Symantec Norton Internet Security - 2012 User Manual

Product Manual
Care for our Environment, It's the right thing to do.
Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual is made from recycled materials.
NortonInternet Security Product Manual
The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
Documentation version 19.0
Copyright © 2011 Symantec Corporation. All rights reserved.
Symantec, theSymantec Logo,Norton, SONAR,LiveUpdate, Norton AntiSpam, NortonAntiVirus, NortonInternet Security, Norton 360, and NortonSystemWorks aretrademarks orregistered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Windows is a trademark of Microsoft Corporation. Portions of this product Copyright [1996-2008] Glyph & Cog, LLC. Other names may be trademarks of their respective owners.
The productdescribed inthis document isdistributed under licenses restricting itsuse, copying, distribution,and decompilation/reverse engineering. No part of this document may be reproduced in any form byany meanswithout priorwritten authorizationof Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED"AS IS" AND ALLEXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULARPURPOSE OR NON-INFRINGEMENT, AREDISCLAIMED, EXCEPT TOTHE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BELEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
Symantec Corporation 350 Ellis Street, Mountain View, CA 94043
http://www.symantec.com
Printed in the United States of America.
10 9 8 7 6 5 4 3 2 1
Norton License Agreement
NortonInternet Security
IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT (LICENSE AGREEMENT) CAREFULLY BEFORE USING THE SOFTWARE (AS DEFINED BELOW). SYMANTEC CORPORATION, IF YOU ARE LOCATED IN THE AMERICAS; OR SYMANTEC ASIA PACIFICPTE LTD, IF YOU ARE LOCATED IN THE ASIA PACIFIC RIM OR JAPAN;OR SYMANTEC LIMITED,IF YOU ARE LOCATED IN EUROPE, THE MIDDLE EAST OR AFRICA (SYMANTEC) IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THEINDIVIDUAL, THE COMPANY, OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE(REFERENCED BELOW AS YOUOR YOUR) ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT. THIS IS A LEGAL AND ENFORCEABLE CONTRACTBETWEEN YOU AND SYMANTEC. BY OPENING THIS PACKAGE, BREAKINGTHE SEAL, CLICKING THE I AGREEOR YESBUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY, OR LOADING THE SOFTWARE, YOU AGREE TO THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, CLICK THE CANCELOR NOOR CLOSE WINDOWBUTTON OR OTHERWISE INDICATE REFUSAL, MAKE NO FURTHER USE OF THE SOFTWARE, AND CONTACT YOUR VENDOROR SYMANTECCUSTOMER SERVICE, USING THE CONTACT DETAILS IN SECTION 10 OF THIS LICENSE AGREEMENT, FORINFORMATION ON HOW TO OBTAINA REFUND OFTHE MONEY YOU PAID FORTHE SOFTWARE (LESSSHIPPING, HANDLING, AND ANY APPLICABLE TAXES EXCEPT IN CERTAIN STATES AND COUNTRIES WHERESHIPPING, HANDLING, AND TAXES ARE REFUNDABLE) AT ANY TIME DURINGTHE SIXTY (60)DAY PERIOD FOLLOWING THE DATE OF PURCHASE.
1. License:
The software (including any accompanying features and services) and documentation
(including any product packaging) (the Documentation), that accompanies this License Agreement (collectively the Software) is the property of Symantec or its licensors, and is protected by copyright law. Although Symantec continues to own the Software, after Your acceptance of this License Agreement You will have certain rights touse the Software duringthe Service Period. The Service Periodshall begin on the date of Your initial installation of the Software on a computer, mobile or mobile computing device (a Device), regardless of the number ofcopies that You are permitted to use in accordance with Section 1.A of this License Agreement, and shall last for the period oftime setforth in theDocumentation or theapplicable transactiondocumentation from the authorized distributor or reseller from which You obtained the Software. The Software may automatically deactivate and become non-operational at the end of the Service Period, and You will not be entitled to receive any feature or content updates to the Software unless the Service Period is renewed. Subscriptions for renewals of the Service Periodwill be availablein accordance with Symantecs support policy posted at
http://www.symantec.com/norton/ support/technical_support_policy.jsp.
