Symantec Norton Internet Security - 2012 User Manual

Product Manual
Care for our Environment, It's the right thing to do.
Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual is made from recycled materials.
NortonInternet Security Product Manual
The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
Documentation version 19.0
Copyright © 2011 Symantec Corporation. All rights reserved.
Symantec, theSymantec Logo,Norton, SONAR,LiveUpdate, Norton AntiSpam, NortonAntiVirus, NortonInternet Security, Norton 360, and NortonSystemWorks aretrademarks orregistered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Windows is a trademark of Microsoft Corporation. Portions of this product Copyright [1996-2008] Glyph & Cog, LLC. Other names may be trademarks of their respective owners.
The productdescribed inthis document isdistributed under licenses restricting itsuse, copying, distribution,and decompilation/reverse engineering. No part of this document may be reproduced in any form byany meanswithout priorwritten authorizationof Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED"AS IS" AND ALLEXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULARPURPOSE OR NON-INFRINGEMENT, AREDISCLAIMED, EXCEPT TOTHE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BELEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
Symantec Corporation 350 Ellis Street, Mountain View, CA 94043
http://www.symantec.com
Printed in the United States of America.
10 9 8 7 6 5 4 3 2 1
Norton License Agreement
NortonInternet Security
IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT (LICENSE AGREEMENT) CAREFULLY BEFORE USING THE SOFTWARE (AS DEFINED BELOW). SYMANTEC CORPORATION, IF YOU ARE LOCATED IN THE AMERICAS; OR SYMANTEC ASIA PACIFICPTE LTD, IF YOU ARE LOCATED IN THE ASIA PACIFIC RIM OR JAPAN;OR SYMANTEC LIMITED,IF YOU ARE LOCATED IN EUROPE, THE MIDDLE EAST OR AFRICA (SYMANTEC) IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THEINDIVIDUAL, THE COMPANY, OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE(REFERENCED BELOW AS YOUOR YOUR) ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT. THIS IS A LEGAL AND ENFORCEABLE CONTRACTBETWEEN YOU AND SYMANTEC. BY OPENING THIS PACKAGE, BREAKINGTHE SEAL, CLICKING THE I AGREEOR YESBUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY, OR LOADING THE SOFTWARE, YOU AGREE TO THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, CLICK THE CANCELOR NOOR CLOSE WINDOWBUTTON OR OTHERWISE INDICATE REFUSAL, MAKE NO FURTHER USE OF THE SOFTWARE, AND CONTACT YOUR VENDOROR SYMANTECCUSTOMER SERVICE, USING THE CONTACT DETAILS IN SECTION 10 OF THIS LICENSE AGREEMENT, FORINFORMATION ON HOW TO OBTAINA REFUND OFTHE MONEY YOU PAID FORTHE SOFTWARE (LESSSHIPPING, HANDLING, AND ANY APPLICABLE TAXES EXCEPT IN CERTAIN STATES AND COUNTRIES WHERESHIPPING, HANDLING, AND TAXES ARE REFUNDABLE) AT ANY TIME DURINGTHE SIXTY (60)DAY PERIOD FOLLOWING THE DATE OF PURCHASE.
1. License:
The software (including any accompanying features and services) and documentation
(including any product packaging) (the Documentation), that accompanies this License Agreement (collectively the Software) is the property of Symantec or its licensors, and is protected by copyright law. Although Symantec continues to own the Software, after Your acceptance of this License Agreement You will have certain rights touse the Software duringthe Service Period. The Service Periodshall begin on the date of Your initial installation of the Software on a computer, mobile or mobile computing device (a Device), regardless of the number ofcopies that You are permitted to use in accordance with Section 1.A of this License Agreement, and shall last for the period oftime setforth in theDocumentation or theapplicable transactiondocumentation from the authorized distributor or reseller from which You obtained the Software. The Software may automatically deactivate and become non-operational at the end of the Service Period, and You will not be entitled to receive any feature or content updates to the Software unless the Service Period is renewed. Subscriptions for renewals of the Service Periodwill be availablein accordance with Symantecs support policy posted at
http://www.symantec.com/norton/ support/technical_support_policy.jsp.
This License Agreement governs any releases, revisions,updates orenhancements to the Software that Symantec may make available to You. Except as may be modified by the Documentation, and subject to Symantecs right to terminate for Your breach pursuant to Section 9, Your rights and obligations under this License Agreement with respect to the use of this Software are as follows.
During the Service Period, You may:
A.use one copy of the Software on a single Device. If a greater number of copies and/or number of Devices is specified within the Documentation orthe applicabletransaction documentation from the authorized distributor or reseller from which You obtained the Software, You may use the
Software in accordance with such specifications;
B. makeone copy of the Softwarefor back-up or archival purposes, or copy the Software onto the hard diskof Your Device and retain the originalfor back-up orarchival purposes;
C. use the Software on a network, provided that Youhave a licensedcopy of the Software for each Devicethat can accessthe Software over that network;
D. permanently transferall of Yourrights in the Software granted under this License Agreement to another person or entity, provided that You retain no copies of the Software and the transferee agrees to the terms of this License Agreement. Partial transfer of Your rights under this License Agreement shall not be permitted. For example, if the applicable documentation grants You the right to use multiple copies of the Software, only atransfer of the rights to use all such copies of the Software would be valid; and
E. use the Software in accordance with any additional permitted uses which may be set forth below.
You may not, nor may you permit any other person to:
A. sublicense,rent or leaseany portion of the Software;
B. reverseengineer, decompile, disassemble, modify, translate, make any attempt to discover the source code of the Software or create derivative works from the Software;
C. use the Software as part of a facility management, timesharing, service provider or service bureau arrangement; or
D. usethe Software inany manner that isnot permitted pursuant to this License Agreement.
2. Software Feature and Content Updates:
A. You shall have the right to receive new features to the Software as Symantec, in its sole discretion,makes suchfeatures available with the Software during Your Service Period. Symantec continually strives to improve theusability and performanceof its products and services. In order to optimize
the SoftwareSymantec may, at its discretion and without notice, add, modify or remove features from the Software at any time.
B. Certain Software uses content that is updated fromtime totime, includingbut not limited to the following Software: antivirus and crimeware software use updated virus definitions; antispyware software uses updated spyware definitions; antispam software uses updated antispam rules; content filtering and antiphishing software use updatedURL lists;some firewall software use updated firewall rules; vulnerability assessment products use updated vulnerability data and web site authentication software uses updated lists of authenticated web pages; these updates are collectively referred to as Content Updates(or alternatively referred to as Protection Updatesor Security Updates at times). You shall have theright to receive Content Updates for the Software during Your Service Period.
3. Product Installation; Required Activation:
A. During the installation process, the Software may uninstall or disable other security products,or features thereof,if such products or features are incompatible with the Software or for purposes of improving the overall functionality of the Software.
B. There may be technological measures in this Software that are designed to prevent unlicensed orillegal use ofthe Software. You agree thatSymantec mayuse thesemeasures to protectSymantec against software piracy. This Software may contain enforcement technology that limits the ability to install and uninstallthe Software ona Device tonot more than a finite number of times for a finite number of Devices. This License Agreement and the Software containing enforcement technology may require activation as further set forth in the Documentation. If so, the Softwarewill only operate for a finite period of time prior to Software activation by You. During activation, You may be required to provide Your unique activation code accompanying the Softwareand Device configuration in the form of an alphanumeric code over the Internet to verify the authenticity of the Software. If You do not complete the activation within the finite periodof time set forth in the Documentation, or as prompted
by the Software, the Software will cease to function until activation is complete; at which time the Software functionality will be restored. In the event that You are not able to activate the Software over the Internet, or through any other method specified during the activation process, You may contact Symantec Customer Support using theinformation providedby Symantec during activation, or as set forth below.
5. Sixty (60) Day Money Back Guarantee:
If You are the original licensee of this copy of the Software and are not completely satisfied with it for any reason, please make no further use of the Software and contact Symantec Customer Service, using the contact details set out in Section 10 of this License Agreement, for a refund of the money You paid for the Software (less shipping, handling,and any applicabletaxes except in certain statesand countries where shipping, handlingand taxes are refundable) at any time during the sixty (60) day period following the date of purchase.
6. Limited Warranty:
Symantec warrants that any media manufactured by Symantec on which the Software is distributed will be free from defects for a period of sixty (60) days from the date of delivery of the Software to You. Your sole remedy in the event of a breach of this warranty will be that Symantec will, at its option, replace any defective media returned to Symantec within the warranty period or refund the money You paid for the Software. Symantec does not warrant that the Softwarewill meet Yourrequirements or that operation of the Software will be uninterrupted or that the Software will be error-free.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE ABOVE WARRANTY ISEXCLUSIVE AND INLIEU OF ALL OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY
FROM STATETO STATE AND COUNTRYTO COUNTRY.
7. Disclaimer of Damages:
SOME STATES AND COUNTRIES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE BELOW LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH HEREIN FAILSOF ITS ESSENTIALPURPOSE, IN NO EVENT WILL SYMANTEC OR ITS LICENSORS BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INDIRECT,OR SIMILAR DAMAGES,INCLUDING ANY LOST PROFITS OR LOST DATA ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE EVENIF SYMANTECHAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
IN NO CASE SHALL SYMANTECS OR ITS LICENSORSLIABILITY EXCEED THE PURCHASE PRICE WHICH YOU PAID FOR THE APPLICABLE SERVICE PERIOD. The disclaimers and limitations set forth above will apply regardless of whether You accept the Software.
8. U.S. Government Restricted Rights:
For U.S. Government procurements, the Software is deemed to be commercial computer software asdefined in FAR12.212 and subject to restricted rightsas defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, Rights in Commercial Computer Softwareor Commercial Computer Software Documentation,as applicable,and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Software by the U.S. Government shall be solely in accordance with the terms of this License Agreement.
9. Export Regulation:
You acknowledge that the Software and related technical data and services (collectively "Controlled Technology") may
be subject to the import and export laws of the UnitedStates, specifically theU.S. Export Administration Regulations (EAR), and the laws of any country where Controlled Technology is imported or re-exported. You agree to comply with all relevant laws and will not export any Controlled Technology in contravention to U.S. law nor to any prohibited country, entity, or person for which an export license or other governmental approval is required. All Symantec product is prohibited for export or re-exportto Cuba, NorthKorea, Iran, Syria and Sudan and to any country subject to relevant trade sanctions. USE OR FACILITATION OF SYMANTEC PRODUCT IN CONNECTION WITH ANY ACTIVITY INCLUDING, BUT NOT LIMITED TO, THE DESIGN, DEVELOPMENT, FABRICATION, TRAINING, OR TESTING OF CHEMICAL, BIOLOGICAL, OR NUCLEAR MATERIALS, OR MISSILES,DRONES, OR SPACE LAUNCH VEHICLES CAPABLE OF DELIVERING WEAPONS OF MASS DESTRUCTION IS PROHIBITED, IN ACCORDANCE WITH U.S. LAW.
10. General:
This License Agreement will begoverned by the laws of the State of California, United States of America. This License Agreement is the entire agreement between You and Symantec relating to the Software and: (i) supersedes allprior orcontemporaneous oral or written communications, proposals, and representations with respect to its subject matter; and (ii) prevails overany conflicting or additional terms of any quote, order, acknowledgment, orsimilar communications between the parties. Notwithstanding the foregoing, nothingin thisLicense Agreement will diminishany rightsYou may haveunder existing consumer protection legislation or other applicable laws in Your jurisdiction that may not be waived by contract. This License Agreement shall terminate upon Your breach of any term contained in this License Agreement and You shall cease use of and destroy all copies of theSoftware and Documentation. The disclaimers of warranties and damages and limitations on liability shall survive termination. This License Agreement may onlybe modified by the Documentationor bya writtendocument that has been signed by both You and Symantec. Should You have any questions concerning thisLicense Agreement,or if You desire to contact Symantec for any reason,
please write to Symantec Customer Service, 555 International Way, Springfield, OR 97477, U.S.A. or visit the Support page at t www.symantec.com.
ADDITIONAL TERMS AND CONDITIONS
Your use of the Software is subject to the terms and conditions below in addition to those stated above.
11. Privacy; Data Protection:
From time to time, the Software may collect certain information from the Device on which it is installed, which may include:
Information on potential security risks as well as URLs of websites visited that the Software deems potentially fraudulent. The URLs could contain personally identifiable information that a potentially fraudulent website isattempting to obtain without Your permission. This information is collected by Symantec for the purpose of delivering the functionalities of the software, and also for evaluating and improving the ability of Symantecs products to detect malicious behavior, potentiallyfraudulent websitesand other Internet security risks. URLs of websites visited as well as search keywords and search results only if the Norton Safe Web feature is enabled. This information is collected by Symantec for the purpose of providing protection and of evaluating and advising Youregarding potentialthreats and risks thatmay be associatedwith a particular Web site before You view it.
Executable files and files that contain executable content that are identified as potential malware,including informationon the actions taken by such files at the time of installation. These files are submitted to Symantec using the Softwares automatic submission function.The collectedfiles could contain personally identifiable information that has been obtained by the malware without Your permission. Files of this type are being collectedby Symantec onlyfor the purpose of improving the ability of Symantecs products to detect malicious behavior. Such automatic submission function maybe deactivatedafter installation by following the instructions in the Documentation for applicable products.
The name given to the Device during the initial setup of such Device. If collected, the name willbe usedby Symantec as an account name for the Device under which You may elect to receive additional services and/or under which You may use certain features of the Software. You may change such account name at any time after installation of the Software (recommended).
Status information regarding installation and operation of the Software. This information indicates to Symantec whether installation ofthe Software wassuccessfully completed as well as whether the Software has encountered an error. The status information could contain personally identifiable information only if such information is included in the name of the file or folderencountered by theSoftware at the time of installation or error. The status information iscollected by Symantec for the purpose of evaluating and improving Symantecs product performance and installation successrate. Symantec mayalso use this information to optimize its web-pages.
Information contained in email messages that you send through the Software to Symantec toreport as spamor as incorrectly identified as spam. These email messages may contain personally identifiable information and will be sent to Symantec only with your permission, and will not be sent automatically. If you send such messages to Symantec, Symantec will use them only for the purpose of improving the detection ability of Symantecs antispam technology. Symantecwill notcorrelate these files with any other personally identifiable information.
Information contained in a report that You may choose to send throughthe Software to Symantec when the Software encounters a problem. The report includes information regarding thestatus ofboth the Softwareand Your Device at the time that the Software encountered the problem. The status information about Your Device may include the systemlanguage, countrylocale, and the operating systemversion for YourDevice, as well as the processes running, their status and performanceinformation, anddata from files or folders that wereopen at the timethe Software encountered the problem. The information could contain personally identifiable information ifsuch information is included in, or is a part of the name of the
files or folders open atthe time the Software encountered the problem. This information will be sent to Symantec only with Your permission, and will not be sent automatically. The information is collected by Symantec for the purpose of correcting the encountered problem and improving Symantecs product performance. This information will not be correlated with any personally identifiable information.
The Internet Protocol (IP) address and/or Media AccessControl (MAC) addressand the Machine ID of the computer on which the Software is installed to enable the Software to function and for license administration purposes.
Other general, statistical information used for product analysis, and for improving product functionality.
Unless itis expressly definedas optional, the collected information as set out above is necessary forthe purposeof the functionality of Symantecs products.
Information may be transferred to the Symantec groupin theUnited Statesor other countries that mayhave less protectivedata protection lawsthan the region in whichYou are situated (including the European Union) and may be accessible by Symantec employees or contractors exclusively to be used in accordance with the purposes described above. For the same purposes the information may be shared with partners and vendors that process information on behalf of Symantec. Symantec has taken steps so that the collected information, if transferred, receives an adequate level of protection.
Subject toapplicable laws,Symantec reserves the right tocooperate with any legal process and any law enforcement or other government inquiry related to your use of this Software. This means that Symantec may provide documents and information relevant to a court subpoena or to a law enforcement or other government investigation. Inorder topromote awareness, detection andprevention ofInternet security risks, Symantec may share certain information withresearch organizationsand other security software vendors. Symantec may also use statistics derived from the information to track and publish reports on security risk trends. By using the Software, You acknowledge and agree that Symantec
may collect, transmit, store, disclose and analyze suchinformation forthese purposes.
CPS / S 5.0 / USE

