Symantec 11022527 manual Protects your computer. Scanning every request, Speed of your computer

Page 267

Keeping secure on the Internet 267

 

About Intrusion Prevention

 

computer. When a device on your network requests

 

access to your computer, Intrusion Prevention scans

 

this request to ensure that it is not a virus attack. If

 

the information matches an attack signature, Intrusion

 

Prevention blocks the traffic from the suspicious device

 

and protects your computer. Scanning every request

 

from all the devices that access your computer

 

increases the scan time which slows down the network

 

speed of your computer.

 

If you are sure that a device on your network is safe,

 

you can change the trust level of the device to Full

 

Trust. You can configure the trust level of a device

 

using the Network Security Map. You can exclude these

 

trusted devices from Intrusion Prevention scan.

 

Excluding Full Trust devices from the Intrusion

 

Prevention scan saves the scan time and improves the

 

network speed of your computer. When you exclude a

 

device that is set to Full Trust, Norton 360 does not

 

scan any information that is received from this device.

 

The Full Trust devices that are excluded from Intrusion

 

Prevention scan are added to Intrusion Prevention

 

exclusion list.

 

When a device on your network attempts to infect your

 

computer, AutoBlock stops all access requests from

 

this device. If you add this device to the Intrusion

 

Prevention exclusion list, Norton 360 removes the

w

device from the exclusion list.

Ensure that the IP address of the devices that are added

 

to Intrusion Prevention exclusion list never changes.

 

If you find that any of the devices that you excluded

 

from the Intrusion Prevention scan is infected, you can

 

purge the saved exclusion list. When you purge the

 

exclusion list, Norton 360 removes all the trusted

 

devices from the exclusion list.

