installed or through your ISP,
that might block the connection.
A connectivity problem can occur if you use parental
control software. If you suspect that parental controls
might block the connection, you can configure the
parental controls so that they do not block the
activation procedure. You need to log in to your
parental control software or to the Internet through
your ISP as an administrator to change your
configuration.
If you use a proxy server to connect to the Internet,
you must configure the proxy settings. To use the
ProxyServer option, go to the NortonInternet Security
main window, and then click Settings > Network >NetworkSecurity Settings > Proxy Server > Configure.
To recover or access your
product key log on to
https://www.mynortonaccount.com.
If you are not registered,
register for Norton Account.
You can find the product key
on the Products tab in the
Norton Account page.
About Norton Internet Security main
window
The Norton Internet Security main window acts as a
security management interface. You can access the
main features and monitor the performance of your
computer from the main window.
Getting started
18
About Norton Internet Security main window
You can find the following items in the main window:
System Status
Settings
Performance
Lets you view the overall
protection status of your
computer.
When your system status is
Secure, your computer is fully
protected. When your system
status is at Attention state,
ensure that you fix all the issues.
When your system status is at AtRisk state, you must take
immediate actions to fix the
issues.
Lets you access the Settings
window.
You can view and configure
various options to customize the
Norton Internet Security
settings.
Lets you access the Performance
window.
The Performance window
displays a chronicle
representation of all the installs,
downloads, optimizations,
detections, alerts, and instances
of Quick Scan. The window also
displays a detailed graphical
representation of CPU and
memory usage by your Norton
product.
About Norton Internet Security main window
19Getting started
Feedback
Account
Support
Lets you provide feedback on the
product on a Symantec Web
page.
This feature may not be
w
available in some versions of
Norton Internet Security.
Lets you create or access your
Norton Account.
Norton Account lets you manage
all of your Norton products in
one place.
This feature may not be
w
available in some versions of
Norton Internet Security.
Lets you access the NortonAutofix window that provides
you various support options.
You can also access the online
Help from the Support
drop-down menu. Help provides
links to information that assists
you with the specific tasks that
you want to complete. The online
Help guides you to configure all
of the product features.
You can also access the
product’s version number.
Getting started
20
About Norton Internet Security main window
You can use the following options to perform the
important tasks in Norton Internet Security:
Scan Now
LiveUpdate
Lets you access different types
of scans to protect your
computer and your sensitive
data.
By using the Scan Now option,
you can run the following types
of scans:
1 Computer Scan
Lets you run different
computer scans including
Quick Scan, Full System
Scan, and Custom Scan.
1 Reputation Scan
Lets you run different
reputation scans including
Quick Scan, Full System
Scan, and Custom Scan.
1 Scan Facebook Wall
Lets you scan News Feeds on
your Facebook Wall
periodically to protect you
from malicious links.
Lets you run LiveUpdate to
download the latest virus
definitions and program
updates.
Norton Internet Security uses
the latest virus definitions from
Symantec servers to detect and
remove latest security threats.
About Norton Internet Security main window
21Getting started
Advanced
Lets you access the Norton
Internet Security advanced
window.
By using the Norton Internet
Security advanced window, you
can do the following:
1 Run different scans.
1 View Security History.
1 View the quarantined items
in the Security History
window.
1 View Norton Insight -
Application Ratings.
1 View the list of programs
that are vulnerable on your
computer and find how
Norton protects you from the
program vulnerabilities.
1 View and configure Network
Security Map.
1 Manage logins and cards.
1 Configure parental controls.
In addition, you can choose to
turn on or turn off the protection
features from this window.
The bottom section of the Norton Internet Security
main windowprovides youup-to-date virus and threat
information. When your system status is At Risk or
Attention, thissection automaticallyprovides youthe
Fix Now option to fix all the issues at once.
Getting started
22
About Norton Internet Security main window
The bottom section of the Norton Internet Security
main window helps you do the following:
Activity Map
Lets you access the world
map with hotspots of
cybercrimes and the latest
threats.
The Activity Map shows the
top cities in the world where
most of the cybercrime
activities occur. These cities
are represented as yellow
dots on the map. You can
click a continent in the world
map to view its cities with the
highest number of threats.
The details on the Activity
Map are updated from a
Symantec server on a regular
basis. Your computer must be
connected to the Internet to
receive the activity map
updates.
You can view the date and
time that the Activity Map
was last updated. You can
also use the Details link to
get a brief idea of the Activity
Map.
When you click Details, the
Activity Map shows a series
of latest viruses and threats
that your product protects
your computer from. You can
use the info link next to each
item to view its details in an
overlay window. You can also
use the View Details link in
the overlay window to know
more about the threat in a
Symantec Web page.