Contents

Chapter 1 Getting started .... . . .. . . .. . . .. . ... . .. . . .. . . .. . . .. . . . 13
Activation protects you . . .. . . .. . . .. . . .. . . .. . . .. . . .. . 13
About Norton Internet Security main
window ... . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. 17
About your Norton Account . .. . . .. . . .. . ... . ... . .. . . 33
About Norton Community Watch .. . .. . . .. . . .. . . .. 39
About Norton Bootable Recovery
Tool .. . ... . ... . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . 41
Starting NortonInternet Security fromthe
command prompt . . .. . . .. . . .. . ... . ... . .. . . .. . . . 46
About the Norton Internet Security
icon . . .. . . .. . . .. . . .. . . .. . . .. . ... . ... . .. . . .. . . .. . . .. . 46
About LiveUpdate ... . . .. . . .. . . .. . . .. . . .. . ... . .. . . .. . . 49
About Network Proxy settings . .. . . .. . . .. . . .. . . .. . . 60
Chapter 2 Monitoring your system's
performance .. .. . . .. . . .. . . .. . ... . .. . . .. . . .. . . .. 65
About System Insight .. . ... . ... . .. . . .. . . .. . . .. . . .. . . . 65
Chapter 3 Protecting your files and data .. . . .. . . .. . . .. . . 107
About maintaining protection . .. . . .. . . .. . ... . ... 107
About the Norton Internet Security
scans .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . ... . .. 110
Contents10
Chapter 4 Responding to security issues . .. . .. . . .. . . .. . . 179
What to do if a security risk is found . .. . . .. . . .. 179
Chapter 5 Protecting Internet activities ... . . .. . . .. . . .. . . 193
About the Smart Firewall .. .. . . .. . . .. . . .. . . .. . . .. . 193
About Download Insight .. . . .. . ... . ... . .. . . .. . . .. . . 233
About Intrusion Prevention . .. . . .. . . .. . . .. . . .. . . . 244
About Vulnerability Protection .. . . .. . . .. . . .. . . .. 251
About the types of security risks . .. . . .. . . .. . . .. . 254
About Norton AntiSpam . . . .. . . .. . . .. . . .. . . .. . . .. . . 255
About configuring POP3 and SMTP
ports . .. . ... . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . . 269
About the Network Security Map . .. . . .. . . .. . . .. . 272
About Metered Broadband Mode . .. . .. . . .. . . .. . . 297
Chapter 6 Securing your sensitive data . .. . . .. . . .. . . .. . .. 301
About securing your sensitive data . .. . . .. . . .. . . 301
Chapter 7 Monitoring protection features . .. . .. . . .. . . .. 371
About Security History . . ... . .. . . .. . . .. . . .. . . .. . . .. 371
Chapter 8 Customizing protection features . .. . . .. . . .. . 407
Feature summary .. .. . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. 407
About turning off automatic features .. . .. . ... . 416
About customizing settings and
options .. . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . ... . 422
Chapter 9 Finding additional solutions .. .. . . .. . . .. . . .. . . 473
Finding the version number of your
product .. . ... . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . 473
Finding the End-User License
Agreement .. . . .. . . .. . . .. . . .. . ... . .. . . .. . . .. . . .. 474
About upgrading your product . .. . . .. . . .. . . .. . . .. 474
About Norton Autofix . .. . . .. . . .. . . .. . . .. . . .. . ... . .. 477
Staying informed about protection
issues . .. . . .. . . .. . ... . ... . .. . . .. . . .. . . .. . . .. . . .. . . 479
About Support . .. . . .. . . .. . . .. . . .. . . .. . ... . .. . . .. . . .. . 481
About uninstalling . . . .. . . .. . . .. . ... . .. . . .. . . .. . . .. . . 486
Index . .. . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . ... . .. . . .. . . .. . 491
11Contents
Contents12

Getting started

This chapter includes the following topics:
1 Activation protects you
1 About Norton Internet Security main window
1 About your Norton Account
1 About Norton Community Watch
1 About Norton Bootable Recovery Tool
1 Starting Norton Internet Security from the
command prompt
1 About the Norton Internet Security icon
1 About LiveUpdate
1
1 About Network Proxy settings

Activation protects you

Product activation is a technology that protects users from pirated or counterfeit software. It protects you by limitingthe use ofa product to those userswho have acquired the product legitimately. Product activation requires a product key for each installation of a product. Youmust activate the product withina limited time period after you install it.
Getting started
14
Activation protects you
If youare connected tothe Internet, product activation takes place automatically when you start the product for the first time after installation. After activation, the Norton Account window appears. You can create your Norton Account and register your product.
If you are not connected to the Internet, you can click Try Later in the Activation not complete window to start your product. The Activation window reappears every time you start your product until you activate your product. If you choosenot to activate at that time, you receive an alert that reminds you to activate the product. You can also activate your product from the Norton Internet Security main window.
If you do not activate the product within the time
w
period that the alert specifies, the product stops working. You can activate it after the time period has elapsed, but you are not protected until you activate the product.
Activating your product
If youdid not activateyour product during installation, you receive an activation-needed alert regularly until you activate the product.
Product activationreduces software piracy and ensures that you use authentic Symantec software. Activation provides you witha specified period ofsubscription to your Norton product. You can also renew your subscription to continue using Norton Internet Security.
You mustactivate your productwithin the time period
w
that the alert specifies, oryour product stopsworking.
You can activate your product directly from the activation-needed alert or from the main window. Activation should take only a few minutes.
During activation, the Norton Account window appears. You can create your Norton Account and register your product. You can also view details, such as yourproduct key, your registration date,and recent
Activation protects you
updates tothe product. Ifyou skip the NortonAccount window, the product is activated, but the product key is not saved in the Norton Account. You can print the product key to reinstall your product in the future.
To activate your product from the alert
1
In the alert, do one of the following:
1 If you purchased a subscription version of a
retail product or the product came installed on
your computer, select Activate Now
(Recommended).
1 If you want to renew the subscription of your
product, select Renew Now.
You can also activate or renew the subscription of your product from any non-admin user account.
2
Click OK.
3
Follow the on-screen instructions to activate or renew your product.
4
In the window that appears, click Done.
To activate your product from the main window
1
In the Norton Internet Security main window, do one of the following:
1 If you purchased a subscription version of a
retail product, click Activate Now.
1 If the productcame installed on your computer,
click Activate Online Now.
1 If you want to renew the subscription of your
product, click Renew.
You can also activate or renew the subscription of your product from any non-admin user account.
2
Follow the on-screen instructions to activate or subscribe your product.
3
In the window that appears, click Done.
15Getting started
Where to find your product key
The productkey is aunique key that helps youto install and activate the Symantec product on your computer.
Getting started
16
Activation protects you
The productkey isa 25-characteralphanumeric string that is shown in five groups of five characters each, separated by hyphens. The location ofthe product key varies depending on how you acquired the product.
The locations of the product key are as follows:
If you purchased a retail copy of the product on CD
If you purchased the product on DVD
If you downloaded the product from the Symantec Store
If your computer came with the product already installed
If you received a product key card
The product key is either on a sticker on the CD sleeve or on an insert in the product package.
The product key is on the DVD package.
The product key is stored on your computer as part of the download process and is included in the confirmation email from the Symantec Store.
The product key is provided as part of the activation process. Be sure to save your product key by creating or signing in to your Norton Account, or by printing the key. You may need the product key if you ever want to reinstall your product.
The product key is printed on the card along with instructions on how to use it. Be sure to save your product key by creating or signing in to your Norton Account. You need the product key if you ever want to reinstall the product.

