Symantec Norton Security Macintosh Product Manual

Page 1
Norton Security
Product Manual
Care for our Environment; ‘It's the right thing to do.’
Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual is made from recycled materials.
Page 2
Norton Security Product Manual
Copyright © 2014 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo, Norton, and LiveUpdate, are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Macintosh, Mac, Mac OS, the Mac logo, Safari, Tiger, Snow Leopard and Lion are trademarks of Apple Computer, Inc. Firefox is a registered trademark of Mozilla Corporation. Other names may be trademarks of their respective owners.
The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINEDIN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. “Commercial Computer Software and Commercial Computer Software Documentation”, as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.
Symantec Corporation 350 Ellis Street, Mountain View, CA 94043
http://www.symantec.com
Page 3

Contents

Chapter 1 Getting started .. ... ..... ... .. ... ..... ... ..... ... .. ... 8
About Norton Security .. ..... ... .. ... ..... ... ..... ... .. 8
About the Norton product main
window . ... ..... ... .. ... ..... ... .. ... ..... ... .. ... . 14
Opening and closing Norton Security on
Mac ...... ... .. ... ..... ... ..... ... .. ... ..... ... .. ... 18
About the Norton Security menu . ... ..... ... .. ... .. 19
About the Norton Security shortcut
menu .. ..... ... .. ... ..... ... ..... ... .. ... ..... ... .. 20
How to check your Mac user account
type ...... ... .. ... ..... ... ..... ... .. ... ..... ... .. ... 21
Viewing recent activities .... ..... ... .. ... ..... ... .... 21
Viewing network activities .... .. ... ..... ... .. ... ..... 23
Chapter 2 Activating your product .. ... ..... ... .. ... ..... .. 25
Activation protects you .. ... ..... ... .. ... ..... ... .. .. 25
Activating your Norton product on
Mac ...... ... .. ... ..... ... ..... ... .. ... ..... ... .. ... 26
Where to find your product key . ..... ... ..... ... .. . 27
Chapter 3 Managing Norton products ... .. ... ..... ... .. ... 30
Creating a Norton account . ... ..... ... .. ... ..... ... . 30
Accessing your Norton account ... ... .. ... ..... ... . 31
Chapter 4 Identifying fraudulent websites .. ... .. ... ..... 32
About Safe Web .... ... .. ... ..... ... .. ... ..... ... .. ... 32
Disabling or enabling Safe Web .... ..... ... .. ... .. 34
About Norton Safe Web .... ... .. ... ..... ... .. ... .... 34
About Norton Phishing Protection .. .. ... ..... ... .. 36
Page 4
Disabling or enabling Norton Phishing
Protection ... ... .. ... ..... ... ..... ... .. ... ..... ... 37
About Norton toolbar .. ..... ... .. ... ..... ... .. ... ..... 38
Chapter 5 Guarding files .. ... .. ... ..... ... .. ... ..... ... .. ... ... 42
About File Guard . ... .. ... ..... ... .. ... ..... ... .. ... ... 42
Disabling or enabling File Guard ... ..... ... .. ... ... 43
Adding files to File Guard . ... ..... ... .. ... ..... ... .. 43
Removing files from File Guard .. ... ..... ... .. ... .. 44
Granting access to guarded files for Mac
OS X applications .. ... ..... ... .. ... ..... ... .. .. 45
Turn on or turn off guarded file access
notification . ... ..... ... ..... ..... ... ..... ... .. ... . 46
Chapter 6 Scanning your Mac manually ..... ... ..... ... .. 47
About Norton Security scans .. .. ... ..... ... .. ... ... 47
Running a Quick Scan ... ... ..... ... .. ... ..... ... .. .. 48
Running a full system scan . ..... ... .. ... ..... ... ... 49
Scanning a specific file or folder ...... ... .. ... ..... 50
About Scan Facebook Wall ..... ... .. ... ..... ... ... 50
Scanning your Facebook wall .... .. ... ..... ... .. ... 52
Running scans from the command
line . ... ..... ... ..... ... .. ... ..... ... .. ... ..... ... .. . 53
Chapter 7 Keeping secure on the Internet ... ... .. ... ..... 54
About Vulnerability Protection . ..... ... .. ... ..... ... 54
Turning off or turning on Vulnerability
Protection ... ... .. ... ..... ... ..... ... .. ... ..... ... 55
Excluding or including attack
signatures .. ..... ... ..... ... .. ... ..... ... .. ... .... 55
Getting information about attack
signatures .. ..... ... ..... ... .. ... ..... ... .. ... .... 57
Enabling or disabling notifications for
blocked attack signatures ... ..... ... .. ... ..... 57
Configuring the port scan sensitivity .... .. ... ..... 59
4Contents
Page 5
Chapter 8 Customizing settings ... ..... ... .. ... ..... ... .. ... 61
About Automatic Scans settings .... .. ... ..... ... .. 63
Turning off or turning on Automatic
Scans ... .. ... ..... ... ..... ..... ... ..... ... .. ... ... 64
Including files for Automatic Scans . ... ..... ... .. .. 65
Excluding files from Automatic Scans .. ..... ... .. 66
Removing files from the Automatic Scans
exclusion list . ... ..... ... ..... ... .. ... ..... ... .. .. 66
Removing files from Automatic Scans
list . ... .. ... ..... ... ..... ... .. ... ..... ... .. ... ..... .. 67
About Scheduled Scans .... ..... ... ..... ..... ... .... 67
Turning on or turning off Scheduled
Scans ... .. ... ..... ... ..... ..... ... ..... ... .. ... ... 68
Customizing Scheduled Scans
settings ... ... .. ... ..... ... ..... ... .. ... ..... ... .. . 68
About Idle Scans . ..... ... ..... ... .. ... ..... ... .. ... ... 71
Turning off or turning on Idle Scans . ... .. ... ..... . 72
Customizing Idle Scans settings . .. ... ..... ... ..... 73
About Firewall settings .. ... ..... ... .. ... ..... ... .. .. 75
About Connection Blocking settings . ... .. ... ..... 80
Configuring Connection Blocking
settings ... ... .. ... ..... ... ..... ... .. ... ..... ... .. . 81
About access settings for an application
.. ... ..... ... .. ... ..... ... ..... ... .. ... ..... ... .. ... . 84
Configuring the access settings for an
application . ... ..... ... ..... ... .. ... ..... ... .. ... . 85
Customizing the specific access settings for
an application .. ..... ... .. ... ..... ... .. ... ..... ... 87
Editing the access settings of an
application . ... ..... ... ..... ... .. ... ..... ... .. ... . 89
Removing access settings for an
application . ... ..... ... ..... ... .. ... ..... ... .. ... . 94
About access settings for a service .. ... ..... ... .. 95
Configuring the access settings for
services ...... ... .. ... ..... ... .. ... ..... ... .. ... ... 96
Customizing the specific access settings for
a service ..... ... ..... ... .. ... ..... ... .. ... ..... ... 99
Editing the access settings for a
service . ... ..... ... ..... ... .. ... ..... ... .. ... .... 101
5Contents
Page 6
Removing the access settings for a
service . ... ..... ... ..... ... .. ... ..... ... .. ... .... 103
About firewall rule for IP addresses ...... ... .. ... 105
Configuring firewall rules for an IP
address . ..... ... ..... ... .. ... ..... ... .. ... ..... . 106
Modifying firewall rules for an IP
address . ..... ... ..... ... .. ... ..... ... .. ... ..... . 107
Removing firewall rule for an IP
address . ..... ... ..... ... .. ... ..... ... .. ... ..... . 108
About configuring firewall for an
application .. ..... ... .. ... ..... ... .. ... ..... ... .. 109
Setting up firewall rules for an
application .. ..... ... .. ... ..... ... .. ... ..... ... .. 110
Customizing the firewall rule for an
application .. ..... ... .. ... ..... ... .. ... ..... ... .. 111
Removing the firewall rule for an
application .. ..... ... .. ... ..... ... .. ... ..... ... .. 112
About Location Awareness settings .. ..... ... ... 112
Disabling or enabling Location
Awareness . ... .. ... ..... ... .. ... ..... ... .. ... .. 113
Viewing Location Awareness settings .. ... .. ... . 113
Exporting the connection blocking settings
for a network location ...... ... .. ... ..... ... .. 114
About advanced protection .... .. ... ..... ... .. ... .. 115
Disabling or enabling advanced protection
features ... ..... ... ..... ... .. ... ..... ... .. ... .... 117
Configuring Norton DeepSight Community
Download .... ... ..... ... .. ... ..... ... .. ... ..... . 118
Configuring Norton DeepSight Community
Submission .... ... .. ... ..... ... .. ... ..... ... .. .. 119
Configuring AutoBlock settings .. ..... ... .. ... .... 120
Managing Excluded IP addresses .. ... ..... ... .. 121
Configuring Signatures settings ... ..... ... ..... .. 123
6Contents
Chapter 9 Managing items in Quarantine .. ..... ... .. ... 125
About Norton Security Quarantine . ... .. ... ..... . 125
Repairing an item in the Quarantine .. ... .. ... ... 125
Restoring an item from the
Quarantine . ... ..... ..... ... ..... ... .. ... ..... .. 126
Page 7
Deleting an item from the Quarantine . ... ..... .. 127
Chapter 10 Protecting against new threats .... ... ..... .. 128
About LiveUpdate . ... .. ... ..... ... ..... ... .. ... ..... 128
About program updates and definition
updates . ..... ... .. ... ..... ... ..... ... .. ... ..... . 128
Checking for updates manually .... ... .. ... ..... .. 129
Chapter 11 Finding additional solutions ..... ... ..... ... .. 131
Checking for virus names and
definitions ...... ... ..... ... .. ... ..... ... .. ... .... 131
Uninstalling Norton Security on Mac .. ..... ... .. 132
Chapter 12 Service and support solutions . ... .. ... ..... . 133
About support ... ... ..... ..... ... ..... ... .. ... ..... ... 133
About Self Help .... ..... ... .. ... ..... ... .. ... ..... ... 135
Contact Support ... ... ..... ... ..... ... .. ... ..... ... .. 135
Support Policy .. ..... ... .. ... ..... ... .. ... ..... ... .. . 136
Keeping your subscription current ..... ..... ... .. 136
7Contents
Page 8

Getting started

This chapter includes the following topics:
1 About Norton Security
1 About the Norton product main window
1 Opening and closing Norton Security on Mac
1 About the Norton Security menu
1 About the Norton Security shortcut menu
1 How to check your Mac user account type
1 Viewing recent activities
1 Viewing network activities
1