This License Agreement governs any releases, revisions,updates orenhancements to the Software that Symantec may make available to You. Except as may be modified by the Documentation, and subject to Symantecs right to terminate for Your breach pursuant to Section 9, Your rights and obligations under this License Agreement with respect to the use of this Software are as follows.
During the Service Period, You may:
A.use one copy of the Software on a single Device. If a greater number of copies and/or number of Devices is specified within the Documentation orthe applicabletransaction documentation from the authorized distributor or reseller from which You obtained the Software, You may use the
Software in accordance with such specifications;
B. makeone copy of the Softwarefor back-up or archival purposes, or copy the Software onto the hard diskof Your Device and retain the originalfor back-up orarchival purposes;
C. use the Software on a network, provided that Youhave a licensedcopy of the Software for each Devicethat can accessthe Software over that network;
D. permanently transferall of Yourrights in the Software granted under this License Agreement to another person or entity, provided that You retain no copies of the Software and the transferee agrees to the terms of this License Agreement. Partial transfer of Your rights under this License Agreement shall not be permitted. For example, if the applicable documentation grants You the right to use multiple copies of the Software, only atransfer of the rights to use all such copies of the Software would be valid; and
E. use the Software in accordance with any additional permitted uses which may be set forth below.
You may not, nor may you permit any other person to:
A. sublicense,rent or leaseany portion of the Software;
B. reverseengineer, decompile, disassemble, modify, translate, make any attempt to discover the source code of the Software or create derivative works from the Software;
C. use the Software as part of a facility management, timesharing, service provider or service bureau arrangement; or
D. usethe Software inany manner that isnot permitted pursuant to this License Agreement.
2. Software Feature and Content Updates:
A. You shall have the right to receive new features to the Software as Symantec, in its sole discretion,makes suchfeatures available with the Software during Your Service Period. Symantec continually strives to improve theusability and performanceof its products and services. In order to optimize
the SoftwareSymantec may, at its discretion and without notice, add, modify or remove features from the Software at any time.
B. Certain Software uses content that is updated fromtime totime, includingbut not limited to the following Software: antivirus and crimeware software use updated virus definitions; antispyware software uses updated spyware definitions; antispam software uses updated antispam rules; content filtering and antiphishing software use updatedURL lists;some firewall software use updated firewall rules; vulnerability assessment products use updated vulnerability data and web site authentication software uses updated lists of authenticated web pages; these updates are collectively referred to as Content Updates(or alternatively referred to as Protection Updatesor Security Updates at times). You shall have theright to receive Content Updates for the Software during Your Service Period.
3. Product Installation; Required Activation:
A. During the installation process, the Software may uninstall or disable other security products,or features thereof,if such products or features are incompatible with the Software or for purposes of improving the overall functionality of the Software.
B. There may be technological measures in this Software that are designed to prevent unlicensed orillegal use ofthe Software. You agree thatSymantec mayuse thesemeasures to protectSymantec against software piracy. This Software may contain enforcement technology that limits the ability to install and uninstallthe Software ona Device tonot more than a finite number of times for a finite number of Devices. This License Agreement and the Software containing enforcement technology may require activation as further set forth in the Documentation. If so, the Softwarewill only operate for a finite period of time prior to Software activation by You. During activation, You may be required to provide Your unique activation code accompanying the Softwareand Device configuration in the form of an alphanumeric code over the Internet to verify the authenticity of the Software. If You do not complete the activation within the finite periodof time set forth in the Documentation, or as prompted
by the Software, the Software will cease to function until activation is complete; at which time the Software functionality will be restored. In the event that You are not able to activate the Software over the Internet, or through any other method specified during the activation process, You may contact Symantec Customer Support using theinformation providedby Symantec during activation, or as set forth below.
5. Sixty (60) Day Money Back Guarantee:
If You are the original licensee of this copy of the Software and are not completely satisfied with it for any reason, please make no further use of the Software and contact Symantec Customer Service, using the contact details set out in Section 10 of this License Agreement, for a refund of the money You paid for the Software (less shipping, handling,and any applicabletaxes except in certain statesand countries where shipping, handlingand taxes are refundable) at any time during the sixty (60) day period following the date of purchase.
