Symantec 11022527 manual This type, Traffic rule with, Following criteria all, Inbound connections

Page 246

246Keeping secure on the Internet About the Smart Firewall

2In the first panel of the AddRuleWizard, select the action that you want for this rule. Your options are:

Allow

Allow communication of

 

this type.

 

For example, consider a

 

Traffic rule with the

 

following criteria: all

 

inbound connections

 

from Internet address

 

192.168.1.1 through port

 

8080. When you select

 

Allow, Smart Firewall

 

allows all connections

 

that satisfy the criteria of

 

this Traffic rule.

Block

Prevent communication

 

of this type.

 

For example, consider a

 

Traffic rule with the

 

following criteria: all

 

inbound connections

 

from Internet address

 

192.168.1.1 through port

 

8080. When you select

 

Block, Smart Firewall

 

blocks all connections

 

that satisfy the criteria of

 

this Traffic rule.

Image 246
Contents Product Manual Norton 360 Product Manual Contents Chapter Responding to security issues Chapter Understanding alertsChapter Keeping secure on the Internet Chapter Keeping your PC tuned up Chapter Securing your sensitive dataChapter Protecting your home network Chapter Protecting your media and dataChapter Finding additional solutions 553About Norton This chapter includes the following topicsAbout Norton 360 main window FeaturesRestore capability Getting Started About NortonSettings Getting StartedYou can also access Account Lets you access the MySupport Lets you access support Options, product upgrade Product featuresPage Activity Map Getting Started About Norton Management, click Manage Lets you access Norton ManagementInstalled on all of your Use your existing NortonOnline Family Getting Started About Norton Getting Started About Norton Safe Web You can also use the View recent Norton Safe Web Activation protects you Getting Started Activation protects youActivating Norton Where to find your product key Administrative Settings Network Proxy Settings ConfigureLocations of the product key are as follows If you received a product key cardAbout problems during activation About your Norton AccountGetting Started About your Norton Account Page Norton products that you Version using Norton UpdateProducts OwnChange Password Orders. After you updateClick Update to save Information and your billingSystem crash, accidental Norton Update CenterImportant data against Other disastersCreating a Norton Account Accessing your Norton Account Internet to access your Norton Account Creating a temporary password for Norton AccountYou can also change your Norton Account password To access Norton AccountAbout Norton Community Watch Getting Started About Norton Community WatchTurning off or turning on Norton Community Watch Security History windowAbout Norton Bootable Recovery Tool By inserting themselves or Program, boot sectorViruses Medium. Most viruses justDownloading the Norton Bootable Recovery Tool Wizard Getting Started About Norton Bootable Recovery ToolAll Programs Norton 360 Norton Recovery Tools Click Full System ScanUsing the Norton Bootable Recovery Tool About updating NortonClick Start Scan About LiveUpdate About Program and Definition UpdatesPerformance issue, or fix program errors. Program Program updates are usually created to extendOperating system or hardware compatibility, adjust a Updates are released on an as-needed basisNorton Internet Security, Norton In addition to the virus Files and definition About Smart DefinitionsProducts receive Complete SetTurning off or turning on Smart Definitions Turning off or turning on Automatic LiveUpdate Antivirus Antispyware and Updates. You can alsoLiveUpdate option Checking for updates manuallyFrom Quick Controls in the Settings window Checking for the latest virus and spyware definitions dateAbout keeping your protection up to date Installed on your Software no longer functions Computer About Pulse UpdatesObtain updates of any kind Cannot obtain updates of any kindAbout Network Proxy Settings Turning off or turning on Pulse UpdatesPage Page Configuring Network Proxy Settings NetworkProxySettings row, click ConfigureAbout Norton 360 status Network Proxy Settings window, do the followingNetworkProxySettings window, click Apply Getting Started About Norton 360 statusResponding to security status indicators Icon with a green check Issues against your computerAbout the Norton 360 icon Mark badge Is fully protected Icon with an orangeOpen Norton Status, or access otherAbout Norton 360 shortcut menu Run QuickScanViewing details of protection features Page Getting Started About Norton 360 status Monitoring your Systems Performance About System InsightPage Accessing the Performance window To view the details of the Files of InterestAbout monitoring system activities Details includeDate On that date. You can click Monitoring your systems