Norton™ Security Product Manual Care for our Environment; ‘It's the right thing to do.’ Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual is made from recycled materials.
Norton Security Product Manual The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Norton, and LiveUpdate, are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries.
Contents Chapter 1 Getting started ....................................... 8 About Norton Security ................................. 8 About the Norton product main window ............................................ 14 Opening and closing Norton Security on Mac ................................................ 18 About the Norton Security menu ................... 19 About the Norton Security shortcut menu .............................................. 20 How to check your Mac user account type ...........
Contents 4 Disabling or enabling Norton Phishing Protection ........................................ 37 About Norton toolbar ................................. 38 Chapter 5 Guarding files ....................................... 42 About File Guard ...................................... Disabling or enabling File Guard ................... Adding files to File Guard ........................... Removing files from File Guard .................... Granting access to guarded files for Mac OS X applications ...
Contents Chapter 8 5 Customizing settings ............................. 61 About Automatic Scans settings ................... 63 Turning off or turning on Automatic Scans ............................................. 64 Including files for Automatic Scans ................ 65 Excluding files from Automatic Scans ............ 66 Removing files from the Automatic Scans exclusion list ..................................... 66 Removing files from Automatic Scans list ...........................................
Contents Removing the access settings for a service .......................................... About firewall rule for IP addresses .............. Configuring firewall rules for an IP address ......................................... Modifying firewall rules for an IP address ......................................... Removing firewall rule for an IP address ......................................... About configuring firewall for an application ......................................
Contents 7 Deleting an item from the Quarantine ........... 127 Chapter 10 Protecting against new threats .............. 128 About LiveUpdate ................................... 128 About program updates and definition updates ......................................... 128 Checking for updates manually ................... 129 Chapter 11 Finding additional solutions .................. 131 Checking for virus names and definitions .......................................
Getting started 1 This chapter includes the following topics: 1 About Norton Security 1 About the Norton product main window 1 Opening and closing Norton Security on Mac 1 About the Norton Security menu 1 About the Norton Security shortcut menu 1 How to check your Mac user account type 1 Viewing recent activities 1 Viewing network activities About Norton Security Norton Security delivers today’s fast and light all-in-one solution to protect your Mac and all your online activities.
Getting started About Norton Security 9 Norton Security monitors the network activity of your Mac and manages the incoming and the outgoing access attempts. The Firewall settings contain the rules that specify the access settings for the applications, services, and ports in your Mac. It also contains access settings for the IP addresses in the network to which your Mac is currently connected.
Getting started About Norton Security 10 The following table lists the important features that are available in Norton Security: Automatic Scans Automatically detects and removes spyware, viruses, Trojan horses, bots, and Internet worms. Norton Security provides enhanced security and protects your Mac in the following ways: 1 1 Checks for security risks every time you use a program on your computer, insert removable media, and access the Internet.
Getting started About Norton Security Firewall Monitors the network activity of your Mac and manages the incoming and the outgoing access attempts. The Connection Blocking settings contain the rules that specify the access settings for the applications, services, and ports in your Mac. It also contains access settings for the IP addresses in the network to which your Mac is currently connected.
Getting started About Norton Security Scans Lets you perform the following types of scans: 1 Quick Scan Lets you scan the home folders on your Mac. 1 Full Scan Lets you select and scan multiple disks to remove viruses and other security threats. 1 File Scan 1 Lets you scan a particular file or folder on your Mac to know if it is infected. Scan Facebook Wall Lets you scan News Feeds on your Facebook wall periodically to protect you from malicious links. See “About Norton Security scans” on page 47.
Getting started About Norton Security Safe Web Lets you enable or disable the different Safe Web options that protect you from visiting unsafe websites. You can enable or disable the following Safe Web options: 1 1 Safe Web Norton Phishing Protection See “About Safe Web” on page 32. File Guard Lets you protect the specific files that contain sensitive information from being opened, moved, copied, or deleted without your permission. See “About File Guard” on page 42.
