Symantec, the Symantec Logo, Norton, and LiveUpdate, are
trademarks or registered trademarks of Symantec Corporation or its
affiliates in the U.S. and other countries. Macintosh, Mac, Mac OS,
the Mac logo, Safari, Tiger, Snow Leopard and Lion are trademarks
of Apple Computer, Inc. Firefox is a registered trademark of Mozilla
Corporation. Other names may be trademarks of their respective
owners.
The product described in this document is distributed under licenses
restricting its use, copying, distribution, and decompilation/reverse
engineering. No part of this document may be reproduced in any
form by any means without prior written authorization of Symantec
Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS
OR IMPLIED CONDITIONS, REPRESENTATIONS AND
WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE
OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE
EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY
INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE
FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN
CONNECTION WITH THE FURNISHING, PERFORMANCE, OR
USE OF THIS DOCUMENTATION. THE INFORMATION
CONTAINEDIN THIS DOCUMENTATION IS SUBJECT TO CHANGE
WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be
commercial computer software as defined in FAR 12.212 and subject
to restricted rights as defined in FAR Section 52.227-19 "Commercial
Computer Software - Restricted Rights" and DFARS 227.7202, et
seq. “Commercial Computer Software and Commercial Computer
Software Documentation”, as applicable, and any successor
regulations. Any use, modification, reproduction release, performance,
display or disclosure of the Licensed Software and Documentation
by the U.S. Government shall be solely in accordance with the terms
of this Agreement.
Symantec Corporation
350 Ellis Street,
Mountain View, CA 94043
Keeping your subscription current ..... ..... ... .. 136
7Contents
Page 8
Getting started
This chapter includes the following topics:
1 About Norton Security
1 About the Norton product main window
1 Opening and closing Norton Security on Mac
1 About the Norton Security menu
1 About the Norton Security shortcut menu
1 How to check your Mac user account type
1 Viewing recent activities
1 Viewing network activities
1
About Norton Security
Norton Security delivers today’s fast and light all-in-one
solution to protect your Mac and all your online activities.
Norton Security delivers continuous and up-to-date
protection from different types of security threats. Norton
Security protects you from identity theft attempts,
phishing attempts, and other network attacks. It analyzes
the security levels of the websites you visit and indicates
whether the website is secure. In addition, it protects
your sensitive data including your credit card and online
banking details from the malicious programs.
Page 9
About Norton Security
Norton Security monitors the network activity of your
Mac and manages the incoming and the outgoing
access attempts. The Firewall settings contain the rules
that specify the access settings for the applications,
services, and ports in your Mac. It also contains access
settings for the IP addresses in the network to which
your Mac is currently connected. Based on the firewall
rules, Norton Security allows or blocks the incoming or
the outgoing connections that use a particular
application, service, or port.
Norton Security provides enhanced security and protects
your Mac in the following ways:
1 Automatically detects and removes viruses.
1 Scans and cleans downloaded files and email
attachments.
1 Protects against the attacks that target software
vulnerabilities.
1 Checks for security risks every time you use a
program on your Mac, insert removable media, or
access the Internet.
1 Monitors your computer for any unusual symptoms
that may indicate an active threat.
1 Prevents identity thefts and phishing attempts.
1 Protects sensitive information from malicious
programs. Monitors the network activity and blocks
unauthorized access attempts.
Symantec does not collect or store any of your personal
w
information. Your information remains encrypted and
secure on your Mac.
9Getting started
Page 10
About Norton Security
The following table lists the important features that are
available in Norton Security:
10Getting started
Automatic Scans
Automatically detects and
removes spyware, viruses,
Trojan horses, bots, and
Internet worms.
Norton Security provides
enhanced security and
protects your Mac in the
following ways:
1 Checks for security risks
every time you use a
program on your
computer, insert
removable media, and
access the Internet.
1 Monitors your computer
for any unusual
symptoms that may
indicate an active threat.
You can use the Automatic
Scans options to customize
the protection of your
computer.
See “About Automatic Scans
settings” on page 63.
Page 11
About Norton Security
11Getting started
Firewall
Vulnerability Protection
Monitors the network activity
of your Mac and manages
the incoming and the
outgoing access attempts.
The Connection Blocking
settings contain the rules
that specify the access
settings for the applications,
services, and ports in your
Mac. It also contains access
settings for the IP addresses
in the network to which your
Mac is currently connected.
Based on the firewall rules,
Norton Security allows or
blocks the incoming or the
outgoing connections that
use a particular application,
service, or port.
Blocks any network attacks
that can steal your
information or take control of
your Mac.
See “About Vulnerability
Protection” on page 54.
Page 12
About Norton Security
12Getting started
Scans
LiveUpdate
Lets you perform the
following types of scans:
1
Quick Scan
Lets you scan the home
folders on your Mac.
1
Full Scan
Lets you select and scan
multiple disks to remove
viruses and other
security threats.
1
File Scan
Lets you scan a
particular file or folder on
your Mac to know if it is
infected.
1
Scan Facebook Wall
Lets you scan News
Feeds on your Facebook
wall periodically to
protect you from
malicious links.
See “About Norton Security
scans” on page 47.
Automatically downloads the
latest virus definitions and
program updates to
safeguard your Mac. The
virus definitions protect your
Mac from the latest viruses
and security threats.
Page 13
About Norton Security
13Getting started
Safe Web
File Guard
Activity
Lets you enable or disable
the different Safe Web
options that protect you from
visiting unsafe websites.
You can enable or disable
the following Safe Web
options:
1 Safe Web
1 Norton Phishing
Protection
See “About Safe Web”
on page 32.
Lets you protect the specific
files that contain sensitive
information from being
opened, moved, copied, or
deleted without your
permission.
See “About File Guard”
on page 42.
Lets you monitor the tasks
that your product performs
in the background. In
addition, you can view the
statistics of the access
attempts and the statuses of
different features of Norton
Security.
What to do if Norton Security quits unexpectedly?
FAQs on Norton Automatic Renewal Service
Page 14
About the Norton product main window
About the Norton product main window
Your Norton product delivers today’s fast and light
all-in-one solution to protect your Mac and all your online
activities.
Your Norton product main window provides you a
centralized location for the various activities that you
can perform using the product. You can access the main
features of the product from the main window and
manage the performance of your Mac.
You cannot access Norton account if you are a Norton
w
Small Business user.
You can use the following options to perform the
important tasks in your Norton product:
14Getting started
Security
Lets you view the overall
protection status of your
computer.
When your system status is
Secure, your computer is
fully protected. When your
system status is at Attention
state, ensure that you fix all
the issues. When your
system status is at At Risk
state, you must take
immediate actions to fix the
issues.
When your system status is
At Risk or Attention, this
section automatically
provides you an option to fix
all the issues at once.
Page 15
About the Norton product main window
15Getting started
Scans
Lets you access different
types of scans to protect
your computer and your
sensitive data.
You can use the Scans
option and run the following
types of scans:
1
Quick Scan: Scans the
home folders on your
Mac.
1
Full Scan: Scans selected
disks to remove viruses
and other security
threats.
1
File Scan: Scans a
particular file or folder on
your Mac and removes
any security threats.
1
Scan Facebook Wall: Lets
you scan News Feeds on
your Facebook wall
periodically to protect you
from malicious links.
1
Scheduled Scan: Lets you
configure a scheduled
scan. Norton Security
automatically scans your
Mac on the day and time
that you specify.
Page 16
About the Norton product main window
16Getting started
LiveUpdate
Advanced
Lets you run LiveUpdate to
download the latest virus
definitions and program
updates.
Norton Security uses the
latest virus definitions from
Symantec servers to detect
and remove latest security
threats.
What to do if I get a
LiveUpdate error?
Lets you access the
Advanced window.
You can do the following
tasks in the Advanced
window:
1 Configure and schedule
different scans.
1 Change the Firewall
settings.
1 Configure Norton Safe
Web for browsers.
1 Safeguard the files that
have your sensitive data.
1 View Security History.
1 View the quarantined
items in the Security
History window.
1 View Network Activity
history.
1 Turn on Silent Mode and
Error Reporting features.
In addition, you can choose
to turn on or turn off the
protection features from this
window.
Page 17
About the Norton product main window
17Getting started
Add Devices
Lets you install the latest
version of Norton Security
on other devices.
This ensures that your Mac
and other devices are
protected by Norton.
You can use the Get Started
option to access your Norton
account. You can use your
Norton account login
credentials to sign in to
Norton.
After logging in, you can use
the Install on another device
option and follow the
on-screen instructions to
install the product on another
device.
Access to Norton
w
account may not be
available in some versions
of Norton Security.
Your Norton product also provides you quick links at the
top of the main window to the most frequent tasks. You
can use the Account link to access your Norton account.
You can use the Help link to do the following:
1 Access your Norton account
1 Access the online Help and support options
1 Take a product tour
1 Check your subscription status
1 Add devices
1 Enter a product key
1 View product information such as version number,
serial number, Third-Party notice, etc.
Your activation status or subscription status appears at
the bottom of the main window. You can use the
Page 18
Opening and closing Norton Security on Mac
Activate Now or Renew Now option to activate or
renew your Norton product subscription.
FAQs on Norton Automatic Renewal Service
How to find your product key
Opening and closing Norton Security on
Mac
After you install Norton Security, the product
automatically protects you from all types of malware and
safeguards your sensitive data. If Norton Security
detects a threat that requires your attention, an alert
appears to help you resolve it. By default, all the
protection features are enabled and Norton Security
monitors your computer.
You can access Norton Security from the following
areas:
1 Applications folder
1 Norton QuickMenu
You cannot close Norton Security if any of the Norton
w
Security dialogs or alerts is open.
To open Norton Security
To open Norton Security, do one of the following:
4
1 In the Applications folder, click Norton Security.
1 On the Mac menu bar, click the Symantec icon,
and then click Open Norton Security.
To close Norton Security
If any of the Norton Security dialogs or alerts is open,
1
close them.
To close Norton Security, do one of the following:
2
1 Click close on the Norton Security main window.
1 Right-click the Norton Security icon in the Dock,
choose Quit.
