Symantec Norton 360 Multi-Device, 5U Instrukcja Obsługi

Przeglądaj online lub pobierz Instrukcja Obsługi dla Oprogramowanie antywirusowe Symantec Norton 360 Multi-Device, 5U. Symantec Norton 360 Premier Edition 2013 Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 618
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 0
Norton 360
TM
Product Manual
Care for our Environment; It's the right thing to do.
Symantec has removed the cover from this manual to reduce the Environmental Footprint of our
products. This manual is made from recycled materials.
Przeglądanie stron 0
1 2 3 4 5 6 ... 617 618

Podsumowanie treści

Strona 1 - Norton 360

Norton 360TMProduct ManualCare for our Environment; ‘It's the right thing to do.’Symantec has removed the cover from this manual to reduce the En

Strona 2 - Norton 360™ Product Manual

Lets you open thePerformance window inNorton 360.The Performance windowchronicles all installs,downloads, optimizations,detections, alerts, andinstanc

Strona 3 - Contents

Performs backgroundmaintenance tasks related tolicensing.Licensing MaintenancePerforms backgroundmaintenance tasks related toNorton Insight. Tasks inc

Strona 4 - Contents4

To monitor background jobs1In the Norton 360 main window, click Performance.2In the Performance window, click Norton Tasks.3In the Norton Tasks window

Strona 5 - 5Contents

You can select one of the following options:Allows the Norton Tasks torun only when your computeruses external power.If you choose this option,Norton

Strona 6 - Contents6

3In the Norton Tasks window, under the PowerSource column, click the Configure link for theNorton Task that you want to configure the powersource.4In

Strona 7

A Norton 360 scan can identify threats on yourcomputer in the following ways:At regular intervals, Norton 360obtains definition updates fromSymantec.

Strona 8 - About Norton 360 main window

Norton 360 obtains specificinformation about the Files ofInterest and submits theinformation to Symantec duringidle time. The informationincludes thin

Strona 9

Symantec assigns the following confidence levels toFiles of Interest:Symantec analyzes the file astrusted based on the statisticalevaluation that is d

Strona 10 - About Norton 360

Norton 360 also provides different profiles to configureyour scan performance. When you use the Full Scanprofile, Norton 360 follows the Blacklist tec

Strona 11

The drop-down list that is available in the NortonInsight - Application Ratings window provides youthe following options:Lists the processes that runo

Strona 12

Lists the Files of Interest thatyou manually trusted in theFile Insight window.This category does not listthe files that do not belongto the File of I

Strona 13 - 13Getting Started

When your system status is At Risk or Attention, thissection automatically provides you the FixNow optionto fix all the issues at once.The right side

Strona 14

To view the files using Norton Insight1In the Norton 360 main window, click Security, andthen click Run Norton Insight.2In the Norton Insight - Applic

Strona 15 - 15Getting Started

window to update the trust value of a file. You can alsomanually trust any well-known files. You can changethe trust level of any file to User Trusted

Strona 16

To manually trust the file4In the File Insight window, in the Details tab, clickTrust Now.You can manually trust the files that are poor,unproven, or

Strona 17 - 17Getting Started

Norton 360 scans the files that have a confidencelevel other than Norton Trusted.1 Configure to High Trust to perform a scan thatexcludes the files th

Strona 18 - Activation protects you

2In the Norton Insight - Application Ratingswindow, move the ScanPerformance Profiles sliderto one of the settings. Your options are:1 Full Scan1 Stan

Strona 19 - Activating Norton 360

Norton 360 provides reports based on the followingcategories:Lets you view the details ofthe various attacks your PCis protected from.For example, you

Strona 20

Viewing the Monthly ReportThe Monthly Report lets you view how Norton 360protected you for the past 30 days. This report includesdifferent activities

Strona 21

This chapter includes the following topics:1 About total protection1 About keeping your computer secure1 About solving connection problems1 About resp

Strona 22

Norton 360 is grouped into the following fourcategories of protection:Blocks and removes virusesand spyware from email anddownloaded sites, protectsag

Strona 23 - About your Norton Account

1 Delete all unwanted messages without openingthem.1 Do not respond to email that you suspect is spam.Delete it.1 Be wary of any email that requests c

Strona 24

Lets you access NortonManagement.Norton Management lets youmanage your Norton productsinstalled on all of yourdevices from one location. Tosign up or

Strona 25 - 25Getting Started

About solving connection problemsNorton 360 uses an Internet connection to supportseveral of its protection features. If you use a proxyserver to conn

Strona 26

Checks all boot records, files,and running programs to protectyour computer from viruses andspywareIt also runs other tasks (such asLiveUpdate, Regist

Strona 27 - Creating a Norton Account

When you right-click a folder, the shortcut menudisplays Norton 360 and then Scan Now option. Youcan use this command to scan any particular folder.Wh

Strona 28 - Accessing your Norton Account

window. For example, the security items that arerelated to the Quarantine feature appear under theQuarantine category. In addition, the Security Histo

Strona 29

1 Email Errors1 Norton Community Watch1 Registry Cleanup1 File Cleanup1 Disk Optimization1 Silent Mode1 LiveUpdateYou can view the security items base

Strona 30 - About Norton Management

History logs for that day. You can later import the fileinto Security History and analyze the data.Viewing items in Security HistorySecurity History p

Strona 31

2In the Tasks window, under General Tasks, clickCheck Security History.Maintaining total protectionAbout monitoring protection features126

Strona 32

3In Security History window, in the Show drop-downlist, select the category of items that you want toview. Your options are:The Recent History view in

Strona 33

The security risks include thesuspicious programs that cancompromise the security ofyour computer.The Resolved Security Risksview in the Security Hist

Strona 34 - About managing devices

The Security HistoryQuarantine provides a safelocation on your computerwhere you can isolate itemswhile you decide an action totake on them.The Quaran

Strona 35 - About the supported devices

Lets you download theNorton Mobile Security forAndroid.Norton Mobile Security helpsprotect your mobile devicesagainst loss, theft, viruses,and other m

Strona 36

The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.The Firewall - Network andConnections category in theS

Strona 37

The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.The firewall maintains rulesto control Internet access

Strona 38

Download Insight processesany executable file that youdownload for analysis of itsreputation level. It theninforms you about theprocessing results bas

Strona 39

Norton Product TamperProtection lets you protectyour Norton product from anyattack or modification byunknown, suspicious, ormalicious applications.The

Strona 40

Network Cost Awareness letsyou set up policies andrestrict the Internet usage ofNorton 360. You can definethe amount of networkbandwidth that Norton 3

Strona 41

Norton 360 may generateerrors in some cases. Forexample, an error can occurwhen you run LiveUpdate orscan a folder. Engine errors,timeout errors, and

Strona 42

The Norton CommunityWatch feature lets yousubmit any suspicioussecurity or suspiciousapplication data to Symantecfor analysis. Symantecassesses the da

Strona 43

The File Cleanup featureremoves unwanted temporaryfiles including leftoverInternet browser files,Internet search words, andother temporary files.The F

Strona 44

Silent Mode suppresses alertsand notifications andtemporarily suspends mostof the background activities.The Silent Mode view in theSecurity History wi

Strona 45

4Click a row to view details for that item.If you want to view additional information about anitem, click the More Details option in the Detailspane o

Strona 46

Online FamilyGetting StartedAbout Norton 36014

Strona 47

The following table lists the categories that providethe advanced details about the Security History items:Displays the followinginformation about the

Strona 48

Actions141Maintaining total protectionAbout monitoring protection features

Strona 49

Displays the actions that areavailable for the selected itemThe options in the Actions viewvary depending on the optionsthat are available in the Show

Strona 50

This action removes therestricted status from theselected computer or fromall of the unclassifiedcomputers on the selectednetwork.This option is avail

Strona 51

1 Stop Notifying MeThis action prevents Norton360 from notifying you whenit blocks the selected attacksignature in the future.This option is available

Strona 52 - About Norton Power Eraser

events that are related to Security Risks, DownloadInsight, and Performance.The File Insight window lets you view more details ofevents that belong to

Strona 53 - About updating Norton 360

Lets you view the detailedinformation about theunresolved security risks in anorganized way.The Unresolved Security Riskscategory includes the infecte

Strona 54 - About LiveUpdate

Lets you view the performancedetails of any File of Interest thatis available on your computer.The information includes thegeneral details, the origin

Strona 55

Provides the lineage details of afile.You can view the file name andthe URL of the source fromwhere the file was downloaded.The lineage details of a f

Strona 56

Let you return the securityrisk that is quarantined to theoriginal location on yourcomputer.Returns the selectedQuarantine item to itsoriginal locatio

Strona 57 - About Smart Definitions

Lets you monitor your child’sactivities on the Internet.wNorton Online Familymay not be available withsome versions of Norton 360.In such case, you ma

Strona 58

This category includes thesecurity risks or the infectedfiles that Norton 360 was notable to repair, remove, orquarantine.Unresolved SecurityRisksThis

Strona 59

Takes you to the SymantecSecurity Response Web siteGet helpSends the security risk toSymantecSubmit to SymantecSearching in Security HistoryYou can se

Strona 60 - Checking for updates manually

option to save the list in the Security History log. Youcan later import the log file and analyze the data.Security History stores the information in

Strona 61

5In the Save As dialog box that appears, navigate toa location and specify the name for the file.The category name in the Show drop-down listappears a

Strona 62

The Security History Quarantine includes the followinggroups of items:Includes the items suchas spyware and adwarethat are generally low riskand that

Strona 63 - About Pulse Updates

3In the Threat Detected window, select the actionthat you want to perform. Some of the options are:Returns the security risk thatis quarantined to the

Strona 64

Adding an item to the QuarantineSecurity History Quarantine provides a safe locationon your computer in which you can isolate items whileyou decide on

Strona 65 - About Network Proxy Settings

functionality of a program that requires the riskprogram to run.For example, a shareware or freeware program thatyou download may use adware to keep i

Strona 66

to remove the security risk and places it in the SecurityHistory Quarantine. Some programs may rely on thesecurity risk item that you quarantine to fu

Strona 67

volume. These items appear as Not Submitted inSecurity History.To manually submit an item to Symantec1In the Security History window, in the Quarantin

Strona 68 - About Norton 360 status

Details option in the Norton360 main window to viewmore details on the NortonOnline Family Web site.Getting StartedAbout Norton 36016

Strona 69

attacks. It also provides information about the knownattacks that they are protected from.Vulnerabilities are flaws in your programs or youroperating

Strona 70 - About the Norton 360 icon

For each program, you can view details such as thename of the program, its vendor, and the number ofvulnerabilities that the program contains. You can

Strona 71

To view details about a vulnerable application1In the Norton 360 main window, click Tasks.2In the Tasks window, under General Tasks, clickCheck Vulner

Strona 72

This chapter includes the following topics:1 About the Norton 360 scans1 About Computer Scan1 About Insight Network scan1 About Reputation Scan1 About

Strona 73

Norton 360 automatically performs different types ofscans to secure your computer from latest threats. Italso lets you run different types of scans ma

Strona 74

Reputation Scan displays thereputation information of thefiles on your computer. Itdisplays the reputationinformation such as trust level,prevalence,

Strona 75 - Monitoring your

Scan Facebook Wall lets youscan the links and URLs that areavailable on your Facebookprofile.When you click the ScanFacebook Wall option, Norton360 ta