6. Limited Warranty:
Symantec warrants that any media manufactured by Symantec on which the Software is distributed will be free from defects for a period of sixty (60) days from the date of delivery of the Software to You. Your sole remedy in the event of a breach of this warranty will be that Symantec will, at its option, replace any defective media returned to Symantec within the warranty period or refund the money You paid for the Software. Symantec does not warrant that the Softwarewill meet Yourrequirements or that operation of the Software will be uninterrupted or that the Software will be error-free.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE ABOVE WARRANTY ISEXCLUSIVE AND INLIEU OF ALL OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY
FROM STATETO STATE AND COUNTRYTO COUNTRY.
7. Disclaimer of Damages:
SOME STATES AND COUNTRIES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE BELOW LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH HEREIN FAILSOF ITS ESSENTIALPURPOSE, IN NO EVENT WILL SYMANTEC OR ITS LICENSORS BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INDIRECT,OR SIMILAR DAMAGES,INCLUDING ANY LOST PROFITS OR LOST DATA ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE EVENIF SYMANTECHAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
IN NO CASE SHALL SYMANTECS OR ITS LICENSORSLIABILITY EXCEED THE PURCHASE PRICE WHICH YOU PAID FOR THE APPLICABLE SERVICE PERIOD. The disclaimers and limitations set forth above will apply regardless of whether You accept the Software.
8. U.S. Government Restricted Rights:
For U.S. Government procurements, the Software is deemed to be commercial computer software asdefined in FAR12.212 and subject to restricted rightsas defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, Rights in Commercial Computer Softwareor Commercial Computer Software Documentation,as applicable,and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Software by the U.S. Government shall be solely in accordance with the terms of this License Agreement.
9. Export Regulation:
You acknowledge that the Software and related technical data and services (collectively "Controlled Technology") may
be subject to the import and export laws of the UnitedStates, specifically theU.S. Export Administration Regulations (EAR), and the laws of any country where Controlled Technology is imported or re-exported. You agree to comply with all relevant laws and will not export any Controlled Technology in contravention to U.S. law nor to any prohibited country, entity, or person for which an export license or other governmental approval is required. All Symantec product is prohibited for export or re-exportto Cuba, NorthKorea, Iran, Syria and Sudan and to any country subject to relevant trade sanctions. USE OR FACILITATION OF SYMANTEC PRODUCT IN CONNECTION WITH ANY ACTIVITY INCLUDING, BUT NOT LIMITED TO, THE DESIGN, DEVELOPMENT, FABRICATION, TRAINING, OR TESTING OF CHEMICAL, BIOLOGICAL, OR NUCLEAR MATERIALS, OR MISSILES,DRONES, OR SPACE LAUNCH VEHICLES CAPABLE OF DELIVERING WEAPONS OF MASS DESTRUCTION IS PROHIBITED, IN ACCORDANCE WITH U.S. LAW.
10. General:
This License Agreement will begoverned by the laws of the State of California, United States of America. This License Agreement is the entire agreement between You and Symantec relating to the Software and: (i) supersedes allprior orcontemporaneous oral or written communications, proposals, and representations with respect to its subject matter; and (ii) prevails overany conflicting or additional terms of any quote, order, acknowledgment, orsimilar communications between the parties. Notwithstanding the foregoing, nothingin thisLicense Agreement will diminishany rightsYou may haveunder existing consumer protection legislation or other applicable laws in Your jurisdiction that may not be waived by contract. This License Agreement shall terminate upon Your breach of any term contained in this License Agreement and You shall cease use of and destroy all copies of theSoftware and Documentation. The disclaimers of warranties and damages and limitations on liability shall survive termination. This License Agreement may onlybe modified by the Documentationor bya writtendocument that has been signed by both You and Symantec. Should You have any questions concerning thisLicense Agreement,or if You desire to contact Symantec for any reason,
please write to Symantec Customer Service, 555 International Way, Springfield, OR 97477, U.S.A. or visit the Support page at t www.symantec.com.
ADDITIONAL TERMS AND CONDITIONS
Your use of the Software is subject to the terms and conditions below in addition to those stated above.