performanceTotal number of downloads Details about the downloadedViewing details of your system activities Monitoring your systems performance About System InsightAlerts Quick Scans About performance alerting You can use the Resource Threshold Profile for Click Settings Administrative SettingsTurn off the Performance Alerting option Profile for AlertingThreshold limit Configuring performance alertsOff System resource usageLog Only Configuring the resource threshold profile Click Apply and then click Close Power option On battery power. By default, this option is turned onTo turn off the Use Low Resource Profile On Battery Excluding programs from performance alertsClick OK Settings window, click Apply Click Close Removing programs from Program ExclusionsProgram Exclusions window, click Apply About System Insight Click OK Settings window, click Close About CPU graph and memory graphViewing the CPU graph and memory graph Obtaining historical data of your CPU and memory usage Identifying resource-consuming processesTo view the memory graph, click the Memory tab About optimization Optimizing your boot volume About the Idle Time Optimizer About the Norton Tasks Turning off or turning on Idle Time OptimizerPage Updates every hour By default, AutomaticLiveUpdate checks for Backing up DefaultSetInternet Explorer History To identify the new threatsResolves it Pulse Updates provide Pulse Updates check forDefinition updates every five Updates during the fullIdentity Safe Maintenance Performs background Windows Registry CleanerCause errors AntiSpam Maintenance Performs backgroundMonitoring background jobs of Norton About Power Source Configuring the Power Source External and Battery About Norton InsightExternal Monitoring your systems performance Whitelist technique Symantec rates the file as TrustedNorton Community Norton TrustedViewing the files using Norton Insight All Running Processes Point in time when youWhen you start your On your computer at thatFile Insight window Scan when you configureUser Trusted Files This category does not listChecking the trust level of a file File Insight window, click Check Trust Now Configuring the Scan Performance Profiles Full Scan Standard Trust High Trust About Monthly Report Account windowIs protected from Backup & TuneupBackup and PC Tuneup Spyware from whichViewing the Monthly Report 101Monitoring your systems performance About System Insight Maintaining total Protection About total protectionAbout keeping your computer secure Page About solving connection problems About responding to emergenciesMaintaining total protection About monitoring protection features About Security HistoryPage Page Viewing items in Security History Page Certain recent security Recent HistoryDays. It lists the history EventsHas detected and then Resolved Security RisksWindow displays a list Repaired, quarantined, orAvailable through LiveUpdate Have taken to trust or to Trust or restrict settings forNetworks that your Restrict networksMaintaining total protection LiveUpdate to obtain Identity Various features Identity Safe help youDownloads when you run Download InsightMaintaining total protection Can use Metered NetworkAmount of network Provides details aboutMaintaining total protection File Cleanup File Cleanup feature Registry Cleanup Windows registry canComputer and cleans any Improve data access timeMaintaining total protection About the Security History Advanced Details window Activity Security risks are HighMedium, Low, and Info By NortonActions Actions options Page About the File Insight window Or blocked Files that Norton 360 repairsCategory mostly includes Resolved security risks onMaintaining total protection File is Installed NortonDetails Stability ratings of a fileCopy to Clipboard Locate Lets you locate the file on Your computerTop of the window ClipboardRestore About the Threat Detected windowQuarantined to the original Searching in Security History Exporting or Importing Security History information Click GoSecurity History window, click Import Managing items in the Quarantine Page Security risk Detected viralNon-viral threats Some cases, NortonAdding an item to the Quarantine Restoring an item from the QuarantineDetails pane, click Restore & Options Removing an item from the QuarantineClick Restore & Options Manually submitting an item to SymantecAbout viewing details of system vulnerabilities About Vulnerability ProtectionDialog box that appears, click OK Viewing the list of vulnerable programs Viewing details about a vulnerable application VulnerabilityProtection window, click Close Page Scanning your Computer About the Norton 360 scansSettings window Computer usingWhen the Insight Protection Computer ScanScanning your computer About the Norton 360 scansAbout Computer Scan Scanning your computer About Computer Scan153 Disk optimization tasks Optimizes your disk volumeRunning a Quick Scan Data, frees disk space,155 Skip