User Guide
See back cover for Quick
Installation.
Care for our Environment, ‘It's the right thing to do’.
Symantec has removed the cover from this manual to reduce the Environmental Footprint of our
products.
Norton License Agreement
Norton™ Internet Security
(including any product packaging) (the
“Documentation”), that accompanies this
License Agreement (collectively the
IMPORTANT: PLEASE READ THE TERMS
AND CONDITIONS OF THIS LICENSE
AGREEMENT (“LICENSE AGREEMENT”)
CAREFULLY BEFORE USING THE
“Software”) is the property of Symantec or
its licensors, and is protected by copyright
law. Although Symantec continues to own
the Software, after Your acceptance of this
License Agreement You will have certain
rights to use the Software during the Service
Period. The “Service Period” shall begin on
the date of Your initial installation of the
Software on a computer, mobile or mobile
computing device (a “Device”), regardless of
the number of copies that You are permitted
to use in accordance with Section 1.A of this
License Agreement, and shall last for the
period of time set forth in the Documentation
or the applicable transaction documentation
from the authorized distributor or reseller
from which You obtained the Software. The
Software may automatically deactivate and
become non-operational at the end of the
Service Period, and You will not be entitled
to receive any feature or content updates to
the Software unless the Service Period is
renewed. Subscriptions for renewals of the
Service Period will be available in accordance
with Symantec’s support policy posted at
SOFTWARE (AS DEFINED BELOW).
SYMANTEC CORPORATION, IF YOU ARE
LOCATED IN THE AMERICAS; OR
SYMANTEC ASIA PACIFIC PTE LTD, IF YOU
ARE LOCATED IN THE ASIA PACIFIC RIM
OR JAPAN; OR SYMANTEC LIMITED, IF YOU
ARE LOCATED IN EUROPE, THE MIDDLE
EAST OR AFRICA (“SYMANTEC”) IS
WILLING TO LICENSE THE SOFTWARE TO
YOU AS THE INDIVIDUAL, THE COMPANY,
OR THE LEGAL ENTITY THAT WILL BE
UTILIZING THE SOFTWARE (REFERENCED
BELOW AS “YOU” OR “YOUR”) ONLY ON
THE CONDITION THAT YOU ACCEPT ALL
OF THE TERMS OF THIS LICENSE
AGREEMENT. THIS IS A LEGAL AND
ENFORCEABLE CONTRACT BETWEEN YOU
AND SYMANTEC. BY OPENING THIS
PACKAGE, BREAKING THE SEAL, CLICKING
THE “I AGREE” OR “YES” BUTTON OR
OTHERWISE INDICATING ASSENT
ELECTRONICALLY, OR LOADING THE
SOFTWARE, YOU AGREE TO THE TERMS
AND CONDITIONS OF THIS LICENSE
AGREEMENT. IF YOU DO NOT AGREE TO
THESE TERMS AND CONDITIONS, CLICK
THE “CANCEL” OR “NO” OR “CLOSE
WINDOW” BUTTON OR OTHERWISE
INDICATE REFUSAL, MAKE NO FURTHER
USE OF THE SOFTWARE, AND CONTACT
YOUR VENDOR OR SYMANTEC CUSTOMER
SERVICE, USING THE CONTACT DETAILS
IN SECTION 10 OF THIS LICENSE
AGREEMENT, FOR INFORMATION ON HOW
TO OBTAIN A REFUND OF THE MONEY YOU
PAID FOR THE SOFTWARE (LESS SHIPPING,
HANDLING, AND ANY APPLICABLE TAXES
EXCEPT IN CERTAIN STATES AND
COUNTRIES WHERE SHIPPING, HANDLING,
AND TAXES ARE REFUNDABLE) AT ANY
TIME DURING THE SIXTY (60) DAY PERIOD
FOLLOWING THE DATE OF PURCHASE.
support/technical_support_policy.jsp.
This License Agreement governs any
releases, revisions, updates or enhancements
to the Software that Symantec may make
available to You. Except as may be modified
by the Documentation, and subject to
Symantec’s right to terminate for Your
breach pursuant to Section 9, Your rights
and obligations under this License
Agreement with respect to the use of this
Software are as follows.
During the Service Period, You
may:
A.use one copy of the Software on a single
Device. If a greater number of copies and/or
number of Devices is specified within the
Documentation or the applicable transaction
documentation from the authorized
1. License:
The software (including any accompanying
features and services) and documentation
distributor or reseller from which You
obtained the Software, You may use the
Software in accordance with such
specifications;
the Software Symantec may, at its discretion
and without notice, add, modify or remove
features from the Software at any time.
