Symantec, theSymantec Logo,Norton, SONAR,LiveUpdate, Norton
AntiSpam, NortonAntiVirus, NortonInternet Security, Norton 360,
and NortonSystemWorks aretrademarks orregistered trademarks
of Symantec Corporation or its affiliates in the U.S. and other
countries. Windows is a trademark of Microsoft Corporation.
Portions of this product Copyright [1996-2008] Glyph & Cog, LLC.
Other names may be trademarks of their respective owners.
The productdescribed inthis document isdistributed under licenses
restricting itsuse, copying, distribution,and decompilation/reverse
engineering. No part of this document may be reproduced in any
form byany meanswithout priorwritten authorizationof Symantec
Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED"AS IS" AND ALLEXPRESS
OR IMPLIED CONDITIONS, REPRESENTATIONS AND
WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULARPURPOSE OR
NON-INFRINGEMENT, AREDISCLAIMED, EXCEPT TOTHE EXTENT
THAT SUCH DISCLAIMERS ARE HELD TO BELEGALLY INVALID.
SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR
INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION
WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS
DOCUMENTATION. THE INFORMATION CONTAINED IN THIS
DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
Symantec Corporation
350 Ellis Street,
Mountain View, CA 94043
http://www.symantec.com
Printed in the United States of America.
10 9 8 7 6 5 4 3 2 1
Norton License Agreement
Norton™ Internet Security
IMPORTANT: PLEASE READ THE TERMS
AND CONDITIONS OF THIS LICENSE
AGREEMENT (“LICENSE AGREEMENT”)
CAREFULLY BEFORE USING THE
SOFTWARE (AS DEFINED BELOW).
SYMANTEC CORPORATION, IF YOU ARE
LOCATED IN THE AMERICAS; OR
SYMANTEC ASIA PACIFICPTE LTD, IF YOU
ARE LOCATED IN THE ASIA PACIFIC RIM
OR JAPAN;OR SYMANTEC LIMITED,IF YOU
ARE LOCATED IN EUROPE, THE MIDDLE
EAST OR AFRICA (“SYMANTEC”) IS
WILLING TO LICENSE THE SOFTWARE TO
YOU AS THEINDIVIDUAL, THE COMPANY,
OR THE LEGAL ENTITY THAT WILL BE
UTILIZING THE SOFTWARE(REFERENCED
BELOW AS “YOU” OR “YOUR”) ONLY ON
THE CONDITION THAT YOU ACCEPT ALL
OF THE TERMS OF THIS LICENSE
AGREEMENT. THIS IS A LEGAL AND
ENFORCEABLE CONTRACTBETWEEN YOU
AND SYMANTEC. BY OPENING THIS
PACKAGE, BREAKINGTHE SEAL, CLICKING
THE “I AGREE” OR “YES” BUTTON OR
OTHERWISE INDICATING ASSENT
ELECTRONICALLY, OR LOADING THE
SOFTWARE, YOU AGREE TO THE TERMS
AND CONDITIONS OF THIS LICENSE
AGREEMENT. IF YOU DO NOT AGREE TO
THESE TERMS AND CONDITIONS, CLICK
THE “CANCEL” OR “NO” OR “CLOSE
WINDOW” BUTTON OR OTHERWISE
INDICATE REFUSAL, MAKE NO FURTHER
USE OF THE SOFTWARE, AND CONTACT
YOUR VENDOROR SYMANTECCUSTOMER
SERVICE, USING THE CONTACT DETAILS
IN SECTION 10 OF THIS LICENSE
AGREEMENT, FORINFORMATION ON HOW
TO OBTAINA REFUND OFTHE MONEY YOU
PAID FORTHE SOFTWARE (LESSSHIPPING,
HANDLING, AND ANY APPLICABLE TAXES
EXCEPT IN CERTAIN STATES AND
COUNTRIES WHERESHIPPING, HANDLING,
AND TAXES ARE REFUNDABLE) AT ANY
TIME DURINGTHE SIXTY (60)DAY PERIOD
FOLLOWING THE DATE OF PURCHASE.
1. License:
The software (including any accompanying
features and services) and documentation
(including any product packaging) (the
“Documentation”), that accompanies this
License Agreement (collectively the
“Software”) is the property of Symantec or
its licensors, and is protected by copyright
law. Although Symantec continues to own
the Software, after Your acceptance of this
License Agreement You will have certain
rights touse the Software duringthe Service
Period. The “Service Period” shall begin on
the date of Your initial installation of the
Software on a computer, mobile or mobile
computing device (a “Device”), regardless of
the number ofcopies that You are permitted
to use in accordance with Section 1.A of this
License Agreement, and shall last for the
period oftime setforth in theDocumentation
or theapplicable transactiondocumentation
from the authorized distributor or reseller
from which You obtained the Software. The
Software may automatically deactivate and
become non-operational at the end of the
Service Period, and You will not be entitled
to receive any feature or content updates to
the Software unless the Service Period is
renewed. Subscriptions for renewals of the
Service Periodwill be availablein accordance
with Symantec’s support policy posted at
This License Agreement governs any
releases, revisions,updates orenhancements
to the Software that Symantec may make
available to You. Except as may be modified
by the Documentation, and subject to
Symantec’s right to terminate for Your
breach pursuant to Section 9, Your rights
and obligations under this License
Agreement with respect to the use of this
Software are as follows.
During the Service Period, You
may:
A.use one copy of the Software on a single
Device. If a greater number of copies and/or
number of Devices is specified within the
Documentation orthe applicabletransaction
documentation from the authorized
distributor or reseller from which You
obtained the Software, You may use the
Software in accordance with such
specifications;
B. makeone copy of the Softwarefor back-up
or archival purposes, or copy the Software
onto the hard diskof Your Device and retain
the originalfor back-up orarchival purposes;
C. use the Software on a network, provided
that Youhave a licensedcopy of the Software
for each Devicethat can accessthe Software
over that network;
D. permanently transferall of Yourrights in
the Software granted under this License
Agreement to another person or entity,
provided that You retain no copies of the
Software and the transferee agrees to the
terms of this License Agreement. Partial
transfer of Your rights under this License
Agreement shall not be permitted. For
example, if the applicable documentation
grants You the right to use multiple copies
of the Software, only atransfer of the rights
to use all such copies of the Software would
be valid; and
E. use the Software in accordance with any
additional permitted uses which may be set
forth below.
You may not, nor may you permit
any other person to:
A. sublicense,rent or leaseany portion of the
Software;
B. reverseengineer, decompile, disassemble,
modify, translate, make any attempt to
discover the source code of the Software or
create derivative works from the Software;
C. use the Software as part of a facility
management, timesharing, service provider
or service bureau arrangement; or
D. usethe Software inany manner that isnot
permitted pursuant to this License
Agreement.
2. Software Feature and Content
Updates:
A. You shall have the right to receive new
features to the Software as Symantec, in its
sole discretion,makes suchfeatures available
with the Software during Your Service
Period. Symantec continually strives to
improve theusability and performanceof its
products and services. In order to optimize
the SoftwareSymantec may, at its discretion
and without notice, add, modify or remove
features from the Software at any time.
B. Certain Software uses content that is
updated fromtime totime, includingbut not
limited to the following Software: antivirus
and crimeware software use updated virus
definitions; antispyware software uses
updated spyware definitions; antispam
software uses updated antispam rules;
content filtering and antiphishing software
use updatedURL lists;some firewall software
use updated firewall rules; vulnerability
assessment products use updated
vulnerability data and web site
authentication software uses updated lists
of authenticated web pages; these updates
are collectively referred to as “Content
Updates” (or alternatively referred to as
“Protection Updates” or “Security Updates”
at times). You shall have theright to receive
Content Updates for the Software during
Your Service Period.
3. Product Installation; Required
Activation:
A. During the installation process, the
Software may uninstall or disable other
security products,or features thereof,if such
products or features are incompatible with
the Software or for purposes of improving
the overall functionality of the Software.
B. There may be technological measures in
this Software that are designed to prevent
unlicensed orillegal use ofthe Software. You
agree thatSymantec mayuse thesemeasures
to protectSymantec against software piracy.
This Software may contain enforcement
technology that limits the ability to install
and uninstallthe Software ona Device tonot
more than a finite number of times for a
finite number of Devices. This License
Agreement and the Software containing
enforcement technology may require
activation as further set forth in the
Documentation. If so, the Softwarewill only
operate for a finite period of time prior to
Software activation by You. During
activation, You may be required to provide
Your unique activation code accompanying
the Softwareand Device configuration in the
form of an alphanumeric code over the
Internet to verify the authenticity of the
Software. If You do not complete the
activation within the finite periodof time set
forth in the Documentation, or as prompted
by the Software, the Software will cease to
function until activation is complete; at
which time the Software functionality will
be restored. In the event that You are not
able to activate the Software over the
Internet, or through any other method
specified during the activation process, You
may contact Symantec Customer Support
using theinformation providedby Symantec
during activation, or as set forth below.
5. Sixty (60) Day Money Back
Guarantee:
If You are the original licensee of this copy
of the Software and are not completely
satisfied with it for any reason, please make
no further use of the Software and contact
Symantec Customer Service, using the
contact details set out in Section 10 of this
License Agreement, for a refund of the
money You paid for the Software (less
shipping, handling,and any applicabletaxes
except in certain statesand countries where
shipping, handlingand taxes are refundable)
at any time during the sixty (60) day period
following the date of purchase.
6. Limited Warranty:
Symantec warrants that any media
manufactured by Symantec on which the
Software is distributed will be free from
defects for a period of sixty (60) days from
the date of delivery of the Software to You.
Your sole remedy in the event of a breach of
this warranty will be that Symantec will, at
its option, replace any defective media
returned to Symantec within the warranty
period or refund the money You paid for the
Software. Symantec does not warrant that
the Softwarewill meet Yourrequirements or
that operation of the Software will be
uninterrupted or that the Software will be
error-free.
TO THE MAXIMUM EXTENT PERMITTED
BY APPLICABLE LAW, THE ABOVE
WARRANTY ISEXCLUSIVE AND INLIEU OF
ALL OTHER WARRANTIES, WHETHER
EXPRESS OR IMPLIED, INCLUDING THE
IMPLIED WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE, AND
NON-INFRINGEMENT OF INTELLECTUAL
PROPERTY RIGHTS. THIS WARRANTY
GIVES YOU SPECIFIC LEGAL RIGHTS. YOU
MAY HAVE OTHER RIGHTS, WHICH VARY
FROM STATETO STATE AND COUNTRYTO
COUNTRY.
7. Disclaimer of Damages:
SOME STATES AND COUNTRIES DO NOT
ALLOW THE LIMITATION OR EXCLUSION
OF LIABILITY FOR INCIDENTAL OR
CONSEQUENTIAL DAMAGES, SO THE
BELOW LIMITATION OR EXCLUSION MAY
NOT APPLY TO YOU.
TO THE MAXIMUM EXTENT PERMITTED
BY APPLICABLE LAW AND REGARDLESS
OF WHETHER ANY REMEDY SET FORTH
HEREIN FAILSOF ITS ESSENTIALPURPOSE,
IN NO EVENT WILL SYMANTEC OR ITS
LICENSORS BE LIABLE TO YOU FOR ANY
SPECIAL, CONSEQUENTIAL, INDIRECT,OR
SIMILAR DAMAGES,INCLUDING ANY LOST
PROFITS OR LOST DATA ARISING OUT OF
THE USE OR INABILITY TO USE THE
SOFTWARE EVENIF SYMANTECHAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
IN NO CASE SHALL SYMANTEC’S OR ITS
LICENSORS’ LIABILITY EXCEED THE
PURCHASE PRICE WHICH YOU PAID FOR
THE APPLICABLE SERVICE PERIOD. The
disclaimers and limitations set forth above
will apply regardless of whether You accept
the Software.
8. U.S. Government Restricted
Rights:
For U.S. Government procurements, the
Software is deemed to be commercial
computer software asdefined in FAR12.212
and subject to restricted rightsas defined in
FAR Section 52.227-19 "Commercial
Computer Software - Restricted Rights" and
DFARS 227.7202, “Rights in Commercial
Computer Softwareor Commercial Computer
Software Documentation”,as applicable,and
any successor regulations. Any use,
modification, reproduction release,
performance, display or disclosure of the
Software by the U.S. Government shall be
solely in accordance with the terms of this
License Agreement.
9. Export Regulation:
You acknowledge that the Software and
related technical data and services
(collectively "Controlled Technology") may
be subject to the import and export laws of
the UnitedStates, specifically theU.S. Export
Administration Regulations (EAR), and the
laws of any country where Controlled
Technology is imported or re-exported. You
agree to comply with all relevant laws and
will not export any Controlled Technology
in contravention to U.S. law nor to any
prohibited country, entity, or person for
which an export license or other
governmental approval is required. All
Symantec product is prohibited for export
or re-exportto Cuba, NorthKorea, Iran, Syria
and Sudan and to any country subject to
relevant trade sanctions. USE OR
FACILITATION OF SYMANTEC PRODUCT
IN CONNECTION WITH ANY ACTIVITY
INCLUDING, BUT NOT LIMITED TO, THE
DESIGN, DEVELOPMENT, FABRICATION,
TRAINING, OR TESTING OF CHEMICAL,
BIOLOGICAL, OR NUCLEAR MATERIALS,
OR MISSILES,DRONES, OR SPACE LAUNCH
VEHICLES CAPABLE OF DELIVERING
WEAPONS OF MASS DESTRUCTION IS
PROHIBITED, IN ACCORDANCE WITH U.S.