Strona 76

of the Computer Scan displays the threat as Trojan.Foo.You can click the Run Scans option available in theTasks window to access the different types o

Strona 77

Runs LiveUpdate, backup, anddisk optimization tasks.Runs LiveUpdate, backs up yourdata, frees disk space, andoptimizes your disk volume.Custom TaskCom

Strona 78

3Click Go.You can use the following options:Suspends the scan temporarily.Click Resume to continue thescan.PauseSkips the current scan.SkipTerminates

Strona 79

Lets you check the safety ofa Web site.You can also perform a safesearch.wThis option may not beavailable with some versionsof Norton 360. In such cas

Strona 80

3Click Go.4After the scan is complete, in the Scans window,click Close.Scanning selected drives, folders, or filesOccasionally, you might want to scan

Strona 81 - About performance alerting

4In the Scans window, do one of the following:1 To scan specific drives, click Run next to DriveScan, select the drives that you want to scan,and then

Strona 82 - Select this option if you do

computer. Viruses, spyware, and other risks oftentarget these areas.If your most recent scan was a Full System Scan, thiswindow shows the results of a

Strona 83

About custom scansYou can create a custom scan if you regularly scan aparticular segment of your computer. This custom scanlets you scan the segment f

Strona 84

5In the New Scan window, in the Scan Name box,type a name for the scan.You cannot specify a scan name that is already inuse.6On the Scan Items tab, ad

Strona 85 - Battery Power option

5In the window that appears, on the Scan Items tab,do the following:1 To add drives, click Add Drives, in the ScanDrives dialog box, select the drives

Strona 86

5In the Edit Scan window, on the Scan Options tab,configure the scan options as required.6Click Save.Editing a custom scanYou can edit a custom scan t

Strona 87

To run a custom scan1In the Norton 360 main window, click Security, andthen click Run Scans.2In the Scans window, under Computer Scans, clickCustom Sc

Strona 88

4In the Scans window, in the Delete column, clickthe delete icon next to the custom scan that youwant to delete.5Click Yes to confirm that you want to

Strona 89

wNorton 360 lets you select multiple dates if youschedule a monthly scan.To schedule a custom scan1In the Norton 360 main window, click Security, andt

Strona 90

Lets you access NortonStudio.Norton Studio is a Windows8 app that lets you manageyour Norton products andNorton product keys from onelocation. You can

Strona 91 - About optimization

7Under After scan completion:, select the state atwhich your computer should be after the scan iscomplete. Your options are:1 Stay On1 Turn Off1 Sleep

Strona 92 - Optimizing your boot volume

5In the Edit Scan window, under When do you wantthe scan to run?, set the frequency and time atwhich you want the scan to run.Most of the frequency op

Strona 93 - About the Idle Time Optimizer

Editing a scheduled scanYou can change the schedule of any scheduled customscan, Quick Scan, or Full System Scan from the Scanswindow.To edit a schedu

Strona 94 - About the Norton Tasks

When the Insight Protection option is turned on,Norton 360 performs a traditional scan and an InsightNetwork scan simultaneously. The traditional scan

Strona 95

When you right-click a file, the shortcut menudisplays Norton 360 and then Insight NetworkScan. You can use this command to scan a file usingboth loca

Strona 96

4In the Insight Protection row, do one of thefollowing:1 To turn off Insight Protection, move the On/Offswitch to the right to the Off position.1 To t

Strona 97

Computer Scan. Norton 360 uses the Computer Scanto perform the signature-based threat detection. Itcompares the signature of the filtered reputation f

Strona 98

This category includesWindows System files (.sys),dynamic link library files(.dll), and device driver files(.drv).System filesThis category includesAc

Strona 99

Scans all the Files of Interestthat are available on yourcomputer.When you perform a FullSystem Scan, Norton 360searches for Files of Intereston all t

Strona 100

Symantec has a fewindications that the file is nottrusted.This file is suspicious and canharm your computer.PoorSymantec has a highindication that the

Strona 101 - About Power Source

If you are not connected to the Internet, you can clickTry Later in the Activation not complete window tostart your product. The Activation window rea

Strona 102 - Configuring the Power Source

4If there is a file with Poor or Bad trust level, underthe Trust Level column, click the red cross (x) icon.5In the Quarantine File window, click Quar

Strona 103 - About Norton Insight

check the trust level of a specific file, you can scan theparticular file.To run a Reputation custom scan1In the Norton 360 main window, click Securit

Strona 104 - About System Insight

When you run a Reputation Quick Scan, Norton 360considers the Files of Interest which include runningprocesses and loaded programs. When you run aRepu

Strona 105

You can view the number of trusted files that areon your computer. You can also view the totalnumber of files that Symantec analyzes within theNorton

Strona 106 - Files of Interest:

Indicates the trust level thatis assigned to a file.Symantec analyzes specificinformation about a file suchas the digital signature andthe hash value

Strona 107

Indicates the communityusage level of the file.The search results aregrouped in to the followingcategories:1 Very Few Users: Showsthe files that have

Strona 108

Indicates the system resourceusage level of the file.The usage levels are asfollows:1 Low: Indicates that thefile consumes minimumsystem resources.1 M

Strona 109

Indicates the stability ratingof the file.The stability rating dependson how frequently theprogram crashes. Thedifferent stability ratings areas follo

Strona 110

you are not only protected from unsafe sites but youcan also let other Facebook users know the securitystatus of any Web site.However, Norton Safe Web

Strona 111

The following are the safety states that Norton SafeWeb provides after it scans the links on your FacebookWall:Indicates that the site is safe tovisit

Strona 112

Norton 360™ Product ManualThe software described in this book is furnished under a licenseagreement and may be used only in accordance with the terms

Strona 113 - 1 Full Scan

You can activate your product directly from theactivation alert. You can also activate your productfrom the Trial Period Status link in the main windo

Strona 114

To enable your Facebook Wall1In the Norton 360 main window, click Security, andthen click Run Scans.2In the Scans window, under Scan Facebook Wall,cli

Strona 115

suppress the SONAR notifications by disabling theShow SONAR Block Notifications option.The View Details link in the notification alert lets youview th

Strona 116 - Viewing the Monthly Report

and proactively detects unknown security risks on yourcomputer. SONAR identifies emerging threats basedon the behavior of applications. SONAR identifi

Strona 117 - Maintaining total

To exclude high-risk security threats from scanning1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,cli

Strona 118

window. The Signature Exclusions window containsthe list of all security risks that can be excluded fromNorton 360 scans. For each security risk, you

Strona 119

About clearing file IDs that are excluded during scansWhen you run a Reputation Scan, Norton 360 providesinformation on the trust-worthiness of all pr

Strona 120

again. This can improve the scan performance ofNorton 360 on your computer.However, if you want Norton 360 to scan all the filesin your computer, you

Strona 121

Microsoft Excelexcel.exeMicrosoft PowerPointpowerpnt.exeMicrosoft Visiovisio.exeMicrosoft Accessmsaccess.exeMicrosoft Projectwinproj.exeNorton 360 sca

Strona 122 - About Security History

4In the Microsoft Office Automatic Scan row, do oneof the following:1 To turn on Microsoft Office Automatic Scan,move the On/Off switch to the left to

Strona 123

Norton 360 turns on this optionautomatically when it detects adisk burning task or a MediaCenter TV recording task. Norton360 also turns on Quiet Mode

Strona 124

To activate your product from the main window1In the Norton 360 main window, do one of thefollowing:1 If you purchased a subscription version of areta

Strona 125

About the Silent Mode that you turn on manuallyNorton 360 lets you manually turn on Silent Mode fora specified duration. When Silent Mode is turned on

Strona 126

To turn on Silent Mode from the Administrative Settingswindow1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Se

Strona 127

2In the Performance window, click Norton Tasks.3In the Norton Tasks window, under Silent Mode,move the On/Off switch to the right to the Offposition.4

Strona 128 - Maintaining total protection

ensure high performance of your computer. Theactivities that are suspended run after you finish usingthe application in the full-screen mode.Silent Mo

Strona 129

3In the Full Screen Detection row, move the On/Offswitch to the left to the On position.4In the Settings window, click Apply.5Click Close.About Quiet

Strona 130

The following table explains about the various options:When you use a Media Centerapplication to burn a CD or aDVD, Norton 360 automaticallyenables Qu

Strona 131

When you use a Media Centerapplication to record a TVprogram, Norton 360automatically enables QuietMode, if the Media Center TVRecording option is tur

Strona 132

Norton 360 automatically turnson Quiet Mode when it detects aTV program recording session ora disk-burning session. Inaddition, you can manually addth

Strona 133

To turn off or turn on IMAPI 2.0 Disk Burn1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Admini

Strona 134

turn on Quiet Mode to the Quiet Mode Programs list.When Norton 360 detects a running instance of aprogram that you added in the list, it automatically

Strona 135

The product key is providedas part of the activationprocess. Be sure to save yourproduct key by creating orsigning in to your NortonAccount, or by pri

Strona 136

To add a program1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Administrative Settings.3In the

Strona 137

5In the confirmation dialog box, click Yes.6In the Quiet Mode Programs window, click Applyand then click OK.About boot time protectionThe boot time pr

Strona 138

Configuring boot time protectionThe boot time protection feature provides enhancedsecurity level from the time you start your computer.As soon as you

Strona 139

Turning on or turning off Early Launch Anti-MalwareProtectionThe Early Launch Anti-Malware Protection featureprovides enhanced security level during t

Strona 140

to scan or customize the scan by adding a specificcommand. The following commands are available:NAVW32 launches helpand terminates./?Scans all drives/

Strona 141

Scans the specifieddrive, folder, or file[drive|folder|file]Performs Quick Scan inthe background.wNorton 360displays the scanswindow only when athreat

Strona 142

Scanning your computerRunning a scan at the command prompt226

Strona 143 - 1 Norton File Insight

This chapter includes the following topics:1 What to do if a security risk is foundWhat to do if a security risk is foundYour product provides many so

Strona 144

In some cases, Norton 360 might not identify an itemas a security threat, but you might suspect that theitem is infected. In such cases, you can submi

Strona 145

Security History also includes information aboutspyware, adware, and other security risks.Reviewing Auto-Protect notificationsAuto-Protect scans files

Strona 146

activation procedure. You need to log in to yourparental control software or to the Internet throughyour ISP as an administrator to change yourconfigu

Strona 147

3In the Show drop-down list, select the category forwhich you want to review Auto-Protect alerts.Your options are:Review Auto-Protectnotifications tha

Strona 148

4In the right pane, click the Options link.The option name appears as Restore & Options forfew items.If one or more security risks such as spyware

Strona 149

5In the Threat Detected window, select theappropriate action on the risk.The following are some of the options that areavailable in the Threat Detecte

Strona 150

Removes the selectedsecurity risk from thecomputer andquarantines it.This option is availablefor the security risks thatrequire your attention formanu

Strona 151 - Searching in Security History

Sends the security risk toSymantec.In some cases, Norton360 might not identify anitem as a security threat,but you might suspectthat the item is infec

Strona 152 - 1 Text Files (.txt)

checks for the infections that have processes runningin memory. It also checks for the infections that thestart-up files and folders refer.If that doe

Strona 153

Responding to security issuesWhat to do if a security risk is found236

Strona 154

This chapter includes the following topics:1 About Norton 360 alerts and messages1 About managing messages and alerts1 Types of risks1 Types of threat

Strona 155

You might see messages in the following locations:Several types of Norton 360messages appear in thenotification area, at the farright of the taskbar.