B. make one copy of the Software for back-up
or archival purposes, or copy the Software
B. Certain Software uses content that is
onto the hard disk of Your Device and retain updated from time to time, including but not
the original for back-up or archival purposes; limited to the following Software: antivirus
and crimeware software use updated virus
C. use the Software on a network, provided
definitions; antispyware software uses
that You have a licensed copy of the Software
updated spyware definitions; antispam
for each Device that can access the Software
software uses updated antispam rules;
over that network;
content filtering and antiphishing software
use updated URL lists; some firewall software
use updated firewall rules; vulnerability
assessment products use updated
D. permanently transfer all of Your rights in
the Software granted under this License
Agreement to another person or entity,
provided that You retain no copies of the
Software and the transferee agrees to the
terms of this License Agreement. Partial
transfer of Your rights under this License
Agreement shall not be permitted. For
example, if the applicable documentation
grants You the right to use multiple copies
of the Software, only a transfer of the rights
to use all such copies of the Software would
be valid; and
vulnerability data and web site
authentication software uses updated lists
of authenticated web pages; these updates
are collectively referred to as “Content
Updates” (or alternatively referred to as
“Protection Updates” or “Security Updates”
at times). You shall have the right to receive
Content Updates for the Software during
Your Service Period.
3. Product Installation; Required
Activation:
E. use the Software in accordance with any
additional permitted uses which may be set
forth below.
A. During the installation process, the
Software may uninstall or disable other
security products, or features thereof, if such
products or features are incompatible with
the Software or for purposes of improving
the overall functionality of the Software.
You may not, nor may you permit
any other person to:
A. sublicense, rent or lease any portion of the
Software;
B. There may be technological measures in
this Software that are designed to prevent
unlicensed or illegal use of the Software. You
agree that Symantec may use these measures
to protect Symantec against software piracy.
This Software may contain enforcement
technology that limits the ability to install
and uninstall the Software on a Device to not
more than a finite number of times for a
finite number of Devices. This License
Agreement and the Software containing
enforcement technology may require
B. reverse engineer, decompile, disassemble,
modify, translate, make any attempt to
discover the source code of the Software or
create derivative works from the Software;
C. use the Software as part of a facility
management, timesharing, service provider
or service bureau arrangement; or
D. use the Software in any manner that is not
permitted pursuant to this License
Agreement.
activation as further set forth in the
Documentation. If so, the Software will only
operate for a finite period of time prior to
Software activation by You. During
activation, You may be required to provide
Your unique activation code accompanying
the Software and Device configuration in the
form of an alphanumeric code over the
Internet to verify the authenticity of the
Software. If You do not complete the
2. Software Feature and Content
Updates:
A. You shall have the right to receive new
features to the Software as Symantec, in its
sole discretion, makes such features available
with the Software during Your Service
Period. Symantec continually strives to
improve the usability and performance of its
products and services. In order to optimize
activation within the finite period of time set
forth in the Documentation, or as prompted
by the Software, the Software will cease to
function until activation is complete; at
which time the Software functionality will
be restored. In the event that You are not
able to activate the Software over the
Internet, or through any other method
6. Limited Warranty:
Symantec warrants that any media
manufactured by Symantec on which the
Software is distributed will be free from
defects for a period of sixty (60) days from
specified during the activation process, You the date of delivery of the Software to You.
may contact Symantec Customer Support Your sole remedy in the event of a breach of
using the information provided by Symantec this warranty will be that Symantec will, at
during activation, or as set forth below.
its option, replace any defective media
returned to Symantec within the warranty
period or refund the money You paid for the
Software. Symantec does not warrant that
the Software will meet Your requirements or
that operation of the Software will be
uninterrupted or that the Software will be
error-free.
4. Technical Support:
Certain technical support features may be
offered from within the Software and which
may include live chat with a technical
support agent and/or assistance from a
technical support agent via remote computer
access (any such technical support offered
from within the Software shall be referred
to in this License Agreement as the
“Technical Support”). If such features are
offered and You choose to access such
Technical Support the following terms shall
apply. Any such Technical Support shall be
provided in Symantec’s sole discretion
without any guarantee or warranty of any
kind. It is solely Your responsibility to
complete a backup of all Your existing data,
software and programs before receiving any
Technical Support. In the course of providing
the Technical Support, Symantec may
determine that the technical issue is beyond
the scope of the Technical Support. Symantec
reserves the right to refuse, suspend or
terminate any of the Technical Support in
its sole discretion.
TO THE MAXIMUM EXTENT PERMITTED
BY APPLICABLE LAW, THE ABOVE
WARRANTY IS EXCLUSIVE AND IN LIEU OF
ALL OTHER WARRANTIES, WHETHER
EXPRESS OR IMPLIED, INCLUDING THE
IMPLIED WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE, AND
NON-INFRINGEMENT OF INTELLECTUAL
PROPERTY RIGHTS. THIS WARRANTY
GIVES YOU SPECIFIC LEGAL RIGHTS. YOU
MAY HAVE OTHER RIGHTS, WHICH VARY
FROM STATE TO STATE AND COUNTRY TO
COUNTRY.