LAW.
10. General:
This License Agreement will begoverned by
the laws of the State of California, United
States of America. This License Agreement
is the entire agreement between You and
Symantec relating to the Software and: (i)
supersedes allprior orcontemporaneous oral
or written communications, proposals, and
representations with respect to its subject
matter; and (ii) prevails overany conflicting
or additional terms of any quote, order,
acknowledgment, orsimilar communications
between the parties. Notwithstanding the
foregoing, nothingin thisLicense Agreement
will diminishany rightsYou may haveunder
existing consumer protection legislation or
other applicable laws in Your jurisdiction
that may not be waived by contract. This
License Agreement shall terminate upon
Your breach of any term contained in this
License Agreement and You shall cease use
of and destroy all copies of theSoftware and
Documentation. The disclaimers of
warranties and damages and limitations on
liability shall survive termination. This
License Agreement may onlybe modified by
the Documentationor bya writtendocument
that has been signed by both You and
Symantec. Should You have any questions
concerning thisLicense Agreement,or if You
desire to contact Symantec for any reason,
please write to Symantec Customer Service,
555 International Way, Springfield, OR
97477, U.S.A. or visit the Support page at t
www.symantec.com.
ADDITIONAL TERMS AND
CONDITIONS
Your use of the Software is subject to the
terms and conditions below in addition to
those stated above.
11. Privacy; Data Protection:
From time to time, the Software may collect
certain information from the Device on
which it is installed, which may include:
Information on potential security risks as
well as URLs of websites visited that the
Software deems potentially fraudulent. The
URLs could contain personally identifiable
information that a potentially fraudulent
website isattempting to obtain without Your
permission. This information is collected by
Symantec for the purpose of delivering the
functionalities of the software, and also for
evaluating and improving the ability of
Symantec’s products to detect malicious
behavior, potentiallyfraudulent websitesand
other Internet security risks. URLs of
websites visited as well as search keywords
and search results only if the Norton Safe
Web feature is enabled. This information is
collected by Symantec for the purpose of
providing protection and of evaluating and
advising Youregarding potentialthreats and
risks thatmay be associatedwith a particular
Web site before You view it.
Executable files and files that contain
executable content that are identified as
potential malware,including informationon
the actions taken by such files at the time of
installation. These files are submitted to
Symantec using the Software’s automatic
submission function.The collectedfiles could
contain personally identifiable information
that has been obtained by the malware
without Your permission. Files of this type
are being collectedby Symantec onlyfor the
purpose of improving the ability of
Symantec’s products to detect malicious
behavior. Such automatic submission
function maybe deactivatedafter installation
by following the instructions in the
Documentation for applicable products.
The name given to the Device during the
initial setup of such Device. If collected, the
name willbe usedby Symantec as an account
name for the Device under which You may
elect to receive additional services and/or
under which You may use certain features
of the Software. You may change such
account name at any time after installation
of the Software (recommended).
Status information regarding installation
and operation of the Software. This
information indicates to Symantec whether
installation ofthe Software wassuccessfully
completed as well as whether the Software
has encountered an error. The status
information could contain personally
identifiable information only if such
information is included in the name of the
file or folderencountered by theSoftware at
the time of installation or error. The status
information iscollected by Symantec for the
purpose of evaluating and improving
Symantec’s product performance and
installation successrate. Symantec mayalso
use this information to optimize its
web-pages.
Information contained in email messages
that you send through the Software to
Symantec toreport as spamor as incorrectly
identified as spam. These email messages
may contain personally identifiable
information and will be sent to Symantec
only with your permission, and will not be
sent automatically. If you send such
messages to Symantec, Symantec will use
them only for the purpose of improving the
detection ability of Symantec’s antispam
technology. Symantecwill notcorrelate these
files with any other personally identifiable
information.
Information contained in a report that You
may choose to send throughthe Software to
Symantec when the Software encounters a
problem. The report includes information
regarding thestatus ofboth the Softwareand
Your Device at the time that the Software
encountered the problem. The status
information about Your Device may include
the systemlanguage, countrylocale, and the
operating systemversion for YourDevice, as
well as the processes running, their status
and performanceinformation, anddata from
files or folders that wereopen at the timethe
Software encountered the problem. The
information could contain personally
identifiable information ifsuch information
is included in, or is a part of the name of the
files or folders open atthe time the Software
encountered the problem. This information
will be sent to Symantec only with Your
permission, and will not be sent
automatically. The information is collected
by Symantec for the purpose of correcting
the encountered problem and improving
Symantec’s product performance. This
information will not be correlated with any
personally identifiable information.
The Internet Protocol (IP) address and/or
Media AccessControl (MAC) addressand the
Machine ID of the computer on which the
Software is installed to enable the Software
to function and for license administration
purposes.
Other general, statistical information used
for product analysis, and for improving
product functionality.
Unless itis expressly definedas optional, the
collected information as set out above is
necessary forthe purposeof the functionality
of Symantec’s products.
Information may be transferred to the
Symantec groupin theUnited Statesor other
countries that mayhave less protectivedata
protection lawsthan the region in whichYou
are situated (including the European Union)
and may be accessible by Symantec
employees or contractors exclusively to be
used in accordance with the purposes
described above. For the same purposes the
information may be shared with partners
and vendors that process information on
behalf of Symantec. Symantec has taken
steps so that the collected information, if
transferred, receives an adequate level of
protection.
Subject toapplicable laws,Symantec reserves
the right tocooperate with any legal process
and any law enforcement or other
government inquiry related to your use of
this Software. This means that Symantec
may provide documents and information
relevant to a court subpoena or to a law
enforcement or other government
investigation. Inorder topromote awareness,
detection andprevention ofInternet security
risks, Symantec may share certain
information withresearch organizationsand
other security software vendors. Symantec
may also use statistics derived from the
information to track and publish reports on
security risk trends. By using the Software,
You acknowledge and agree that Symantec
may collect, transmit, store, disclose and
analyze suchinformation forthese purposes.
Product activation is a technology that protects users
from pirated or counterfeit software. It protects you
by limitingthe use ofa product to those userswho have
acquired the product legitimately. Product activation
requires a product key for each installation of a
product. Youmust activate the product withina limited
time period after you install it.
Getting started
14
Activation protects you
If youare connected tothe Internet, product activation
takes place automatically when you start the product
for the first time after installation. After activation,
the Norton Account window appears. You can create
your Norton Account and register your product.
If you are not connected to the Internet, you can click
Try Later in the Activation not complete window to
start your product. The Activation window reappears
every time you start your product until you activate
your product. If you choosenot to activate at that time,
you receive an alert that reminds you to activate the
product. You can also activate your product from the
Norton Internet Security main window.
If you do not activate the product within the time
w
period that the alert specifies, the product stops
working. You can activate it after the time period has
elapsed, but you are not protected until you activate
the product.
Activating your product
If youdid not activateyour product during installation,
you receive an activation-needed alert regularly until
you activate the product.
Product activationreduces software piracy and ensures
that you use authentic Symantec software. Activation
provides you witha specified period ofsubscription to
your Norton product. You can also renew your
subscription to continue using Norton Internet
Security.
You mustactivate your productwithin the time period
w
that the alert specifies, oryour product stopsworking.
You can activate your product directly from the
activation-needed alert or from the main window.
Activation should take only a few minutes.
During activation, the Norton Account window
appears. You can create your Norton Account and
register your product. You can also view details, such
as yourproduct key, your registration date,and recent
Activation protects you
updates tothe product. Ifyou skip the NortonAccount
window, the product is activated, but the product key
is not saved in the Norton Account. You can print the
product key to reinstall your product in the future.
To activate your product from the alert
1
In the alert, do one of the following:
1 If you purchased a subscription version of a
retail product or the product came installed on
your computer, select Activate Now
(Recommended).
1 If you want to renew the subscription of your
product, select Renew Now.
You can also activate or renew the subscription of
your product from any non-admin user account.
2
Click OK.
3
Follow the on-screen instructions to activate or
renew your product.
4
In the window that appears, click Done.
To activate your product from the main window
1
In the Norton Internet Security main window, do
one of the following:
1 If you purchased a subscription version of a
retail product, click Activate Now.
1 If the productcame installed on your computer,
click Activate Online Now.
1 If you want to renew the subscription of your
product, click Renew.
You can also activate or renew the subscription of
your product from any non-admin user account.
2
Follow the on-screen instructions to activate or
subscribe your product.
3
In the window that appears, click Done.
15Getting started
Where to find your product key
The productkey is aunique key that helps youto install
and activate the Symantec product on your computer.
Getting started
16
Activation protects you
The productkey isa 25-characteralphanumeric string
that is shown in five groups of five characters each,
separated by hyphens. The location ofthe product key
varies depending on how you acquired the product.
The locations of the product key are as follows:
If you purchased a retail copy
of the product on CD
If you purchased the product
on DVD
If you downloaded the
product from the Symantec
Store
If your computer came with
the product already installed
If you received a product key
card
The product key is either on
a sticker on the CD sleeve or
on an insert in the product
package.
The product key is on the
DVD package.
The product key is stored on
your computer as part of the
download process and is
included in the confirmation
email from the Symantec
Store.
The product key is provided
as part of the activation
process. Be sure to save your
product key by creating or
signing in to your Norton
Account, or by printing the
key. You may need the
product key if you ever want
to reinstall your product.
The product key is printed on
the card along with
instructions on how to use it.
Be sure to save your product
key by creating or signing in
to your Norton Account. You
need the product key if you
ever want to reinstall the
product.
About Norton Internet Security main window
17Getting started
If you are still unable to
locate your product key, you
can recover it using Norton
Account
About problems during activation
If you cannot connect to the Symantec servers to
activate your product, first check your Internet
connection. You then need to see if you have parental
control software, either installed or through your ISP,
that might block the connection.
A connectivity problem can occur if you use parental
control software. If you suspect that parental controls
might block the connection, you can configure the
parental controls so that they do not block the
activation procedure. You need to log in to your
parental control software or to the Internet through
your ISP as an administrator to change your
configuration.
If you use a proxy server to connect to the Internet,
you must configure the proxy settings. To use the
ProxyServer option, go to the NortonInternet Security
main window, and then click Settings > Network >NetworkSecurity Settings > Proxy Server > Configure.
To recover or access your
product key log on to
https://www.mynortonaccount.com.
If you are not registered,
register for Norton Account.
You can find the product key
on the Products tab in the
Norton Account page.
About Norton Internet Security main
window
The Norton Internet Security main window acts as a
security management interface. You can access the
main features and monitor the performance of your
computer from the main window.
Getting started
18
About Norton Internet Security main window
You can find the following items in the main window:
System Status
Settings
Performance
Lets you view the overall
protection status of your
computer.
When your system status is
Secure, your computer is fully
protected. When your system
status is at Attention state,
ensure that you fix all the issues.
When your system status is at AtRisk state, you must take
immediate actions to fix the
issues.
Lets you access the Settings
window.
You can view and configure
various options to customize the
Norton Internet Security
settings.
Lets you access the Performance
window.
The Performance window
displays a chronicle
representation of all the installs,
downloads, optimizations,
detections, alerts, and instances
of Quick Scan. The window also
displays a detailed graphical
representation of CPU and
memory usage by your Norton
product.
About Norton Internet Security main window
19Getting started
Feedback
Account
Support
Lets you provide feedback on the
product on a Symantec Web
page.
This feature may not be
w
available in some versions of
Norton Internet Security.
Lets you create or access your
Norton Account.
Norton Account lets you manage
all of your Norton products in
one place.
This feature may not be
w
available in some versions of
Norton Internet Security.
Lets you access the NortonAutofix window that provides
you various support options.
You can also access the online
Help from the Support
drop-down menu. Help provides
links to information that assists
you with the specific tasks that
you want to complete. The online
Help guides you to configure all
of the product features.
You can also access the
product’s version number.
Getting started
20
About Norton Internet Security main window
You can use the following options to perform the
important tasks in Norton Internet Security:
Scan Now
LiveUpdate
Lets you access different types
of scans to protect your
computer and your sensitive
data.
By using the Scan Now option,
you can run the following types
of scans:
1 Computer Scan
Lets you run different
computer scans including
Quick Scan, Full System
Scan, and Custom Scan.
1 Reputation Scan
Lets you run different
reputation scans including
Quick Scan, Full System
Scan, and Custom Scan.
1 Scan Facebook Wall
Lets you scan News Feeds on
your Facebook Wall
periodically to protect you
from malicious links.
Lets you run LiveUpdate to
download the latest virus
definitions and program
updates.
Norton Internet Security uses
the latest virus definitions from
Symantec servers to detect and
remove latest security threats.
About Norton Internet Security main window
21Getting started
Advanced
Lets you access the Norton
Internet Security advanced
window.
By using the Norton Internet
Security advanced window, you
can do the following:
1 Run different scans.
1 View Security History.
1 View the quarantined items
in the Security History
window.
1 View Norton Insight -
Application Ratings.
1 View the list of programs
that are vulnerable on your
computer and find how
Norton protects you from the
program vulnerabilities.
1 View and configure Network
Security Map.
1 Manage logins and cards.
1 Configure parental controls.
In addition, you can choose to
turn on or turn off the protection
features from this window.
The bottom section of the Norton Internet Security
main windowprovides youup-to-date virus and threat
information. When your system status is At Risk or
Attention, thissection automaticallyprovides youthe
Fix Now option to fix all the issues at once.
Getting started
22
About Norton Internet Security main window
The bottom section of the Norton Internet Security
main window helps you do the following:
Activity Map
Lets you access the world
map with hotspots of
cybercrimes and the latest
threats.