11. Privacy; Data Protection:
From time to time, the Software may collect certain information from the Device on which it is installed, which may include:
Information on potential security risks as well as URLs of websites visited that the Software deems potentially fraudulent. The URLs could contain personally identifiable information that a potentially fraudulent website isattempting to obtain without Your permission. This information is collected by Symantec for the purpose of delivering the functionalities of the software, and also for evaluating and improving the ability of Symantecs products to detect malicious behavior, potentiallyfraudulent websitesand other Internet security risks. URLs of websites visited as well as search keywords and search results only if the Norton Safe Web feature is enabled. This information is collected by Symantec for the purpose of providing protection and of evaluating and advising Youregarding potentialthreats and risks thatmay be associatedwith a particular Web site before You view it.
Executable files and files that contain executable content that are identified as potential malware,including informationon the actions taken by such files at the time of installation. These files are submitted to Symantec using the Softwares automatic submission function.The collectedfiles could contain personally identifiable information that has been obtained by the malware without Your permission. Files of this type are being collectedby Symantec onlyfor the purpose of improving the ability of Symantecs products to detect malicious behavior. Such automatic submission function maybe deactivatedafter installation by following the instructions in the Documentation for applicable products.
The name given to the Device during the initial setup of such Device. If collected, the name willbe usedby Symantec as an account name for the Device under which You may elect to receive additional services and/or under which You may use certain features of the Software. You may change such account name at any time after installation of the Software (recommended).
Status information regarding installation and operation of the Software. This information indicates to Symantec whether installation ofthe Software wassuccessfully completed as well as whether the Software has encountered an error. The status information could contain personally identifiable information only if such information is included in the name of the file or folderencountered by theSoftware at the time of installation or error. The status information iscollected by Symantec for the purpose of evaluating and improving Symantecs product performance and installation successrate. Symantec mayalso use this information to optimize its web-pages.
Information contained in email messages that you send through the Software to Symantec toreport as spamor as incorrectly identified as spam. These email messages may contain personally identifiable information and will be sent to Symantec only with your permission, and will not be sent automatically. If you send such messages to Symantec, Symantec will use them only for the purpose of improving the detection ability of Symantecs antispam technology. Symantecwill notcorrelate these files with any other personally identifiable information.
Information contained in a report that You may choose to send throughthe Software to Symantec when the Software encounters a problem. The report includes information regarding thestatus ofboth the Softwareand Your Device at the time that the Software encountered the problem. The status information about Your Device may include the systemlanguage, countrylocale, and the operating systemversion for YourDevice, as well as the processes running, their status and performanceinformation, anddata from files or folders that wereopen at the timethe Software encountered the problem. The information could contain personally identifiable information ifsuch information is included in, or is a part of the name of the
files or folders open atthe time the Software encountered the problem. This information will be sent to Symantec only with Your permission, and will not be sent automatically. The information is collected by Symantec for the purpose of correcting the encountered problem and improving Symantecs product performance. This information will not be correlated with any personally identifiable information.
The Internet Protocol (IP) address and/or Media AccessControl (MAC) addressand the Machine ID of the computer on which the Software is installed to enable the Software to function and for license administration purposes.
Other general, statistical information used for product analysis, and for improving product functionality.
Unless itis expressly definedas optional, the collected information as set out above is necessary forthe purposeof the functionality of Symantecs products.
Information may be transferred to the Symantec groupin theUnited Statesor other countries that mayhave less protectivedata protection lawsthan the region in whichYou are situated (including the European Union) and may be accessible by Symantec employees or contractors exclusively to be used in accordance with the purposes described above. For the same purposes the information may be shared with partners and vendors that process information on behalf of Symantec. Symantec has taken steps so that the collected information, if transferred, receives an adequate level of protection.
Subject toapplicable laws,Symantec reserves the right tocooperate with any legal process and any law enforcement or other government inquiry related to your use of this Software. This means that Symantec may provide documents and information relevant to a court subpoena or to a law enforcement or other government investigation. Inorder topromote awareness, detection andprevention ofInternet security risks, Symantec may share certain information withresearch organizationsand other security software vendors. Symantec may also use statistics derived from the information to track and publish reports on security risk trends. By using the Software, You acknowledge and agree that Symantec
may collect, transmit, store, disclose and analyze suchinformation forthese purposes.