7. Disclaimer of Damages:
SOME STATES AND COUNTRIES DO NOT
ALLOW THE LIMITATION OR EXCLUSION
OF LIABILITY FOR INCIDENTAL OR
CONSEQUENTIAL DAMAGES, SO THE
BELOW LIMITATION OR EXCLUSION MAY
NOT APPLY TO YOU.
5. Sixty (60) Day Money Back
Guarantee:
TO THE MAXIMUM EXTENT PERMITTED
BY APPLICABLE LAW AND REGARDLESS
OF WHETHER ANY REMEDY SET FORTH
HEREIN FAILS OF ITS ESSENTIAL PURPOSE,
IN NO EVENT WILL SYMANTEC OR ITS
LICENSORS BE LIABLE TO YOU FOR ANY
SPECIAL, CONSEQUENTIAL, INDIRECT, OR
SIMILAR DAMAGES, INCLUDING ANY LOST
PROFITS OR LOST DATA ARISING OUT OF
THE USE OR INABILITY TO USE THE
SOFTWARE EVEN IF SYMANTEC HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
If You are the original licensee of this copy
of the Software and are not completely
satisfied with it for any reason, please make
no further use of the Software and contact
Symantec Customer Service, using the
contact details set out in Section 10 of this
License Agreement, for a refund of the
money You paid for the Software (less
shipping, handling, and any applicable taxes
except in certain states and countries where
shipping, handling and taxes are refundable)
at any time during the sixty (60) day period
following the date of purchase.
IN NO CASE SHALL SYMANTEC’S OR ITS
LICENSORS’ LIABILITY EXCEED THE
PURCHASE PRICE WHICH YOU PAID FOR
THE APPLICABLE SERVICE PERIOD. The
disclaimers and limitations set forth above
will apply regardless of whether You accept
the Software.
10. General:
This License Agreement will be governed by
the laws of the State of California, United
States of America. This License Agreement
is the entire agreement between You and
Symantec relating to the Software and: (i)
supersedes all prior or contemporaneous oral
or written communications, proposals, and
representations with respect to its subject
matter; and (ii) prevails over any conflicting
or additional terms of any quote, order,
acknowledgment, or similar communications
between the parties. Notwithstanding the
foregoing, nothing in this License Agreement
will diminish any rights You may have under
existing consumer protection legislation or
other applicable laws in Your jurisdiction
that may not be waived by contract. This
License Agreement shall terminate upon
Your breach of any term contained in this
License Agreement and You shall cease use
of and destroy all copies of the Software and
Documentation. The disclaimers of
8. U.S. Government Restricted
Rights:
For U.S. Government procurements, the
Software is deemed to be commercial
computer software as defined in FAR 12.212
and subject to restricted rights as defined in
FAR Section 52.227-19 "Commercial
Computer Software - Restricted Rights" and
DFARS 227.7202, “Rights in Commercial
Computer Software or Commercial Computer
Software Documentation”, as applicable, and
any successor regulations. Any use,
modification, reproduction release,
performance, display or disclosure of the
Software by the U.S. Government shall be
solely in accordance with the terms of this
License Agreement.
warranties and damages and limitations on
liability shall survive termination. This
License Agreement may only be modified by
the Documentation or by a written document
that has been signed by both You and
9. Export Regulation:
You acknowledge that the Software and
related technical data and services
(collectively "Controlled Technology") may
be subject to the import and export laws of
Symantec. Should You have any questions
the United States, specifically the U.S. Export concerning this License Agreement, or if You
Administration Regulations (EAR), and the
laws of any country where Controlled
desire to contact Symantec for any reason,
please write to Symantec Customer Service,
Technology is imported or re-exported. You 555 International Way, Springfield, OR
agree to comply with all relevant laws and
will not export any Controlled Technology
in contravention to U.S. law nor to any
prohibited country, entity, or person for
which an export license or other
governmental approval is required. All
Symantec product is prohibited for export
or re-export to Cuba, North Korea, Iran, Syria
and Sudan and to any country subject to
relevant trade sanctions. USE OR
97477, U.S.A. or visit the Support page at t
ADDITIONAL TERMS AND
CONDITIONS
Your use of the Software is subject to the
terms and conditions below in addition to
those stated above.
FACILITATION OF SYMANTEC PRODUCT
IN CONNECTION WITH ANY ACTIVITY
INCLUDING, BUT NOT LIMITED TO, THE
DESIGN, DEVELOPMENT, FABRICATION,
TRAINING, OR TESTING OF CHEMICAL,
BIOLOGICAL, OR NUCLEAR MATERIALS,
OR MISSILES, DRONES, OR SPACE LAUNCH
VEHICLES CAPABLE OF DELIVERING
WEAPONS OF MASS DESTRUCTION IS
PROHIBITED, IN ACCORDANCE WITH U.S.
LAW.