The Activity Map shows the
top cities in the world where
most of the cybercrime
activities occur. These cities
are represented as yellow
dots on the map. You can
click a continent in the world
map to view its cities with the
highest number of threats.
The details on the Activity
Map are updated from a
Symantec server on a regular
basis. Your computer must be
connected to the Internet to
receive the activity map
updates.
You can view the date and
time that the Activity Map
was last updated. You can
also use the Details link to
get a brief idea of the Activity
Map.
When you click Details, the
Activity Map shows a series
of latest viruses and threats
that your product protects
your computer from. You can
use the info link next to each
item to view its details in an
overlay window. You can also
use the View Details link in
the overlay window to know
more about the threat in a
Symantec Web page.
About Norton Internet Security main window
Online Family
23Getting started
Getting started
24
About Norton Internet Security main window
Lets you monitor your child’s
activities on the Internet.
Norton Online Family
w
may not be available in some
versions of Norton Internet
Security.
When you click the OnlineFamily icon on the main
window, the bottom section
of the Norton Internet
Security main window
displays Norton Online Family
sign in options. Norton Online
Family provides you
advanced controls to monitor
your child's online activities.
You can use the link on the
bottom section of the Norton
Internet Security main
window to set up your
account with Norton Online
Family.
Symantec recommends that
you use your Norton Account
login credentials to sign in to
Norton Online Family. If you
register your product with
your Norton Account, your
Norton Account email
address is auto-filled in the
email address text box.
After you set up your
account, you can sign in to
your account on the bottom
section of the Norton Internet
Security main window and
view your child’s Internet
activities. The bottom section
of the Norton Internet
Security main window shows
About Norton Internet Security main window
details such as your child’s
latest search terms, and the
latest alerts. After you sign
in, you can use the GetDetails option in the bottom
section of the Norton Internet
Security main window to view
more details on the Norton
Online Family Web site.
25Getting started
Manage
Lets you access Norton
Management.
Norton Management lets you
manage your Norton products
on all of your devices from
one location. Click the
Manage icon at the bottom
of the main window to sign
up for or log into Norton
Management. The Norton
Management agent should be
installed on each device that
you want to add to Norton
Management. You can use
your existing Norton Account
login information to access
Norton Management.
Norton Management
w
may not be available in some
versions of Norton Internet
Security.
Getting started
26
About Norton Internet Security main window
Mobile
Backup
Lets you download the
Norton Mobile Security for
Android.
You can use Norton Mobile
Security on all your devices
that use Android operating
system.
Norton Mobile Security
w
may not be available in some
versions of Norton Internet
Security.
Lets you set up the Norton
Online Backup account or
access your online backup
status.
Norton Online Backup
w
may not be available in some
versions of Norton Internet
Security.
When you click the Backup
icon on the main window, the
bottom section displays
Norton Online Backup
options. Norton Online
Backup provides a secure
online backup solution that
safeguards your important
data against system crash,
accidental deleting, virus
infection, and other disasters.
You can access or restore the
backed up data from any
computer that is connected
to the Internet.
About Norton Internet Security main window
Safe Web
27Getting started
Getting started
28
About Norton Internet Security main window
Lets you check the safety of
a Web site.
You can also perform a safe
search.
This option may not be
w
available with some versions
of Norton Internet Security.
When you click the Safe Web
icon on the main window, the
bottom section of the Norton
Internet Security main
window displays Norton Safe
Web options.
You can use the Check Site
option in the bottom section
of the Norton Internet
Security main window to
analyze the security levels of
any Web site that you want
to visit. When you type a Web
site address in the text box
and click Check Site, it shows
the Symantec’s ratings for
the Web site.
You can use the Safe Search
option in the bottom section
of the Norton Internet
Security main window to
search for information on the
Internet. The Norton Safe
Search uses Ask.com to
generate the search results.
Norton Safe Search provides
a site safety status and a
Norton rating for each of the
search results generated.
You can also use the View
recent Norton Safe Web
activity option in the bottom
About Norton Internet Security main window
section of the Norton Internet
Security main window to view
the recent Norton Safe Web
statistics on malicious sites
and URLs. You can also view
the list of new malicious
URLs.
Your activation status or subscription status appears
at the bottom of the main window. You can use the
Activate Now option to activate or subscribe your
Norton product.
About the Norton Internet Security advanced window
The Norton Internet Security advanced window acts
as a security management interface. The options in
this windowhelp you address all theimportant security
and performanceissues of yourcomputer. The options
are classified in different panes. Each pane contains
the important features that you can easily access or
configure from this window.
29Getting started
Getting started
30
About Norton Internet Security main window
The panes are:
Computer Protection
Network Protection
Web Protection
Provides you the essential
computer protection options.
It also contains links to scan
your computer, view the
history of protection events,
and manage quarantined
items. You can also view the
Norton Insight - Application
Ratings window and improve
the performance of Norton
Internet Security scans.
In addition, you can run
LiveUpdate. It also displays
the updates availability as to
when the last virus
definitions were updated.
Provides you the essential
network protection options.
It also contains links to the
list of vulnerable programs
and Network Security Map.
Provides you the essential
Web protection options.
It also contains links to
managing logins and credit
cards. In addition, you can
monitor and manage the
computer usage and Internet
activities of your child.
The parental control
w
feature is not available in
some of the versions of
Norton Internet Security.
About Norton Internet Security main window
You can view the different protection features on the
right side of the window. You can move your mouse
pointer over each feature to view a brief summary
about the feature. You can also choose to ignore or
monitor the protection status of a feature. You can
choose to turn on or turn off the protection features
from this window.
You can also monitor the overall system CPU usage
and the Norton-specific CPU usage in this window.
Responding to System Status indicators
Norton InternetSecurity displays the overall protection
status of your computer as System Status at the top
of the main window. When the System Status needs
attention or is at risk, you can take appropriate action
to improve the System Status. Your computer
protection is based on the programs that are installed
on your computer. To improve your protection status,
ensure that your installed programs are up to date.
The System Status indicator displays the following
statuses:
31Getting started
Secure
Attention
At Risk
Indicates that your computer and
activities are protected from
threats, risks, and damage.
Indicates that your computer and
activities require attention.
Take appropriate action to improve
your protection status.
Indicates that your computer and
activities are at risk.
Take immediate action to improve
your protection status.
Getting started
32
About Norton Internet Security main window
You can respond to the System Status indicators
directly from the main window.
To respond to System Status indicators from the main
window
1
In the bottom section of the Norton Internet
Security main window, click Fix Now.
2
Follow the on-screen instructions.
Monitoring the protection status of a feature
The Norton Internet Security main window acts as a
security management interface. You can access the
main features and monitor the performance of your
computer from the main window.
At times, you may want to turn off any option for a
particular purpose. But by doing so, the status of your
system changesto Attentionor AtRisk. In suchcases,
you can ignore the protection status of a particular
feature to maintain a healthy overall system status.
For example, you want to turnoff Browser Protection
for a limited period, and you still want the system
status to be Secure. In this case, you can ignore the
protection statusof BrowserProtection and then,turn
off the option. When you ignore the protection status
of a feature, it does not affect the overall SystemStatus.
You can also monitor the protection status of the
feature that has been ignored at any time.
You canignore or monitorthe protection status of only
selected featuresthat are availablein themain window.
The features are:
1 Antivirus
1 Antispyware
1 SONAR Protection
1 Smart Firewall
1 Intrusion Prevention
1 Email Protection
About your Norton Account
1 Browser Protection
1 Safe Surfing
To monitor the protection status of a feature
1
In the Norton Internet Security main window,click
Advanced.
2
In the window that appears, move your mouse
pointer over the feature name.
3
In the pop-upthat appears, do oneof the following:
1 To ignore the protection status of the feature
that affects your computer’s overall health
evaluation, click Ignore.
1 To monitor the protection status of the feature
that has been ignored, click Monitor.
About your Norton Account
When you create a Norton Account, you can manage
all of your Norton products inone place. You can store
your product keys in your Norton Account and also
buy additionalproduct keys. Youcan also register your
product with the Norton Account. It takes only a few
moments to create your Norton Account. You must be
connected to the Internet to create a Norton Account.
After you create a Norton Account, you can accessand
manage your account information and product
information from anywhere. It helps to reinstall your
products and download the latest version of the
products. If you install your producton more than one
PC, you can use the same Norton Account. To access
your Norton Account, go to the following URL:
https://www.mynortonaccount.com
You cancreate a Norton Account inthe following ways:
1 During activation
You can create your Norton Account and register
your product from the Norton Account window
that appears when you activate the product. You
33Getting started
Getting started
34
About your Norton Account
must provide your account information in the
Norton Account window that appears.
1 Any time after activation
If you skip the Norton Account window during
activation, you can create a Norton Account any
time after activation. You can create your Norton
Account and register your product from the
Account link that appears at the top of the Norton
Internet Security main window.
After you log in to your Norton Account, you can
manage your product information with the following
options:
Products
Order History
Saves the information for all of
the Norton products that you
own.
The Products tab provides you
the information about the
Norton products that you own
and the expiration date. You can
click the arrow icon against a
product for more information
such as product key and the
registration date. You can also
buy a new product key to protect
additional computers. You can
use the Update option to check
and download the latest product
version using Norton Update
Center.
Contains order information of
the Norton products you bought
from Norton online store.
About your Norton Account
35Getting started
Profile
Saves your account information
and your billing details.
The Profile options are:
1 Account Information
You can update your Norton
Account information and
your shipping address on the
Account Information tab.
After you update, click
Update to save the changes.
1 Billing Information
You can save your credit card
information and your billing
address on the BillingInformation tab. It makes it
easier for saving online
orders. After you update,
click Update to save the
changes.
1 Change Password
You can change your current
Norton Account password on
the Change Password tab.
You can use the icons at the bottom of your Norton
Account Web page to access and use the following:
Norton Online Family
Norton Online Family
monitors and manages your
child's Internet activities and
computer usage.
Getting started
36
About your Norton Account
Norton Online Backup
Norton Safe Web
Norton.com
Norton Update Center
Norton Online Backup
provides a secure and
easy-to-use online backup
solution that safeguards your
important data against
system crash, accidental
deleting, virus infection, and
other disasters.
Norton Safe Web checks the
safety of a Web site and lets
you perform a safe Web
search.
The Symantec Web site
provides more information
about the various products of
Symantec, the latest updates
on Internet security, and
various support options.
Norton Update Center checks
and lets you download the
latest version of your Norton
product.
If you forget your Norton Account password, you can
get a temporary password by clicking the Forgot yourpassword link in the Norton Account sign-in Web
page. Youneed to provide your emailaddress. You need
to use the same email address that you provided when
you created your Norton Account. Symantec sends a
temporary password to your email address. You can
use the temporary password for a limited time period.
You must reset your password after you log in to your
Norton Account.
Creating a Norton Account
Your Norton Account stores the product key and the
billing information of your product. You can also
register your product with the Norton Account.
In addition, Norton Account helps you to do the
following:
1 Save online orders and update billing information.
1 Log in to other product add-ons such as Norton
Online Family and Norton Online Backup.
Your computer must be connected to the Internet to
create a Norton Account. If you use a proxy server to
connect to the Internet, you must configure the proxy
settings. To configure the proxy settings of your
network, go to the Norton Internet Security main
window, and then click Settings> Network > NetworkSecurity Settings > Proxy Server > Configure.
You can also create a Norton Account when you
activate your product. When you create your Norton
Account fromthe product, your product getsregistered
in your account. If you have an existing Norton
Account, you can provide the same email address in
the NortonAccount window in yourproduct. Thisway,
you can register your current product and add it to the
list of Norton products in your existing Norton
Account. Ifyou upgrade your registered productto the
latest available version, your product remains
registered to the same Norton Account. In this case,
you cancontinue using thesame NortonAccount login
credentials.
Symantec products that are older than the 2006
w
product year do not appear in your Norton Account.
About your Norton Account
37Getting started
Getting started
38
About your Norton Account
To create a Norton Account from the Norton Account
Web page
1
In the Norton Internet Security main window,click
Account.
2
In theNorton Account Web page that appears, click
Sign up now.
3
In the Norton Account Sign Up Web page, provide
the details about your account information, and
then click Sign Up.
To create a Norton Account and register your product
after activation
1
In the Norton Internet Security main window,click
Account.
2
In theComplete Your Activation window, type your
email address, and then click Next.
3
In theCreate your Norton Account window, provide
your account details, and then click Next.
Your productinformation gets saved in yourNorton
Account only after you log in to your Norton
Account.
4
In the window that appears, click Done.
To log in to your Norton Account and access your
product information, visit
https://www.mynortonaccount.com.
Accessing your Norton Account
The product key for each Norton product is
conveniently storedin your Norton Account. Afteryou
have created your Norton Account successfully, you
can access your account from anywhere in the world.
You can log in to your Norton Account any time by
visiting the following URL:
https://www.mynortonaccount.com
You can easily find and update your account, product,
and billing information from your Norton Account.
You can also change your Norton Account password,
About Norton Community Watch
if required. Your computer must be connected to the
Internet to access your Norton Account.
Symantec products that are older than the 2006
w
product year do not appear in your Norton Account.
To access Norton Account
1
In the Norton Internet Security main window,click
Account.
2
In the Web page that appears, type your email
address and password, and click Sign In.
