Symantec 11022527 manual Using the Add Rule Wizard, 245

Page 245

Keeping secure on the Internet

245

About the Smart Firewall

 

3On the ProgramRules tab, in the Program column, select the program to which you want to add a rule.

4Click Modify.

You can also use the Access drop-down list next to the program to modify the access level for the program. Accordingly, Smart Firewall modifies or creates the relevant rule for the program.

5In the Rules window, click Add.

6Follow the instructions in the Add Rule wizard.

7 In the Rules window, click OK.

Using the Add Rule Wizard

The AddRule Wizard leads you through the steps that are necessary to create firewall rules.

To use the Add Rule Wizard

1Open the Add Rule Wizard by creating a Traffic rule or a Program rule.

Image 245
Contents Product Manual Norton 360 Product Manual Contents Chapter Keeping secure on the Internet Chapter Responding to security issuesChapter Understanding alerts Chapter Protecting your home network Chapter Securing your sensitive dataChapter Keeping your PC tuned up Chapter Protecting your media and data553 Chapter Finding additional solutionsThis chapter includes the following topics About NortonRestore capability FeaturesAbout Norton 360 main window Getting Started About NortonGetting Started SettingsSupport Lets you access support Options, product upgrade Account Lets you access the MyYou can also access Product featuresPage Activity Map Getting Started About Norton Installed on all of your Manage Lets you access Norton ManagementManagement, click Use your existing NortonOnline Family Getting Started About Norton Getting Started About Norton Safe Web You can also use the View recent Norton Safe Web Getting Started Activation protects you Activation protects youActivating Norton Administrative Settings Network Proxy Settings Configure Where to find your product keyIf you received a product key card Locations of the product key are as followsGetting Started About your Norton Account About problems during activationAbout your Norton Account Page Products Version using Norton UpdateNorton products that you OwnClick Update to save Orders. After you updateChange Password Information and your billingImportant data against Norton Update CenterSystem crash, accidental Other disastersCreating a Norton Account Accessing your Norton Account You can also change your Norton Account password Creating a temporary password for Norton AccountInternet to access your Norton Account To access Norton AccountGetting Started About Norton Community Watch About Norton Community WatchSecurity History window Turning off or turning on Norton Community WatchAbout Norton Bootable Recovery Tool Viruses Program, boot sectorBy inserting themselves or Medium. Most viruses justGetting Started About Norton Bootable Recovery Tool Downloading the Norton Bootable Recovery Tool WizardClick Full System Scan All Programs Norton 360 Norton Recovery ToolsClick Start Scan Using the Norton Bootable Recovery ToolAbout updating Norton About Program and Definition Updates About LiveUpdateOperating system or hardware compatibility, adjust a Program updates are usually created to extendPerformance issue, or fix program errors. Program Updates are released on an as-needed basisNorton Internet Security, Norton In addition to the virus Products receive About Smart DefinitionsFiles and definition Complete SetTurning off or turning on Smart Definitions Antivirus Antispyware and Updates. You can also Turning off or turning on Automatic LiveUpdateFrom Quick Controls in the Settings window Checking for updates manuallyLiveUpdate option Checking for the latest virus and spyware definitions dateAbout keeping your protection up to date Obtain updates of any kind About Pulse UpdatesInstalled on your Software no longer functions Computer Cannot obtain updates of any kindTurning off or turning on Pulse Updates About Network Proxy SettingsPage Page NetworkProxySettings row, click Configure Configuring Network Proxy SettingsNetworkProxySettings window, click Apply Network Proxy Settings window, do the followingAbout Norton 360 status Getting Started About Norton 360 statusResponding to security status indicators About the Norton 360 icon Issues against your computerIcon with a green check Mark badge Is fully protected Icon with an orangeAbout Norton 360 shortcut menu Status, or access otherOpen Norton Run QuickScanViewing details of protection features Page Getting Started About Norton 360 status About System Insight Monitoring your Systems PerformancePage To view the details of the Files of Interest Accessing the Performance windowDate About monitoring system activitiesDetails include Total number of downloads Monitoring your systems performanceOn that date. You can click Details about the downloadedAlerts Quick Scans Viewing details of your system activitiesMonitoring your systems performance