1 Press ⌘Q.
18Getting started
Page 19
About the Norton Security menu
About the Norton Security menu
The Norton Security menu appears on the top-left corner
of the Mac menu bar when you launch Norton Security.
You can use the Norton Security option from the Norton
Security menu to view the different menu options. You
can access the following options from the Norton
Security menu:
19Getting started
About Norton Security
Services
Hide Norton Security
Hide others
Show All
Displays the general
information of Norton
Security.
You can view details such as
the build number, layout,
product serial number,
endpoint ID, and SKU
information.
Lets you access the Mac OS
X services settings.
Lets you hide the Norton
Security application.
Lets you hide the other
active applications on your
Mac.
Displays all the active
programs on your Mac.
This option is available only
if you have used the Hide
Norton Security option or the
Hide Others option.
Page 20
About the Norton Security shortcut menu
20Getting started
Uninstall Norton Security
Lets you uninstall Norton
Security.
You need to have a user
account with administrator
privileges to uninstall Norton
Security.
Quit Norton Security
Lets you close Norton
Security.
You can use the Export option under the File menu to
export your network location settings. You can export
your network location settings in a .npfx file format. See
“Exporting the connection blocking settings for a network
location” on page 114.
About the Norton Security shortcut menu
The Norton Security shortcut menu lets you easily
access the Norton Security application and explore its
features. You can access the Norton Security shortcut
menu by control-clicking or right-clicking the Norton
Security icon in the Dock.
You can perform the following activities using the
shortcut menu:
1 Open the Norton Security main window, the Scans
window, the LiveUpdate window, and the Advanced
window.
1 Lets you install the latest version of Norton Security
on other devices.
1 Keep or remove the Norton Security icon from the
Dock.
1 Open Norton Security automatically each time you
log on to your Mac.
1 View the Norton Security application in the
Applications folder.
1 Show or hide Norton Security.
Page 21
How to check your Mac user account type
1 Quit Norton Security.
How to check your Mac user account type
A user account defines the actions a user can perform
on a Mac. You can create the following types of user
accounts on your Mac:
1 Administrator account
1 Standard account
1 Managed account
Each account has different privileges. An administrator
account gives you access to all areas of the Mac, install
and update software, create and maintain other user
accounts.
If you do not know your user account type, you can
check it in System Preferences.
To check your Mac user account type
On the Apple menu, click System Preferences.
1
Click Users & Groups.
2
On the left side of the Users & Groups window, view
3
your account name and account type.
21Getting started
Viewing recent activities
The Security History window lets you view all the recent
tasks that your product performs in the background.
You can view the information about the recent activities
under the following categories in the Security History
window:
General
Lets you view all the recent
activities that Norton
Security performed.
Page 22
Viewing recent activities
22Getting started
Firewall
Lets you view the following:
1 Applications that were
allowed or blocked.
1 Connection attempts that
were allowed or blocked.
1 Change in the network
location of your Mac.
1 Vulnerability attacks that
were allowed or blocked.
Safe Web & File Guard
Lets you view the list of
activities that the Safe Web
feature had performed and
the unauthorized access
attempts to your guarded
files.
Protect My Mac
Lets you view the following:
1 List of detected viruses
and the action that was
taken against the virus to
protect your Mac.
1 List of virus scans that
Norton Security
performed on your Mac.
1 List of quarantined files.
To view the recent activities
In the Norton Security main window, click Advanced.
1
On the left pane, click Activity.
2
In the Security History row, click the view icon.
3
In the Security History window, select the category
4
for which you want to view the recent activities.
View the recent activities and click Done.
5
Page 23
Viewing network activities
You can view the incoming and the outgoing network
connection details in the Network Activity window.
You can also search for a particular type of application,
service, port, or IP address that runs on your Mac and
view its network connection details in the NetworkActivity window. You can view the information about
the recent activities under the following categories:
Viewing network activities
23Getting started
Connections
Lets you view the network
connection details based on
the type of connection.
Your options are:
1
Into my Mac
Displays a list of all
incoming connections to
your Mac.
1
Out of my Mac
Displays a list of all
outgoing connections
from your Mac.
1
Listening
Displays a list of all of the
applications that are on
open ports for incoming
traffic.
Page 24
Viewing network activities
24Getting started
Search For
Lets you view the network
connection details based on
the applications, services, or
ports that run on your Mac.
Your options are:
1
Applications
Searches for and
displays a list of the
applications that are
currently running on your
Mac.
1
Services & Ports
Searches for and
displays a list of the
services and ports that
run on your Mac.
To view the network connections
In the Norton Security main window, click Advanced.
1
On the left pane, click Activity.
2
In the Network Activity row, click the view icon.
3
In the Network Activity window, select an
4
application, service, or port to view the details of the
current network connections.
Click Done.
5
Page 25
Activating your
product
This chapter includes the following topics:
1 Activation protects you
1 Activating your Norton product on Mac
1 Where to find your product key
Activation protects you
Product activation is a technology that protects users
from pirated or counterfeit software. It protects you by
limiting the use of a product to those users who have
acquired the product legitimately. Product activation
requires a product key for each installation of a product.
You must activate the product within a limited time period
after you install it.
If you are connected to the Internet, the Norton product
prompts you to enter your Norton account credentials.
You can use your existing Norton account or register
for a new Norton account. After signing in to your Norton
account, your Norton product is automatically activated
and registered to your Norton account.
You cannot access Norton account if you are a Norton
w
Small Business user.
If you are not connected to the Internet, you can close
the Subscription window to start your product. The
Subscription window is displayed every time you start
your product until you activate your product. If you
2
Page 26
Activating your Norton product on Mac
choose not to activate at that time, you receive an alert
that reminds you to activate the product. You can also
activate your product from the Norton Security main
window.
If you do not activate the product within the time period
w
that the alert specifies, the product stops working. You
can activate it after the time period has elapsed, but you
are not protected until you activate the product.
Activating your Norton product on Mac
If you did not activate your product after installation, you
receive a Subscription alert regularly until you activate
the product.
Product activation reduces software piracy and ensures
that you use authentic Symantec software. Activation
provides you with a specified period of subscription to
your Norton product.
You must activate your product within the time period
w
that the alert specifies, or your product stops working.
To activate, you need to use the product key that was
included with this product.
You need a Norton account to activate your product.
You can use your existing Norton account or register
for a new Norton account. After signing in to your Norton
account, you can enter the product key to activate your
Norton product and register the product key to your
Norton account. Your Norton account lets you view the
details, such as the product key, the product registration
date, and recent product updates.
You cannot access Norton account if you are a Norton
w
Small Business user.
To activate your Norton product
Do one of the following:
1
1 In the Activation alert, click Activate Now.
1 In the Norton Security main window, click
Activate Now.
26Activating your product
Page 27
Where to find your product key
On the Subscription window, enter your Norton
2
account credentials, and click Sign In. If you do not
have a Norton account, click Create a new Nortonaccount to register for an account.
You can activate your product in one of the following
3
ways:
1 Use a product key
To activate your product using a retail version of
the product key that you purchased, click Entera Key.
1 Buy a new subscription
To purchase a product subscription online, click
Buy a Subscription.
1 Use existing subscription
After you sign in to your Norton account, the
Subscription window displays the list of product
licenses registered to your Norton account and
the subscription details for the registered licenses.
To use an existing subscription to activate your
product, select the subscription, and then click
Next.
Follow the on-screen instructions to complete the
4
activation of your Norton product.
27Activating your product
Where to find your product key
The product key is a unique key that helps you to install
and activate the Symantec product on your computer.
The product key is a 25-character alphanumeric string
that is shown in five groups of five characters each,
separated by hyphens. The location of the product key
varies depending on how you acquired the product.
Page 28
Where to find your product key
The locations of the product key are as follows:
28Activating your product
If you downloaded the
product from the Symantec
Store
If your computer came with
the product already installed
If you received a product key
card
If you are still unable to
locate your product key, you
can recover it using Norton
account
The product key is stored on
your computer as part of the
download process and is
included in the confirmation
email from the Symantec
Store.
The product key is provided
as part of the activation
process. Be sure to save
your product key by creating
or signing in to your Norton
account, or by printing the
key. You may need the
product key if you ever want
to reinstall your product.
The product key is printed
on the card along with
instructions on how to use it.
Be sure to save your product
key by creating or signing in
to your Norton account. You
need the product key if you
ever want to reinstall the
product.
To recover or access your
product key log on to
https://manage.norton.com.
If you are not registered,
register for Norton account.
If you are already registered,
you can find the product key
on the Services page.
You cannot access
w
Norton account if you are a
Norton Small Business user.
Page 29
Where to find your product key
29Activating your product
If you purchased a Norton
card from a retail store
The product key is printed at
the back of the Norton card.
Go to the following webpage
and enter your product key:
https://manage.norton.com/setup
Norton validates the product
key that you entered and
prompts you to log in using
a Norton account. After
logging in using your Norton
account, you can use the
Agree & Download option to
download and install your
Norton product.
Page 30
Managing Norton
products
This chapter includes the following topics:
1 Creating a Norton account
1 Accessing your Norton account
Creating a Norton account
With a Norton account, you can manage all of your
Norton products in one place. Your Norton account
stores the product key and the billing information of your
product. You can also register your product with the
Norton account.
You cannot access Norton account if you are a Norton
w
Small Business user.
In addition, Norton account helps you to do the following:
1 Access the product key and other product information
when you need it.
1 Reinstall your Norton product.
1 Buy additional product keys for your home or office.
1 Save online orders and update billing information.
1 Disable the Automatic Renewal feature.
Symantec products that are older than 2006 do not
w
appear in your Norton account.
It takes only a few moments to create your Norton
account. You must be connected to the Internet to create
a Norton account.
3
Page 31
Accessing your Norton account
To create a Norton account
Open your browser and go to the following URL:
1
https://manage.norton.com
In the Norton webpage that appears, click Create
2
an Account.
In the page that appears, click Create account.
3
In the Create an account webpage, provide the
4
details of your account information, and then click
Sign Up.