Image 267
Contents Product Manual Norton 360 Product Manual Contents Chapter Responding to security issues Chapter Understanding alertsChapter Keeping secure on the Internet Chapter Protecting your media and data Chapter Securing your sensitive dataChapter Protecting your home network Chapter Keeping your PC tuned up553 Chapter Finding additional solutionsThis chapter includes the following topics About NortonGetting Started About Norton FeaturesRestore capability About Norton 360 main windowGetting Started SettingsProduct features Account Lets you access the MySupport Lets you access support Options, product upgrade You can also accessPage Activity Map Getting Started About Norton Use your existing Norton Manage Lets you access Norton ManagementInstalled on all of your Management, clickOnline Family Getting Started About Norton Getting Started About Norton Safe Web You can also use the View recent Norton Safe Web Getting Started Activation protects you Activation protects youActivating Norton Administrative Settings Network Proxy Settings Configure Where to find your product keyIf you received a product key card Locations of the product key are as followsAbout problems during activation About your Norton AccountGetting Started About your Norton Account Page Own Version using Norton UpdateProducts Norton products that youInformation and your billing Orders. After you updateClick Update to save Change PasswordOther disasters Norton Update CenterImportant data against System crash, accidentalCreating a Norton Account Accessing your Norton Account To access Norton Account Creating a temporary password for Norton AccountYou can also change your Norton Account password Internet to access your Norton AccountGetting Started About Norton Community Watch About Norton Community WatchSecurity History window Turning off or turning on Norton Community WatchAbout Norton Bootable Recovery Tool Medium. Most viruses just Program, boot sectorViruses By inserting themselves orGetting Started About Norton Bootable Recovery Tool Downloading the Norton Bootable Recovery Tool WizardClick Full System Scan All Programs Norton 360 Norton Recovery ToolsUsing the Norton Bootable Recovery Tool About updating NortonClick Start Scan About Program and Definition Updates About LiveUpdateUpdates are released on an as-needed basis Program updates are usually created to extendOperating system or hardware compatibility, adjust a Performance issue, or fix program errors. ProgramNorton Internet Security, Norton In addition to the virus Complete Set About Smart DefinitionsProducts receive Files and definitionTurning off or turning on Smart Definitions Antivirus Antispyware and Updates. You can also Turning off or turning on Automatic LiveUpdateChecking for the latest virus and spyware definitions date Checking for updates manuallyFrom Quick Controls in the Settings window LiveUpdate optionAbout keeping your protection up to date Cannot obtain updates of any kind About Pulse UpdatesObtain updates of any kind Installed on your Software no longer functions ComputerTurning off or turning on Pulse Updates About Network Proxy SettingsPage Page NetworkProxySettings row, click Configure Configuring Network Proxy SettingsGetting Started About Norton 360 status Network Proxy Settings window, do the followingNetworkProxySettings window, click Apply About Norton 360 statusResponding to security status indicators Mark badge Is fully protected Icon with an orange Issues against your computerAbout the Norton 360 icon Icon with a green checkRun QuickScan Status, or access otherAbout Norton 360 shortcut menu Open NortonViewing details of protection features Page Getting Started About Norton 360 status About System Insight Monitoring your Systems PerformancePage To view the details of the Files of Interest Accessing the Performance windowAbout monitoring system activities Details includeDate Details about the downloaded Monitoring your systems performanceTotal number of downloads On that date. You can clickViewing details of your system activities Monitoring your systems performance About System InsightAlerts Quick Scans About performance alerting Profile for Alerting Click Settings Administrative SettingsTurn off the Performance Alerting option You can use the Resource Threshold Profile forSystem resource usage Configuring performance alertsOff Threshold limitLog Only Configuring the resource threshold profile Click Apply and then click Close Excluding programs from performance alerts On battery power. By default, this option is turned onTo turn off the Use Low Resource Profile On Battery Power optionClick OK Settings window, click Apply Click Close Removing programs from Program ExclusionsProgram Exclusions window, click Apply About CPU graph and memory graph About System Insight Click OK Settings window, click CloseViewing the CPU graph and memory graph Obtaining historical data of your CPU and memory usage Identifying resource-consuming processesTo view the memory graph, click the Memory tab About optimization Optimizing your boot volume About the Idle Time Optimizer Turning off or turning on Idle Time Optimizer About the Norton TasksPage Backing up DefaultSet By default, AutomaticLiveUpdate checks for Updates every hourInternet Explorer History To identify the new threatsResolves it Updates during the full Pulse Updates check forDefinition updates every five Pulse Updates provideAntiSpam Maintenance Performs background Windows Registry CleanerCause errors Identity Safe Maintenance Performs backgroundMonitoring background jobs of Norton