Main
Norton 360Product Manual
Contents
Chapter1 Getting Started
Chapter2 Monitoringyour system's performance
Chapter3 Maintaining total protection
Chapter4 Scanning your computer
Chapter5 Respondingto security issues
Chapter6 Understandingalerts and messages
Chapter7 Doing routine tasks
Chapter8 Keeping secure on the Internet
Chapter9 Securingyour sensitive data
Chapter10 Protecting your home network
Chapter11 Keeping your PC tuned up
Chapter12 Protecting your media and data
Chapter13 Customizing settings
Chapter14 Finding additional solutions
Index
Getting Started
About Norton 360
About Norton 360 main window
Page
Thebottom section of the Norton 360 main window providesyou up-to-date virus and threat information.
Page
Page
Page
Page
Page
Page
Page
Page
Page
Activation protects you
w
Activating Norton 360
w
Where to find your product key
Activationprotects you
About problems during activation
About your Norton Account
Page
Page
Youcan use the icons at the bottom of your Norton AccountWeb page to access and use the following:
Aboutyour Norton Account
Page
Creating a Norton Account
w
Accessing your Norton Account
w
Creating a temporary password for Norton Account
About Norton Community Watch
w
Turning off or turning on Norton Community Watch
w
About Norton Bootable Recovery Tool
w
AboutNorton Bootable Recovery Tool
Downloading the Norton Bootable Recovery Tool Wizard
w
Using the Norton Bootable Recovery Tool
w
About updating Norton 360
About LiveUpdate
AboutProgram and Definition Updates
w
Aboutupdating Norton 360
AboutSmart Definitions
Turningoff or turning on Smart Definitions
Turningoff or turning on Automatic LiveUpdate
w
Checkingfor updates manually
Checkingfor the latest virus and spyware definitions date
Aboutkeeping your protection up to date
AboutPulse Updates
Turningoff or turning on Pulse Updates
About Network Proxy Settings
Page
NetworkProxy Settings window lets you specify the followingsettings:
AboutNetwork Proxy Settings
Configuring Network Proxy Settings
About Norton 360 status
Responding to security status indicators
About the Norton 360 icon
About Norton 360 shortcut menu
Viewing details of protection features
Page
Page
About System Insight
Monitoring your system's performance
Page
Accessing the Performance window
About monitoring system activities
Page
Viewingdetails of your system activities
About performance alerting
w
Configuringperformance alerts
Page
Configuringthe resource threshold profile
Turningoff or turning on the Use Low Resource Profile On BatteryPower option
w
Excludingprograms from performance alerts
Removingprograms from Program Exclusions
About CPU graph and memory graph
Viewingthe CPU graph and memory graph
w
Obtaininghistorical data of your CPU and memory usage
Identifyingresource-consuming processes
About optimization
Optimizingyour boot volume
Aboutthe Idle Time Optimizer
Turningoff or turning on Idle Time Optimizer
About the Norton Tasks
Page
TheNorton Tasks window lets you monitor the followingNorton-specific tasks:
Page
Page
Page
Monitoringbackground jobs of Norton 360
AboutPower Source
Configuringthe Power Source
About Norton Insight
Page
Page
Symantecassigns the following confidence levels to Filesof Interest:
Viewingthe files using Norton Insight
Page
Page
Checkingthe trust level of a file
w
Page
Configuringthe Scan Performance Profiles
Page
About Monthly Report
Page
Viewingthe Monthly Report
Page
About total protection
Maintaining total protection
About keeping your computer secure
Page
About solving connection problems
About responding to emergencies
Aboutresponding to emergencies
About monitoring protection features
About Security History
Page
Page
Viewingitems in Security History
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Aboutthe Security History - Advanced Details window
Page
Page
Page
Page
Aboutthe File Insight window
Page
Page
Page
Page
Aboutthe Threat Detected window
Searchingin Security History
Exportingor Importing Security History information