Strona 156

Norton 360 displaysindividual status areas foreach protection feature, suchas Security, Identity, Backup,and Tuneup. The status areasshow how many iss

Strona 157

After you log in to your Norton Account, you canmanage your product information with the followingoptions:Saves the information for all ofthe Norton p

Strona 158

These risks consist of flawsin legitimate software thatcan be exploited, either tocause damage, block data, orsteal information.Vulnerabilities are us

Strona 159

Types of virusesA virus is a small program that is designed to alter theway your PC operates, without your knowledge orpermission.To be a virus, a pro

Strona 160

These viruses use thetechniques of both boot andfile infector viruses. Norton360 scans for such virusesand eliminates them.Multipartite virusesThese v

Strona 161

This chapter includes the following topics:1 Turning on or turning off automatic tasks1 About custom task1 About scheduling automatic tasks1 About sch

Strona 162

see the results of the latest Norton 360 activities thenext time you open the Norton 360 main window. Tosee a current report of Norton 360 activities,

Strona 163 - Scanning your

Deletes the temporary filesthat are left behind on yourPC's hard disk after Internetbrowsing.Internet Explorer TemporaryFilesDeletes the unnecess

Strona 164

Norton 360 lets you choose your own combination oftasks for a one-time scan. You can run LiveUpdate,back up your data, free disk space by cleaning up

Strona 165 - About the Norton 360 scans

Examine your PC one or moretimes each week for securityand performance issues.You can pick the days of theweek and the time of day onwhich the scan pe

Strona 166 - About Computer Scan

3On the Scheduling tab, under Schedule, select anoption.When you click Weekly or Monthly, you must selectthe time and day to run the automatic tasks.

Strona 167

Does not perform anyscheduled backups ofchanged filesIf you choose this option, youshould manually back up yourchanged files regularly.Manual Schedule

Strona 168 - Running a Quick Scan

Saves your account informationand your billing details.The Profile options are:1 Account InformationYou can update your NortonAccount information andy

Strona 169 - Running a Full System Scan

Doing routine tasksSpecifying Idle Time Out duration250

Strona 170

This chapter includes the following topics:1 About the Smart Firewall1 About Intrusion Prevention1 About Download Insight1 About Norton AntiSpam1 Abou

Strona 171

Cloaks the inactive portson your computer therebyproviding protectionagainst attacks throughhacking techniques suchas port scanningPort scansMonitors

Strona 172 - 1 Total items scanned

3On the General Settings tab, in the Smart Firewallrow, move the On/Off switch to the right to the Offposition.4Click Apply.5In the Security Request w

Strona 173

To turn on Smart Firewall from the notification area4In the notification area on the taskbar, right-clickthe Norton 360 icon, and then click Enable Sm

Strona 174 - Selecting the scan items

pcAnywhere with that specific computer. It thenprocesses the original rule and prevents its use withany other computer.About Traffic rulesNorton 360 i

Strona 175 - Configuring the scan options

Permit the use of theNetBIOS name serviceand the NetBIOSdatagram service that theMicrosoft Network usesin file and printer sharing.NetBIOS is an acron

Strona 176 - Running a custom scan

You can add a new Traffic rule on this tab. You can alsodo the following activities:You can change the settings ofa Traffic rule that does notfunction

Strona 177 - Deleting a custom scan

1 Rename a program.1 Modify the rules for a program.1 Add a rule for a program.1 Modify the access settings of a program rule.1 Modify the priority of

Strona 178 - About scheduling scans

Lets the firewall notifyyou when a programattempts to access theInternet. You can thenallow or block Internetaccess for the program.In some instances,

Strona 179

Norton Online Backupprovides a secure andeasy-to-use online backupsolution that safeguards yourimportant data againstsystem crash, accidentaldeleting,

Strona 180 - Scheduling a Full System Scan

To add a program to Firewall settings1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Firewall.3O

Strona 181 - Scheduling a Quick Scan

7In the Options drop-down list, select the access levelthat you want this program to have.Your options are:Allow all access attemptsby this program.Al

Strona 182 - About Insight Network scan

3On the Program Rules tab, in the Program column,select the program that you want to change.4In the drop-down list next to the program that youwant to

Strona 183 - 1 Insight Network Quick Scan

6Click Apply.Adding Traffic rules and Program rulesFirewall settings automatically create most of thefirewall rules that you need. You can add custom

Strona 184

To use the Add Rule Wizard1Open the Add Rule Wizard by creating a Trafficrule or a Program rule.Keeping secure on the InternetAbout the Smart Firewall

Strona 185 - About Reputation Scan

2In the first panel of the AddRule Wizard, select theaction that you want for this rule. Your options are:Allow communication ofthis type.AllowFor exa

Strona 186 - Executable files

MonitorKeeping secure on the InternetAbout the Smart Firewall266

Strona 187

Update the Firewall –Activities category in theevent log each time thatcommunication of thistype takes place. Thisoption lets you monitorhow often thi

Strona 188

Security History logentry option in the AddRule Wizard or theModify Rule Wizard.3Click Next.4Select the type of connection for the rule. Youroptions a

Strona 189

5Click Next, and then select the computers that applyto the rule. Your options are:The rule applies to allcomputers.Any computerThis rule applies only

Strona 190

Creating a Norton AccountYour Norton Account stores the product key and thebilling information of your product. You can alsoregister your product with

Strona 191

The rule applies only tothe computers, sites, ordomains that you specify.You can specify thenames and addresses ofcomputers that apply tothe rule. The

Strona 192

6Click Next, and then select the protocols for therule. Your options are:The rule applies to TCP(Transmission ControlTCPProtocol)communications.The ru

Strona 193

The rule applies to allsupported protocols.When you select thisoption, you cannotspecify the types ofcommunications or portsthat apply to the rule.All

Strona 194 - Scanning your computer

8Click Next.9Check Create a Security History log entry if youwant Norton 360 to create an entry in the firewallevent log.Norton 360 creates an entry w

Strona 195 - 195Scanning your computer

5In the Modify Rule window, make the necessarychanges to modify any aspect of the rule.6When you have finished changing the rule, clickOK.To modify a

Strona 196

3On the Traffic Rules tab, select the rule that youwant to move.4Do one of the following:1 To move this rule before the rule above it, clickMove Up.1

Strona 197 - About Scan Facebook Wall

To turn off a Traffic rule temporarily1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Firewall.3

Strona 198

6In the SecurityHistory-Advanced Details window,under Actions, click Allow.Removing a firewall ruleYou can remove some of the firewall rules if necess

Strona 199

About Norton Firewall DiagnosisThere may be times when firewall may block thenetwork traffic that you want to allow based on itsconfiguration settings

Strona 200 - About SONAR Protection

For each case of network block, the Wizard containsthe firewall’s analysis of the cause and the possiblesolutions to fix the block.Norton 360 recommen

Strona 201 - About Real Time Exclusions

To create a Norton Account from the Norton AccountWeb page1In the Norton 360 main window, click Account.2In the My Account window, click Access Norton

Strona 202

wAutomatic Program Control configures network accessonly for the versions of programs that Symantecrecognizes as safe. Norton 360 blocks any infectedp

Strona 203 - About Signature Exclusions

suspicious or vulnerable, Norton 360 assigns Poor orBad trust level.wYour computer must be connected to the Internet toaccess the latest reputation in

Strona 204

In the left pane of the firewall alerts, you can find thefollowing reputation information:Shows the stability rating ofthe file on your computer.The s

Strona 205

Shows the user prevalence ofthe file. This data is based onthe information that millionsof Norton Community Watchcustomers shared andSymantec's r

Strona 206 - Microsoft Wordwinword.exe

Shows the trust level of thefile.Symantec assigns thefollowing trust levels:1 Norton Trusted -Indicates the file that isNorton Trusted.1 Good - Symant

Strona 207 - Microsoft Projectwinproj.exe

About Intrusion PreventionIntrusion Prevention scans all the network traffic thatenters and exits your computer and compares thisinformation against a

Strona 208 - About Silent Mode

Turning off or turning on Intrusion PreventionnotificationsYou can choose whether you want to receivenotifications when Intrusion Prevention blockssus

Strona 209

6Click OK.7In the Intrusion Signatures window, click OK.8In the Settings window, click Apply.Excluding or including attack signatures in monitoringIn

Strona 210

5Click OK.Turning off or turning on AutoBlockWhen an attack is detected from a computer, the attackis automatically blocked to ensure that your comput

Strona 211

Unblocking AutoBlocked computersIn some cases, benign network activity can appear tobe similar to an attack and AutoBlock blocks thenetwork activity a

Strona 212

You can also change your Norton Account password,if required. Your computer must be connected to theInternet to access your Norton Account.wSymantec p

Strona 213

To permanently block a computer that has been blockedby AutoBlock1In the Norton 360 main window, click Settings.2In the Settings window, under Detaile

Strona 214 - About Quiet Mode

3On the Intrusion and Browser Protection tab, inthe Browser Protection row, do one of the following:1 To turn off Browser Protection, move the On/Offs

Strona 215 - 215Scanning your computer

When a device on your network attempts to infect yourcomputer, AutoBlock stops all access requests fromthis device. If you add this device to the Intr

Strona 216

1 Your home network is infected.When a device on your network attempts to infect yourcomputer, AutoBlock stops all the access requests fromthis device

Strona 217

1 Yahoo (Browser)1 MSN Explorer (Browser, E-mail & Chat)1 QQ (Chat)1 ICQ (Chat)1 Skype (Chat)1 MSN Messenger (Chat)1 Yahoo Messenger (Chat)1 Limew

Strona 218 - About User-Specified Programs

and poor. Based on the reputation levels, the files canbe broadly classified as follows:Includes the files that are eitherNorton trusted or User trust

Strona 219

By default, Download Insight lets you install safe files.For files of unknown reputation levels, DownloadInsight prompts you to select an action that

Strona 220 - Programs

Turning off or turning on Download IntelligenceDownload Insight protects your computer against anyunsafe file that you may run or execute after youdow

Strona 221 - About boot time protection

3On the Intrusion and Browser Protection tab, inthe Download Intelligence row, move the On/Offswitch to the left to the On position.4In the Settings w

Strona 222 - Protection

3On the Intrusion and BrowserProtection tab, underDownload Intelligence, in the Download InsightNotifications row, do one of the following:1 To receiv

Strona 223

Chapter 1 Getting Started ... ... . ... . ... . ... 7About Norton 360 ... ... ... . ... . ... 7Activation pr

Strona 224

About Norton ManagementNorton Management lets you manage all of your Nortonproducts and Norton product keys from one location.You can add your devices

Strona 225 - 1 "\Program Files\Norton

You can use the following options to configureDownload Insight Full Report:When you set the DownloadInsight Full Report option toAlways, Download Insi

Strona 226

When you set the DownloadInsight Full Report option toUnproven Only, DownloadInsight prompts you to select asuitable action for unknown filesonly. In

Strona 227 - Responding to

When you set the DownloadInsight Full Report option toNever, Download Insight doesnot prompt you to select asuitable action for any type offile that y

Strona 228

4In the Settings window, click Apply, and then clickClose.Turning on or turning off Alert on Poor StabilityWhen you turn on the Alert on Poor Stabilit

Strona 229

email into the Inbox folder and spam email into theJunk folder or the Norton AntiSpam folder.Norton AntiSpam uses Symantec enterprise-class,spam-filte