Getting started About the Norton product main window 14 About the Norton product main window Your Norton product delivers today’s fast and light all-in-one solution to protect your Mac and all your online activities. w Your Norton product main window provides you a centralized location for the various activities that you can perform using the product. You can access the main features of the product from the main window and manage the performance of your Mac.
Getting started About the Norton product main window Scans Lets you access different types of scans to protect your computer and your sensitive data. You can use the Scans option and run the following types of scans: 1 1 1 1 1 Quick Scan: Scans the home folders on your Mac. Full Scan: Scans selected disks to remove viruses and other security threats. File Scan: Scans a particular file or folder on your Mac and removes any security threats.
Getting started About the Norton product main window LiveUpdate Lets you run LiveUpdate to download the latest virus definitions and program updates. Norton Security uses the latest virus definitions from Symantec servers to detect and remove latest security threats. What to do if I get a LiveUpdate error? Advanced Lets you access the Advanced window. You can do the following tasks in the Advanced window: 1 1 1 1 1 1 1 1 Configure and schedule different scans. Change the Firewall settings.
Getting started About the Norton product main window Add Devices 17 Lets you install the latest version of Norton Security on other devices. This ensures that your Mac and other devices are protected by Norton. You can use the Get Started option to access your Norton account. You can use your Norton account login credentials to sign in to Norton. After logging in, you can use the Install on another device option and follow the on-screen instructions to install the product on another device.
Getting started Opening and closing Norton Security on Mac 18 Activate Now or Renew Now option to activate or renew your Norton product subscription. FAQs on Norton Automatic Renewal Service How to find your product key Opening and closing Norton Security on Mac After you install Norton Security, the product automatically protects you from all types of malware and safeguards your sensitive data. If Norton Security detects a threat that requires your attention, an alert appears to help you resolve it.
Getting started About the Norton Security menu 19 About the Norton Security menu The Norton Security menu appears on the top-left corner of the Mac menu bar when you launch Norton Security. You can use the Norton Security option from the Norton Security menu to view the different menu options. You can access the following options from the Norton Security menu: About Norton Security Displays the general information of Norton Security.
Getting started About the Norton Security shortcut menu Uninstall Norton Security 20 Lets you uninstall Norton Security. You need to have a user account with administrator privileges to uninstall Norton Security. Quit Norton Security Lets you close Norton Security. You can use the Export option under the File menu to export your network location settings. You can export your network location settings in a .npfx file format.
Getting started How to check your Mac user account type 1 21 Quit Norton Security. How to check your Mac user account type A user account defines the actions a user can perform on a Mac. You can create the following types of user accounts on your Mac: 1 Administrator account 1 Standard account 1 Managed account Each account has different privileges. An administrator account gives you access to all areas of the Mac, install and update software, create and maintain other user accounts.
Getting started Viewing recent activities Firewall 22 Lets you view the following: 1 1 1 1 Applications that were allowed or blocked. Connection attempts that were allowed or blocked. Change in the network location of your Mac. Vulnerability attacks that were allowed or blocked. Safe Web & File Guard Lets you view the list of activities that the Safe Web feature had performed and the unauthorized access attempts to your guarded files.
Getting started Viewing network activities 23 Viewing network activities You can view the incoming and the outgoing network connection details in the Network Activity window. You can also search for a particular type of application, service, port, or IP address that runs on your Mac and view its network connection details in the Network Activity window.
Getting started Viewing network activities Search For 24 Lets you view the network connection details based on the applications, services, or ports that run on your Mac. Your options are: 1 Applications 1 Searches for and displays a list of the applications that are currently running on your Mac. Services & Ports Searches for and displays a list of the services and ports that run on your Mac. To view the network connections 1 In the Norton Security main window, click Advanced.