About Norton Internet Security main window

17Getting started
If you are still unable to locate your product key, you can recover it using Norton Account
About problems during activation
If you cannot connect to the Symantec servers to activate your product, first check your Internet connection. You then need to see if you have parental control software, either installed or through your ISP, that might block the connection.
A connectivity problem can occur if you use parental control software. If you suspect that parental controls might block the connection, you can configure the parental controls so that they do not block the activation procedure. You need to log in to your parental control software or to the Internet through your ISP as an administrator to change your configuration.
If you use a proxy server to connect to the Internet, you must configure the proxy settings. To use the ProxyServer option, go to the NortonInternet Security main window, and then click Settings > Network > NetworkSecurity Settings > Proxy Server > Configure.
To recover or access your product key log on to https://www.mynortonaccount.com. If you are not registered, register for Norton Account. You can find the product key on the Products tab in the Norton Account page.
About Norton Internet Security main window
The Norton Internet Security main window acts as a security management interface. You can access the main features and monitor the performance of your computer from the main window.
Getting started
18
About Norton Internet Security main window
You can find the following items in the main window:
System Status
Settings
Performance
Lets you view the overall protection status of your computer.
When your system status is Secure, your computer is fully protected. When your system status is at Attention state, ensure that you fix all the issues. When your system status is at At Risk state, you must take immediate actions to fix the issues.
Lets you access the Settings window.
You can view and configure various options to customize the Norton Internet Security settings.
Lets you access the Performance window.
The Performance window displays a chronicle representation of all the installs, downloads, optimizations, detections, alerts, and instances of Quick Scan. The window also displays a detailed graphical representation of CPU and memory usage by your Norton product.
About Norton Internet Security main window
19Getting started
Feedback
Account
Support
Lets you provide feedback on the product on a Symantec Web page.
This feature may not be
w
available in some versions of Norton Internet Security.
Lets you create or access your Norton Account.
Norton Account lets you manage all of your Norton products in one place.
This feature may not be
w
available in some versions of Norton Internet Security.
Lets you access the Norton Autofix window that provides you various support options.
You can also access the online Help from the Support drop-down menu. Help provides links to information that assists you with the specific tasks that you want to complete. The online Help guides you to configure all of the product features.
You can also access the products version number.
Getting started
20
About Norton Internet Security main window
You can use the following options to perform the important tasks in Norton Internet Security:
Scan Now
LiveUpdate
Lets you access different types of scans to protect your computer and your sensitive data.
By using the Scan Now option, you can run the following types of scans:
1 Computer Scan
Lets you run different computer scans including
Quick Scan, Full System Scan, and Custom Scan.
1 Reputation Scan
Lets you run different reputation scans including
Quick Scan, Full System Scan, and Custom Scan.
1 Scan Facebook Wall
Lets you scan News Feeds on your Facebook Wall periodically to protect you from malicious links.
Lets you run LiveUpdate to download the latest virus definitions and program updates.
Norton Internet Security uses the latest virus definitions from Symantec servers to detect and remove latest security threats.
About Norton Internet Security main window
21Getting started
Advanced
Lets you access the Norton Internet Security advanced window.
By using the Norton Internet Security advanced window, you can do the following:
1 Run different scans. 1 View Security History. 1 View the quarantined items
in the Security History window.
1 View Norton Insight -
Application Ratings.
1 View the list of programs
that are vulnerable on your computer and find how Norton protects you from the program vulnerabilities.
1 View and configure Network
Security Map.
1 Manage logins and cards. 1 Configure parental controls.
In addition, you can choose to turn on or turn off the protection features from this window.
The bottom section of the Norton Internet Security main windowprovides youup-to-date virus and threat information. When your system status is At Risk or
Attention, thissection automaticallyprovides youthe Fix Now option to fix all the issues at once.
Getting started
22
About Norton Internet Security main window
The bottom section of the Norton Internet Security main window helps you do the following:
Activity Map
Lets you access the world map with hotspots of cybercrimes and the latest threats.
The Activity Map shows the top cities in the world where most of the cybercrime activities occur. These cities are represented as yellow dots on the map. You can click a continent in the world map to view its cities with the highest number of threats. The details on the Activity Map are updated from a Symantec server on a regular basis. Your computer must be connected to the Internet to receive the activity map updates.
You can view the date and time that the Activity Map was last updated. You can also use the Details link to get a brief idea of the Activity Map.
When you click Details, the Activity Map shows a series of latest viruses and threats that your product protects your computer from. You can use the info link next to each item to view its details in an overlay window. You can also use the View Details link in the overlay window to know more about the threat in a Symantec Web page.
About Norton Internet Security main window
Online Family
23Getting started
Getting started
24
About Norton Internet Security main window
Lets you monitor your childs activities on the Internet.
Norton Online Family
w
may not be available in some versions of Norton Internet Security.
When you click the Online Family icon on the main window, the bottom section of the Norton Internet Security main window displays Norton Online Family sign in options. Norton Online Family provides you advanced controls to monitor your child's online activities.
You can use the link on the bottom section of the Norton Internet Security main window to set up your account with Norton Online Family.
Symantec recommends that you use your Norton Account login credentials to sign in to Norton Online Family. If you register your product with your Norton Account, your Norton Account email address is auto-filled in the email address text box.
After you set up your account, you can sign in to your account on the bottom section of the Norton Internet Security main window and view your childs Internet activities. The bottom section of the Norton Internet Security main window shows
About Norton Internet Security main window
details such as your childs latest search terms, and the latest alerts. After you sign in, you can use the Get Details option in the bottom section of the Norton Internet Security main window to view more details on the Norton Online Family Web site.
25Getting started
Manage
Lets you access Norton Management.
Norton Management lets you manage your Norton products on all of your devices from one location. Click the Manage icon at the bottom of the main window to sign up for or log into Norton Management. The Norton Management agent should be installed on each device that you want to add to Norton Management. You can use your existing Norton Account login information to access Norton Management.
Norton Management
w
may not be available in some versions of Norton Internet Security.
Getting started
26
About Norton Internet Security main window
Mobile
Backup
Lets you download the Norton Mobile Security for Android.
You can use Norton Mobile Security on all your devices that use Android operating system.
Norton Mobile Security
w
may not be available in some versions of Norton Internet Security.
Lets you set up the Norton Online Backup account or access your online backup status.
Norton Online Backup
w
may not be available in some versions of Norton Internet Security.
When you click the Backup icon on the main window, the bottom section displays Norton Online Backup options. Norton Online Backup provides a secure online backup solution that safeguards your important data against system crash, accidental deleting, virus infection, and other disasters. You can access or restore the backed up data from any computer that is connected to the Internet.
About Norton Internet Security main window
Safe Web
27Getting started
Getting started
28
About Norton Internet Security main window
Lets you check the safety of a Web site.
You can also perform a safe search.
This option may not be
w
available with some versions of Norton Internet Security.
When you click the Safe Web icon on the main window, the bottom section of the Norton Internet Security main window displays Norton Safe Web options.
You can use the Check Site option in the bottom section of the Norton Internet Security main window to analyze the security levels of any Web site that you want to visit. When you type a Web site address in the text box and click Check Site, it shows the Symantecs ratings for the Web site.
You can use the Safe Search option in the bottom section of the Norton Internet Security main window to search for information on the Internet. The Norton Safe Search uses Ask.com to generate the search results. Norton Safe Search provides a site safety status and a Norton rating for each of the search results generated.
You can also use the View
recent Norton Safe Web activity option in the bottom
About Norton Internet Security main window
section of the Norton Internet Security main window to view the recent Norton Safe Web statistics on malicious sites and URLs. You can also view the list of new malicious URLs.
Your activation status or subscription status appears at the bottom of the main window. You can use the Activate Now option to activate or subscribe your Norton product.
About the Norton Internet Security advanced window
The Norton Internet Security advanced window acts as a security management interface. The options in this windowhelp you address all theimportant security and performanceissues of yourcomputer. The options are classified in different panes. Each pane contains the important features that you can easily access or configure from this window.
29Getting started
Getting started
30
About Norton Internet Security main window
The panes are:
Computer Protection
Network Protection
Web Protection
Provides you the essential computer protection options.
It also contains links to scan your computer, view the history of protection events, and manage quarantined items. You can also view the
Norton Insight - Application Ratings window and improve
the performance of Norton Internet Security scans.
In addition, you can run LiveUpdate. It also displays the updates availability as to when the last virus definitions were updated.
Provides you the essential network protection options.
It also contains links to the list of vulnerable programs and Network Security Map.
Provides you the essential Web protection options.
It also contains links to managing logins and credit cards. In addition, you can monitor and manage the computer usage and Internet activities of your child.
The parental control
w
feature is not available in some of the versions of Norton Internet Security.
About Norton Internet Security main window
You can view the different protection features on the right side of the window. You can move your mouse pointer over each feature to view a brief summary about the feature. You can also choose to ignore or monitor the protection status of a feature. You can choose to turn on or turn off the protection features from this window.
You can also monitor the overall system CPU usage and the Norton-specific CPU usage in this window.
Responding to System Status indicators
Norton InternetSecurity displays the overall protection status of your computer as System Status at the top of the main window. When the System Status needs attention or is at risk, you can take appropriate action to improve the System Status. Your computer protection is based on the programs that are installed on your computer. To improve your protection status, ensure that your installed programs are up to date.
The System Status indicator displays the following statuses:
31Getting started
Secure
Attention
At Risk
Indicates that your computer and activities are protected from threats, risks, and damage.
Indicates that your computer and activities require attention.
Take appropriate action to improve your protection status.
Indicates that your computer and activities are at risk.
Take immediate action to improve your protection status.
Getting started
32
About Norton Internet Security main window
You can respond to the System Status indicators directly from the main window.
To respond to System Status indicators from the main window
1
In the bottom section of the Norton Internet Security main window, click Fix Now.
2
Follow the on-screen instructions.
Monitoring the protection status of a feature
The Norton Internet Security main window acts as a security management interface. You can access the main features and monitor the performance of your computer from the main window.
At times, you may want to turn off any option for a particular purpose. But by doing so, the status of your system changesto Attentionor AtRisk. In suchcases, you can ignore the protection status of a particular feature to maintain a healthy overall system status. For example, you want to turnoff Browser Protection for a limited period, and you still want the system status to be Secure. In this case, you can ignore the protection statusof BrowserProtection and then,turn off the option. When you ignore the protection status of a feature, it does not affect the overall System Status.
You can also monitor the protection status of the feature that has been ignored at any time.
You canignore or monitorthe protection status of only selected featuresthat are availablein themain window.
The features are:
1 Antivirus
1 Antispyware
1 SONAR Protection
1 Smart Firewall
1 Intrusion Prevention
1 Email Protection

About your Norton Account

1 Browser Protection
1 Safe Surfing
To monitor the protection status of a feature
1
In the Norton Internet Security main window,click Advanced.
2
In the window that appears, move your mouse pointer over the feature name.
3
In the pop-upthat appears, do oneof the following:
1 To ignore the protection status of the feature
that affects your computers overall health
evaluation, click Ignore.
1 To monitor the protection status of the feature
that has been ignored, click Monitor.
About your Norton Account
When you create a Norton Account, you can manage all of your Norton products inone place. You can store your product keys in your Norton Account and also buy additionalproduct keys. Youcan also register your product with the Norton Account. It takes only a few moments to create your Norton Account. You must be connected to the Internet to create a Norton Account.
After you create a Norton Account, you can accessand manage your account information and product information from anywhere. It helps to reinstall your products and download the latest version of the products. If you install your producton more than one PC, you can use the same Norton Account. To access your Norton Account, go to the following URL:
https://www.mynortonaccount.com
You cancreate a Norton Account inthe following ways:
1 During activation
You can create your Norton Account and register your product from the Norton Account window that appears when you activate the product. You
33Getting started
Getting started
34
About your Norton Account
must provide your account information in the Norton Account window that appears.
1 Any time after activation
If you skip the Norton Account window during activation, you can create a Norton Account any time after activation. You can create your Norton Account and register your product from the Account link that appears at the top of the Norton Internet Security main window.
After you log in to your Norton Account, you can manage your product information with the following options:
Products
Order History
Saves the information for all of the Norton products that you own.
The Products tab provides you the information about the Norton products that you own and the expiration date. You can click the arrow icon against a product for more information such as product key and the registration date. You can also buy a new product key to protect additional computers. You can use the Update option to check and download the latest product version using Norton Update Center.
Contains order information of the Norton products you bought from Norton online store.
About your Norton Account
35Getting started
Profile
Saves your account information and your billing details.
The Profile options are:
1 Account Information
You can update your Norton Account information and your shipping address on the Account Information tab. After you update, click Update to save the changes.
1 Billing Information
You can save your credit card information and your billing address on the Billing Information tab. It makes it easier for saving online orders. After you update, click Update to save the changes.
1 Change Password
You can change your current Norton Account password on the Change Password tab.
You can use the icons at the bottom of your Norton Account Web page to access and use the following:
Norton Online Family
Norton Online Family monitors and manages your child's Internet activities and computer usage.
Getting started
36
About your Norton Account
Norton Online Backup
Norton Safe Web
Norton.com
Norton Update Center
Norton Online Backup provides a secure and easy-to-use online backup solution that safeguards your important data against system crash, accidental deleting, virus infection, and other disasters.
Norton Safe Web checks the safety of a Web site and lets you perform a safe Web search.
The Symantec Web site provides more information about the various products of Symantec, the latest updates on Internet security, and various support options.
Norton Update Center checks and lets you download the latest version of your Norton product.
If you forget your Norton Account password, you can get a temporary password by clicking the Forgot your password link in the Norton Account sign-in Web page. Youneed to provide your emailaddress. You need to use the same email address that you provided when you created your Norton Account. Symantec sends a temporary password to your email address. You can use the temporary password for a limited time period. You must reset your password after you log in to your Norton Account.
Creating a Norton Account
Your Norton Account stores the product key and the billing information of your product. You can also register your product with the Norton Account.
In addition, Norton Account helps you to do the following:
1 Access the product key and other product
information when you need it.
1 Reinstall your Norton product.
1 Buy additionalproduct keys foryour homeor office.
1 Check and download the latest version of the
product by using Norton Update Center.
1 Save online orders and update billing information.
1 Log in to other product add-ons such as Norton
Online Family and Norton Online Backup.
Your computer must be connected to the Internet to create a Norton Account. If you use a proxy server to connect to the Internet, you must configure the proxy settings. To configure the proxy settings of your network, go to the Norton Internet Security main window, and then click Settings> Network > Network Security Settings > Proxy Server > Configure.
You can also create a Norton Account when you activate your product. When you create your Norton Account fromthe product, your product getsregistered in your account. If you have an existing Norton Account, you can provide the same email address in the NortonAccount window in yourproduct. Thisway, you can register your current product and add it to the list of Norton products in your existing Norton Account. Ifyou upgrade your registered productto the latest available version, your product remains registered to the same Norton Account. In this case, you cancontinue using thesame NortonAccount login credentials.
Symantec products that are older than the 2006
w
product year do not appear in your Norton Account.
About your Norton Account
37Getting started
Getting started
38
About your Norton Account
To create a Norton Account from the Norton Account Web page
1
In the Norton Internet Security main window,click Account.
2
In theNorton Account Web page that appears, click Sign up now.
3
In the Norton Account Sign Up Web page, provide the details about your account information, and then click Sign Up.
To create a Norton Account and register your product after activation
1
In the Norton Internet Security main window,click Account.
2
In theComplete Your Activation window, type your email address, and then click Next.
3
In theCreate your Norton Account window, provide your account details, and then click Next. Your productinformation gets saved in yourNorton Account only after you log in to your Norton Account.
4
In the window that appears, click Done.
To log in to your Norton Account and access your product information, visit https://www.mynortonaccount.com.
Accessing your Norton Account
The product key for each Norton product is conveniently storedin your Norton Account. Afteryou have created your Norton Account successfully, you can access your account from anywhere in the world. You can log in to your Norton Account any time by visiting the following URL:
https://www.mynortonaccount.com
You can easily find and update your account, product, and billing information from your Norton Account. You can also change your Norton Account password,

