Symantec 11022527 manual About Support

Page 560

560Finding additional solutions About Support

To stay informed about protection issues

1Open your Web browser, and go to the following URL:

http://www.symantec.com

2In the Symantec Web site, click Norton.

3In the menu bar that appears, do the following:

1Click the Viruses&Risks tab, and then click any item on the left pane to find out more details about it.

1Click the Community tab, and then use one of the following:

Norton Forums

Register as a user and

 

participate in discussions.

 

You can create your own threads

 

of topics or take help from the

 

existing forum discussions.

Norton Blogs

Read the messages that

 

prominent leaders post from

 

inside and outside Symantec and

 

obtain information straight from

 

the source.

 

You can add comments or ask

 

questions on the blogs that you

 

are interested in.

Other Norton

Check about Norton in other

Communities

Web sites and social networks

 

that are available.

About Support

If you have purchased Norton 360, you can access Support from the product.

Image 560
Contents Product Manual Norton 360 Product Manual Contents Chapter Keeping secure on the Internet Chapter Responding to security issuesChapter Understanding alerts Chapter Securing your sensitive data Chapter Protecting your home networkChapter Keeping your PC tuned up Chapter Protecting your media and dataChapter Finding additional solutions 553About Norton This chapter includes the following topicsFeatures Restore capabilityAbout Norton 360 main window Getting Started About NortonSettings Getting StartedAccount Lets you access the My Support Lets you access support Options, product upgradeYou can also access Product featuresPage Activity Map Getting Started About Norton Manage Lets you access Norton Management Installed on all of yourManagement, click Use your existing NortonOnline Family Getting Started About Norton Getting Started About Norton Safe Web You can also use the View recent Norton Safe Web Activation protects you Getting Started Activation protects youActivating Norton Where to find your product key Administrative Settings Network Proxy Settings ConfigureLocations of the product key are as follows If you received a product key cardGetting Started About your Norton Account About problems during activationAbout your Norton Account Page Version using Norton Update ProductsNorton products that you OwnOrders. After you update Click Update to saveChange Password Information and your billingNorton Update Center Important data againstSystem crash, accidental Other disastersCreating a Norton Account Accessing your Norton Account Creating a temporary password for Norton Account You can also change your Norton Account passwordInternet to access your Norton Account To access Norton AccountAbout Norton Community Watch Getting Started About Norton Community WatchTurning off or turning on Norton Community Watch Security History windowAbout Norton Bootable Recovery Tool Program, boot sector VirusesBy inserting themselves or Medium. Most viruses justDownloading the Norton Bootable Recovery Tool Wizard Getting Started About Norton Bootable Recovery ToolAll Programs Norton 360 Norton Recovery Tools Click Full System ScanClick Start Scan Using the Norton Bootable Recovery ToolAbout updating Norton About LiveUpdate About Program and Definition UpdatesProgram updates are usually created to extend Operating system or hardware compatibility, adjust aPerformance issue, or fix program errors. Program Updates are released on an as-needed basisNorton Internet Security, Norton In addition to the virus About Smart Definitions Products receiveFiles and definition Complete SetTurning off or turning on Smart Definitions Turning off or turning on Automatic LiveUpdate Antivirus Antispyware and Updates. You can alsoChecking for updates manually From Quick Controls in the Settings windowLiveUpdate option Checking for the latest virus and spyware definitions dateAbout keeping your protection up to date About Pulse Updates Obtain updates of any kindInstalled on your Software no longer functions Computer Cannot obtain updates of any kindAbout Network Proxy Settings Turning off or turning on Pulse UpdatesPage Page Configuring Network Proxy Settings NetworkProxySettings row, click ConfigureNetwork Proxy Settings window, do the following NetworkProxySettings window, click ApplyAbout Norton 360 status Getting Started About Norton 360 statusResponding to security status indicators Issues against your computer About the Norton 360 iconIcon with a green check Mark badge Is fully protected Icon with an orangeStatus, or access other About Norton 360 shortcut menuOpen Norton Run QuickScanViewing details of protection features Page Getting Started About Norton 360 status Monitoring your Systems Performance About System InsightPage Accessing the Performance window To view the details of the Files of