About Norton Security

Norton Security delivers today’s fast and light all-in-one solution to protect your Mac and all your online activities.
Norton Security delivers continuous and up-to-date protection from different types of security threats. Norton Security protects you from identity theft attempts, phishing attempts, and other network attacks. It analyzes the security levels of the websites you visit and indicates whether the website is secure. In addition, it protects your sensitive data including your credit card and online banking details from the malicious programs.
Page 9
About Norton Security
Norton Security monitors the network activity of your Mac and manages the incoming and the outgoing access attempts. The Firewall settings contain the rules that specify the access settings for the applications, services, and ports in your Mac. It also contains access settings for the IP addresses in the network to which your Mac is currently connected. Based on the firewall rules, Norton Security allows or blocks the incoming or the outgoing connections that use a particular application, service, or port.
Norton Security provides enhanced security and protects your Mac in the following ways:
1 Automatically detects and removes viruses.
1 Scans and cleans downloaded files and email
attachments.
1 Protects against the attacks that target software
vulnerabilities.
1 Checks for security risks every time you use a
program on your Mac, insert removable media, or access the Internet.
1 Monitors your computer for any unusual symptoms
that may indicate an active threat.
1 Prevents identity thefts and phishing attempts.
1 Protects sensitive information from malicious
programs. Monitors the network activity and blocks unauthorized access attempts.
Symantec does not collect or store any of your personal
w
information. Your information remains encrypted and secure on your Mac.
9Getting started
Page 10
About Norton Security
The following table lists the important features that are available in Norton Security:
10Getting started
Automatic Scans
Automatically detects and removes spyware, viruses, Trojan horses, bots, and Internet worms.
Norton Security provides enhanced security and protects your Mac in the following ways:
1 Checks for security risks
every time you use a program on your computer, insert removable media, and access the Internet.
1 Monitors your computer
for any unusual symptoms that may indicate an active threat.
You can use the Automatic Scans options to customize the protection of your computer.
See “About Automatic Scans
settings” on page 63.
Page 11
About Norton Security
11Getting started
Firewall
Vulnerability Protection
Monitors the network activity of your Mac and manages the incoming and the outgoing access attempts.
The Connection Blocking settings contain the rules that specify the access settings for the applications, services, and ports in your Mac. It also contains access settings for the IP addresses in the network to which your Mac is currently connected. Based on the firewall rules, Norton Security allows or blocks the incoming or the outgoing connections that use a particular application, service, or port.
Blocks any network attacks that can steal your information or take control of your Mac.
See “About Vulnerability
Protection” on page 54.
Page 12
About Norton Security
12Getting started
Scans
LiveUpdate
Lets you perform the following types of scans:
1
Quick Scan
Lets you scan the home folders on your Mac.
1
Full Scan
Lets you select and scan multiple disks to remove viruses and other security threats.
1
File Scan
Lets you scan a particular file or folder on your Mac to know if it is infected.
1
Scan Facebook Wall
Lets you scan News Feeds on your Facebook wall periodically to protect you from malicious links.
See “About Norton Security
scans” on page 47.
Automatically downloads the latest virus definitions and program updates to safeguard your Mac. The virus definitions protect your Mac from the latest viruses and security threats.
Page 13
About Norton Security
13Getting started
Safe Web
File Guard
Activity
Lets you enable or disable the different Safe Web options that protect you from visiting unsafe websites.
You can enable or disable the following Safe Web options:
1 Safe Web
1 Norton Phishing
Protection
See “About Safe Web” on page 32.
Lets you protect the specific files that contain sensitive information from being opened, moved, copied, or deleted without your permission.
See “About File Guard” on page 42.
Lets you monitor the tasks that your product performs in the background. In addition, you can view the statistics of the access attempts and the statuses of different features of Norton Security.
What to do if Norton Security quits unexpectedly?
FAQs on Norton Automatic Renewal Service
Page 14

About the Norton product main window

About the Norton product main window
Your Norton product delivers today’s fast and light all-in-one solution to protect your Mac and all your online activities.
Your Norton product main window provides you a centralized location for the various activities that you can perform using the product. You can access the main features of the product from the main window and manage the performance of your Mac.
You cannot access Norton account if you are a Norton
w
Small Business user.
You can use the following options to perform the important tasks in your Norton product:
14Getting started
Security
Lets you view the overall protection status of your computer.
When your system status is Secure, your computer is fully protected. When your system status is at Attention state, ensure that you fix all the issues. When your system status is at At Risk state, you must take immediate actions to fix the issues.
When your system status is At Risk or Attention, this section automatically provides you an option to fix all the issues at once.
Page 15
About the Norton product main window
15Getting started
Scans
Lets you access different types of scans to protect your computer and your sensitive data.
You can use the Scans option and run the following types of scans:
1
Quick Scan: Scans the home folders on your Mac.
1
Full Scan: Scans selected disks to remove viruses and other security threats.
1
File Scan: Scans a particular file or folder on your Mac and removes any security threats.
1
Scan Facebook Wall: Lets you scan News Feeds on your Facebook wall periodically to protect you from malicious links.
1
Scheduled Scan: Lets you configure a scheduled scan. Norton Security automatically scans your Mac on the day and time that you specify.
Page 16
About the Norton product main window
16Getting started
LiveUpdate
Advanced
Lets you run LiveUpdate to download the latest virus definitions and program updates.
Norton Security uses the latest virus definitions from Symantec servers to detect and remove latest security threats.
What to do if I get a LiveUpdate error?
Lets you access the Advanced window.
You can do the following tasks in the Advanced window:
1 Configure and schedule
different scans.
1 Change the Firewall
settings.
1 Configure Norton Safe
Web for browsers.
1 Safeguard the files that
have your sensitive data.
1 View Security History.
1 View the quarantined
items in the Security History window.
1 View Network Activity
history.
1 Turn on Silent Mode and
Error Reporting features.
In addition, you can choose to turn on or turn off the protection features from this window.
Page 17
About the Norton product main window
17Getting started
Add Devices
Lets you install the latest version of Norton Security on other devices.
This ensures that your Mac and other devices are protected by Norton.
You can use the Get Started option to access your Norton account. You can use your Norton account login credentials to sign in to Norton.
After logging in, you can use the Install on another device option and follow the on-screen instructions to install the product on another device.
Access to Norton
w
account may not be available in some versions of Norton Security.
Your Norton product also provides you quick links at the top of the main window to the most frequent tasks. You can use the Account link to access your Norton account. You can use the Help link to do the following:
1 Access your Norton account
1 Access the online Help and support options
1 Take a product tour
1 Check your subscription status
1 Add devices
1 Enter a product key
1 View product information such as version number,
serial number, Third-Party notice, etc.
Your activation status or subscription status appears at the bottom of the main window. You can use the
Page 18

Opening and closing Norton Security on Mac

Activate Now or Renew Now option to activate or renew your Norton product subscription.
FAQs on Norton Automatic Renewal Service
How to find your product key
Opening and closing Norton Security on Mac
After you install Norton Security, the product automatically protects you from all types of malware and safeguards your sensitive data. If Norton Security detects a threat that requires your attention, an alert appears to help you resolve it. By default, all the protection features are enabled and Norton Security monitors your computer.
You can access Norton Security from the following areas:
1 Applications folder
1 Norton QuickMenu
You cannot close Norton Security if any of the Norton
w
Security dialogs or alerts is open.
To open Norton Security
To open Norton Security, do one of the following:
4
1 In the Applications folder, click Norton Security.
1 On the Mac menu bar, click the Symantec icon,
and then click Open Norton Security.
To close Norton Security
If any of the Norton Security dialogs or alerts is open,
1
close them.
To close Norton Security, do one of the following:
2
1 Click close on the Norton Security main window.
1 Right-click the Norton Security icon in the Dock,
choose Quit.
1 Press Q.
18Getting started
Page 19

About the Norton Security menu

About the Norton Security menu
The Norton Security menu appears on the top-left corner of the Mac menu bar when you launch Norton Security.
You can use the Norton Security option from the Norton Security menu to view the different menu options. You can access the following options from the Norton Security menu:
19Getting started
About Norton Security
Services
Hide Norton Security
Hide others
Show All
Displays the general information of Norton Security.
You can view details such as the build number, layout, product serial number, endpoint ID, and SKU information.
Lets you access the Mac OS X services settings.
Lets you hide the Norton Security application.
Lets you hide the other active applications on your Mac.
Displays all the active programs on your Mac.
This option is available only if you have used the Hide
Norton Security option or the Hide Others option.
Page 20

About the Norton Security shortcut menu

20Getting started
Uninstall Norton Security
Lets you uninstall Norton Security.
You need to have a user account with administrator privileges to uninstall Norton Security.
Quit Norton Security
Lets you close Norton Security.
You can use the Export option under the File menu to export your network location settings. You can export your network location settings in a .npfx file format. See
“Exporting the connection blocking settings for a network location” on page 114.
About the Norton Security shortcut menu
The Norton Security shortcut menu lets you easily access the Norton Security application and explore its features. You can access the Norton Security shortcut menu by control-clicking or right-clicking the Norton Security icon in the Dock.
You can perform the following activities using the shortcut menu:
1 Open the Norton Security main window, the Scans
window, the LiveUpdate window, and the Advanced window.
1 Lets you install the latest version of Norton Security
on other devices.
1 Keep or remove the Norton Security icon from the
Dock.
1 Open Norton Security automatically each time you
log on to your Mac.
1 View the Norton Security application in the
Applications folder.
1 Show or hide Norton Security.
Page 21

How to check your Mac user account type

1 Quit Norton Security.
How to check your Mac user account type
A user account defines the actions a user can perform on a Mac. You can create the following types of user accounts on your Mac:
1 Administrator account
1 Standard account
1 Managed account
Each account has different privileges. An administrator account gives you access to all areas of the Mac, install and update software, create and maintain other user accounts.
If you do not know your user account type, you can check it in System Preferences.
To check your Mac user account type
On the Apple menu, click System Preferences.
1
Click Users & Groups.
2
On the left side of the Users & Groups window, view
3
your account name and account type.
21Getting started

Viewing recent activities

The Security History window lets you view all the recent tasks that your product performs in the background.
You can view the information about the recent activities under the following categories in the Security History window:
General
Lets you view all the recent activities that Norton Security performed.
Page 22
Viewing recent activities
22Getting started
Firewall
Lets you view the following:
1 Applications that were
allowed or blocked.
1 Connection attempts that
were allowed or blocked.
1 Change in the network
location of your Mac.
1 Vulnerability attacks that
were allowed or blocked.
Safe Web & File Guard
Lets you view the list of activities that the Safe Web feature had performed and the unauthorized access attempts to your guarded files.
Protect My Mac
Lets you view the following:
1 List of detected viruses
and the action that was taken against the virus to protect your Mac.
1 List of virus scans that
Norton Security performed on your Mac.
1 List of quarantined files.
To view the recent activities
In the Norton Security main window, click Advanced.
1
On the left pane, click Activity.
2
In the Security History row, click the view icon.
3
In the Security History window, select the category
4
for which you want to view the recent activities.
View the recent activities and click Done.
5
Page 23