About Norton Community Watch
Norton Community Watch helps in identifying new
security risks by submitting selected security and
application data to Symantec for analysis. Symantec
assesses the data to determine the new threats and
their sources. The collective efforts from Norton
security product users help in quick identification of
solutions for these threats and risks. Norton
Community Watchimproves user security and product
functionality. Inaddition, it helpsSymantec to analyze
the execution, schedule, and efficiency of
Norton-specific tasks and settings on your computer.
Norton Community Watch collects and submits the
following types of data:
1 Identified malicious software such as portable
executable files and running processes
1 Any Web site URL that your product identifies as
fraudulent
1 All the Web site URLs that you visited before the
detection of a risk
1 The applications and processes that run on your
computer regularly and during any security risk
detection
1 Response instances that your computer sends to
any potential security risk
39Getting started
Getting started
40
About Norton Community Watch
1 General system information and performance
1 General information about your computer such as
After thepotential security risksare assessed from the
submitted data, Symantec sends the information back
to Norton InternetSecurity. The Norton features such
as Norton Insight and Insight Network use this
information to identify files and processes at risk.
You should participate in Norton Community Watch
submissions to provide valuable contribution to the
entire community that uses Norton security products.
Symantec maintains an adequate level of protection
for the collected information. To allow or deny the
detailed data submissions, you must configure the
Detailed Error Data Collection option under Norton
CommunityWatch. To access the DetailedError Data
Collection option, go the Norton Internet Securitymainwindow, and then click Settings > General > Other
Settings> Detailed Error Data Collection. The detailed
data mayvary depending on the Norton-specificerrors
and components. You can configure the option to
manage the data submissions.
data aboutthe Norton-specific errors and components
only. It does not collect or store any personal
information of any user.
If youchose not to join NortonCommunity Watchwhen
you installed your Norton product, you can turn it on
later. Toaccess theNorton CommunityWatch option,
go to the Norton Internet Security main window, and
then clickSettings > General> Other Settings> NortonCommunity Watch. You can also review the data,
which Norton Community Watch collects and submits
to Symantec, in the Security History window.
attributes from the computer
idle time, standby, and screensaver settings
About Norton Bootable Recovery Tool
About Norton Bootable Recovery Tool
Norton Bootable Recovery Tool scans and removes
viruses, spyware, and other security risks from your
computer. Your computer might be infected with a
virus ifyou experienceany ofthe followingsymptoms:
1 You cannot install Norton Internet Security.
1 You cannot start your computer.
1 Your computer is extremely slow.
Norton Bootable Recovery Tool is integrated with
Windows Preinstallation Environment (WinPE).
Therefore, youcan run Norton Bootable RecoveryTool
only froma CD,DVD, or USB key. You must useNorton
Bootable Recovery Tool Wizard to create the Norton
Bootable Recovery Tool CD, DVD, or USB key.
You cannot run Norton Bootable Recovery Tool in
w
WinPE for more than 72 hours. If you run Norton
Bootable Recovery Tool for more than 72 hours, your
computer restarts without any notification.
You can use the Norton Bootable Recovery Tool CD,
DVD, orUSB key to recover a computer thatis infected
with viruses and other security threats. This security
program isnot a replacement for continuous,real-time
protection from viruses and latest security risks. To
protect your computer from future infections, be sure
to install or continue using Norton Internet Security
that you already purchased.
Norton Bootable Recovery Tool detects and resolves
the following security threats:
41Getting started
Viruses
Programs that infect another
program, boot sector,
partition sector, or document
by inserting themselves or
attaching themselves to that
medium. Most viruses just
replicate; many also do
damage.
Getting started
42
About Norton Bootable Recovery Tool
Trojan horses
Hacking tools
Spyware
Adware
Programs containing
malicious codes that are
disguised as or hiding in
something benign, such as a
game or utility.
Tools that are used by a
hacker to gain unauthorized
access to your computer. One
type of hacking tool, a
keystroke logger, tracks and
records your individual
keystrokes and can send this
information back to the
hacker.
Programs that can scan
systems or monitor activity
and relay the information to
other computers or locations
in cyberspace.
Programs that facilitate the
delivery of advertising
content through their own
window, or by using another
program's interface.
About Norton Bootable Recovery Tool
43Getting started
Trackware
Programs that track system
activity, gather system
information, or track user
habits, and relay this
information to third-party
organizations. The
information that is gathered
by such programs is neither
personally identifiable nor
confidential. Trackware
programs are installed with
the user's consent, and may
also be packaged as part of
other software that is
installed by the user.
Downloading the Norton Bootable Recovery Tool
Wizard
If your attempt to install a Norton product fails, you
can download the Norton Bootable Recovery Tool
Wizard. This easy-to-use wizard helps you create
Norton Bootable Recovery Tool on a CD, DVD, or USB
key. You can use Norton Bootable Recovery Tool to
scan your computer and remove any security threats
that prevent successful installation.
It is recommended that you download and install
Norton Bootable Recovery Tool Wizard on a computer
that does not have any security threats and create
Norton Bootable Recovery Tool. If you create Norton
Bootable RecoveryTool on an infected computer,there
is a chance that the recovery CD, DVD, or USB key
might get infected.
To use Norton Bootable Recovery Tool, you must use
w
the product key of the Norton product that you
purchased. Ifyou usea trial version of NortonInternet
Security, you need to create a Norton Account to
receive aproduct key touse Norton Bootable Recovery
Tool.
Getting started
44
About Norton Bootable Recovery Tool
You can download Norton Bootable Recovery Tool
Wizard in one of the following ways:
1 From the Start menu.
1 From the Norton Support Web site.
To download the Norton Bootable Recovery Tool Wizard
from the Start menu
1
On the Windows taskbar, do one of the following:
1 In WindowsXP, click Start >Programs > Norton
1 In Windows Vista or Windows 7, click Start >
2
Follow the on-screen instructions.
To download the Norton Bootable Recovery Tool Wizard
from the Internet
1
Open your Web browser, and go to the following
URL:
http://www.norton.com/recoverytool
2
Follow the on-screen instructions.
To download the Norton Bootable Recovery Tool Wizard
from Norton Internet Security
1
In the Norton Internet Security main window,click
Scan Now.
2
In theComputer Scan pane, do oneof the following:
1 Click Quick Scan.
1 Click Full System Scan.
3
At the bottom of the scan window, next to If you
think there are still risks, click click here.
4
In the Norton Rescue Tools Web page, click
Download Norton Bootable Recovery Tool.
5
Follow the on-screen instructions.
Internet Security > Norton Recovery Tools.
All Programs > Norton Internet Security >
Norton Recovery Tools.
About Norton Bootable Recovery Tool
Using the Norton Bootable Recovery Tool
If the installation of yourNorton product fails, you can
use the Norton Bootable Recovery Tool to scan and
remove any security threats that prevent successful
installation. If your computer is infected and you are
not able to start your Windows operating system, you
can use Norton Bootable Recovery Tool to remove
threats and recover your computer.
Norton Bootable Recovery Tool is available on the
product CD that you purchased. You can use the
product CD as a recovery media.
To use Norton Bootable Recovery Tool, you must use
w
the product key of the Norton product that you
purchased. Ifyou usea trial version of NortonInternet
Security, you need to create a Norton Account to
receive aproduct key touse Norton Bootable Recovery
Tool.
To use the Norton Bootable Recovery Tool
1
Insert the recovery media and start your computer
from the recovery media.
The recovery media can be a Norton Bootable
Recovery Tool CD, DVD, USB key, or the product
CD.
2
Read the Norton License Agreement, type your
product key, and then click I Agree.
If youuse a non-QWERTY keyboard, usethe VirtualKeyboard option to enter your product key.
3
In the Norton Bootable Recovery Tool window,
click Norton Advanced Recovery Scan.
4
Click Start Scan.
5
After the scan is complete, remove the recovery
media from the drive or USB port, and restart your
computer.
45Getting started
Getting started
46
Starting Norton Internet Security from the command prompt
Starting Norton Internet Security from the
command prompt
If you work from the command line (for example,
writing a script or code), you can start Norton Internet
Security while you are still in DOS.
To start Norton Internet Security from the command
prompt
1
At the command-line prompt, type the directory
where Norton Internet Security is located, and the
executable.
1 In 32-bit version of Windows, Norton Internet
Security and the executable are located at the
following path:
\Program Files\Norton Internet
Security\Engine\version\Uistub.exe
Where version represents the version number
of installed Norton Internet Security.
1 In 64-bit version of Windows, Norton Internet
Security and the executable are located at the
following path:
\Program Files (x86)\Norton Internet
Security\Engine\version\Uistub.exe
Where version represents the version number
of installed Norton Internet Security.
2
Press Enter.
About the Norton Internet Security icon
After you install Norton Internet Security, it displays
an icon in the notification area at the far right of the
Windows taskbar.This icon indicates the currentstatus
of your computer.
Norton Internet Security displays alerts and
notifications to inform you how viruses and other
security threatsare detected andresolved. These alerts
About the Norton Internet Security icon
and notifications appear over the notification area of
your computer. In most cases, you can click the link
available in the alert to view the details and fix the
problems.
The Norton Internet Security icon represents the
current state of your computer. The icon changes its
color when it actively fixes any issues or wants to
inform you about any warning or urgent issues.
You can see the following representations of Norton
Internet Security icon in the notification area:
47Getting started
Icon with a green badge
Icon with an orange badge
Icon with a red badge
Icon with a gray badge
Icon with a yellow badge
Icon with a
crescent-pattern
Represents that your computer
is completely secure
Represents that there are some
issues against your computer
protection that require your
attention
Represents that there are some
urgent issues against your
computer protection that require
immediate resolution
Represents that your product is
disabled
Represents that Norton Internet
Security is fixing issues
Represents that the Silent Mode
feature is turned on
This icon also displays the
current protection status badge.
You can right-click the Norton Internet Security icon
to open the shortcut menu to quickly access a few
important tasks of Norton Internet Security.
Getting started
48
About the Norton Internet Security icon
About Norton Internet Security shortcut menu
Norton Internet Security performs background
activities to keep your computer secure. The icon in
the notificationarea reassures youthat yourprotection
is up to date. The icon changes its color if any change
in status occurs.
The messagesthat appear in the notificationarea might
require aresponse from you, such asopening a window,
and takingan action. More often, messagesinform you
about currentactivities, and theydisappear after a few
seconds. You can check the Security History window
for any further details.
You can right-click the Norton Internet Security icon
to access specific Norton Internet Security activities.
Depending on the current activities, your options
include the following:
Open Norton Internet
Security
Run QuickScan
Run LiveUpdate
View Recent History
Get Support
Lets you launch the Norton
Internet Security main window
to complete tasks, view current
status, or access other features.
Lets you run a Quick Scan to
protect possible virus-infected
areas of your computer.
Lets you run LiveUpdate to check
for definition and program
updates.
Lets you review the information
about the security events for all
of the categories.
Lets you resolve your problem
easily using Norton Autofix.
About LiveUpdate
49Getting started
Turn on/Turn off Silent
Mode
Disable/Enable Smart
Firewall
Disable/Enable Antivirus
Auto-Protect
Check for New Version
About LiveUpdate
Symantec products download the latest definition
updates andprogram updatesregularly from Symantec
servers. Thedefinition updates protect your computer
from the latest viruses and unknown security threats.
Using the LiveUpdate technology, Symantec products
help you to obtain and install these updates.
LiveUpdate takes little time to download and process
the definition updates and program updates. You can
choose Smart Definitions to minimize download time,
installation time, and memory consumption as Smart
Definitions are a subset of virus definitions. To access
the SmartDefinitions option, go tothe Norton Internet
Security main window, and then click Settings >Updates > Smart Definitions. You can cancel the
LiveUpdate session at any time.
LiveUpdate obtains these updates for your computer
by using your Internet connection. If your network
uses proxy servers to connect to the Internet,
LiveUpdate uses the proxy settings in your product to
Lets you turn on or turn off
Silent Mode.
Lets you turn off or turn on the
firewall.
Lets you turn off or turn on
Antivirus Auto-Protect.
Lets you check if new version of
your product is available or not.
This option is available only if
you have activated your product
and you have an active
subscription.
Getting started
50
About LiveUpdate
download the latest updates. To configure the proxy
settings of your network, go to the Norton Internet
Security main window, and then click Settings >
Network > Network Security Settings > Proxy Server
> Configure.
LiveUpdate does not download the latest definition
updates and program updates, if the MeteredBroadband Mode option in the Settings window is set
to NoTraffic. Metered Broadband Mode lets youdefine
the amountof network bandwidth that NortonInternet
Security can use. Therefore, you must ensure that the
Metered Broadband Mode option is turnedon and set
to No Limit or Critical Updates Only for LiveUpdate
to run successfully.
About Program and Definition Updates
LiveUpdate obtains program updates and definition
updates for your computer by using your Internet
connection.
Program updates are minor improvements to your
installed product.These differfrom productupgrades,
which are newer versions of the entire product.
Program updates are usually created to extend the
operating system or hardware compatibility, adjust a
performance issue, or fix program errors. Program
updates are released on an as-needed basis.
Some program updates may require that you restart
w
your computer after you install them.
LiveUpdate automatesthe process of downloading and
installing programupdates. It locates and obtainsfiles
from an Internet site, installs them, and then deletes
the older files and downloaded definitions from the
temporary folder after processing the updates.
Definition updates are the files that keep your
Symantec productsup to datewith thelatest antithreat
technology. The definition updates that you receive
depend on which product you use.
About LiveUpdate
The type of definition updates that each of the
Symantec products receive are as follows:
51Getting started
Norton AntiVirus, Norton
AntiVirus Online
Norton Internet Security, Norton
Internet Security Online
Users of these products
receive the latest virus
definitions from
Symantec that protects
your computer from all
types of security threats.