InterestDate About monitoring system activitiesDetails include Monitoring your systems performance Total number of downloadsOn that date. You can click Details about the downloadedAlerts Quick Scans Viewing details of your system activitiesMonitoring your systems performance About System Insight About performance alerting Click Settings Administrative Settings Turn off the Performance Alerting optionYou can use the Resource Threshold Profile for Profile for AlertingConfiguring performance alerts OffThreshold limit System resource usageLog Only Configuring the resource threshold profile Click Apply and then click Close On battery power. By default, this option is turned on To turn off the Use Low Resource Profile On BatteryPower option Excluding programs from performance alertsProgram Exclusions window, click Apply Click OK Settings window, click Apply Click CloseRemoving programs from Program Exclusions About System Insight Click OK Settings window, click Close About CPU graph and memory graphViewing the CPU graph and memory graph To view the memory graph, click the Memory tab Obtaining historical data of your CPU and memory usageIdentifying resource-consuming processes About optimization Optimizing your boot volume About the Idle Time Optimizer About the Norton Tasks Turning off or turning on Idle Time OptimizerPage By default, Automatic LiveUpdate checks forUpdates every hour Backing up DefaultSetResolves it Internet Explorer HistoryTo identify the new threats Pulse Updates check for Definition updates every fivePulse Updates provide Updates during the fullWindows Registry Cleaner Cause errorsIdentity Safe Maintenance Performs background AntiSpam Maintenance Performs backgroundMonitoring background jobs of Norton About Power Source Configuring the Power Source External External and BatteryAbout Norton Insight Monitoring your systems performance Whitelist technique Trusted Norton CommunitySymantec rates the file as Norton TrustedViewing the files using Norton Insight Point in time when you When you start yourAll Running Processes On your computer at thatScan when you configure User Trusted FilesFile Insight window This category does not listChecking the trust level of a file File Insight window, click Check Trust Now Configuring the Scan Performance Profiles Full Scan Standard Trust High Trust About Monthly Report Account windowBackup & Tuneup Backup and PC TuneupIs protected from Spyware from whichViewing the Monthly Report 101Monitoring your systems performance About System Insight Maintaining total Protection About total protectionAbout keeping your computer secure Page About solving connection problems About responding to emergenciesMaintaining total protection About monitoring protection features About Security HistoryPage Page Viewing items in Security History Page Recent History Days. It lists the historyCertain recent security EventsResolved Security Risks Window displays a listHas detected and then Repaired, quarantined, orAvailable through LiveUpdate Trust or restrict settings for Networks that yourHave taken to trust or to Restrict networksMaintaining total protection Identity Various features Identity Safe help you Downloads when you runLiveUpdate to obtain Download InsightMaintaining total protection Metered Network Amount of networkCan use Provides details aboutMaintaining total protection Registry Cleanup Windows registry can Computer and cleans anyFile Cleanup File Cleanup feature Improve data access timeMaintaining total protection About the Security History Advanced Details window Security risks are High Medium, Low, and InfoActivity By NortonActions Actions options Page About the File Insight window Files that Norton 360 repairs Category mostly includesOr blocked Resolved security risks onMaintaining total protection Installed Norton DetailsFile is Stability ratings of a fileLocate Lets you locate the file on Your computer Top of the windowCopy to Clipboard ClipboardQuarantined to the original RestoreAbout the Threat Detected window Searching in Security History Exporting or Importing Security History information Click GoSecurity History window, click Import Managing items in the Quarantine Page Detected viral Non-viral threatsSecurity risk Some cases, NortonAdding an item to the Quarantine Restoring an item from the QuarantineDetails pane, click Restore & Options Removing an item from the QuarantineClick Restore & Options Manually submitting an item to SymantecDialog box that appears, click OK About viewing details of system vulnerabilitiesAbout Vulnerability Protection Viewing the list of vulnerable programs Viewing details about a vulnerable application VulnerabilityProtection window, click Close Page Scanning your Computer About the Norton 360 scansComputer using When the Insight ProtectionSettings window Computer ScanScanning your computer About the Norton 360 scansAbout Computer Scan Scanning your computer About Computer Scan153 