Viewing network activities

You can view the incoming and the outgoing network connection details in the Network Activity window.
You can also search for a particular type of application, service, port, or IP address that runs on your Mac and view its network connection details in the Network Activity window. You can view the information about the recent activities under the following categories:
Viewing network activities
23Getting started
Connections
Lets you view the network connection details based on the type of connection.
Your options are:
1
Into my Mac
Displays a list of all incoming connections to your Mac.
1
Out of my Mac
Displays a list of all outgoing connections from your Mac.
1
Listening
Displays a list of all of the applications that are on open ports for incoming traffic.
Page 24
Viewing network activities
24Getting started
Search For
Lets you view the network connection details based on the applications, services, or ports that run on your Mac.
Your options are:
1
Applications
Searches for and displays a list of the applications that are currently running on your Mac.
1
Services & Ports
Searches for and displays a list of the services and ports that run on your Mac.
To view the network connections
In the Norton Security main window, click Advanced.
1
On the left pane, click Activity.
2
In the Network Activity row, click the view icon.
3
In the Network Activity window, select an
4
application, service, or port to view the details of the current network connections.
Click Done.
5
Page 25

Activating your product

This chapter includes the following topics:
1 Activation protects you
1 Activating your Norton product on Mac
1 Where to find your product key

Activation protects you

Product activation is a technology that protects users from pirated or counterfeit software. It protects you by limiting the use of a product to those users who have acquired the product legitimately. Product activation requires a product key for each installation of a product. You must activate the product within a limited time period after you install it.
If you are connected to the Internet, the Norton product prompts you to enter your Norton account credentials. You can use your existing Norton account or register for a new Norton account. After signing in to your Norton account, your Norton product is automatically activated and registered to your Norton account.
You cannot access Norton account if you are a Norton
w
Small Business user.
If you are not connected to the Internet, you can close the Subscription window to start your product. The Subscription window is displayed every time you start your product until you activate your product. If you
2
Page 26

Activating your Norton product on Mac

choose not to activate at that time, you receive an alert that reminds you to activate the product. You can also activate your product from the Norton Security main window.
If you do not activate the product within the time period
w
that the alert specifies, the product stops working. You can activate it after the time period has elapsed, but you are not protected until you activate the product.
Activating your Norton product on Mac
If you did not activate your product after installation, you receive a Subscription alert regularly until you activate the product.
Product activation reduces software piracy and ensures that you use authentic Symantec software. Activation provides you with a specified period of subscription to your Norton product.
You must activate your product within the time period
w
that the alert specifies, or your product stops working. To activate, you need to use the product key that was included with this product.
You need a Norton account to activate your product. You can use your existing Norton account or register for a new Norton account. After signing in to your Norton account, you can enter the product key to activate your Norton product and register the product key to your Norton account. Your Norton account lets you view the details, such as the product key, the product registration date, and recent product updates.
You cannot access Norton account if you are a Norton
w
Small Business user.
To activate your Norton product
Do one of the following:
1
1 In the Activation alert, click Activate Now.
1 In the Norton Security main window, click
Activate Now.
26Activating your product
Page 27

Where to find your product key

On the Subscription window, enter your Norton
2
account credentials, and click Sign In. If you do not have a Norton account, click Create a new Norton account to register for an account.
You can activate your product in one of the following
3
ways:
1 Use a product key
To activate your product using a retail version of the product key that you purchased, click Enter a Key.
1 Buy a new subscription
To purchase a product subscription online, click Buy a Subscription.
1 Use existing subscription
After you sign in to your Norton account, the Subscription window displays the list of product licenses registered to your Norton account and the subscription details for the registered licenses. To use an existing subscription to activate your product, select the subscription, and then click Next.
Follow the on-screen instructions to complete the
4
activation of your Norton product.
27Activating your product
Where to find your product key
The product key is a unique key that helps you to install and activate the Symantec product on your computer. The product key is a 25-character alphanumeric string that is shown in five groups of five characters each, separated by hyphens. The location of the product key varies depending on how you acquired the product.
Page 28
Where to find your product key
The locations of the product key are as follows:
28Activating your product
If you downloaded the product from the Symantec Store
If your computer came with the product already installed
If you received a product key card
If you are still unable to locate your product key, you can recover it using Norton account
The product key is stored on your computer as part of the download process and is included in the confirmation email from the Symantec Store.
The product key is provided as part of the activation process. Be sure to save your product key by creating or signing in to your Norton account, or by printing the key. You may need the product key if you ever want to reinstall your product.
The product key is printed on the card along with instructions on how to use it. Be sure to save your product key by creating or signing in to your Norton account. You need the product key if you ever want to reinstall the product.
To recover or access your product key log on to https://manage.norton.com. If you are not registered, register for Norton account. If you are already registered, you can find the product key on the Services page.
You cannot access
w
Norton account if you are a Norton Small Business user.
Page 29
Where to find your product key
29Activating your product
If you purchased a Norton card from a retail store
The product key is printed at the back of the Norton card.
Go to the following webpage and enter your product key:
https://manage.norton.com/setup
Norton validates the product key that you entered and prompts you to log in using a Norton account. After logging in using your Norton account, you can use the Agree & Download option to download and install your Norton product.
Page 30

Managing Norton products

This chapter includes the following topics:
1 Creating a Norton account
1 Accessing your Norton account

Creating a Norton account

With a Norton account, you can manage all of your Norton products in one place. Your Norton account stores the product key and the billing information of your product. You can also register your product with the Norton account.
You cannot access Norton account if you are a Norton
w
Small Business user.
In addition, Norton account helps you to do the following:
1 Access the product key and other product information
when you need it.
1 Reinstall your Norton product.
1 Buy additional product keys for your home or office.
1 Save online orders and update billing information.
1 Disable the Automatic Renewal feature.
Symantec products that are older than 2006 do not
w
appear in your Norton account.
It takes only a few moments to create your Norton account. You must be connected to the Internet to create a Norton account.
3
Page 31

Accessing your Norton account

To create a Norton account
Open your browser and go to the following URL:
1
https://manage.norton.com
In the Norton webpage that appears, click Create
2
an Account.
In the page that appears, click Create account.
3
In the Create an account webpage, provide the
4
details of your account information, and then click Sign Up.
Accessing your Norton account
The product key for each Norton product is conveniently stored in your Norton account. After you have created your Norton account successfully, you can access your account from anywhere in the world.
You cannot access Norton account if you are a Norton
w
Small Business user.
You can log in to your Norton account any time by visiting the following URL:
https://manage.norton.com
You can easily find and update your account, product, and billing information from your Norton account. You can also change your Norton account password, if required. Your computer must be connected to the Internet to access your Norton account.
Symantec products that are older than 2006 do not
w
appear in your Norton account.
To access Norton account
Open Norton Security.
1
In the Norton Security main window, click Account
2
> Sign In.
In the Norton account webpage, click Sign In.
3
Type your email address and password, and click
4
Sign In.
31Managing Norton products
Page 32

Identifying fraudulent websites

This chapter includes the following topics:
1 About Safe Web
1 Disabling or enabling Safe Web
1 About Norton Safe Web
1 About Norton Phishing Protection
1 Disabling or enabling Norton Phishing Protection
1 About Norton toolbar

About Safe Web

Safe Web monitors your Internet activities and protects you from visiting unsafe websites. Safe Web includes the following features:
1 Norton Safe Web
1 Norton Phishing Protection
1 Norton toolbar
Norton Safe Web provides you a safe search environment by displaying the site-rating icons next to every search result. Phishing Protection analyzes the security levels of the websites you visit and provides a safety rating for each website.
4
Page 33
About Safe Web
When Safe Web is enabled, Norton Security analyzes the security statuses of the websites and alerts you if you visit fraudulent or phishing websites.
The Norton browser extensions get added to your web
w
browser when you launch the Firefox or Safari browser for the first time after you install Norton Security. The Safari browser prompts you for a confirmation before it adds the extension. You can also choose to add the Norton Safe Search box to the Norton toolbar when you launch your browser for the first time.
The following are the different options that you can configure under the Safe Web feature:
33Identifying fraudulent websites
Enhance search engine results
Block harmful websites
Show a warning when visiting a harmful website
Enable Norton Phishing Protection
Submit full URL when a suspicious website is detected
Lets you configure Norton Safe Web to display the site-rating icons next to each search result.
Lets you configure Norton Safe Web to block harmful or malicious websites.
Lets you configure Norton Safe Web to display a warning message when you visit harmful or malicious websites.
Lets you enable or disable Norton Phishing Protection.
The Phishing Protection analyzes the security levels of the websites you visit and displays the safety rating in the Norton toolbar.
Let you submit the URL of the suspicious website to Symantec.
Page 34

Disabling or enabling Safe Web

Disabling or enabling Safe Web
You can disable or enable Safe Web from the Advanced window.
To disable or enable the Safe Web
In the Norton QuickMenu, click Norton Security.
1
In the Norton Security main window, click
2
Advanced.
On the left pane, click Safe Web, and do one of the
3
following:
1 To disable Safe Web, move the Safe Web switch
to the Off position.
1 To enable Safe Web, move the Safe Web switch
to the On position.