Page
Managingitems in the Quarantine
Page
Page
Addingan item to the Quarantine
w
Restoringan item from the Quarantine
w
Removingan item from the Quarantine
w
Manuallysubmitting an item to Symantec
About viewing details of system vulnerabilities
About Vulnerability Protection
Viewingthe list of vulnerable programs
Viewingdetails about a vulnerable application
Page
Page
About the Norton 360 scans
Scanning your computer
Page
Aboutthe Norton 360 scans
About Computer Scan
Page
Running a Quick Scan
Running a Full System Scan
Scanning selected drives, folders, or files
About the Results Summary window
About the Threats Detected window
About custom scans
Creatinga custom scan
Selectingthe scan items
w
Configuringthe scan options
Editinga custom scan
Runninga custom scan
Deletinga custom scan
Aboutscheduling scans
Schedulinga scan
w
Page
Schedulinga Full System Scan
Schedulinga Quick Scan
Editinga scheduled scan
About Insight Network scan
w
Turning off or turning on Insight Protection
About Reputation Scan
Page
Page
youselect. You can manually run the following types ofReputation Scan:
Page
Running a Reputation Full System Scan
Running a Reputation Quick Scan
Running a Reputation custom scan
About the Reputation Scan results
w
Page
Page
Page
About Scan Facebook Wall
Page
Scanning your Facebook Wall
About SONAR Protection
Turning off or turning on SONAR Protection
w
About Real Time Exclusions
w
Excludingsecurity threats from scanning
About Signature Exclusions
w
Addingitems to the Signature Exclusions
About scanning Office documents
Turning on or turning off Microsoft Office Automatic Scan
About Silent Mode
Page
About the Silent Mode that you turn on manually
Turningon or turning off Silent Mode manually
Page
About the Silent Mode that turns on automatically
Turningoff or turning on Full Screen Detection
About Quiet Mode
Thefollowing table explains about the various options:
AboutSilent Mode
Turningoff or turning on the Quiet Mode options
AboutUser-Specified Programs
Addingprograms to User-Specified Programs
Removingprograms from User-Specified Programs
About boot time protection
Configuring boot time protection
Running a scan at the command prompt
Runninga scan at the command prompt
Page
Page
What to do if a security risk is found
w
Responding to security issues
About detecting viruses, spyware, and other risks
Reviewing Auto-Protect notifications
Page
Page
Page
Page
About responding to risks detected during a scan
About actions when Norton 360 cannot repair a file
Page
Page
About Norton 360 alerts and messages
About managing messages and alerts
Understanding alerts and messages
Youmight see messages in the following locations:
Understandingalerts and messages Aboutmanaging messages and alerts
Types of risks
221Understandingalerts and messages Typesof risks
Types of threats
Types of viruses
Page
Turning on or turning off automatic tasks
Doing routine tasks
About custom task
Running custom tasks
227Doingroutine tasks Aboutcustom task
About scheduling automatic tasks
Scheduling security and performance scans
Page
About scheduling backups
Specifying Idle Time Out duration
Page
About the Smart Firewall
Keeping secure on the Internet
Turning off or turning on Smart Firewall
Page
About firewall rules
Aboutthe order in which firewall rules are processed
AboutTraffic rules
Page
AboutProgram rules
Page
Addinga program to Firewall settings
w
Page
Customizinga program
Removinga program
Adding Traffic rules and Program rules
w
Usingthe Add Rule Wizard
Page
Page
Page
Page
Page
Page
6ClickNext, and then select the protocols for the rule.Your options are:
7Selectthe ports for the rule. Your options are:
Modifying Traffic rules and Program rules
Changing the order of firewall rules
w
Turning off a Traffic rule temporarily
w
Allowing a blocked program
Removing a firewall rule
w
About Norton Firewall Diagnosis
w
About Intrusion Prevention
Turning off or turning on Intrusion Prevention notifications
Excludingor including attack signatures in monitoring
