Symantec NIS2005 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Symantec NIS2005, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Symantec NIS2005 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Symantec NIS2005. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Symantec NIS2005 should contain:
- informations concerning technical data of Symantec NIS2005
- name of the manufacturer and a year of construction of the Symantec NIS2005 item
- rules of operation, control and maintenance of the Symantec NIS2005 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Symantec NIS2005 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Symantec NIS2005, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Symantec service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Symantec NIS2005.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Symantec NIS2005 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    User’s Guide NIS2005.book Page 1 Sunday, August 1, 2004 3:24 PM[...]

  • Page 2

    Norton Internet Security ™ 2005 User’s Guide The software describe d in this book is furnished under a license agreement and may be used only in accordance w ith the terms of the agreement. Documentation version 8.0 PN: 10291345 Copyright Notice Copyright © 2004 Symantec Corporation. All Rights Reserved. Any technical documentation that i s ma[...]

  • Page 3

    Contents Chapter 1 Installation System requirements ................. .................... ................... . 5 Before installation ............................... ................... ........... 11 Install Norton Internet Security .................. ..................12 After installation ... ................... .................... ...........[...]

  • Page 4

    Contents 4 Create Emergency Disks ........................ ................... ...... 47 If you need to use Emergency Disks ............................48 Chapter 5 Frequently asked questions Explore the Symantec service and supp ort Web site .................. ................... ................... ..............49 How can I find the version numb[...]

  • Page 5

    Installation 1 1 Before installing, take a moment to review the system requirements. System requirements To use Norton Internet Sec urity, your computer must have one of the following Windows operating systems installed: 1 Windows 98/98SE/Me 1 Windows 2000 Professional 1 Windows XP Professional/Home Edition 1 Windows XP Tablet PC Edition 1 Windows [...]

  • Page 6

    Installation Syst em requir ements 6 Your computer must also meet the following minimum requirements. Operatin g S ystem Requiremen ts Windows 98/98SE 1 133-MHz or hi gher proc essor 1 96 MB of RAM 1 200 MB of available har d disk space 1 Internet Explorer 5.5 1 CD-ROM or DVD-ROM drive Windows Me 1 150-MHz or hig her processor 1 128 MB of RAM 1 200[...]

  • Page 7

    Installation Syst em requirements 7 Supported email and instant messenger programs Norton Internet Security adds security features to the following email and instant messenger programs. Feature Suppor ted programs Norton AntiSpam integr ation Most POP3 email progr ams, including: 1 Micr osoft ® Outlook ® Express 5.5 and later 1 Microsoft Outlook [...]

  • Page 8

    Installation Syst em requir ements 8 Norton AntiVirus email scanning Most POP3 and SMTP emai l progr ams, including: 1 Microsoft Outlook Express 4, 5, 6 1 Microsoft Outlook 97/ 98/2000/XP/2003 1 Netsca pe Messen ger 4 1 Netscape Mail 4, 6, 7 1 Eudor a Light 3 , Eudor a Pro 4, Eudor a 5, Eudor a 6.0, Eudora 6.0J 1 Pega sus 3 1 IncrediMail XE 1 Becky[...]

  • Page 9

    Installation Syst em requirements 9 About encrypt ed email conne ctions Norton Internet Security does not support email connections that use Secure Sockets Layer. Secure Sockets Layer (SSL) is a Netscape protocol designed to provide secure communic ations on the Internet. If you use an SSL connection to access your email, you are not protected by N[...]

  • Page 10

    Installation Syst em requir ements 10 Sym a n t e c p c A ny w h e re You should have no pr oblems using Symantec pcAnywhere as either a clie nt or host with Norton Internet Security. F or maximum prot ection, if you run a Symantec pcAnywhere host, ed it the rule to limit its use to only the computers with which you use it. Symantec pcAnywhere pass[...]

  • Page 11

    Installation Bef ore installation 11 With most VPNs, when the VPN client is active, you cannot see the Internet or ot her computers on your local network. You can see only what is available through the VPN server to which you are connected. Before installation See “Create Emergency Disks” on page 47. Before you install Norton Inte rnet Security[...]