About Norton Safe Web

Norton Safe Web is a free service from Norton that helps you surf, search, and shop more safely.
By using Norton Safe Web, you can check if a website is malicious even before you visit it. Norton Safe Web analyzes websites and detects if any viruses, spyware, malware, other security threats exist on a website. Based on the analysis, Norton Safe Web provides safety ratings for all websites.
In addition, Norton Safe Web helps you view the community rating and user reviews of the websites.
If you own a website and your website is not Norton rated, you can register your website for Norton safety ratings. Based on the analysis, Symantec provides a reputation rating for your website. The ratings are available on the Norton Rating report. These ratings help millions of Norton users to decide whether to visit your website.
For each website that you want to know the site safety status, Norton Safe Web lets you do the following:
34Identifying fraudulent websites
Page 35
About Norton Safe Web
1 View the Norton rating
1 View the community rating
1 Add your reviews
1 View the user reviews
1 View a list of keywords that are tagged to the website
1 View the threat information and the general
information about the website
The following are the options that you can use to configure Norton Safe Web:
35Identifying fraudulent websites
Enhance search engine results
Show a warning when visiting a harmful website
Lets you configure Norton Safe Web to display the site-rating icons next to each search result.
When you search the Internet using search engines like Google or Yahoo, Norton Safe Web displays the site-rating icons next to each search result.
Lets you configure Norton Safe Web to display a warning message when you visit harmful websites.
When you select this option Norton Security displays a warning message when you visit harmful websites. Symantec recommends that you do not visit such websites.
Page 36

About Norton Phishing Protection

36Identifying fraudulent websites
Block harmful websites
Lets you configure Norton Safe Web to block harmful websites.
When you select this option Norton Security displays the Website Blocked page when you visit harmful websites. Symantec recommends that you do not visit such websites.
About Norton Phishing Protection
Phishing Protection protects you from visiting unsafe websites. When Phishing Protection is turned on, the Antiphishing component analyzes the security level of the websites that you visit. It then displays the safety rating of the websites in the Norton toolbar. Antiphishing also blocks navigation to the websites that are confirmed to be fraudulent.
The Norton Site Safety indicator in the web browser lets you know if the website that you visit is safe.
The Norton browser extensions get added to your web
w
browsers when you launch the Firefox or Safari browser for the first time after you install Norton Security. You can also choose to add the Norton Safe Search box to the Norton toolbar when you launch your browser for the first time.
The Norton Site Safety indicator displays all Norton Authenticated webpages as Norton Secured. Website hackers often mimic company websites to create fraudulent websites. Norton Security identifies these fraudulent websites. The authenticated websites are categorized as Site Approved websites. These websites usually belong to large financial institutions or shopping websites, with the pages that request personal information.
Page 37

Disabling or enabling Norton Phishing Protection

Symantec analyzes the pages of these websites and verifies if they belong to the company that it represents. You can be confident that the information that you provide goes to the company with which you want to do business.
If you think that the Symantec security status rating is incorrect, you can report the website to Symantec for re-evaluation. For example, you may visit a website that you shop with regularly, and Phishing Protection rates the website as unsafe. You can report the website to Symantec for re-evaluation.
You can select the Submit full URL when a suspicious website is detected option in the Safe Web window to submit the full URL of the suspicious website to Symantec.
Even when you disable the Enable Norton Phishing Protection option, Norton Security protects you from Internet threats through its Norton Safe Web feature. But you cannot submit the evaluation of the webpage to Symantec.
The Norton Phishing Protection feature is supported on Firefox and Safari web browsers.
The Norton toolbar displays the following safety ratings:
1 Site is Safe
1 Site is Unsafe
1 Use Caution
1 Site Untested
1 Norton Secured
1 Not Licensed
37Identifying fraudulent websites
Disabling or enabling Norton Phishing Protection
Phishing Protection protects you from visiting unsafe websites. It analyzes the security level of all the websites that you visit and displays the safety rating in the Norton
Page 38
toolbar of your browser. Phishing Protection also blocks navigation on a fraudulent website.
You can disable or enable Phishing Protection from the Safe Web window.
To disable or enable Norton Phishing Protection
In the Norton QuickMenu, click Norton Security.
1
In the Norton Security main window, click
2
Advanced.
On the left pane, click Safe Web.
3
In the Safe Web row, click the settings icon.
4
In the Safe Web window, do one of the following:
5
1 To disable Norton Phishing Protection, deselect
the Enable Norton Phishing Protection check box.
1 To enable Norton Phishing Protection, select the
Enable Norton Phishing Protection check box.

About Norton toolbar

When you install Norton Security, it adds the Norton toolbar to the supported web browsers.
The Norton toolbar is supported on Firefox and Safari web browsers.
About Norton toolbar
38Identifying fraudulent websites
Page 39
About Norton toolbar
Norton toolbar has the following features:
39Identifying fraudulent websites
Norton menu
Lets you do the following:
1
Open Norton Security
1
Hide Norton Toolbar
1
Disable Safe Search
1
Norton Community Buzz
1
Norton Safe Web Site
1
My Norton account
The Disable Safe
w
Search option appears only if you added the Norton Safe Search box to your Norton toolbar when you first launched your browser after you installed Norton Security.
Norton Site Safety indicator
Lets you know if the website that you visit is safe.
Norton Safe Web analyzes the websites that you visit and provides a safety rating for each website.
The Norton toolbar gives you the following visual indicators of the potential fraud that exists on a website that you visit:
1 The toolbar displays a security status of the website.
1 The toolbar changes color to indicate the safety of
the website.
The following table describes the different security statuses of the Norton toolbar:
Monitoring
Indicates that Norton Security is analyzing the website.
Page 40
About Norton toolbar
40Identifying fraudulent websites
Norton Secured
Site is Safe
Indicates that the website is verified by Symantec.
Symantec analyzed this website and found that the website is VeriSign trusted. The website has a Secure Socket Layer (SSL) certificate provided by VeriSign. VeriSign trusted websites are virus free and are safe. Symantec categorizes the shopping websites that are VeriSign trusted as Norton Secured websites. You can enter your personal information and perform online transactions on this website.
Indicates that Symantec has analyzed this website and determined that there is no indication of threat. Norton Safe Web has also determined that this webpage offers a safe shopping experience.
Page 41
About Norton toolbar
41Identifying fraudulent websites
Site is Unsafe
Use Caution
Indicates Symantec has analyzed this website and determined that the website is unsafe to visit. This website may attempt to install malicious software on your computer. The website that you visit may have
Computer Threats, Identity Threats, and Annoyance Factors.
Symantec recommends that you do not visit this website.
Indicates the Symantec has analyzed this page and determined that this page provides annoying results. The site can spam your email address or change your browser settings without any confirmation. The website that you visit may have Computer Threats,
Identity Threats, and Annoyance Factors.
Symantec recommends that you do not visit this website.
Page 42

Guarding files

This chapter includes the following topics:
1 About File Guard
1 Disabling or enabling File Guard
1 Adding files to File Guard
1 Removing files from File Guard
1 Granting access to guarded files for Mac OS X
applications
1 Turn on or turn off guarded file access notification

About File Guard

5
You can use the File Guard feature of Norton Security to safeguard the files that have your sensitive data. File Guard prevents the files on your Mac from the malicious programs that access your sensitive data without your permission. When a malicious program tries to open, copy, rename, move, or delete the file in the Guarded File list, Norton Security notifies you.
The following are limitations for using the File Guard feature:
1 You cannot add an entire folder to File Guard at
once. You can add multiple files at once by using Command-click or Shift-click.
Page 43

Disabling or enabling File Guard

1 A guarded file must be located on a local disk. It
cannot be in the root folder of the local disk or in the System folder.
1 The maximum number of files you can protect is 250.
Disabling or enabling File Guard
When you disable the File Guard feature, it stops protecting your files that you have added to the Guarded
Files list. The files that you have added in the Guarded Files list are not deleted. If you enable the File Guard
feature again, the files that you have added to the Guarded Files list are protected.
You can disable or enable the File Guard feature from the Advanced window.
The File Guard feature is turned off by default after you install your Norton product. However, Symantec recommends that you keep the File Guard feature enabled to prevent your sensitive data from identity theft.
To disable or enable File Guard
In the Norton QuickMenu, click Norton Security.
1
In the Norton Security main window, click
2
Advanced.
On the left pane, click File Guard, and then do one
3
of the following:
1 To disable File Guard, move the File Guard
switch to the Off position.
1 To enable File Guard, move the File Guard
switch to the On position.
43Guarding files

Adding files to File Guard

File Guard helps you protect your files in which you store your sensitive data including your credit card information and social security number. File Guard protects the sensitive information from unauthorized access. You
Page 44

Removing files from File Guard

must enable the File Guard feature to add files to the Guarded Files list.
You can use the File Guard window to do the following:
1 Add the files that you want to protect against
unauthorized access.
1 Remove the files that are already protected.
1 Enable or disable access to your guarded files by
Mac OS X programs such as Finder and Spotlight.
1 Disable or enable the notifications when an access
to a guarded file is blocked.
To add files to File Guard
In the Norton QuickMenu, click Norton Security.
1
In the Norton Security main window, click
2
Advanced.
On the left pane, click File Guard.
3
In the File Guard row, click the settings icon.
4
In the File Guard window, do one of the following:
5
1 Drag and drop individual files to the Guarded
Files list.
1 Click Add File(s), and then select individual files
or folders.
Click Done.
6
44Guarding files
Removing files from File Guard
You can remove the files that you added to the Guarded Files list at any time. If you remove the guarded files,
File Guard stops protecting the files that have your sensitive information from unauthorized access. You can then add the files to the Guarded Files list to protect them again.
To remove files from File Guard
In the Norton QuickMenu, click Norton Security.
1
In the Norton Security main window, click
2
Advanced.
Page 45

Granting access to guarded files for Mac OS X applications

On the left pane, click File Guard.
3
In the File Guard row, click the settings icon.
4
In the Guarded Files list, select the files that you
5
want to remove. To select multiple items, use Shift-click or
Command-click.
Click Remove File(s).
6
Click Done.
7
Granting access to guarded files for Mac OS X applications
You can enable the Allow Mac OS X to access my guarded files option to enable the Mac OS X
applications such as Finder and Spotlight to gain access to your guarded files without notification. This option enables you to copy, move, rename, or delete the guarded files using applications such as Finder and Spotlight.
When you enable the Allow Mac OS X to access my guarded files option, the Mac operating system processes that run in the background can also access your guarded files without notification.
To grant access to guarded files for Mac OS X applications
In the Norton Security main window, click Advanced.
1
On the left pane, click File Guard.
2
In the File Guard row, click the settings icon.
3
In the File Guard window, check Allow Mac OS X
4
to access my guarded files.
Click Done.
5
45Guarding files
Page 46

Turn on or turn off guarded file access notification

Turn on or turn off guarded file access notification
When there is an unauthorized access to the guarded files, the File Guard feature notifies you. You must enable the Notify me when access to a guarded file is automatically blocked option to get a notification.
To turn on or turn off guarded file access notification
In the Norton Security main window, click Advanced.
1
On the left pane, click File Guard.
2
In the File Guard row, click the settings icon.
3
In the File Guard window, do one of the following:
4
1 To turn on notification, check Notify me when
access to a guarded file is automatically blocked.
1 To turn off notification, uncheck Notify me when
access to a guarded file is automatically blocked.
Click Done.
5
46Guarding files
Page 47

Scanning your Mac manually

This chapter includes the following topics:
1 About Norton Security scans
1 Running a Quick Scan
1 Running a full system scan
1 Scanning a specific file or folder
1 About Scan Facebook Wall
1 Scanning your Facebook wall
1 Running scans from the command line

About Norton Security scans

6
Norton Security lets you perform manual virus scans.
The Automatic Scans feature monitors your Mac for viruses in the following ways:
1 Scans all the files when they are created, copied, or
modified.
1 Scans the disks and removable media.
However, Automatic Scans might not detect the following viruses:
1 Viruses that were on your Mac before you installed
Norton Security.
Page 48