CPS / S 5.0 / USE

Contents

Chapter 1 Getting started .... . . .. . . .. . . .. . ... . .. . . .. . . .. . . .. . . . 13
Activation protects you . . .. . . .. . . .. . . .. . . .. . . .. . . .. . 13
About Norton Internet Security main
window ... . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. 17
About your Norton Account . .. . . .. . . .. . ... . ... . .. . . 33
About Norton Community Watch .. . .. . . .. . . .. . . .. 39
About Norton Bootable Recovery
Tool .. . ... . ... . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . 41
Starting NortonInternet Security fromthe
command prompt . . .. . . .. . . .. . ... . ... . .. . . .. . . . 46
About the Norton Internet Security
icon . . .. . . .. . . .. . . .. . . .. . . .. . ... . ... . .. . . .. . . .. . . .. . 46
About LiveUpdate ... . . .. . . .. . . .. . . .. . . .. . ... . .. . . .. . . 49
About Network Proxy settings . .. . . .. . . .. . . .. . . .. . . 60
Chapter 2 Monitoring your system's
performance .. .. . . .. . . .. . . .. . ... . .. . . .. . . .. . . .. 65
About System Insight .. . ... . ... . .. . . .. . . .. . . .. . . .. . . . 65
Chapter 3 Protecting your files and data .. . . .. . . .. . . .. . . 107
About maintaining protection . .. . . .. . . .. . ... . ... 107
About the Norton Internet Security
scans .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . ... . .. 110
Contents10
Chapter 4 Responding to security issues . .. . .. . . .. . . .. . . 179
What to do if a security risk is found . .. . . .. . . .. 179
Chapter 5 Protecting Internet activities ... . . .. . . .. . . .. . . 193
About the Smart Firewall .. .. . . .. . . .. . . .. . . .. . . .. . 193
About Download Insight .. . . .. . ... . ... . .. . . .. . . .. . . 233
About Intrusion Prevention . .. . . .. . . .. . . .. . . .. . . . 244
About Vulnerability Protection .. . . .. . . .. . . .. . . .. 251
About the types of security risks . .. . . .. . . .. . . .. . 254
About Norton AntiSpam . . . .. . . .. . . .. . . .. . . .. . . .. . . 255
About configuring POP3 and SMTP
ports . .. . ... . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . . 269
About the Network Security Map . .. . . .. . . .. . . .. . 272
About Metered Broadband Mode . .. . .. . . .. . . .. . . 297
Chapter 6 Securing your sensitive data . .. . . .. . . .. . . .. . .. 301
About securing your sensitive data . .. . . .. . . .. . . 301
Chapter 7 Monitoring protection features . .. . .. . . .. . . .. 371
About Security History . . ... . .. . . .. . . .. . . .. . . .. . . .. 371
Chapter 8 Customizing protection features . .. . . .. . . .. . 407
Feature summary .. .. . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. 407
About turning off automatic features .. . .. . ... . 416
About customizing settings and
options .. . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . ... . 422
Chapter 9 Finding additional solutions .. .. . . .. . . .. . . .. . . 473
Finding the version number of your
product .. . ... . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . 473
Finding the End-User License
Agreement .. . . .. . . .. . . .. . . .. . ... . .. . . .. . . .. . . .. 474
About upgrading your product . .. . . .. . . .. . . .. . . .. 474
About Norton Autofix . .. . . .. . . .. . . .. . . .. . . .. . ... . .. 477
Staying informed about protection
issues . .. . . .. . . .. . ... . ... . .. . . .. . . .. . . .. . . .. . . .. . . 479
About Support . .. . . .. . . .. . . .. . . .. . . .. . ... . .. . . .. . . .. . 481
About uninstalling . . . .. . . .. . . .. . ... . .. . . .. . . .. . . .. . . 486
Index . .. . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . ... . .. . . .. . . .. . 491
11Contents
Contents12

Getting started

This chapter includes the following topics:
1 Activation protects you
1 About Norton Internet Security main window
1 About your Norton Account
1 About Norton Community Watch
1 About Norton Bootable Recovery Tool
1 Starting Norton Internet Security from the
command prompt
1 About the Norton Internet Security icon
1 About LiveUpdate
1
1 About Network Proxy settings

Activation protects you

Product activation is a technology that protects users from pirated or counterfeit software. It protects you by limitingthe use ofa product to those userswho have acquired the product legitimately. Product activation requires a product key for each installation of a product. Youmust activate the product withina limited time period after you install it.