  • Page 12

    Installation Instal l Norton In ter net Secur ity 12 2 In the Control Panel window , do one of the following: 2 In the default Category View, click Network a nd Internet Connections , and then click Network Connections . 2 In the Classic View, double-click Network Connections . 3 Right-cli ck the active connect ion icon, and then c lick Properties [...]

  • Page 13

    Installation Install Norton Int ernet Security 13 If an infection is detected in an active program, Norton AntiVirus may close it. Save all your data befo re y ou beg in. 7 Do one of the following: 2 If you want to end the scan, click Stop Scan . 2 If a virus is detected, for each file that you want to delete, click Delete . 8 If you want to see th[...]

  • Page 14

    Installation After installatio n 14 15 Click Finish . Customize your installation During installation, if you select the Custom installation type, you can select the component programs that you want to install. T o customize your installation 1 Follow the Norton Internet Security install ation procedure to step 1 0, select Custom , and then click N[...]

  • Page 15

    Installation After installatio n 15 Use the Configuration Wizard The Configuration Wizard lets you activate and register Norton Internet Security an d complete post-installation tasks. You must be onli ne to activat e your product. w If you choose not t o register the software b y using the Configurat ion Wizard or if registration fails for some re[...]

  • Page 16

    Installation After installatio n 16 12 In the Subscription window , review the subscription information, and then click Next . 13 The Next Steps window lists the following post- installation tasks that Norton Internet Security automatically performs: w If the Use Norton Internet Security instead of Windows Firewall check box and the Do not share No[...]

  • Page 17

    Installation For more i nform ation 17 For more information The product documentation provides assistance for using Norton Int ernet Security. Yo u can find the informati on that you need on your computer and on the Web. Use online Help Help is available throughout your Symantec produc t. Help buttons and links to more information provide assistanc[...]

  • Page 18

    Installation For more in form ation 18 Window and dialog bo x Help Window and dialog box Help provides information about the program. Th is type of He lp is context-sensitive, meaning that it provides help for the dialog box or window that you are currently using. T o access window or dialog bo x Help 4 Do one of the following: 2 In the window, cli[...]

  • Page 19

    Installation For more i nform ation 19 T o re ad a User’s Guide from your hard disk 1 Open the location into which you copied the PDF . 2 Double-click the PDF . Symantec products on the Web The Symantec Web site pr ov ides extensive information about all Symantec products. There are seve ral ways to access the Symantec Web site. T o access the We[...]

  • Page 20

    Installation For more in form ation 20 T o access the S ymantec Web site f rom Windows Explorer 1 Open Windows Explorer . 2 On the toolbar, on the Norton AntiVirus menu, click View Virus Encyclopedia . This option connects you to the Symantec Security Response W eb page, from which you can search for information on all types of viruses. T o access [...]

  • Page 21

    Feature summary 2 Use the information in this se ction to fami li arize yourself with the product. This section includes the following information: 1 A list of all of the features in the product 1 A brief description of each feature The feature summary can help you determine which feature to use to solve a problem. Read the feature descriptions to [...]

  • Page 22

    Feature summary Security protec tion feat ures 22 Security protection features Norton Internet Security includes a suite of security tools that help keep your computer safe from security threats and privacy intrusions. Security protection features incl ude: Perso nal Fir ewall Prot ects your computer from I nter net att acks, dan ger ous Web conten[...]

  • Page 23

    Feature summary Virus a nd t hreat protec tio n features 23 Virus and threat pr otection features Norton AntiVirus provid es comprehensiv e virus prevention, threat detection, and repair software for your computer. It automatically detects and repairs known viruses. Norton AntiVirus detects viruses and other potential risks in instant me ssenger at[...]

  • Page 24

    Feature summary Virus and threat protection featur es 24 Bloodhound techn ol ogy Detects new and unknown viruses b y analyzing an ex ecutable file’s structure, behavior , and other attributes such as progr amming logic, computer instructions, and any data that is contained in the file. Pa s s w o r d protection Prot ects Norton Anti Virus options[...]

  • Page 25

    Feature summary Spam filter ing features 25 Spam filtering features As email becomes more popular, many users are receiving an inc reasing am ount of the unsolicited commercial email messages known as spam. Not only does spam make it difficul t to identify valid email messages, some spam contains offensive messages and images. Norton AntiSpam in co[...]