Running a Quick Scan

1 Viruses in the files that are excluded from the
Automatic Scans.
In this case, you can use Norton Security to scan a particular file, folder, or drive on your Mac.
You can perform the following types of manual virus scans:
48Scanning your Mac manually
Quick Scan
Full Scan
File Scan
Running a Quick Scan
Quick Scan helps you to scan the areas of your computer that the viruses and other security risks often target. Quick Scan does not scan your entire computer.
To run a Quick Scan
In the Norton Security main window, click Scans.
1
Scans the important locations of your Mac that the viruses and other security threats often target.
Quick Scan takes less time because this scan does not scan your entire Mac.
Scans your entire Mac for all types of viruses and security threats.
Scans the selected files or folders for all types of viruses and security threats.
Page 49

Running a full system scan

On the left pane, click Quick Scan, and then click
2
Start a Quick Scan. You can use the following options when the scan is in process:
49Scanning your Mac manually
Pause
Cancel
Running a full system scan
You can run a full system scan on your Mac. A full system scan thoroughly examines your entire computer for viruses, spyware, and different security vulnerabilities.
To run a full system scan
In the Norton Security main window, click Scans.
1
On the left pane, click Full Scan, and then click Start
2
a Full Scan. You can use the following options when the scan is in process:
Pause
Suspends the scan temporarily.
You must click the Resume option to continue the scan.
Terminates the scan.
Suspends the scan temporarily.
You must click the Resume option to continue the scan.
Cancel
Terminates the scan.
Page 50

Scanning a specific file or folder

Scanning a specific file or folder
By using Norton Security, you can scan a specific file or a folder. For example, if you have received a compressed file in an email message and if you suspect a virus, you can use the File Scan option to scan that file.
To scan a specific file or folder
In the Norton Security main window, click Scans.
1
On the left pane, click File Scan.
2
Click Select a file and navigate to the file or folder
3
location.
Select the folder or file that you want to scan and
4
then click Scan. You can also drag and drop the folder or file.

About Scan Facebook Wall

Norton Safe Web protects your computer while you use Facebook. It scans each URL that is available on your Facebook wall and displays the Norton rating icons for the scanned URLs.
You can also check if a URL is safe or unsafe and then share the URL with your friends on Facebook. Norton Safe Web scans the URL that you post on Facebook wall and gives you the safety status for the URL. This way, you are not only protected from unsafe websites but you also let other Facebook users know the security status of any website.
You can also use the Scan Facebook Wall option in the Norton Security to scan your Facebook wall. Norton Security takes you to the Facebook login webpage. After you log in to your Facebook profile, Norton Safe Web asks for your permission to access your Facebook wall. You can use the Allow option to view the Additional
Permissions Required page. The Please grant us permission to access your News Feed and Wall
50Scanning your Mac manually
Page 51
About Scan Facebook Wall
option on this page lets you give permission to Norton Safe Web to access your Facebook wall.
The auto-scan feature in the Norton Safe Web application page helps you protect your Facebook wall. Norton Safe Web scans the News Feed on your Facebook wall periodically and protects you from malicious links. When Norton Safe Web detects a malicious link, it notifies you. To activate Norton Auto-Scan, go to your Norton Safe Web webpage on Facebook, and then click Auto-Scan On.
To remove the malicious link from your Facebook wall, go to your profile and remove the malicious link. If your friend has posted the malicious link, you can use the Warn Your Friends option to alert your Facebook friend. You can also click See Norton Safe Web Report to view Norton ratings and other details about this malicious link. When no malicious activity is detected on your Facebook wall, Norton Safe Web posts a message every week notifying that your Facebook wall is safe.
If you later decide to remove Norton Safe Web from your Facebook profile, you can use the App settings option of Facebook.
The following are the safety states that Norton Safe Web provides after it scans the links on your Facebook wall:
51Scanning your Mac manually
Safe
Indicates that the website is safe to visit and Norton Trusted.
The websites with this rating do not harm your computer and so you can visit this site.
Page 52

Scanning your Facebook wall

52Scanning your Mac manually
Warning
Untested
Caution
Indicates that the website has security risks.
The websites with this rating may install malicious software on your computer. Symantec recommends that you do not visit this site.
Indicates that Norton Safe Web has not yet tested this site and it does not have sufficient information about this website.
Indicates that the site may have security threats. Symantec recommends you to be cautious while you visit such websites.
Scanning your Facebook wall
The Norton Safe Web feature scans your Facebook wall and analyzes the security levels of all the available links on your Facebook wall. It then displays the security status of the scanned URLs. However, Norton Safe Web requires your permission to scan your Facebook wall.
To scan your Facebook wall
In the Norton Security main window, click Scans.
1
On the left pane, click Scan Facebook Wall, and
2
then click Scan my Facebook wall.
In the Facebook login webpage, log in to your
3
Facebook profile.
Follow the on-screen instructions.
4
Page 53

Running scans from the command line

Running scans from the command line
Norton Security lets you perform multiple scans from the command line interface. The Norton Scanner feature in Norton Security provides this power user feature. Symantec recommends that you use this feature only if you are an advanced user.
You can launch the command line interface by navigating to Finder > Applications > Utilities > Terminal.
To run a Quick Scan
In the command line, type
4
/usr/bin/nortonscanner quickscan.
To run a full system scan
In the command line, type
4
/usr/bin/nortonscanner systemscan.
To scan a specific file
In the command line, type
4
/usr/bin/nortonscanner –a <file path>.
To scan a compressed file
In the command line, type
4
/usr/bin/nortonscanner –c <file path>.
To scan the Quarantine
In the command line, type
4
/usr/bin/nortonscanner quarantine.
53Scanning your Mac manually
Page 54

Keeping secure on the Internet

This chapter includes the following topics:
1 About Vulnerability Protection
1 Turning off or turning on Vulnerability Protection
1 Excluding or including attack signatures
1 Getting information about attack signatures
1 Enabling or disabling notifications for blocked attack
signatures
1 Configuring the port scan sensitivity

About Vulnerability Protection

7
Vulnerability Protection feature helps you in detecting and preventing Intrusions through the Internet. Vulnerability Protection provides information about the susceptibility of the programs that may be on your Mac against malicious attacks. It also provides information about the known attacks.
Vulnerabilities are flaws in your programs or your operating system that can create weaknesses in the overall security of your Mac. Improper Mac configurations or security configurations also create vulnerabilities. External attackers exploit these vulnerabilities and perform malicious actions on your Mac. Examples of such malicious attacks are active desktop monitoring, keylogging, and hacking. Such
Page 55

Turning off or turning on Vulnerability Protection

attacks can slow down the performance of your Mac, cause program failure, or expose your personal data and confidential information to the hackers.
Norton Security provides the signature-based solutions to protect your Mac from the most common Internet attacks. Attack signatures contain the information that identifies an attacker's attempt to exploit a known vulnerability in your operating system or your Mac programs. The Intrusion Prevention feature of Norton Security uses an extensive list of attack signatures to detect and block suspicious network activity.
Turning off or turning on Vulnerability Protection
You can choose whether you want to protect your Mac from the threats that can affect your Mac vulnerabilities.
By default, the Vulnerability Protection option is turned on. Symantec recommends that you keep the Vulnerability Protection option turned on to protect your Mac from any malicious attacks.
To turn off or turn on Vulnerability Protection
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Vulnerability Protection row, do one of the
3
following:
1 To turn off the Vulnerability Protection feature,
move the switch to the Off position.
1 To turn on the Vulnerability Protection feature,
move the switch to the On position.
55Keeping secure on the Internet

Excluding or including attack signatures

Norton Security performs scans by comparing the signature of the files against the known attack signatures to identify threats on your Mac. An attack signature is
Page 56
Excluding or including attack signatures
used to identify an attacker's attempt to exploit a known operating system or application vulnerability.
You can choose whether you want to protect your Mac from all the attack signatures or only from the selected signatures. In some cases, benign network activity can appear to be similar to an attack signature. You might receive repeated notifications about possible attacks. If you know that the attacks that trigger these notifications are safe, you can create an exclusion list for the signature that matches the benign activity.
If you want protection against vulnerabilities, but you do not want to receive notifications about blocked attacks, you can stop Vulnerability Protection from displaying notifications. Unless you have a good reason to disable a signature, you should leave the signatures turned on. If you disable a signature, your computer may be vulnerable to attack.
To enable or disable attack signatures
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Vulnerability Protection row, click the settings
3
icon.
In the Vulnerability Protection window, click the
4
Signatures tab.
In the Signatures list, select a signature, and do one
5
of the following:
1 To disable the detection of the attack signature,
uncheck Enable this signature
1 To enable the detection of the attack signature,
check Enable this signature
Click Done.
6
56Keeping secure on the Internet
Page 57

Getting information about attack signatures

Getting information about attack signatures
Vulnerability Protection uses a frequently updated list of signatures to detect known attacks. You can view the list of signatures or get information on a specific signature from the Symantec Security Response website.
A web browser opens to display information about the signature from the Symantec website.
To get information about a signature
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Vulnerability Protection row, click the setting
3
icon.
In the Vulnerability Protection window, click the
4
Signatures tab.
In the Signatures list, select the signature for which
5
you want to get more information.
Click Learn More.
6
The information about the selected signature appears in a separate webpage.
57Keeping secure on the Internet

Enabling or disabling notifications for blocked attack signatures

You can choose whether you want to receive notifications when Vulnerability Protection blocks suspected attacks.
The notification message lets you do the following:
1 To view the details of the blocked attack.
1 To report a wrongly detected attack.
All of the Vulnerability Protection activities are recorded in the Security History window. The entries include
Page 58
Enabling or disabling notifications for blocked attack signatures
information about the unauthorized accesses attempts and other details.
You can enable or disable notification for all blocked attacks or for individual attack signatures.
To enable or disable notifications for all blocked attacks
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Vulnerability Protection row, click the settings
3
icon.
In the Vulnerability Protection window, click the
4
Advanced tab.
In the Advanced tab, do one of the following:
5
1 To disable the notifications for all blocked attacks,
deselect Notify me when Vulnerability Protection automatically blocks an attack.
1 To enable the notifications for all blocked attacks,
select Notify me when Vulnerability Protection automatically blocks an attack.
Click Done.
6
To enable or disable notifications for individual attack signatures
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Vulnerability Protection row, click the settings
3
icon.
In the Vulnerability Protection window, click the
4
Signatures tab.
In the Signature list, do one of the following:
5
1 To disable the notifications, deselect Show
notifications for this signature.
1 To enable the notifications, select Show
notifications for this signature.
Click Done.
6
58Keeping secure on the Internet
Page 59