About System Insight About performance alerting Turn off the Performance Alerting option Click Settings Administrative SettingsYou can use the Resource Threshold Profile for Profile for AlertingOff Configuring performance alertsThreshold limit System resource usageLog Only Configuring the resource threshold profile Click Apply and then click Close To turn off the Use Low Resource Profile On Battery On battery power. By default, this option is turned onPower option Excluding programs from performance alertsProgram Exclusions window, click Apply Click OK Settings window, click Apply Click CloseRemoving programs from Program Exclusions About CPU graph and memory graph About System Insight Click OK Settings window, click CloseViewing the CPU graph and memory graph To view the memory graph, click the Memory tab Obtaining historical data of your CPU and memory usageIdentifying resource-consuming processes About optimization Optimizing your boot volume About the Idle Time Optimizer Turning off or turning on Idle Time Optimizer About the Norton TasksPage LiveUpdate checks for By default, AutomaticUpdates every hour Backing up DefaultSetResolves it Internet Explorer HistoryTo identify the new threats Definition updates every five Pulse Updates check forPulse Updates provide Updates during the fullCause errors Windows Registry CleanerIdentity Safe Maintenance Performs background AntiSpam Maintenance Performs backgroundMonitoring background jobs of Norton About Power Source Configuring the Power Source External External and BatteryAbout Norton Insight Monitoring your systems performance Whitelist technique Norton Community TrustedSymantec rates the file as Norton TrustedViewing the files using Norton Insight When you start your Point in time when youAll Running Processes On your computer at thatUser Trusted Files Scan when you configureFile Insight window This category does not listChecking the trust level of a file File Insight window, click Check Trust Now Configuring the Scan Performance Profiles Full Scan Standard Trust High Trust Account window About Monthly ReportBackup and PC Tuneup Backup & TuneupIs protected from Spyware from which101 Viewing the Monthly ReportMonitoring your systems performance About System Insight About total protection Maintaining total ProtectionAbout keeping your computer secure Page About responding to emergencies About solving connection problemsMaintaining total protection About Security History About monitoring protection featuresPage Page Viewing items in Security History Page Days. It lists the history Recent HistoryCertain recent security EventsWindow displays a list Resolved Security RisksHas detected and then Repaired, quarantined, orAvailable through LiveUpdate Networks that your Trust or restrict settings forHave taken to trust or to Restrict networksMaintaining total protection Downloads when you run Identity Various features Identity Safe help youLiveUpdate to obtain Download InsightMaintaining total protection Amount of network Metered NetworkCan use Provides details aboutMaintaining total protection Computer and cleans any Registry Cleanup Windows registry canFile Cleanup File Cleanup feature Improve data access timeMaintaining total protection About the Security History Advanced Details window Medium, Low, and Info Security risks are HighActivity By NortonActions Actions options Page About the File Insight window Category mostly includes Files that Norton 360 repairsOr blocked Resolved security risks onMaintaining total protection Details Installed NortonFile is Stability ratings of a fileTop of the window Locate Lets you locate the file on Your computerCopy to Clipboard ClipboardQuarantined to the original RestoreAbout the Threat Detected window Searching in Security History Click Go Exporting or Importing Security History informationSecurity History window, click Import Managing items in the Quarantine Page Non-viral threats Detected viralSecurity risk Some cases, NortonRestoring an item from the Quarantine Adding an item to the QuarantineRemoving an item from the Quarantine Details pane, click Restore & OptionsManually submitting an item to Symantec Click Restore & OptionsDialog box that appears, click OK About viewing details of system vulnerabilitiesAbout Vulnerability Protection Viewing the list of vulnerable programs Viewing details about a vulnerable application VulnerabilityProtection window, click Close Page About the Norton 360 scans Scanning your ComputerWhen the Insight Protection Computer usingSettings window Computer ScanAbout the Norton 360 scans Scanning your computerScanning your computer About Computer Scan About Computer Scan153 Running a Quick Scan Optimizes your disk volumeDisk optimization tasks Data, frees disk space,Running a Full System Scan Skip Skips the current scan Cancel Terminates a Quick Scan155 PauseScanning your computer About Computer Scan Scanning