About Power Source Configuring the Power Source External and Battery About Norton InsightExternal Monitoring your systems performance Whitelist technique Norton Trusted TrustedNorton Community Symantec rates the file asViewing the files using Norton Insight On your computer at that Point in time when youWhen you start your All Running ProcessesThis category does not list Scan when you configureUser Trusted Files File Insight windowChecking the trust level of a file File Insight window, click Check Trust Now Configuring the Scan Performance Profiles Full Scan Standard Trust High Trust Account window About Monthly ReportSpyware from which Backup & TuneupBackup and PC Tuneup Is protected from101 Viewing the Monthly ReportMonitoring your systems performance About System Insight About total protection Maintaining total ProtectionAbout keeping your computer secure Page About responding to emergencies About solving connection problemsMaintaining total protection About Security History About monitoring protection featuresPage Page Viewing items in Security History Page Events Recent HistoryDays. It lists the history Certain recent securityRepaired, quarantined, or Resolved Security RisksWindow displays a list Has detected and thenAvailable through LiveUpdate Restrict networks Trust or restrict settings forNetworks that your Have taken to trust or toMaintaining total protection Download Insight Identity Various features Identity Safe help youDownloads when you run LiveUpdate to obtainMaintaining total protection Provides details about Metered NetworkAmount of network Can useMaintaining total protection Improve data access time Registry Cleanup Windows registry canComputer and cleans any File Cleanup File Cleanup featureMaintaining total protection About the Security History Advanced Details window By Norton Security risks are HighMedium, Low, and Info ActivityActions Actions options Page About the File Insight window Resolved security risks on Files that Norton 360 repairsCategory mostly includes Or blockedMaintaining total protection Stability ratings of a file Installed NortonDetails File isClipboard Locate Lets you locate the file on Your computerTop of the window Copy to ClipboardRestore About the Threat Detected windowQuarantined to the original Searching in Security History Click Go Exporting or Importing Security History informationSecurity History window, click Import Managing items in the Quarantine Page Some cases, Norton Detected viralNon-viral threats Security riskRestoring an item from the Quarantine Adding an item to the QuarantineRemoving an item from the Quarantine Details pane, click Restore & OptionsManually submitting an item to Symantec Click Restore & OptionsAbout viewing details of system vulnerabilities About Vulnerability ProtectionDialog box that appears, click OK Viewing the list of vulnerable programs Viewing details about a vulnerable application VulnerabilityProtection window, click Close Page About the Norton 360 scans Scanning your ComputerComputer Scan Computer usingWhen the Insight Protection Settings windowAbout the Norton 360 scans Scanning your computerScanning your computer About Computer Scan About Computer Scan153 Data, frees disk space, Optimizes your disk volumeRunning a Quick Scan Disk optimization tasksPause Skip Skips the current scan Cancel Terminates a Quick ScanRunning a Full System Scan 155Scanning your computer About Computer Scan Scanning selected drives, folders, or filesStop Terminates the scan Click Yes to confirm About the Results Summary window157 Pause Suspends a custom scan TemporarilyAbout the Threats Detected window About custom scans Creating a custom scan159 Scan Name box Selecting the scan itemsConfiguring the scan options 161To add files, click dialog box, select then click Add Running a custom scan Editing a custom scanDeleting a custom scan 163Stop Terminates a custom scan Click Yes to confirm Scheduling a scan About scheduling scans165 Scheduling a Full System Scan Scheduling a Quick Scan Editing a scheduled scan167 Scanning your computer About Insight Network scan Click Go About Insight Network scanTurning off or turning on Insight Protection Scanning your computer About Reputation Scan About Reputation Scan171 Dynamic link library files DrvDLL files .loc 173 Poor Symantec has a few To the fileFile is neither safe nor UnsafeNortonReputationScan window, click Close Running a Reputation Full System ScanRunning a Reputation Quick Scan 175Reputation Custom Scan window, do one of the following Running a Reputation custom scan177 About the Reputation Scan resultsWindow File NameFile type File in the File InsightScanning your computer Scanning your computer About Reputation Scan Scanning your computer Scanning your computer About Scan Facebook Wall About Scan Facebook WallPage Scanning your Facebook Wall Request for permission page, click Allow About Sonar ProtectionTurning off or turning on Sonar Protection About Real Time ExclusionsSecurity Risks category in the Security History Excluding security threats from scanning Intelligence Detection ConfigureAbout Signature Exclusions About scanning Office documents Adding items to the Signature ExclusionsSignature Exclusions window, click Add Turning on or turning off Microsoft Office Automatic Scan MicrosoftOfficeAutomaticScan row, do one of the following About Silent ModeSilent Mode Norton 360 allows you to Duration using Silent ModeScanning your computer About Silent Mode About the Silent Mode that you turn on manually Turning on or turning off Silent Mode manually193 Scanning your computer