Configuring the port scan sensitivity

Configuring the port scan sensitivity
Port scanner is an application that randomly searches for vulnerable areas of the computers that are connected on a network. When you use the Internet, port scanners might try to infect through the vulnerabilities of your Mac. The Vulnerability Protection feature monitors your Mac for port scans and blocks the connection from unauthorized or unknown computers.
Port scans are also used for legitimate purposes. For example, network administrators perform port scans to find and solve any potential problem in your Mac. You can adjust the sensitivity of Vulnerability Protection against the port scan.
Norton Security notifies you each time it blocks a port scan. The number of notifications varies based on the sensitivity level that you configure for port scans. For example, if you configure the Most secure option, Norton Security displays more notifications. Norton Security port scan detection does not work when the built-in Mac OS X firewall is turned on.
To configure the port scan sensitivity
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Vulnerability Protection row, click the settings
3
icon.
In the Vulnerability Protection window, click the
4
Advanced tab.
59Keeping secure on the Internet
Page 60
Configuring the port scan sensitivity
Under Sensitivity, select any one of the following
5
sensitivity level:
60Keeping secure on the Internet
Most secure
Moderate secure
Less secure
When you set this level, Norton Security is more sensitive to port scan. It blocks any application from accessing your Mac and notifies you with alerts. You can set this option when you use a public wireless network to provide the maximum protection for your Mac.
When you set this level, Norton Security is moderately sensitive to port scans and blocks any unknown or any unwanted application from accessing your Mac.
By default, this option is selected.
When you set this level, Norton Security is less sensitive to port scans and allows applications to access your Mac. However, Norton Security scans all the application that attempts to access your Mac and notifies you about the details of the applications.
Click Done.
6
Page 61

Customizing settings

This chapter includes the following topics:
1 About Automatic Scans settings
1 Turning off or turning on Automatic Scans
1 Including files for Automatic Scans
1 Excluding files from Automatic Scans
1 Removing files from the Automatic Scans exclusion
list
1 Removing files from Automatic Scans list
1 About Scheduled Scans
1 Turning on or turning off Scheduled Scans
8
1 Customizing Scheduled Scans settings
1 About Idle Scans
1 Turning off or turning on Idle Scans
1 Customizing Idle Scans settings
1 About Firewall settings
1 About Connection Blocking settings
1 Configuring Connection Blocking settings
1 About access settings for an application
Page 62
1 Configuring the access settings for an application
1 Customizing the specific access settings for an
application
1 Editing the access settings of an application
1 Removing access settings for an application
1 About access settings for a service
1 Configuring the access settings for services
1 Customizing the specific access settings for a service
1 Editing the access settings for a service
1 Removing the access settings for a service
1 About firewall rule for IP addresses
1 Configuring firewall rules for an IP address
1 Modifying firewall rules for an IP address
1 Removing firewall rule for an IP address
1 About configuring firewall for an application
62Customizing settings
1 Setting up firewall rules for an application
1 Customizing the firewall rule for an application
1 Removing the firewall rule for an application
1 About Location Awareness settings
1 Disabling or enabling Location Awareness
1 Viewing Location Awareness settings
1 Exporting the connection blocking settings for a
network location
1 About advanced protection
Page 63

About Automatic Scans settings

1 Disabling or enabling advanced protection features
1 Configuring Norton DeepSight Community Download
1 Configuring Norton DeepSight Community
Submission
1 Configuring AutoBlock settings
1 Managing Excluded IP addresses
1 Configuring Signatures settings
About Automatic Scans settings
Automatic Scans provide enhanced security from the time you start your Mac. This feature ensures better protection by running all the necessary components that are required.
Automatic Scans protect your Mac in the following ways:
1 Scans the files when they are created, copied, or
modified.
1 Scans the disks and removable media when they
are first accessed by your Mac.
1 Scans all the traffic through Internet to your Mac.
If your Mac is configured with more than one user
w
account, these settings apply to all the user accounts.
You can configure Automatic Scans settings in the Protect My Mac section of the Advanced window. The Automatic Scans settings are:
1 Scan everything
Scans all the files on your Mac during Automatic Scans.
Scan everything provides better protection when compared to other type of scans. By default, Scan everything is selected.
1 Scan only these folders
63Customizing settings
Page 64

Turning off or turning on Automatic Scans

Lets you specify the folders that you want to be scanned automatically.
1 Don't scan these folders
Lets you exclude specific folders from Automatic Scans.
1 Scan files in compressed archives
(Recommended)
Lets you enable or disable Norton Security to scan the files within the compressed files available on your Mac. For example, files with .zip or .rar file extension with the maximum size limit of 1 MB.
1 Scan files on external drives on access
Lets you enable or disable Norton Security to scan the files available on an external drive that is connected to your Mac.
1 Reset to Defaults
Lets you reset configuration to default level.
Turning off or turning on Automatic Scans
If you turn on the Automatic Scans, Norton Security automatically performs the following activities each time you turn on your Mac:
1 Downloads the most up-to-date virus definitions.
1 Scans entire Mac and removes viruses from infected
files.
1 Monitors all the incoming and outgoing traffic on your
Mac.
Norton Security displays a message if there is an issue that requires your attention. For example, if there is a security risk, Norton Security pop-ups a warning message with a list of options. You can choose an option and take appropriate action on the unresolved risk. You can open Norton Security at any time to see the status of your Mac or to view the protection details.
64Customizing settings
Page 65

Including files for Automatic Scans

To turn off or turn on Automatic Scans
In the Norton Security main window, in the left pane,
1
click Advanced.
On the left pane, click Protect My Mac.
2
In the Automatic Scans row, do one of the following:
3
1 Turn off Automatic Scans, move the switch to the
Off position.
1 Turn on Automatic Scans, move the switch to the
On position.
Including files for Automatic Scans
If you think that any file or application on your Mac is vulnerable, you can add it for Automatic Scans.
For example, if you think the Downloads folder in your Mac that you use frequently to download files from the Internet is vulnerable, you can add the Downloads folder to Automatic Scans. Norton Security scans this folder when it is modified and ensures that your Mac is not infected.
You can use the Scan only these folders option and customize Automatic Scans to scan only the selected files.
To include a file for Automatic Scans
In the Norton Security main window, click
1
Advanced.
On the left pane, click Protect My Mac
2
In the Automatic Scans row, click the settings icon.
3
In the Automatic Scans window, click Scan only
4
these folders.
Click +.
5
Browse for the folder that you want to scan
6
automatically.
Click Add.
7
Click Save.
8
65Customizing settings
Page 66

Excluding files from Automatic Scans

Excluding files from Automatic Scans
By default, Norton Security scans all the files and folders on your Mac. However, you can configure it not to scan certain files or directories. You can exclude some frequently used applications from Automatic Scans to reduce the scanning time.
To exclude a file from Automatic Scans
In the Norton Security main window, click
1
Advanced.
On the left pane, click Protect My Mac
2
In the Automatic Scans row, click the settings icon.
3
In the Automatic Scans window, click Don't scan
4
these folders.
Click +.
5
Browse for the folder that you do not want Norton
6
Security to scan automatically.
Click Exclude.
7
Click Save.
8
Removing files from the Automatic Scans
66Customizing settings
exclusion list
If you think any of the files that are excluded from Automatic Scans are vulnerable, you can remove the file from the list. The removed files are automatically added for Automatic Scans.
To remove a file from the Automatic Scans exclusion list
1
2 3 4
In the Norton Security main window, click Advanced.
On the left pane, click Protect My Mac
In the Automatic Scans row, click the settings icon.
In the Automatic Scans window, click Don't scan these folders.
Page 67

Removing files from Automatic Scans list

Select the folder that you want to remove from the
5
exclusion list and click -.
Click Save.
6
Removing files from Automatic Scans list
The files that are included for Automatic Scans are listed in the Scan only these folders list. If you think that scanning a file that you included previously is not necessary, you can remove it from the Automatic Scans list.
To remove a file from the Automatic Scans list
In the Norton Security main window, click
1
Advanced.
On the left pane, click Protect My Mac
2
In the Automatic Scans row, click the settings icon.
3
In the Automatic Scans window, click Scan only
4
these folders.
Select the folder that you want to remove from the
5
list and click -.
Click Save.
6
67Customizing settings

About Scheduled Scans

Norton Security automatically detects the idle state of your Mac and runs an idle scan.
However, you can schedule a scan according to your preferences. You can schedule a scan to run automatically on a specific day and time. If the scheduled scan begins when you use your computer, you can run the scan in the background instead of stopping your work.
The scheduled scan settings do not change when a
w
different user uses the Mac. Norton Security runs the scheduled scan at the scheduled time with the settings already configured.
Page 68

Turning on or turning off Scheduled Scans

Norton Security displays the scan results on your computer when the scheduled scan is complete.
You can use the Reset to Defaults option to reset the Scheduled Scans settings to default.
Turning on or turning off Scheduled Scans
You can configure Norton Security to run a scheduled scan. Norton Security runs the scan on a specific day and time.
If the scheduled scan begins when you use your computer, you can run the scan in the background instead of stopping your work. You need to turn on the Scheduled Scans feature to let Norton Security scan your computer. By default, the Scheduled Scans feature is turned off.
To turn on or turn off Scheduled Scans
In the Norton Security main window, click Advanced.
1
On the left pane, click Protect my Mac.
2
In the Scheduled Scans row, do one of the following:
3
1 To turn on Scheduled Scans, move the switch to
the On position.
1 To turn off Scheduled Scans, move the switch to
the Off position.
68Customizing settings

Customizing Scheduled Scans settings

You can configure Norton Security to run a scheduled scan. Norton Security runs the scan on a specific day and time. If the scheduled scan begins when you use your computer, you can run the scan in the background instead of stopping your work. Norton Security lets you customize the settings for the scheduled scan.
Norton Security displays the scan results on your computer when the scheduled scan is complete.
Page 69
Customizing Scheduled Scans settings
The scheduled scan settings do not change when a
w
different user uses the Mac. Norton Security runs the scheduled scan at the scheduled time with the settings already configured.
To customize Scheduled Scans settings
In the Norton Security main window, click Advanced.
1
On the left pane, click Protect my Mac.
2
In the Scheduled Scans row, click the settings icon.
3
69Customizing settings
Page 70
Customizing Scheduled Scans settings
In the Scheduled Scans window, configure your
4
scan settings. Your options are:
70Customizing settings
When to Scan
What to Scan
Scan files in compressed archives (Recommended)
Lets you specify the day and time at which you want Norton Security to run the scan.
Lets you specify the area that you want Norton Security to scan.
Your options are:
1
Startup Disk
Performs a scan on the startup (boot) disk of your Mac.
1
All User Folders
Performs a scan on all of the home folders on your Mac.
1
Entire System
Performs a scan on all the available disks of your Mac.
Lets you enable or disable Norton Security to scan the files within the compressed files.
Page 71