Getting started
14
Activation protects you
If youare connected tothe Internet, product activation takes place automatically when you start the product for the first time after installation. After activation, the Norton Account window appears. You can create your Norton Account and register your product.
If you are not connected to the Internet, you can click Try Later in the Activation not complete window to start your product. The Activation window reappears every time you start your product until you activate your product. If you choosenot to activate at that time, you receive an alert that reminds you to activate the product. You can also activate your product from the Norton Internet Security main window.
If you do not activate the product within the time
w
period that the alert specifies, the product stops working. You can activate it after the time period has elapsed, but you are not protected until you activate the product.
Activating your product
If youdid not activateyour product during installation, you receive an activation-needed alert regularly until you activate the product.
Product activationreduces software piracy and ensures that you use authentic Symantec software. Activation provides you witha specified period ofsubscription to your Norton product. You can also renew your subscription to continue using Norton Internet Security.
You mustactivate your productwithin the time period
w
that the alert specifies, oryour product stopsworking.
You can activate your product directly from the activation-needed alert or from the main window. Activation should take only a few minutes.
During activation, the Norton Account window appears. You can create your Norton Account and register your product. You can also view details, such as yourproduct key, your registration date,and recent
Activation protects you
updates tothe product. Ifyou skip the NortonAccount window, the product is activated, but the product key is not saved in the Norton Account. You can print the product key to reinstall your product in the future.
To activate your product from the alert
1
In the alert, do one of the following:
1 If you purchased a subscription version of a
retail product or the product came installed on
your computer, select Activate Now
(Recommended).
1 If you want to renew the subscription of your
product, select Renew Now.
You can also activate or renew the subscription of your product from any non-admin user account.
2
Click OK.
3
Follow the on-screen instructions to activate or renew your product.
4
In the window that appears, click Done.
To activate your product from the main window
1
In the Norton Internet Security main window, do one of the following:
1 If you purchased a subscription version of a
retail product, click Activate Now.
1 If the productcame installed on your computer,
click Activate Online Now.
1 If you want to renew the subscription of your
product, click Renew.
You can also activate or renew the subscription of your product from any non-admin user account.
2
Follow the on-screen instructions to activate or subscribe your product.
3
In the window that appears, click Done.
15Getting started
Where to find your product key
The productkey is aunique key that helps youto install and activate the Symantec product on your computer.
Getting started
16
Activation protects you
The productkey isa 25-characteralphanumeric string that is shown in five groups of five characters each, separated by hyphens. The location ofthe product key varies depending on how you acquired the product.
The locations of the product key are as follows:
If you purchased a retail copy of the product on CD
If you purchased the product on DVD
If you downloaded the product from the Symantec Store
If your computer came with the product already installed
If you received a product key card
The product key is either on a sticker on the CD sleeve or on an insert in the product package.
The product key is on the DVD package.
The product key is stored on your computer as part of the download process and is included in the confirmation email from the Symantec Store.
The product key is provided as part of the activation process. Be sure to save your product key by creating or signing in to your Norton Account, or by printing the key. You may need the product key if you ever want to reinstall your product.
The product key is printed on the card along with instructions on how to use it. Be sure to save your product key by creating or signing in to your Norton Account. You need the product key if you ever want to reinstall the product.

About Norton Internet Security main window

17Getting started
If you are still unable to locate your product key, you can recover it using Norton Account
About problems during activation
If you cannot connect to the Symantec servers to activate your product, first check your Internet connection. You then need to see if you have parental control software, either installed or through your ISP, that might block the connection.
A connectivity problem can occur if you use parental control software. If you suspect that parental controls might block the connection, you can configure the parental controls so that they do not block the activation procedure. You need to log in to your parental control software or to the Internet through your ISP as an administrator to change your configuration.
