User Guide

Responding to emergencies
Recover from an emergency
12
See “Identify the
source of
communications”
on page 43.
6 Use Visual Tracking to identify the IP address of the computer that the
attacker used.
You can use this information to report the attack to the ISP that owns
the IP address.
See “Restrict a
blocked computer”
on page 88.
7 To block all future connections from this IP address, add this computer
to your Restricted Zone.
If you suspect that the attacker has already compromised your computer,
install Norton Personal Firewall, then visit http://security.symantec.com
for tools to repair damage and eradicate any threats that the attacker may
have placed on your computer.
Recover from an emergency
Once you’ve dealt with the problem, you can install Norton Personal
Firewall and perform the following activities.
Action Description
Install Norton
Personal Firewall.
Norton Personal Firewall can keep your computer safe from
future attacks.
See “Installing Norton Personal Firewall” on page 19.
Update your
protection.
After installing, run LiveUpdate to ensure that you have the
most updated protection.
See “Keeping current with LiveUpdate” on page 53.
Configure your
firewall.
The default installation of Norton Personal Firewall should
provide sufficient protection for most users, but you can
customize protection by adjusting firewall settings.
See “Customize firewall protection” on page 72.
Periodically review
program logs and
statistics.
Norton Personal Firewall maintains extensive logs of all of
the actions that it takes to protect your computer. Check
these logs occasionally to identify potential problems.
See “Monitoring Norton Personal Firewall” on page 103.