Optimizes your disk volume Running a Quick ScanDisk optimization tasks Data, frees disk space,Skip Skips the current scan Cancel Terminates a Quick Scan Running a Full System Scan155 PauseScanning selected drives, folders, or files Scanning your computer About Computer ScanAbout the Results Summary window 157Pause Suspends a custom scan Temporarily Stop Terminates the scan Click Yes to confirmAbout the Threats Detected window 159 About custom scansCreating a custom scan Selecting the scan items Scan Name boxTo add files, click dialog box, select then click Add Configuring the scan options161 Editing a custom scan Running a custom scanStop Terminates a custom scan Click Yes to confirm Deleting a custom scan163 About scheduling scans Scheduling a scan165 Scheduling a Full System Scan 167 Scheduling a Quick ScanEditing a scheduled scan About Insight Network scan Scanning your computer About Insight Network scan Click GoTurning off or turning on Insight Protection About Reputation Scan Scanning your computer About Reputation Scan171 DLL files .loc Dynamic link library filesDrv 173 To the file File is neither safe norUnsafe Poor Symantec has a fewRunning a Reputation Full System Scan Running a Reputation Quick Scan175 NortonReputationScan window, click CloseRunning a Reputation custom scan Reputation Custom Scan window, do one of the followingAbout the Reputation Scan results 177File Name File typeFile in the File Insight WindowScanning your computer Scanning your computer About Reputation Scan Scanning your computer About Scan Facebook Wall Scanning your computer About Scan Facebook WallPage Scanning your Facebook Wall About Sonar Protection Request for permission page, click AllowSecurity Risks category in the Security History Turning off or turning on Sonar ProtectionAbout Real Time Exclusions Intelligence Detection Configure Excluding security threats from scanningAbout Signature Exclusions Signature Exclusions window, click Add About scanning Office documentsAdding items to the Signature Exclusions Turning on or turning off Microsoft Office Automatic Scan About Silent Mode Silent Mode Norton 360 allows you toDuration using Silent Mode MicrosoftOfficeAutomaticScan row, do one of the followingScanning your computer About Silent Mode 193 About the Silent Mode that you turn on manuallyTurning on or turning off Silent Mode manually Scanning your computer About Silent Mode About the Silent Mode that turns on automatically 195Turning off or turning on Full Screen Detection 197 About Quiet ModeSettings window, click Apply Click Close Following table explains about the various options Scanning your computer Turning off or turning on the Quiet Mode options About User-Specified Programs 201Adding programs to User-Specified Programs 203 Quiet Mode Programs window, click AddRemoving programs from User-Specified Programs About boot time protection Turns off boot time protectionTime Protection Aggressive NormalRunning a scan at the command prompt Configuring boot time protectionScanning your computer Running a scan at the command prompt Aggressive Normal OffBoot record Boot record scanningScans only the boot Window only when a\Program Files\Norton 360\Engine\version\NAVW32 pathfilename Scanning your computer Running a scan at the command prompt What to do if a security risk is found About detecting viruses, spyware, and other risks Reviewing Auto-Protect notifications Recent History Review Auto-Protect Notifications that you DaysFull History Review all Security threatsPage From future scan Norton 360 addsSecurity risk to Appropriate exclusionsManual removal This option is alsoRisks that are manually QuarantinedSubmit to Symantec Sends the security risk to Symantec About actions when Norton 360 cannot repair a fileAbout responding to risks detected during a scan Infected files Page About Norton 360 alerts and messages About managing messages and alertsYou might see messages in the following locations Types of risks Understanding alerts and messages Types of risksTypes of threats Understanding alerts and messages Types of threatsTypes of viruses Understanding alerts and messages Types of viruses Doing routine Tasks Turning on or turning off automatic tasksAbout custom task LiveUpdate Downloads the latestUpdates Running custom tasks Doing routine tasks 227 About custom taskAbout scheduling automatic tasks Scheduling security and performance scansSettings window, click Tasks Scheduling Doing routine tasksAbout scheduling backups You have the following backup scheduling optionsSpecifying Idle Time Out duration Doing routine tasks Specifying Idle Time Out duration Keeping secure on Internet About the Smart FirewallTurning off or turning on Smart Firewall Port scans Intrusions235 About the Smart FirewallAbout firewall rules About the order in which firewall rules are processedSmart Firewall uses two kinds of firewall rules Outgoing network trafficIcmp messages provide status and control