selected drives, folders, or files157 About the Results Summary windowPause Suspends a custom scan Temporarily Stop Terminates the scan Click Yes to confirmAbout the Threats Detected window 159 About custom scansCreating a custom scan Scan Name box Selecting the scan itemsTo add files, click dialog box, select then click Add Configuring the scan options161 Running a custom scan Editing a custom scanStop Terminates a custom scan Click Yes to confirm Deleting a custom scan163 Scheduling a scan About scheduling scans165 Scheduling a Full System Scan 167 Scheduling a Quick ScanEditing a scheduled scan Scanning your computer About Insight Network scan Click Go About Insight Network scanTurning off or turning on Insight Protection Scanning your computer About Reputation Scan About Reputation Scan171 DLL files .loc Dynamic link library filesDrv 173 File is neither safe nor To the fileUnsafe Poor Symantec has a fewRunning a Reputation Quick Scan Running a Reputation Full System Scan175 NortonReputationScan window, click CloseReputation Custom Scan window, do one of the following Running a Reputation custom scan177 About the Reputation Scan resultsFile type File NameFile in the File Insight WindowScanning your computer Scanning your computer About Reputation Scan Scanning your computer Scanning your computer About Scan Facebook Wall About Scan Facebook WallPage Scanning your Facebook Wall Request for permission page, click Allow About Sonar ProtectionSecurity Risks category in the Security History Turning off or turning on Sonar ProtectionAbout Real Time Exclusions Excluding security threats from scanning Intelligence Detection ConfigureAbout Signature Exclusions Signature Exclusions window, click Add About scanning Office documentsAdding items to the Signature Exclusions Turning on or turning off Microsoft Office Automatic Scan Silent Mode Norton 360 allows you to About Silent ModeDuration using Silent Mode MicrosoftOfficeAutomaticScan row, do one of the followingScanning your computer About Silent Mode 193 About the Silent Mode that you turn on manuallyTurning on or turning off Silent Mode manually Scanning your computer About Silent Mode 195 About the Silent Mode that turns on automaticallyTurning off or turning on Full Screen Detection 197 About Quiet ModeSettings window, click Apply Click Close Following table explains about the various options Scanning your computer Turning off or turning on the Quiet Mode options 201 About User-Specified ProgramsAdding programs to User-Specified Programs 203 Quiet Mode Programs window, click AddRemoving programs from User-Specified Programs Turns off boot time protection About boot time protectionTime Protection Aggressive NormalConfiguring boot time protection Running a scan at the command promptScanning your computer Running a scan at the command prompt Aggressive Normal OffBoot record scanning Boot recordScans only the boot Window only when a\Program Files\Norton 360\Engine\version\NAVW32 pathfilename Scanning your computer Running a scan at the command prompt What to do if a security risk is found About detecting viruses, spyware, and other risks Reviewing Auto-Protect notifications Days Recent History Review Auto-Protect Notifications that youFull History Review all Security threatsPage Norton 360 adds From future scanSecurity risk to Appropriate exclusionsThis option is also Manual removalRisks that are manually QuarantinedSubmit to Symantec Sends the security risk to Symantec About actions when Norton 360 cannot repair a fileAbout responding to risks detected during a scan Infected files Page About managing messages and alerts About Norton 360 alerts and messagesYou might see messages in the following locations Understanding alerts and messages Types of risks Types of risksUnderstanding alerts and messages Types of threats Types of threatsTypes of viruses Understanding alerts and messages Types of viruses Turning on or turning off automatic tasks Doing routine TasksAbout custom task LiveUpdate Downloads the latestUpdates Doing routine tasks 227 About custom task Running custom tasksScheduling security and performance scans About scheduling automatic tasksDoing routine tasks Settings window, click Tasks SchedulingYou have the following backup scheduling options About scheduling backupsSpecifying Idle Time Out duration Doing routine tasks Specifying Idle Time Out duration About the Smart Firewall Keeping secure on InternetPort scans Intrusions Turning off or turning on Smart FirewallAbout the Smart Firewall 235About the order in which firewall rules are processed About firewall rulesSmart Firewall uses two kinds of firewall rules Outgoing network trafficIcmp messages provide status and control information About Traffic rules237 Keeping secure on the Internet About the Smart Firewall 239 About Program rulesUse Firewall settings Manages the list Access settingsLets the firewall