About Norton Community Watch

if required. Your computer must be connected to the Internet to access your Norton Account.
Symantec products that are older than the 2006
w
product year do not appear in your Norton Account.
To access Norton Account
1
In the Norton Internet Security main window,click Account.
2
In the Web page that appears, type your email address and password, and click Sign In.
About Norton Community Watch
Norton Community Watch helps in identifying new security risks by submitting selected security and application data to Symantec for analysis. Symantec assesses the data to determine the new threats and their sources. The collective efforts from Norton security product users help in quick identification of solutions for these threats and risks. Norton Community Watchimproves user security and product functionality. Inaddition, it helpsSymantec to analyze the execution, schedule, and efficiency of Norton-specific tasks and settings on your computer.
Norton Community Watch collects and submits the following types of data:
1 Identified malicious software such as portable
executable files and running processes
1 Any Web site URL that your product identifies as
fraudulent
1 All the Web site URLs that you visited before the
detection of a risk
1 The applications and processes that run on your
computer regularly and during any security risk detection
1 Response instances that your computer sends to
any potential security risk
39Getting started
Getting started
40
About Norton Community Watch
1 General system information and performance
1 General information about your computer such as
After thepotential security risksare assessed from the submitted data, Symantec sends the information back to Norton InternetSecurity. The Norton features such as Norton Insight and Insight Network use this information to identify files and processes at risk.
You should participate in Norton Community Watch submissions to provide valuable contribution to the entire community that uses Norton security products. Symantec maintains an adequate level of protection for the collected information. To allow or deny the detailed data submissions, you must configure the
Detailed Error Data Collection option under Norton CommunityWatch. To access the DetailedError Data Collection option, go the Norton Internet Securitymain window, and then click Settings > General > Other Settings> Detailed Error Data Collection. The detailed
data mayvary depending on the Norton-specificerrors and components. You can configure the option to manage the data submissions.
Norton CommunityWatch collectsand submits detailed
w
data aboutthe Norton-specific errors and components only. It does not collect or store any personal information of any user.
If youchose not to join NortonCommunity Watchwhen you installed your Norton product, you can turn it on later. Toaccess theNorton CommunityWatch option, go to the Norton Internet Security main window, and then clickSettings > General> Other Settings> Norton Community Watch. You can also review the data, which Norton Community Watch collects and submits to Symantec, in the Security History window.
attributes from the computer
idle time, standby, and screensaver settings

About Norton Bootable Recovery Tool

About Norton Bootable Recovery Tool
Norton Bootable Recovery Tool scans and removes viruses, spyware, and other security risks from your computer. Your computer might be infected with a virus ifyou experienceany ofthe followingsymptoms:
1 You cannot install Norton Internet Security.
1 You cannot start your computer.
1 Your computer is extremely slow.
Norton Bootable Recovery Tool is integrated with Windows Preinstallation Environment (WinPE). Therefore, youcan run Norton Bootable RecoveryTool only froma CD,DVD, or USB key. You must useNorton Bootable Recovery Tool Wizard to create the Norton Bootable Recovery Tool CD, DVD, or USB key.
You cannot run Norton Bootable Recovery Tool in
w
WinPE for more than 72 hours. If you run Norton Bootable Recovery Tool for more than 72 hours, your computer restarts without any notification.
You can use the Norton Bootable Recovery Tool CD, DVD, orUSB key to recover a computer thatis infected with viruses and other security threats. This security program isnot a replacement for continuous,real-time protection from viruses and latest security risks. To protect your computer from future infections, be sure to install or continue using Norton Internet Security that you already purchased.
Norton Bootable Recovery Tool detects and resolves the following security threats:
41Getting started
Viruses
Programs that infect another program, boot sector, partition sector, or document by inserting themselves or attaching themselves to that medium. Most viruses just replicate; many also do damage.
Getting started
42
About Norton Bootable Recovery Tool
Trojan horses
Hacking tools
Spyware
Adware
Programs containing malicious codes that are disguised as or hiding in something benign, such as a game or utility.
Tools that are used by a hacker to gain unauthorized access to your computer. One type of hacking tool, a keystroke logger, tracks and records your individual keystrokes and can send this information back to the hacker.
Programs that can scan systems or monitor activity and relay the information to other computers or locations in cyberspace.
Programs that facilitate the delivery of advertising content through their own window, or by using another program's interface.
About Norton Bootable Recovery Tool
43Getting started
Trackware
Programs that track system activity, gather system information, or track user habits, and relay this information to third-party organizations. The information that is gathered by such programs is neither personally identifiable nor confidential. Trackware programs are installed with the user's consent, and may also be packaged as part of other software that is installed by the user.
Downloading the Norton Bootable Recovery Tool Wizard
If your attempt to install a Norton product fails, you can download the Norton Bootable Recovery Tool Wizard. This easy-to-use wizard helps you create Norton Bootable Recovery Tool on a CD, DVD, or USB key. You can use Norton Bootable Recovery Tool to scan your computer and remove any security threats that prevent successful installation.
It is recommended that you download and install Norton Bootable Recovery Tool Wizard on a computer that does not have any security threats and create Norton Bootable Recovery Tool. If you create Norton Bootable RecoveryTool on an infected computer,there is a chance that the recovery CD, DVD, or USB key might get infected.
To use Norton Bootable Recovery Tool, you must use
w
the product key of the Norton product that you purchased. Ifyou usea trial version of NortonInternet Security, you need to create a Norton Account to receive aproduct key touse Norton Bootable Recovery Tool.
Getting started
44
About Norton Bootable Recovery Tool
You can download Norton Bootable Recovery Tool Wizard in one of the following ways:
1 From the Start menu.
1 From the Norton Support Web site.
To download the Norton Bootable Recovery Tool Wizard from the Start menu
1
On the Windows taskbar, do one of the following:
1 In WindowsXP, click Start >Programs > Norton
1 In Windows Vista or Windows 7, click Start >
2
Follow the on-screen instructions.
To download the Norton Bootable Recovery Tool Wizard from the Internet
1
Open your Web browser, and go to the following URL: http://www.norton.com/recoverytool
2
Follow the on-screen instructions.
To download the Norton Bootable Recovery Tool Wizard from Norton Internet Security
1
In the Norton Internet Security main window,click Scan Now.
2
In theComputer Scan pane, do oneof the following:
1 Click Quick Scan.
1 Click Full System Scan.
3
At the bottom of the scan window, next to If you think there are still risks, click click here.
4
In the Norton Rescue Tools Web page, click Download Norton Bootable Recovery Tool.
5
Follow the on-screen instructions.
Internet Security > Norton Recovery Tools.
All Programs > Norton Internet Security > Norton Recovery Tools.
About Norton Bootable Recovery Tool
Using the Norton Bootable Recovery Tool
If the installation of yourNorton product fails, you can use the Norton Bootable Recovery Tool to scan and remove any security threats that prevent successful installation. If your computer is infected and you are not able to start your Windows operating system, you can use Norton Bootable Recovery Tool to remove threats and recover your computer.
Norton Bootable Recovery Tool is available on the product CD that you purchased. You can use the product CD as a recovery media.
To use Norton Bootable Recovery Tool, you must use
w
the product key of the Norton product that you purchased. Ifyou usea trial version of NortonInternet Security, you need to create a Norton Account to receive aproduct key touse Norton Bootable Recovery Tool.
To use the Norton Bootable Recovery Tool
1
Insert the recovery media and start your computer from the recovery media. The recovery media can be a Norton Bootable Recovery Tool CD, DVD, USB key, or the product CD.
2
Read the Norton License Agreement, type your product key, and then click I Agree. If youuse a non-QWERTY keyboard, usethe Virtual Keyboard option to enter your product key.
3
In the Norton Bootable Recovery Tool window, click Norton Advanced Recovery Scan.
4
Click Start Scan.
5
After the scan is complete, remove the recovery media from the drive or USB port, and restart your computer.
45Getting started
Getting started
46

Starting Norton Internet Security from the command prompt

Starting Norton Internet Security from the command prompt
If you work from the command line (for example, writing a script or code), you can start Norton Internet Security while you are still in DOS.
To start Norton Internet Security from the command prompt
1
At the command-line prompt, type the directory where Norton Internet Security is located, and the executable.
1 In 32-bit version of Windows, Norton Internet
Security and the executable are located at the following path:
\Program Files\Norton Internet Security\Engine\version\Uistub.exe
Where version represents the version number of installed Norton Internet Security.
1 In 64-bit version of Windows, Norton Internet
Security and the executable are located at the following path:
\Program Files (x86)\Norton Internet Security\Engine\version\Uistub.exe
Where version represents the version number of installed Norton Internet Security.
2
Press Enter.

About the Norton Internet Security icon

After you install Norton Internet Security, it displays an icon in the notification area at the far right of the Windows taskbar.This icon indicates the currentstatus of your computer.
Norton Internet Security displays alerts and notifications to inform you how viruses and other security threatsare detected andresolved. These alerts
About the Norton Internet Security icon
and notifications appear over the notification area of your computer. In most cases, you can click the link available in the alert to view the details and fix the problems.
The Norton Internet Security icon represents the current state of your computer. The icon changes its color when it actively fixes any issues or wants to inform you about any warning or urgent issues.
You can see the following representations of Norton Internet Security icon in the notification area:
47Getting started
Icon with a green badge
Icon with an orange badge
Icon with a red badge
Icon with a gray badge
Icon with a yellow badge
Icon with a crescent-pattern
Represents that your computer is completely secure
Represents that there are some issues against your computer protection that require your attention
Represents that there are some urgent issues against your computer protection that require immediate resolution
Represents that your product is disabled
Represents that Norton Internet Security is fixing issues
Represents that the Silent Mode feature is turned on
This icon also displays the current protection status badge.
You can right-click the Norton Internet Security icon to open the shortcut menu to quickly access a few important tasks of Norton Internet Security.
Getting started
48
About the Norton Internet Security icon
About Norton Internet Security shortcut menu
Norton Internet Security performs background activities to keep your computer secure. The icon in the notificationarea reassures youthat yourprotection is up to date. The icon changes its color if any change in status occurs.
The messagesthat appear in the notificationarea might require aresponse from you, such asopening a window, and takingan action. More often, messagesinform you about currentactivities, and theydisappear after a few seconds. You can check the Security History window for any further details.
You can right-click the Norton Internet Security icon to access specific Norton Internet Security activities. Depending on the current activities, your options include the following:
Open Norton Internet Security
Run QuickScan
Run LiveUpdate
View Recent History
Get Support
Lets you launch the Norton Internet Security main window to complete tasks, view current status, or access other features.
Lets you run a Quick Scan to protect possible virus-infected areas of your computer.
Lets you run LiveUpdate to check for definition and program updates.
Lets you review the information about the security events for all of the categories.
Lets you resolve your problem easily using Norton Autofix.