In addition to the virus
and security risk updates,
users of these products
receive definition updates
for security protection.
For the products that
contain protection
against phishing, users
receive definition updates
against phishing.
The security definition
updates provide the latest
predefined firewall rules,
the updated lists of
applications that access
the Internet, Intrusion
Prevention signatures,
and Symantec spam
definition files. These
lists are used to identify
unauthorized access
attempts to your
computer.
Getting started
52
About LiveUpdate
Norton 360, Norton 360 Online
Norton Security Suite, Norton
Business Suite
About Smart Definitions
Norton Internet Security downloads and installs virus
definitions regularly to protect your computer from
the latest security threats. For faster downloads and
installation purpose,Norton Internet Securityclassifies
these virus definitions into two sets.
The virus definitions are classified into the following
two sets:
Users of these products
receive the latest virus
definitions from
Symantec that protects
your computer from all
types of security threats.
In addition, users of these
products receive
Symantec spam definition
files and definition
updates against phishing.
Users of these products
receive the latest virus
definitions from
Symantec that protects
your computer from all
types of security threats.
In addition, users of these
products receive
Symantec spam definition
files and definition
updates against phishing.
Complete Set
Contains all the virus definitions
for each threat that is known to
Symantec.
About LiveUpdate
53Getting started
Core Set
Contains the most important
virus definitions that are
required for latest security
threats as viewed by Symantec.
The Core Set is a subset of the
Complete Set, and it is
approximately 30 percent
smaller than the Complete Set.
The Core Set minimizes
download time, installation time,
and system start time. It also
occupies lesser amount of disk
space as compared to the
Complete Set virus definitions.
Therefore, the Core Set results
in faster performance of your
computer.
The Core Set virus definitions are called as Smart
Definitions. Norton Internet Security provides the
Smart Definitions option to choose between Core Set
virus definitions and Complete Set virus definitions
for LiveUpdate sessions. To access the SmartDefinitions option, go to theNorton Internet Security
main window, and then click Settings > Updates >Smart Definitions.
During Automatic LiveUpdate or each time that you
run LiveUpdate manually, Norton Internet Security
checks if the SmartDefinitions option is turned on or
off. It then downloads and installs the desired set of
virus definitions based on the option settings. By
default, the Smart Definitions option is turned on,
which means that the Core Set virus definitions are
downloaded and installed.
Turning off or turning on Smart Definitions
Smart Definitionsare a subset of virus definitions that
contains most important definitions for the latest
security threats.
Getting started
54
About LiveUpdate
As the Smart Definitions are of considerably smaller
size, it results in lesser download time, lesser
installation time, lesser boot time, and lesser memory
consumption. It also occupies lesser amount of disk
space as compared to the full set of virus definitions.
Therefore, Smart Definitions result in faster
performance of your computer.
Norton InternetSecurity checks the SmartDefinitions
option settings during each LiveUpdate session. If the
option is turned on, the Smart Definitions are
downloaded and installed. If the option is turned off,
all of the virus definitions are downloaded and
installed.
To turn off or turn on Smart Definitions
1
In the Norton Internet Security main window,click
Settings.
2
In the Settings window, in the left pane, click
Updates.
3
In the Smart Definitions row, do one of the
following:
1 To turn off Smart Definitions, move the On/Off
switch to the right to the Off position.
1 To turn on Smart Definitions, move the On/Off
switch to the left to the On position.
4
In the Settings window, click Apply.
5
Click OK.
About running LiveUpdate
You should run LiveUpdate as soon as you install
Norton Internet Security. Some Symantec products
run LiveUpdate automatically to keep your protection
up todate. If youdo notuse the AutomaticLiveUpdate
option, you should manually run LiveUpdate once a
week.
In addition to the definition updates that Automatic
LiveUpdate downloads, the product uses streaming
technology to download the latest virus definitions.
About LiveUpdate
These downloads are called Pulse Updates. The Pulse
Updates are lighter and faster than Automatic
LiveUpdate. It keeps your computer secure from the
ongoing threats on the World Wide Web.
When Pulse Updates are enabled, LiveUpdate checks
for definition updates every few minutes and
downloads the streamed virus definitions. The Pulse
Updates protectyour computer from the latestsecurity
threats without compromising your system
performance. Even if you turn off Pulse Updates,
LiveUpdate picksall themissed streams andit updates
your computer during the full definition updates.
Each LiveUpdate session checks if the SmartDefinitions option is turned on or off, and downloads
and installs the updates based on the option settings.
To access the Smart Definitions option, go to the
Norton Internet Security main window, and then click
Settings > Updates > Smart Definitions. By default,
the Smart Definitions option is turned on. As Smart
Definitions are only a subsetof all thevirus definitions,
you can minimize download time, installation time,
and memory consumption.However, if you wantall of
the virus definitions to be downloaded and installed,
you can turn off the Smart Definitions option.
55Getting started
Checking for updates manually
LiveUpdate checks for updates to the product that is
installed on your computer.
These updates protect your computer from newly
discovered threats. LiveUpdate uses the Internet
connection to connect to the Symantec server, checks
for updates, and then downloads and installs them
automatically.
You should have the Automatic LiveUpdate option
turned on toensure that you have the latest definition
updates and program updates. Definition updates
contain the information that allows the product to
recognize and alert you to the presence of a specific
virus or security threat. Symantec issues program
Getting started
56
About LiveUpdate
updates periodically, which are enhancements to the
product. Program updates are usually created to fix
program errors, improve the performance of the
program, or, to extend the operating system or
hardware compatibility. After you install program
updates, you might not necessarily see a difference in
the way that the product works.
If youare not connected to theInternet, connect to the
Internet first, and then run LiveUpdate. Or, if you use
a proxyserver to connectto the Internet, configure the
proxy settings, and then runLiveUpdate. To configure
the proxy settings of your network, go to the Norton
Internet Securitymain window, andthen clickSettings
>Network > NetworkSecurity Settings >Proxy Server
> Configure.
When the LiveUpdate session is complete,you can use
the View Summary link to view the summary of the
updates that are installed on your computer.
To check for updates manually
1
In the Norton Internet Security main window,click
LiveUpdate.
LiveUpdate connectsto the Symantec server, checks
for available updates, and then downloads and
installs them automatically.
2
In the Norton LiveUpdate window, when the
installation is complete, click OK.
Some program updates may require you to restart
your computer after you install them.
About keeping your protection up to date
Definition updates are available to you as long as you
maintain an active product status. The ways in which
About LiveUpdate
you can acquire the product and maintain your status
are as follows:
57Getting started
If you purchased
a subscription
version of a retail
product
If you purchased
a product as a
service, or it came
installed on your
computer
If you receive this
service through
your service
provider
The product includes a limited-time
subscription to definition updates. When
the subscription is due to expire, you are
prompted to renew. Follow the on-screen
instructions to complete your
subscription renewal.
After your product expires, you cannot
obtain updates of any kind and all the
security features are turned off. If you
do not renew your product, you are no
longer protected against security threats.
Though LiveUpdate continues to check
for updates after expiration, you must
renew your product to enable all the
security features.
If you do not activate your service or
renew your subscription, you cannot
obtain updates of any kind and the
software no longer functions.
Your product status is always active as
long as your security service is active
with your service provider.
If your security service is not active, you
cannot obtain updates of any kind and
the software no longer functions.
Turning off or turning on Automatic LiveUpdate
You can have LiveUpdate check for definition updates
and product updates automatically on a set schedule,
by turning on the Automatic LiveUpdate option. You
can alsorun LiveUpdate manually when theAutomaticLiveUpdate option is turned on. However, you must
Getting started
58
About LiveUpdate
run LiveUpdatemanually to obtain updates ifyou have
turned off the Automatic LiveUpdate option.
If you are connected to the Internet, Automatic
w
LiveUpdate downloadsproduct updatesand definition
updates everyhour. If youhave an Integrated Services
Digital Network (ISDN) router that is set to
automatically connectto your Internet service provider
(ISP), itmay incur chargeseach time. If you donot want
this setup, you can turn off the automatic connection
on your ISDN router, or turn off the AutomaticLiveUpdate option.
To turn off Automatic LiveUpdate
1
In the Norton Internet Security main window,click
Settings.
2
In the Settings window, in the left pane, click
Updates.
3
In theAutomatic LiveUpdate row, move theOn/Off
switch to the right to the Off position.
4
In the Settings window, click Apply.
5
In the Security Request dialog box, in the Select
the duration drop-down list, select how long you
want to turn off Automatic LiveUpdate, and then
click OK.
6
In the Settings window, click OK.
To turn on Automatic LiveUpdate
1
In the Norton Internet Security main window,click
Settings.
2
In the Settings window, in the left pane, click
Updates.
3
In theAutomatic LiveUpdate row, move theOn/Off
switch to the left to the On position.
4
In the Settings window, Click Apply.
5
Click OK.
About Pulse Updates
In addition to the definition updates that Automatic
LiveUpdate downloads, Norton Internet Security uses
streaming technology to download the latest virus
definitions. Thesedownloads are calledPulse Updates.
The Pulse Updates are lighter and faster than
Automatic LiveUpdate. They keep your computer
secure from the ongoing threats that exist on the
Internet. Pulse Updates protect you against the
rapidly-changing environment of security threats
without compromising your computer's performance.
Pulse Updates should always be turned on to get the
latest updates.
Pulse Updates checks for definition updates every 5
minutes. Ifdefinition updates areavailable, LiveUpdate
downloads the streamed virus definitions. Pulse
Updates provide the updates in between the full
updates, which Automatic LiveUpdate downloads
automatically every hour. Norton Internet Security
merges the new stream that is downloaded with the
last updates that are installed. The Pulse Updates
downloads provide additional and fast protection for
the latest threats in between the full updates without
disrupting your online experience.
Even if you do not turn on Pulse Updates, LiveUpdate
collects all the missed streams and, it updates your
computer during full definition updates.
About LiveUpdate
59Getting started
Turning off or turning on Pulse Updates
Pulse Updates provide frequent, lightweight updates
every 5 minutes in between the full updates. Always
ensure that the Pulse Updates option is turned on. It
protects you from the latest threats without
compromising yoursystem performance or disrupting
your online experience.
You must be connected to the Internet to obtain latest
definition updates by using Pulse Updates. You can
Getting started
60
About Network Proxy settings
turn on or turn off Pulse Updates only if Automatic
LiveUpdate is turned on.
To turn off or turn on Pulse Updates
1
In the Norton Internet Security main window,click
Settings.
2
In the Settings window, in the left pane, click
Updates.
3
Under AutomaticLiveUpdate, in thePulse Updates
row, do one of the following:
1 To turn off Pulse Updates, move the On/Off
switch to the right to the Off position.
1 To turn on Pulse Updates, move the On/Off
switch to the left to the On position.
4
In the Settings window, click Apply.
5
Click OK.
About Network Proxy settings
A proxy server regulates access to the Internet, and
prevents external computers from accessing your
network. If you are on a network that uses a proxy
server toconnect to theInternet, youcan provide proxy
server detailsto Norton Internet Security. You can use
the Network Proxy Settings window to specify the
automatic configuration URL, the proxy settings, and
the authentication details. Norton Internet Security
uses the proxy settings and authentication details to
connect to the Internet automatically, whenever
required. For example, LiveUpdate uses the specified
proxy server settings to retrieve updates. You must
ensure that you specify the proxy server details for
LiveUpdate to run successfully.
In some cases, your network uses an automatic
configuration URL or script for managing Internet
access. In this case, you must provide the URL of the
required Proxy Automatic Configuration (PAC) file. A
PAC filecontains the code that lets your browser know
about the proxy settings for different Web sites over
About Network Proxy settings
the Internet.It also containsthe words which you want
to filter and block while you access the Internet. You
can also choose the option that lets your browser to
automatically detect the proxy settings. If you want
your manual settings in the network, ensure that you
disable the Automatic Configuration options.
Network Proxy Settings window lets you specify the
following settings:
61Getting started
Automatic Configuration
Lets you specify the automatic
configuration URL or script to
manage Internet access.
You have the following options:
1 Automatically detect
settings
Lets your browser detect the
network settings
automatically.
If you do not want to override
your manual settings for
network connections, you
must disable this option.
1 Use automatic configuration
script
Lets your browser use the
automatic configuration URL
or script to manage Internet
access.
Use the URL box to provide
the HTTP URL or the script to
the required PAC file (such
as file://C:/Proxy.pac).
Getting started
62
About Network Proxy settings
Proxy Settings
Authentication
Lets you provide the details of
your Proxy Settings.
Under Proxy Settings, check Use
a proxy server for your HTTP
connections, and do the
following:
1 In the Address box, type the
URL or IP address of your
proxy server.
1 In the Port box, type the port
number of your proxy server.
You can specify a value from
1 to 65535.
Lets you connect to the Internet
through a server that requires
authentication.
Use the Username box and
Password box to type the
authentication details.
Configuring Network Proxy Settings
When youuse a proxyserver toconnect to theInternet,
you mustspecify the proxy server details.The NetworkProxy Settings window lets you enter automatic
configuration settings,proxy settings, andproxy server
authentication settings. The Network Proxy settings
let youconnect to theInternet while you perform tasks
such asactivating the productor accessing the support
options.
To configure Network Proxy Settings
1
In the Norton Internet Security main window,click
Settings.
2
In the Settings window, click the Network tab.
3
In the left pane, click Network Security Settings.
4
In the Proxy Server row, click Configure.