Accessing your Norton account
The product key for each Norton product is conveniently
stored in your Norton account. After you have created
your Norton account successfully, you can access your
account from anywhere in the world.
You cannot access Norton account if you are a Norton
w
Small Business user.
You can log in to your Norton account any time by
visiting the following URL:
https://manage.norton.com
You can easily find and update your account, product,
and billing information from your Norton account. You
can also change your Norton account password, if
required. Your computer must be connected to the
Internet to access your Norton account.
Symantec products that are older than 2006 do not
w
appear in your Norton account.
To access Norton account
Open Norton Security.
1
In the Norton Security main window, click Account
2
> Sign In.
In the Norton account webpage, click Sign In.
3
Type your email address and password, and click
4
Sign In.
31Managing Norton products
Page 32
Identifying
fraudulent
websites
This chapter includes the following topics:
1 About Safe Web
1 Disabling or enabling Safe Web
1 About Norton Safe Web
1 About Norton Phishing Protection
1 Disabling or enabling Norton Phishing Protection
1 About Norton toolbar
About Safe Web
Safe Web monitors your Internet activities and protects
you from visiting unsafe websites. Safe Web includes
the following features:
1 Norton Safe Web
1 Norton Phishing Protection
1 Norton toolbar
Norton Safe Web provides you a safe search
environment by displaying the site-rating icons next to
every search result. Phishing Protection analyzes the
security levels of the websites you visit and provides a
safety rating for each website.
4
Page 33
About Safe Web
When Safe Web is enabled, Norton Security analyzes
the security statuses of the websites and alerts you if
you visit fraudulent or phishing websites.
The Norton browser extensions get added to your web
w
browser when you launch the Firefox or Safari browser
for the first time after you install Norton Security. The
Safari browser prompts you for a confirmation before it
adds the extension. You can also choose to add the
Norton Safe Search box to the Norton toolbar when
you launch your browser for the first time.
The following are the different options that you can
configure under the Safe Web feature:
33Identifying fraudulent websites
Enhance search engine
results
Block harmful websites
Show a warning when
visiting a harmful website
Enable Norton Phishing
Protection
Submit full URL when a
suspicious website is
detected
Lets you configure Norton
Safe Web to display the
site-rating icons next to each
search result.
Lets you configure Norton
Safe Web to block harmful
or malicious websites.
Lets you configure Norton
Safe Web to display a
warning message when you
visit harmful or malicious
websites.
Lets you enable or disable
Norton Phishing Protection.
The Phishing Protection
analyzes the security levels
of the websites you visit and
displays the safety rating in
the Norton toolbar.
Let you submit the URL of
the suspicious website to
Symantec.
Page 34
Disabling or enabling Safe Web
Disabling or enabling Safe Web
You can disable or enable Safe Web from the Advanced
window.
To disable or enable the Safe Web
In the Norton QuickMenu, click Norton Security.
1
In the Norton Security main window, click
2
Advanced.
On the left pane, click Safe Web, and do one of the
3
following:
1 To disable Safe Web, move the Safe Web switch
to the Off position.
1 To enable Safe Web, move the Safe Web switch
to the On position.
About Norton Safe Web
Norton Safe Web is a free service from Norton that helps
you surf, search, and shop more safely.
By using Norton Safe Web, you can check if a website
is malicious even before you visit it. Norton Safe Web
analyzes websites and detects if any viruses, spyware,
malware, other security threats exist on a website. Based
on the analysis, Norton Safe Web provides safety ratings
for all websites.
In addition, Norton Safe Web helps you view the
community rating and user reviews of the websites.
If you own a website and your website is not Norton
rated, you can register your website for Norton safety
ratings. Based on the analysis, Symantec provides a
reputation rating for your website. The ratings are
available on the Norton Rating report. These ratings
help millions of Norton users to decide whether to visit
your website.
For each website that you want to know the site safety
status, Norton Safe Web lets you do the following:
34Identifying fraudulent websites
Page 35
About Norton Safe Web
1 View the Norton rating
1 View the community rating
1 Add your reviews
1 View the user reviews
1 View a list of keywords that are tagged to the website
1 View the threat information and the general
information about the website
The following are the options that you can use to
configure Norton Safe Web:
35Identifying fraudulent websites
Enhance search engine
results
Show a warning when
visiting a harmful website
Lets you configure Norton
Safe Web to display the
site-rating icons next to each
search result.
When you search the
Internet using search
engines like Google or
Yahoo, Norton Safe Web
displays the site-rating icons
next to each search result.
Lets you configure Norton
Safe Web to display a
warning message when you
visit harmful websites.
When you select this option
Norton Security displays a
warning message when you
visit harmful websites.
Symantec recommends that
you do not visit such
websites.
Page 36
About Norton Phishing Protection
36Identifying fraudulent websites
Block harmful websites
Lets you configure Norton
Safe Web to block harmful
websites.
When you select this option
Norton Security displays the
Website Blocked page when
you visit harmful websites.
Symantec recommends that
you do not visit such
websites.
About Norton Phishing Protection
Phishing Protection protects you from visiting unsafe
websites. When Phishing Protection is turned on, the
Antiphishing component analyzes the security level of
the websites that you visit. It then displays the safety
rating of the websites in the Norton toolbar. Antiphishing
also blocks navigation to the websites that are confirmed
to be fraudulent.
The Norton Site Safety indicator in the web browser
lets you know if the website that you visit is safe.
The Norton browser extensions get added to your web
w
browsers when you launch the Firefox or Safari browser
for the first time after you install Norton Security. You
can also choose to add the Norton Safe Search box
to the Norton toolbar when you launch your browser for
the first time.
The Norton Site Safety indicator displays all Norton
Authenticated webpages as Norton Secured. Website
hackers often mimic company websites to create
fraudulent websites. Norton Security identifies these
fraudulent websites. The authenticated websites are
categorized as Site Approved websites. These websites
usually belong to large financial institutions or shopping
websites, with the pages that request personal
information.
Page 37
Disabling or enabling Norton Phishing Protection
Symantec analyzes the pages of these websites and
verifies if they belong to the company that it represents.
You can be confident that the information that you
provide goes to the company with which you want to do
business.
If you think that the Symantec security status rating is
incorrect, you can report the website to Symantec for
re-evaluation. For example, you may visit a website that
you shop with regularly, and Phishing Protection rates
the website as unsafe. You can report the website to
Symantec for re-evaluation.
You can select the Submit full URL when a suspiciouswebsite is detected option in the Safe Web window to
submit the full URL of the suspicious website to
Symantec.
Even when you disable the Enable Norton PhishingProtection option, Norton Security protects you from
Internet threats through its Norton Safe Web feature.
But you cannot submit the evaluation of the webpage
to Symantec.
The Norton Phishing Protection feature is supported on
Firefox and Safari web browsers.
The Norton toolbar displays the following safety ratings:
1 Site is Safe
1 Site is Unsafe
1 Use Caution
1 Site Untested
1 Norton Secured
1 Not Licensed
37Identifying fraudulent websites
Disabling or enabling Norton Phishing
Protection
Phishing Protection protects you from visiting unsafe
websites. It analyzes the security level of all the websites
that you visit and displays the safety rating in the Norton
Page 38
toolbar of your browser. Phishing Protection also blocks
navigation on a fraudulent website.
You can disable or enable Phishing Protection from the
Safe Web window.
To disable or enable Norton Phishing Protection
In the Norton QuickMenu, click Norton Security.
1
In the Norton Security main window, click
2
Advanced.
On the left pane, click Safe Web.
3
In the Safe Web row, click the settings icon.
4
In the Safe Web window, do one of the following:
5
1 To disable Norton Phishing Protection, deselect
the Enable Norton Phishing Protection check
box.
1 To enable Norton Phishing Protection, select the
Enable Norton Phishing Protection check box.
About Norton toolbar
When you install Norton Security, it adds the Norton
toolbar to the supported web browsers.
The Norton toolbar is supported on Firefox and Safari
web browsers.
About Norton toolbar
38Identifying fraudulent websites
Page 39
About Norton toolbar
Norton toolbar has the following features:
39Identifying fraudulent websites
Norton menu
Lets you do the following:
1
Open Norton Security
1
Hide Norton Toolbar
1
Disable Safe Search
1
Norton Community Buzz
1
Norton Safe Web Site
1
My Norton account
The Disable Safe
w
Search option appears only
if you added the Norton SafeSearch box to your Norton
toolbar when you first
launched your browser after
you installed Norton
Security.
Norton Site Safety indicator
Lets you know if the website
that you visit is safe.
Norton Safe Web analyzes
the websites that you visit
and provides a safety rating
for each website.
The Norton toolbar gives you the following visual
indicators of the potential fraud that exists on a website
that you visit:
1 The toolbar displays a security status of the website.
1 The toolbar changes color to indicate the safety of
the website.
The following table describes the different security
statuses of the Norton toolbar:
Monitoring
Indicates that Norton
Security is analyzing the
website.
Page 40
About Norton toolbar
40Identifying fraudulent websites
Norton Secured
Site is Safe
Indicates that the website is
verified by Symantec.
Symantec analyzed this
website and found that the
website is VeriSign trusted.
The website has a Secure
Socket Layer (SSL)
certificate provided by
VeriSign. VeriSign trusted
websites are virus free and
are safe. Symantec
categorizes the shopping
websites that are VeriSign
trusted as Norton Secured
websites. You can enter your
personal information and
perform online transactions
on this website.
Indicates that Symantec has
analyzed this website and
determined that there is no
indication of threat. Norton
Safe Web has also
determined that this
webpage offers a safe
shopping experience.
Page 41
About Norton toolbar
41Identifying fraudulent websites
Site is Unsafe
Use Caution
Indicates Symantec has
analyzed this website and
determined that the website
is unsafe to visit. This
website may attempt to
install malicious software on
your computer. The website
that you visit may have
Computer Threats, Identity
Threats, and Annoyance
Factors.
Symantec recommends that
you do not visit this website.
Indicates the Symantec has
analyzed this page and
determined that this page
provides annoying results.
The site can spam your
email address or change
your browser settings
without any confirmation.