Strona 230

the addresses from your Outlook address book orWindows address book, it also imports the addressesthat are available in the Safe Sender and the Blocke

Strona 231

1 Uses a user-defined address listto expedite the scanning of email.1 Accepts all email messages fromsenders in the Allowed List.1 Treats all email me

Strona 232

the Norton AntiSpam drop-down list or the options toclassify the email messages as spam or legitimate. Youcan also use these options to empty the spam

Strona 233

the initial client integration. It helps you keep your listof allowed and blocked email senders in sync with yourcurrent address books. When Norton An

Strona 234

You can use the following options:Marks the selected email as spam and movesthe email message into the Junk folder or theNorton AntiSpam folder.When y

Strona 235

Accessing Norton Management on WindowsYou can access Norton Management in one of thefollowing ways:1 Using a Web browser on any computer.1 From the ma

Strona 236 - Responding to security issues

Displays the Norton AntiSpam settings sectionof the Norton 360 Settings windowOpenNortonAntiSpamSetting Address Book ExclusionsWhen you add an email a

Strona 237 - Understanding

7Click OK to save and close the Address BookExclusions window.To edit or delete entries in the Address Book Exclusionslist1In the Norton 360 main wind

Strona 238

2In the Settings window, under Detailed Settings,click AntiSpam.3On the Filter tab, in the Allowed List row, clickConfigure.4In the Allowed List windo

Strona 239 - Types of risks

3On the Filter tab, in the Allowed List row, clickConfigure.4In the Allowed List window, select the item thatyou want to edit or delete.5Do one of the

Strona 240 - Types of threats

4In the Allowed List window, click Import.5In the Allowed List window, click Apply.6Click OK.To add entries to the Blocked List1In the Norton 360 main

Strona 241 - Types of viruses

5Do one of the following:1 To edit an entry, click Edit to open the EditEmail Address dialog box, edit the details, andthen click OK.1 To delete an en

Strona 242

3On the ClientIntegration tab, in the Feedback row,select any one from the following three options:Automatically sends themisclassified email message

Strona 243 - Doing routine

approach to filter spam email messages from legitimateemail messages.The email messages that you receive in your emailprogram undergo scanning through

Strona 244 - About custom task

Norton AntiSpam then sends the email message to youremail program. Based on predefined email rules, theemail program then moves the email message to t

Strona 245 - Running custom tasks

numbers for your email program. If the SMTP and POP3port numbers for your email program are differentfrom the default port numbers, you must configure

Strona 246

To access Norton Management from the Windowsnotification area1Go to the Windows device on which NortonManagement is installed.2In the notification are

Strona 247

5In the AddPort toprotect window, in the Port Typedrop-down list, do one of the following:1 To add the incoming email port, click POP3.1 To add the ou

Strona 248 - About scheduling backups

plan, you can set up NoLimit policy so that Norton 360connects to Symantec servers to ensure completeprotection. However, if you think that Norton 360

Strona 249

Turning off or turning on Network Cost AwarenessYou can set up policies to restrict the Internet usageof Norton 360. If you do not want to restrict th

Strona 250 - Doing routine tasks

The Network Cost Awareness Settings window listsall the network connections that your computer usesto connect to the Internet. You can view the status

Strona 251 - Keeping secure on

6Select one of the following:1 AutoAllows Norton 360 to receive all product andvirus definition updates based on the Windows8 cost awareness policy. B

Strona 252

This chapter includes the following topics:1 About securing your sensitive dataAbout securing your sensitive dataThe Internet provides the fastest and

Strona 253

window. The Norton Safe Web feature provides you asafe search environment in the Web by displaying thesite rating icons next to every search result.Wh

Strona 254 - About firewall rules

In addition, the Norton Site Safety pop-up windowincludes information about Symantec AuthenticatedWeb sites. Web site hackers often mimic company Webs

Strona 255 - About Traffic rules

the security level of all the Web sites that you visit anddisplays the results in the Norton Site Safety pop-upwindow. Antiphishing also blocks naviga

Strona 256

To report an incorrect evaluation of a suspicious Website1Open your browser and go to the Web site that youthink is suspicious.2On the Norton Toolbar,

Strona 257 - About Program rules

5In the confirmation window, click Yes to confirmthat you are already on the device you want tomanage.6In the window that appears, click Save File and

Strona 258

wThe Community Buzz option is available only inEnglish-language versions of Windows.For each Web site that you want to know the site safetystatus, Nor

Strona 259

Norton Safe Web provides the following Web site safetystates when you browse through the Internet:You can see Norton Secured iconnext to the search re

Strona 260

You can see a red cross (x) iconnext to the search results.When you visit a Web site withthis status, you can see a similarstatus icon on the NortonTo

Strona 261 - Customizing a program

Norton Safe Web does not havesufficient information about thisWeb site to provide a shoppingsafety rating.UntestedNorton Safe Web has analyzedthis Web

Strona 262 - Removing a program

let other Facebook users know about the security statusof any Web site.To scan your Facebook Wall using Norton Safe Web,use the ScanFacebookWall optio

Strona 263 - Using the Add Rule Wizard

Searching the Web using Norton Safe SearchNorton Safe Search enhances your Web searchexperience. When you search the Internet using NortonSafe Search,

Strona 264

Norton Safe Search enables youto erase all the data that arerelated to your search activitiesfrom the Ask.com server. ThePrivacy Safeguard feature ofN

Strona 265 - About the Smart Firewall

Turning off or turning on Scam InsightScam Insight prevents you from divulging yoursensitive information such as Social Security Numbersor credit card

Strona 266

The following features in Identity Safe provide securestorage of your sensitive information:Stores login information, suchas your login credentials fo

Strona 267

Norton 360 adds the Norton Toolbar to the InternetExplorer, Firefox, or Chrome Web browsers. TheNorton Toolbar has the following components:1 Norton m

Strona 268

4If you are prompted to provide your email address,in the Email Address box, type the email addressthat you use to log on to your Norton Account, andt

Strona 269

1 Personal information such as your address, date ofbirth, passport number, and social security number.1 Credit card details including card number and

Strona 270

Identity Safe to manage your personal data such asaddresses, date of birth and credit card information.The logins, cards, and notes help you store and

Strona 271

save in one Windows user account from anotherWindows user account. This way Identity Safe protectsyour sensitive data from misuse by multiple users of

Strona 272

1 Reset your Identity Safe.About creating Identity Safe vaultsIdentity Safe helps you manage your sensitiveinformation and provide additional security

Strona 273

In addition to the local vault on your Windows useraccount, you can save your Identity Safe data in onlinevault. The Identity Safe data is stored onli

Strona 274

Signing in to Norton AccountIdentity Safe lets you create a local vault and an onlinevault to save your Identity Safe data. You must log into your Nor

Strona 275

The following are the benefits of moving your IdentitySafe data online:1 Lets you access your Identity Safe data from anycomputer.wYour computer must

Strona 276 - Allowing a blocked program

passwords, and credit card details. You can sync youridentity safe data in the local vault into the online vault.When you save your data in online vau

Strona 277 - Removing a firewall rule

10In the Merge Identity Safe Data Online window,click Merge.Deleting local vault and online vaultIdentity Safe lets you create a local vault and an on

Strona 278

To merge the Identity Safe data from portable profileto local vault or online vault1On the Norton Toolbar, in the Identity Safe menu,click Merge Porta

Strona 279 - About Reputation Firewall

About the supported devicesTo install and use Norton 360, your device must meetthe following minimum system requirements:Hardware requirementWindows1

Strona 280

3Set up Identity Safe.4In the Identity Safe Setup Successful window, doone of the following:1 Check Importmy logins from Internet Explorerto import al

Strona 281

4In the Enter the Password box, type your IdentitySafe password.If you forget your password, Identity Safe lets youenter wrong password three times. I

Strona 282

wYou must be logged in to Identity Safe to access theIdentity Safe features. The Identity Safe features aresupported only in the Internet Explorer, Fi

Strona 283

Identity Safe automatically logs you out of the currentvault, when you are logged in to your local vault oronline vault and click Identity Safe Setup

Strona 284

To configure Identity Safe settings1In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.Securing your sensitive da

Strona 285 - About Intrusion Prevention

2Under Identity Safe, identify the feature that youwant to use, and click Configure. Your options are:Lets you set up Identity Safevault.Identity Safe

Strona 286

Lets you configure the way youwant Identity Safe to collect,store, and display the logininformation for the Web pagesyou visit.You can configure Ident

Strona 287

Lets you manage your personalinformation such as name, dateof birth, email address, andcredit card information in oneplace.You can use the information

Strona 288

Lets you store and managesensitive information.You can save social securitynumber, driver's license number,insurance policy number, andpassport n

Strona 289 - AutoBlock

Lets you move your Identity Safedata that you stored in your localvault to online vault.wWhen you sync yourIdentity Safe data from localvault to onlin

Strona 290

Service Pack 1 and232-bit and 64-bitversions1 MicrosoftWindows VistaHome Basic1 MicrosoftWindows VistaHome Premium1 MicrosoftWindows VistaUltimate1 Mi

Strona 291

1 Lets you quickly launch the Web site login page1 Fills in your login automatically when you revisitWeb pages1 Lets you manually add logins1 Lets you

Strona 292

appears on the top left corner of the Login Assistantwindow.Identity Safe automatically detects login fields whichare not auto filled or filled incorr

Strona 293 - About Download Insight

To save a login1Go to the Web site for which you want to save yourlogin.2Type your login details, and then click the optionor link that logs you in.No

Strona 294

1 Displays the login ID and lets you show or hide thepassword.1 Displays the strength of the password for each ofthe logins.1 Lets you quickly launch

Strona 295

6In the Username dialog box, in the Enter newusername box, type the user name of the login, andthen, click OK.7In the Information dialog box, click OK

Strona 296

To delete a login or a folder1In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.2Under Identity Safe, in the Edi

Strona 297

Ensure that the URL you change belongs to thesame domain as the current URL.1 View the details of the date and time when you lastmade to the Edit Logi

Strona 298

Changing the user name and passwordIdentity Safe lets you change the user name andpassword for the logins that you have saved in the EditLogins window

Strona 299

5In the Validate Password for Identity Safe windowdo the following:1 In the Enter the Password box, type yourIdentity Safe password.1 Click Validate.6

Strona 300 - Download Insight Full Report:

You can use the information that you store in the cardsto do the following:1 Automatically fill forms1 Provide sensitive information without having to

Strona 301

Supported Norton productsTo use all the features of Norton 360, you must use thefollowing versions of Norton security product:If you use an older vers

Strona 302

You can also copy and edit the required fields from theselected card in the Login Assistant window. Bydefault, the important data such as Passwords, C

Strona 303 - About Norton AntiSpam

4Use the following tabs to type your card details:Provide details such as cardname, name, gender, and dateof birth. You can set a passwordand provide

Strona 304

You can view a summary of the card that you created.You can select any of the cards that are present in thelist of cards at the left pane of the Edit

Strona 305 - About spam filtering features

3In the Edit Identity Cards window, select the cardthat you want to delete.4Click Delete Card.5In the Warning dialog box, click Yes.6Click Close.To du

Strona 306

identity numbers that you use when you browse theWeb. The Edit Notes option in Identity Safe stores allyour sensitive IDs in a very secure way and let