About LiveUpdate

49Getting started
Turn on/Turn off Silent Mode
Disable/Enable Smart Firewall
Disable/Enable Antivirus Auto-Protect
Check for New Version
About LiveUpdate
Symantec products download the latest definition updates andprogram updatesregularly from Symantec servers. Thedefinition updates protect your computer from the latest viruses and unknown security threats. Using the LiveUpdate technology, Symantec products help you to obtain and install these updates.
LiveUpdate takes little time to download and process the definition updates and program updates. You can choose Smart Definitions to minimize download time, installation time, and memory consumption as Smart Definitions are a subset of virus definitions. To access the SmartDefinitions option, go tothe Norton Internet Security main window, and then click Settings > Updates > Smart Definitions. You can cancel the LiveUpdate session at any time.
LiveUpdate obtains these updates for your computer by using your Internet connection. If your network uses proxy servers to connect to the Internet, LiveUpdate uses the proxy settings in your product to
Lets you turn on or turn off Silent Mode.
Lets you turn off or turn on the firewall.
Lets you turn off or turn on Antivirus Auto-Protect.
Lets you check if new version of your product is available or not.
This option is available only if you have activated your product and you have an active subscription.
Getting started
50
About LiveUpdate
download the latest updates. To configure the proxy settings of your network, go to the Norton Internet Security main window, and then click Settings >
Network > Network Security Settings > Proxy Server > Configure.
LiveUpdate does not download the latest definition updates and program updates, if the Metered Broadband Mode option in the Settings window is set to NoTraffic. Metered Broadband Mode lets youdefine the amountof network bandwidth that NortonInternet Security can use. Therefore, you must ensure that the Metered Broadband Mode option is turnedon and set to No Limit or Critical Updates Only for LiveUpdate to run successfully.
About Program and Definition Updates
LiveUpdate obtains program updates and definition updates for your computer by using your Internet connection.
Program updates are minor improvements to your installed product.These differfrom productupgrades, which are newer versions of the entire product. Program updates are usually created to extend the operating system or hardware compatibility, adjust a performance issue, or fix program errors. Program updates are released on an as-needed basis.
Some program updates may require that you restart
w
your computer after you install them.
LiveUpdate automatesthe process of downloading and installing programupdates. It locates and obtainsfiles from an Internet site, installs them, and then deletes the older files and downloaded definitions from the temporary folder after processing the updates.
Definition updates are the files that keep your Symantec productsup to datewith thelatest antithreat technology. The definition updates that you receive depend on which product you use.
About LiveUpdate
The type of definition updates that each of the Symantec products receive are as follows:
51Getting started
Norton AntiVirus, Norton AntiVirus Online
Norton Internet Security, Norton Internet Security Online
Users of these products receive the latest virus definitions from Symantec that protects your computer from all types of security threats.
In addition to the virus and security risk updates, users of these products receive definition updates for security protection. For the products that contain protection against phishing, users receive definition updates against phishing.
The security definition updates provide the latest predefined firewall rules, the updated lists of applications that access the Internet, Intrusion Prevention signatures, and Symantec spam definition files. These lists are used to identify unauthorized access attempts to your computer.
Getting started
52
About LiveUpdate
Norton 360, Norton 360 Online
Norton Security Suite, Norton Business Suite
About Smart Definitions
Norton Internet Security downloads and installs virus definitions regularly to protect your computer from the latest security threats. For faster downloads and installation purpose,Norton Internet Securityclassifies these virus definitions into two sets.
The virus definitions are classified into the following two sets:
Users of these products receive the latest virus definitions from Symantec that protects your computer from all types of security threats.
In addition, users of these products receive Symantec spam definition files and definition updates against phishing.
Users of these products receive the latest virus definitions from Symantec that protects your computer from all types of security threats.
In addition, users of these products receive Symantec spam definition files and definition updates against phishing.
Complete Set
Contains all the virus definitions for each threat that is known to Symantec.
About LiveUpdate
53Getting started
Core Set
Contains the most important virus definitions that are required for latest security threats as viewed by Symantec.
The Core Set is a subset of the Complete Set, and it is approximately 30 percent smaller than the Complete Set. The Core Set minimizes download time, installation time, and system start time. It also occupies lesser amount of disk space as compared to the Complete Set virus definitions. Therefore, the Core Set results in faster performance of your computer.
The Core Set virus definitions are called as Smart Definitions. Norton Internet Security provides the Smart Definitions option to choose between Core Set virus definitions and Complete Set virus definitions for LiveUpdate sessions. To access the Smart Definitions option, go to theNorton Internet Security main window, and then click Settings > Updates > Smart Definitions.
During Automatic LiveUpdate or each time that you run LiveUpdate manually, Norton Internet Security checks if the SmartDefinitions option is turned on or off. It then downloads and installs the desired set of virus definitions based on the option settings. By default, the Smart Definitions option is turned on, which means that the Core Set virus definitions are downloaded and installed.
Turning off or turning on Smart Definitions
Smart Definitionsare a subset of virus definitions that contains most important definitions for the latest security threats.
Getting started
54
About LiveUpdate
As the Smart Definitions are of considerably smaller size, it results in lesser download time, lesser installation time, lesser boot time, and lesser memory consumption. It also occupies lesser amount of disk space as compared to the full set of virus definitions. Therefore, Smart Definitions result in faster performance of your computer.
Norton InternetSecurity checks the SmartDefinitions option settings during each LiveUpdate session. If the option is turned on, the Smart Definitions are downloaded and installed. If the option is turned off, all of the virus definitions are downloaded and installed.
To turn off or turn on Smart Definitions
1
In the Norton Internet Security main window,click Settings.
2
In the Settings window, in the left pane, click Updates.
3
In the Smart Definitions row, do one of the following:
1 To turn off Smart Definitions, move the On/Off
switch to the right to the Off position.
1 To turn on Smart Definitions, move the On/Off
switch to the left to the On position.
4
In the Settings window, click Apply.
5
Click OK.
About running LiveUpdate
You should run LiveUpdate as soon as you install Norton Internet Security. Some Symantec products run LiveUpdate automatically to keep your protection up todate. If youdo notuse the AutomaticLiveUpdate option, you should manually run LiveUpdate once a week.
In addition to the definition updates that Automatic LiveUpdate downloads, the product uses streaming technology to download the latest virus definitions.
About LiveUpdate
These downloads are called Pulse Updates. The Pulse Updates are lighter and faster than Automatic LiveUpdate. It keeps your computer secure from the ongoing threats on the World Wide Web.
When Pulse Updates are enabled, LiveUpdate checks for definition updates every few minutes and downloads the streamed virus definitions. The Pulse Updates protectyour computer from the latestsecurity threats without compromising your system performance. Even if you turn off Pulse Updates, LiveUpdate picksall themissed streams andit updates your computer during the full definition updates.
Each LiveUpdate session checks if the Smart Definitions option is turned on or off, and downloads and installs the updates based on the option settings. To access the Smart Definitions option, go to the Norton Internet Security main window, and then click Settings > Updates > Smart Definitions. By default, the Smart Definitions option is turned on. As Smart Definitions are only a subsetof all thevirus definitions, you can minimize download time, installation time, and memory consumption.However, if you wantall of the virus definitions to be downloaded and installed, you can turn off the Smart Definitions option.
55Getting started
Checking for updates manually
LiveUpdate checks for updates to the product that is installed on your computer.
These updates protect your computer from newly discovered threats. LiveUpdate uses the Internet connection to connect to the Symantec server, checks for updates, and then downloads and installs them automatically.
You should have the Automatic LiveUpdate option turned on toensure that you have the latest definition updates and program updates. Definition updates contain the information that allows the product to recognize and alert you to the presence of a specific virus or security threat. Symantec issues program
Getting started
56
About LiveUpdate
updates periodically, which are enhancements to the product. Program updates are usually created to fix program errors, improve the performance of the program, or, to extend the operating system or hardware compatibility. After you install program updates, you might not necessarily see a difference in the way that the product works.
If youare not connected to theInternet, connect to the Internet first, and then run LiveUpdate. Or, if you use a proxyserver to connectto the Internet, configure the proxy settings, and then runLiveUpdate. To configure the proxy settings of your network, go to the Norton Internet Securitymain window, andthen clickSettings
>Network > NetworkSecurity Settings >Proxy Server > Configure.
When the LiveUpdate session is complete,you can use the View Summary link to view the summary of the updates that are installed on your computer.
To check for updates manually
1
In the Norton Internet Security main window,click LiveUpdate. LiveUpdate connectsto the Symantec server, checks for available updates, and then downloads and installs them automatically.
2
In the Norton LiveUpdate window, when the installation is complete, click OK. Some program updates may require you to restart your computer after you install them.
About keeping your protection up to date
Definition updates are available to you as long as you maintain an active product status. The ways in which
About LiveUpdate
you can acquire the product and maintain your status are as follows:
57Getting started
If you purchased a subscription version of a retail product
If you purchased a product as a service, or it came installed on your computer
If you receive this service through your service provider
The product includes a limited-time subscription to definition updates. When the subscription is due to expire, you are prompted to renew. Follow the on-screen instructions to complete your subscription renewal.
After your product expires, you cannot obtain updates of any kind and all the security features are turned off. If you do not renew your product, you are no longer protected against security threats. Though LiveUpdate continues to check for updates after expiration, you must renew your product to enable all the security features.
If you do not activate your service or renew your subscription, you cannot obtain updates of any kind and the software no longer functions.
Your product status is always active as long as your security service is active with your service provider.
If your security service is not active, you cannot obtain updates of any kind and the software no longer functions.
Turning off or turning on Automatic LiveUpdate
You can have LiveUpdate check for definition updates and product updates automatically on a set schedule, by turning on the Automatic LiveUpdate option. You can alsorun LiveUpdate manually when theAutomatic LiveUpdate option is turned on. However, you must
Getting started
58
About LiveUpdate
run LiveUpdatemanually to obtain updates ifyou have turned off the Automatic LiveUpdate option.
If you are connected to the Internet, Automatic
w
LiveUpdate downloadsproduct updatesand definition updates everyhour. If youhave an Integrated Services Digital Network (ISDN) router that is set to automatically connectto your Internet service provider (ISP), itmay incur chargeseach time. If you donot want this setup, you can turn off the automatic connection on your ISDN router, or turn off the Automatic LiveUpdate option.
To turn off Automatic LiveUpdate
1
In the Norton Internet Security main window,click Settings.
2
In the Settings window, in the left pane, click Updates.
3
In theAutomatic LiveUpdate row, move theOn/Off switch to the right to the Off position.
4
In the Settings window, click Apply.
5
In the Security Request dialog box, in the Select the duration drop-down list, select how long you
want to turn off Automatic LiveUpdate, and then click OK.
6
In the Settings window, click OK.
To turn on Automatic LiveUpdate
1
In the Norton Internet Security main window,click Settings.
2
In the Settings window, in the left pane, click Updates.
3
In theAutomatic LiveUpdate row, move theOn/Off switch to the left to the On position.
4
In the Settings window, Click Apply.
5
Click OK.
About Pulse Updates
In addition to the definition updates that Automatic LiveUpdate downloads, Norton Internet Security uses streaming technology to download the latest virus definitions. Thesedownloads are calledPulse Updates. The Pulse Updates are lighter and faster than Automatic LiveUpdate. They keep your computer secure from the ongoing threats that exist on the Internet. Pulse Updates protect you against the rapidly-changing environment of security threats without compromising your computer's performance. Pulse Updates should always be turned on to get the latest updates.
Pulse Updates checks for definition updates every 5 minutes. Ifdefinition updates areavailable, LiveUpdate downloads the streamed virus definitions. Pulse Updates provide the updates in between the full updates, which Automatic LiveUpdate downloads automatically every hour. Norton Internet Security merges the new stream that is downloaded with the last updates that are installed. The Pulse Updates downloads provide additional and fast protection for the latest threats in between the full updates without disrupting your online experience.
Even if you do not turn on Pulse Updates, LiveUpdate collects all the missed streams and, it updates your computer during full definition updates.
About LiveUpdate
59Getting started
Turning off or turning on Pulse Updates
Pulse Updates provide frequent, lightweight updates every 5 minutes in between the full updates. Always ensure that the Pulse Updates option is turned on. It protects you from the latest threats without compromising yoursystem performance or disrupting your online experience.
You must be connected to the Internet to obtain latest definition updates by using Pulse Updates. You can
Getting started
60

About Network Proxy settings

turn on or turn off Pulse Updates only if Automatic LiveUpdate is turned on.
To turn off or turn on Pulse Updates
1
In the Norton Internet Security main window,click Settings.
2
In the Settings window, in the left pane, click Updates.
3
Under AutomaticLiveUpdate, in thePulse Updates row, do one of the following:
1 To turn off Pulse Updates, move the On/Off
switch to the right to the Off position.
1 To turn on Pulse Updates, move the On/Off
switch to the left to the On position.
4
In the Settings window, click Apply.
5
Click OK.
About Network Proxy settings
A proxy server regulates access to the Internet, and prevents external computers from accessing your network. If you are on a network that uses a proxy server toconnect to theInternet, youcan provide proxy server detailsto Norton Internet Security. You can use the Network Proxy Settings window to specify the automatic configuration URL, the proxy settings, and the authentication details. Norton Internet Security uses the proxy settings and authentication details to connect to the Internet automatically, whenever required. For example, LiveUpdate uses the specified proxy server settings to retrieve updates. You must ensure that you specify the proxy server details for LiveUpdate to run successfully.
In some cases, your network uses an automatic configuration URL or script for managing Internet access. In this case, you must provide the URL of the required Proxy Automatic Configuration (PAC) file. A PAC filecontains the code that lets your browser know about the proxy settings for different Web sites over
About Network Proxy settings
the Internet.It also containsthe words which you want to filter and block while you access the Internet. You can also choose the option that lets your browser to automatically detect the proxy settings. If you want your manual settings in the network, ensure that you disable the Automatic Configuration options.
Network Proxy Settings window lets you specify the following settings:
61Getting started
Automatic Configuration
Lets you specify the automatic configuration URL or script to manage Internet access.
You have the following options:
1 Automatically detect
settings
Lets your browser detect the network settings automatically.
If you do not want to override your manual settings for network connections, you must disable this option.
1 Use automatic configuration
script
Lets your browser use the automatic configuration URL or script to manage Internet access.
Use the URL box to provide the HTTP URL or the script to the required PAC file (such as file://C:/Proxy.pac).
Getting started
62
About Network Proxy settings
Proxy Settings
Authentication
Lets you provide the details of your Proxy Settings.
Under Proxy Settings, check Use
a proxy server for your HTTP connections, and do the
following:
1 In the Address box, type the
URL or IP address of your proxy server.
1 In the Port box, type the port
number of your proxy server. You can specify a value from
1 to 65535.
Lets you connect to the Internet through a server that requires authentication.
Use the Username box and Password box to type the authentication details.
Configuring Network Proxy Settings
When youuse a proxyserver toconnect to theInternet, you mustspecify the proxy server details.The Network Proxy Settings window lets you enter automatic configuration settings,proxy settings, andproxy server authentication settings. The Network Proxy settings let youconnect to theInternet while you perform tasks such asactivating the productor accessing the support options.
To configure Network Proxy Settings
1
In the Norton Internet Security main window,click Settings.
2
In the Settings window, click the Network tab.
3
In the left pane, click Network Security Settings.
4
In the Proxy Server row, click Configure.
About Network Proxy settings
5
In the Network Proxy Settings window, do the following:
1 If youwant your browser to automaticallydetect
network connection settings, under Automatic
Configuration, check Automatically detect
settings.
1 If the proxy server requires an automatic
configuration URL, under Automatic
Configuration, check Use automatic
configuration script. Type the URL (such as
file://C:/Proxy.pac) in the URL box.
1 If yournetwork uses aproxy server,under Proxy
Settings, check Use a proxy server for your
HTTPconnections. In the Address box, type the
URL or IP address of your proxy server, and in
the Portbox, type the port numberof your proxy
server. You can specify a value from 1 to 65535.
1 If your proxy server requires a user name and
password, under Authentication, check I need
authorization to connect through my firewall
or proxy server. Type the user name in the
Username box and password in the Password
box.
6
In theNetwork Proxy Settings window, click Apply.
63Getting started
Getting started
64
About Network Proxy settings