First time that users runAdding a program to Firewall settings By this program Accesses the InternetBlock Criteria for a ruleCustomizing a program You can remove programs from Firewall settings if necessaryRemoving a program 243Adding Traffic rules and Program rules Firewall settings automatically create mostClick Remove Confirmation dialog box, click Yes If necessary245 Using the Add Rule WizardThis type When you selectTraffic rule with Following criteria allMonitor 247Activities category in the Security History window Keeping secure on the Internet About the Smart Firewall Keeping secure on the Internet About the Smart Firewall Only the computers and sites listed below 251Transmission Control Only when you add aProtocol TCP and UDPAll Rule applies to all Supported protocols Select the ports for the rule. Your options areClick Next Modifying Traffic rules and Program rulesChanging the order of firewall rules Turning off a Traffic rule temporarily Click More Details Allowing a blocked program257 To remove a Traffic rule Advanced user. Removing a default firewall rule canRemoving a firewall rule About Norton Firewall Diagnosis Encounter network connection problems259 Norton Firewall Diagnosis is available only in WindowsAbout Intrusion Prevention 261 Turning off or turning on Intrusion Prevention notificationsIntrusion Signatures window, click OK Excluding or including attack signatures in monitoringTurning off or turning on AutoBlock To turn off Intrusion AutoBlock, click Off Unblocking AutoBlocked computersUnder the Action column, select Restrict Click OK 265About Intrusion Prevention exclusion list Turning off and turning on Browser ProtectionTrust. You can configure the trust level of a device From all the devices that access your computerComputer, AutoBlock stops all access requests from Purge the saved exclusion list. When you purgeKeeping secure on the Internet About Intrusion Prevention Click the Intrusion and Browser Protection tab About Download InsightExecution of the safe files Your computer. By defaultAuto-Protect allows About Download Insight Turning off or turning on Download Intelligence Cancel runRun this program Program273 Configuring the Download Insight Notifications optionKeeping secure on the Internet About Download Insight 275 Configuring the Download Insight Full Report optionDownload Insight Full Report You can use the following options to configureKeeping secure on the Internet Keeping secure on the Internet About Download Insight Turning on or turning off Alert on Poor Stability About Norton AntiSpamKeeping secure on the Internet About Norton AntiSpam AntiSpam category in the Security History window About spam filtering featuresKeeping secure on the Internet About Norton AntiSpam Configuring Client IntegrationNorton AntiSpam settings. If your email program does To open the Settings window to configureNortonAntiSpam drop-down list or the options to Classify the email messages as spam or legitimate. YouAbout your email program toolbar About Norton AntiSpam You can use the following options 285Not add the domain name to the Address Book Setting Address Book ExclusionsExclusions list Import the address book. Add all email addresses toAddress Book Exclusions list Identifying authorized sendersDomain 289 Identifying senders of spamDomain Setting the Feedback option Click Apply Click Close About Web QueryTurning off or turning on Web Query Symantec recommends you to keep the Web Query About configuring POP3 and Smtp portsTo turn off the Web Query filter Increases your exposure to the spam email messagesAdding POP3 and Smtp ports to Protected Ports Protected Ports ConfigureRemoving an email port from Protected Ports About Metered Broadband ModeCritical Updates Only Turning off or turning on Metered Broadband ModeNo Limit No TrafficDefining the Internet usage of Norton Broadband ModeCritical Updates Only Keeping secure on the Internet About Metered Broadband Mode About Safe Surfing About securing your sensitive dataAbout Antiphishing Turning off or turning on Antiphishing Reporting an incorrect evaluation of a Web site About Norton Safe Web View the Norton rating Status, Norton Safe Web lets you do the followingView the community rating Add your reviewsNext to the search results Norton SecuredSite is VeriSign trusted and is Safe to visitShopping experience Site is UnsafeThat you can have a safe Securing your sensitive data Turning off or turning on Norton Safe Web Searching the Web using Norton Safe SearchSearch results. When you Using Norton Safe Search, itUnsafe Site Filter Search resultsErase Search History About Identity Safe Norton menu Safe Web indicatorNorton Safe Search Identity Safe menuAbout setting up Identity Safe Turning off or turning on Identity Safe Settings window for Identity ProtectionAbout Identity Safe vaults Toolbar provides option to merge the Identity Safe About creating