  • Page 26

    Feature summary Spam filtering f eatures 26 Language filter ing Blocks all email written in the language or languages you specify Automated update of spam definitions Updates copies of Sy mantec spam defi nition files auto matica ll y (s ubscri pti on requ ired ) NIS2005.book Page 26 Sunda y, August 1, 2004 3:24 PM[...]

  • Page 27

    Feature summary Ad b locking features 27 Ad blocking features Many Web sites are using more aggressive te chniques to draw attention to the ads on their pages. Some have begun using larger, more prominent ads, while others rely on ad windows that app ear when you enter or leave the site. Along with increasing the amount of time that it takes to dis[...]

  • Page 28

    Feature summary Ad b loc king features 28 NIS2005.book Page 28 Sunda y, August 1, 2004 3:24 PM[...]

  • Page 29

    Getting started 3 This section contains inform ation about starting your Symantec product and the feat ures that are available in the main window. It is not usually necessary to open your Symantec product to benefit from the pr otection features that it provides. Autom atic featur es that are set during installation provide you with basic protecti [...]

  • Page 30

    Getting started Start Norton Int ernet Security 30 Start Norton Internet Security Norton Internet Secu rity protects any computer on which it is installed. You do not have to start the program to be protected. T o start Nor ton Internet Security 4 Do one of the following: 2 On the Windows taskbar, click Start > Programs > Norton Internet Secu[...]

  • Page 31

    Getting started About the main wind ow 31 About the main window Use the mai n window to ac cess program components, set options, and access online Help. T o explore the main window 1 On the left side of the main window, select a category, such as Statistics or Subscription Status . A description or an expanded list of options appears in the center [...]

  • Page 32

    Getting started About th e main wi ndow 32 3 Inside the main window, under Status & Settings, click any of the feature names to see a brief description of the featur e and access configuration options for the feature . NIS2005.book Page 32 Sunda y, August 1, 2004 3:24 PM[...]

  • Page 33

    Getting started Activa te your pr oduct 33 Activate your product Product activation reduces so ftware piracy and ensures that you have received genuine Symantec software. If you did not activate your product when f irst prompted, you will receive an Activation Needed alert every day until you activate the product. w You must activate your produc t [...]

  • Page 34

    Getting started Ac tivate your produ ct 34 Chec k for co nnectivity bloc kin g A connectivity problem can occur if you are using parental control software or are using an ISP that provides pa rental contro ls. If you suspect that parental controls are blocking the connection, conf igure the parental controls so th at they do not block the activatio[...]

  • Page 35

    Getting started T emporarily turn o ff security pro tection 35 Temporarily turn off security protection There may be times when you want to temporarily turn off security protection. For example, you might want to see if it is prev enting a Web page from appearing correctly. Only Supervisor users can tem porarily turn off security protection. Child [...]

  • Page 36

    Getting started T empor arily turn off security protection 36 To ensure that your computer remains protected, you can turn on security protection manually if you complete your task before the tim e that you specif ied concludes. T o turn on security protection using the icon in the Windows system tray 4 In the Windows system tray, right-click the N[...]

  • Page 37

    Getting started T urn off Auto -Protec t temp oraril y 37 Turn off Auto-Protect temporarily If you have not changed the de fault option settings, Auto- Protect loads when you start your computer to guard against viruses, Trojan horses, worms, and other malicious threats. It checks programs for viruses as they are run and monitors your computer and [...]

  • Page 38

    Getting started Turn o ff A ut o- Pr ote c t te m p ora ril y 38 T o turn on or turn off Auto-Protect using the N orton Antivirus icon in the Windows system tr ay 4 In the Windows system tray, right-click the Norton Internet Securi ty icon, and then do one of the following: 2 Check Enable Auto-Protect to turn on Auto- Protect. 2 Uncheck Enable Auto[...]

  • Page 39

    Getting started T urn of f spam filterin g 39 Turn off spam filtering By default, No rton AntiSp am remains active once it is installed. If for any reason you want to temporarily disable it, you can turn it off from within the program itself. T o turn off spam filtering 1 In the main window, under Norton AntiSp am, click Status & Settings . 2 I[...]