Monitoring your system's performance

This chapter includes the following topics:
1 About System Insight

About System Insight

Norton Internet Security continuously monitors your computer to keep it free of any problems and run at peak efficiency. Norton Internet Security constantly scans the vital areas of your computer including memory, registry keys, and running processes. It monitors the important activities such as general file operation, network traffic, and Internet browsing. In addition, Norton Internet Security ensures that the activities that it performs on your computer do not degrade the overall performance of your computer.
System Insight provides you a centralized location where youcan viewand monitorthe activitiesthat you perform on your system. System Insight displays such information in the Performance window.
You canuse the Performance window for the following:
1 To view monthly history of the important system
activities that you performed or that occurred over a period of the last three months
The Events graph that appears at the top of the window provides a pictorial representation of important system activities. The activities include application installations, application downloads,
2
Monitoring your system's performance
66
About System Insight
disk optimizations,threat detections,performance alerts, or Quick Scans. The graph displays the activities as icon or stripe, and the description for each icon or stripe is provided at the bottom of the graph. Thepop-up that appears when youmove the mouse pointerover an iconprovides you the details about the activity. The View Details link in the pop-up lets you view additional details about the activity in the Security History window. You can use thetabs at thetop of the graph toobtain details for the current month and details for the last two months.
1 To rearrange the organization of files on your
system Optimizing your system helps you maximize the
usable free space on a disk by grouping files based on how they are accessed. The Optimize option at the top of the Events graph lets you defragment your system.
1 To view and analyze the effect of Norton Internet
Security on the performance of your computer The Performance graph that appearsat the bottom
of the window provides a graphical representation of yourCPU usageand memory usage. The CPUtab displays agraph that represents the overall system CPU usage and Norton-specific CPU usage. When you click at any point on the CPU graph and memory graph, Norton Internet Security displays a list of the processes that consume maximum resources at that point. It also displays the percentage of usage for each process. You can click a process that is available in the list to get more information about the process in the File Insight window. The Memory tab displays a graph that represents overall memory usage and Norton-specific memory usage. You can select any of the Zoom options to obtain magnified view or historical data of the graphs.
1 To view the details of Norton-specific jobs that are
currently running in the background
The NortonTasks window provides thedetails such as the timestamp, the duration, and the status of the background jobs. The details also include the type of power the job needs to run and if a job ran during idle time. You can select different power sources for thebackground jobs. You canalso start or stop a background job at any time.
1 To view the details of the Files of Interest
The NortonInsight - Application Ratings window provides details on the trust level, prevalence, resource usage and stability ratings for the Files of Interest.
You can use the Performance Monitoring option to monitor the performance of your computer. To access the PerformanceMonitoring option, go to the Norton Internet Security main window, click Settings >
General > Performance Monitoring > Performance Monitoring .
You can also use the Learn More link in the Performance window to access the online tutorialpage
to get more information.
Accessing the Performance window
System Insight provides you a centralized location where youcan view and monitor yoursystem activities. System Insight displays such information in the Performance window. You canaccess the Performance window to view details about the important system activities, CPU usage and memory usage, and Norton-specific background jobs. You can also view Norton Insight details and defragment your boot volume.
To access the Performance window
4
In the Norton Internet Security main window,click Performance.
About System Insight
67Monitoring your system's performance
Monitoring your system's performance
68
About System Insight
About monitoring system activities
System Insight provides information about the important systemactivities that you performed orthat occurred overa period ofthe lastthree months. System Insight displays the information in the Performance window. The Events graph at the top of the Performance window displays each activityas icon or stripe. The description for each icon or stripe appears at the bottom of the graph. You can use the tabs at the top ofthe graph toobtain details for the currentmonth and for the last two months. The activities include:
Installs
Downloads
Provides the details about the installation activities that you performed on your system over a period of the last three months
The details include the application that you installed, the date on which you installed the application, and the total number of installations on that date.
Provides the details about the application-download activities that you performed on your system over a period of the last three months
The details include the date on which you downloaded a file and the total number of downloads on that date. You can click the file name link to view additional details about the downloaded file such as the Download Insight report, file name, reputation level, and recommended action.
About System Insight
69Monitoring your system's performance
Optimized
Detections
Alerts
Indicates the optimization activities that you performed on your system over a period of the last three months
Provides the details about the threat detection activities that Norton Internet Security performed on your system over a period of the last three months
The details include the date on which Norton Internet Security detected a threat and the total number of threats that Norton Internet Security detected on that date. The View Details link provides additional details about the risk such as the risk impact and the origin of the risk. The details also include the action that a threat has performed on your system and the action that Symantec recommends you to resolve the threat.
Provides the details about the performance alerts that Norton Internet Security displayed over a period of the last three months
The details include the monitored date and the number of performance alerts generated. The View Details link provides additional details about performance-related activities, program name, program location, and system resources utilization.
Monitoring your system's performance
70
About System Insight
Quick Scans
Provides the details about Quick Scans that Norton Internet Security performed on your system over a period of the last three months
The details include the date on which a Quick Scan was performed and the number of Quick Scans that were performed on that date. The View Details link provides additional details such as the scan time, total items scanned, total risk detected, total risks resolved, and recommended action.
Viewing details of your system activities
System Insight lets you view details of the system activities thatyou performedor thatoccurred overthe last three months in the Performance window. The activities include application installations, application downloads, disk optimizations, threat detections, performance alerts, or Quick Scans. You can use the tabs at the top of the Events graph to obtain details for the current month and for the last two months. The Events graph at the top of the Performance window displays each activity as iconor stripe. The description for each icon or stripe appears at the bottom of the graph. The pop-up that appears when you move the mouse pointer over an icon provides you the details about theactivity. The detailsinclude thedate on which an activity was performed and the number of such activities that you performed on that date. The View Details link provides additional details of the activity in the Security History window.
To view details of your system activities
1
In the Norton Internet Security main window,click Performance.
2
In thePerformance window, at the top ofthe Events graph, click the tab for a month to view the details.
3
In the Events graph, move the mouse pointer over the icon or the stripe for an activity.
4
In the pop-up that appears, view the details of the activity.
5
If the View Details option appears in the pop-up, click View Details to view additional details in the Security History window.
About performance alerting
Norton Internet Security monitors your system performance. Ifit detects anincreased usage of system resources by any program or process, it notifies you with performance alerts. Performance alerting works only when the Performance Monitoring option and Performance Alerting option are turned on.
Performance alerting notifies you with information about the program name and resources that the program uses excessively. The Details& Settings link in the performance notification alert lets you view additional details about the resource consumption by the program. The File Insight window opens and displays the details of the file, the originof the file,and the complete resourceusage list of theprogram. From the FileInsight window, you canchoose toexclude the program from being monitored. You can use the Settings option in the File Insight window to turn off the Performance Alerting option.
Performance alerts are not displayed when your
w
computer is idle or in Silent Mode.
For each system resource, such as CPU, memory, and hard disk, there is a resource consumption threshold defined. Whenthe resource consumptionof a program
About System Insight
71Monitoring your system's performance
Monitoring your system's performance
72
About System Insight
exceeds the defined threshold limit, Norton Internet Security alerts you with a performance alert.
You can use the Resource Threshold Profile for Alerting option to configure the threshold limit. To access the Resource Threshold Profile for Alerting option, go to the Norton Internet Security main window, and then click Settings > General >
Performance Monitoring > Resource Threshold Profile for Alerting.
You can use the Use Low Resource Profile On Battery Power option to let Norton Internet Security
automatically change the resource threshold profile to low when your computer runs on battery power.
In addition, you can add programs to the Program Exclusions list using the Program Exclusions option. When you add a program to the Program Exclusions list, Norton Internet Security does not alert you when the program exceeds the resource consumption threshold limit.
You can view all the performance-related logs under the Performance Alert category in the Security History window.
Configuring performance alerts
You can use the Performance Alerting option to receive performance alertswhen there is anincreased usage of system resources by any program or process.
You can use the following options to configure performance alerts:
Off
Turns off performance alerts.
Select this option if you do not want Norton Internet Security to notify you with performance alerts.
About System Insight
73Monitoring your system's performance
On
Log Only
Turns on performance alerts.
Select this option if you want Norton Internet Security to notify you with performance alerts when a program or process exceeds the system resource usage threshold limit.
By default, the Performance Alerting option is turned on.
Monitors and records the system resource usage.
Select this option if you want Norton Internet Security to only monitor the system resource usage of every program or process running on your computer.
When a program or process exceeds the system resource usage threshold limit, Norton Internet Security records these details in the Security History window. You can view the details that are related to performance alerts under Performance Alert category in the Security History window.
To configure performance alerts
1
In the Norton Internet Security main window,click Settings.
2
In the Settings window, click the General tab.
3
In the left pane, click Performance Monitoring.
Monitoring your system's performance
74
About System Insight
4
Under Performance Monitoring, in the PerformanceAlerting row, doone ofthe following:
1 To turn off performance alerts, move the
1 To turn on performance alerts, move the
1 To suppress the performance alerts, move the
5
Under Alert for High Usage of, do the following:
1 If you want Norton InternetSecurity to monitor
1 If you want Norton InternetSecurity to monitor
1 If you want Norton InternetSecurity to monitor
1 If you want Norton InternetSecurity to monitor
6
Click Apply, and then click OK.
PerformanceAlerting switch to the Off position.
PerformanceAlerting switch to the On position.
Performance Alerting switch to the Log Only
position.
the CPU usage, move the CPU switch to the On position. By default, this switch is turned on.
the memory usage,move the Memory switch to the Onposition. Bydefault, thisswitch is turned on.
the disk usage, move the Disk switch to the On position. By default, this switch is turned on.
the handle count, move the Handles switch to the On position.
Configuring the resource threshold profile
The threshold limit for the system resources determines at which point Norton Internet Security should notify you with performance alerts. When a specific program exceeds the threshold limit of using your systemresource, Norton Internet Security notifies you with a performance alert.
To configure the resource threshold profile
1
In the Norton Internet Security main window,click Settings.
2
In the Settings window, click the General tab.
3
In the left pane, click Performance Monitoring.
About System Insight
4
Under Performance Monitoring, in the Resource Threshold Profile for Alerting row, select one of
the following options:
75Monitoring your system's performance
Low
Medium
High
Configures a low threshold limit for alerting
If you choose this option, Norton Internet Security notifies you with performance alerts whenever a program reaches the lowest threshold limit of using your system resource.
Symantec recommends you to select this option when your computer runs on battery power.
Configures a medium threshold limit for alerting
By default, the threshold limit is set to medium.
Configures a high threshold limit for alerting.
If you choose this option, Norton Internet Security notifies you with performance alerts whenever a program reaches the highest threshold limit of using your system resource.
5
Click Apply, and then click OK.
Monitoring your system's performance
76
About System Insight
Turning off or turning on the Use Low Resource Profile On Battery Power option
When your computer runs on battery power, it is important that all active software programs consume minimum resourceusage. By reducing resource usage, your computer gains longer battery life and becomes more energy efficient.
You can configure a low threshold profile and ensure that all programs consume minimum resource usage. When the resource usage of a program or a process exceeds the low threshold limit, Norton Internet Security notifiesyou with aperformance alert.You can choose to close the program or the process manually and free the resource.
If the Use Low Resource Profile On Battery Power option is turned on, Norton Internet Security automatically changes the threshold profile to low when yourcomputer runs on battery power.By default, this option is turned on.
Symantec recommends that you keep the Use Low
w
Resource Profile On Battery Power option turned on.
To turn off the Use Low Resource Profile On Battery Power option
1
In the Norton Internet Security main window,click Settings.
2
In the Settings window, click the General tab.
3
In the left pane, click Performance Monitoring.
4
Under Performance Monitoring, in the Use Low Resource Profile On Battery Power row, move the On/Off switch to the right to the Off position.
5
Click Apply, and then click OK.
To turn on the Use Low Resource Profile On Battery Power option
1
In the Norton Internet Security main window,click Settings.
2
In the Settings window, click the General tab.
About System Insight
3
In the left pane, click Performance Monitoring.
4
Under Performance Monitoring, in the Use Low Resource Profile On Battery Power row, move the On/Off switch to the left to the On position.