About Idle Scans

71Customizing settings
Show Scheduled Scan Results
Reset to Defaults
Lets you specify when you want Norton Security to notify you about the Scheduled Scan results.
Your options are:
1
Only when infections are found
Select this option if you want to be notified when a security threat is detected.
1
Always
Select this option if you want to receive notification for activities of Norton Security during the scheduled scan. You can receive notifications for activities such as completed scans or scans that are canceled because of system activity.
Lets you set the Scheduled Scans settings to the recommended settings.
Click Save.
5
About Idle Scans
Norton Security keeps your Mac secure from latest security threats by automatically running scans on your computer using the Idle Scans feature. Idle scan detects the time when you do not use your Mac and intelligently runs the scan.
Page 72

Turning off or turning on Idle Scans

The Idle Scans option is automatically turned on when you install Norton Security. Even though idle scan automatically runs the scan, you can still customize the settings of idle scan. Norton Security decides when to run idle scan depending on your settings and a few other predefined parameters.
The idle scan settings do not change when a different
w
user uses the Mac. Norton Security detects the idle time of the Mac and runs the idle scan with the settings already configured.
Norton Security discontinues any idle scan that it started during idle time if you begin to use your Mac again. However, it resumes the scan when your Mac is idle again. You should always keep the Idle Scans option turned on to let Norton Security scan your Mac when it becomes idle.
You can use the Reset to Defaults option to reset the Idle Scans settings to default.
Turning off or turning on Idle Scans
Your Norton product keeps your Mac secure from latest security threats by automatically running scans on your computer using the Idle Scans feature. Your Norton product detect the time when you do not use your Mac and intelligently runs the scan.
You should always keep the Idle Scans option turned on to let your Norton product scan your computer when it becomes idle.
To turn off or turn on Idle Scans
In the Norton Security main window, click Advanced.
1
On the left pane, click Protect my Mac.
2
In the Idle Scans row, do one of the following:
3
1 To turn off idle scans, move the switch to the Off
position.
1 To turn on idle scans, move the switch to the On
position.
72Customizing settings
Page 73

Customizing Idle Scans settings

Customizing Idle Scans settings
Norton Security keeps your Mac secure from latest security threats by automatically running scans on your computer using the Idle Scans feature. Idle Scans detect the time when you do not use your Mac and intelligently run the scan.
The idle scan settings do not change when a different
w
user uses the Mac. Norton Security detects the idle time of the Mac and runs the idle scan with the settings already configured.
To customize Idle Scans settings
In the Norton Security main window, click Advanced.
1
On the left pane, click Protect my Mac.
2
In the Idle Scans row, click the settings icon.
3
73Customizing settings
Page 74
Customizing Idle Scans settings
In the Idle Scans window, customize your scan
4
settings. You can customize the scan in the following ways:
74Customizing settings
What to Scan
Scan files in compressed archives (Recommended)
Lets you specify the area that you want Norton Security to scan. Your options are:
1
Startup Disk
Performs an idle scan on the startup (boot) disk of your Mac.
1
All User Folders
Performs an idle scan on all of the home folders on your Mac.
1
Entire System
Performs an idle scan on all the available disks of your Mac.
Lets you enable or disable Norton Security to scan the files within the compressed files.
Page 75

About Firewall settings

75Customizing settings
Show Idle Scan Results
Reset to Defaults
About Firewall settings
Lets you view the idle scan results in the Security History window. Your options are:
1
Only when infections are found
Select this option if you want to view the scan results when a security threat is detected.
1
Always
Select this option if you want to view the activities of Norton Security during the idle scan. You can view activities such as completed scans or scans that are canceled because of system activity.
Lets you set the Scheduled Scans settings to the recommended settings.
Firewall settings let you customize how firewall should monitor and respond to the inbound and the outbound network communications. Firewall settings contain the access settings for the applications, services, and ports on your Mac. They also contain access settings for connections to or from the other computers in the network to which your Mac is connected.
Page 76
About Firewall settings
You can use the Firewall window to customize the following firewall settings:
76Customizing settings
Application Blocking
Lets you configure firewall rules for the applications that run on your Mac to connect to the Internet.
The Application Blocking settings determine whether to allow or deny an application, such as a Web browser or iTunes, from connecting to the Internet.
Application Blocking settings are not specific to a particular network location. The Application Blocking settings do not change when you change to a different network location.
You can use the Configure option under Application Blocking to set Internet access for applications on your Mac.
Whenever an overlap
w
exists in the settings between Connection Blocking and Application Blocking, the Connection Blocking settings take precedence over the Application Blocking settings.
Page 77
About Firewall settings
77Customizing settings
Connection Blocking
Vulnerability Protection
Lets you allow or block the applications, ports, services, and IP addresses that:
1 Connect to your Mac.
1 Connect to a network.
The Connection Blocking settings determine whether to allow or deny the incoming or the outgoing connections that use a specific service, application, or a port. You can also configure firewall to allow or block a specific IP address on the network.
Connection blocking settings apply only to a particular location.
You can use the settings icon in the Connection Blocking row to set connections for applications and services on your Mac.
Helps you in detecting and preventing Intrusions through the Internet. Vulnerability Protection monitors all the incoming and the outgoing traffic on your Mac and blocks any unauthorized access.
It provides information about the susceptibility of the programs that may be on your Mac against malicious attacks. It also provides information about the known attacks. You can manage the list of signatures for Vulnerability Protection.
Page 78
About Firewall settings
78Customizing settings
Location Awareness
Lets you configure the firewall settings based on the network location to which your Mac is connected.
The firewall settings that you configure contains the connection blocking settings for the application and services that run on your Mac. When you connect your portable Mac to a new network location, Norton Security prompts you to select a new firewall setting for the network location.
Page 79
About Firewall settings
79Customizing settings
DeepSight
Lets you access and configure the Norton DeepSight Community Download and Norton DeepSight Community Submission features.
Your options are:
1
Norton DeepSight Community Download
This feature lets you obtain the updated list of IP addresses that Symantec identifies as attackers. You can enable the Norton DeepSight Community Download feature to obtain the updated list of IP addresses from Symantec servers.
1
Norton DeepSight Community Submission
This feature helps you identify new security risks by submitting selected security and application data to Symantec for analysis. Symantec assesses the data to determine the new threats and their sources. You can enable or disable the Norton DeepSight Community Submission feature in the Advanced Protection window to allow or block the security risks information submission.
Page 80

About Connection Blocking settings

About Connection Blocking settings
You can configure the Connection Blocking settings for an application, a service, or an IP address. Based on the Connection Blocking settings, the firewall allows, or blocks the incoming and the outgoing network connections.
The Connection Blocking settings that you configure are specific to the selected network location. The settings apply only when your Mac connects to the specified network location.
You can configure the Connection Blocking settings for the following:
80Customizing settings
Applications
Services/Ports
Zones
All, in order of precedence
Lets you specify access settings for the applications that run on your Mac.
Lets you specify access settings for the services and ports that run on your Mac.
Lets you specify the IP address to or from which you want to allow or block connections.
Lets you view the entire access settings for a firewall setting that you select.
Whenever the settings overlap, settings at the top of the list take precedence over the settings in the bottom of the list.
Page 81

Configuring Connection Blocking settings

Configuring Connection Blocking settings
Connection Blocking settings apply to the incoming and the outgoing connections that use a specific application, service, port, or IP address.
You can use the Connection Blocking window to configure whether an application or a service that is allowed to connect to the Internet or to the local network. You can select the required network location from the Editing settings menu and configure the Connection Blocking settings.
You can configure the Connection Blocking settings only
w
if the Connection Blocking option is turned on in the Advanced window.
You must have a user account that has administrator
w
privileges to perform this task.
To configure Connection Blocking settings
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Connection Blocking row, click the settings
3
icon.
In the Connection Blocking window, in the Editing
4
settings menu, select the network location for which you want to configure the connection blocking settings.
81Customizing settings
Page 82
Configuring Connection Blocking settings
Select an option in the View menu.
5
The options that appear in the View menu vary depending on the network location that you select in the Editing settings menu. Your options are:
82Customizing settings
Applications
Services/Ports
Zones
All, in order of precedence
Lets you specify the Connection Blocking settings for the applications that run on your Mac.
Lets you specify the Connection Blocking settings for the services and ports that run on your Mac.
Lets you specify the IP address to or from which firewall allows or blocks connections.
Lets you specify the current Connection Blocking settings for the Applications, services, ports, and zones in the order of precedence.
Page 83
Configuring Connection Blocking settings
Select one of the following tabs:
6
83Customizing settings
Incoming
Outgoing
Incoming & Outgoing
Lets you specify the access settings for the incoming connections that use an application or a service that runs on your Mac.
Lets you specify the access settings for the outgoing connections that use an application or a service that runs on your Mac.
Lets you configure the access settings for connections to and from the IP addresses that you specify.
This tab appears only when you select Zones in the View menu.
Page 84

About access settings for an application

Use the Action pop-up menu at the bottom of the
7
Connection Blocking window to specify other connection blocking preferences. Your options are:
84Customizing settings
Logging and notification settings
Advanced settings
Reset to defaults
Click Done.
8
Lets you specify the type of access attempts for which Norton Security must maintain records.
You can also specify the type of access attempts about which Norton Security must notify you.
Lets you specify the advanced firewall options.
Lets you reset configuration to default level.
About access settings for an application
You can use the Connection Blocking window to specify the access settings of applications to connect to a network. You can customize the firewall to allow or block network connections to or from applications like iTunes.
You can also configure the default and specific access settings for an application. The default access settings apply to all the incoming and the outgoing connections within your network. The specific access settings let you allow or block connections to specific computers.
You can perform the following activities for an application using the Connection Blocking window:
1 Configure the access settings
1 Customize the specific access settings
Page 85

Configuring the access settings for an application

1 Edit the access settings
1 Remove the access settings
Configuring the access settings for an application
Norton Security lets you configure the access settings for the applications that run on your Mac. Based on the settings that you configure and the network location of your Mac, the firewall allows or blocks the incoming and the outgoing connections.
When you configure the access settings for an application, the name of the application appears in the View pane of the Connection Blocking window. You can also view the default access setting for the selected application under the application name.
Norton Security creates the <All other applications> access setting by default. This access setting includes all applications that run on your Mac.
To configure the access settings for an application
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Connection Blocking row, click the settings
3
icon.
In the Connection Blocking window, in the Editing
4
settings menu, select the network location for which you want to configure the access settings.
In the View menu, select Applications.
5
85Customizing settings
Page 86
Configuring the access settings for an application
Select one of the following tabs:
6
86Customizing settings
Incoming
Outgoing
Click Add application.
7
In the Choose Application dialog, select the
8
Lets you specify the access settings for the incoming connections for the application.
Lets you specify the access settings for the outgoing connections for the application.
required application. If the application that you want does not appear in the list, click Other to search for the application.
In the menu at the top of the dialog, select one of the
9
following default access setting:
Allow
Block
Ask
Allows the network connections for the application.
Blocks the network connections for the application.
Set up the firewall notify you when a program attempts to access the Internet.
Click Choose.
10
The name of the application that you have added appears in the View pane in the Connection Blocking window.
Page 87