11. Privacy; Data Protection:
From time to time, the Software may collect
certain information from the Device on
which it is installed, which may include:
Information on potential security risks as
well as URLs of websites visited that the
Software deems potentially fraudulent. The
URLs could contain personally identifiable
information that a potentially fraudulent
website is attempting to obtain without Your
permission. This information is collected by
Symantec for the purpose of delivering the
functionalities of the software, and also for
evaluating and improving the ability of
Symantec’s products to detect malicious
Information contained in email messages
that you send through the Software to
Symantec to report as spam or as incorrectly
behavior, potentially fraudulent websites and identified as spam. These email messages
other Internet security risks. URLs of
may contain personally identifiable
websites visited as well as search keywords
and search results only if the Norton Safe
Web feature is enabled. This information is
collected by Symantec for the purpose of
providing protection and of evaluating and
information and will be sent to Symantec
only with your permission, and will not be
sent automatically. If you send such
messages to Symantec, Symantec will use
them only for the purpose of improving the
advising You regarding potential threats and detection ability of Symantec’s antispam
risks that may be associated with a particular technology. Symantec will not correlate these
Web site before You view it.
files with any other personally identifiable
information.
Executable files and files that contain
executable content that are identified as
Information contained in a report that You
potential malware, including information on may choose to send through the Software to
the actions taken by such files at the time of Symantec when the Software encounters a
installation. These files are submitted to
problem. The report includes information
regarding the status of both the Software and
Symantec using the Software’s automatic
submission function. The collected files could Your Device at the time that the Software
contain personally identifiable information
that has been obtained by the malware
without Your permission. Files of this type
encountered the problem. The status
information about Your Device may include
the system language, country locale, and the
are being collected by Symantec only for the operating system version for Your Device, as
purpose of improving the ability of
Symantec’s products to detect malicious
behavior. Such automatic submission
well as the processes running, their status
and performance information, and data from
files or folders that were open at the time the
function may be deactivated after installation Software encountered the problem. The
by following the instructions in the
Documentation for applicable products.
information could contain personally
identifiable information if such information
is included in, or is a part of the name of the
files or folders open at the time the Software
encountered the problem. This information
will be sent to Symantec only with Your
permission, and will not be sent
automatically. The information is collected
by Symantec for the purpose of correcting
the encountered problem and improving
Symantec’s product performance. This
information will not be correlated with any
personally identifiable information.
The name given to the Device during the
initial setup of such Device. If collected, the
name will be used by Symantec as an account
name for the Device under which You may
elect to receive additional services and/or
under which You may use certain features
of the Software. You may change such
account name at any time after installation
of the Software (recommended).
Status information regarding installation
and operation of the Software. This
The Internet Protocol (IP) address and/or
Media Access Control (MAC) address and the
Machine ID of the computer on which the
Software is installed to enable the Software
to function and for license administration
purposes.
information indicates to Symantec whether
installation of the Software was successfully
completed as well as whether the Software
has encountered an error. The status
information could contain personally
identifiable information only if such
information is included in the name of the
Other general, statistical information used
file or folder encountered by the Software at for product analysis, and for improving
the time of installation or error. The status
information is collected by Symantec for the
purpose of evaluating and improving
Symantec’s product performance and
installation success rate. Symantec may also
use this information to optimize its
web-pages.
product functionality.
Unless it is expressly defined as optional, the
collected information as set out above is
necessary for the purpose of the functionality
of Symantec’s products.
Information may be transferred to the
Symantec group in the United States or other
countries that may have less protective data
protection laws than the region in which You
are situated (including the European Union)
and may be accessible by Symantec
employees or contractors exclusively to be
used in accordance with the purposes
described above. For the same purposes the
information may be shared with partners
and vendors that process information on
behalf of Symantec. Symantec has taken
steps so that the collected information, if
transferred, receives an adequate level of
protection.
Subject to applicable laws, Symantec reserves
the right to cooperate with any legal process
and any law enforcement or other
government inquiry related to your use of
this Software. This means that Symantec
may provide documents and information
relevant to a court subpoena or to a law
enforcement or other government
investigation. In order to promote awareness,
detection and prevention of Internet security
risks, Symantec may share certain
information with research organizations and
other security software vendors. Symantec
may also use statistics derived from the
information to track and publish reports on
security risk trends. By using the Software,
You acknowledge and agree that Symantec
may collect, transmit, store, disclose and
analyze such information for these purposes.
CPS / S 5.0 / USE
Contents
Overview
1
This chapter includes the following topics:
1
About Norton Internet Security
Norton Internet Security delivers fast and light online
threat protection. It guards your PC, network, online
activities, and your identity with innovative detection
technologies optimized to combat today’s aggressive,
rapid-fire attacks. Norton Internet Security makes
online shopping, banking, and browsing safer and more
convenient than ever.
The improved Norton Protection System features
multilayered security technologies. They work together
to provide the comprehensive protection that detects
and removes threats before they can harm your PC.
The Norton Protection System stops online identity
theft, viruses, hackers, bots, spyware, Trojan horses,
and more without slowing you down or getting in your
way.
12 Overview
About Norton Internet Security
Installation
2
This chapter includes the following topics:
1
1
1
1
Before you begin
Before you begin, you should close all open programs
on your computer and ensure that you are connected
to the Internet.