Skips the current scan Cancel Terminates a Quick ScanRunning a Full System Scan PauseScanning selected drives, folders, or files Scanning your computer About Computer ScanPause Suspends a custom scan Temporarily About the Results Summary window157 Stop Terminates the scan Click Yes to confirmAbout the Threats Detected window About custom scans Creating a custom scan159 Selecting the scan items Scan Name boxConfiguring the scan options 161To add files, click dialog box, select then click Add Editing a custom scan Running a custom scanDeleting a custom scan 163Stop Terminates a custom scan Click Yes to confirm About scheduling scans Scheduling a scan165 Scheduling a Full System Scan Scheduling a Quick Scan Editing a scheduled scan167 About Insight Network scan Scanning your computer About Insight Network scan Click GoTurning off or turning on Insight Protection About Reputation Scan Scanning your computer About Reputation Scan171 Dynamic link library files DrvDLL files .loc 173 Unsafe To the fileFile is neither safe nor Poor Symantec has a few175 Running a Reputation Full System ScanRunning a Reputation Quick Scan NortonReputationScan window, click CloseRunning a Reputation custom scan Reputation Custom Scan window, do one of the followingAbout the Reputation Scan results 177File in the File Insight File NameFile type WindowScanning your computer Scanning your computer About Reputation Scan Scanning your computer About Scan Facebook Wall Scanning your computer About Scan Facebook WallPage Scanning your Facebook Wall About Sonar Protection Request for permission page, click AllowTurning off or turning on Sonar Protection About Real Time ExclusionsSecurity Risks category in the Security History Intelligence Detection Configure Excluding security threats from scanningAbout Signature Exclusions About scanning Office documents Adding items to the Signature ExclusionsSignature Exclusions window, click Add Turning on or turning off Microsoft Office Automatic Scan Duration using Silent Mode About Silent ModeSilent Mode Norton 360 allows you to MicrosoftOfficeAutomaticScan row, do one of the followingScanning your computer About Silent Mode About the Silent Mode that you turn on manually Turning on or turning off Silent Mode manually193 Scanning your computer About Silent Mode About the Silent Mode that turns on automatically 195Turning off or turning on Full Screen Detection About Quiet Mode Settings window, click Apply Click Close197 Following table explains about the various options Scanning your computer Turning off or turning on the Quiet Mode options About User-Specified Programs 201Adding programs to User-Specified Programs Quiet Mode Programs window, click Add Removing programs from User-Specified Programs203 Time Protection Aggressive About boot time protectionTurns off boot time protection NormalScanning your computer Running a scan at the command prompt Running a scan at the command promptConfiguring boot time protection Aggressive Normal OffScans only the boot Boot recordBoot record scanning Window only when a\Program Files\Norton 360\Engine\version\NAVW32 pathfilename Scanning your computer Running a scan at the command prompt What to do if a security risk is found About detecting viruses, spyware, and other risks Reviewing Auto-Protect notifications Full History Review all Recent History Review Auto-Protect Notifications that youDays Security threatsPage Security risk to From future scanNorton 360 adds Appropriate exclusionsRisks that are manually Manual removalThis option is also QuarantinedAbout actions when Norton 360 cannot repair a file About responding to risks detected during a scanSubmit to Symantec Sends the security risk to Symantec Infected files Page About Norton 360 alerts and messages About managing messages and alertsYou might see messages in the following locations Types of risks Understanding alerts and messages Types of risksTypes of threats Understanding alerts and messages Types of threatsTypes of viruses Understanding alerts and messages Types of viruses Doing routine Tasks Turning on or turning off automatic tasksLiveUpdate Downloads the latest UpdatesAbout custom task Running custom tasks Doing routine tasks 227 About custom taskAbout scheduling automatic tasks Scheduling security and performance scansSettings window, click Tasks Scheduling Doing routine tasksAbout scheduling backups You have the following backup scheduling optionsSpecifying Idle Time Out duration Doing routine tasks Specifying Idle Time Out duration Keeping secure on Internet About the Smart FirewallTurning off or turning on Smart Firewall Port scans Intrusions235 About the Smart FirewallSmart Firewall uses two kinds of firewall rules About firewall rulesAbout the order in which firewall rules are processed Outgoing network trafficAbout Traffic rules 237Icmp messages provide status and control information Keeping secure on the Internet About the