Turning off or turning on AutoBlock
w
UnblockingAutoBlocked computers
Permanentlyblocking a computer that has been blocked by AutoBlock
Turning off and turning on Browser Protection
w
About Intrusion Prevention exclusion list
w
Removing all devices from Intrusion Prevention exclusion list
About Download Insight
Page
Page
Turning off or turning on Download Intelligence
Configuringthe Download Insight Notifications option
Page
Configuring the Download Insight Full Report option
Page
AboutDownload Insight
Page
Turning on or turning off Alert on Poor Stability
About Norton AntiSpam
Page
w
About spam filtering features
Configuring Client Integration
Page
w
Aboutyour email program toolbar
Youcan use the following options:
AboutNorton AntiSpam
Setting Address Book Exclusions
w
Identifying authorized senders
w
Page
Identifying senders of spam
w
Page
Setting the Feedback option
w
About Web Query
w
Turningoff or turning on Web Query
About configuring POP3 and SMTP ports
w
Adding POP3 and SMTP ports to Protected Ports
Removing an email port from Protected Ports
w
About Metered Broadband Mode
Turning off or turning on Metered Broadband Mode
Defining the Internet usage of Norton 360
Page
Page
About securing your sensitive data
About Safe Surfing
Securing your sensitive data
w
AboutAntiphishing
Turningoff or turning on Antiphishing
Reportingan incorrect evaluation of a Web site
w
AboutNorton Safe Web
w
NortonSafe Web provides the following Web site safety stateswhen you browse through the Internet:
Page
Page
Turningoff or turning on Norton Safe Web
Searchingthe Web using Norton Safe Search
Page
w
About Identity Safe
w
Aboutsetting up Identity Safe
w
Turningoff or turning on Identity Safe
w
AboutIdentity Safe vaults
w
Aboutcreating Identity Safe vaults
Page
Page
Page
Page
Page
w
Page
ResettingIdentity Safe
w
AccessingIdentity Safe
w
Loggingin to and logging out of Identity Safe
Page
ConfiguringIdentity Safe settings
Page
Page
Page
Page
AboutEdit logins
w
Savinglogins
w
Editinglogins
w
Page
Page
Page
Page
Updatingthe password for a login
AboutEdit Cards
w
Addingcards
Page
Editing,deleting, or duplicating cards
w
AboutEdit Notes
EditingNotes
Page
Aboutexporting and importing Identity Safe data
w
Exportingyour Identity Safe data
Importingyour Identity Safe data
w
AboutBrowsing Options
AboutPassword & Security
Page
Page
Page
Page
Changingthe Identity Safe password
w
6Inthe confirmation dialog box, click OK.
About Norton Toolbar
Page
Page
w
Hidingand showing the Norton Toolbar
w
AccessingIdentity Safe settings from the Norton Toolbar
Page
2Onthe Norton Toolbar, in the Norton menu, select oneof the following:
Page
Page
Accessingthe Identity Safe menu
2Onthe Norton Toolbar, in the Identity Safe menu, selectone of the following:
Page
Page
Page
Page
Page
About the Network Security Map
w
Protecting your home network
Viewing devices on the Network Security Map
w
Page
Page
Protectingyour home network Aboutthe Network Security Map
Turning off or turning on Network Security Overview
w
Setting up Remote Monitoring
w
Turning off Remote Monitoring
w
Adding a device to the Network Security Map
w
Finding a computer's IP address
Editing device details
Page
Editing network details
w
Changing the trust level of your network and devices
w
Page
Protectingyour home network Aboutthe Network Security Map
Page
Excluding a device from Intrusion Prevention scan
w
Removing devices from the Network Security Map
w
Viewing the status of your wireless network
w
Viewing the device details
Modifying the communication port for Network Security Map
w
Page
About PC Tuneup
Keeping your PC tuned up
About disk and file fragmentation
Optimizing your permanent disks manually
w
About using optimization efficiently
About cleaning up disk clutter
Running a scan to clean up disk clutter
Running Registry Cleanup
Running Diagnostic Report
About Startup Manager
w
Disabling or enabling startup items
Managing startup items
Page
About Norton Backup and Restore