About Norton Internet Security main window
Online Family
23Getting started
Getting started
24
About Norton Internet Security main window
Lets you monitor your child’s
activities on the Internet.
Norton Online Family
w
may not be available in some
versions of Norton Internet
Security.
When you click the OnlineFamily icon on the main
window, the bottom section
of the Norton Internet
Security main window
displays Norton Online Family
sign in options. Norton Online
Family provides you
advanced controls to monitor
your child's online activities.
You can use the link on the
bottom section of the Norton
Internet Security main
window to set up your
account with Norton Online
Family.
Symantec recommends that
you use your Norton Account
login credentials to sign in to
Norton Online Family. If you
register your product with
your Norton Account, your
Norton Account email
address is auto-filled in the
email address text box.
After you set up your
account, you can sign in to
your account on the bottom
section of the Norton Internet
Security main window and
view your child’s Internet
activities. The bottom section
of the Norton Internet
Security main window shows
About Norton Internet Security main window
details such as your child’s
latest search terms, and the
latest alerts. After you sign
in, you can use the GetDetails option in the bottom
section of the Norton Internet
Security main window to view
more details on the Norton
Online Family Web site.
25Getting started
Manage
Lets you access Norton
Management.
Norton Management lets you
manage your Norton products
on all of your devices from
one location. Click the
Manage icon at the bottom
of the main window to sign
up for or log into Norton
Management. The Norton
Management agent should be
installed on each device that
you want to add to Norton
Management. You can use
your existing Norton Account
login information to access
Norton Management.
Norton Management
w
may not be available in some
versions of Norton Internet
Security.
Getting started
26
About Norton Internet Security main window
Mobile
Backup
Lets you download the
Norton Mobile Security for
Android.
You can use Norton Mobile
Security on all your devices
that use Android operating
system.
Norton Mobile Security
w
may not be available in some
versions of Norton Internet
Security.
Lets you set up the Norton
Online Backup account or
access your online backup
status.
Norton Online Backup
w
may not be available in some
versions of Norton Internet
Security.
When you click the Backup
icon on the main window, the
bottom section displays
Norton Online Backup
options. Norton Online
Backup provides a secure
online backup solution that
safeguards your important
data against system crash,
accidental deleting, virus
infection, and other disasters.
You can access or restore the
backed up data from any
computer that is connected
to the Internet.
About Norton Internet Security main window
Safe Web
27Getting started
Getting started
28
About Norton Internet Security main window
Lets you check the safety of
a Web site.
You can also perform a safe
search.
This option may not be
w
available with some versions
of Norton Internet Security.
When you click the Safe Web
icon on the main window, the
bottom section of the Norton
Internet Security main
window displays Norton Safe
Web options.
You can use the Check Site
option in the bottom section
of the Norton Internet
Security main window to
analyze the security levels of
any Web site that you want
to visit. When you type a Web
site address in the text box
and click Check Site, it shows
the Symantec’s ratings for
the Web site.
You can use the Safe Search
option in the bottom section
of the Norton Internet
Security main window to
search for information on the
Internet. The Norton Safe
Search uses Ask.com to
generate the search results.
Norton Safe Search provides
a site safety status and a
Norton rating for each of the
search results generated.
You can also use the View
recent Norton Safe Web
activity option in the bottom
About Norton Internet Security main window
section of the Norton Internet
Security main window to view
the recent Norton Safe Web
statistics on malicious sites
and URLs. You can also view
the list of new malicious
URLs.
Your activation status or subscription status appears
at the bottom of the main window. You can use the
Activate Now option to activate or subscribe your
Norton product.
About the Norton Internet Security advanced window
The Norton Internet Security advanced window acts
as a security management interface. The options in
this windowhelp you address all theimportant security
and performanceissues of yourcomputer. The options
are classified in different panes. Each pane contains
the important features that you can easily access or
configure from this window.
29Getting started
Getting started
30
About Norton Internet Security main window
The panes are:
Computer Protection
Network Protection
Web Protection
Provides you the essential
computer protection options.
It also contains links to scan
your computer, view the
history of protection events,
and manage quarantined
items. You can also view the
Norton Insight - Application
Ratings window and improve
the performance of Norton
Internet Security scans.
In addition, you can run
LiveUpdate. It also displays
the updates availability as to
when the last virus
definitions were updated.
Provides you the essential
network protection options.
It also contains links to the
list of vulnerable programs
and Network Security Map.
Provides you the essential
Web protection options.
It also contains links to
managing logins and credit
cards. In addition, you can
monitor and manage the
computer usage and Internet
activities of your child.
The parental control
w
feature is not available in
some of the versions of
Norton Internet Security.
Loading...
+ 474 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.