Smart Firewall About Program rules 239Lets the firewall Access settingsUse Firewall settings Manages the list First time that users runAdding a program to Firewall settings Block Accesses the InternetBy this program Criteria for a ruleRemoving a program You can remove programs from Firewall settings if necessaryCustomizing a program 243Click Remove Confirmation dialog box, click Yes Firewall settings automatically create mostAdding Traffic rules and Program rules If necessaryUsing the Add Rule Wizard 245Traffic rule with When you selectThis type Following criteria all247 MonitorActivities category in the Security History window Keeping secure on the Internet About the Smart Firewall Keeping secure on the Internet About the Smart Firewall 251 Only the computers and sites listed belowProtocol Only when you add aTransmission Control TCP and UDPSelect the ports for the rule. Your options are All Rule applies to all Supported protocolsModifying Traffic rules and Program rules Click NextChanging the order of firewall rules Turning off a Traffic rule temporarily Allowing a blocked program 257Click More Details Advanced user. Removing a default firewall rule can Removing a firewall ruleTo remove a Traffic rule 259 Encounter network connection problemsAbout Norton Firewall Diagnosis Norton Firewall Diagnosis is available only in WindowsAbout Intrusion Prevention Turning off or turning on Intrusion Prevention notifications 261Excluding or including attack signatures in monitoring Intrusion Signatures window, click OKTurning off or turning on AutoBlock Unblocking AutoBlocked computers To turn off Intrusion AutoBlock, click Off265 Under the Action column, select Restrict Click OKTurning off and turning on Browser Protection About Intrusion Prevention exclusion listComputer, AutoBlock stops all access requests from From all the devices that access your computerTrust. You can configure the trust level of a device Purge the saved exclusion list. When you purgeKeeping secure on the Internet About Intrusion Prevention About Download Insight Click the Intrusion and Browser Protection tabYour computer. By default Auto-Protect allowsExecution of the safe files About Download Insight Run this program Cancel runTurning off or turning on Download Intelligence ProgramConfiguring the Download Insight Notifications option 273Keeping secure on the Internet About Download Insight Configuring the Download Insight Full Report option 275You can use the following options to configure Download Insight Full ReportKeeping secure on the Internet Keeping secure on the Internet About Download Insight About Norton AntiSpam Turning on or turning off Alert on Poor StabilityKeeping secure on the Internet About Norton AntiSpam About spam filtering features AntiSpam category in the Security History windowConfiguring Client Integration Keeping secure on the Internet About Norton AntiSpamNortonAntiSpam drop-down list or the options to To open the Settings window to configureNorton AntiSpam settings. If your email program does Classify the email messages as spam or legitimate. YouAbout your email program toolbar 285 About Norton AntiSpam You can use the following optionsExclusions list Setting Address Book ExclusionsNot add the domain name to the Address Book Import the address book. Add all email addresses toIdentifying authorized senders Address Book Exclusions listDomain Identifying senders of spam 289Domain Setting the Feedback option About Web Query Click Apply Click CloseTurning off or turning on Web Query To turn off the Web Query filter About configuring POP3 and Smtp portsSymantec recommends you to keep the Web Query Increases your exposure to the spam email messagesProtected Ports Configure Adding POP3 and Smtp ports to Protected PortsAbout Metered Broadband Mode Removing an email port from Protected PortsNo Limit Turning off or turning on Metered Broadband ModeCritical Updates Only No TrafficBroadband Mode Defining the Internet usage of NortonCritical Updates Only Keeping secure on the Internet About Metered Broadband Mode About securing your sensitive data About Safe SurfingAbout Antiphishing Turning off or turning on Antiphishing Reporting an incorrect evaluation of a Web site About Norton Safe Web View the community rating Status, Norton Safe Web lets you do the followingView the Norton rating Add your reviewsSite is VeriSign trusted and is Norton SecuredNext to the search results Safe to visitSite is Unsafe That you can have a safeShopping experience Securing your sensitive data Searching the Web using Norton Safe Search Turning off or turning on Norton Safe WebUnsafe Site Filter Using Norton Safe Search, itSearch results. When you Search resultsErase Search History About Identity Safe Norton Safe Search Safe Web indicatorNorton menu Identity Safe menuAbout setting up Identity Safe Settings window for Identity Protection Turning off or turning on Identity SafeAbout Identity