5
Click Apply, and then click OK.
Excluding programs from appearing in performance alerts
Norton Internet Security lets you exclude programs from appearingin performance alerts. You canadd the programs that consume high CPU, memory, or disk usage to the Program Exclusions list. When you add a program to the Program Exclusions list, Norton Internet Securitydoes not alert you when the program exceeds the resource consumption threshold limit.
To exclude a program from appearing in performance alerts
1
In the Norton Internet Security main window,click Settings.
2
In the Settings window, click the General tab.
3
In the left pane, click Performance Monitoring.
4
Under Performance Monitoring, in the Program Exclusions row, click Configure.
5
In the Program Exclusions window, click Add.
6
In the Select a program dialog box, browse to the executable file for the program that you want to add.
7
Click Open.
8
In the Program Exclusions window, click OK.
9
In the Settings window, click Apply.
10
Click OK.
77Monitoring your system's performance
Removing programs from Program Exclusions
The ProgramExclusions window lists allthe programs that are excluded from appearing in performance alerts. Ifyou want, youcan removeany of theprograms that you already added to the Program Exclusions
Monitoring your system's performance
78
About System Insight
window. When you remove a program, the program appears in the performance alert the next time it crosses the resource consumption threshold limit.
To remove a program
1
In the Norton Internet Security main window,click Settings.
2
In the Settings window, click the General tab.
3
In the left pane, click Performance Monitoring.
4
Under Performance Monitoring, in the Program Exclusions row, click Configure.
5
In the Program Exclusions window, select the program that you want to delete, and then click Remove.
6
Click OK.
7
In the Settings window, click Apply.
8
Click OK.
About CPU graph and memory graph
Norton Internet Security monitors the overall system CPU usage and memory usage and the Norton-specific CPU usageand memoryusage. Norton Internet Security displays the details in the CPU graph and the memory graph. TheCPU graph and memory graphare real-time graphs of CPU utilization and memory utilization.
The graphs display a performance time for the last 90 minutes or for the duration since you started your computer. The graphs update the information at an interval ofevery 15 seconds. The graphsprogress from right to left, and the most recent data appear on the far right of the graph. The blue pattern in the graphs depicts theoverall system usage,and theyellow pattern depicts theNorton-specific usage. Thegray blocks that are labeled as Idle indicate the idle period of your computer. The gray blocks include the period when your computer is in shutdown, sleep, or log out state.
The graphs show a default performance time of 90 minutes. However, you can use the Zoom options to
About System Insight
define a region of the graph that you are interested to view. Youcan select a Zoom option toobtain magnified view or historical data of the graphs. For example, if you select the 10min option, Norton Internet Security displays the magnified view of CPU graph or memory graph for the last 10 minutes. If you select the 1d option, Norton Internet Security displays a historical data of the last one day.
When you click at any point on the CPU graph or memory graph,Norton Internet Security displays alist of the processes that consume maximum resources at that point. It also displays the percentage of usage for each process. You can click a process that is available in the list to get more information in the File Insight window.
The File Insight window provides information about the process such as:
1 The file name, version number, digital signature,
the date on which the process was installed
1 The date on which the process was last used and
whether it is a startup file
1 The stability details
1 The confidence level
1 The resource usage details
1 The actions that the process performs on your
system
In addition, the File Insight window displays the CPU graph and the resource usage details for the running processes. The graph shows the breakdown of overall system CPU usage and the CPU usage by the process.
79Monitoring your system's performance
Viewing the CPU graph and memory graph
Norton Internet Security monitors the overall system CPU usage and memory usage and the Norton-specific CPU usage and memory usage. The CPU tab and the Memory tab at the top of the Performance graph display the CPU graph and the memory graph respectively.
Monitoring your system's performance
80
About System Insight
The Zoom options provide you the magnified view of the CPU graph and memory graph. For example, if you select the 10min option, Norton Internet Security displays the magnified view of CPU graph or memory graph for the last 10 minutes. If you select the 30min option, Norton Internet Security displays a magnified view of the CPU graph and memory graph for the last 30 minutes.
By default, the graphs display performance time for
w
the last 90 minutes.
To view CPU graph and memory graph
1
In the Norton Internet Security main window,click Performance.
2
In thePerformance window, doone of thefollowing:
1 To view the CPU graph, click the CPU tab.
1 To view the memory graph, click the Memory
tab.
1 To obtain a magnified view, click 10min or
30min next to the Zoom option
Obtaining historical data of your CPU and memory usage
The Zoom options also provide you the historical data of the CPU graph and memory graph. For example, if you select the 1d option, Norton Internet Security displays the data of CPU graph or memory graph for the last one day.
To view historical data of your CPU or memory usage
1
In the Norton Internet Security main window,click Performance.
2
In thePerformance window, doone of thefollowing:
1 To view the CPU graph, click the CPU tab.
1 To view the memory graph, click the Memory
tab.
3
Do one of the following:
1 To obtain historical data for the last one day,
click 1d.
1 To obtain historical data for the last one week,
click 1w.
1 To obtain historical data for thelast one month,
click 1m.
Identifying resource-consuming processes
You canclick at any point onthe CPU graph or memory graph to obtain a list of the processes that consume maximum resources of your computer at that point. You can click a process that is available in the list to get more information about the process in the File Insight window.
To identify resource-consuming processes
1
In the Norton Internet Security main window,click Performance.
2
In thePerformance window, doone of thefollowing:
1 To view the CPU graph, click the CPU tab.
1 To view the memory graph, click the Memory
tab.
3
Click at any point on the graph to obtain a list of resource-consuming processes.
4
Click the name of a process to obtain additional information about the process in the File Insight window.
About System Insight
81Monitoring your system's performance
About Startup Manager
Some programsare configured to launch duringstartup of your computer. The number of startup items increases as you install new applications, and the time that is required to start your computer increases as a result. Startup Manager helps to manage the startup items onyour computer. Forany startup program that the Startup Manager lists, you can view the detailed
Monitoring your system's performance
82
About System Insight
information such as Community Usage and Resource Usage. You can also click the application name and view the File Insight details. These details would help you determine whether or notto enable an application during startup.
Norton InternetSecurity displays the community usage details under the following conditions:
1 The Norton Community Watch option in the
Settings window must be turned on.
1 The Metered Broadband Mode option in the
Settings window must be configured to No Limit
or Critical Updates Only.
Startup Managerlets you viewthe listof programs that are included to the startup items. Based on your priority, you can configure Startup Manager to run or not run these programs when your computer starts. You can also choose to delay the start of the programs and run them manually from the Startup Manager. This way, you can enhance the performance of your computer. You can disable a program and measure the performance of yourcomputer the next time you start your computer.
If you choose to install the latest version of Norton Internet Security, you can still retain the Startup Manager setting. When you uninstall Norton Internet Security, the programs that you had added to the Startup Manager are reset to their default startup setting.
To adda startup item,you canopen your Startupfolder
w
that is available in your Windows Start menu and add programs asrequired. For more information onadding programs in Windows Startup, go to Microsoft Technical Support Web site or Windows online Help.
Disabling or enabling startup items
Whenever you start your computer, there are some programs that automatically start and run in parallel.
About System Insight
These programs are called startup items. The startup items increase the start time of your computer.
Startup Manager helps you manage the startup items of your computer efficiently. If you do not want a program to automatically start when youturn on your computer, you can disable the program using Startup Manager. You can also delay a startup item that you want to start at a later time.
To disable startup items
1
In the Norton Internet Security main window,click Performance.
2
In thePerformance window, clickStartup Manager.
3
In the Startup Manager window, in the On/Off column, uncheck the program that you do not want to automatically start when you turn on your computer.
4
Click Apply.
5
Click Close.
To enable startup items
1
In the Norton Internet Security main window,click Performance.
2
In thePerformance window, clickStartup Manager.
3
In the Startup Manager window, in the On/Off column, select the program that you want to automatically start when you turn on your computer.
4
Click Apply.
5
Click Close.
83Monitoring your system's performance
Managing startup items
Norton Internet Security Startup Manager monitors and lists the programs that automatically start when you turn on your computer. To reduce the start time of your computer and improve the performance, you can delay the start of some of the programs when you turn on your computer.
Monitoring your system's performance
84
About System Insight
To delay startup items
1
In the Norton Internet Security main window,click Performance.
2
In thePerformance window, clickStartup Manager.
3
In theStartup Manager window, in theDelay Start column, select the program that you want to delay.
4
Click Apply.
5
Click Close.
To run delayed startup items manually
1
In the Norton Internet Security main window,click Performance.
2
In thePerformance window, clickStartup Manager.
3
In theStartup Manager window, click RunDelayed Items Now.
4
Wait for the program to start, and then in the Startup Manager window, click Close.
About optimization
The datastorage space ona disk is divided intodiscrete units. These units are called clusters. When files are written to the disk, they are broken up into cluster-sized pieces. When all of the file pieces are located in adjacent or contiguous clusters, the file can be accessed quickly.
Your computers hard disk stores all of your files, applications, and the Windows operating system. The bits of information that make up your files gradually spread over the disk. This process is known as fragmentation. The more that you use your computer, the more fragmented the hard disk gets.
When a fragmented file is accessed, the disk performance is slower. The performance is slower because the drive head locates, loads,saves, and keeps track of all of the fragments of the file. If free space is also fragmented, the drive head might have to track adequate free space to store temporary files or newly added files.
About System Insight
Optimization rearranges file fragments into adjacent or contiguous clusters. When the drive head accesses all of the file data in one location, the file is read into the memory faster. Optimization also maximizes the usable freespace on adisk bygrouping most frequently used files and infrequently used files. Optimization consolidates free space to avoid fragmenting newly added files. It adds extra space after major data structures so that they can grow without immediately becoming fragmented again.
You can optimize your boot volume manually by using the Optimize option in the Performance window.
You can also configure Norton Internet Security to defragment your boot volume or the local disk that contains boot volume when your computer is idle. Norton Internet Security automatically schedules the optimization when it detects the installation of an application on your computer. The optimization process starts next time when your computer is idle.
You canuse the Idle Time Optimizer option tooptimize the boot volume during the idle time. To access the Idle Time Optimizer option, go to the Norton Internet Security main window, and then click Settings > General > Norton Tasks > Idle Time Optimizer.
85Monitoring your system's performance
Optimizing your boot volume
The Optimize option lets you optimize your boot volume to improve the boot time of your computer. Optimization ofyour boot volume maximizes theusable free space by rearranging file fragments into adjacent and contiguous clusters. When the drive head of your hard disk accesses all of the file data in one location, the file is read into the memory faster.
When you use the Optimize option in Windows XP, Norton Internet Security optimizes only the boot volume (for example, C:\Windows). Therefore, it requires less timeto complete optimization. However, when you use the Optimize option in Windows Vista or Windows 7, Norton Internet Security optimizes the
Monitoring your system's performance
86
About System Insight
drive that contains the boot volume. Therefore, it requires more time to complete optimization.
You can access the Optimize option at the top of the security statusgraph in the Performance window. You can also optimize your boot volume using the Insight
Optimizer option in the Norton Tasks window. The Insight Optimizer row in the background jobslist that
is available in the Norton Tasks window displays the details of the boot volume optimization process. You can view details such as timestamp, duration, and status of the background job.
To optimize your boot volume from the Performance window
1
In the Norton Internet Security main window,click Performance.
2
In the Performance window, at the top of the security status graph, click Optimize.
To optimize your boot volume from the Norton Tasks window
1
In the Norton Internet Security main window,click Performance.
2
In the Performance window, click Norton Tasks.
3
In the Norton Tasks window, under the Norton Tasks column, click the Play icon that appears before Insight Optimizer.
About the Idle Time Optimizer
Idle TimeOptimizer lets you configure NortonInternet Security to defragment your boot volume or the local disk that contains boot volume when your computer is idle. Norton Internet Security automatically schedules the optimization when it detects the installation of an application on your computer and your computeris idle.If youstart using your computer again, NortonInternet Security stopsthe optimization task, and starts optimizing the next time that your computer is idle. This way, the background job of
About System Insight
optimization does not affect the performance of your computer.
Optimization rearranges file fragments into adjacent or contiguousclusters inthe hard disk. It improves the computer performance by reading the files into the memory faster.Optimization also maximizes the usable free space on a disk by grouping most frequently used files and infrequently used files. In addition, it consolidates free space to avoid fragmenting newly added files.
You canuse the Idle Time Optimizer option tooptimize the boot volume during the idle time. To access the Idle Time Optimizer option, go to the Norton Internet Security main window, and then click Settings > General > Norton Tasks > Idle Time Optimizer.
Turning off or turning on Idle Time Optimizer
Norton Internet Security automatically schedules the optimization when it detects the installation of a new application onyour computer. Norton Internet Security runs this optimization only when your computer is idle.
You canuse the Idle Time Optimizer option tooptimize the bootvolume during idletime. Bydefault, this option is turned on.
To turn off Idle Time Optimizer
1
In the Norton Internet Security main window,click Settings.
2
In the Settings window, click the General tab.