Strona 307 - 1 Windows Mail

4Click Edit Notes, and modify the information underDetails.You can change the category, modify the title, andedit the additional information that you

Strona 308

1 Merge the imported data in to the vault that youare currently logged in.1 Replace the existing Identity Safe data that youstored in your vault that

Strona 309

Importing your Identity Safe dataYou can import your Identity Safe data from the filethat you previously backed up. You can also import theIdentity Sa

Strona 310 - AntiSpam

3In the Import Identity Safe Data window, underImport my data from, select one of the followingoptions:1 Portable Profile (Drive: Drive:\)This option

Strona 311

You can configure the following options in theBrowsing Options window:Configures Identity Safe todisplay your logins each timeyou visit a Web site tha

Strona 312 - 1 Domain

1 Any Web site URL that your product identifies asfraudulent1 All the Web site URLs that you visited before thedetection of a risk1 The applications a

Strona 313

About Password & SecurityYou can use Password & Security to change yourIdentity Safe password. You can also use this option toset the level of

Strona 314

Password Security381Securing your sensitive dataAbout securing your sensitive data

Strona 315

Specify the Identity Safepassword security level.Identity Safe provides fourlevels of security to protectyour Identity Safe password.Choose one of the

Strona 316 - About Web Query

period. You can specifythe idle time-out periodas 15, 30, or 45 minutes.Use this option if otherpeople have access toyour computer.1 Ask for my passwo

Strona 317

the password by using the Password & Security optionin Settings window.If you want to change the Identity Safe password ofyour online vault, the p

Strona 318

You have the following options in the NortonToolbar:Lets you access IdentityProtection and other settings.The following options areavailable in the No

Strona 319

Lets you access the Identity Safedata stored in your online vault.You can add, edit or delete yourLogins, Cards, and Notes underthis section.You can u

Strona 320 - About Network Cost Awareness

Lets you view the logins andcards that you have saved inIdentity Safe.Some Web sites have forms tofill or require login information.You can use the Va

Strona 321 - 1 No Traffic

In Google Chrome Web browser, the Norton Toolbarcan be accessed as a Chrome Extension. In theExtensions page of the Chrome browser, you can enableor d

Strona 322

When you hide the toolbar, Norton 360 does not displaythe Norton Site Safety pop-up window. However,Norton 360 notifies you about suspicious andfraudu

Strona 323

option in the Administrative Settings window. Youcan also review the data, which Norton CommunityWatch collects and submits to Symantec, in theSecurit

Strona 324

2In the main menu that appears, click Tools >Extensions.3Under Extensions page, click Show button option.Accessing Identity Safe settings from the

Strona 325

2On the NortonToolbar, in the Norton menu, selectone of the following:Lets you report to Symantecabout the current Antiphishingevaluation.Report SiteL

Strona 326 - About Antiphishing

Lets you turn on the Norton SafeWeb feature which provides asafe online browsing experience.The following are the uniquefeatures of Norton Safe Web:1

Strona 327

Accessing the Vault Open/Vault Closed menuThe Vault Open/Vault Closed menu on the NortonToolbar lets you view and manage the logins, Identitycards, an

Strona 328

2On the Norton Toolbar, in the Vault Open/VaultClosed menu, select one of the following:Lets you merge the IdentitySafe data from your portableMerge P

Strona 329 - About Norton Safe Web

Settings395Securing your sensitive dataAbout securing your sensitive data

Strona 330

Lets you view the variousoptions that are available inIdentity Safe.The options are:1 Edit LoginsLets you open the EditLogins window.1 Edit Identity C

Strona 331

autofill the logininformation in the currentWeb page.Lets you open the NortonFeedback Web site.You can submit feedback onyour experience with Identity

Strona 332

Securing your sensitive dataAbout securing your sensitive data398

Strona 333

This chapter includes the following topics:1 About the Network Security MapAbout the Network Security MapA home network typically consists of the comp

Strona 334

Chapter 4 Scanning your computer ... . ... . 163About the Norton 360 scans ... . ... . ... 163About Computer Scan ... ...

Strona 335

computer. Your computer might be infected with avirus if you experience any of the following symptoms:1 You cannot install Norton 360.1 You cannot sta

Strona 336 - 1 Click Search

1 Subscription status and Norton product version ofthe computers that are connected to your network1 Status of your wireless network connection1 Conne

Strona 337

wNorton 360 requires you to configure the SymantecSecurity Driver to open the Network Security Map. Youcannot install the Symantec Security Driver whe

Strona 338

To view the details of a device on the Network SecurityMapProtecting your home networkAbout the Network Security Map402

Strona 339

4In the NetworkSecurityMap window, click a deviceicon.You can use the scroll arrows to view the devicesthat are listed in the network map.The device d

Strona 340

Shows the category to which thedevice belongsThe device category iconprovides details on theconnection status and securitystatus. Norton 360 labels al

Strona 341 - About Identity Safe vaults

Shows the access level that isgranted to a remote device toconnect to your computerThe initial trust level is set basedon the configuration of yourcom

Strona 342

You can click each of the features and read thesummary to learn more about using Network SecurityMap to manage your home network. By default, theNetwo

Strona 343 - 1 Reset your Identity Safe

wEnsure that the computers that you want to remotelymonitor have a version of a Norton product thatsupports Remote Monitoring.Norton 360 requires a Pa

Strona 344

Turning off Remote MonitoringWhen you turn off Remote Monitoring, you stop remotemonitoring of the computers that are connected toyour network.You can

Strona 345

You can add the following details when you add adevice:1 The name or description1 The IP address or physical addressThe Network Security Map finds any

Strona 346

Programs containingmalicious codes that aredisguised as or hiding insomething benign, such as agame or utility.Trojan horsesTools that are used by aha

Strona 347

6In the IP or Physical Address box, type the IPaddress or physical address of the device that youwant to add to the Network Security Map.You can use t

Strona 348

To find the IP address by using ipconfig on WindowsVista1On the computer you want to identify, on theWindows taskbar, click Start.2In the Start Search

Strona 349

help you identify the devices that are listed in thenetwork map.To edit the details of the device that is on your network1In the Norton 360 main windo

Strona 350 - Resetting Identity Safe

To edit the name of the device that you added manually1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,

Strona 351 - Accessing Identity Safe

network. The initial network trust level is set based onthe configuration of your computer.wEnsure that you change the trust level of a device toFull

Strona 352 - 1 The Norton Toolbar

To change the trust level of your network1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click My Netw

Strona 353

6To select a trust level for a network, in the EditNetwork Trust Level window, click one of thefollowing:Adds the network to the TrustedlistFULL TRUST

Strona 354

Adds the network to theRestricted listThe devices that are onRestricted network cannotcommunicate with yourcomputer. However, you can stilluse the net

Strona 355

6To select a trust level for a device, in the EditDeviceTrust Level window, click one of the following:Adds a device to the Full TrustlistFull Trust d

Strona 356 - Securing your sensitive data

computer increases the scan time which slows downthe network speed of your computer.If you know that a specific device on your network issafe, you can

Strona 357 - 1 Change your login settings

Programs that track systemactivity, gather systeminformation, or track userhabits, and relay thisinformation to third-partyorganizations. Theinformati

Strona 358

5In the Network Security Map window, do one ofthe following:1 To edit the trust level of a device that is on yournetwork, in the network map, click th

Strona 359 - About Edit logins

When you remove an individual device, the onlinedevices appear again the next time you open theNetwork Security Map. However, Norton 360permanently re

Strona 360

For more information on how to secure your wirelessnetwork, on the left side of the Network Security Mapwindow, click the Why is it not secure link. F

Strona 361 - Saving logins

To view the device details1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click My Network.3In the Net

Strona 362 - Editing logins

2In the Settings window, under Detailed Settings,click My Network.3In the Communication Port box, type a newcommunication port number.You must use the

Strona 363

This chapter includes the following topics:1 About Tuneup1 About disk and file fragmentation1 Optimizing your permanent disks manually1 About using op

Strona 364 - 1 Click Validate

Tuneup detects and fixes common computer problems,cleans up unwanted cookies and files, and defragmentsthe hard disk to optimize PC performance.About

Strona 365

wYou can run Disk optimization only when disk has morethan 15 percent of free space.Some programs, such as movie-editing programs orprograms that requ

Strona 366

Norton 360 automaticallyoptimizes the hard disk asneeded. You can also set aschedule for optimization.Set a schedule foroptimizationLarge files are of

Strona 367

When you browse a Webpage, your browserdownloads the text andgraphics that comprise thecontents of the page. Whenyou finish viewing the page,the brows

Strona 368 - About Edit Cards

You can download Norton Bootable Recovery ToolWizard in one of the following ways:1 From the Start menu.1 From the Norton Support Web site.To download

Strona 369 - 1 Automatically fill forms

2When the activity is complete, in the Tuneupwindow, click Close.Running Registry CleanupThe Windows registry can contain the entries that referto fil

Strona 370 - Adding cards

About Startup ManagerSome programs are configured to launch during startupof your computer. The number of startup itemsincreases as you install new ap

Strona 371

program and measure the performance of yourcomputer the next time you start your computer.Norton 360 delays the start of the delayed programsby five m

Strona 372

To disable startup items1In the Norton 360 main window, click Tuneup, andthen click Run Startup Manager.2In the On/Off column, uncheck a program that

Strona 373 - About Edit Notes

To run delayed startup items manually1In the Norton 360 main window, click Tuneup, andthen click Run Startup Manager.2In the Startup Manager window, c

Strona 374 - Editing Notes

This chapter includes the following topics:1 About Norton Backup and Restore1 About backups1 About backup preparation1 About backup set1 Backing up yo

Strona 375

About backupsOne of the most important ways to protect the valuableinformation on your PC is to back up your filesregularly. In case you lose your dat

Strona 376 - 1 Plain text

No matter which backup method you choose, you canalways add or remove items from the set of files thatyou select to back up. You can add or remove ani

Strona 377

You can choose from a varietyof file types, such as photos,documents, and music. Youcan also specify individualfiles.You have the followingoptions:1 S

Strona 378 - About Browsing Options

Where439Protecting your media and dataAbout backup preparation

Strona 379 - 1 Ask before saving

About locating your Norton Product Key or activationPINTo use Norton Bootable Recovery Tool, you must startthe computer from any of the following reco

Strona 380 - About Password & Security

You can choose any storagelocation that Norton 360offers for your backuplocation, depending on yourPC and the connecteddevices.You can choose to store

Strona 381 - Password Security

available in the Settingswindow.You can have Norton 360back up your files when yourcomputer is idle. You can alsoset a regular backup scheduleor manua

Strona 382

you can create a backup set to back up your picturefiles and music files to a CD. You can also createanother backup set to back up your Microsoft Offi

Strona 383 - 1 Ask for my password

set to back up your pictures to your local fixed disk.You can create another backup set to back up yourvideos to a CD. You can also configure differen

Strona 384

name does not describe the backup set after you modifythe configuration.wThe maximum character length of a backup set nameis 32 alphanumeric character

Strona 385

sorts them into various categories. It then backs up thefiles that fall into these categories.Norton 360 uses the following file categories:This categ

Strona 386

This category includes, but isnot limited to: MPEG AudioStream, Layer III files (.mp3);MPEG-4 Video files (.mp4);MPEG-4 Audio Layer files(.m4a); Apple

Strona 387

This category includes, but isnot limited to: MicrosoftMoney files (.mny, .mn1,.mn2, .mn3, .mn4, .mn5,.mn6, .mn7, .mn8, .mn9,.mn10, .mn11, .mn12, .mn1

Strona 388

This category includes, but isnot limited to: MicrosoftWindows Media files (.wmv);Apple QuickTime Video Clipfiles (.mov); MPEG 1 SystemStream files (.