About Network Proxy settings
5
In the Network Proxy Settings window, do the
following:
1 If youwant your browser to automaticallydetect
network connection settings, under Automatic
Configuration, check Automatically detect
settings.
1 If the proxy server requires an automatic
configuration URL, under Automatic
Configuration, check Use automatic
configuration script. Type the URL (such as
file://C:/Proxy.pac) in the URL box.
1 If yournetwork uses aproxy server,under Proxy
Settings, check Use a proxy server for your
HTTPconnections. In the Address box, type the
URL or IP address of your proxy server, and in
the Portbox, type the port numberof your proxy
server. You can specify a value from 1 to 65535.
1 If your proxy server requires a user name and
password, under Authentication, check I need
authorization to connect through my firewall
or proxy server. Type the user name in the
Username box and password in the Password
box.
6
In theNetwork Proxy Settings window, click Apply.
63Getting started
Getting started
64
About Network Proxy settings
Monitoring your
system's
performance
This chapter includes the following topics:
1 About System Insight
About System Insight
Norton Internet Security continuously monitors your
computer to keep it free of any problems and run at
peak efficiency. Norton Internet Security constantly
scans the vital areas of your computer including
memory, registry keys, and running processes. It
monitors the important activities such as general file
operation, network traffic, and Internet browsing. In
addition, Norton Internet Security ensures that the
activities that it performs on your computer do not
degrade the overall performance of your computer.
System Insight provides you a centralized location
where youcan viewand monitorthe activitiesthat you
perform on your system. System Insight displays such
information in the Performance window.
You canuse the Performance window for the following:
1 To view monthly history of the important system
activities that you performed or that occurred over
a period of the last three months
The Events graph that appears at the top of the
window provides a pictorial representation of
important system activities. The activities include
application installations, application downloads,
2
Monitoring your system's performance
66
About System Insight
disk optimizations,threat detections,performance
alerts, or Quick Scans. The graph displays the
activities as icon or stripe, and the description for
each icon or stripe is provided at the bottom of the
graph. Thepop-up that appears when youmove the
mouse pointerover an iconprovides you the details
about the activity. The View Details link in the
pop-up lets you view additional details about the
activity in the Security History window. You can
use thetabs at thetop of the graph toobtain details
for the current month and details for the last two
months.
1 To rearrange the organization of files on your
system
Optimizing your system helps you maximize the
usable free space on a disk by grouping files based
on how they are accessed. The Optimize option at
the top of the Events graph lets you defragment
your system.
1 To view and analyze the effect of Norton Internet
Security on the performance of your computer
The Performance graph that appearsat the bottom
of the window provides a graphical representation
of yourCPU usageand memory usage. The CPUtab
displays agraph that represents the overall system
CPU usage and Norton-specific CPU usage. When
you click at any point on the CPU graph and
memory graph, Norton Internet Security displays
a list of the processes that consume maximum
resources at that point. It also displays the
percentage of usage for each process. You can click
a process that is available in the list to get more
information about the process in the File Insight
window. The Memory tab displays a graph that
represents overall memory usage and
Norton-specific memory usage. You can select any
of the Zoom options to obtain magnified view or
historical data of the graphs.
1 To view the details of Norton-specific jobs that are
currently running in the background
The NortonTasks window provides thedetails such
as the timestamp, the duration, and the status of
the background jobs. The details also include the
type of power the job needs to run and if a job ran
during idle time. You can select different power
sources for thebackground jobs. You canalso start
or stop a background job at any time.
1 To view the details of the Files of Interest
The NortonInsight - Application Ratings window
provides details on the trust level, prevalence,
resource usage and stability ratings for the Files of
Interest.
You can use the Performance Monitoring option to
monitor the performance of your computer. To access
the PerformanceMonitoring option, go to the Norton
Internet Security main window, click Settings >
General > Performance Monitoring > Performance
Monitoring .
You can also use the Learn More link in the
Performance window to access the online tutorialpage
to get more information.
Accessing the Performance window
System Insight provides you a centralized location
where youcan view and monitor yoursystem activities.
System Insight displays such information in the
Performance window. You canaccess the Performance
window to view details about the important system
activities, CPU usage and memory usage, and
Norton-specific background jobs. You can also view
Norton Insight details and defragment your boot
volume.
To access the Performance window
4
In the Norton Internet Security main window,click
Performance.
About System Insight
67Monitoring your system's performance
Monitoring your system's performance
68
About System Insight
About monitoring system activities
System Insight provides information about the
important systemactivities that you performed orthat
occurred overa period ofthe lastthree months. System
Insight displays the information in the Performance
window. The Events graph at the top of the
Performance window displays each activityas icon or
stripe. The description for each icon or stripe appears
at the bottom of the graph. You can use the tabs at the
top ofthe graph toobtain details for the currentmonth
and for the last two months. The activities include:
Installs
Downloads
Provides the details about the
installation activities that you
performed on your system over
a period of the last three months
The details include the
application that you installed,
the date on which you installed
the application, and the total
number of installations on that
date.
Provides the details about the
application-download activities
that you performed on your
system over a period of the last
three months
The details include the date on
which you downloaded a file and
the total number of downloads
on that date. You can click the
file name link to view additional
details about the downloaded
file such as the Download Insight
report, file name, reputation
level, and recommended action.
About System Insight
69Monitoring your system's performance
Optimized
Detections
Alerts
Indicates the optimization
activities that you performed on
your system over a period of the
last three months
Provides the details about the
threat detection activities that
Norton Internet Security
performed on your system over
a period of the last three months
The details include the date on
which Norton Internet Security
detected a threat and the total
number of threats that Norton
Internet Security detected on
that date. The View Details link
provides additional details about
the risk such as the risk impact
and the origin of the risk. The
details also include the action
that a threat has performed on
your system and the action that
Symantec recommends you to
resolve the threat.
Provides the details about the
performance alerts that Norton
Internet Security displayed over
a period of the last three months
The details include the
monitored date and the number
of performance alerts generated.
The View Details link provides
additional details about
performance-related activities,
program name, program
location, and system resources
utilization.
Monitoring your system's performance
70
About System Insight
Quick Scans
Provides the details about Quick
Scans that Norton Internet
Security performed on your
system over a period of the last
three months
The details include the date on
which a Quick Scan was
performed and the number of
Quick Scans that were
performed on that date. The
View Details link provides
additional details such as the
scan time, total items scanned,
total risk detected, total risks
resolved, and recommended
action.
Viewing details of your system activities
System Insight lets you view details of the system
activities thatyou performedor thatoccurred overthe
last three months in the Performance window. The
activities include application installations, application
downloads, disk optimizations, threat detections,
performance alerts, or Quick Scans. You can use the
tabs at the top of the Events graph to obtain details for
the current month and for the last two months. The
Events graph at the top of the Performance window
displays each activity as iconor stripe. The description
for each icon or stripe appears at the bottom of the
graph. The pop-up that appears when you move the
mouse pointer over an icon provides you the details
about theactivity. The detailsinclude thedate on which
an activity was performed and the number of such
activities that you performed on that date. The ViewDetails link provides additional details of the activity
in the Security History window.
To view details of your system activities
1
In the Norton Internet Security main window,click
Performance.
2
In thePerformance window, at the top ofthe Events
graph, click the tab for a month to view the details.
3
In the Events graph, move the mouse pointer over
the icon or the stripe for an activity.
4
In the pop-up that appears, view the details of the
activity.
5
If the View Details option appears in the pop-up,
click View Details to view additional details in the
Security History window.
About performance alerting
Norton Internet Security monitors your system
performance. Ifit detects anincreased usage of system
resources by any program or process, it notifies you
with performance alerts. Performance alerting works
only when the Performance Monitoring option and
Performance Alerting option are turned on.
Performance alerting notifies you with information
about the program name and resources that the
program uses excessively. The Details& Settings link
in the performance notification alert lets you view
additional details about the resource consumption by
the program. The File Insight window opens and
displays the details of the file, the originof the file,and
the complete resourceusage list of theprogram. From
the FileInsight window, you canchoose toexclude the
program from being monitored. You can use the
Settings option in the File Insight window to turn off
the Performance Alerting option.
Performance alerts are not displayed when your
w
computer is idle or in Silent Mode.
For each system resource, such as CPU, memory, and
hard disk, there is a resource consumption threshold
defined. Whenthe resource consumptionof a program
About System Insight
71Monitoring your system's performance
Monitoring your system's performance
72
About System Insight
exceeds the defined threshold limit, Norton Internet
Security alerts you with a performance alert.
You can use the Resource Threshold Profile forAlerting option to configure the threshold limit. To
access the Resource Threshold Profile for Alerting
option, go to the Norton Internet Security main
window, and then click Settings > General >
Performance Monitoring > Resource Threshold
Profile for Alerting.
You can use the Use Low Resource Profile On Battery
Power option to let Norton Internet Security
automatically change the resource threshold profile
to low when your computer runs on battery power.
In addition, you can add programs to the ProgramExclusions list using the Program Exclusions option.
When you add a program to the Program Exclusions
list, Norton Internet Security does not alert you when
the program exceeds the resource consumption
threshold limit.
You can view all the performance-related logs under
the Performance Alert category in the SecurityHistory window.
Configuring performance alerts
You can use the Performance Alerting option to
receive performance alertswhen there is anincreased
usage of system resources by any program or process.
You can use the following options to configure
performance alerts:
Off
Turns off performance alerts.
Select this option if you do
not want Norton Internet
Security to notify you with
performance alerts.
About System Insight
73Monitoring your system's performance
On
Log Only
Turns on performance alerts.
Select this option if you want
Norton Internet Security to
notify you with performance
alerts when a program or
process exceeds the system
resource usage threshold
limit.
By default, the PerformanceAlerting option is turned on.
Monitors and records the
system resource usage.
Select this option if you want
Norton Internet Security to
only monitor the system
resource usage of every
program or process running
on your computer.
When a program or process
exceeds the system resource
usage threshold limit, Norton
Internet Security records
these details in the SecurityHistory window. You can view
the details that are related to
performance alerts under
Performance Alert category
in the Security History
window.
To configure performance alerts
1
In the Norton Internet Security main window,click
Settings.
2
In the Settings window, click the General tab.
3
In the left pane, click Performance Monitoring.
Monitoring your system's performance
74
About System Insight
4
Under Performance Monitoring, in the
PerformanceAlerting row, doone ofthe following:
1 To turn off performance alerts, move the
1 To turn on performance alerts, move the
1 To suppress the performance alerts, move the
5
Under Alert for High Usage of, do the following:
1 If you want Norton InternetSecurity to monitor
1 If you want Norton InternetSecurity to monitor
1 If you want Norton InternetSecurity to monitor
1 If you want Norton InternetSecurity to monitor
6
Click Apply, and then click OK.
PerformanceAlerting switch to the Off position.
PerformanceAlerting switch to the On position.
Performance Alerting switch to the Log Only
position.
the CPU usage, move the CPU switch to the On
position. By default, this switch is turned on.
the memory usage,move the Memory switch to
the Onposition. Bydefault, thisswitch is turned
on.
the disk usage, move the Disk switch to the On
position. By default, this switch is turned on.
the handle count, move the Handles switch to
the On position.
Configuring the resource threshold profile
The threshold limit for the system resources
determines at which point Norton Internet Security
should notify you with performance alerts. When a
specific program exceeds the threshold limit of using
your systemresource, Norton Internet Security notifies
you with a performance alert.
To configure the resource threshold profile
1
In the Norton Internet Security main window,click
Settings.
2
In the Settings window, click the General tab.
3
In the left pane, click Performance Monitoring.
About System Insight
4
Under Performance Monitoring, in the Resource
Threshold Profile for Alerting row, select one of
the following options:
75Monitoring your system's performance
Low
Medium
High
Configures a low threshold
limit for alerting
If you choose this option,
Norton Internet Security
notifies you with
performance alerts whenever
a program reaches the lowest
threshold limit of using your
system resource.
Symantec recommends you
to select this option when
your computer runs on
battery power.
Configures a medium
threshold limit for alerting
By default, the threshold limit
is set to medium.
Configures a high threshold
limit for alerting.
If you choose this option,
Norton Internet Security
notifies you with
performance alerts whenever
a program reaches the
highest threshold limit of
using your system resource.
5
Click Apply, and then click OK.
Monitoring your system's performance
76
About System Insight
Turning off or turning on the Use Low Resource Profile On
Battery Power option
When your computer runs on battery power, it is
important that all active software programs consume
minimum resourceusage. By reducing resource usage,
your computer gains longer battery life and becomes
more energy efficient.
You can configure a low threshold profile and ensure
that all programs consume minimum resource usage.
When the resource usage of a program or a process
exceeds the low threshold limit, Norton Internet
Security notifiesyou with aperformance alert.You can
choose to close the program or the process manually
and free the resource.
If the Use Low Resource Profile On Battery Power
option is turned on, Norton Internet Security
automatically changes the threshold profile to low
when yourcomputer runs on battery power.By default,
this option is turned on.
Symantec recommends that you keep the Use Low
w
Resource Profile On Battery Power option turned on.
To turn off the Use Low Resource Profile On Battery
Power option
1
In the Norton Internet Security main window,click
Settings.
2
In the Settings window, click the General tab.
3
In the left pane, click Performance Monitoring.
4
Under Performance Monitoring, in the Use Low
Resource Profile On Battery Power row, move the
On/Off switch to the right to the Off position.
5
Click Apply, and then click OK.
To turn on the Use Low Resource Profile On Battery
Power option
1
In the Norton Internet Security main window,click
Settings.
2
In the Settings window, click the General tab.
