suspiciousor vulnerable on your computer using the
reputation-basedthreat detection. Norton 360 lets you
rundifferent types of Reputation Scan and detect
suspiciousprograms on your computer.
ReputationScan filters the files on the basis of certain
filteringcriteria and performs an Insight Network
Scanon the filtered files. Reputation Scan filters the
filesas reputation files. It filters .exe files, .scr files,
.sysfiles, .dll files, .drv files, .ocx files, .loc files, and
.msifiles and analyzes these files.
Whenyou perform a Reputation Quick Scan or Full
SystemScan, Norton 360 considers the Files of Interest
thatare available on your computer.
Afterit has filtered the reputation files, Norton 360
performsan Insight Network Scan. When Norton 360
performsan Insight Network Scan, it also performs a
ComputerScan. Norton 360 uses the Computer Scan
toperform the signature-based threat detection. It
comparesthe signature of the filtered reputation files
againstthe known threat signatures to identify threats
onyour computer. If a security threat is detected,
Norton360 automatically removes the threat from
yourcomputer.
Norton360 uses the Insight Network Scan to detect
suspiciousor vulnerable files on your computer using
thereputation-based threat detection. The Insight
NetworkScan uses the Cloud technology wherein a
remoteSymantec server on the Web stores the latest
reputationinformation. It checks the Cloud for the
reputationinformation on the filtered files.
Norton360 obtains specific information such as file
nameand hash key about the filtered reputation files
andsends this information to the Cloud. The Cloud
analyzesthe file information and provides a trust level
foreach file. The Symantec server sends back the
reputationinformation to your computer. If any of the
filteredfiles is suspicious or vulnerable, Norton 360
assignsBad or Poor trust level. Apart from reputation
171Scanningyour computer
AboutReputation Scan