About Silent Mode 195 About the Silent Mode that turns on automaticallyTurning off or turning on Full Screen Detection About Quiet Mode Settings window, click Apply Click Close197 Following table explains about the various options Scanning your computer Turning off or turning on the Quiet Mode options 201 About User-Specified ProgramsAdding programs to User-Specified Programs Quiet Mode Programs window, click Add Removing programs from User-Specified Programs203 Normal About boot time protectionTurns off boot time protection Time Protection AggressiveAggressive Normal Off Running a scan at the command promptConfiguring boot time protection Scanning your computer Running a scan at the command promptWindow only when a Boot recordBoot record scanning Scans only the boot\Program Files\Norton 360\Engine\version\NAVW32 pathfilename Scanning your computer Running a scan at the command prompt What to do if a security risk is found About detecting viruses, spyware, and other risks Reviewing Auto-Protect notifications Security threats Recent History Review Auto-Protect Notifications that youDays Full History Review allPage Appropriate exclusions From future scanNorton 360 adds Security risk toQuarantined Manual removalThis option is also Risks that are manuallyAbout actions when Norton 360 cannot repair a file About responding to risks detected during a scanSubmit to Symantec Sends the security risk to Symantec Infected files Page About managing messages and alerts About Norton 360 alerts and messagesYou might see messages in the following locations Understanding alerts and messages Types of risks Types of risksUnderstanding alerts and messages Types of threats Types of threatsTypes of viruses Understanding alerts and messages Types of viruses Turning on or turning off automatic tasks Doing routine TasksLiveUpdate Downloads the latest UpdatesAbout custom task Doing routine tasks 227 About custom task Running custom tasksScheduling security and performance scans About scheduling automatic tasksDoing routine tasks Settings window, click Tasks SchedulingYou have the following backup scheduling options About scheduling backupsSpecifying Idle Time Out duration Doing routine tasks Specifying Idle Time Out duration About the Smart Firewall Keeping secure on InternetPort scans Intrusions Turning off or turning on Smart FirewallAbout the Smart Firewall 235Outgoing network traffic About firewall rulesAbout the order in which firewall rules are processed Smart Firewall uses two kinds of firewall rulesAbout Traffic rules 237Icmp messages provide status and control information Keeping secure on the Internet About the Smart Firewall 239 About Program rulesFirst time that users run Access settingsUse Firewall settings Manages the list Lets the firewallAdding a program to Firewall settings Criteria for a rule Accesses the InternetBy this program Block243 You can remove programs from Firewall settings if necessaryCustomizing a program Removing a programIf necessary Firewall settings automatically create mostAdding Traffic rules and Program rules Click Remove Confirmation dialog box, click Yes245 Using the Add Rule WizardFollowing criteria all When you selectThis type Traffic rule withMonitor 247Activities category in the Security History window Keeping secure on the Internet About the Smart Firewall Keeping secure on the Internet About the Smart Firewall Only the computers and sites listed below 251TCP and UDP Only when you add aTransmission Control ProtocolAll Rule applies to all Supported protocols Select the ports for the rule. Your options areClick Next Modifying Traffic rules and Program rulesChanging the order of firewall rules Turning off a Traffic rule temporarily Allowing a blocked program 257Click More Details Advanced user. Removing a default firewall rule can Removing a firewall ruleTo remove a Traffic rule Norton Firewall Diagnosis is available only in Windows Encounter network connection problemsAbout Norton Firewall Diagnosis 259About Intrusion Prevention 261 Turning off or turning on Intrusion Prevention notificationsIntrusion Signatures window, click OK Excluding or including attack signatures in monitoringTurning off or turning on AutoBlock To turn off Intrusion AutoBlock, click Off Unblocking AutoBlocked computersUnder the Action column, select Restrict Click OK 265About Intrusion Prevention exclusion list Turning off and turning on Browser ProtectionPurge the saved exclusion list. When you purge From all the devices that access your computerTrust. You can configure the trust level of a device Computer, AutoBlock stops all access requests fromKeeping secure on the Internet About Intrusion Prevention Click the Intrusion and Browser Protection tab About Download InsightYour computer. By default Auto-Protect allowsExecution of the safe files About Download Insight Program Cancel runTurning off or turning on Download Intelligence Run this program273 Configuring the Download Insight Notifications optionKeeping secure on the Internet About Download Insight 275 Configuring the Download Insight Full Report optionDownload Insight Full Report You can use the following options to configureKeeping secure on the Internet Keeping secure on the Internet About Download Insight Turning on or turning off Alert on Poor Stability About Norton AntiSpamKeeping secure on the Internet About Norton AntiSpam AntiSpam category in the Security History window About spam filtering featuresKeeping secure on the Internet About Norton AntiSpam Configuring Client IntegrationClassify the email messages as spam or legitimate. You