Norton Internet Security contains an antivirus
program. If you have other antivirus programs that
are installed on your computer, an uninstall panel may
appear to help you remove them. Symantec strongly
recommends that you remove the other antivirus
programs. Follow the instructions on the uninstall
panel.
Norton Internet Security contains a firewall program.
If you have other firewall programs that are installed
on your computer, Symantec strongly recommends
that you remove them to prevent installation errors.
For more information, see the user documentation that
came with the firewall program.
14 Installation
Installing Norton Internet Security
During the installation, if a firewall message appears,
click Yes to use the Norton Internet Security firewall.
w
Installing Norton Internet Security
You can install Norton Internet Security from a CD or
from a file that you download.
To install Norton Internet Security
1
Do one of the following:
1
If you install from a CD, insert the CD into the
optical drive.
In Windows Vista or Windows XP, click Install
Norton Internet Security.
In Windows 7, click Launch Norton Install and
then click Install Norton Internet Security.
1
If you downloaded your copy of Norton Internet
Security, double-click the file that you
downloaded.
2
3
4
5
In the Norton Internet Security installation page,
enter the Product Key if prompted.
Click the Install Options link, review the options,
and then click OK.
Click the User License Agreement link, read the
agreement, and then click Close.
After you have read the agreement, click Agree &
Install.
Installing Norton Internet Security on a
Netbook
If you purchased a box copy of Norton Internet Security
it can be installed on a Netbook or other ultra-mobile
PC devices that meet with the system requirements of
Norton Internet Security. Your Netbook does not
contain a CD drive so you need to download the Norton
Internet Security file from the Norton Web site. Enter
Installation 15
If the opening panel does not appear
the product key on the Norton Internet Security
installation card that is found in the Norton Internet
Security box
To install Norton Internet Security on a Netbook
1
Go to the following URL:
2
To the left of the screen click the product that you
purchased.
3
4
5
Click DOWNLOAD
Follow the on-screen instructions
When prompted, enter the product key on the
Norton Internet Security installation card that is
found in the Norton Internet Security box.
6
7
Click Agree & Install
If you require any further help, please visit
If the opening panel does not appear
Sometimes a computer's optical drive does not
automatically run a CD.
To start the installation from the product CD
1
2
On your desktop, double-click My Computer.
In the My Computer window, double-click the icon
for your optical drive.
3
In the list of files, double-click Start.exe and then
click Install Norton Internet Security.
16 Installation
If the opening panel does not appear
Getting started
3
This chapter includes the following topics:
1
1
1
1
1
1
Starting Norton Internet Security
Norton Internet Security protects any computer on
which it is installed. You do not have to start the
program to be protected.
on page 22.
At any time, you can start Norton Internet Security to
adjust the settings or perform preventive maintenance.
All of the program features can be accessed from the
main window.
18 Getting started
Activating your product
To start Norton Internet Security
Do one of the following:
4
1
In the Windows notification area, double-click
the Norton Internet Security icon.
1
On the Windows taskbar, click Start > All
Programs>NortonInternetSecurity>Norton
Internet Security.
Activating your product
If you did not activate your product during installation,
you receive an activation-needed alert regularly until
you activate the product.
Product activation reduces software piracy and ensures
that you use authentic Symantec software. Activation
provides you with a specified period of subscription to
your Norton product. You can also renew your
subscription to continue using Norton Internet
Security.
You must activate your product within the time period
that the alert specifies, or your product stops working.
w
You can activate your product directly from the
activation-needed alert or from the main window.
Activation should take only a few minutes.
To activate your product from the alert
1
In the alert, do one of the following:
1
If you purchased a subscription version of a
retail product or the product came installed on
your computer, select Activate Now
(Recommended).
1
If you want to renew the subscription of your
product, select Renew Now.
You can also activate or renew the subscription of
your product from any non-admin user account.
2
Click OK.
Getting started 19
Activating your product
3
4
Follow the on-screen instructions to activate or
renew your product.
In the window that appears, click Done.
To activate your product from the main window
1
In the Norton Internet Security main window, do
one of the following:
1
1
1
If you purchased a subscription version of a
retail product, click Activate Now.
If the product came installed on your computer,
click Activate Online Now.
If you want to renew the subscription of your
product, click Renew.
You can also activate or renew the subscription of
your product from any non-admin user account.
2
3
Follow the on-screen instructions to activate or
subscribe your product.
In the window that appears, click Done.
About problems during activation
If you cannot connect to the Symantec servers to
activate your product, first check your Internet
connection. You then need to see if you have parental
control software, either installed or through your ISP,
that might block the connection.
A connectivity problem can occur if you use parental
control software. If you suspect that parental controls
might block the connection, you can configure the
parental controls so that they do not block the
activation procedure. You need to log in to your
parental control software or to the Internet through
your ISP as an administrator to change your
configuration.