information About Traffic rules237 Keeping secure on the Internet About the Smart Firewall About Program rules 239Access settings Use Firewall settings Manages the listLets the firewall First time that users runAdding a program to Firewall settings Accesses the Internet By this programBlock Criteria for a ruleYou can remove programs from Firewall settings if necessary Customizing a programRemoving a program 243Firewall settings automatically create most Adding Traffic rules and Program rulesClick Remove Confirmation dialog box, click Yes If necessaryUsing the Add Rule Wizard 245When you select This typeTraffic rule with Following criteria all247 MonitorActivities category in the Security History window Keeping secure on the Internet About the Smart Firewall Keeping secure on the Internet About the Smart Firewall 251 Only the computers and sites listed belowOnly when you add a Transmission ControlProtocol TCP and UDPSelect the ports for the rule. Your options are All Rule applies to all Supported protocolsModifying Traffic rules and Program rules Click NextChanging the order of firewall rules Turning off a Traffic rule temporarily Click More Details Allowing a blocked program257 To remove a Traffic rule Advanced user. Removing a default firewall rule canRemoving a firewall rule Encounter network connection problems About Norton Firewall Diagnosis259 Norton Firewall Diagnosis is available only in WindowsAbout Intrusion Prevention Turning off or turning on Intrusion Prevention notifications 261Excluding or including attack signatures in monitoring Intrusion Signatures window, click OKTurning off or turning on AutoBlock Unblocking AutoBlocked computers To turn off Intrusion AutoBlock, click Off265 Under the Action column, select Restrict Click OKTurning off and turning on Browser Protection About Intrusion Prevention exclusion listFrom all the devices that access your computer Trust. You can configure the trust level of a deviceComputer, AutoBlock stops all access requests from Purge the saved exclusion list. When you purgeKeeping secure on the Internet About Intrusion Prevention About Download Insight Click the Intrusion and Browser Protection tabExecution of the safe files Your computer. By defaultAuto-Protect allows About Download Insight Cancel run Turning off or turning on Download IntelligenceRun this program ProgramConfiguring the Download Insight Notifications option 273Keeping secure on the Internet About Download Insight Configuring the Download Insight Full Report option 275You can use the following options to configure Download Insight Full ReportKeeping secure on the Internet Keeping secure on the Internet About Download Insight About Norton AntiSpam Turning on or turning off Alert on Poor StabilityKeeping secure on the Internet About Norton AntiSpam About spam filtering features AntiSpam category in the Security History windowConfiguring Client Integration Keeping secure on the Internet About Norton AntiSpamTo open the Settings window to configure Norton AntiSpam settings. If your email program doesNortonAntiSpam drop-down list or the options to Classify the email messages as spam or legitimate. YouAbout your email program toolbar 285 About Norton AntiSpam You can use the following optionsSetting Address Book Exclusions Not add the domain name to the Address BookExclusions list Import the address book. Add all email addresses toIdentifying authorized senders Address Book Exclusions listDomain Identifying senders of spam 289Domain Setting the Feedback option About Web Query Click Apply Click CloseTurning off or turning on Web Query About configuring POP3 and Smtp ports Symantec recommends you to keep the Web QueryTo turn off the Web Query filter Increases your exposure to the spam email messagesProtected Ports Configure Adding POP3 and Smtp ports to Protected PortsAbout Metered Broadband Mode Removing an email port from Protected PortsTurning off or turning on Metered Broadband Mode Critical Updates OnlyNo Limit No TrafficBroadband Mode Defining the Internet usage of NortonCritical Updates Only Keeping secure on the Internet About Metered Broadband Mode About securing your sensitive data About Safe SurfingAbout Antiphishing Turning off or turning on Antiphishing Reporting an incorrect evaluation of a Web site About Norton Safe Web Status, Norton Safe Web lets you do the following View the Norton ratingView the community rating Add your reviewsNorton Secured Next to the search resultsSite is VeriSign trusted and is Safe to visitShopping experience Site is UnsafeThat you can have a safe Securing your sensitive data Searching the Web using Norton Safe Search Turning off or turning on Norton Safe WebUsing Norton Safe Search, it Search results. When youUnsafe Site Filter Search resultsErase Search History About Identity Safe Safe Web indicator Norton menuNorton Safe Search Identity Safe menuAbout setting up Identity Safe Settings window for Identity