To open the Settings window to configureNorton AntiSpam settings. If your email program does NortonAntiSpam drop-down list or the options toAbout your email program toolbar About Norton AntiSpam You can use the following options 285Import the address book. Add all email addresses to Setting Address Book ExclusionsNot add the domain name to the Address Book Exclusions listAddress Book Exclusions list Identifying authorized sendersDomain 289 Identifying senders of spamDomain Setting the Feedback option Click Apply Click Close About Web QueryTurning off or turning on Web Query Increases your exposure to the spam email messages About configuring POP3 and Smtp portsSymantec recommends you to keep the Web Query To turn off the Web Query filterAdding POP3 and Smtp ports to Protected Ports Protected Ports ConfigureRemoving an email port from Protected Ports About Metered Broadband ModeNo Traffic Turning off or turning on Metered Broadband ModeCritical Updates Only No LimitDefining the Internet usage of Norton Broadband ModeCritical Updates Only Keeping secure on the Internet About Metered Broadband Mode About Safe Surfing About securing your sensitive dataAbout Antiphishing Turning off or turning on Antiphishing Reporting an incorrect evaluation of a Web site About Norton Safe Web Add your reviews Status, Norton Safe Web lets you do the followingView the Norton rating View the community ratingSafe to visit Norton SecuredNext to the search results Site is VeriSign trusted and isSite is Unsafe That you can have a safeShopping experience Securing your sensitive data Turning off or turning on Norton Safe Web Searching the Web using Norton Safe SearchSearch results Using Norton Safe Search, itSearch results. When you Unsafe Site FilterErase Search History About Identity Safe Identity Safe menu Safe Web indicatorNorton menu Norton Safe SearchAbout setting up Identity Safe Turning off or turning on Identity Safe Settings window for Identity ProtectionAbout Identity Safe vaults Data from the portable profile to your local vault or About creating Identity Safe vaultsToolbar provides option to merge the Identity Safe Data from your portable profile. You can mergePage Check Store information online through your Norton Account IdentitySafeSetupSuccessful window, click DoneAccount Identity Safe data is stored online using your NortonVault to save your Identity Safe data. You must log To your Norton Account to create an online vault.Synchronize Identity Safe data across different Computers using your Norton AccountVault without depending on any external drive Provides a convenient means to automaticallyYou can merge the Identity Safe data from your local InstalledWhen you merge the data from local vault to online Identity Safe data from any computer that has NortonVault Deleting local vault and online vaultYou can merge that portable profile to local vault or Data from the portable profile to local vault or onlineSet up Identity Safe Resetting Identity Safe Accessing Identity Safe From the Norton ToolbarProduct expires Supported only in the Internet Explorer, Firefox, or You must be logged in to Identity Safe to accessIdentity Safe features. The Identity Safe features are Logging in to and logging out of Identity SafePage Configuring Identity Safe settings Page Page Securing your sensitive data When you import the Identity Edit Notes Export DataFrom the portable profile that About Edit logins Saving logins When you try to save a login after the product expires Norton Toolbar to view the loginsYou can only view your saved logins after Norton Expires, you cannot save or add any new loginsEditing logins Norton ToolbarThen click Manage Identity Protection Under Identity Safe, in the Edit Logins row, click Configure URL Under Identity Safe, in the Edit Logins row, click Configure Under Identity Safe, in the Edit Logins row, click Configure Updating the password for a login Savenewpasswordforlogin? menu bar, click SaveAbout Edit Cards Forms automatically Adding cardsThat steal and misuse your identity For autofill. You can choose a card from the list to fillPage Click Save Click Close Editing, deleting, or duplicating cardsClick Edit Card Under Identity Safe, in the Edit Cards row, click ConfigureClick Duplicate Card About Edit NotesEditing Notes Click Delete CardClick Delete Notes Under Identity Safe, in the Edit Notes row, click ConfigureExporting your Identity Safe data About exporting and importing Identity Safe dataImporting your Identity Safe data Merge with existing data Replace existing data Backup FileAbout Browsing Options Local ProfileAbout Password & Security Password hint using Password and set a newPassword Security Ask for my password before filling out a login or form Suspended state You can select 15, 30, or 45 minutesPassword & Security window, click Change Password Changing the Identity Safe passwordAbout Norton Toolbar Page Allow in incognito Browsing or downloadHistories Allow access to file URLs Lets you view the URL Hiding and showing the Norton ToolbarCheck Norton Toolbar to show the toolbar Accessing Identity Safe settings from the Norton Toolbar Click Enable to show the toolbarWrench icon. However, you cannot enable Page Report Site Lets you report to Symantec Web indicators remainSettings Lets you open theIdentity Configure the Identity SafePage Choose to enable or disable Search/ Disable Norton Search box Safe SearchBy default, the Norton Safe Install Norton 360 and openSettings window using the Identity Safe menu Accessing the Identity Safe menuMerge Portable Data Recently Used Logins