Strona 389

This category includes, but isnot limited to: MicrosoftWord documents andtemplates (doc, .dot);Microsoft Excel Worksheetand templates (.xls, .xlt,.xla

Strona 390

1 If you received your Norton product preinstalledby the computer manufacturer, the Product Key isavailable on your Norton Account. When you areprompt

Strona 391

This category includes, but isnot limited to: MicrosoftOutlook Address Book files(.wab); Microsoft PersonalAddress Book files (.pab);Palm Address Book

Strona 392

.fm file extension in the Office Documents category,you can add the .fm file extension to the category.The Edit File Type option on the What tab of th

Strona 393

with the file extension that you added and backs themup to that file category. For example, if you want toback up the documents with a .fm file extens

Strona 394

Removing a file extension from a backup categoryEach backup file category contains a list of fileextensions. However, you can remove a default fileext

Strona 395 - Settings

4In the window that appears, click Reset Defaults.5Click Save.Deleting previously backed up filesYou can delete the files that you backed up previousl

Strona 396

2On the Summary tab, in the Backup set namedrop-down list, select the backup set that you wantto delete.3Under Things you can do, click Delete backup

Strona 397

Adding files and folders to a backup setYou are not limited to backing up the files that Norton360 automatically detects and places into its filecateg

Strona 398

4In the file selection window that appears, navigateto file that you want to add, click to select it, andthen click Open.5Click OK.6In the Manage Back

Strona 399 - Protecting your

You can exclude a file or folder from the backup setfrom Windows Explorer by using the shortcut menu.The shortcut menu is available after you configur

Strona 400

6In the Manage Backup Sets window, click SaveSettings to save the settings.To exclude a file or folder from a backup set in WindowsExplorer1In Windows

Strona 401

Creating Norton Bootable Recovery Tool on a CD orDVDNorton Bootable Recovery Tool is integrated withWindows Preinstallation Environment (WinPE).Theref

Strona 402 - Protecting your home network

following table to choose a location that best meetsyour needs for safety, speed, and storage capacity:Your subscription to Norton 360comes with an al

Strona 403 - 1 The device does not have a

This choice backs your files upto a special folder on drive C ofyour PC. Backing up to drive C isvery quick and convenient, andis only limited to the

Strona 404

CD, DVD, or Blu-ray discsProtecting your media and dataAbout backup set462

Strona 405

This choice requires that youhave recordable CDs, DVDs, orBlu-ray discs and an optical drivein your PC to record on thosediscs. You must be present to

Strona 406 - Setting up Remote Monitoring

location for the first time, Norton360 prompts you to configurethe optical backup drive on yourcomputer. Norton 360 lets youinstall the optical driver

Strona 407

Flash drives and the other datastorage devices that areattached to your PC can alsoserve as backup locations.Norton 360 displays suchdevices as extern

Strona 408 - Turning off Remote Monitoring

3On the Where tab, select the location and devicewhere you want your backups to be stored.If the device or location does not appear on the list,click

Strona 409 - 1 The name or description

Viewing or changing a backup scheduleNorton 360 lets you schedule backups when it isconvenient for you. You can schedule your backups torun late at ni

Strona 410

Choose this option to haveNorton 360 backup your filesonly when you start thebackup yourself.Manual ScheduleYour computer's performance is maximi

Strona 411 - Editing device details

To delete a backup set1In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.2On the Summary tab, in the Backup set namedrop-d

Strona 412

Creating Norton Bootable Recovery Tool ISO fileYou can create a Norton Bootable Recovery Tool ISOfile on your computer. You can burn this ISO file to

Strona 413 - Editing network details

Whether you have set Norton 360 to back up your PCautomatically or not, you can always run a backup. Forexample, you have added or modified important

Strona 414

When you restore files, you can change any of thefollowing settings:You can choose any of thebackup sets to restore thefiles.If you backed up your dat

Strona 415

You can restore to theoriginal locations of the files,or navigate to a new locationwhere you can restore yourfiles. Norton 360 displays thetotal numbe

Strona 416

Choosing where to restore files fromWhen Norton 360 restores files, it displays the backuplocation of the most recent backup set you ran. Youcan chang

Strona 417

Selecting files to restoreWhen you restore backed-up files with Norton 360, youmight not need to restore all the files from a backup.You can restore t

Strona 418

You can use any of the following methods, and you cancombine methods, to select files to restore:You can restore all thebacked-up files withoutexcludi

Strona 419

2Under Files, in the Search text box, type all or partof a file name, or the extension of the file.3Click Search.The window that appears displays the

Strona 420

wRestoring files to their original locations deletes newerversions of the same files that are stored in thoselocations. If you do not want to replace

Strona 421

When you insert an optical disc that contains thebacked-up files, the Autorun Restore featureautomatically opens the Portable Restore window.wIf you d

Strona 422 - Viewing the device details

To restore files using Norton 360 Autorun Restore1Insert an optical disc that contains the backed-upfiles.2Click the ARestore icon to launch the Autor

Strona 423 - Security Map

To create Norton Bootable Recovery Tool on a USB key1Insert the USB key into the USB port of yourcomputer.2In the Norton Bootable RecoveryTool Wizard

Strona 424

destinations where your files are backed up. Eachbackup destination contains the backup sets to whichthe backup destination is configured.Norton Backu

Strona 425 - Keeping your PC

Viewing backup files on the Norton Backup DriveYou can use the Norton Backup Drive to view the filesthat are backed up. You can view the Norton Backup

Strona 426

2Select the backup destination, and navigate to thebackup set destination that contains the file thatyou backed up.3Do one of the following:1 Right-cl

Strona 427

About solutions to the backup problemsThe following table provides some tips to help youavoid backup problems.The following tips apply to allbackups:1

Strona 428

The following tips apply tobackups to CDs or DVDs:1 Have extra discs on handwhen you back up. Thistip helps you to avoidoccasional disc flaws orsituat

Strona 429

The following tips apply tobackups to external drives:1 Some drives use olderWindows file systems,such as FAT-16 or FAT-32that cannot store fileslarge

Strona 430 - Running Diagnostic Report

The following tips apply tobackups to online storage:1 Make sure that your PCdoes not automaticallydisconnect from theInternet when it is not inuse.1

Strona 431 - About Startup Manager

and search the Symantec Knowledge Base for solutionsto your problem.To get additional help with backup problems1In the Norton 360 main window, click S

Strona 432

Although online backup is convenient and safe, beforechoosing it for your backup method, consider thefollowing limitations:Speed limitationsProtecting

Strona 433 - Managing startup items

The amount of time that it takesto transfer your backup to theSecure Online Storage dependson the speed of your Internetconnection. If you have manyfi

Strona 434

If you have a valid Norton product key or activationPIN, you can go to your Norton Account and access theNorton Bootable Recovery Tool download link.T

Strona 435

up your smaller files, such asyour financial documents andword-processing documents.If a backup is in progress, youshould leave your computerturned on

Strona 436 - About backups

1 The amount of online storage space that is availableto youYour product needs to be activated to use the onlinebackup feature. The first time you con

Strona 437 - About backup preparation

storage does not contain sufficient space for thebackup, Norton 360 notifies you and provides you anoption to buy more space.You do not have to wait u

Strona 438

all automatic backup of files. You can use the RunBackup Now option in the main window if you want toback up your files from all the backup sets.You c

Strona 439

Turning off or turning on backup settingoptionsNorton 360 provides you various options to manageyour backup settings. Norton 360 backup settings letyo

Strona 440

Indicates that the file has beenexcluded from backupNorton 360 displays a disabledbackup status on a file when youexclude the file from any of theback

Strona 441 - About backup set

3In the Backup Settings window, do one of thefollowing:1 To turn off icon overlays, in the Backup StatusOverlays row, move the On/Off switch to therig

Strona 442 - Creating a new backup set

This chapter includes the following topics:1 About Norton 360 Settings1 Customizing Norton 360 Settings1 Turning on or turning off Quick Controls serv

Strona 443

You can configure the following Detailed Settings inthe Settings window:Specify how certain types ofviruses and spyware, as well asother threats, are

Strona 444 - About backup file categories

View all the devices available inyour network and specify thetrust level of the devices that areconnected to your network.You can hide or show theNetw

Strona 445

About Download Insight .. . ... ... ... 293About Norton AntiSpam . . ... . ... ... 303About configuring POP3 and SMTPpor

Strona 446

Norton Bootable Recovery Tool automaticallydownloads the latest virus definitions from Symantecservers and uses these virus definitions to secure your

Strona 447

Configure Identity Safe to secureyour online identities andtransaction data.You can also configure SafeSurfing options.Identity ProtectionSpecify when

Strona 448

The Quick Controls in the Settings window let youturn on or turn off the following services:Turns on or turns off Silent ModeYou can turn on Silent Mo

Strona 449

Turns on or turns off SmartFirewallWhen you turn on SmartFirewall, it monitorscommunications between yourcomputer and the othercomputers on the Intern

Strona 450 - About backup file extensions

provides the slider setting for you to decide whetherto resolve security threats automatically or ask youbefore it takes an action.1 You can configure

Strona 451

1 Safe Surfing1 Identity Safe1 Backup1 Backup Status Overlays1 Automatic LiveUpdate1 Smart Firewall1 Norton Tamper ProtectionYou should leave all of t

Strona 452

You can use the following Antivirus settings:The Automatic Protectionsettings let you control thescanning and monitoring of yourcomputer.It protects y

Strona 453

Scans and RisksCustomizing settingsAbout Antivirus settings506

Strona 454 - 1 Where tab

Scans and Risks settings let youcustomize the scans that Norton360 performs on your computer.You can use the following Scansand Risks options:1 Comput

Strona 455

Norton 360 to protect theports.1 Email Antivirus ScanEmail Antivirus Scan protectsyou from the threats that aresent or received in emailattachments.Th

Strona 456

1 Exclusions / Low RisksExclusions options specifythe items such as folders,files, and drives that youexclude from Norton 360scans. Scans, signatures,

Strona 457

4Read the Norton License Agreement, type yourProduct Key, and then click I Agree.If you use a non-QWERTY keyboard, use the VirtualKeyboard option to e

Strona 458

Antispyware protects yourcomputer against the securityrisks that can compromise yourpersonal information andprivacy.Norton 360 protects yourcomputer f

Strona 459 - About backup locations

About Automatic Protection settingsThe Boot Time Protection option on the AutomaticProtection tab provides an enhanced security levelfrom the time you

Strona 460

You can use the following Real Time Protectionoptions:Auto-ProtectCustomizing settingsAbout Antivirus settings512

Strona 461

Auto-Protect loads intomemory and providesconstant protection while youwork. It checks for virusesand other security risks everytime that you run prog

Strona 462

boot virus infects yourremovable media, ensurethat Auto-Protect isturned on to rescan theremovable media. Youthen insert the removablemedia and open i

Strona 463

SONAR Protection515Customizing settingsAbout Antivirus settings

Strona 464

Symantec Online Network forAdvanced Response (SONAR)provides the real-timeprotection against threatsand proactively detectsunknown security risks onyo