Protection Turning off or turning on Identity SafeAbout Identity Safe vaults About creating Identity Safe vaults Toolbar provides option to merge the Identity SafeData from your portable profile. You can merge Data from the portable profile to your local vault orPage IdentitySafeSetupSuccessful window, click Done Check Store information online through your Norton AccountIdentity Safe data is stored online using your Norton Vault to save your Identity Safe data. You must logTo your Norton Account to create an online vault. AccountComputers using your Norton Account Vault without depending on any external driveProvides a convenient means to automatically Synchronize Identity Safe data across differentInstalled When you merge the data from local vault to onlineIdentity Safe data from any computer that has Norton You can merge the Identity Safe data from your localDeleting local vault and online vault You can merge that portable profile to local vault orData from the portable profile to local vault or online VaultSet up Identity Safe Resetting Identity Safe Product expires Accessing Identity SafeFrom the Norton Toolbar You must be logged in to Identity Safe to access Identity Safe features. The Identity Safe features areLogging in to and logging out of Identity Safe Supported only in the Internet Explorer, Firefox, orPage Configuring Identity Safe settings Page Page Securing your sensitive data From the portable profile that When you import the IdentityEdit Notes Export Data About Edit logins Saving logins Norton Toolbar to view the logins You can only view your saved logins after NortonExpires, you cannot save or add any new logins When you try to save a login after the product expiresThen click Manage Identity Protection Editing loginsNorton Toolbar Under Identity Safe, in the Edit Logins row, click Configure URL Under Identity Safe, in the Edit Logins row, click Configure Under Identity Safe, in the Edit Logins row, click Configure About Edit Cards Updating the password for a loginSavenewpasswordforlogin? menu bar, click Save Adding cards That steal and misuse your identityFor autofill. You can choose a card from the list to fill Forms automaticallyPage Editing, deleting, or duplicating cards Click Save Click CloseUnder Identity Safe, in the Edit Cards row, click Configure Click Edit CardAbout Edit Notes Editing NotesClick Delete Card Click Duplicate CardUnder Identity Safe, in the Edit Notes row, click Configure Click Delete NotesAbout exporting and importing Identity Safe data Exporting your Identity Safe dataImporting your Identity Safe data Backup File About Browsing OptionsLocal Profile Merge with existing data Replace existing dataAbout Password & Security Password and set a new Password hint usingPassword Security Ask for my password before filling out a login or form You can select 15, 30, or 45 minutes Suspended stateChanging the Identity Safe password Password & Security window, click Change PasswordAbout Norton Toolbar Page Histories Allow in incognitoBrowsing or download Check Norton Toolbar to show the toolbar Allow access to file URLs Lets you view the URLHiding and showing the Norton Toolbar Wrench icon. However, you cannot enable Accessing Identity Safe settings from the Norton ToolbarClick Enable to show the toolbar Page Web indicators remain Settings Lets you open theIdentityConfigure the Identity Safe Report Site Lets you report to SymantecPage Search/ Disable Norton Search box Safe Search By default, the Norton SafeInstall Norton 360 and open Choose to enable or disableAccessing the Identity Safe menu Settings window using the Identity Safe menuRecently Used Logins Lets you view the list Latest five logins that youAll Logins Merge Portable DataOptions Data online Autofill the login Report Issue Lets you open the Norton Feedback Web siteProblems that you List of problems or you canLets you log out of or log in to Identity Safe Page About the Network Security Map Viewing devices on the Network Security Map MY PCNorton 360 requires you to configure the Symantec Cannot install the Symantec Security Driver when youRun LiveUpdate. You can either allow the Norton LiveUpdate to complete or close the Norton LiveUpdatePage NetBIOS name by default Device NameFor a computer, the Network Security Map displaysProtecting your home network About the Network Security Map Turning off or turning on Network Security Overview OfflineOverview window Setting up Remote MonitoringYou open Network Security Map NetworkSecurityMap row, click Configure Remote Monitoring Setup window, type a PasskeyTurning off Remote Monitoring Adding a device to the Network Security MapNetworkSecurityMap row, click Configure IPv4 address 172.16.0.0 IPv6 address Finding a computers IP addressClick Add Device Editing device details Network map, select a device that you added Device details section, next to Device Name, click EditEditDeviceDetails window, in the Name box, type a new name