The website that you visit
may have Computer Threats,
Identity Threats, and
Annoyance Factors.
Symantec recommends that
you do not visit this website.
Page 42
Guarding files
This chapter includes the following topics:
1 About File Guard
1 Disabling or enabling File Guard
1 Adding files to File Guard
1 Removing files from File Guard
1 Granting access to guarded files for Mac OS X
applications
1 Turn on or turn off guarded file access notification
About File Guard
5
You can use the File Guard feature of Norton Security
to safeguard the files that have your sensitive data. File
Guard prevents the files on your Mac from the malicious
programs that access your sensitive data without your
permission. When a malicious program tries to open,
copy, rename, move, or delete the file in the GuardedFile list, Norton Security notifies you.
The following are limitations for using the File Guard
feature:
1 You cannot add an entire folder to File Guard at
once. You can add multiple files at once by using
Command-click or Shift-click.
Page 43
Disabling or enabling File Guard
1 A guarded file must be located on a local disk. It
cannot be in the root folder of the local disk or in the
System folder.
1 The maximum number of files you can protect is 250.
Disabling or enabling File Guard
When you disable the File Guard feature, it stops
protecting your files that you have added to the Guarded
Files list. The files that you have added in the Guarded
Files list are not deleted. If you enable the File Guard
feature again, the files that you have added to the
Guarded Files list are protected.
You can disable or enable the File Guard feature from
the Advanced window.
The File Guard feature is turned off by default after you
install your Norton product. However, Symantec
recommends that you keep the File Guard feature
enabled to prevent your sensitive data from identity theft.
To disable or enable File Guard
In the Norton QuickMenu, click Norton Security.
1
In the Norton Security main window, click
2
Advanced.
On the left pane, click File Guard, and then do one
3
of the following:
1 To disable File Guard, move the File Guard
switch to the Off position.
1 To enable File Guard, move the File Guard
switch to the On position.
43Guarding files
Adding files to File Guard
File Guard helps you protect your files in which you store
your sensitive data including your credit card information
and social security number. File Guard protects the
sensitive information from unauthorized access. You
Page 44
Removing files from File Guard
must enable the File Guard feature to add files to the
Guarded Files list.
You can use the File Guard window to do the following:
1 Add the files that you want to protect against
unauthorized access.
1 Remove the files that are already protected.
1 Enable or disable access to your guarded files by
Mac OS X programs such as Finder and Spotlight.
1 Disable or enable the notifications when an access
to a guarded file is blocked.
To add files to File Guard
In the Norton QuickMenu, click Norton Security.
1
In the Norton Security main window, click
2
Advanced.
On the left pane, click File Guard.
3
In the File Guard row, click the settings icon.
4
In the File Guard window, do one of the following:
5
1 Drag and drop individual files to the Guarded
Files list.
1 Click Add File(s), and then select individual files
or folders.
Click Done.
6
44Guarding files
Removing files from File Guard
You can remove the files that you added to the Guarded
Files list at any time. If you remove the guarded files,
File Guard stops protecting the files that have your
sensitive information from unauthorized access. You
can then add the files to the Guarded Files list to protect
them again.
To remove files from File Guard
In the Norton QuickMenu, click Norton Security.
1
In the Norton Security main window, click
2
Advanced.
Page 45
Granting access to guarded files for Mac OS X applications
On the left pane, click File Guard.
3
In the File Guard row, click the settings icon.
4
In the Guarded Files list, select the files that you
5
want to remove.
To select multiple items, use Shift-click or
Command-click.
Click Remove File(s).
6
Click Done.
7
Granting access to guarded files for Mac
OS X applications
You can enable the Allow Mac OS X to access my
guarded files option to enable the Mac OS X
applications such as Finder and Spotlight to gain
access to your guarded files without notification. This
option enables you to copy, move, rename, or delete
the guarded files using applications such as Finder and
Spotlight.
When you enable the Allow Mac OS X to access myguarded files option, the Mac operating system
processes that run in the background can also access
your guarded files without notification.
To grant access to guarded files for Mac OS X
applications
In the Norton Security main window, click Advanced.
1
On the left pane, click File Guard.
2
In the File Guard row, click the settings icon.
3
In the File Guard window, check Allow Mac OS X
4
to access my guarded files.
Click Done.
5
45Guarding files
Page 46
Turn on or turn off guarded file access notification
Turn on or turn off guarded file access
notification
When there is an unauthorized access to the guarded
files, the File Guard feature notifies you. You must
enable the Notify me when access to a guarded fileis automatically blocked option to get a notification.
To turn on or turn off guarded file access notification
In the Norton Security main window, click Advanced.
1
On the left pane, click File Guard.
2
In the File Guard row, click the settings icon.
3
In the File Guard window, do one of the following:
4
1 To turn on notification, check Notify me when
access to a guarded file is automatically
blocked.
1 To turn off notification, uncheck Notify me when
access to a guarded file is automatically
blocked.
Click Done.
5
46Guarding files
Page 47
Scanning your Mac
manually
This chapter includes the following topics:
1 About Norton Security scans
1 Running a Quick Scan
1 Running a full system scan
1 Scanning a specific file or folder
1 About Scan Facebook Wall
1 Scanning your Facebook wall
1 Running scans from the command line
About Norton Security scans
6
Norton Security lets you perform manual virus scans.
The Automatic Scans feature monitors your Mac for
viruses in the following ways:
1 Scans all the files when they are created, copied, or
modified.
1 Scans the disks and removable media.
However, Automatic Scans might not detect the following
viruses:
1 Viruses that were on your Mac before you installed
Norton Security.
Page 48
Running a Quick Scan
1 Viruses in the files that are excluded from the
Automatic Scans.
In this case, you can use Norton Security to scan a
particular file, folder, or drive on your Mac.
You can perform the following types of manual virus
scans:
48Scanning your Mac manually
Quick Scan
Full Scan
File Scan
Running a Quick Scan
Quick Scan helps you to scan the areas of your
computer that the viruses and other security risks often
target. Quick Scan does not scan your entire computer.
To run a Quick Scan
In the Norton Security main window, click Scans.
1
Scans the important
locations of your Mac that
the viruses and other
security threats often target.
Quick Scan takes less time
because this scan does not
scan your entire Mac.
Scans your entire Mac for all
types of viruses and security
threats.
Scans the selected files or
folders for all types of
viruses and security threats.
Page 49
Running a full system scan
On the left pane, click Quick Scan, and then click
2
Start a Quick Scan.
You can use the following options when the scan is
in process:
49Scanning your Mac manually
Pause
Cancel
Running a full system scan
You can run a full system scan on your Mac. A full
system scan thoroughly examines your entire computer
for viruses, spyware, and different security
vulnerabilities.
To run a full system scan
In the Norton Security main window, click Scans.
1
On the left pane, click Full Scan, and then click Start
2
a Full Scan.
You can use the following options when the scan is
in process:
Pause
Suspends the scan
temporarily.
You must click the Resume
option to continue the scan.
Terminates the scan.
Suspends the scan
temporarily.
You must click the Resume
option to continue the scan.
Cancel
Terminates the scan.
Page 50
Scanning a specific file or folder
Scanning a specific file or folder
By using Norton Security, you can scan a specific file
or a folder. For example, if you have received a
compressed file in an email message and if you suspect
a virus, you can use the File Scan option to scan that
file.
To scan a specific file or folder
In the Norton Security main window, click Scans.
1
On the left pane, click File Scan.
2
Click Select a file and navigate to the file or folder
3
location.
Select the folder or file that you want to scan and
4
then click Scan.
You can also drag and drop the folder or file.
About Scan Facebook Wall
Norton Safe Web protects your computer while you use
Facebook. It scans each URL that is available on your
Facebook wall and displays the Norton rating icons for
the scanned URLs.
You can also check if a URL is safe or unsafe and then
share the URL with your friends on Facebook. Norton
Safe Web scans the URL that you post on Facebook
wall and gives you the safety status for the URL. This
way, you are not only protected from unsafe websites
but you also let other Facebook users know the security
status of any website.
You can also use the Scan Facebook Wall option in
the Norton Security to scan your Facebook wall. Norton
Security takes you to the Facebook login webpage. After
you log in to your Facebook profile, Norton Safe Web
asks for your permission to access your Facebook wall.
You can use the Allow option to view the Additional
Permissions Required page. The Please grant us
permission to access your News Feed and Wall
50Scanning your Mac manually
Page 51
About Scan Facebook Wall
option on this page lets you give permission to Norton
Safe Web to access your Facebook wall.
The auto-scan feature in the Norton Safe Web
application page helps you protect your Facebook wall.
Norton Safe Web scans the News Feed on your
Facebook wall periodically and protects you from
malicious links. When Norton Safe Web detects a
malicious link, it notifies you. To activate Norton
Auto-Scan, go to your Norton Safe Web webpage on
Facebook, and then click Auto-Scan On.
To remove the malicious link from your Facebook wall,
go to your profile and remove the malicious link. If your
friend has posted the malicious link, you can use the
Warn Your Friends option to alert your Facebook friend.
You can also click See Norton Safe Web Report to
view Norton ratings and other details about this malicious
link. When no malicious activity is detected on your
Facebook wall, Norton Safe Web posts a message every
week notifying that your Facebook wall is safe.
If you later decide to remove Norton Safe Web from your
Facebook profile, you can use the App settings option
of Facebook.
The following are the safety states that Norton Safe Web
provides after it scans the links on your Facebook wall:
51Scanning your Mac manually
Safe
Indicates that the website is
safe to visit and Norton
Trusted.
The websites with this rating
do not harm your computer
and so you can visit this site.
Page 52
Scanning your Facebook wall
52Scanning your Mac manually
Warning
Untested
Caution
Indicates that the website
has security risks.
The websites with this rating
may install malicious
software on your computer.
Symantec recommends that
you do not visit this site.
Indicates that Norton Safe
Web has not yet tested this
site and it does not have
sufficient information about
this website.
Indicates that the site may
have security threats.
Symantec recommends you
to be cautious while you visit
such websites.