Lets you view the listLatest five logins that you All LoginsOptions Data online List of problems or you can Autofill the loginReport Issue Lets you open the Norton Feedback Web site Problems that youLets you log out of or log in to Identity Safe Page About the Network Security Map MY PC Viewing devices on the Network Security MapLiveUpdate to complete or close the Norton LiveUpdate Norton 360 requires you to configure the SymantecCannot install the Symantec Security Driver when you Run LiveUpdate. You can either allow the NortonPage Security Map displays NetBIOS name by defaultDevice Name For a computer, the NetworkProtecting your home network About the Network Security Map Offline Turning off or turning on Network Security OverviewSetting up Remote Monitoring You open Network Security MapOverview window Remote Monitoring Setup window, type a Passkey NetworkSecurityMap row, click ConfigureAdding a device to the Network Security Map Turning off Remote MonitoringNetworkSecurityMap row, click Configure Finding a computers IP address Click Add DeviceIPv4 address 172.16.0.0 IPv6 address Editing device details Device details section, next to Device Name, click Edit EditDeviceDetails window, in the Name box, type a new nameNetwork map, select a device that you added Changing the trust level of your network and devices Editing network detailsA network, Norton 360 assigns the same trust level To all the devices that are connected to that networkHowever, Norton 360 does not change the trust level Devices that you individually trust or restrictPage However, known attacks You should select this settingComputer receives from a Allowed through firewallRestricted list RestrictedExcluding a device from Intrusion Prevention scan Page Removing devices from the Network Security Map Edit Device Trust Level window, click Full TrustExclude from IPS Scanning dialog box, click Yes to confirm Under NetworkSecurityMap, in the NetworkMap row, click Purge Viewing the status of your wireless networkViewing the device details Network Security Map row, click ConfigureModifying the communication port for Network Security Map Page About PC Tuneup Keeping your PC 11 tuned upAbout disk and file fragmentation Optimizing your permanent disks manuallyKeeping your PC tuned up About disk and file fragmentation About using optimization efficiently Keeping your PC tuned up About cleaning up disk clutter About cleaning up disk clutterRunning a scan to clean up disk clutter Running a scan to clean up disk clutterKeeping your PC tuned up Running Diagnostic Report Running Registry CleanupWhen the Norton Community Watch option is turned on About Startup ManagerWatch on Disabling or enabling startup items 409 Managing startup itemsKeeping your PC tuned up About Startup Manager Protecting your 12 media and data About Norton Backup and RestoreProtecting your media and data About backups About backupsAbout backup preparation Page Where 415Protecting your media and data About backup preparation About backup set Protecting your media and dataOption is available You can do the following tasks Creating a new backup setOption is available in the Settings window Configure the MeteredBroadbandMode option419 Modifying or renaming a backup setAbout backup file categories 421 Music Protecting your media and data About backup setProtecting your media and data Video Protecting your media and data About backup file extensions Category Edit the file extension Click OK Click Save Removing a file extension from a backup category Resetting a backup category to default file extensions429 Deleting previously backed up files Summary tab Where tabClick Delete Selected Delete Backup Set window, select one of the followingOn the Where tab, click Delete Backed up Files 431On the What tab, click Add or exclude files and folders Adding files and folders to a backup setMetered Broadband Mode option in the My Files and folders433 Excluding files and folders from a backup setOn the What tab, click Add or exclude files and folders 435 About backup locationsProtecting your media and data About backup set Fastest recommended High usage Moderate usage Low usage 437Protecting your media and data About backup set CD, DVD, or Blu-ray discs 439BD-R When you select the CD or the DVD Drive as the backupNetwork that offers a storage Install the optical driverNetwork drive PC is connected to a localChoosing a backup location Installing optical backup driver Click Save Settings443 Viewing or changing a backup schedule Deleting a backup set Backing up your files Restoring files Backup file categories Restore FromBackup sets to restore Folders by usingClick Restore Files Restore Files window, under Restore From, click View All Choosing where to restore files from451 Selecting files to restoreAs asterisks * or question Backup setRestore files by searching Those files to restore453 Choosing a restore destinationAbout Norton 360 Autorun Restore Restoring files by using Norton 360 Autorun Restore About Norton Backup Drive Click Restore SelectedCustom Location 457 Viewing backup files on the Norton Backup Drive 459 Deleting a file from a backup set on the Norton Backup DriveAbout solutions to the backup problems Page Sure that the external That cannot store filesLarge files to back up If you use automatic orBacking up to your Secure Online Storage Getting additional help with backup problemsSettings window About online backup considerationsSpeed limitations Fastest recommended High usage Moderate usage Low usage About online backup activation Purchasing more online storage space