Editing network details Changing the trust level of your network and devicesTo all the devices that are connected to that network However, Norton 360 does not change the trust levelDevices that you individually trust or restrict A network, Norton 360 assigns the same trust levelPage You should select this setting Computer receives from aAllowed through firewall However, known attacksRestricted Restricted listExcluding a device from Intrusion Prevention scan Page Exclude from IPS Scanning dialog box, click Yes to confirm Removing devices from the Network Security MapEdit Device Trust Level window, click Full Trust Viewing the status of your wireless network Under NetworkSecurityMap, in the NetworkMap row, click PurgeNetwork Security Map row, click Configure Viewing the device detailsModifying the communication port for Network Security Map Page Keeping your PC 11 tuned up About PC TuneupKeeping your PC tuned up About disk and file fragmentation About disk and file fragmentationOptimizing your permanent disks manually About using optimization efficiently About cleaning up disk clutter Keeping your PC tuned up About cleaning up disk clutterKeeping your PC tuned up Running a scan to clean up disk clutterRunning a scan to clean up disk clutter Running Registry Cleanup Running Diagnostic ReportWatch on When the Norton Community Watch option is turned onAbout Startup Manager Disabling or enabling startup items Managing startup items 409Keeping your PC tuned up About Startup Manager About Norton Backup and Restore Protecting your 12 media and dataAbout backups Protecting your media and data About backupsAbout backup preparation Page 415 WhereProtecting your media and data About backup preparation Option is available About backup setProtecting your media and data Creating a new backup set Option is available in the Settings windowConfigure the MeteredBroadbandMode option You can do the following tasksModifying or renaming a backup set 419About backup file categories 421 Protecting your media and data About backup set MusicProtecting your media and data Video Protecting your media and data About backup file extensions Category Edit the file extension Click OK Click Save 429 Removing a file extension from a backup categoryResetting a backup category to default file extensions Summary tab Where tab Deleting previously backed up filesDelete Backup Set window, select one of the following On the Where tab, click Delete Backed up Files431 Click Delete SelectedAdding files and folders to a backup set Metered Broadband Mode option in the MyFiles and folders On the What tab, click Add or exclude files and foldersExcluding files and folders from a backup set 433On the What tab, click Add or exclude files and folders About backup locations 435Protecting your media and data About backup set 437 Fastest recommended High usage Moderate usage Low usageProtecting your media and data About backup set 439 CD, DVD, or Blu-ray discsWhen you select the CD or the DVD Drive as the backup BD-RInstall the optical driver Network drivePC is connected to a local Network that offers a storageChoosing a backup location 443 Installing optical backup driverClick Save Settings Viewing or changing a backup schedule Deleting a backup set Backing up your files Restoring files Restore From Backup sets to restoreFolders by using Backup file categoriesClick Restore Files Choosing where to restore files from Restore Files window, under Restore From, click View AllSelecting files to restore 451Backup set Restore files by searchingThose files to restore As asterisks * or questionChoosing a restore destination 453About Norton 360 Autorun Restore Restoring files by using Norton 360 Autorun Restore Custom Location About Norton Backup DriveClick Restore Selected 457 Viewing backup files on the Norton Backup Drive Deleting a file from a backup set on the Norton Backup Drive 459About solutions to the backup problems Page That cannot store files Large files to back upIf you use automatic or Sure that the externalGetting additional help with backup problems Backing up to your Secure Online StorageAbout online backup considerations Settings windowSpeed limitations Fastest recommended High usage Moderate usage Low usage About online backup activation Purchasing more online storage space Turning off or turning on backup Page Turning off or turning on backup setting options Up the file during idle timePage Page Page Customizing 13 settings About Norton 360 SettingsUnwanted online content You can configure NortonAntivirus Specify how certain types Other threats, are handledCustomizing settings Customizing settings About Norton 360 Settings Silent Mode Web featuresBackup Turns on or turns off Backup Your specified settingsCustomizing Norton 360 Settings Customizing settings Customizing Norton 360 SettingsTurning on or turning off Quick Controls services About Antivirus settings Customizing settings About Antivirus