Scanning your Facebook wall
The Norton Safe Web feature scans your Facebook wall
and analyzes the security levels of all the available links
on your Facebook wall. It then displays the security
status of the scanned URLs. However, Norton Safe Web
requires your permission to scan your Facebook wall.
To scan your Facebook wall
In the Norton Security main window, click Scans.
1
On the left pane, click Scan Facebook Wall, and
2
then click Scan my Facebook wall.
In the Facebook login webpage, log in to your
3
Facebook profile.
Follow the on-screen instructions.
4
Page 53
Running scans from the command line
Running scans from the command line
Norton Security lets you perform multiple scans from
the command line interface. The Norton Scanner feature
in Norton Security provides this power user feature.
Symantec recommends that you use this feature only
if you are an advanced user.
You can launch the command line interface by
navigating to Finder > Applications > Utilities >Terminal.
To run a Quick Scan
In the command line, type
4
/usr/bin/nortonscanner quickscan.
To run a full system scan
In the command line, type
4
/usr/bin/nortonscanner systemscan.
To scan a specific file
In the command line, type
4
/usr/bin/nortonscanner –a <file path>.
To scan a compressed file
In the command line, type
4
/usr/bin/nortonscanner –c <file path>.
To scan the Quarantine
In the command line, type
4
/usr/bin/nortonscanner quarantine.
53Scanning your Mac manually
Page 54
Keeping secure on
the Internet
This chapter includes the following topics:
1 About Vulnerability Protection
1 Turning off or turning on Vulnerability Protection
1 Excluding or including attack signatures
1 Getting information about attack signatures
1 Enabling or disabling notifications for blocked attack
signatures
1 Configuring the port scan sensitivity
About Vulnerability Protection
7
Vulnerability Protection feature helps you in detecting
and preventing Intrusions through the Internet.
Vulnerability Protection provides information about the
susceptibility of the programs that may be on your Mac
against malicious attacks. It also provides information
about the known attacks.
Vulnerabilities are flaws in your programs or your
operating system that can create weaknesses in the
overall security of your Mac. Improper Mac
configurations or security configurations also create
vulnerabilities. External attackers exploit these
vulnerabilities and perform malicious actions on your
Mac. Examples of such malicious attacks are active
desktop monitoring, keylogging, and hacking. Such
Page 55
Turning off or turning on Vulnerability Protection
attacks can slow down the performance of your Mac,
cause program failure, or expose your personal data
and confidential information to the hackers.
Norton Security provides the signature-based solutions
to protect your Mac from the most common Internet
attacks. Attack signatures contain the information that
identifies an attacker's attempt to exploit a known
vulnerability in your operating system or your Mac
programs. The Intrusion Prevention feature of Norton
Security uses an extensive list of attack signatures to
detect and block suspicious network activity.
Turning off or turning on Vulnerability
Protection
You can choose whether you want to protect your Mac
from the threats that can affect your Mac vulnerabilities.
By default, the Vulnerability Protection option is turned
on. Symantec recommends that you keep the
Vulnerability Protection option turned on to protect your
Mac from any malicious attacks.
To turn off or turn on Vulnerability Protection
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Vulnerability Protection row, do one of the
3
following:
1 To turn off the Vulnerability Protection feature,
move the switch to the Off position.
1 To turn on the Vulnerability Protection feature,
move the switch to the On position.
55Keeping secure on the Internet
Excluding or including attack signatures
Norton Security performs scans by comparing the
signature of the files against the known attack signatures
to identify threats on your Mac. An attack signature is
Page 56
Excluding or including attack signatures
used to identify an attacker's attempt to exploit a known
operating system or application vulnerability.
You can choose whether you want to protect your Mac
from all the attack signatures or only from the selected
signatures. In some cases, benign network activity can
appear to be similar to an attack signature. You might
receive repeated notifications about possible attacks. If
you know that the attacks that trigger these notifications
are safe, you can create an exclusion list for the
signature that matches the benign activity.
If you want protection against vulnerabilities, but you do
not want to receive notifications about blocked attacks,
you can stop Vulnerability Protection from displaying
notifications. Unless you have a good reason to disable
a signature, you should leave the signatures turned on.
If you disable a signature, your computer may be
vulnerable to attack.
To enable or disable attack signatures
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Vulnerability Protection row, click the settings
3
icon.
In the Vulnerability Protection window, click the
4
Signatures tab.
In the Signatures list, select a signature, and do one
5
of the following:
1 To disable the detection of the attack signature,
uncheck Enable this signature
1 To enable the detection of the attack signature,
check Enable this signature
Click Done.
6
56Keeping secure on the Internet
Page 57
Getting information about attack signatures
Getting information about attack
signatures
Vulnerability Protection uses a frequently updated list
of signatures to detect known attacks. You can view the
list of signatures or get information on a specific
signature from the Symantec Security Response
website.
A web browser opens to display information about the
signature from the Symantec website.
To get information about a signature
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Vulnerability Protection row, click the setting
3
icon.
In the Vulnerability Protection window, click the
4
Signatures tab.
In the Signatures list, select the signature for which
5
you want to get more information.
Click Learn More.
6
The information about the selected signature appears
in a separate webpage.
57Keeping secure on the Internet
Enabling or disabling notifications for
blocked attack signatures
You can choose whether you want to receive
notifications when Vulnerability Protection blocks
suspected attacks.
The notification message lets you do the following:
1 To view the details of the blocked attack.
1 To report a wrongly detected attack.
All of the Vulnerability Protection activities are recorded
in the Security History window. The entries include
Page 58
Enabling or disabling notifications for blocked attack signatures
information about the unauthorized accesses attempts
and other details.
You can enable or disable notification for all blocked
attacks or for individual attack signatures.
To enable or disable notifications for all blocked attacks
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Vulnerability Protection row, click the settings
3
icon.
In the Vulnerability Protection window, click the
4
Advanced tab.
In the Advanced tab, do one of the following:
5
1 To disable the notifications for all blocked attacks,
deselect Notify me when Vulnerability
Protection automatically blocks an attack.
1 To enable the notifications for all blocked attacks,
select Notify me when Vulnerability Protection
automatically blocks an attack.
Click Done.
6
To enable or disable notifications for individual attack
signatures
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Vulnerability Protection row, click the settings
3
icon.
In the Vulnerability Protection window, click the
4
Signatures tab.
In the Signature list, do one of the following:
5
1 To disable the notifications, deselect Show
notifications for this signature.
1 To enable the notifications, select Show
notifications for this signature.
Click Done.
6
58Keeping secure on the Internet
Page 59
Configuring the port scan sensitivity
Configuring the port scan sensitivity
Port scanner is an application that randomly searches
for vulnerable areas of the computers that are connected
on a network. When you use the Internet, port scanners
might try to infect through the vulnerabilities of your Mac.
The Vulnerability Protection feature monitors your Mac
for port scans and blocks the connection from
unauthorized or unknown computers.
Port scans are also used for legitimate purposes. For
example, network administrators perform port scans to
find and solve any potential problem in your Mac. You
can adjust the sensitivity of Vulnerability Protection
against the port scan.
Norton Security notifies you each time it blocks a port
scan. The number of notifications varies based on the
sensitivity level that you configure for port scans. For
example, if you configure the Most secure option,
Norton Security displays more notifications. Norton
Security port scan detection does not work when the
built-in Mac OS X firewall is turned on.
To configure the port scan sensitivity
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Vulnerability Protection row, click the settings
3
icon.
In the Vulnerability Protection window, click the
4
Advanced tab.
59Keeping secure on the Internet
Page 60
Configuring the port scan sensitivity
Under Sensitivity, select any one of the following
5
sensitivity level:
60Keeping secure on the Internet
Most secure
Moderate secure
Less secure
When you set this level,
Norton Security is more
sensitive to port scan. It
blocks any application from
accessing your Mac and
notifies you with alerts. You
can set this option when you
use a public wireless
network to provide the
maximum protection for your
Mac.
When you set this level,
Norton Security is
moderately sensitive to port
scans and blocks any
unknown or any unwanted
application from accessing
your Mac.
By default, this option is
selected.
When you set this level,
Norton Security is less
sensitive to port scans and
allows applications to access
your Mac. However, Norton
Security scans all the
application that attempts to
access your Mac and notifies
you about the details of the
applications.
Click Done.
6
Page 61
Customizing
settings
This chapter includes the following topics:
1 About Automatic Scans settings
1 Turning off or turning on Automatic Scans
1 Including files for Automatic Scans
1 Excluding files from Automatic Scans
1 Removing files from the Automatic Scans exclusion
list
1 Removing files from Automatic Scans list
1 About Scheduled Scans
1 Turning on or turning off Scheduled Scans
8
1 Customizing Scheduled Scans settings
1 About Idle Scans
1 Turning off or turning on Idle Scans
1 Customizing Idle Scans settings
1 About Firewall settings
1 About Connection Blocking settings
1 Configuring Connection Blocking settings
1 About access settings for an application
Page 62
1 Configuring the access settings for an application
1 Customizing the specific access settings for an
application
1 Editing the access settings of an application
1 Removing access settings for an application
1 About access settings for a service
1 Configuring the access settings for services
1 Customizing the specific access settings for a service
1 Editing the access settings for a service
1 Removing the access settings for a service
1 About firewall rule for IP addresses
1 Configuring firewall rules for an IP address
1 Modifying firewall rules for an IP address
1 Removing firewall rule for an IP address
1 About configuring firewall for an application
62Customizing settings
1 Setting up firewall rules for an application
1 Customizing the firewall rule for an application
1 Removing the firewall rule for an application
1 About Location Awareness settings
1 Disabling or enabling Location Awareness
1 Viewing Location Awareness settings
1 Exporting the connection blocking settings for a
network location
1 About advanced protection
Page 63
About Automatic Scans settings
1 Disabling or enabling advanced protection features
1 Configuring Norton DeepSight Community Download
1 Configuring Norton DeepSight Community
Submission
1 Configuring AutoBlock settings
1 Managing Excluded IP addresses
1 Configuring Signatures settings
About Automatic Scans settings
Automatic Scans provide enhanced security from the
time you start your Mac. This feature ensures better
protection by running all the necessary components that
are required.