Identity Safe vaultsData from your portable profile. You can merge Data from the portable profile to your local vault orPage Check Store information online through your Norton Account IdentitySafeSetupSuccessful window, click DoneVault to save your Identity Safe data. You must log Identity Safe data is stored online using your NortonTo your Norton Account to create an online vault. AccountVault without depending on any external drive Computers using your Norton AccountProvides a convenient means to automatically Synchronize Identity Safe data across differentWhen you merge the data from local vault to online InstalledIdentity Safe data from any computer that has Norton You can merge the Identity Safe data from your localYou can merge that portable profile to local vault or Deleting local vault and online vaultData from the portable profile to local vault or online VaultSet up Identity Safe Resetting Identity Safe Product expires Accessing Identity SafeFrom the Norton Toolbar Identity Safe features. The Identity Safe features are You must be logged in to Identity Safe to accessLogging in to and logging out of Identity Safe Supported only in the Internet Explorer, Firefox, orPage Configuring Identity Safe settings Page Page Securing your sensitive data From the portable profile that When you import the IdentityEdit Notes Export Data About Edit logins Saving logins You can only view your saved logins after Norton Norton Toolbar to view the loginsExpires, you cannot save or add any new logins When you try to save a login after the product expiresThen click Manage Identity Protection Editing loginsNorton Toolbar Under Identity Safe, in the Edit Logins row, click Configure URL Under Identity Safe, in the Edit Logins row, click Configure Under Identity Safe, in the Edit Logins row, click Configure About Edit Cards Updating the password for a loginSavenewpasswordforlogin? menu bar, click Save That steal and misuse your identity Adding cardsFor autofill. You can choose a card from the list to fill Forms automaticallyPage Click Save Click Close Editing, deleting, or duplicating cardsClick Edit Card Under Identity Safe, in the Edit Cards row, click ConfigureEditing Notes About Edit NotesClick Delete Card Click Duplicate CardClick Delete Notes Under Identity Safe, in the Edit Notes row, click ConfigureExporting your Identity Safe data About exporting and importing Identity Safe dataImporting your Identity Safe data About Browsing Options Backup FileLocal Profile Merge with existing data Replace existing dataAbout Password & Security Password hint using Password and set a newPassword Security Ask for my password before filling out a login or form Suspended state You can select 15, 30, or 45 minutesPassword & Security window, click Change Password Changing the Identity Safe passwordAbout Norton Toolbar Page Histories Allow in incognitoBrowsing or download Check Norton Toolbar to show the toolbar Allow access to file URLs Lets you view the URLHiding and showing the Norton Toolbar Wrench icon. However, you cannot enable Accessing Identity Safe settings from the Norton ToolbarClick Enable to show the toolbar Page Settings Lets you open theIdentity Web indicators remainConfigure the Identity Safe Report Site Lets you report to SymantecPage By default, the Norton Safe Search/ Disable Norton Search box Safe SearchInstall Norton 360 and open Choose to enable or disableSettings window using the Identity Safe menu Accessing the Identity Safe menuLatest five logins that you Recently Used Logins Lets you view the listAll Logins Merge Portable DataOptions Data online Report Issue Lets you open the Norton Feedback Web site Autofill the loginProblems that you List of problems or you canLets you log out of or log in to Identity Safe Page About the Network Security Map MY PC Viewing devices on the Network Security MapCannot install the Symantec Security Driver when you Norton 360 requires you to configure the SymantecRun LiveUpdate. You can either allow the Norton LiveUpdate to complete or close the Norton LiveUpdatePage Device Name NetBIOS name by defaultFor a computer, the Network Security Map displaysProtecting your home network About the Network Security Map Offline Turning off or turning on Network Security OverviewOverview window Setting up Remote MonitoringYou open Network Security Map Remote Monitoring Setup window, type a Passkey NetworkSecurityMap row, click ConfigureAdding a device to the Network Security Map Turning off Remote MonitoringNetworkSecurityMap row, click Configure IPv4 address 172.16.0.0 IPv6 address Finding a computers IP addressClick Add Device Editing device details Network map, select a device that you added Device details section, next to Device Name, click EditEditDeviceDetails window, in the Name box, type a new name Changing the trust level of your network and devices Editing network detailsHowever, Norton 