If you use a proxy server to connect to the Internet,
you must configure the proxy settings. To use the
ProxyServer option, go to the Norton Internet Security
main window, and then click Settings > Network >
NetworkSecuritySettings>ProxyServer>Configure.
20 Getting started
Exploring the main window
Exploring the main window
When you start Norton Internet Security, the main
window opens. The main window provides access to
all Norton Internet Security features, options, Help,
and Support.
To explore the main window
on page 17.
1
2
Start Norton Internet Security.
On the top of the main window, click the link that
you want to explore. Your options are:
Settings
Lets you view Computer Settings,
Network Settings, Web Settings, and
General Settings.
Performance
Lets you view and monitor your
system activity.
Feedback
Account
Lets you submit feedback about your
experience with your Norton product.
Lets you manage all of your Norton
product information from one
location.
Support
Lets you view Norton Help Center,
Get Support, Tutorials, New Version
Check, User License Agreement,
Subscription Status and About
Norton Internet Security information.
Getting started 21
Exploring the main window
3
In the center of the window, click the option that
you want to explore. Your options are:
Scan Now
Lets you run a Computer Scan, a
Reputation Scan, or Scan Facebook
Wall.
LiveUpdate
Lets you update the latest definitions
updates and program updates for
Norton Internet Security.
Advanced
Lets you see all the Norton Internet
Security features.
22 Getting started
Responding to System Status indicators
4
On the bottom of the main window, click the option
you want to explore. Your options are:
Activity Map
Lets you access the world map with
hotspots of cybercrimes and the
latest threats.
Norton Management
Lets you manage your Norton
products on all of your devices
from one location.
Norton Mobile Security Lets you download Norton Mobile
Security to your Android device.
Online Family
Lets you set up Norton Online
Family so that you can monitor
your child’s activities on the
Internet.
Safe Web
Lets you check the safety of a Web
site or perform a Safe Web search.
Online Backup
Lets you set up a Norton Online
Backup account or access your
online backup status.
These options may not be available with some
versions of Norton Internet Security. In such case,
you may not be able to access this option.
w
Responding to System Status indicators
Norton Internet Security displays the overall protection
status of your computer as System Status at the top
of the main window. When the System Status needs
attention or is at risk, you can take appropriate action
to improve the System Status. Your computer
protection is based on the programs that are installed
Getting started 23
Monitoring the protection status of a feature
on your computer. To improve your protection status,
ensure that your installed programs are up to date.
The System Status indicator displays the following
statuses:
Secure
Indicates that your computer and
activities are protected from
threats, risks, and damage.
Attention
Indicates that your computer and
activities require attention.
Take appropriate action to improve
your protection status.
At Risk
Indicates that your computer and
activities are at risk.
Take immediate action to improve
your protection status.
You can respond to the System Status indicators
directly from the main window.
To respond to System Status indicators from the main
window
1
In the bottom section of the Norton Internet
Security main window, click Fix Now.
2
Follow the on-screen instructions.
Monitoring the protection status of a
feature
The Norton Internet Security main window acts as a
security management interface. You can access the
main features and monitor the performance of your
computer from the main window.
At times, you may want to turn off any option for a
particular purpose. But by doing so, the status of your
24 Getting started
Monitoring the protection status of a feature
system changes to Attention or AtRisk. In such cases,
you can ignore the protection status of a particular
feature to maintain a healthy overall system status.
For example, you want to turn off BrowserProtection
for a limited period, and you still want the system
status to be Secure. In this case, you can ignore the
protection status of BrowserProtection and then, turn
off the option. When you ignore the protection status
of a feature, it does not affect the overall System
Status.
You can also monitor the protection status of the
feature that has been ignored at any time.
You can ignore or monitor the protection status of only
selected features that are available in the main window.
The features are:
1
1
1
1
1
1
1
1
Antivirus
Antispyware
SONAR Protection
Smart Firewall
Intrusion Prevention
Email Protection
Browser Protection
Safe Surfing
To monitor the protection status of a feature
1
2
3
In the Norton Internet Security main window, click
Advanced.
In the window that appears, move your mouse
pointer over the feature name.
In the pop-up that appears, do one of the following:
1
To ignore the protection status of the feature
that affects your computer’s overall health
evaluation, click Ignore.
1
To monitor the protection status of the feature
that has been ignored, click Monitor.
Getting started 25
For more information
For more information
The product documentation helps you use Norton
Internet Security. You can find the information that
you need on your computer and on the Symantec Web
site.
Accessing Help
Help is available throughout your Norton product. Help
provides links to information that assists you with the
specific tasks that you want to complete. The online
Help provides a guide to all of the product features.
To access Help
1
2
At the top of the main window, click Support.
In the drop-down menu, click Help.
To print a Help topic
1
2
In the Help window, click the Printer icon.
Click OK.
Accessing the Symantec Web site
You can access the Symantec Web site from your
product or from a browser.
To access the Symantec Web site in your browser
1
2
Open your Web browser.