Protecting your media and data
About backups
About backup preparation
Page
Page
Aboutbackup preparation
About backup set
w
Creating a new backup set
Modifying or renaming a backup set
w
Aboutbackup file categories
Page
Page
Page
Page
Page
Aboutbackup file extensions
w
Addingor editing a file extension in a backup file category
Page
Removinga file extension from a backup category
Resettinga backup category to default file extensions
Deletingpreviously backed up files
w
Page
Addingfiles and folders to a backup set
w
Excludingfiles and folders from a backup set
Page
Aboutbackup locations
Page
Page
Page
Page
Page
Page
Choosinga backup location
w
Installingoptical backup driver
Viewingor changing a backup schedule
Deleting a backup set
w
Backing up your files
Restoring files
w
Whenyou restore files, you can change any of the followingsettings:
Restoringfiles
Page
Choosing where to restore files from
w
Selecting files to restore
Page
Choosing a restore destination
w
About Norton 360 Autorun Restore
w
Restoringfiles by using Norton 360 Autorun Restore
About Norton Backup Drive
w
Viewing backup files on the Norton Backup Drive
w
Restoring a file from a backup set on the Norton Backup Drive
Deleting a file from a backup set on the Norton Backup Drive
About solutions to the backup problems
Thefollowing table provides some tips to help you avoidbackup problems.
Page
Page
Getting additional help with backup problems
About online backup considerations
w
Page
Aboutonline backup considerations
About online backup activation
Aboutonline backup considerations
Norton360 uses your Norton Account to keep track of thefollowing:
w
Purchasing more online storage space
Turning off or turning on backup
Page
Turning off or turning on backup setting options
Page
Page
Page
About Norton 360 Settings
Customizing settings
Youcan configure the following Detailed Settings in theSettings window:
Page
Page
TheQuick Controls in the Settings window let you turnon or turn off the following services:
Customizing Norton 360 Settings
Turning on or turning off Quick Controls services
About Antivirus settings
Page
Page
Page
Page
Page
Page
About Automatic Protection settings
Page
Page
Page
Page
Page
About Scans and Risks settings
Page
Page
Page
Page
Page
Page
Page
Page
About Antispyware and Updates settings
Page
About Firewall settings
Thefollowing tabs are available in the Firewall settings window:
Page
About Firewall General settings
yourcomputer uses to access Web pages. Your options are:
About the Intrusion and Browser Protection settings
w
About Smart Firewall Advanced settings
Page
Page
About Norton AntiSpam settings
About Filter settings
About Client Integration settings
w
About My Network settings
Youhave the following options:
AboutMy Network settings
About backup settings
Page
Aboutbackup settings
About Identity Protection settings
Page
Page
AboutIdentity Protection settings
About Task Scheduling settings
TaskScheduling includes the following settings:
Page
Page
About Administrative Settings
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
About Norton Product Tamper Protection
w
Turningoff or turning on Norton Product Tamper Protection
Aboutsecuring Norton 360 Settings using a password
w
Securingyour Norton 360 Settings using a password
w
Turningoff Norton 360 Settings password
w
Resettingyour Norton 360 Settings password
Page
Finding the version number of your product
Finding additional solutions
Finding the End-User License Agreement
About upgrading your product
Page
w
Checking for a new version of the product
w
About Norton Autofix
w
Solving a problem using Norton Autofix
w
Staying informed about protection issues
w
About Support
w
About Norton Support Web site
w
Usingthe Norton Support Web site
About phone support
w
Gettingsupport by phone
Support policy
About keeping your subscription current
Worldwide service and support
ClubNorton
Uninstalling Norton 360
w
Page
Page
Index
A
B
C
D
E
F
G
H
I
J
L
M
N
O
P
Q
R
S
Page
Page
T
U
V
W