Automatic Scans protect your Mac in the following ways:
1 Scans the files when they are created, copied, or
modified.
1 Scans the disks and removable media when they
are first accessed by your Mac.
1 Scans all the traffic through Internet to your Mac.
If your Mac is configured with more than one user
w
account, these settings apply to all the user accounts.
You can configure Automatic Scans settings in the
Protect My Mac section of the Advanced window. The
Automatic Scans settings are:
1 Scan everything
Scans all the files on your Mac during Automatic
Scans.
Scan everything provides better protection when
compared to other type of scans. By default, Scaneverything is selected.
1 Scan only these folders
63Customizing settings
Page 64
Turning off or turning on Automatic Scans
Lets you specify the folders that you want to be
scanned automatically.
1 Don't scan these folders
Lets you exclude specific folders from Automatic
Scans.
1 Scan files in compressed archives
(Recommended)
Lets you enable or disable Norton Security to scan
the files within the compressed files available on
your Mac. For example, files with .zip or .rar file
extension with the maximum size limit of 1 MB.
1 Scan files on external drives on access
Lets you enable or disable Norton Security to scan
the files available on an external drive that is
connected to your Mac.
1 Reset to Defaults
Lets you reset configuration to default level.
Turning off or turning on Automatic Scans
If you turn on the Automatic Scans, Norton Security
automatically performs the following activities each time
you turn on your Mac:
1 Downloads the most up-to-date virus definitions.
1 Scans entire Mac and removes viruses from infected
files.
1 Monitors all the incoming and outgoing traffic on your
Mac.
Norton Security displays a message if there is an issue
that requires your attention. For example, if there is a
security risk, Norton Security pop-ups a warning
message with a list of options. You can choose an option
and take appropriate action on the unresolved risk. You
can open Norton Security at any time to see the status
of your Mac or to view the protection details.
64Customizing settings
Page 65
Including files for Automatic Scans
To turn off or turn on Automatic Scans
In the Norton Security main window, in the left pane,
1
click Advanced.
On the left pane, click Protect My Mac.
2
In the Automatic Scans row, do one of the following:
3
1 Turn off Automatic Scans, move the switch to the
Off position.
1 Turn on Automatic Scans, move the switch to the
On position.
Including files for Automatic Scans
If you think that any file or application on your Mac is
vulnerable, you can add it for Automatic Scans.
For example, if you think the Downloads folder in your
Mac that you use frequently to download files from the
Internet is vulnerable, you can add the Downloads folder
to Automatic Scans. Norton Security scans this folder
when it is modified and ensures that your Mac is not
infected.
You can use the Scan only these folders option and
customize Automatic Scans to scan only the selected
files.
To include a file for Automatic Scans
In the Norton Security main window, click
1
Advanced.
On the left pane, click Protect My Mac
2
In the Automatic Scans row, click the settings icon.
3
In the Automatic Scans window, click Scan only
4
these folders.
Click +.
5
Browse for the folder that you want to scan
6
automatically.
Click Add.
7
Click Save.
8
65Customizing settings
Page 66
Excluding files from Automatic Scans
Excluding files from Automatic Scans
By default, Norton Security scans all the files and folders
on your Mac. However, you can configure it not to scan
certain files or directories. You can exclude some
frequently used applications from Automatic Scans to
reduce the scanning time.
To exclude a file from Automatic Scans
In the Norton Security main window, click
1
Advanced.
On the left pane, click Protect My Mac
2
In the Automatic Scans row, click the settings icon.
3
In the Automatic Scans window, click Don't scan
4
these folders.
Click +.
5
Browse for the folder that you do not want Norton
6
Security to scan automatically.
Click Exclude.
7
Click Save.
8
Removing files from the Automatic Scans
66Customizing settings
exclusion list
If you think any of the files that are excluded from
Automatic Scans are vulnerable, you can remove the
file from the list. The removed files are automatically
added for Automatic Scans.
To remove a file from the Automatic Scans exclusion
list
1
2
3
4
In the Norton Security main window, click
Advanced.
On the left pane, click Protect My Mac
In the Automatic Scans row, click the settings icon.
In the Automatic Scans window, click Don't scanthese folders.
Page 67
Removing files from Automatic Scans list
Select the folder that you want to remove from the
5
exclusion list and click -.
Click Save.
6
Removing files from Automatic Scans list
The files that are included for Automatic Scans are listed
in the Scan only these folders list. If you think that
scanning a file that you included previously is not
necessary, you can remove it from the Automatic Scans
list.
To remove a file from the Automatic Scans list
In the Norton Security main window, click
1
Advanced.
On the left pane, click Protect My Mac
2
In the Automatic Scans row, click the settings icon.
3
In the Automatic Scans window, click Scan only
4
these folders.
Select the folder that you want to remove from the
5
list and click -.
Click Save.
6
67Customizing settings
About Scheduled Scans
Norton Security automatically detects the idle state of
your Mac and runs an idle scan.
However, you can schedule a scan according to your
preferences. You can schedule a scan to run
automatically on a specific day and time. If the scheduled
scan begins when you use your computer, you can run
the scan in the background instead of stopping your
work.
The scheduled scan settings do not change when a
w
different user uses the Mac. Norton Security runs the
scheduled scan at the scheduled time with the settings
already configured.
Page 68
Turning on or turning off Scheduled Scans
Norton Security displays the scan results on your
computer when the scheduled scan is complete.
You can use the Reset to Defaults option to reset the
Scheduled Scans settings to default.
Turning on or turning off Scheduled Scans
You can configure Norton Security to run a scheduled
scan. Norton Security runs the scan on a specific day
and time.
If the scheduled scan begins when you use your
computer, you can run the scan in the background
instead of stopping your work. You need to turn on the
Scheduled Scans feature to let Norton Security scan
your computer. By default, the Scheduled Scans feature
is turned off.
To turn on or turn off Scheduled Scans
In the Norton Security main window, click Advanced.
1
On the left pane, click Protect my Mac.
2
In the Scheduled Scans row, do one of the following:
3
1 To turn on Scheduled Scans, move the switch to
the On position.
1 To turn off Scheduled Scans, move the switch to
the Off position.
68Customizing settings
Customizing Scheduled Scans settings
You can configure Norton Security to run a scheduled
scan. Norton Security runs the scan on a specific day
and time. If the scheduled scan begins when you use
your computer, you can run the scan in the background
instead of stopping your work. Norton Security lets you
customize the settings for the scheduled scan.
Norton Security displays the scan results on your
computer when the scheduled scan is complete.
Page 69
Customizing Scheduled Scans settings
The scheduled scan settings do not change when a
w
different user uses the Mac. Norton Security runs the
scheduled scan at the scheduled time with the settings
already configured.
To customize Scheduled Scans settings
In the Norton Security main window, click Advanced.
1
On the left pane, click Protect my Mac.
2
In the Scheduled Scans row, click the settings icon.
3
69Customizing settings
Page 70
Customizing Scheduled Scans settings
In the Scheduled Scans window, configure your
4
scan settings.
Your options are:
70Customizing settings
When to Scan
What to Scan
Scan files in compressed
archives (Recommended)
Lets you specify the day and
time at which you want
Norton Security to run the
scan.
Lets you specify the area
that you want Norton
Security to scan.
Your options are:
1
Startup Disk
Performs a scan on the
startup (boot) disk of your
Mac.
1
All User Folders
Performs a scan on all of
the home folders on your
Mac.
1
Entire System
Performs a scan on all
the available disks of
your Mac.
Lets you enable or disable
Norton Security to scan the
files within the compressed
files.
Page 71
About Idle Scans
71Customizing settings
Show Scheduled Scan
Results
Reset to Defaults
Lets you specify when you
want Norton Security to
notify you about the
Scheduled Scan results.
Your options are:
1
Only when infections are
found
Select this option if you
want to be notified when
a security threat is
detected.
1
Always
Select this option if you
want to receive
notification for activities
of Norton Security during
the scheduled scan. You
can receive notifications
for activities such as
completed scans or
scans that are canceled
because of system
activity.
Lets you set the ScheduledScans settings to the
recommended settings.
Click Save.
5
About Idle Scans
Norton Security keeps your Mac secure from latest
security threats by automatically running scans on your
computer using the Idle Scans feature. Idle scan detects
the time when you do not use your Mac and intelligently
runs the scan.
Page 72
Turning off or turning on Idle Scans
The Idle Scans option is automatically turned on when
you install Norton Security. Even though idle scan
automatically runs the scan, you can still customize the
settings of idle scan. Norton Security decides when to
run idle scan depending on your settings and a few other
predefined parameters.
The idle scan settings do not change when a different
w
user uses the Mac. Norton Security detects the idle time
of the Mac and runs the idle scan with the settings
already configured.
Norton Security discontinues any idle scan that it started
during idle time if you begin to use your Mac again.
However, it resumes the scan when your Mac is idle
again. You should always keep the Idle Scans option
turned on to let Norton Security scan your Mac when it
becomes idle.
You can use the Reset to Defaults option to reset the
Idle Scans settings to default.
Turning off or turning on Idle Scans
Your Norton product keeps your Mac secure from latest
security threats by automatically running scans on your
computer using the Idle Scans feature. Your Norton
product detect the time when you do not use your Mac
and intelligently runs the scan.
You should always keep the Idle Scans option turned
on to let your Norton product scan your computer when
it becomes idle.
To turn off or turn on Idle Scans
In the Norton Security main window, click Advanced.
1
On the left pane, click Protect my Mac.
2
In the Idle Scans row, do one of the following:
3
1 To turn off idle scans, move the switch to the Off
position.
1 To turn on idle scans, move the switch to the On
position.
72Customizing settings
Page 73
Customizing Idle Scans settings
Customizing Idle Scans settings
Norton Security keeps your Mac secure from latest
security threats by automatically running scans on your
computer using the Idle Scans feature. Idle Scans
detect the time when you do not use your Mac and
intelligently run the scan.
The idle scan settings do not change when a different
w
user uses the Mac. Norton Security detects the idle time
of the Mac and runs the idle scan with the settings
already configured.