If you use a proxy server to connect to the Internet, you must configure the proxy settings. To use the ProxyServer option, go to the NortonInternet Security main window, and then click Settings > Network > NetworkSecurity Settings > Proxy Server > Configure.
To recover or access your product key log on to https://www.mynortonaccount.com. If you are not registered, register for Norton Account. You can find the product key on the Products tab in the Norton Account page.
About Norton Internet Security main window
The Norton Internet Security main window acts as a security management interface. You can access the main features and monitor the performance of your computer from the main window.
Getting started
18
About Norton Internet Security main window
You can find the following items in the main window:
System Status
Settings
Performance
Lets you view the overall protection status of your computer.
When your system status is Secure, your computer is fully protected. When your system status is at Attention state, ensure that you fix all the issues. When your system status is at At Risk state, you must take immediate actions to fix the issues.
Lets you access the Settings window.
You can view and configure various options to customize the Norton Internet Security settings.
Lets you access the Performance window.
The Performance window displays a chronicle representation of all the installs, downloads, optimizations, detections, alerts, and instances of Quick Scan. The window also displays a detailed graphical representation of CPU and memory usage by your Norton product.
About Norton Internet Security main window
19Getting started
Feedback
Account
Support
Lets you provide feedback on the product on a Symantec Web page.
This feature may not be
w
available in some versions of Norton Internet Security.
Lets you create or access your Norton Account.
Norton Account lets you manage all of your Norton products in one place.
This feature may not be
w
available in some versions of Norton Internet Security.
Lets you access the Norton Autofix window that provides you various support options.
You can also access the online Help from the Support drop-down menu. Help provides links to information that assists you with the specific tasks that you want to complete. The online Help guides you to configure all of the product features.
You can also access the products version number.
Getting started
20
About Norton Internet Security main window
You can use the following options to perform the important tasks in Norton Internet Security:
Scan Now
LiveUpdate
Lets you access different types of scans to protect your computer and your sensitive data.
By using the Scan Now option, you can run the following types of scans:
1 Computer Scan
Lets you run different computer scans including
Quick Scan, Full System Scan, and Custom Scan.
1 Reputation Scan
Lets you run different reputation scans including
Quick Scan, Full System Scan, and Custom Scan.
1 Scan Facebook Wall
Lets you scan News Feeds on your Facebook Wall periodically to protect you from malicious links.
Lets you run LiveUpdate to download the latest virus definitions and program updates.
Norton Internet Security uses the latest virus definitions from Symantec servers to detect and remove latest security threats.
About Norton Internet Security main window
21Getting started
Advanced
Lets you access the Norton Internet Security advanced window.
By using the Norton Internet Security advanced window, you can do the following:
1 Run different scans. 1 View Security History. 1 View the quarantined items
in the Security History window.
1 View Norton Insight -
Application Ratings.
1 View the list of programs
that are vulnerable on your computer and find how Norton protects you from the program vulnerabilities.
1 View and configure Network
Security Map.
1 Manage logins and cards. 1 Configure parental controls.
In addition, you can choose to turn on or turn off the protection features from this window.
The bottom section of the Norton Internet Security main windowprovides youup-to-date virus and threat information. When your system status is At Risk or
Attention, thissection automaticallyprovides youthe Fix Now option to fix all the issues at once.
Getting started
22
About Norton Internet Security main window
The bottom section of the Norton Internet Security main window helps you do the following:
Activity Map
Lets you access the world map with hotspots of cybercrimes and the latest threats.
The Activity Map shows the top cities in the world where most of the cybercrime activities occur. These cities are represented as yellow dots on the map. You can click a continent in the world map to view its cities with the highest number of threats. The details on the Activity Map are updated from a Symantec server on a regular basis. Your computer must be connected to the Internet to receive the activity map updates.
You can view the date and time that the Activity Map was last updated. You can also use the Details link to get a brief idea of the Activity Map.
When you click Details, the Activity Map shows a series of latest viruses and threats that your product protects your computer from. You can use the info link next to each item to view its details in an overlay window. You can also use the View Details link in the overlay window to know more about the threat in a Symantec Web page.
About Norton Internet Security main window
Online Family
23Getting started
Getting started
24
About Norton Internet Security main window
Lets you monitor your childs activities on the Internet.