360 does not change the trust level To all the devices that are connected to that networkDevices that you individually trust or restrict A network, Norton 360 assigns the same trust levelPage Computer receives from a You should select this settingAllowed through firewall However, known attacksRestricted list RestrictedExcluding a device from Intrusion Prevention scan Page Exclude from IPS Scanning dialog box, click Yes to confirm Removing devices from the Network Security MapEdit Device Trust Level window, click Full Trust Under NetworkSecurityMap, in the NetworkMap row, click Purge Viewing the status of your wireless networkViewing the device details Network Security Map row, click ConfigureModifying the communication port for Network Security Map Page About PC Tuneup Keeping your PC 11 tuned upKeeping your PC tuned up About disk and file fragmentation About disk and file fragmentationOptimizing your permanent disks manually About using optimization efficiently Keeping your PC tuned up About cleaning up disk clutter About cleaning up disk clutterKeeping your PC tuned up Running a scan to clean up disk clutterRunning a scan to clean up disk clutter Running Diagnostic Report Running Registry CleanupWatch on When the Norton Community Watch option is turned onAbout Startup Manager Disabling or enabling startup items 409 Managing startup itemsKeeping your PC tuned up About Startup Manager Protecting your 12 media and data About Norton Backup and RestoreProtecting your media and data About backups About backupsAbout backup preparation Page Where 415Protecting your media and data About backup preparation Option is available About backup setProtecting your media and data Option is available in the Settings window Creating a new backup setConfigure the MeteredBroadbandMode option You can do the following tasks419 Modifying or renaming a backup setAbout backup file categories 421 Music Protecting your media and data About backup setProtecting your media and data Video Protecting your media and data About backup file extensions Category Edit the file extension Click OK Click Save 429 Removing a file extension from a backup categoryResetting a backup category to default file extensions Deleting previously backed up files Summary tab Where tabOn the Where tab, click Delete Backed up Files Delete Backup Set window, select one of the following431 Click Delete SelectedMetered Broadband Mode option in the My Adding files and folders to a backup setFiles and folders On the What tab, click Add or exclude files and folders433 Excluding files and folders from a backup setOn the What tab, click Add or exclude files and folders 435 About backup locationsProtecting your media and data About backup set Fastest recommended High usage Moderate usage Low usage 437Protecting your media and data About backup set CD, DVD, or Blu-ray discs 439BD-R When you select the CD or the DVD Drive as the backupNetwork drive Install the optical driverPC is connected to a local Network that offers a storageChoosing a backup location 443 Installing optical backup driverClick Save Settings Viewing or changing a backup schedule Deleting a backup set Backing up your files Restoring files Backup sets to restore Restore FromFolders by using Backup file categoriesClick Restore Files Restore Files window, under Restore From, click View All Choosing where to restore files from451 Selecting files to restoreRestore files by searching Backup setThose files to restore As asterisks * or question453 Choosing a restore destinationAbout Norton 360 Autorun Restore Restoring files by using Norton 360 Autorun Restore Custom Location About Norton Backup DriveClick Restore Selected 457 Viewing backup files on the Norton Backup Drive 459 Deleting a file from a backup set on the Norton Backup DriveAbout solutions to the backup problems Page Large files to back up That cannot store filesIf you use automatic or Sure that the externalBacking up to your Secure Online Storage Getting additional help with backup problemsSettings window About online backup considerationsSpeed limitations Fastest recommended High usage Moderate usage Low usage About online backup activation Purchasing more online storage space Turning off or turning on backup Page Up the file during idle time Turning off or turning on backup setting optionsPage Page Page About Norton 360 Settings Customizing 13 settingsYou can configure Norton Unwanted online contentAntivirus Specify how certain types Other threats, are handledCustomizing settings Customizing settings About Norton 360 Settings Web features Silent ModeBackup Turns on or turns off Backup Your specified settingsCustomizing settings Customizing Norton 360 Settings Customizing Norton 360 SettingsTurning on or turning off Quick Controls services Customizing settings About Antivirus settings About Antivirus settingsAutomatic Protection Settings let you control