About System Insight
3
In the left pane, click Performance Monitoring.
4
Under Performance Monitoring, in the Use Low
Resource Profile On Battery Power row, move the
On/Off switch to the left to the On position.
5
Click Apply, and then click OK.
Excluding programs from appearing in performance alerts
Norton Internet Security lets you exclude programs
from appearingin performance alerts. You canadd the
programs that consume high CPU, memory, or disk
usage to the Program Exclusions list. When you add
a program to the Program Exclusions list, Norton
Internet Securitydoes not alert you when the program
exceeds the resource consumption threshold limit.
To exclude a program from appearing in performance
alerts
1
In the Norton Internet Security main window,click
Settings.
2
In the Settings window, click the General tab.
3
In the left pane, click Performance Monitoring.
4
Under Performance Monitoring, in the Program
Exclusions row, click Configure.
5
In the Program Exclusions window, click Add.
6
In the Select a program dialog box, browse to the
executable file for the program that you want to
add.
7
Click Open.
8
In the Program Exclusions window, click OK.
9
In the Settings window, click Apply.
10
Click OK.
77Monitoring your system's performance
Removing programs from Program Exclusions
The ProgramExclusions window lists allthe programs
that are excluded from appearing in performance
alerts. Ifyou want, youcan removeany of theprograms
that you already added to the Program Exclusions
Monitoring your system's performance
78
About System Insight
window. When you remove a program, the program
appears in the performance alert the next time it
crosses the resource consumption threshold limit.
To remove a program
1
In the Norton Internet Security main window,click
Settings.
2
In the Settings window, click the General tab.
3
In the left pane, click Performance Monitoring.
4
Under Performance Monitoring, in the Program
Exclusions row, click Configure.
5
In the Program Exclusions window, select the
program that you want to delete, and then click
Remove.
6
Click OK.
7
In the Settings window, click Apply.
8
Click OK.
About CPU graph and memory graph
Norton Internet Security monitors the overall system
CPU usage and memory usage and the Norton-specific
CPU usageand memoryusage. Norton Internet Security
displays the details in the CPU graph and the memory
graph. TheCPU graph and memory graphare real-time
graphs of CPU utilization and memory utilization.
The graphs display a performance time for the last 90
minutes or for the duration since you started your
computer. The graphs update the information at an
interval ofevery 15 seconds. The graphsprogress from
right to left, and the most recent data appear on the
far right of the graph. The blue pattern in the graphs
depicts theoverall system usage,and theyellow pattern
depicts theNorton-specific usage. Thegray blocks that
are labeled as Idle indicate the idle period of your
computer. The gray blocks include the period when
your computer is in shutdown, sleep, or log out state.
The graphs show a default performance time of 90
minutes. However, you can use the Zoom options to
About System Insight
define a region of the graph that you are interested to
view. Youcan select a Zoom option toobtain magnified
view or historical data of the graphs. For example, if
you select the 10min option, Norton Internet Security
displays the magnified view of CPU graph or memory
graph for the last 10 minutes. If you select the 1d
option, Norton Internet Security displays a historical
data of the last one day.
When you click at any point on the CPU graph or
memory graph,Norton Internet Security displays alist
of the processes that consume maximum resources at
that point. It also displays the percentage of usage for
each process. You can click a process that is available
in the list to get more information in the File Insight
window.
The File Insight window provides information about
the process such as:
1 The file name, version number, digital signature,
the date on which the process was installed
1 The date on which the process was last used and
whether it is a startup file
1 The stability details
1 The confidence level
1 The resource usage details
1 The actions that the process performs on your
system
In addition, the File Insight window displays the CPU
graph and the resource usage details for the running
processes. The graph shows the breakdown of overall
system CPU usage and the CPU usage by the process.
79Monitoring your system's performance
Viewing the CPU graph and memory graph
Norton Internet Security monitors the overall system
CPU usage and memory usage and the Norton-specific
CPU usage and memory usage. The CPU tab and the
Memory tab at the top of the Performance graph
display the CPU graph and the memory graph
respectively.
Monitoring your system's performance
80
About System Insight
The Zoom options provide you the magnified view of
the CPU graph and memory graph. For example, if you
select the 10min option, Norton Internet Security
displays the magnified view of CPU graph or memory
graph for the last 10 minutes. If you select the 30min
option, Norton Internet Security displays a magnified
view of the CPU graph and memory graph for the last
30 minutes.
By default, the graphs display performance time for
w
the last 90 minutes.
To view CPU graph and memory graph
1
In the Norton Internet Security main window,click
Performance.
2
In thePerformance window, doone of thefollowing:
1 To view the CPU graph, click the CPU tab.
1 To view the memory graph, click the Memory
tab.
1 To obtain a magnified view, click 10min or
30min next to the Zoom option
Obtaining historical data of your CPU and memory usage
The Zoom options also provide you the historical data
of the CPU graph and memory graph. For example, if
you select the 1d option, Norton Internet Security
displays the data of CPU graph or memory graph for
the last one day.
To view historical data of your CPU or memory usage
1
In the Norton Internet Security main window,click
Performance.
2
In thePerformance window, doone of thefollowing:
1 To view the CPU graph, click the CPU tab.
1 To view the memory graph, click the Memory
tab.
3
Do one of the following:
1 To obtain historical data for the last one day,
click 1d.
1 To obtain historical data for the last one week,
click 1w.
1 To obtain historical data for thelast one month,
click 1m.
Identifying resource-consuming processes
You canclick at any point onthe CPU graph or memory
graph to obtain a list of the processes that consume
maximum resources of your computer at that point.
You can click a process that is available in the list to
get more information about the process in the FileInsight window.
To identify resource-consuming processes
1
In the Norton Internet Security main window,click
Performance.
2
In thePerformance window, doone of thefollowing:
1 To view the CPU graph, click the CPU tab.
1 To view the memory graph, click the Memory
tab.
3
Click at any point on the graph to obtain a list of
resource-consuming processes.
4
Click the name of a process to obtain additional
information about the process in the File Insight
window.
About System Insight
81Monitoring your system's performance
About Startup Manager
Some programsare configured to launch duringstartup
of your computer. The number of startup items
increases as you install new applications, and the time
that is required to start your computer increases as a
result. Startup Manager helps to manage the startup
items onyour computer. Forany startup program that
the Startup Manager lists, you can view the detailed
Monitoring your system's performance
82
About System Insight
information such as Community Usage and Resource
Usage. You can also click the application name and
view the File Insight details. These details would help
you determine whether or notto enable an application
during startup.
Norton InternetSecurity displays the community usage
details under the following conditions:
1 The Norton Community Watch option in the
Settings window must be turned on.
1 The Metered Broadband Mode option in the
Settings window must be configured to No Limit
or Critical Updates Only.
Startup Managerlets you viewthe listof programs that
are included to the startup items. Based on your
priority, you can configure Startup Manager to run or
not run these programs when your computer starts.
You can also choose to delay the start of the programs
and run them manually from the Startup Manager.
This way, you can enhance the performance of your
computer. You can disable a program and measure the
performance of yourcomputer the next time you start
your computer.
If you choose to install the latest version of Norton
Internet Security, you can still retain the Startup
Manager setting. When you uninstall Norton Internet
Security, the programs that you had added to the
Startup Manager are reset to their default startup
setting.
To adda startup item,you canopen your Startupfolder
w
that is available in your Windows Start menu and add
programs asrequired. For more information onadding
programs in Windows Startup, go to Microsoft
Technical Support Web site or Windows online Help.
Disabling or enabling startup items
Whenever you start your computer, there are some
programs that automatically start and run in parallel.
About System Insight
These programs are called startup items. The startup
items increase the start time of your computer.
Startup Manager helps you manage the startup items
of your computer efficiently. If you do not want a
program to automatically start when youturn on your
computer, you can disable the program using Startup
Manager. You can also delay a startup item that you
want to start at a later time.
To disable startup items
1
In the Norton Internet Security main window,click
Performance.
2
In thePerformance window, clickStartup Manager.
3
In the Startup Manager window, in the On/Off
column, uncheck the program that you do not want
to automatically start when you turn on your
computer.
4
Click Apply.
5
Click Close.
To enable startup items
1
In the Norton Internet Security main window,click
Performance.
2
In thePerformance window, clickStartup Manager.
3
In the Startup Manager window, in the On/Off
column, select the program that you want to
automatically start when you turn on your
computer.
4
Click Apply.
5
Click Close.
83Monitoring your system's performance
Managing startup items
Norton Internet Security Startup Manager monitors
and lists the programs that automatically start when
you turn on your computer. To reduce the start time
of your computer and improve the performance, you
can delay the start of some of the programs when you
turn on your computer.
Monitoring your system's performance
84
About System Insight
To delay startup items
1
In the Norton Internet Security main window,click
Performance.
2
In thePerformance window, clickStartup Manager.
3
In theStartup Manager window, in theDelay Start
column, select the program that you want to delay.
4
Click Apply.
5
Click Close.
To run delayed startup items manually
1
In the Norton Internet Security main window,click
Performance.
2
In thePerformance window, clickStartup Manager.
3
In theStartup Manager window, click RunDelayed
Items Now.
4
Wait for the program to start, and then in the
Startup Manager window, click Close.
About optimization
The datastorage space ona disk is divided intodiscrete
units. These units are called clusters. When files are
written to the disk, they are broken up into
cluster-sized pieces. When all of the file pieces are
located in adjacent or contiguous clusters, the file can
be accessed quickly.
Your computer’s hard disk stores all of your files,
applications, and the Windows operating system. The
bits of information that make up your files gradually
spread over the disk. This process is known as
fragmentation. The more that you use your computer,
the more fragmented the hard disk gets.
When a fragmented file is accessed, the disk
performance is slower. The performance is slower
because the drive head locates, loads,saves, and keeps
track of all of the fragments of the file. If free space is
also fragmented, the drive head might have to track
adequate free space to store temporary files or newly
added files.
About System Insight
Optimization rearranges file fragments into adjacent
or contiguous clusters. When the drive head accesses
all of the file data in one location, the file is read into
the memory faster. Optimization also maximizes the
usable freespace on adisk bygrouping most frequently
used files and infrequently used files. Optimization
consolidates free space to avoid fragmenting newly
added files. It adds extra space after major data
structures so that they can grow without immediately
becoming fragmented again.
You can optimize your boot volume manually by using
the Optimize option in the Performance window.
You can also configure Norton Internet Security to
defragment your boot volume or the local disk that
contains boot volume when your computer is idle.
Norton Internet Security automatically schedules the
optimization when it detects the installation of an
application on your computer. The optimization
process starts next time when your computer is idle.
You canuse the Idle Time Optimizer option tooptimize
the boot volume during the idle time. To access the
Idle Time Optimizer option, go to the Norton Internet
Security main window, and then click Settings >General > Norton Tasks > Idle Time Optimizer.
85Monitoring your system's performance
Optimizing your boot volume
The Optimize option lets you optimize your boot
volume to improve the boot time of your computer.
Optimization ofyour boot volume maximizes theusable
free space by rearranging file fragments into adjacent
and contiguous clusters. When the drive head of your
hard disk accesses all of the file data in one location,
the file is read into the memory faster.
When you use the Optimize option in Windows XP,
Norton Internet Security optimizes only the boot
volume (for example, C:\Windows). Therefore, it
requires less timeto complete optimization. However,
when you use the Optimize option in Windows Vista
or Windows 7, Norton Internet Security optimizes the
Monitoring your system's performance
86
About System Insight
drive that contains the boot volume. Therefore, it
requires more time to complete optimization.
You can access the Optimize option at the top of the
security statusgraph in the Performance window. You
can also optimize your boot volume using the Insight
Optimizer option in the Norton Tasks window. The
Insight Optimizer row in the background jobslist that
is available in the Norton Tasks window displays the
details of the boot volume optimization process. You
can view details such as timestamp, duration, and
status of the background job.
To optimize your boot volume from the Performance
window
1
In the Norton Internet Security main window,click
Performance.
2
In the Performance window, at the top of the
security status graph, click Optimize.
To optimize your boot volume from the Norton Tasks
window
1
In the Norton Internet Security main window,click
Performance.
2
In the Performance window, click Norton Tasks.
3
In the Norton Tasks window, under the Norton
Tasks column, click the Play icon that appearsbefore Insight Optimizer.
About the Idle Time Optimizer
Idle TimeOptimizer lets you configure NortonInternet
Security to defragment your boot volume or the local
disk that contains boot volume when your computer
is idle. Norton Internet Security automatically
schedules the optimization when it detects the
installation of an application on your computer and
your computeris idle.If youstart using your computer
again, NortonInternet Security stopsthe optimization
task, and starts optimizing the next time that your
computer is idle. This way, the background job of
About System Insight
optimization does not affect the performance of your
computer.
Optimization rearranges file fragments into adjacent
or contiguousclusters inthe hard disk. It improves the
computer performance by reading the files into the
memory faster.Optimization also maximizes the usable
free space on a disk by grouping most frequently used
files and infrequently used files. In addition, it
consolidates free space to avoid fragmenting newly
added files.
You canuse the Idle Time Optimizer option tooptimize
the boot volume during the idle time. To access the
Idle Time Optimizer option, go to the Norton Internet
Security main window, and then click Settings >General > Norton Tasks > Idle Time Optimizer.
Turning off or turning on Idle Time Optimizer
Norton Internet Security automatically schedules the
optimization when it detects the installation of a new
application onyour computer. Norton Internet Security
runs this optimization only when your computer is
idle.
You canuse the Idle Time Optimizer option tooptimize
the bootvolume during idletime. Bydefault, this option
is turned on.