Safe vaults Data from your portable profile. You can merge About creating Identity Safe vaultsToolbar provides option to merge the Identity Safe Data from the portable profile to your local vault orPage IdentitySafeSetupSuccessful window, click Done Check Store information online through your Norton AccountTo your Norton Account to create an online vault. Identity Safe data is stored online using your NortonVault to save your Identity Safe data. You must log AccountProvides a convenient means to automatically Computers using your Norton AccountVault without depending on any external drive Synchronize Identity Safe data across differentIdentity Safe data from any computer that has Norton InstalledWhen you merge the data from local vault to online You can merge the Identity Safe data from your localData from the portable profile to local vault or online Deleting local vault and online vaultYou can merge that portable profile to local vault or VaultSet up Identity Safe Resetting Identity Safe Accessing Identity Safe From the Norton ToolbarProduct expires Logging in to and logging out of Identity Safe You must be logged in to Identity Safe to accessIdentity Safe features. The Identity Safe features are Supported only in the Internet Explorer, Firefox, orPage Configuring Identity Safe settings Page Page Securing your sensitive data When you import the Identity Edit Notes Export DataFrom the portable profile that About Edit logins Saving logins Expires, you cannot save or add any new logins Norton Toolbar to view the loginsYou can only view your saved logins after Norton When you try to save a login after the product expiresEditing logins Norton ToolbarThen click Manage Identity Protection Under Identity Safe, in the Edit Logins row, click Configure URL Under Identity Safe, in the Edit Logins row, click Configure Under Identity Safe, in the Edit Logins row, click Configure Updating the password for a login Savenewpasswordforlogin? menu bar, click SaveAbout Edit Cards For autofill. You can choose a card from the list to fill Adding cardsThat steal and misuse your identity Forms automaticallyPage Editing, deleting, or duplicating cards Click Save Click CloseUnder Identity Safe, in the Edit Cards row, click Configure Click Edit CardClick Delete Card About Edit NotesEditing Notes Click Duplicate CardUnder Identity Safe, in the Edit Notes row, click Configure Click Delete NotesAbout exporting and importing Identity Safe data Exporting your Identity Safe dataImporting your Identity Safe data Local Profile Backup FileAbout Browsing Options Merge with existing data Replace existing dataAbout Password & Security Password and set a new Password hint usingPassword Security Ask for my password before filling out a login or form You can select 15, 30, or 45 minutes Suspended stateChanging the Identity Safe password Password & Security window, click Change PasswordAbout Norton Toolbar Page Allow in incognito Browsing or downloadHistories Allow access to file URLs Lets you view the URL Hiding and showing the Norton ToolbarCheck Norton Toolbar to show the toolbar Accessing Identity Safe settings from the Norton Toolbar Click Enable to show the toolbarWrench icon. However, you cannot enable Page Configure the Identity Safe Web indicators remainSettings Lets you open theIdentity Report Site Lets you report to SymantecPage Install Norton 360 and open Search/ Disable Norton Search box Safe SearchBy default, the Norton Safe Choose to enable or disableAccessing the Identity Safe menu Settings window using the Identity Safe menuAll Logins Recently Used Logins Lets you view the listLatest five logins that you Merge Portable DataOptions Data online Problems that you Autofill the loginReport Issue Lets you open the Norton Feedback Web site List of problems or you canLets you log out of or log in to Identity Safe Page About the Network Security Map Viewing devices on the Network Security Map MY PCRun LiveUpdate. You can either allow the Norton Norton 360 requires you to configure the SymantecCannot install the Symantec Security Driver when you LiveUpdate to complete or close the Norton LiveUpdatePage For a computer, the Network NetBIOS name by defaultDevice Name Security Map displaysProtecting your home network About the Network Security Map Turning off or turning on Network Security Overview OfflineSetting up Remote Monitoring You open Network Security MapOverview window NetworkSecurityMap row, click Configure Remote Monitoring Setup window, type a PasskeyTurning off Remote Monitoring Adding a device to the Network Security MapNetworkSecurityMap row, click Configure Finding a computers IP address Click Add DeviceIPv4 address 172.16.0.0 IPv6 address Editing device details Device details section, next to Device Name, click Edit EditDeviceDetails window, in the Name box, type a new nameNetwork map, select a device that you added Editing network details Changing the trust