Norton Online Family
w
may not be available in some versions of Norton Internet Security.
When you click the Online Family icon on the main window, the bottom section of the Norton Internet Security main window displays Norton Online Family sign in options. Norton Online Family provides you advanced controls to monitor your child's online activities.
You can use the link on the bottom section of the Norton Internet Security main window to set up your account with Norton Online Family.
Symantec recommends that you use your Norton Account login credentials to sign in to Norton Online Family. If you register your product with your Norton Account, your Norton Account email address is auto-filled in the email address text box.
After you set up your account, you can sign in to your account on the bottom section of the Norton Internet Security main window and view your childs Internet activities. The bottom section of the Norton Internet Security main window shows
About Norton Internet Security main window
details such as your childs latest search terms, and the latest alerts. After you sign in, you can use the Get Details option in the bottom section of the Norton Internet Security main window to view more details on the Norton Online Family Web site.
25Getting started
Manage
Lets you access Norton Management.
Norton Management lets you manage your Norton products on all of your devices from one location. Click the Manage icon at the bottom of the main window to sign up for or log into Norton Management. The Norton Management agent should be installed on each device that you want to add to Norton Management. You can use your existing Norton Account login information to access Norton Management.
Norton Management
w
may not be available in some versions of Norton Internet Security.
Getting started
26
About Norton Internet Security main window
Mobile
Backup
Lets you download the Norton Mobile Security for Android.
You can use Norton Mobile Security on all your devices that use Android operating system.
Norton Mobile Security
w
may not be available in some versions of Norton Internet Security.
Lets you set up the Norton Online Backup account or access your online backup status.
Norton Online Backup
w
may not be available in some versions of Norton Internet Security.
When you click the Backup icon on the main window, the bottom section displays Norton Online Backup options. Norton Online Backup provides a secure online backup solution that safeguards your important data against system crash, accidental deleting, virus infection, and other disasters. You can access or restore the backed up data from any computer that is connected to the Internet.
About Norton Internet Security main window
Safe Web
27Getting started
Getting started
28
About Norton Internet Security main window
Lets you check the safety of a Web site.
You can also perform a safe search.
This option may not be
w
available with some versions of Norton Internet Security.
When you click the Safe Web icon on the main window, the bottom section of the Norton Internet Security main window displays Norton Safe Web options.
You can use the Check Site option in the bottom section of the Norton Internet Security main window to analyze the security levels of any Web site that you want to visit. When you type a Web site address in the text box and click Check Site, it shows the Symantecs ratings for the Web site.
You can use the Safe Search option in the bottom section of the Norton Internet Security main window to search for information on the Internet. The Norton Safe Search uses Ask.com to generate the search results. Norton Safe Search provides a site safety status and a Norton rating for each of the search results generated.
You can also use the View
recent Norton Safe Web activity option in the bottom
About Norton Internet Security main window
section of the Norton Internet Security main window to view the recent Norton Safe Web statistics on malicious sites and URLs. You can also view the list of new malicious URLs.
Your activation status or subscription status appears at the bottom of the main window. You can use the Activate Now option to activate or subscribe your Norton product.
About the Norton Internet Security advanced window
The Norton Internet Security advanced window acts as a security management interface. The options in this windowhelp you address all theimportant security and performanceissues of yourcomputer. The options are classified in different panes. Each pane contains the important features that you can easily access or configure from this window.
29Getting started
Getting started
30
About Norton Internet Security main window
The panes are:
Computer Protection
Network Protection
Web Protection
Provides you the essential computer protection options.
It also contains links to scan your computer, view the history of protection events, and manage quarantined items. You can also view the
Norton Insight - Application Ratings window and improve
the performance of Norton Internet Security scans.
In addition, you can run LiveUpdate. It also displays the updates availability as to when the last virus definitions were updated.
Provides you the essential network protection options.
It also contains links to the list of vulnerable programs and Network Security Map.
Provides you the essential Web protection options.
It also contains links to managing logins and credit cards. In addition, you can monitor and manage the computer usage and Internet activities of your child.
The parental control
w
feature is not available in some of the versions of Norton Internet Security.
Loading...
+ 474 hidden pages