To turn off Idle Time Optimizer
1
In the Norton Internet Security main window,click
Settings.
2
In the Settings window, click the General tab.
3
In the left pane, click Norton Tasks.
4
In the Idle Time Optimizer row, move the On/Off
switch to the right to the Off position.
5
Click Apply, and then click OK.
To turn on Idle Time Optimizer
1
In the Norton Internet Security main window,click
Settings.
87Monitoring your system's performance
Monitoring your system's performance
88
About System Insight
2
In the Settings window, click the General tab.
3
In the left pane, click Norton Tasks.
4
In the Idle Time Optimizer row, move the On/Off
switch to the left to the On position.
5
Click Apply, and then click OK.
About the Norton Tasks
The NortonTasks window provides aninterface where
you can view and monitor all Norton-specific
background tasks.Norton Internet Security runs most
of the background tasks when your computer is idle.
The Norton Tasks window provides the details of the
background tasks that Norton Internet Security
performs.
The details include things such as:
1 The name of the Norton task
You can use the icon that appears before the name
of a background job to start or stop a background
task. Youcan startor stop a background task at any
time.
1 The timestamp of the Norton task
You can view details such as the date on which the
background job last ran and the time. These details
help you decide whether tostart a backgroundtask
or wait for Norton Internet Security to run the job
during idle time.
1 The duration of the Norton task
You can view the length of time that a Norton task
ran the last time. The details also help you
determine the length of time a background task
takes to complete if you start it.
1 The background task has run during idle time or
not
This detailhelps you determineif a task has already
run during idle time or you should run it.
1 The status of the Norton task
About System Insight
You can view details about the completion of the
task.
1 The power source that the Norton Task uses.
You can specify the type of power source that each
of the Norton Tasks uses. Use the Configure link
that is available next to the power source icon to
configure the power source for the Norton Tasks.
In addition to viewing and monitoring the background
task details,you can specifythe IdleTime Out duration.
After the Idle Time Out duration is reached, Norton
Internet Security identifies the computer as idle and
run the background tasks. You can use the IdleCountdown bar to confirm the idle state of your
computer.
You can also manually turn on Silent Mode for a
specified duration.
Monitoring background jobs of Norton Internet Security
The Norton Tasks window provides the details of the
background tasks that Norton Internet Security
performs and lets you view and monitor the
background tasks.Norton Internet Security runs most
of the background tasks when your computer is idle.
Performing all background tasks when your computer
is idle helps your computer to run at peak efficiency
when you use your computer. However, you can
manually start or stop a task at any time. You can also
specify theIdle Time Out duration. After the IdleTimeOut duration is reached, Norton Internet Security
identifies thecomputer as idleand runthe background
tasks. You can use the Idle Countdown bar to confirm
the idle state of your computer. You can also view the
CPU graph and memory graph to obtain the
performance data of your computer.
To monitor background jobs
1
In the Norton Internet Security main window,click
Performance.
2
In the Performance window, click Norton Tasks.
89Monitoring your system's performance
Monitoring your system's performance
90
About System Insight
3
In the Norton Tasks window, view the details of
background jobs.
4
Do one of the following:
1 To runa backgroundjob, clickthe Playicon that
1 To stopa running backgroundjob, click the Stop
5
Click Close.
About Power Source
You can choose the power source for Norton Internet
Security to perform the Norton Tasks when the
computer is idle. Norton Tasks are background tasks
that Norton Internet Security performs when your
computer is idle. Norton Tasks include Quick Scan,
Automatic LiveUpdate, Norton Community Watch,
Norton Insight, Full System Scan, Insight Optimizer,
and PulseUpdates. Norton Internet Security consumes
more power when it runs Norton Tasks.
By default, Norton Internet Security performs these
tasks only when your computer is connected to the
external power. For example, if you are in an airport,
and yourcomputer is running on batterypower, Norton
Internet Security does not perform the Norton Tasks.
In this way, you can extend the battery power of your
computer. However, you can choose the power source
for Norton Internet Security to perform the Norton
Tasks.
appears before the name of the background job.
icon that appears before the name of the
background job.
About System Insight
You can select one of the following options:
91Monitoring your system's performance
External
External and Battery
Allows the Norton Tasks to
run only when your computer
uses external power.
If you choose this option,
Norton Internet Security
performs the Norton Tasks
when the computer is idle
and connected to external
power.
Allows the Norton Tasks to
run irrespective if the
computer uses external
power or battery power.
If you choose this option,
Norton Internet Security
performs the Norton Tasks
when the computer is idle. It
does not consider the type of
power source the computer
uses.
You can configure the power source for each of the
Norton Tasks.
Configuring the Power Source
You can choose the power source for Norton Internet
Security to perform the Norton Tasks when the
computer is idle. Norton Tasks are background tasks
that Norton Internet Security performs when your
computer is idle.
By default, Norton Internet Security performs these
tasks only when your computer is connected to the
external power. You can configure the power source
for each of the Norton Tasks.
Monitoring your system's performance
92
About System Insight
To configure the power source
1
In the Norton Internet Security main window,click
Performance.
2
In the Performance window, in the left pane, click
Norton Tasks.
3
In the Norton Tasks window, under the Power
Source column, click the Configure link for the
Norton Task that you want to configure the power
source.
4
In the Power Source window, select one of the
following:
1 External
1 External and Battery
5
Click OK.
6
In the Norton Tasks window, click Close.
Allows the Norton Task to run only when your
computer uses external power.
Allows theNorton Task torun irrespective if the
computer usesexternal power or battery power.
If you choose this option, Norton Internet
Security performs the Norton Task when the
computer is idle. It does not consider the type of
power source the computer uses.
About Norton Insight
Norton Insight allows the smart scanning of files on
your computer.It improves the performance ofNorton
Internet Security scans by letting you scan fewer files
without compromising the security of your computer.
About System Insight
A Norton Internet Security scan can identify threats
on your computer in the following ways:
93Monitoring your system's performance
The Blacklist technique
At regular intervals, Norton
Internet Security obtains
definition updates from
Symantec. These updates
contain signatures of known
threats. Each time when Norton
Internet Security obtains the
definition updates, it performs
a scan of all of the files that are
available on your computer. It
compares the signature of the
files against the known threat
signatures to identify threats on
your computer.
Monitoring your system's performance
94
About System Insight
The Whitelist technique
Norton Internet Security obtains
specific information about the
Files of Interest and submits the
information to Symantec during
idle time. The information
includes things such as file
name, file size, and hash key.
Symantec analyzes the
information of each File of
Interest and its unique hash
value and provides a confidence
level to the file. The Symantec
server stores the hash value and
confidence level details of the
Files of Interest. The server
provides the details immediately
after you open the Norton
Insight - Application Ratings
window. Even the slightest
modification of the file causes a
change in the hash value and the
confidence level of the file.
Typically, most Files of Interest
belong to the operating system
or known applications, and they
never change. These files do not
require repeated scanning or
monitoring. For example,
Excel.exe is a file that never
changes but you always scan it
during a normal security scan.
About System Insight
Symantec assigns the following confidence levels to
Files of Interest:
95Monitoring your system's performance
Good
Unproven
Poor
Symantec analyzes the file as
good based on the statistical
evaluation that is done on the
files that are available within the
Norton Community.
Symantec rates the trusted files
as follows:
1 If the file has three green
bars, Symantec rates the file
as Norton Trusted.
The files that have three
green bars display a Norton
Trusted pop-up text when
you move the mouse pointer
over the green bars.
1 If the file has two green bars,
Symantec rates the file as
Good.
1 If the file has one green bar,
Symantec rates the file as
Favorable.
Symantec does not have enough
information about the file to
assign a trust level to the file.
Symantec has only a few
indications that the file is not
trusted.
Bad
Symantec has high indications
that the file is not trusted.
Norton Internet Security also provides different
profiles to configure your scan performance. When
you usethe FullScan profile, Norton InternetSecurity
Monitoring your system's performance
96
About System Insight
follows the Blacklist technique to scan your computer.
It scans all of the files on your computer against the
signatures that it obtained during definition updates.
When you use the Standard Trust or High Trust
profile, Norton Internet Security follows theWhitelist
technique to scan the files based on their confidence
level. This way, Norton Internet Security significantly
reduces thetime that isrequired toscan your computer
completely for security threats.
The Whitelist technique that Norton Insight uses also
helps in heuristic detection ofsuspicious applications.
Normally, the execution behavior of well-known
applications appearsidentical to the execution behavior
of unknownapplications. Such behaviorresults infalse
identification of good applications as suspicious, and
therefore, necessitates security applications to
maintain alow heuristic detection threshold. However,
keeping a low detection threshold does not provide a
complete heuristic protection against malicious
applications. Norton Internet Security uses the
Whitelist technique that helps maintain a high
heuristic detection threshold. It excludes well-known
applications from heuristic detection to prevent false
detection of well-known applications and to ensure a
high detection rate of malicious applications.
Viewing the files using Norton Insight
Norton Insightprovides information about the Files of
Interest that are available on your computer. Norton
Internet Security lets you view specific categories of
files based on the option that you select in the NortonInsight - Application Ratings window.
About System Insight
The drop-down list that is available in the Norton
Insight - Application Ratings window provides you
the following options:
97Monitoring your system's performance
All Running Processes
Startup Items
All Loaded Modules
Highest Performance Impact
Highest Community Usage
Lists the processes that run
on your computer at that
point in time when you
selected this option
Lists the Files of InterestAll Files
Lists the programs that start
when you start your
computer
Lists all the files and
programs that are currently
loaded on to the program
memory space
Lists the programs that
consume maximum resources
of your computer
Norton Internet Security
displays a list of top 10
resources that highly affect
the performance of your
computer.
Lists the files that have the
maximum community usage
Most Recently Discovered
Lists the files that you
installed most recently
The list contains the files that
you installed in the last 30
days after you installed
Norton Internet Security.
Monitoring your system's performance
98
About System Insight
User Trusted Files
Untrusted Files
Lists the Files of Interest that
you manually trusted in the
File Insight window
This category does not list
the files that do not belong
to the File of Interest even if
you manually trust the files.
However, Norton Internet
Security excludes all of the
manually trusted files from
Norton Internet Security scan
when you configure Scan
Performance Profiles to High
Trust.
You can also remove the user
trust from all of the Files of
Interest that you manually
trusted. You can use the
Clear All User Trust option
next to the drop-down list to
remove the user trust.
Lists the files that are not
Norton Trusted.
You can manually trust all the
files that are not trusted by
clicking the Trust All Files
option next to the drop-down
list.
You can view file details such as file name, trust level,
community usage, resource usage, and the stability
rating. There may be instances when the trust level of
a file has changed or a process running might have
stopped running. You can refresh the Norton Insight
- Application Ratings window to update the file list
and file details. The coverage meter provides a
graphical representation of the percentage of the
Norton TrustedFiles and thetotal Files of Interest. The
higher the percentage, the lesser time the scan takes.
To view the files using Norton Insight
1
In the Norton Internet Security main window,click
Advanced.
2
In theComputer Protection pane, click Application
Ratings.
3
In the Norton Insight - Application Ratings
window, select an option from the drop-down list
to view a category of files.
You may need to scroll the window to view all the
files that are listed in the details area.
4
Click Close.
To refresh the list of files
4
In the Norton Insight - Application Ratings
window, at the top of the file icon,click the Refresh
icon.
Checking the trust level of a file
Norton Insight lets you check the details of the Files
of Interest that are available on your computer. You
can view details such as signature of the file and the
date on which the file was installed. You can also view
details such as the trust level, stability details,
community usage, resource usage, and the source of
the file. You can use the Locate option to find the
location of the file on your computer. When you
right-click a file that isavailable on yourcomputer, the
shortcut menu displays Norton Internet Security
option and then Norton File Insight option. You can
use theoptions tocheck the details of a File ofInterest.
Norton Internet Security displays the Norton File
w
Insight option only when you right-click a File of
Interest. InWindows Safe mode, you cannotaccess this
option for any file. Norton Internet Security also
categorizes anyfile for whichyou open the FileInsight
window to view details as a File of Interest.
The Symantec server stores the hash value and trust
level details of the Fileof Interest. Theserver provides
the file detailsimmediately after you open the Norton
About System Insight
99Monitoring your system's performance
Monitoring your system's performance
100
About System Insight
Insight - Application Ratings window. However, you
can usethe Check Trust Now option inthe FileInsight
window to update the trust valueof a file. You can also
manually trust any well-known files. You can change
the trust level of any file to User Trusted other than
the files that are Norton Trusted.
You can determine the resource usage of a file that is
available on your computer. The File Insight window
displays theCPU graph andthe system resource usage
details forthe running processes.The graph shows the
breakdown of overall system CPU usage and the CPU
usage or memory usage by the process.
To check the trust level of a file
1
2
3
4
5
To check the trust level of a specific file
1
2
3
4
5
6
7
In the Norton Internet Security main window,click
Advanced.
In the window that appears, in the ComputerProtection pane, click Application Ratings.
In the Norton Insight - Application Ratings
window, click a file for whichyou want to check the
details.
In the File Insight window, view the details of the
file.
Click Close to close the File Insight window.
In the Norton Internet Security main window,click
Advanced.
In the window that appears, in the ComputerProtection pane, click Application Ratings.
In the Norton Insight - Application Ratings
window, click Check a Specific File.
Browse tothe location ofthe file for which youwant
to check the details.
Select the file, and then click Open.
In the File Insight window, view the details of the
file.
Click Close to close the File Insight window.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.