Turning off or turning on backup Page Up the file during idle time Turning off or turning on backup setting optionsPage Page Page About Norton 360 Settings Customizing 13 settingsOther threats, are handled Unwanted online contentYou can configure Norton Antivirus Specify how certain typesCustomizing settings Customizing settings About Norton 360 Settings Your specified settings Silent ModeWeb features Backup Turns on or turns off BackupCustomizing settings Customizing Norton 360 Settings Customizing Norton 360 SettingsTurning on or turning off Quick Controls services Customizing settings About Antivirus settings About Antivirus settingsAutomatic Protection Settings let you control Scans and Risks You can use the following Scans and Risks options Customizing settings About Antivirus settings Customizing settings About Antivirus settings Customizing settings About Antivirus settings About Automatic Protection settings Auto-Protect Customizing settings About Antivirus settings Customizing settings About Antivirus settings Sonar Protection Sonar Protection includes the following options Remove Risks if I Am Away This option lets NortonAbout Scans and Risks settings Computer Scans Customizing settings About Antivirus settings Customizing settings About Antivirus settings Number of Threads for Manual Scan Profiles You must configureConfigure a scan that Scan PerformanceCustomizing settings Exclusion / Low Risks Items to Exclude from Auto-Protect and Sonar Detection About Antispyware and Updates settings Instant messenger scans Antispyware Antispyware options let youCustomizing settings About Firewall settings About Firewall settingsAccording to the general Firewall featuresPages Network traffic toProtect your computer Intrusion and BrowserIntelligence option that is Available on this tab toAbout Firewall General settings If you reset the firewall Default stateFirewall rules and settings are ConfiguredAbout the Intrusion and Browser Protection settings About Smart Firewall Advanced settings That attach to safe programs That launch Internet-enabledProgram Component Program LaunchProcess without triggering Direct Network AccessCode Injection Monitors the Trojan horses or Code into an applicationsCustomizing settings About Norton AntiSpam settings About Norton AntiSpam settingsAbout Filter settings About Client Integration settings Lets you send feedback about the misclassified email Integration tabAbout My Network settings Trust Control is a special network When the Remote Monitoring isTrust Control NetworkCustomizing settings About backup settings About backup settingsImportant files Manage BackupWhen to back up your You can use the ConfigureCustomizing settings Customizing settings About Identity Protection settings About Identity Protection settingsGrey question mark VisitIs unsafe to visit Provide annoying resultsManage your All of your login Provide Feature Description Advice Edit Cards Lets youPersonal You store Information Cards to do Fill formsCustomizing settings About Task Scheduling settings About Task Scheduling settingsAutomatically when your Automatic TasksSecurity and PC Tuneup Scheduling Manual Schedule You can run the tasks manually Customizing settings About Administrative Settings About Administrative SettingsCustomizing settings Customizing settings About Administrative Settings Customizing settings About Administrative Settings Performance Monitoring Customizing settings About Administrative Settings Customizing settings About Administrative Settings Use Low Resource Profile On Battery Power Handles High-Usage Alert forMemory DiskGet performance alerts Power Saving ModeBackground jobs when your AlertsSettings window if Non-Admins Access toLets you access By default, this option isSilent Mode Settings Media Center TV Recording Quiet Mode on DetectionCustomizing settings About Administrative Settings Idle Time Out It does not delay NortonProtection. You can specify MinutesFirefox History Cleanup About Norton Product Tamper ProtectionBrowser Turning off or turning on Norton Product Tamper Protection Password option in the Select your Uninstall About securing Norton 360 Settings using a passwordSettings Password Protection row, click Configure Securing your Norton 360 Settings using a passwordTurning off Norton 360 Settings password Resetting your Norton 360 Settings passwordSelect Uninstall Preference window Select Uninstall Preference window only if To reset your Norton 360 Settings passwordGeneral Product Security Finding the version number of your product Finding additional14 solutionsFinding the End-User License Agreement About upgrading your productDouble-clickProgram Files Norton 360 MUI version 09 Finding additional solutions About upgrading your product Internet connection to check if a new version is Available and install new version of the productChecking for a new version of the product Firefox version 3.6 or laterAbout Norton Autofix Solving a problem using Norton Autofix Checking Your Connection window, click Retry Staying informed about protection issuesAbout Support About Norton Support Web site Using the Norton Support Web site Getting support by phone About phone supportTo get support by phone Support policyAbout keeping your subscription current CountriesWorldwide service and support ClubNorton565 Panel Uninstalling Norton567 To uninstall Norton 360, click NextPasswords, and preferences for Index Backup Page Page Page Internet temporary files 227 Page Page Product password protecting 550 product status Page Index Submission, items to Symantec Index Page Page Foo