Customizing the specific access settings for an application

Use the Action drop-down menu at the bottom of
11
the Connection Blocking window to specify the advanced firewall preferences. Your options are:
87Customizing settings
Logging and notification settings
Advanced settings
Reset to defaults
Click Done.
12
Lets you specify the type of access attempts for which Norton Security must maintain records.
Lets you specify the advanced firewall options.
Lets you reset configuration to default level.
Customizing the specific access settings for an application
Norton Security lets you customize the incoming and outgoing network connections settings for each application on your Mac. You can specify the IP addresses from which you want to allow or deny connection attempts. The specific access settings that you specify appear in the row under the application name with a minus (-) and plus (+) sign.
You can add any number of specific access settings for
w
an application. For example, you can add a specific access setting for an application to allow connection from all the computers on your network. You can also add another specific access setting for the same application to block connection from a single computer.
To customize the specific access settings for an application
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
Page 88
Customizing the specific access settings for an application
In the Connection Blocking row, click the settings
3
icon.
In the Connection Blocking window, in the Editing
4
settings menu, select the network location for which you want to configure the specific access settings for an application.
In the View menu, select Applications.
5
Select one of the following tabs:
6
88Customizing settings
Incoming
Outgoing
In the View pane, click the + sign next to the
7
Lets you specify the access settings for the incoming connections that use the application.
Lets you specify the access settings for the outgoing connections that use the application.
application name.
In the Edit address window, use the following
8
options to select the type of access for the connections:
Allow
Block
Allows the connections to or from an IP address.
Blocks the connections to or from an IP address.
Page 89

Editing the access settings of an application

Select the one of the following option to customize
9
the specific access settings:
89Customizing settings
All computers on my current network
A single computer
All IP addresses beginning with
All IP addresses on a network
Click Save.
10
Click Done.
11
Lets you allow or block connections to or from all computers on your network.
Allow or block connections to or from the computer with the IP address that you specify.
Allow or block connections to or from computers with the base address that you specify.
Allow or block connections to or from computers on a local network that share the base address and the mask address that you specify.
Editing the access settings of an application
You can edit the following access settings for an application:
1 Logging and Notifications settings
1 Specific access settings
1 Default access settings that you configured for the
application
Page 90
Editing the access settings of an application
To edit the Logging and Notifications settings for an application
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Connection Blocking row, click the settings
3
icon.
In the Connection Blocking window, in the Editing
4
settings menu, select the network location that you want to edit.
In the View menu, select Applications.
5
Select an application that you want to edit.
6
In the View pane, select the row that contains the
7
application name, and then click Edit.
90Customizing settings
Page 91
Editing the access settings of an application
In the Edit application window, edit the logging
8
settings. Your options are:
91Customizing settings
Override global logging settings
Log allowed inbound connections
Log allowed outbound connections
Log blocked inbound connections
Log blocked outbound connections
Select the Override global logging settings check box
to select the logging options
Maintains a record of all the allowed incoming connections that use the application.
Maintains a record of all the allowed outgoing connections that use the application.
Maintains a record of all the blocked incoming connections that use the application.
Maintains a record of all the blocked outgoing connections that use the application.
Page 92
Editing the access settings of an application
In the Edit application window, edit the notifications
9
settings. Your options are:
92Customizing settings
Override global notifications settings
Notify me of allowed inbound connections
Notify me of allowed outbound connections
Notify me of blocked inbound connections
Notify me of blocked outbound connections
Click Save.
10
Select the Override global notifications settings check
box to select the notification options
Displays an alert for all of the allowed incoming connections that use the application.
Displays an alert for all of the allowed outgoing connections that use the application.
Displays an alert for all of the blocked incoming connections that use the application.
Displays an alert for all of the blocked outgoing connections that use the application.
To edit the specific access settings for an application
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Connection Blocking row, click the settings
3
icon.
In the Connection Blocking window, in the Editing
4
settings menu, select the network location for which you want to edit the specific access settings.
In the View menu, select Applications.
5
Page 93
Editing the access settings of an application
Select an application for which you want to edit the
6
specific access settings.
In the View pane, select the row that contains the
7
specific access settings for the application, and then click Edit.
In the Edit address window, edit the required option.
8
Click Save.
9
To edit the default access settings for an application
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Connection Blocking row, click the settings
3
icon.
In the Connection Blocking window, in the Editing
4
settings menu, select the network location for which you want to edit the default access settings.
In the View menu, select Applications.
5
Select the row that contains the default access
6
settings for the application in the View pane.
Click Edit.
7
In the window that appears, select one of the
8
following options:
93Customizing settings
Allow
Block
Ask
Allows the network connections for the application.
Blocks the network connections for the application.
Prompts you with a notification window.
You can select whether the firewall must allow or block the network connections using the application.
Page 94

Removing access settings for an application

Click Save.
9
Removing access settings for an application
You can use the Connection Blocking window to remove the following access settings that you have configured for an application:
1 Access settings for an application
1 Specific access setting for an application
However, you cannot remove the default Connection Blocking setting that appears in the list.
To remove access settings for an application
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Connection Blocking row, click the settings
3
icon.
In the Connection Blocking window, in the Editing
4
settings menu, select the network location for which you want to remove access settings.
In the View menu, click Applications.
5
In the View pane, select the application name, and
6
do one of the following:
1 Click Remove.
1 Click the - sign next to the application name.
In the confirmation window, click Remove.
7
To remove specific access settings for an application
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Connection Blocking row, click the settings
3
icon.
In the Connection Blocking window, in the Editing
4
settings menu, select the network location for which you want to remove access settings.
94Customizing settings
Page 95

About access settings for a service

In the View menu, click Applications.
5
Select one of the following tabs:
6
95Customizing settings
Incoming
Outgoing
Select the row that contains the specific access
7
Lets you specify the access settings for the incoming connections that use the application.
Lets you specify the access settings for the outgoing connections that use the application.
settings and do one of the following:
1 Click Remove.
1 Click the - sign next to the specific access setting
for the application.
In the confirmation window, click Remove.
8
About access settings for a service
You can use the Connection Blocking window to specify access settings for the services that are running on your Mac. For example, you can customize the access settings for the file transfer protocol (FTP) service that allows access to the shared folders on your Mac using the port 21. You can customize the firewall for FTP to allow or block the incoming and the outgoing connections.
When you add an existing service, Norton Security displays the port through which the service communicates the incoming and the outgoing connections.
You also can specify default and specific access settings for a service. The default access setting applies to all connections to or from the computers that use the
Page 96

Configuring the access settings for services

service. The specific access settings let you allow or block connections to specific computers.
You can perform the following activities for a service using the Connection Blocking window:
1 Configure the access settings
1 Customize the specific access settings
1 Edit the access settings
1 Remove the access settings
Configuring the access settings for services
Norton Security lets you specify the access settings for the services that run on your Mac. Based on the access settings that you specify and the current network location of your Mac, firewall allows or blocks the network connections that use the service.
The access settings that you configure are specific to the selected network location. It applies to your Mac only when it connects to the network location for which your Connection Blocking setting is configured.
When you add a service, the name of the service appears in the View pane of the Connection Blocking window. In addition, you can view the default access setting for the service under the service name.
By default, Norton Security creates the <All other services> access setting. This access setting includes all services that run on your Mac.
To specify access settings for a service
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Connection Blocking row, click the settings
3
icon.
In the Connection Blocking window, in the Editing
4
settings menu, select the network location for which you want to configure the access settings.
In the View menu, select Services/Ports.
5
96Customizing settings
Page 97
Configuring the access settings for services
Select one of the following tabs:
6
97Customizing settings
Incoming
Outgoing
Click Add service.
7
In the New Service dialog that appears, select the
8
Lets you specify the access settings for the incoming connections that use the service.
Lets you specify the access settings for the outgoing connections that use the service.
default access setting option that you want to apply for the service. Your options are:
Allow
Block
Select the required service from the Service name
9
Allows the network connections for the service.
Blocks the network connections for the service.
menu. If the service is not listed in the Service name menu, enter the name of the new service in the Service name menu. You can also enter a description for the service in the Description field.
Page 98
Configuring the access settings for services
Configure the following tabs as required:
10
98Customizing settings
Ports
Logging
Notifications
Click Save.
11
Lists the ports in the firewall that the service can open.
You can use the Add, Edit, and Remove options only when you add a new service.
You can use these options to add or modify the port numbers that you add.
Lists the types of connections that Norton Security must log.
Lists the types of connections for which Norton Security should notify you when it makes a connection attempt.
You can select whether the firewall must allow or block the connection attempts that use the service.
Page 99

Customizing the specific access settings for a service

In the Action drop-down menu at the bottom of the
12
Connection Blocking window, specify the advanced firewall preferences. Your options are:
99Customizing settings
Logging and notification settings
Advanced settings
Reset to Defaults
Click Done.
13
Lets you specify the type of access attempts for which you want Norton Security to maintain records.
You can also specify the type of access attempts about which you want Norton Security to notify you.
Lets you specify the advanced firewall options.
Lets you reset configuration to default level.
Customizing the specific access settings for a service
Norton Security lets you customize the incoming and outgoing network connections settings for each service on your Mac. You can specify the IP addresses from which you want to allow or block connection attempts. The specific access settings that you specify appear in the row under the application name with a minus (-) and plus (+) sign.
You can add any number of specific access settings for
w
a service. For example, you can add a specific access setting for a service to allow connection from all the computers on your network. You can also add another specific access setting for the same service to block connection from a single computer.
Page 100
Customizing the specific access settings for a service
To customize the specific access settings for a service
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Connection Blocking row, click the settings
3
icon.
In the Connection Blocking window, in the Editing
4
settings menu, select the network location for which you want to specify the specific access settings.
In the View menu, click Services/Ports.
5
Select one of the following tabs:
6
100Customizing settings
Incoming
Outgoing
In the View pane, click the + sign next to the service
7
Lets you specify the access settings for the incoming connections that use the service.
Lets you specify the access settings for the outgoing connections that use the service.
name.
In the Edit address dialog, select the type of access
8
for the connections. Your options are:
Allow
Block
Lets you allow the connections to or from an IP address.
Lets you block the connections to or from an IP address.
Loading...