To customize Idle Scans settings
In the Norton Security main window, click Advanced.
1
On the left pane, click Protect my Mac.
2
In the Idle Scans row, click the settings icon.
3
73Customizing settings
Page 74
Customizing Idle Scans settings
In the Idle Scans window, customize your scan
4
settings.
You can customize the scan in the following ways:
74Customizing settings
What to Scan
Scan files in compressed
archives (Recommended)
Lets you specify the area
that you want Norton
Security to scan. Your
options are:
1
Startup Disk
Performs an idle scan on
the startup (boot) disk of
your Mac.
1
All User Folders
Performs an idle scan on
all of the home folders on
your Mac.
1
Entire System
Performs an idle scan on
all the available disks of
your Mac.
Lets you enable or disable
Norton Security to scan the
files within the compressed
files.
Page 75
About Firewall settings
75Customizing settings
Show Idle Scan Results
Reset to Defaults
About Firewall settings
Lets you view the idle scan
results in the SecurityHistory window. Your
options are:
1
Only when infections are
found
Select this option if you
want to view the scan
results when a security
threat is detected.
1
Always
Select this option if you
want to view the activities
of Norton Security during
the idle scan. You can
view activities such as
completed scans or
scans that are canceled
because of system
activity.
Lets you set the ScheduledScans settings to the
recommended settings.
Firewall settings let you customize how firewall should
monitor and respond to the inbound and the outbound
network communications. Firewall settings contain the
access settings for the applications, services, and ports
on your Mac. They also contain access settings for
connections to or from the other computers in the
network to which your Mac is connected.
Page 76
About Firewall settings
You can use the Firewall window to customize the
following firewall settings:
76Customizing settings
Application Blocking
Lets you configure firewall rules
for the applications that run on
your Mac to connect to the
Internet.
The Application Blocking
settings determine whether to
allow or deny an application,
such as a Web browser or
iTunes, from connecting to the
Internet.
Application Blocking settings
are not specific to a particular
network location. The
Application Blocking settings do
not change when you change
to a different network location.
You can use the Configure
option under ApplicationBlocking to set Internet access
for applications on your Mac.
Whenever an overlap
w
exists in the settings between
Connection Blocking and
Application Blocking, the
Connection Blocking settings
take precedence over the
Application Blocking settings.
Page 77
About Firewall settings
77Customizing settings
Connection Blocking
Vulnerability Protection
Lets you allow or block the
applications, ports, services,
and IP addresses that:
1 Connect to your Mac.
1 Connect to a network.
The Connection Blocking
settings determine whether to
allow or deny the incoming or
the outgoing connections that
use a specific service,
application, or a port. You can
also configure firewall to allow
or block a specific IP address
on the network.
Connection blocking settings
apply only to a particular
location.
You can use the settings icon
in the Connection Blocking row
to set connections for
applications and services on
your Mac.
Helps you in detecting and
preventing Intrusions through
the Internet. Vulnerability
Protection monitors all the
incoming and the outgoing
traffic on your Mac and blocks
any unauthorized access.
It provides information about the
susceptibility of the programs
that may be on your Mac
against malicious attacks. It
also provides information about
the known attacks. You can
manage the list of signatures
for Vulnerability Protection.
Page 78
About Firewall settings
78Customizing settings
Location Awareness
Lets you configure the firewall
settings based on the network
location to which your Mac is
connected.
The firewall settings that you
configure contains the
connection blocking settings for
the application and services that
run on your Mac. When you
connect your portable Mac to a
new network location, Norton
Security prompts you to select
a new firewall setting for the
network location.
Page 79
About Firewall settings
79Customizing settings
DeepSight
Lets you access and configure
the Norton DeepSight
Community Download and
Norton DeepSight Community
Submission features.
Your options are:
1
Norton DeepSight
Community Download
This feature lets you obtain
the updated list of IP
addresses that Symantec
identifies as attackers. You
can enable the Norton
DeepSight Community
Download feature to obtain
the updated list of IP
addresses from Symantec
servers.
1
Norton DeepSight
Community Submission
This feature helps you
identify new security risks
by submitting selected
security and application data
to Symantec for analysis.
Symantec assesses the
data to determine the new
threats and their sources.
You can enable or disable
the Norton DeepSight
Community Submission
feature in the Advanced
Protection window to allow
or block the security risks
information submission.
Page 80
About Connection Blocking settings
About Connection Blocking settings
You can configure the Connection Blocking settings for
an application, a service, or an IP address. Based on
the Connection Blocking settings, the firewall allows, or
blocks the incoming and the outgoing network
connections.
The Connection Blocking settings that you configure are
specific to the selected network location. The settings
apply only when your Mac connects to the specified
network location.
You can configure the Connection Blocking settings for
the following:
80Customizing settings
Applications
Services/Ports
Zones
All, in order of precedence
Lets you specify access
settings for the applications
that run on your Mac.
Lets you specify access
settings for the services and
ports that run on your Mac.
Lets you specify the IP
address to or from which you
want to allow or block
connections.
Lets you view the entire
access settings for a firewall
setting that you select.
Whenever the settings
overlap, settings at the top
of the list take precedence
over the settings in the
bottom of the list.
Page 81
Configuring Connection Blocking settings
Configuring Connection Blocking settings
Connection Blocking settings apply to the incoming and
the outgoing connections that use a specific application,
service, port, or IP address.
You can use the Connection Blocking window to
configure whether an application or a service that is
allowed to connect to the Internet or to the local network.
You can select the required network location from the
Editing settings menu and configure the Connection
Blocking settings.
You can configure the Connection Blocking settings only
w
if the Connection Blocking option is turned on in the
Advanced window.
You must have a user account that has administrator
w
privileges to perform this task.
To configure Connection Blocking settings
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Connection Blocking row, click the settings
3
icon.
In the Connection Blocking window, in the Editing
4
settings menu, select the network location for which
you want to configure the connection blocking
settings.
81Customizing settings
Page 82
Configuring Connection Blocking settings
Select an option in the View menu.
5
The options that appear in the View menu vary
depending on the network location that you select in
the Editing settings menu.
Your options are:
82Customizing settings
Applications
Services/Ports
Zones
All, in order of precedence
Lets you specify the
Connection Blocking settings
for the applications that run
on your Mac.
Lets you specify the
Connection Blocking settings
for the services and ports
that run on your Mac.
Lets you specify the IP
address to or from which
firewall allows or blocks
connections.
Lets you specify the current
Connection Blocking settings
for the Applications,
services, ports, and zones in
the order of precedence.
Page 83
Configuring Connection Blocking settings
Select one of the following tabs:
6
83Customizing settings
Incoming
Outgoing
Incoming & Outgoing
Lets you specify the access
settings for the incoming
connections that use an
application or a service that
runs on your Mac.
Lets you specify the access
settings for the outgoing
connections that use an
application or a service that
runs on your Mac.
Lets you configure the
access settings for
connections to and from the
IP addresses that you
specify.
This tab appears only when
you select Zones in the View
menu.
Page 84
About access settings for an application
Use the Action pop-up menu at the bottom of the
7
Connection Blocking window to specify other
connection blocking preferences. Your options are:
84Customizing settings
Logging and notification
settings
Advanced settings
Reset to defaults
Click Done.
8
Lets you specify the type of
access attempts for which
Norton Security must
maintain records.
You can also specify the
type of access attempts
about which Norton Security
must notify you.
Lets you specify the
advanced firewall options.
Lets you reset configuration
to default level.
About access settings for an application
You can use the Connection Blocking window to
specify the access settings of applications to connect
to a network. You can customize the firewall to allow or
block network connections to or from applications like
iTunes.
You can also configure the default and specific access
settings for an application. The default access settings
apply to all the incoming and the outgoing connections
within your network. The specific access settings let you
allow or block connections to specific computers.
You can perform the following activities for an application
using the Connection Blocking window:
1 Configure the access settings
1 Customize the specific access settings
Page 85
Configuring the access settings for an application
1 Edit the access settings
1 Remove the access settings
Configuring the access settings for an
application
Norton Security lets you configure the access settings
for the applications that run on your Mac. Based on the
settings that you configure and the network location of
your Mac, the firewall allows or blocks the incoming and
the outgoing connections.
When you configure the access settings for an
application, the name of the application appears in the
View pane of the Connection Blocking window. You
can also view the default access setting for the selected
application under the application name.
Norton Security creates the <All other applications>
access setting by default. This access setting includes
all applications that run on your Mac.
To configure the access settings for an application
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Connection Blocking row, click the settings
3
icon.
In the Connection Blocking window, in the Editing
4
settings menu, select the network location for which
you want to configure the access settings.
In the View menu, select Applications.
5
85Customizing settings
Page 86
Configuring the access settings for an application
Select one of the following tabs:
6
86Customizing settings
Incoming
Outgoing
Click Add application.
7
In the Choose Application dialog, select the
8
Lets you specify the access
settings for the incoming
connections for the
application.
Lets you specify the access
settings for the outgoing
connections for the
application.
required application.
If the application that you want does not appear in
the list, click Other to search for the application.
In the menu at the top of the dialog, select one of the
9
following default access setting:
Allow
Block
Ask
Allows the network
connections for the
application.
Blocks the network
connections for the
application.
Set up the firewall notify you
when a program attempts to
access the Internet.
Click Choose.
10
The name of the application that you have added
appears in the View pane in the ConnectionBlocking window.
Page 87
Customizing the specific access settings for an application
Use the Action drop-down menu at the bottom of
11
the Connection Blocking window to specify the
advanced firewall preferences. Your options are:
87Customizing settings
Logging and notification
settings
Advanced settings
Reset to defaults
Click Done.
12
Lets you specify the type of
access attempts for which
Norton Security must
maintain records.
Lets you specify the
advanced firewall options.
Lets you reset configuration
to default level.
Customizing the specific access settings
for an application
Norton Security lets you customize the incoming and
outgoing network connections settings for each
application on your Mac. You can specify the IP
addresses from which you want to allow or deny
connection attempts. The specific access settings that
you specify appear in the row under the application
name with a minus (-) and plus (+) sign.