level of your network and devicesDevices that you individually trust or restrict To all the devices that are connected to that networkHowever, Norton 360 does not change the trust level A network, Norton 360 assigns the same trust levelPage Allowed through firewall You should select this settingComputer receives from a However, known attacksRestricted Restricted listExcluding a device from Intrusion Prevention scan Page Removing devices from the Network Security Map Edit Device Trust Level window, click Full TrustExclude from IPS Scanning dialog box, click Yes to confirm Viewing the status of your wireless network Under NetworkSecurityMap, in the NetworkMap row, click PurgeNetwork Security Map row, click Configure Viewing the device detailsModifying the communication port for Network Security Map Page Keeping your PC 11 tuned up About PC TuneupAbout disk and file fragmentation Optimizing your permanent disks manuallyKeeping your PC tuned up About disk and file fragmentation About using optimization efficiently About cleaning up disk clutter Keeping your PC tuned up About cleaning up disk clutterRunning a scan to clean up disk clutter Running a scan to clean up disk clutterKeeping your PC tuned up Running Registry Cleanup Running Diagnostic ReportWhen the Norton Community Watch option is turned on About Startup ManagerWatch on Disabling or enabling startup items Managing startup items 409Keeping your PC tuned up About Startup Manager About Norton Backup and Restore Protecting your 12 media and dataAbout backups Protecting your media and data About backupsAbout backup preparation Page 415 WhereProtecting your media and data About backup preparation About backup set Protecting your media and dataOption is available Configure the MeteredBroadbandMode option Creating a new backup setOption is available in the Settings window You can do the following tasksModifying or renaming a backup set 419About backup file categories 421 Protecting your media and data About backup set MusicProtecting your media and data Video Protecting your media and data About backup file extensions Category Edit the file extension Click OK Click Save Removing a file extension from a backup category Resetting a backup category to default file extensions429 Summary tab Where tab Deleting previously backed up files431 Delete Backup Set window, select one of the followingOn the Where tab, click Delete Backed up Files Click Delete SelectedFiles and folders Adding files and folders to a backup setMetered Broadband Mode option in the My On the What tab, click Add or exclude files and foldersExcluding files and folders from a backup set 433On the What tab, click Add or exclude files and folders About backup locations 435Protecting your media and data About backup set 437 Fastest recommended High usage Moderate usage Low usageProtecting your media and data About backup set 439 CD, DVD, or Blu-ray discsWhen you select the CD or the DVD Drive as the backup BD-RPC is connected to a local Install the optical driverNetwork drive Network that offers a storageChoosing a backup location Installing optical backup driver Click Save Settings443 Viewing or changing a backup schedule Deleting a backup set Backing up your files Restoring files Folders by using Restore FromBackup sets to restore Backup file categoriesClick Restore Files Choosing where to restore files from Restore Files window, under Restore From, click View AllSelecting files to restore 451Those files to restore Backup setRestore files by searching As asterisks * or questionChoosing a restore destination 453About Norton 360 Autorun Restore Restoring files by using Norton 360 Autorun Restore About Norton Backup Drive Click Restore SelectedCustom Location 457 Viewing backup files on the Norton Backup Drive Deleting a file from a backup set on the Norton Backup Drive 459About solutions to the backup problems Page If you use automatic or That cannot store filesLarge files to back up Sure that the externalGetting additional help with backup problems Backing up to your Secure Online StorageAbout online backup considerations Settings windowSpeed limitations Fastest recommended High usage Moderate usage Low usage About online backup activation Purchasing more online storage space Turning off or turning on backup Page Turning off or turning on backup setting options Up the file during idle timePage Page Page Customizing 13 settings About Norton 360 SettingsAntivirus Specify how certain types Unwanted online contentYou can configure Norton Other threats, are handledCustomizing settings Customizing settings About Norton 360 Settings Backup Turns on or turns off Backup Silent ModeWeb features Your specified settingsCustomizing Norton 360 Settings Customizing settings Customizing Norton 360 SettingsTurning on or turning off Quick Controls services About Antivirus settings Customizing settings About Antivirus settingsAutomatic Protection