settingsAutomatic Protection Settings let you control Scans and Risks You can use the following Scans and Risks options Customizing settings About Antivirus settings Customizing settings About Antivirus settings Customizing settings About Antivirus settings About Automatic Protection settings Auto-Protect Customizing settings About Antivirus settings Customizing settings About Antivirus settings Sonar Protection Remove Risks if I Am Away This option lets Norton Sonar Protection includes the following optionsAbout Scans and Risks settings Computer Scans Customizing settings About Antivirus settings Customizing settings About Antivirus settings Number of Threads for Manual Scan You must configure Configure a scan thatScan Performance ProfilesCustomizing settings Exclusion / Low Risks Items to Exclude from Auto-Protect and Sonar Detection About Antispyware and Updates settings Antispyware Antispyware options let you Instant messenger scansAbout Firewall settings Customizing settings About Firewall settingsFirewall features PagesNetwork traffic to According to the generalIntrusion and Browser Intelligence option that isAvailable on this tab to Protect your computerAbout Firewall General settings Default state Firewall rules and settings areConfigured If you reset the firewallAbout the Intrusion and Browser Protection settings About Smart Firewall Advanced settings That launch Internet-enabled Program ComponentProgram Launch That attach to safe programsDirect Network Access Code Injection Monitors the Trojan horses orCode into an applications Process without triggeringAbout Norton AntiSpam settings Customizing settings About Norton AntiSpam settingsAbout Filter settings About Client Integration settings Integration tab Lets you send feedback about the misclassified emailAbout My Network settings When the Remote Monitoring is Trust ControlNetwork Trust Control is a special networkAbout backup settings Customizing settings About backup settingsManage Backup When to back up yourYou can use the Configure Important filesCustomizing settings About Identity Protection settings Customizing settings About Identity Protection settingsVisit Is unsafe to visitProvide annoying results Grey question markManage your All of your login Feature Description Advice Edit Cards Lets you Personal You store Information Cards to doFill forms ProvideAbout Task Scheduling settings Customizing settings About Task Scheduling settingsSecurity and PC Tuneup Automatically when yourAutomatic Tasks Scheduling Manual Schedule You can run the tasks manually About Administrative Settings Customizing settings About Administrative SettingsCustomizing settings Customizing settings About Administrative Settings Customizing settings About Administrative Settings Performance Monitoring Customizing settings About Administrative Settings Customizing settings About Administrative Settings Use Low Resource Profile On Battery Power High-Usage Alert for MemoryDisk HandlesPower Saving Mode Background jobs when yourAlerts Get performance alertsNon-Admins Access to Lets you accessBy default, this option is Settings window ifSilent Mode Settings Quiet Mode on Detection Media Center TV RecordingCustomizing settings About Administrative Settings It does not delay Norton Protection. You can specifyMinutes Idle Time OutBrowser Firefox History CleanupAbout Norton Product Tamper Protection Turning off or turning on Norton Product Tamper Protection About securing Norton 360 Settings using a password Password option in the Select your UninstallSecuring your Norton 360 Settings using a password Settings Password Protection row, click ConfigureSelect Uninstall Preference window Turning off Norton 360 Settings passwordResetting your Norton 360 Settings password General Product Security Select Uninstall Preference window only ifTo reset your Norton 360 Settings password Finding additional14 solutions Finding the version number of your productDouble-clickProgram Files Norton 360 MUI version 09 Finding the End-User License AgreementAbout upgrading your product Finding additional solutions About upgrading your product Available and install new version of the product Checking for a new version of the productFirefox version 3.6 or later Internet connection to check if a new version isAbout Norton Autofix Solving a problem using Norton Autofix Staying informed about protection issues Checking Your Connection window, click RetryAbout Support About Norton Support Web site Using the Norton Support Web site About phone support Getting support by phoneSupport policy About keeping your subscription currentCountries To get support by phone565 Worldwide service and supportClubNorton Uninstalling Norton PanelTo uninstall Norton 360, click Next 567Passwords, and preferences for Index Backup Page Page Page Internet temporary files 227 Page Page Product password protecting 550 product status Page Index Submission, items to Symantec Index Page Page Foo