Go to the following URL:
26 Getting started
For more information
Responding to
emergencies
4
This chapter includes the following topics:
1
1
Using the Norton Bootable Recovery Tool
If the installation of your Norton product fails, you can
use the Norton Bootable Recovery Tool to scan and
remove any security threats that prevent successful
installation. If your computer is infected and you are
not able to start your Windows operating system, you
can use Norton Bootable Recovery Tool to remove
threats and recover your computer.
Norton Bootable Recovery Tool is available on the
product CD that you purchased. You can use the
product CD as a recovery media.
To use Norton Bootable Recovery Tool, you must use
w
the product key of the Norton product that you
purchased. If you use a trial version of Norton Internet
Security, you need to create a Norton Account to
receive a product key to use Norton Bootable Recovery
Tool.
28 Responding to emergencies
Downloading the Norton Bootable Recovery Tool Wizard
To use the Norton Bootable Recovery Tool
1
Insert the recovery media and start your computer
from the recovery media.
The recovery media can be a Norton Bootable
Recovery Tool CD, DVD, USB key, or the product
CD.
2
3
Read the Norton License Agreement, type your
product key, and then click I Agree.
If you use a non-QWERTY keyboard, use the Virtual
Keyboard option to enter your product key.
In the Norton Bootable Recovery Tool window,
click Norton Advanced Recovery Scan.
4
5
Click Start Scan.
After the scan is complete, remove the recovery
media from the drive or USB port, and restart your
computer.
Downloading the Norton Bootable Recovery
Tool Wizard
If your attempt to install a Norton product fails, you
can download the Norton Bootable Recovery Tool
Wizard. This easy-to-use wizard helps you create
Norton Bootable Recovery Tool on a CD, DVD, or USB
key. You can use Norton Bootable Recovery Tool to
scan your computer and remove any security threats
that prevent successful installation.
It is recommended that you download and install
Norton Bootable Recovery Tool Wizard on a computer
that does not have any security threats and create
Norton Bootable Recovery Tool. If you create Norton
Bootable Recovery Tool on an infected computer, there
is a chance that the recovery CD, DVD, or USB key
might get infected.
Responding to emergencies 29
Downloading the Norton Bootable Recovery Tool Wizard
To use Norton Bootable Recovery Tool, you must use
the product key of the Norton product that you
purchased. If you use a trial version of Norton Internet
Security, you need to create a Norton Account to
receive a product key to use Norton Bootable Recovery
Tool.
w
You can download Norton Bootable Recovery Tool
Wizard in one of the following ways:
1
From the Start menu.
1
From the Norton Support Web site.
To download the Norton Bootable Recovery Tool Wizard
from the Start menu
1
On the Windows taskbar, do one of the following:
1
In Windows XP, click Start>Programs>Norton
Internet Security > Norton Recovery Tools.
1
In Windows Vista or Windows 7, click Start >
All Programs > Norton Internet Security >
Norton Recovery Tools.
2
Follow the on-screen instructions.
To download the Norton Bootable Recovery Tool Wizard
from the Internet
1
Open your Web browser, and go to the following
URL:
2
Follow the on-screen instructions.
To download the Norton Bootable Recovery Tool Wizard
from Norton Internet Security
1
In the Norton Internet Security main window, click
Scan Now.
2
In the ComputerScan pane, do one of the following:
1
Click Quick Scan.
1
Click Full System Scan.
3
At the bottom of the scan window, next to If you
think there are still risks, click click here.
30 Responding to emergencies
Downloading the Norton Bootable Recovery Tool Wizard
4
5
In the Norton Rescue Tools Web page, click
Download Norton Bootable Recovery Tool.
Follow the on-screen instructions.
Service and
Support
Solutions
About Support
If you have purchased Norton Internet Security, you
can access Support from the product.
Support offerings may vary based on the language or
product.
w
Accessing Norton Autofix
This feature is available for Norton 360, Norton
Internet Security, Norton AntiVirus.
Norton Autofix offers the tools that automatically
diagnose and resolve common issues. You can also
search for solutions or gain easy access to support by
phone, as well as support by chat and email.
Availability of support varies by region. Regular
telephone and Internet connection fees apply in certain
countries. For full support details, please visit:
w
To access Norton Autofix
1
2
In the main product window, click Support.
In the drop-down list, click Get Support.
32 Service and Support Solutions
About Self Help
About Self Help
The Symantec Web site contains answers to the most
common customer questions. From our Web site you
can:
1
1
Find help with your subscription, download, product
activation, or other nontechnical issues.
Search our Support Resources for help with
technical issues, such as installing, configuring, or
troubleshooting errors with your Norton products.
1
Find information about the latest virus threats and
removal tools.
You can access the Symantec support Web site at:
Select your country to get access to Customer Service,
Technical support, and Help against Spyware and
Viruses.
Contact Support
In addition to using our Self Help options, you can
contact a support representative by chat, email, or
phone.