Settings let you control Scans and Risks You can use the following Scans and Risks options Customizing settings About Antivirus settings Customizing settings About Antivirus settings Customizing settings About Antivirus settings About Automatic Protection settings Auto-Protect Customizing settings About Antivirus settings Customizing settings About Antivirus settings Sonar Protection Remove Risks if I Am Away This option lets Norton Sonar Protection includes the following optionsAbout Scans and Risks settings Computer Scans Customizing settings About Antivirus settings Customizing settings About Antivirus settings Number of Threads for Manual Scan Scan Performance You must configureConfigure a scan that ProfilesCustomizing settings Exclusion / Low Risks Items to Exclude from Auto-Protect and Sonar Detection About Antispyware and Updates settings Antispyware Antispyware options let you Instant messenger scansAbout Firewall settings Customizing settings About Firewall settingsNetwork traffic to Firewall featuresPages According to the generalAvailable on this tab to Intrusion and BrowserIntelligence option that is Protect your computerAbout Firewall General settings Configured Default stateFirewall rules and settings are If you reset the firewallAbout the Intrusion and Browser Protection settings About Smart Firewall Advanced settings Program Launch That launch Internet-enabledProgram Component That attach to safe programsCode into an applications Direct Network AccessCode Injection Monitors the Trojan horses or Process without triggeringAbout Norton AntiSpam settings Customizing settings About Norton AntiSpam settingsAbout Filter settings About Client Integration settings Integration tab Lets you send feedback about the misclassified emailAbout My Network settings Network When the Remote Monitoring isTrust Control Trust Control is a special networkAbout backup settings Customizing settings About backup settingsYou can use the Configure Manage BackupWhen to back up your Important filesCustomizing settings About Identity Protection settings Customizing settings About Identity Protection settingsProvide annoying results VisitIs unsafe to visit Grey question markManage your All of your login Fill forms Feature Description Advice Edit Cards Lets youPersonal You store Information Cards to do ProvideAbout Task Scheduling settings Customizing settings About Task Scheduling settingsAutomatically when your Automatic TasksSecurity and PC Tuneup Scheduling Manual Schedule You can run the tasks manually About Administrative Settings Customizing settings About Administrative SettingsCustomizing settings Customizing settings About Administrative Settings Customizing settings About Administrative Settings Performance Monitoring Customizing settings About Administrative Settings Customizing settings About Administrative Settings Use Low Resource Profile On Battery Power Disk High-Usage Alert forMemory HandlesAlerts Power Saving ModeBackground jobs when your Get performance alertsBy default, this option is Non-Admins Access toLets you access Settings window ifSilent Mode Settings Quiet Mode on Detection Media Center TV RecordingCustomizing settings About Administrative Settings Minutes It does not delay NortonProtection. You can specify Idle Time OutFirefox History Cleanup About Norton Product Tamper ProtectionBrowser Turning off or turning on Norton Product Tamper Protection About securing Norton 360 Settings using a password Password option in the Select your UninstallSecuring your Norton 360 Settings using a password Settings Password Protection row, click ConfigureTurning off Norton 360 Settings password Resetting your Norton 360 Settings passwordSelect Uninstall Preference window Select Uninstall Preference window only if To reset your Norton 360 Settings passwordGeneral Product Security Finding additional14 solutions Finding the version number of your productFinding the End-User License Agreement About upgrading your productDouble-clickProgram Files Norton 360 MUI version 09 Finding additional solutions About upgrading your product Firefox version 3.6 or later Available and install new version of the productChecking for a new version of the product Internet connection to check if a new version isAbout Norton Autofix Solving a problem using Norton Autofix Staying informed about protection issues Checking Your Connection window, click RetryAbout Support About Norton Support Web site Using the Norton Support Web site About phone support Getting support by phoneCountries Support policyAbout keeping your subscription current To get support by phoneWorldwide service and support ClubNorton565 Uninstalling Norton PanelTo uninstall Norton 360, click Next 567Passwords, and preferences for Index Backup Page Page Page Internet temporary files 227 Page Page Product password protecting 550 product status Page Index Submission, items to Symantec Index Page Page Foo