  • Page 40

    Getting started T urn of f spam filterin g 40 NIS2005.book Page 40 Sunda y, August 1, 2004 3:24 PM[...]

  • Page 41

    Responding to emergencies 4 If you have an emergency, read these sections to try to find the solution to your problem. Common problems include: 1 Virus threats 1 Trouble re starting your co mputer 1 Lost or missing files 1 Possible disk damage w If you purchased this product to address any of the problems listed above, read these sections first. Im[...]

  • Page 42

    Responding to emergencies What to do if a vi rus is found 42 What to do if a virus is found w If after reviewing the informat ion in this chapter, you have not resolved your problem, see “Frequently asked questions” on page 49. Viruses can be found during a manual or scheduled scan or by Auto-Protect when you perform an action with an infected [...]

  • Page 43

    Responding to emergencies If Norton AntiVirus cannot r epair a file 43 If Norton AntiVirus cannot repair a file One of the most common reas ons that Norton AntiVirus cannot automatically repair an infected file is that you do not have the most up-to-date vir us definitions. Before running LiveUpdate to upda te your virus definitions, ensure that Qu[...]

  • Page 44

    Responding to emergencies Look up viruses on the Sy mant ec Web site 44 Look up viruses on the Symantec Web site The Symantec Web site contains a complete list of all known viruses and related malicious code, along with descriptions. You must be c onnected to the Internet to look up viruses. To l o o k u p v i r u s e s 1 On the left side of the ma[...]

  • Page 45

    Responding to emergencies If your product won’t install 45 If your product won’t install w You must be running Window s in order to install your Symantec prod uct. If you try to install your prod uct on a com puter that has a virus and you choose not to run the Symantec Pre-Install Scanner, start over and ru n the Symantec Pre-Install Scanner a[...]

  • Page 46

    Responding to emergencies If your computer won’t start 46 If your computer won’t start If you have a virus or threat on your computer, you need to start the computer from an unin fected disk to re move the virus. Scan for viruses using the CD w You might need to change your computer’s BIOS Setup options to start from the CD-R OM drive. To do [...]

  • Page 47

    Responding to emergencies Crea te Emer gency Disks 47 Create Emergency Disks Emergency Disks are used to st art your computer in case of a problem. If your computer can start from a CD, you can use the product C D in plac e of Emer gency Dis ks and d o not need to create them. If you downloaded the software , the program for creating Emergency Disk[...]

  • Page 48

    Responding to emergencies If you need to use Emerg enc y Disks 48 11 Remove the final disk from drive A. 12 Test the first disk in th e set to ensure that you can use it to restart your computer . 13 Store the Emergency Disk set in a safe place. If you need to us e Emergency Disks You can use Emergency Disks to restart your computer and scan for vi[...]

  • Page 49

    Frequently asked questions 5 The information in this chap ter will help you solve the most frequently encountered problems. Explore the Symant ec service and support Web site On the Symantec service an d support We b site, you can find the latest protection and program updates, patches, online tutorials, Knowledge Base articles, and virus removal t[...]

  • Page 50

    Frequently ask ed questions If you need to uninstall 50 If you need to uninstall See “Use online Help” on page 17 . Instructions for uninstalling are available in the online Help. NIS2005.book Page 50 Sunda y, August 1, 2004 3:24 PM[...]

  • Page 51

    Frequently asked questions T roubleshoot virus and thre at prot ection 51 Troubleshoot virus an d threat protection Check here for possible solutions to issues that might arise with Norton AntiVirus. How do I make Auto-Protect load when I start my computer? If the Norton AntiVirus Auto-Pro tect icon is not visible on the lower-right corner of the W[...]

  • Page 52

    Frequently ask ed questions T roubleshoo t virus and thre at prot ection 52 To s h o w t h e A u t o - P r o t e c t i c o n i n t h e W i n d o w s s y s t e m tr ay 1 In the main window, click Options . If a menu appears, click Norton AntiVirus . 2 In the Options window , under System, click Aut o- Protect . 3 Ensure that Show the Auto-P rotect i[...]

  • Page 53

    Frequently asked questions T roubleshoot virus and thre at prot ection 53 Why is Norton AntiVirus unable to repair my infected files? If Norton AntiVirus cannot repa ir your infected f iles, you may not have the most current v irus protection on your computer. Update your viru s definitions regularly to protect y our compu ter from the late st viru[...]