You can add any number of specific access settings for
w
an application. For example, you can add a specific
access setting for an application to allow connection
from all the computers on your network. You can also
add another specific access setting for the same
application to block connection from a single computer.
To customize the specific access settings for an
application
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
Page 88
Customizing the specific access settings for an application
In the Connection Blocking row, click the settings
3
icon.
In the Connection Blocking window, in the Editing
4
settings menu, select the network location for which
you want to configure the specific access settings
for an application.
In the View menu, select Applications.
5
Select one of the following tabs:
6
88Customizing settings
Incoming
Outgoing
In the View pane, click the + sign next to the
7
Lets you specify the access
settings for the incoming
connections that use the
application.
Lets you specify the access
settings for the outgoing
connections that use the
application.
application name.
In the Edit address window, use the following
8
options to select the type of access for the
connections:
Allow
Block
Allows the connections to or
from an IP address.
Blocks the connections to or
from an IP address.
Page 89
Editing the access settings of an application
Select the one of the following option to customize
9
the specific access settings:
89Customizing settings
All computers on my current
network
A single computer
All IP addresses beginning
with
All IP addresses on a
network
Click Save.
10
Click Done.
11
Lets you allow or block
connections to or from all
computers on your network.
Allow or block connections
to or from the computer with
the IP address that you
specify.
Allow or block connections
to or from computers with
the base address that you
specify.
Allow or block connections
to or from computers on a
local network that share the
base address and the mask
address that you specify.
Editing the access settings of an
application
You can edit the following access settings for an
application:
1 Logging and Notifications settings
1 Specific access settings
1 Default access settings that you configured for the
application
Page 90
Editing the access settings of an application
To edit the Logging and Notifications settings for an
application
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Connection Blocking row, click the settings
3
icon.
In the Connection Blocking window, in the Editing
4
settings menu, select the network location that you
want to edit.
In the View menu, select Applications.
5
Select an application that you want to edit.
6
In the View pane, select the row that contains the
7
application name, and then click Edit.
90Customizing settings
Page 91
Editing the access settings of an application
In the Edit application window, edit the logging
8
settings. Your options are:
91Customizing settings
Override global logging
settings
Log allowed inbound
connections
Log allowed outbound
connections
Log blocked inbound
connections
Log blocked outbound
connections
Select the Override global
logging settings check box
to select the logging options
Maintains a record of all the
allowed incoming
connections that use the
application.
Maintains a record of all the
allowed outgoing
connections that use the
application.
Maintains a record of all the
blocked incoming
connections that use the
application.
Maintains a record of all the
blocked outgoing
connections that use the
application.
Page 92
Editing the access settings of an application
In the Edit application window, edit the notifications
9
settings. Your options are:
92Customizing settings
Override global notifications
settings
Notify me of allowed
inbound connections
Notify me of allowed
outbound connections
Notify me of blocked
inbound connections
Notify me of blocked
outbound connections
Click Save.
10
Select the Override global
notifications settings check
box to select the notification
options
Displays an alert for all of the
allowed incoming
connections that use the
application.
Displays an alert for all of the
allowed outgoing
connections that use the
application.
Displays an alert for all of the
blocked incoming
connections that use the
application.
Displays an alert for all of the
blocked outgoing
connections that use the
application.
To edit the specific access settings for an application
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Connection Blocking row, click the settings
3
icon.
In the Connection Blocking window, in the Editing
4
settings menu, select the network location for which
you want to edit the specific access settings.
In the View menu, select Applications.
5
Page 93
Editing the access settings of an application
Select an application for which you want to edit the
6
specific access settings.
In the View pane, select the row that contains the
7
specific access settings for the application, and then
click Edit.
In the Edit address window, edit the required option.
8
Click Save.
9
To edit the default access settings for an application
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Connection Blocking row, click the settings
3
icon.
In the Connection Blocking window, in the Editing
4
settings menu, select the network location for which
you want to edit the default access settings.
In the View menu, select Applications.
5
Select the row that contains the default access
6
settings for the application in the View pane.
Click Edit.
7
In the window that appears, select one of the
8
following options:
93Customizing settings
Allow
Block
Ask
Allows the network
connections for the
application.
Blocks the network
connections for the
application.
Prompts you with a
notification window.
You can select whether the
firewall must allow or block
the network connections
using the application.
Page 94
Removing access settings for an application
Click Save.
9
Removing access settings for an
application
You can use the Connection Blocking window to
remove the following access settings that you have
configured for an application:
1 Access settings for an application
1 Specific access setting for an application
However, you cannot remove the default Connection
Blocking setting that appears in the list.
To remove access settings for an application
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Connection Blocking row, click the settings
3
icon.
In the Connection Blocking window, in the Editing
4
settings menu, select the network location for which
you want to remove access settings.
In the View menu, click Applications.
5
In the View pane, select the application name, and
6
do one of the following:
1 Click Remove.
1 Click the - sign next to the application name.
In the confirmation window, click Remove.
7
To remove specific access settings for an application
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Connection Blocking row, click the settings
3
icon.
In the Connection Blocking window, in the Editing
4
settings menu, select the network location for which
you want to remove access settings.
94Customizing settings
Page 95
About access settings for a service
In the View menu, click Applications.
5
Select one of the following tabs:
6
95Customizing settings
Incoming
Outgoing
Select the row that contains the specific access
7
Lets you specify the access
settings for the incoming
connections that use the
application.
Lets you specify the access
settings for the outgoing
connections that use the
application.
settings and do one of the following:
1 Click Remove.
1 Click the - sign next to the specific access setting
for the application.
In the confirmation window, click Remove.
8
About access settings for a service
You can use the Connection Blocking window to
specify access settings for the services that are running
on your Mac. For example, you can customize the
access settings for the file transfer protocol (FTP) service
that allows access to the shared folders on your Mac
using the port 21. You can customize the firewall for
FTP to allow or block the incoming and the outgoing
connections.
When you add an existing service, Norton Security
displays the port through which the service
communicates the incoming and the outgoing
connections.
You also can specify default and specific access settings
for a service. The default access setting applies to all
connections to or from the computers that use the
Page 96
Configuring the access settings for services
service. The specific access settings let you allow or
block connections to specific computers.
You can perform the following activities for a service
using the Connection Blocking window:
1 Configure the access settings
1 Customize the specific access settings
1 Edit the access settings
1 Remove the access settings
Configuring the access settings for services
Norton Security lets you specify the access settings for
the services that run on your Mac. Based on the access
settings that you specify and the current network location
of your Mac, firewall allows or blocks the network
connections that use the service.
The access settings that you configure are specific to
the selected network location. It applies to your Mac
only when it connects to the network location for which
your Connection Blocking setting is configured.
When you add a service, the name of the service
appears in the View pane of the Connection Blocking
window. In addition, you can view the default access
setting for the service under the service name.
By default, Norton Security creates the <All otherservices> access setting. This access setting includes
all services that run on your Mac.
To specify access settings for a service
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Connection Blocking row, click the settings
3
icon.
In the Connection Blocking window, in the Editing
4
settings menu, select the network location for which
you want to configure the access settings.
In the View menu, select Services/Ports.
5
96Customizing settings
Page 97
Configuring the access settings for services
Select one of the following tabs:
6
97Customizing settings
Incoming
Outgoing
Click Add service.
7
In the New Service dialog that appears, select the
8
Lets you specify the access
settings for the incoming
connections that use the
service.
Lets you specify the access
settings for the outgoing
connections that use the
service.
default access setting option that you want to apply
for the service. Your options are:
Allow
Block
Select the required service from the Service name
9
Allows the network
connections for the service.
Blocks the network
connections for the service.
menu.
If the service is not listed in the Service name menu,
enter the name of the new service in the Servicename menu. You can also enter a description for the
service in the Description field.
Page 98
Configuring the access settings for services
Configure the following tabs as required:
10
98Customizing settings
Ports
Logging
Notifications
Click Save.
11
Lists the ports in the firewall
that the service can open.
You can use the Add, Edit,
and Remove options only
when you add a new service.
You can use these options
to add or modify the port
numbers that you add.
Lists the types of
connections that Norton
Security must log.
Lists the types of
connections for which Norton
Security should notify you
when it makes a connection
attempt.
You can select whether the
firewall must allow or block
the connection attempts that
use the service.
Page 99
Customizing the specific access settings for a service
In the Action drop-down menu at the bottom of the
12
Connection Blocking window, specify the advanced
firewall preferences. Your options are:
99Customizing settings
Logging and notification
settings
Advanced settings
Reset to Defaults
Click Done.
13
Lets you specify the type of
access attempts for which
you want Norton Security to
maintain records.
You can also specify the
type of access attempts
about which you want Norton
Security to notify you.
Lets you specify the
advanced firewall options.
Lets you reset configuration
to default level.
Customizing the specific access settings
for a service
Norton Security lets you customize the incoming and
outgoing network connections settings for each service
on your Mac. You can specify the IP addresses from
which you want to allow or block connection attempts.
The specific access settings that you specify appear in
the row under the application name with a minus (-) and
plus (+) sign.
You can add any number of specific access settings for
w
a service. For example, you can add a specific access
setting for a service to allow connection from all the
computers on your network. You can also add another
specific access setting for the same service to block
connection from a single computer.
Page 100
Customizing the specific access settings for a service
To customize the specific access settings for a service
In the Norton Security main window, click Advanced.
1
On the left pane, click Firewall.
2
In the Connection Blocking row, click the settings
3
icon.
In the Connection Blocking window, in the Editing
4
settings menu, select the network location for which
you want to specify the specific access settings.
In the View menu, click Services/Ports.
5
Select one of the following tabs:
6
100Customizing settings
Incoming
Outgoing
In the View pane, click the + sign next to the service
7
Lets you specify the access
settings for the incoming
connections that use the
service.
Lets you specify the access
settings for the outgoing
connections that use the
service.
name.
In the Edit address dialog, select the type of access
8
for the connections. Your options are:
Allow
Block
Lets you allow the
connections to or from an IP
address.
Lets you block the
connections to or from an IP
address.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.