Availability of support varies by region. Regular
telephone and Internet connection fees apply in certain
countries. For full support details, please visit:
w
Service and Support Solutions 33
Support policy
Following is an overview of our support offerings:
Chat
Chat in real time with a support
representative.
For more complex technical issues,
chat offers the option to allow a
support representative to connect
remotely to your computer and
resolve your problem. Chat support
is free, with the exception of our
Virus and Spyware Solution
service.
Email
Submit your question on our Web
site and receive a response by
email.
Email support has a slower
response time when compared to
chat or phone. Email support is
free.
Phone
Speak to a support representative
in real time.
To contact a support representative, please visit the
Symantec support Web site at the following URL:
The online support option is displayed first, followed
by the contact options where you can select the type
of support you prefer.
Support policy
Symantec recommends that you have the latest version
of the product, as it contains new and enhanced
features for better protection against security threats.
In case of older versions, complimentary support is
offered for a minimum of 2 years. However, technical
34 Service and Support Solutions
About keeping your subscription current
information on these products may still be available
through the support Web site at the following address:
Symantec reserves the right to change its support
policies at any time without notice. You can view the
latest version of the support policy at the following
URL:
About keeping your subscription current
Subscription period lengths vary by Symantec product.
To maintain uninterrupted protection, you must keep
your subscription up to date. If you do not renew your
subscription, you cannot obtain updates of any kind
and the software no longer functions.
When you run LiveUpdate near the end of your
subscription period, you are prompted to subscribe for
a nominal charge. Follow the on-screen instructions
to renew your subscription.
When you renew your subscription, the definition
updates and new product features are available
throughout the subscription period. Please note that
features may be added, modified, or removed during
this period.
Worldwide service and support
Worldwide service and support solutions vary by
country. To contact one of our Support offices, please
go to the following Web site and select your language.
Service and Support Solutions 35
ClubNorton
ClubNorton
ClubNorton is your one-stop resource center for
Internet security. As a Norton customer, Symantec
wants to make your experience with your computer
safe, enjoyable, and productive. Whether you use your
computer to manage your personal finances, shop
online, or share your latest digital photos with friends
and family, ClubNorton makes your experience a good
one. Our goal is to consistently provide the proper tools
and information to keep you up to date.
For more information, go to the following URL and
select your country or region in the Select Your
Country/Region drop-down menu:
The ClubNorton Web page includes a regularly updated
article library, a glossary, the Norton Forums, and the
Norton Update Center. You can also find the following
useful links in the Web page:
1
Symantec Security Check
Subscription Troubleshooter
Home & Home Office Security
Product Manuals
Product Updates
Product Reviews
Order Status
1
1
1
1
1
1
1
1
Returns
Rebates
36 Service and Support Solutions
ClubNorton
Index
A
M
About
main window
Advanced 21
Computer 21
features 20
activation
alerts 18
problems 19
procedure 18
troubleshooting 19
Internet 21
options 20
C
Support 20
CD
ClubNorton
computer
N
newsletter 35
Norton Bootable Recovery Tool
using 27
Norton Bootable Recovery Tool
Wizard
downloading 28
Norton Internet Security
activating 18
H
Help
accessing 25
printing 25
icon 18
starting 17
I
installation
S
instructions 14
Scans
Norton Bootable Recovery
Tool 27
Quick Installation
Norton Internet Security includes protection updates and new product features
as available throughout this renewable service period. With this service you
receive the right to use this product on one computer or on the specified number
of computers during the service period, which begins upon initial installation.
This renewable service includes protection updates and new product features
as available throughout the service period, subject to acceptance of the Symantec
License Agreement included with this product and available for review at:
Product features may be added, modified, or removed during the service period.
Before you begin, you should close all open programs on your computer and
ensure that you are connected to the Internet.
Installing Norton Internet Security
You can install Norton Internet Security from a CD or from a file that you
download.
To install Norton Internet Security
1
Do one of the following:
–
If you install from a CD, insert the CD into the optical drive.
In Windows Vista or Windows XP, click Install Norton Internet Security.
In Windows 7, click Launch Norton Install and then click Install Norton
Internet Security.
–
If you downloaded your copy of Norton Internet Security, double-click the
file that you downloaded.
2
3
4
5
In the Norton Internet Security installation page, enter the Product Key.
Click the Install Options link, review the options, and then click OK.
Click the User License Agreement link, and read the agreement.
After you have read the agreement, click Agree & Install.
Norton from Symantec products protect consumers from traditional threats with antivirus, antispam, and Spyware Protection.
They also protect against bots, drive-by downloads, and identity theft, and are light on system resources. In addition, Symantec
provides services such as online backup and PC Tuneup, and is a trusted source for family online safety. For more information,
please click one of the following links:
Copyright © 2011 Symantec Corporation. All rights reserved. Symantec, Norton, and the Norton Logo are trademarks or registered
trademarks of Symantec Corporation and its affiliates in the U.S. and other countries. Other names may be trademarks of their
respective owners.
PN: 21034807
|