  • Page 54

    Frequently ask ed questions T roubleshoo t virus and thre at prot ection 54 T o tur n off em ail pr otectio n 1 In the main window, click Options . If a menu appears, click Norton AntiVirus . 2 In the Options window, un der Internet, click Ema il . 3 Uncheck Scan incoming Email . 4 Uncheck Scan outgoing Email . 5 Click OK . Why am I unable to send [...]

  • Page 55

    Frequently asked questions T rou bleshoot s ecurity pr otection 55 Troubleshoot security protection Check here for possible solutions to issues that might arise with Norton Internet Security. Does Norton Internet Security work with my ISP’s proxy server? Norton Internet Security works with most proxy servers. However, you might have to change som[...]

  • Page 56

    Frequently ask ed questions T roublesh oot secu rity prote ctio n 56 4 On the Connections tab, in the Remote Service Port column, look at the information. There should be a port number following the I P address of the site that you viewed with your browser . This n um be r is th e p o rt nu m be r th at i s u s ed to ac ce s s your proxy server for[...]

  • Page 57

    Frequently asked questions T rou bleshoot s ecurity pr otection 57 Can Norton Internet Security protect an FTP server? To let an FTP server run behi nd Norton Internet Securi ty, you must create the following rules: 1 Allow inbound TCP connections on port 21. 1 Allow outbound TCP connections on port 22. 1 Allow inbound TCP connections on ports 1024[...]

  • Page 58

    Frequently ask ed questions T roublesh oot secu rity prote ctio n 58 What is wrong with this Web site? If you cannot connec t to a Web site with Norton Internet Security turned off, t here might be a problem with the Internet or your Internet service provider. If your connection i s working, it’s possible a Nor ton Internet Security feature is pr[...]

  • Page 59

    Frequently asked questions T rou bleshoot s ecurity pr otection 59 If your email program mainta ins copies of sent messages in its Sent or Out folder, you can reopen the email message, rem ove the priva te informat ion, and send th e message again. Why won’t a program connect to the Internet? You might not be able to use a program to connect to t[...]

  • Page 60

    Frequently ask ed questions T roublesh oot secu rity prote ctio n 60 To allow the use of your local network, including file and printer sharing, place th e computers on your local network in the Trusted Zone. Why can’t I connect to the Internet via my cable modem? If your network accesses the Internet via a cable connection, you may need to make [...]

  • Page 61

    Frequently asked questions T rou bleshoot s ecurity pr otection 61 4 Click Exclude . 5 Click OK . How can a Web site get my browser information? The Browser Pri vacy settings prevent your browser from sending browser inform ation. However, some diagnostic sites on the Internet m ight report brow ser information even though the Browser Privac y sett[...]

  • Page 62

    Frequently ask ed questions T roubleshoot Norton AntiSpam 62 Troubleshoot Norton AntiSpam Check here for possible solutions to issues that might arise with Norton AntiSpam. Why do I still receive spam? Several factors make i t diffi cult to completely eliminate spam. For example, different peo ple will consider different classes of email me ssages [...]

  • Page 63

    Frequently asked questions T roubleshoot Norton An tiSpam 63 Why did an email message someone sent me never arrive? Some legitimate email messages may contain elements that are characteristic of sp am messages. This may have caused Norton AntiSpam to incorrectly identi fy the message as spam. Depending upon the filters you have created in your emai[...]

  • Page 64

    Frequently ask ed questions T roubleshoot Norton AntiSpam 64 Why do I need a subscription to spam definitions? Though the product is se lf-training, local spa m definitions are developed only by the criteria you input and from the sample of email messages you process. Symantec spam definitions are developed from a much larger set of information and[...]

  • Page 65

    Frequently asked questions T roubleshoot Ad Block ing 65 Troubleshoot Ad Blocking Check here for possible solutions to issues that might arise with Ad Blocking. Does Ad Blocking block all advertising on the current page? Ads that are integrated with standard content—for instance text statements—will not be blocked. Will Pop-up Window Blocking b[...]