Scans and Risks You can use the following Scans and Risks options Customizing settings About Antivirus settings Customizing settings About Antivirus settings Customizing settings About Antivirus settings About Automatic Protection settings Auto-Protect Customizing settings About Antivirus settings Customizing settings About Antivirus settings Sonar Protection Sonar Protection includes the following options Remove Risks if I Am Away This option lets NortonAbout Scans and Risks settings Computer Scans Customizing settings About Antivirus settings Customizing settings About Antivirus settings Number of Threads for Manual Scan Configure a scan that You must configureScan Performance ProfilesCustomizing settings Exclusion / Low Risks Items to Exclude from Auto-Protect and Sonar Detection About Antispyware and Updates settings Instant messenger scans Antispyware Antispyware options let youCustomizing settings About Firewall settings About Firewall settingsPages Firewall featuresNetwork traffic to According to the generalIntelligence option that is Intrusion and BrowserAvailable on this tab to Protect your computerAbout Firewall General settings Firewall rules and settings are Default stateConfigured If you reset the firewallAbout the Intrusion and Browser Protection settings About Smart Firewall Advanced settings Program Component That launch Internet-enabledProgram Launch That attach to safe programsCode Injection Monitors the Trojan horses or Direct Network AccessCode into an applications Process without triggeringCustomizing settings About Norton AntiSpam settings About Norton AntiSpam settingsAbout Filter settings About Client Integration settings Lets you send feedback about the misclassified email Integration tabAbout My Network settings Trust Control When the Remote Monitoring isNetwork Trust Control is a special networkCustomizing settings About backup settings About backup settingsWhen to back up your Manage BackupYou can use the Configure Important filesCustomizing settings Customizing settings About Identity Protection settings About Identity Protection settingsIs unsafe to visit VisitProvide annoying results Grey question markManage your All of your login Personal You store Information Cards to do Feature Description Advice Edit Cards Lets youFill forms ProvideCustomizing settings About Task Scheduling settings About Task Scheduling settingsSecurity and PC Tuneup Automatically when yourAutomatic Tasks Scheduling Manual Schedule You can run the tasks manually Customizing settings About Administrative Settings About Administrative SettingsCustomizing settings Customizing settings About Administrative Settings Customizing settings About Administrative Settings Performance Monitoring Customizing settings About Administrative Settings Customizing settings About Administrative Settings Use Low Resource Profile On Battery Power Memory High-Usage Alert forDisk HandlesBackground jobs when your Power Saving ModeAlerts Get performance alertsLets you access Non-Admins Access toBy default, this option is Settings window ifSilent Mode Settings Media Center TV Recording Quiet Mode on DetectionCustomizing settings About Administrative Settings Protection. You can specify It does not delay NortonMinutes Idle Time OutBrowser Firefox History CleanupAbout Norton Product Tamper Protection Turning off or turning on Norton Product Tamper Protection Password option in the Select your Uninstall About securing Norton 360 Settings using a passwordSettings Password Protection row, click Configure Securing your Norton 360 Settings using a passwordSelect Uninstall Preference window Turning off Norton 360 Settings passwordResetting your Norton 360 Settings password General Product Security Select Uninstall Preference window only ifTo reset your Norton 360 Settings password Finding the version number of your product Finding additional14 solutionsDouble-clickProgram Files Norton 360 MUI version 09 Finding the End-User License AgreementAbout upgrading your product Finding additional solutions About upgrading your product Checking for a new version of the product Available and install new version of the productFirefox version 3.6 or later Internet connection to check if a new version isAbout Norton Autofix Solving a problem using Norton Autofix Checking Your Connection window, click Retry Staying informed about protection issuesAbout Support About Norton Support Web site Using the Norton Support Web site Getting support by phone About phone supportAbout keeping your subscription current Support policyCountries To get support by phone565 Worldwide service and supportClubNorton Panel Uninstalling Norton567 To uninstall Norton 360, click NextPasswords, and preferences for Index Backup Page Page Page Internet temporary files 227 Page Page Product password protecting 550 product status Page Index Submission, items to Symantec Index Page Page Foo