Strona 465 - Choosing a backup location

360 to automaticallyremove low-certaintythreats if it does not getany response from youwhen SONAR AdvancedMode option is enabled.1 Show SONAR BlockNot

Strona 466

You can use the following Scans and Risks settings:Computer ScansCustomizing settingsAbout Antivirus settings518

Strona 467

Norton 360 lets you run differenttypes of scans to detect andprevent any virus infection onyour computer. The scans areQuick Scan, Full System Scan,an

Strona 468 - Deleting a backup set

To update Norton Bootable Recovery Tool virusdefinitions on a USB key1Insert your Norton Bootable Recovery Tool USB keyinto the USB port of your compu

Strona 469 - Backing up your files

Scans for rootkits and othersecurity risks that might behidden on your computer.1 Network Drives ScanScans the network drivesthat are connected to you

Strona 470 - Restoring files

1 Full System ScanScans your computer whenit is idle.When your computer is idle,Norton 360 runs a FullSystem Scan. After the scanis complete, you can

Strona 471

The Scan Performance Profilessettings let you configure howNorton 360 should scan yourcomputer based on the digitalsignature and trust level of thefil

Strona 472

Protected Ports settings protectthe POP3 and SMTP ports ofyour email program.You can use this option tomanually configure your POP3and SMTP email port

Strona 473

Exclusion / Low RisksCustomizing settingsAbout Antivirus settings524

Strona 474 - Selecting files to restore

Exclusions options specify theitems such as folders, files, anddrives that you exclude fromNorton 360 scans. Scans,signatures, and low-risk itemsare s

Strona 475

also remove items from theexcluded-items list.1 Signatures to Exclude fromAll DetectionsLets you select known risksby name and remove a riskname from

Strona 476

The Insight Network scan usesthe Cloud technology wherein aremote server on the Webcontains the latest virusdefinitions. Norton 360 scansyour computer

Strona 477

UpdatesCustomizing settingsAbout Antivirus settings528

Strona 478 - 1 The name of the backup set

Norton 360 protects yourcomputer from vulnerabilitiesthrough the latest program anddefinition updates. Definitionupdates contain the informationthat l

Strona 479

2In the page that appears, click Download NortonPower Eraser.3Save the NPE.exe file to your Desktop.4Double-click the NPE.exe file on your Desktop.5Re

Strona 480

Definitions are a subset ofvirus definitions.1 Apply updates only onrebootLets you choose how theprogram updates obtainedby Automatic LiveUpdateneed t

Strona 481 - Backup Drive

The following tabs are available in the Firewall settingswindow:Lets you activate the generalfirewall features andcustomize the ports that yourcompute

Strona 482

Prevents intrusion attemptsand protects your Webbrowser from attacks bymalicious Web sitesYou can use the DownloadIntelligence option that isavailable

Strona 483 - 1 Regularly check the

Lets you activate theadvanced protection featuresof Smart FirewallThe advanced settings let youturn on or turn off theAutomatic Program Controlfeature

Strona 484

About Firewall General settingsSmart Firewall General settings let you activate thegeneral firewall features and customize the ports thatyour computer

Strona 485 - 1 To avoid accidentally

Automatically allows the Internettraffic that matches theconnections that an applicationopens.Check this option to do thefollowing:1 Analyze the netwo

Strona 486

to date. If you do not use Automatic LiveUpdate, youshould run LiveUpdate once a week.Norton 360 also provides the Web Browser Protectionfeature to pr

Strona 487

when Automatic Program Control is set to Aggressiveor Automatic. You can use this option to specify howNorton 360 must control any network traffic tha

Strona 488 - Speed limitations

triggers the allowed event is added to the trusted listof its corresponding category in Advanced EventsMonitoring. You can remove the application from

Strona 489 - 1 Low usage

Monitors the Trojan horses andother malicious programs thatbypass network traffic.These programs penetrate theWindows TCP/IP layer to sendand receive

Strona 490

Automatic updates require an Internet connection. Ifyou use a proxy server to connect to the Internet, youmust configure the proxy settings in your pr

Strona 491

Norton AntiSpam settings help you configure thefollowing:1 The email client with which Norton AntiSpamshould integrate1 The list of allowed email send

Strona 492

The options on the ClientIntegration tab let you integrateNorton AntiSpam with youremail clients to keep you freefrom unsolicited emailmessages. You c

Strona 493

Lets you check the SymantecWeb servers to filter the spamemail messages which the localfilters classify as legitimate.Web QueryLets you configure your

Strona 494

Norton 360 supports NortonAntiSpam integration with theaddress books of email clientsfrom which you want NortonAntiSpam to import emailaddresses.You c

Strona 495

You can use the Configure option in the NetworkSecurity Map row to access Network Security Mapwindow. The Network Security Map window providesa pictor

Strona 496

Removes all of the devices that arelisted in Network Map.You can purge Network Map if youwant to create a new list of devices.For example, you can pur

Strona 497 - Customizing

Shows the communication port thatNorton products use to communicatewith each other over the network.If you change the communicationport number on your

Strona 498 - About Norton 360 Settings

1 Select the files that are required to be backed up.1 Choose the location to store the backed up files.1 Assign a schedule to run a backup.In additio

Strona 499 - 499Customizing settings

Lets you view the backup statusof a file by adding the statusoverlay to the file’s iconThe status overlays that appearsare:1 Green icon with a check m

Strona 500

Lets you add or exclude a file ora folder to a backup set by usingthe right-click shortcut menuYou can use this option after youconfigure Backup in th

Strona 501 - 501Customizing settings

wLiveUpdate does not download the latest definitionupdates and program updates, if the Network CostAwareness option in the Settings window is set to N

Strona 502

Lets you specify the amount oflocal disk space that you want toreserve.When you perform an onlinebackup, Norton 360 creates atemporary file in your lo

Strona 503

Antiphishing tells you the following things about theWeb pages that you visit:1 If it is safe to enter confidential information1 If the Web page is kn

Strona 504 - About Antivirus settings

log in to Identity Safe. The password protects you byrestricting unauthorized access to your data in IdentitySafe.The Identity Safe feature provides y

Strona 505 - 505Customizing settings

AdviceDescriptionFeatureYou can use theinformation thatyou store in thecards to do thefollowing:1 Automaticallyfill forms1 Providesensitiveinformation

Strona 506

AdviceDescriptionFeatureIt becomesdifficult tomanage variousidentitynumbers. EditNotes stores allof your sensitiveIDs in a verysecure way andlets you

Strona 507 - 507Customizing settings

Task Scheduling includes the following settings:Lets you specify the tasks thatshould run in the backgroundautomatically when yourcomputer is idleThes

Strona 508

SchedulingCustomizing settingsAbout Task Scheduling settings556

Strona 509 - 509Customizing settings

Lets you schedule PC Securityand PC Tuneup related activitiesYou can specify how oftenNorton 360 should scan yoursystem for security andperformance is

Strona 510

idle when there is no detectablemouse or keyboard activity for aperiod that you specify as idletimeout duration. When youschedule your scans weekly or

Strona 511

Lets you view how Norton 360has protected you for the past30 days.This report includes theactivities that Norton 360performed to protect yourcomputer.

Strona 512

The type of definition updates that each of theSymantec products receive are as follows:Users of these productsreceive the latest virusdefinitions fro

Strona 513 - 513Customizing settings

Lets you specify the automaticconfiguration details, proxysettings, and the authenticationdetails to connect to theInternet.Programs such as LiveUpdat

Strona 514

Lets you submit selectedsecurity and application data toSymantec for analysis.Norton Community Watchprotects you against newpotential risks. It collec

Strona 515 - 515Customizing settings

Lets you remotely view yourdevice’s security status and fixsome security issues by usingNorton Management, NortonOne, and Norton Studio. NortonStudio

Strona 516

Performance Monitoring563Customizing settingsAbout Administrative Settings

Strona 517 - 1 Show SONAR Block

Lets you monitor theperformance of your computer.When the PerformanceMonitoring option is turned on,Norton 360 monitors the CPUusage and memory usage

Strona 518

Norton 360 saves the eventin the Security History logbut does not alert you withthe notifications. You canalso turn off this option ifyou do not want

Strona 519 - 519Customizing settings

1 Use Low Resource Profile OnBattery PowerLets you configure Norton360 to change the resourcethreshold to low profile whenyour computer runs onbattery

Strona 520

1 High-Usage Alert for:2 CPUWhen this option isturned on, Norton 360detects and notifies youabout the increasedusage of the CPUresource by any program

Strona 521 - 521Customizing settings

1 Program ExclusionsLets you select specificprograms to exclude fromappearing in performancealerts.You can use the Configureoption to list the program

Strona 522

Lets you secure the product andprotect it from unauthorizedchanges.You have the following options:1 Non-Admins Access toSettingsLets you access andcon

Strona 523 - 523Customizing settings

Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.In addition, user

Strona 524

Silent Mode SettingsCustomizing settingsAbout Administrative Settings570

Strona 525 - 525Customizing settings

Lets you turn on or turn offSilent Mode.You have the following options:1 Silent ModeWhen you turn on the SilentMode option, you enableSilent Mode for

Strona 526

When you use a MediaCenter application torecord a TV program,Norton 360 detects theactivity, andautomatically turns onQuiet Mode. When QuietMode is tu

Strona 527

Lets you delay the automaticrunning of Norton-specificbackground tasks when youresume your computer fromhibernate mode or standbymode.Automatic Resume

Strona 528

Lets your PC run smoothly andefficiently by deleting theunused temporary files andbrowsing history if you useFirefox Web browser.Norton 360 automatica

Strona 529 - 529Customizing settings

If you want to temporarily turn off Norton ProductTamper Protection, you can turn it off for a specifiedduration.wYou cannot run System Restore on you

Strona 530 - About Firewall settings

To turn on Norton Product Tamper Protection1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Admin

Strona 531 - 531Customizing settings

You can turn off the Settings Password Protectionoption if you no longer require password protectionfor your Norton 360 Settings.Securing your Norton

Strona 532

Turning off Norton 360 Settings passwordYou can protect your Norton 360 Settings with apassword using the Settings Password Protectionoption. If the S

Strona 533 - 533Customizing settings

wThe reset settings password option appears in theSelect Uninstall Preference window only if theSettings Password Protection option is turned on. Tous

Strona 534

Contains the most importantvirus definitions that arerequired for latest securitythreats as viewed by Symantec.The Core Set is a subset of theComplete

Strona 535 - 1 Block the suspicious

About Remote ManagementThe Remote Management feature lets you remotelymanage Norton 360 using Norton Studio app, NortonManagement, and Norton One. It

Strona 536

By default, the Remote Management option is turnedoff. You can turn on this option if you want to remotelymanage Norton 360 on your device.In the Nort

Strona 537

2 Auto-Protect2 Scan incoming emails2 Scan outgoing emails2 Antispyware2 Intrusion Prevention2 SONAR2 Antiphishing2 Browser Protection1 Perform the fo

Strona 538

To turn on Remote Management1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Administrative Setti

Strona 539

Customizing settingsAbout Administrative Settings584

Strona 540

This chapter includes the following topics:1 Finding the version number of your product1 Finding the End-User License Agreement1 About upgrading your

Strona 541 - About Filter settings

Finding the End-User License AgreementEnd-User License Agreement (EULA) is a legaldocument that you agree to while installing theproduct. EULA contain