3
In the left pane, click Norton Tasks.
4
In the Idle Time Optimizer row, move the On/Off switch to the right to the Off position.
5
Click Apply, and then click OK.
To turn on Idle Time Optimizer
1
In the Norton Internet Security main window,click Settings.
87Monitoring your system's performance
Monitoring your system's performance
88
About System Insight
2
In the Settings window, click the General tab.
3
In the left pane, click Norton Tasks.
4
In the Idle Time Optimizer row, move the On/Off switch to the left to the On position.
5
Click Apply, and then click OK.
About the Norton Tasks
The NortonTasks window provides aninterface where you can view and monitor all Norton-specific background tasks.Norton Internet Security runs most of the background tasks when your computer is idle. The Norton Tasks window provides the details of the background tasks that Norton Internet Security performs.
The details include things such as:
1 The name of the Norton task
You can use the icon that appears before the name of a background job to start or stop a background task. Youcan startor stop a background task at any time.
1 The timestamp of the Norton task
You can view details such as the date on which the background job last ran and the time. These details help you decide whether tostart a backgroundtask or wait for Norton Internet Security to run the job during idle time.
1 The duration of the Norton task
You can view the length of time that a Norton task ran the last time. The details also help you determine the length of time a background task takes to complete if you start it.
1 The background task has run during idle time or
not This detailhelps you determineif a task has already
run during idle time or you should run it.
1 The status of the Norton task
About System Insight
You can view details about the completion of the task.
1 The power source that the Norton Task uses.
You can specify the type of power source that each of the Norton Tasks uses. Use the Configure link that is available next to the power source icon to configure the power source for the Norton Tasks.
In addition to viewing and monitoring the background task details,you can specifythe IdleTime Out duration. After the Idle Time Out duration is reached, Norton Internet Security identifies the computer as idle and run the background tasks. You can use the Idle Countdown bar to confirm the idle state of your computer.
You can also manually turn on Silent Mode for a specified duration.
Monitoring background jobs of Norton Internet Security
The Norton Tasks window provides the details of the background tasks that Norton Internet Security performs and lets you view and monitor the background tasks.Norton Internet Security runs most of the background tasks when your computer is idle. Performing all background tasks when your computer is idle helps your computer to run at peak efficiency when you use your computer. However, you can manually start or stop a task at any time. You can also specify theIdle Time Out duration. After the IdleTime Out duration is reached, Norton Internet Security identifies thecomputer as idleand runthe background tasks. You can use the Idle Countdown bar to confirm the idle state of your computer. You can also view the CPU graph and memory graph to obtain the performance data of your computer.
To monitor background jobs
1
In the Norton Internet Security main window,click Performance.
2
In the Performance window, click Norton Tasks.
89Monitoring your system's performance
Monitoring your system's performance
90
About System Insight
3
In the Norton Tasks window, view the details of background jobs.
4
Do one of the following:
1 To runa backgroundjob, clickthe Playicon that
1 To stopa running backgroundjob, click the Stop
5
Click Close.
About Power Source
You can choose the power source for Norton Internet Security to perform the Norton Tasks when the computer is idle. Norton Tasks are background tasks that Norton Internet Security performs when your computer is idle. Norton Tasks include Quick Scan, Automatic LiveUpdate, Norton Community Watch, Norton Insight, Full System Scan, Insight Optimizer, and PulseUpdates. Norton Internet Security consumes more power when it runs Norton Tasks.
By default, Norton Internet Security performs these tasks only when your computer is connected to the external power. For example, if you are in an airport, and yourcomputer is running on batterypower, Norton Internet Security does not perform the Norton Tasks. In this way, you can extend the battery power of your computer. However, you can choose the power source for Norton Internet Security to perform the Norton Tasks.
appears before the name of the background job.
icon that appears before the name of the background job.
About System Insight
You can select one of the following options:
91Monitoring your system's performance
External
External and Battery
Allows the Norton Tasks to run only when your computer uses external power.
If you choose this option, Norton Internet Security performs the Norton Tasks when the computer is idle and connected to external power.
Allows the Norton Tasks to run irrespective if the computer uses external power or battery power.
If you choose this option, Norton Internet Security performs the Norton Tasks when the computer is idle. It does not consider the type of power source the computer uses.
You can configure the power source for each of the Norton Tasks.
Configuring the Power Source
You can choose the power source for Norton Internet Security to perform the Norton Tasks when the computer is idle. Norton Tasks are background tasks that Norton Internet Security performs when your computer is idle.
By default, Norton Internet Security performs these tasks only when your computer is connected to the external power. You can configure the power source for each of the Norton Tasks.
Monitoring your system's performance
92
About System Insight
To configure the power source
1
In the Norton Internet Security main window,click Performance.
2
In the Performance window, in the left pane, click Norton Tasks.
3
In the Norton Tasks window, under the Power Source column, click the Configure link for the
Norton Task that you want to configure the power source.
4
In the Power Source window, select one of the following:
1 External
1 External and Battery
5
Click OK.
6
In the Norton Tasks window, click Close.
Allows the Norton Task to run only when your computer uses external power.
Allows theNorton Task torun irrespective if the computer usesexternal power or battery power.
If you choose this option, Norton Internet Security performs the Norton Task when the computer is idle. It does not consider the type of power source the computer uses.
About Norton Insight
Norton Insight allows the smart scanning of files on your computer.It improves the performance ofNorton Internet Security scans by letting you scan fewer files without compromising the security of your computer.
About System Insight
A Norton Internet Security scan can identify threats on your computer in the following ways:
93Monitoring your system's performance
The Blacklist technique
At regular intervals, Norton Internet Security obtains definition updates from Symantec. These updates contain signatures of known threats. Each time when Norton Internet Security obtains the definition updates, it performs a scan of all of the files that are available on your computer. It compares the signature of the files against the known threat signatures to identify threats on your computer.
Monitoring your system's performance
94
About System Insight
The Whitelist technique
Norton Internet Security obtains specific information about the Files of Interest and submits the information to Symantec during idle time. The information includes things such as file name, file size, and hash key. Symantec analyzes the information of each File of Interest and its unique hash value and provides a confidence level to the file. The Symantec server stores the hash value and confidence level details of the Files of Interest. The server provides the details immediately after you open the Norton
Insight - Application Ratings
window. Even the slightest modification of the file causes a change in the hash value and the confidence level of the file. Typically, most Files of Interest belong to the operating system or known applications, and they never change. These files do not require repeated scanning or monitoring. For example, Excel.exe is a file that never changes but you always scan it during a normal security scan.
About System Insight
Symantec assigns the following confidence levels to Files of Interest:
95Monitoring your system's performance
Good
Unproven
Poor
Symantec analyzes the file as good based on the statistical evaluation that is done on the files that are available within the Norton Community.
Symantec rates the trusted files as follows:
1 If the file has three green
bars, Symantec rates the file as Norton Trusted.
The files that have three green bars display a Norton Trusted pop-up text when you move the mouse pointer over the green bars.
1 If the file has two green bars,
Symantec rates the file as Good.
1 If the file has one green bar,
Symantec rates the file as Favorable.
Symantec does not have enough information about the file to assign a trust level to the file.
Symantec has only a few indications that the file is not trusted.
Bad
Symantec has high indications that the file is not trusted.
Norton Internet Security also provides different profiles to configure your scan performance. When you usethe FullScan profile, Norton InternetSecurity
Monitoring your system's performance
96
About System Insight
follows the Blacklist technique to scan your computer. It scans all of the files on your computer against the signatures that it obtained during definition updates. When you use the Standard Trust or High Trust profile, Norton Internet Security follows theWhitelist technique to scan the files based on their confidence level. This way, Norton Internet Security significantly reduces thetime that isrequired toscan your computer completely for security threats.
The Whitelist technique that Norton Insight uses also helps in heuristic detection ofsuspicious applications. Normally, the execution behavior of well-known applications appearsidentical to the execution behavior of unknownapplications. Such behaviorresults infalse identification of good applications as suspicious, and therefore, necessitates security applications to maintain alow heuristic detection threshold. However, keeping a low detection threshold does not provide a complete heuristic protection against malicious applications. Norton Internet Security uses the Whitelist technique that helps maintain a high heuristic detection threshold. It excludes well-known applications from heuristic detection to prevent false detection of well-known applications and to ensure a high detection rate of malicious applications.
Viewing the files using Norton Insight
Norton Insightprovides information about the Files of Interest that are available on your computer. Norton Internet Security lets you view specific categories of files based on the option that you select in the Norton Insight - Application Ratings window.
About System Insight
The drop-down list that is available in the Norton Insight - Application Ratings window provides you
the following options:
97Monitoring your system's performance
All Running Processes
Startup Items
All Loaded Modules
Highest Performance Impact
Highest Community Usage
Lists the processes that run on your computer at that point in time when you selected this option
Lists the Files of InterestAll Files
Lists the programs that start when you start your computer
Lists all the files and programs that are currently loaded on to the program memory space
Lists the programs that consume maximum resources of your computer
Norton Internet Security displays a list of top 10 resources that highly affect the performance of your computer.
Lists the files that have the maximum community usage
Most Recently Discovered
Lists the files that you installed most recently
The list contains the files that you installed in the last 30 days after you installed Norton Internet Security.
Monitoring your system's performance
98
About System Insight
User Trusted Files
Untrusted Files
Lists the Files of Interest that you manually trusted in the File Insight window
This category does not list the files that do not belong to the File of Interest even if you manually trust the files. However, Norton Internet Security excludes all of the manually trusted files from Norton Internet Security scan when you configure Scan
Performance Profiles to High Trust.
You can also remove the user trust from all of the Files of Interest that you manually trusted. You can use the Clear All User Trust option next to the drop-down list to remove the user trust.
Lists the files that are not Norton Trusted.
You can manually trust all the files that are not trusted by clicking the Trust All Files option next to the drop-down list.
You can view file details such as file name, trust level, community usage, resource usage, and the stability rating. There may be instances when the trust level of a file has changed or a process running might have stopped running. You can refresh the Norton Insight
- Application Ratings window to update the file list and file details. The coverage meter provides a graphical representation of the percentage of the Norton TrustedFiles and thetotal Files of Interest. The higher the percentage, the lesser time the scan takes.
To view the files using Norton Insight
1
In the Norton Internet Security main window,click Advanced.
2
In theComputer Protection pane, click Application Ratings.
3
In the Norton Insight - Application Ratings window, select an option from the drop-down list to view a category of files. You may need to scroll the window to view all the files that are listed in the details area.
4
Click Close.
To refresh the list of files
4
In the Norton Insight - Application Ratings window, at the top of the file icon,click the Refresh icon.
Checking the trust level of a file
Norton Insight lets you check the details of the Files of Interest that are available on your computer. You can view details such as signature of the file and the date on which the file was installed. You can also view details such as the trust level, stability details, community usage, resource usage, and the source of the file. You can use the Locate option to find the location of the file on your computer. When you right-click a file that isavailable on yourcomputer, the shortcut menu displays Norton Internet Security option and then Norton File Insight option. You can use theoptions tocheck the details of a File ofInterest.
Norton Internet Security displays the Norton File
w
Insight option only when you right-click a File of Interest. InWindows Safe mode, you cannotaccess this option for any file. Norton Internet Security also categorizes anyfile for whichyou open the FileInsight window to view details as a File of Interest.
The Symantec server stores the hash value and trust level details of the Fileof Interest. Theserver provides the file detailsimmediately after you open the Norton
About System Insight
99Monitoring your system's performance
Monitoring your system's performance
100
About System Insight
Insight - Application Ratings window. However, you can usethe Check Trust Now option inthe FileInsight window to update the trust valueof a file. You can also manually trust any well-known files. You can change the trust level of any file to User Trusted other than the files that are Norton Trusted.
You can determine the resource usage of a file that is available on your computer. The File Insight window displays theCPU graph andthe system resource usage details forthe running processes.The graph shows the breakdown of overall system CPU usage and the CPU usage or memory usage by the process.
To check the trust level of a file
1
2
3
4
5
To check the trust level of a specific file
1
2
3
4
5 6
7
In the Norton Internet Security main window,click Advanced.
In the window that appears, in the Computer Protection pane, click Application Ratings.
In the Norton Insight - Application Ratings window, click a file for whichyou want to check the details.
In the File Insight window, view the details of the file.
Click Close to close the File Insight window.
In the Norton Internet Security main window,click Advanced.
In the window that appears, in the Computer Protection pane, click Application Ratings.
In the Norton Insight - Application Ratings window, click Check a Specific File.
Browse tothe location ofthe file for which youwant to check the details.
Select the file, and then click Open. In the File Insight window, view the details of the
file. Click Close to close the File Insight window.
Loading...