11022527 specifications

Symantec 11022527 is a robust and versatile security solution designed to protect enterprises from a variety of cyber threats. As part of the broader Symantec Endpoint Protection (SEP) family, this product is engineered to deliver comprehensive security features tailored for organizations of all sizes.

One of the primary features of Symantec 11022527 is its advanced threat detection capabilities. Leveraging a combination of signature-based and behavior-based detection methods, the solution effectively identifies known and unknown threats, including malware, ransomware, and phishing attempts. This dual approach allows for enhanced protection in an ever-evolving threat landscape, ensuring that organizations can stay one step ahead of cybercriminals.

Another salient characteristic of Symantec 11022527 is its integrated firewall. The firewall functions to monitor incoming and outgoing network traffic, establishing a barrier between trusted internal networks and untrusted external networks. This is particularly crucial for preventing unauthorized access to sensitive corporate data, safeguarding intellectual property, and reducing the risk of data breaches.

In addition to these features, Symantec 11022527 incorporates machine learning and artificial intelligence technologies. These capabilities enable the solution to analyze vast amounts of data to identify anomalous behaviors and potential threats in real time. By automating the detection process, organizations can respond more rapidly to incidents, minimizing potential damage and downtime.

The solution also boasts a user-friendly management console, which streamlines deployment and management across multiple endpoints. This console allows administrators to push updates, manage security policies, and run reports with ease, promoting efficiency within IT teams. The centralized control helps ensure that security measures are consistently applied across the enterprise, thereby enhancing the overall security posture.

Moreover, Symantec 11022527 supports cloud-based deployment, which offers flexibility and scalability for businesses. This allows organizations to extend their security coverage without requiring extensive on-premises infrastructure, making it ideal for hybrid and remote work environments.

In summary, Symantec 11022527 stands out due to its advanced threat detection, integrated firewall, machine learning capabilities, user-friendly management console, and cloud-based deployment options. These features make it a powerful tool for organizations seeking to enhance their cybersecurity defenses and protect against the dynamic threats that characterize today’s digital landscape.