Strona 542

turn on the Automatic Download of New Versionoption. To turn on the Automatic Download of NewVersion option, go the Norton 360 main window, andthen cl

Strona 543 - About My Network settings

updates. You can use LiveUpdate to obtain the latestupdates.The upgrade process might not work if your Webbrowser is incompatible to communicate with

Strona 544

To check for a new version of the product1In the Norton 360 main window, click Support.2In the Support drop-down menu, click Check forNew Version.This

Strona 545 - 545Customizing settings

installation time, lesser boot time, and lesser memoryconsumption. It also occupies lesser amount of diskspace as compared to the full set of virus de

Strona 546 - About backup settings

configure the proxy settings of Norton 360. See“Configuring Network Proxy Settings” on page 67.If you do not know your proxy settings, contact yourInt

Strona 547

4In the Checking Your Connection window, clickRetry.5If you use a proxy server to connect to the Internet,you may be prompted to authenticate. If you

Strona 548

To stay informed about protection issues1Open your Web browser, and go to the followingURL:http://www.symantec.com2In the Symantec Web site, click Nor

Strona 549 - 549Customizing settings

wSupport offerings may vary based on the language orproduct.About Norton Support Web siteThe Norton Support Web site provides a full range ofself-help

Strona 550

contact the technical support team in the followingways:Chat in real time with asupport representative.For more complex technicalissues, chat offers t

Strona 551

also use the SearchSupport box to find solution usinga keyword.Norton Support Web site also contains useful links tothe product manual, the Norton Acc

Strona 552 - 1 Quickly

Getting support by phoneWhen you click the Get Support option in the Supportdrop-down menu, Norton Autofix performs a QuickScan and should repair your

Strona 553

Support policySymantec recommends that you have the latest versionof the product, as it contains new and enhancedfeatures for better protection agains

Strona 554

If you are a Norton One Premium Member, go to thefollowing Norton One support Web site for informationon this topic:https://one.norton.com/supportClub

Strona 555 - 555Customizing settings

Uninstalling Norton 360You can remove Norton 360 from your computer in thefollowing ways:1 From Windows Control Panel1 From the Start menuwYou should

Strona 556

Chapter 13 Customizing settings ... . ... . ... .. 497About Norton 360 Settings ... ... ... 497Customizing Norton 360 Se

Strona 557 - 557Customizing settings

turn off or turn on the Automatic LiveUpdate optionfrom Quick Controls in the Settings window.wIf you are connected to the Internet, AutomaticLiveUpda

Strona 558 - About Administrative Settings

To uninstall Norton 360 from Windows Control Panel1Do one of the following:1 On the Windows Taskbar, click Start > ControlPanel.1 In Windows 8, go

Strona 559 - 559Customizing settings

5To uninstall Norton 360, click Next.6If Norton 360 offers to install the Norton Toolbarafter uninstall, do one of the following:1 To keep the Norton

Strona 560

3To uninstall Norton 360, click Next.4If Norton 360 offers to install the Norton Toolbarafter uninstall, do one of the following:1 To keep the Norton

Strona 561 - 561Customizing settings

Aabout customer support 593Actions windowdeleting security risks 139performing actions 139restoring security risks 139submission, items toSymantec 139

Strona 562

attentioninfected files 234infected items 172resolve any items 172Attention Requiredabout 172resolving the risk 172Auto-Protectnotifications 229Automa

Strona 563 - 563Customizing settings

Browser Protectionturning on and turning off 290Browsingoptions 378Browsing Optionsabout 378Ccache files 428Cardsabout 368adding 370deleting 371duplic

Strona 564

detectingsecurity risks 228deviceadding 408editing details 411excluding from IntrusionPrevention scan 418purging from exclusion list 292remotely monit

Strona 565 - 565Customizing settings

firewall rules (continued)removing 277turning on and off 275Firewall settingsadding programs 259foldersscanning 245fragmentation 426Full Screen Detect

Strona 566

Internet (continued)temporary files 245, 428Intrusion AutoBlockblocking computerspermanently 289turning on and off 288unblocking computers 289Intrusio

Strona 567 - 567Customizing settings

multipartite viruses 241NNetworkchanging trust level 413discovering devices 406editing details 413forming 406joining 406managing 399Network Cost Aware

Strona 568

presence of a specific virus or security threat. Norton360 shows the date on which you last updated the virusand spyware definitions.You can also chec

Strona 569 - 569Customizing settings

Norton AntiSpam (continued)Feedback 315settings 539SSL 303Web Query 316Norton Autofixsupport assistants 589Norton Backup and Restore 435Norton Backup

Strona 570

Ppasswordchanging 383editing 362Norton Account 29saving 361updating 368PC securitycategories 117PC Tuneupcategories 117disk cleanup 429disk optimizati

Strona 571 - 571Customizing settings

Quarantine (continued)managing items 153opening 153removing items 157restoring items 156Quarantined Items viewadding items 125Quick Controlsturning on

Strona 572

Safe Webturning off 334turning on 334scan at the command promptcommand line scanning 223Scan Completeappearing after a scan 234Scan Complete windowapp

Strona 573 - 573Customizing settings

Settings 497Administrative Settings 558antivirus 504customizing 502firewall 276, 530, 534home network 543Identity Protection 550Quick Controls 503sett

Strona 574 - 1 Firefox History Cleanup

Symantec Web siteblogs and forums 591System Insightabout 75Events graph 75monitoring activities 78Performance graph 75system status graphactivity deta

Strona 575

Web Query (continued)turning off 317turning on 317Web sitescache files 428Windows temporary files 245wireless networkviewing status 421worms 240Index6

Strona 577

fooNorton from Symantec products protect consumers from traditional threats with antivirus, phishing protection, and spywareprotection. They also prot

Strona 578

If you do not activate your service orrenew your subscription, you cannotobtain updates of any kind and thesoftware no longer functions.If you purchas

Strona 579

that require system restart are automatically appliedthe next time you restart your computer.To turn on or turn off Apply updates only on reboot1In th

Strona 580 - About Remote Management

additional and fast protection for the latest threats inbetween the full updates without disrupting your onlineexperience.Even if you do not turn on P

Strona 581

About Network Proxy SettingsA proxy server regulates access to the Internet, andprevents external computers from accessing yournetwork. If you are on

Strona 582

Network Proxy Settings window lets you specify thefollowing settings:Lets you specify the automaticconfiguration URL or script tomanage Internet acces

Strona 583

Lets you connect to the Internetthrough a server that requiresauthentication.Use the Username box andPassword box to type theauthentication details.Au

Strona 584

4In the Network Proxy Settings window, do thefollowing:1 If you want your browser to automatically detectnetwork connection settings, under AutomaticC

Strona 585 - Finding additional

Indicates that your computerrequires attention.At the bottom section of theNorton 360 main window,click Fix Now to resolve thesecurity threats on your

Strona 586 - About upgrading your product

This chapter includes the following topics:1 About Norton 3601 Activation protects you1 About your Norton Account1 About Norton Management1 About Nort

Strona 587

When your system status or protection categoriesstatuses are marked as At Risk or Attention, you canresolve the security issues directly from the main

Strona 588

You can right-click the icon to see a shortcut menu forNorton 360. You can choose items on the shortcut menuto open the Norton 360 window, to fix any

Strona 589 - About Norton Autofix

Use this option to create abackup of your files.You can specify when andhow often Norton 360 backsup your files.Run Backup NowUse this option to revie

Strona 590

To view details of a protection feature1In the Norton 360 main window, click on aprotection feature, and then click View Details.In the window that ap

Strona 591

Getting StartedAbout Norton 360 status74

Strona 592 - About Support

This chapter includes the following topics:1 About System InsightAbout System InsightNorton 360 continuously monitors your computer tokeep it free of

Strona 593 - About Norton Support Web site

alerts, or Quick Scans. The graph displays theactivities as icon or stripe, and the description foreach icon or stripe is provided at the bottom of th

Strona 594

The Norton Tasks window provides the details suchas the timestamp, the duration, and the status ofthe background jobs. The details also include thetyp

Strona 595 - About phone support

About monitoring system activitiesSystem Insight provides information about theimportant system activities that you performed or thatoccurred over a p

Strona 596 - Getting support by phone

Indicates the optimizationactivities that you performed onyour system over a period of thelast three months.OptimizedProvides the details about thethr

Strona 597 - Worldwide service and support

Norton 360 is completely automated and easy to use.It works quietly in the background to maintain youroverall system integrity with minimal effect on

Strona 598 - ClubNorton

Provides the details about QuickScans that Norton 360performed on your system overa period of the last threemonths.The details include the date onwhic

Strona 599 - Uninstalling Norton 360

2In the Performance window, at the top of the Eventsgraph, click the tab for a month to view the details.3In the Events graph, move the mouse pointer

Strona 600

access the Resource Threshold Profile for Alertingoption, go to the Norton 360 main window, and thenclick Settings > Administrative Settings >Pe

Strona 601

Turns on performance alerts.Select this option if you wantNorton 360 to notify you withperformance alerts when aprogram or process exceedsthe threshol

Strona 602

3Under Performance Monitoring, in thePerformanceAlerting row, do one of the following:1 To turn off performance alerts, move thePerformanceAlerting sw

Strona 603

3Under Performance Monitoring, in the ResourceThreshold Profile for Alerting row, select one ofthe following options:Configures a low thresholdlimit f

Strona 604

the program or the process manually and free theresource.If the Use Low Resource Profile On Battery Poweroption is turned on, Norton 360 automatically

Strona 605

To exclude a program from performance alerts1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Admi

Strona 606

6Click OK.7In the Settings window, click Close.About CPU graph and memory graphNorton 360 monitors the overall system CPU usageand memory usage and th

Strona 607

1 The file name, version number, digital signature,the date on which the process was installed.1 The date on which the process was last used andwhethe

Strona 608

Includes the performancetuning features, such ascleaning up unwanted filesand performing RegistryCleanup.TuneupDepending on the security status of the

Strona 609

2In the Performance window, do one of the following:1 To view the CPU graph, click the CPU tab.1 To view the memory graph, click the Memorytab.1 To ma

Strona 610

2In the Performance window, do one of the following:1 To view the CPU graph, click the CPU tab.1 To view the memory graph, click the Memorytab.3Click

Strona 611

structures so that they can grow without immediatelybecoming fragmented again.You can optimize your boot volume manually by usingthe Optimize option i

Strona 612

can view details such as timestamp, duration, andstatus of the background job.To optimize your boot volume from the Performancewindow1In the Norton 36

Strona 613

to optimize the boot volume during idle time. Bydefault, this option is turned on.Turning off or turning on Idle Time OptimizerNorton 360 automaticall

Strona 614

You can use the icon that appears before the nameof a background job to start or stop a backgroundtask. You can start or stop a background task at any

Strona 615

The Norton Tasks window lets you monitor thefollowing Norton-specific tasks:Automatic LiveUpdateautomatically checks fordefinition updates andprogram

Strona 616

Deletes the unnecessary Webpage history that is leftbehind in your Internetbrowser's history folder.Removes the traces of anyInternet searches th

Strona 617

Allows the smart scanning offiles on your computer. Itimproves the performance ofNorton 360 scans by lettingyou scan fewer files withoutcompromising t

Strona 618

Scans the important locationsof your computer that theviruses and other securitythreats often target.Quick Scan takes less time toscan than a Full Sys

Komentarze do niniejszej Instrukcji

Brak uwag