11022527 specifications

Symantec 11022527 is a robust and versatile security solution designed to protect enterprises from a variety of cyber threats. As part of the broader Symantec Endpoint Protection (SEP) family, this product is engineered to deliver comprehensive security features tailored for organizations of all sizes.

One of the primary features of Symantec 11022527 is its advanced threat detection capabilities. Leveraging a combination of signature-based and behavior-based detection methods, the solution effectively identifies known and unknown threats, including malware, ransomware, and phishing attempts. This dual approach allows for enhanced protection in an ever-evolving threat landscape, ensuring that organizations can stay one step ahead of cybercriminals.

Another salient characteristic of Symantec 11022527 is its integrated firewall. The firewall functions to monitor incoming and outgoing network traffic, establishing a barrier between trusted internal networks and untrusted external networks. This is particularly crucial for preventing unauthorized access to sensitive corporate data, safeguarding intellectual property, and reducing the risk of data breaches.

In addition to these features, Symantec 11022527 incorporates machine learning and artificial intelligence technologies. These capabilities enable the solution to analyze vast amounts of data to identify anomalous behaviors and potential threats in real time. By automating the detection process, organizations can respond more rapidly to incidents, minimizing potential damage and downtime.

The solution also boasts a user-friendly management console, which streamlines deployment and management across multiple endpoints. This console allows administrators to push updates, manage security policies, and run reports with ease, promoting efficiency within IT teams. The centralized control helps ensure that security measures are consistently applied across the enterprise, thereby enhancing the overall security posture.

Moreover, Symantec 11022527 supports cloud-based deployment, which offers flexibility and scalability for businesses. This allows organizations to extend their security coverage without requiring extensive on-premises infrastructure, making it ideal for hybrid and remote work environments.

In summary, Symantec 11022527 stands out due to its advanced threat detection, integrated firewall, machine learning capabilities, user-friendly management console, and cloud-based deployment options. These features make it a powerful tool for organizations seeking to enhance their cybersecurity defenses and protect against the dynamic threats that characterize today’s digital landscape.