11022527 specifications

Symantec 11022527 is a robust and versatile security solution designed to protect enterprises from a variety of cyber threats. As part of the broader Symantec Endpoint Protection (SEP) family, this product is engineered to deliver comprehensive security features tailored for organizations of all sizes.

One of the primary features of Symantec 11022527 is its advanced threat detection capabilities. Leveraging a combination of signature-based and behavior-based detection methods, the solution effectively identifies known and unknown threats, including malware, ransomware, and phishing attempts. This dual approach allows for enhanced protection in an ever-evolving threat landscape, ensuring that organizations can stay one step ahead of cybercriminals.

Another salient characteristic of Symantec 11022527 is its integrated firewall. The firewall functions to monitor incoming and outgoing network traffic, establishing a barrier between trusted internal networks and untrusted external networks. This is particularly crucial for preventing unauthorized access to sensitive corporate data, safeguarding intellectual property, and reducing the risk of data breaches.

In addition to these features, Symantec 11022527 incorporates machine learning and artificial intelligence technologies. These capabilities enable the solution to analyze vast amounts of data to identify anomalous behaviors and potential threats in real time. By automating the detection process, organizations can respond more rapidly to incidents, minimizing potential damage and downtime.

The solution also boasts a user-friendly management console, which streamlines deployment and management across multiple endpoints. This console allows administrators to push updates, manage security policies, and run reports with ease, promoting efficiency within IT teams. The centralized control helps ensure that security measures are consistently applied across the enterprise, thereby enhancing the overall security posture.

Moreover, Symantec 11022527 supports cloud-based deployment, which offers flexibility and scalability for businesses. This allows organizations to extend their security coverage without requiring extensive on-premises infrastructure, making it ideal for hybrid and remote work environments.

In summary, Symantec 11022527 stands out due to its advanced threat detection, integrated firewall, machine learning capabilities, user-friendly management console, and cloud-based deployment options. These features make it a powerful tool for organizations seeking to enhance their cybersecurity defenses and protect against the dynamic threats that characterize today’s digital landscape.