11022527 specifications

Symantec 11022527 is a robust and versatile security solution designed to protect enterprises from a variety of cyber threats. As part of the broader Symantec Endpoint Protection (SEP) family, this product is engineered to deliver comprehensive security features tailored for organizations of all sizes.

One of the primary features of Symantec 11022527 is its advanced threat detection capabilities. Leveraging a combination of signature-based and behavior-based detection methods, the solution effectively identifies known and unknown threats, including malware, ransomware, and phishing attempts. This dual approach allows for enhanced protection in an ever-evolving threat landscape, ensuring that organizations can stay one step ahead of cybercriminals.

Another salient characteristic of Symantec 11022527 is its integrated firewall. The firewall functions to monitor incoming and outgoing network traffic, establishing a barrier between trusted internal networks and untrusted external networks. This is particularly crucial for preventing unauthorized access to sensitive corporate data, safeguarding intellectual property, and reducing the risk of data breaches.

In addition to these features, Symantec 11022527 incorporates machine learning and artificial intelligence technologies. These capabilities enable the solution to analyze vast amounts of data to identify anomalous behaviors and potential threats in real time. By automating the detection process, organizations can respond more rapidly to incidents, minimizing potential damage and downtime.

The solution also boasts a user-friendly management console, which streamlines deployment and management across multiple endpoints. This console allows administrators to push updates, manage security policies, and run reports with ease, promoting efficiency within IT teams. The centralized control helps ensure that security measures are consistently applied across the enterprise, thereby enhancing the overall security posture.

Moreover, Symantec 11022527 supports cloud-based deployment, which offers flexibility and scalability for businesses. This allows organizations to extend their security coverage without requiring extensive on-premises infrastructure, making it ideal for hybrid and remote work environments.

In summary, Symantec 11022527 stands out due to its advanced threat detection, integrated firewall, machine learning capabilities, user-friendly management console, and cloud-based deployment options. These features make it a powerful tool for organizations seeking to enhance their cybersecurity defenses and protect against the dynamic threats that characterize today’s digital landscape.