  • Page 66

    Frequently ask ed questions T roubleshoo t LiveUpdat e 66 Troubleshoot LiveUpdate Check here for possible solutions to issues that might arise with LiveUpdate. What if I can’t use LiveUpdate? When new updates become availabl e, Symantec posts them on the Symantec Web site. If you can’t run LiveUpdate, you can obtain new updates from the Symante[...]

  • Page 67

    Service and support solutions The Service & Support Web site at http://service.s ymantec.com supports Symant ec products. Customer Servic e helps with nontechnical issues such as orders, up grades, replace ments, and rebates. Technical Support helps with technical issues such as installing, configuring, or troubleshooting Symantec prod ucts. Me[...]

  • Page 68

    Service and support solutions T echnical support 68 Technical support Symantec offers two technical support options for help with installing, configuring, or troubleshooting Symantec products: 1 Online Service a nd Support Connect to the Symantec Se rvice & Supp ort Web site at http://service.symantec.co m, select your user type, and then selec[...]

  • Page 69

    Service and support solutions Worldwide service and support 69 When you run LiveUpdate near the end of your subscription period, you are prompted to subscri be for a nominal charge. Simply foll ow the instructions on the screen. Worldwide service and support Technical support and custom er service solutions vary by country. For Symant ec and Intern[...]

  • Page 70

    Service and support solutions Worldwide ser vice and support 70 Service and support offices North America Sy mantec Corporation 55 5 International W ay Springfield, OR 9 7477 U.S.A. http://w ww .sym antec. com/ Australia and New Zealand Symantec Austr alia Lev el 2, 1 Julius Avenue North Ry de, NSW 211 3 Syd n e y Austr alia http://www .sym antec.c[...]

  • Page 71

    Inde x A activate and register 15 software 15 activation phone 34 problems 33 procedure 33 active content, troubleshooting 58 ActiveX controls 58 Ad Blocking, troubleshooting 65 Adobe Reader installing 18 using to view PDF 18 Alert Assistant 22 Automatic LiveUpdate and proxy settings 66 Auto-Protect description 37 failure to load on startup 51 func[...]

  • Page 72

    Index 72 Emergency Disks (conti nued) using 48 emergency recovery procedures 41 F features about 22 ad blocking 27 automatic update 26 Configuration Wizard 15 email filtering 25 main window 3 1 security protection 22 virus and threat protection 23 file extensions about 43 unusual 52 firewall and LiveUpdate 66 and network 66 troubleshooting 58 Windo[...]

  • Page 73

    Index 73 operating systems 5 Options button, main window 31 P Parental Control 22 password protection 24 options 22 Personal Firewall about 22 troubleshooting rules 58 phone activation 34 Pop-up Window Blocking about 27 troubleshooting 65 ports, determining active HTTP 55 post-insta ll tasks 15 Privacy Control 22 problems activation 33 troubleshoot[...]

  • Page 74

    Index 74 troubleshooting (continued) networks 60 Norton AntiSpam 62 printing 60 Web sites 58 U uninstalling 50 other antivirus programs 11 previous copies of your Symantec product 11 unknown viruses 24 updating from Symantec Web site 66 protection 66 User’s Guide PDF on CD 18 opening 18 V version number , checking 49 virtual private network (VPN)[...]

  • Page 75

    SYMANTEC SOFTWARE LICENSE AGREEMENT Norton Internet Security ™ IMPORT ANT: PL EASE RE AD THE TE RMS AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE USING THE SOFTWARE. SYMANTEC CORPORATION AND/OR ITS SUBSIDIARIES (“SYMANTEC”) IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THE INDIVIDUAL, THE COMPANY, OR THE LEGAL ENTITY THAT WILL BE U[...]

  • Page 76

    Updates. Symantec res erves the right to designate specified Conte nt Updates as requiring purchase of a separate subscri ption at any time and without notice to You; provided, however, that if You purch ase maintenance hereunder that includes part icular Content Updates on the date of purcha se, You will not have to pay an additi onal fee to con t[...]

  • Page 77

    Government end users with only those right s as granted to all othe r end users, according to the terms and conditions contained in this lice nse agreement. Manufacturer is Symant ec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014. 8. Export Regulation: Certain S ymantec product s are su bject to export controls by the U.S. Department o[...]