Activating your product 2 This chapter includes the following topics: 1 Activation protects you 1 Activating your Norton product on Mac 1 Where to find your product key Activation protects you Product activation is a technology that protects users from pirated or counterfeit software. It protects you by limiting the use of a product to those users who have acquired the product legitimately. Product activation requires a product key for each installation of a product.
Activating your product Activating your Norton product on Mac w 26 choose not to activate at that time, you receive an alert that reminds you to activate the product. You can also activate your product from the Norton Security main window. If you do not activate the product within the time period that the alert specifies, the product stops working. You can activate it after the time period has elapsed, but you are not protected until you activate the product.
Activating your product Where to find your product key 27 2 On the Subscription window, enter your Norton account credentials, and click Sign In. If you do not have a Norton account, click Create a new Norton account to register for an account. 3 You can activate your product in one of the following ways: 1 Use a product key To activate your product using a retail version of the product key that you purchased, click Enter a Key.
Activating your product Where to find your product key The locations of the product key are as follows: If you downloaded the The product key is stored on product from the Symantec your computer as part of the Store download process and is included in the confirmation email from the Symantec Store. If your computer came with The product key is provided the product already installed as part of the activation process.
Activating your product Where to find your product key If you purchased a Norton card from a retail store The product key is printed at the back of the Norton card. Go to the following webpage and enter your product key: https://manage.norton.com/setup Norton validates the product key that you entered and prompts you to log in using a Norton account. After logging in using your Norton account, you can use the Agree & Download option to download and install your Norton product.
Managing Norton products 3 This chapter includes the following topics: 1 Creating a Norton account 1 Accessing your Norton account Creating a Norton account w With a Norton account, you can manage all of your Norton products in one place. Your Norton account stores the product key and the billing information of your product. You can also register your product with the Norton account. You cannot access Norton account if you are a Norton Small Business user.
Managing Norton products Accessing your Norton account 31 To create a Norton account 1 Open your browser and go to the following URL: https://manage.norton.com 2 In the Norton webpage that appears, click Create an Account. 3 In the page that appears, click Create account. 4 In the Create an account webpage, provide the details of your account information, and then click Sign Up. Accessing your Norton account w The product key for each Norton product is conveniently stored in your Norton account.
Identifying fraudulent websites 4 This chapter includes the following topics: 1 About Safe Web 1 Disabling or enabling Safe Web 1 About Norton Safe Web 1 About Norton Phishing Protection 1 Disabling or enabling Norton Phishing Protection 1 About Norton toolbar About Safe Web Safe Web monitors your Internet activities and protects you from visiting unsafe websites.
Identifying fraudulent websites About Safe Web w 33 When Safe Web is enabled, Norton Security analyzes the security statuses of the websites and alerts you if you visit fraudulent or phishing websites. The Norton browser extensions get added to your web browser when you launch the Firefox or Safari browser for the first time after you install Norton Security. The Safari browser prompts you for a confirmation before it adds the extension.
Identifying fraudulent websites Disabling or enabling Safe Web 34 Disabling or enabling Safe Web You can disable or enable Safe Web from the Advanced window. To disable or enable the Safe Web 1 In the Norton QuickMenu, click Norton Security. 2 In the Norton Security main window, click Advanced. 3 On the left pane, click Safe Web, and do one of the following: 1 To disable Safe Web, move the Safe Web switch to the Off position. 1 To enable Safe Web, move the Safe Web switch to the On position.
Identifying fraudulent websites About Norton Safe Web 35 1 View the Norton rating 1 View the community rating 1 Add your reviews 1 View the user reviews 1 View a list of keywords that are tagged to the website 1 View the threat information and the general information about the website The following are the options that you can use to configure Norton Safe Web: Enhance search engine results Lets you configure Norton Safe Web to display the site-rating icons next to each search result.
Identifying fraudulent websites About Norton Phishing Protection Block harmful websites 36 Lets you configure Norton Safe Web to block harmful websites. When you select this option Norton Security displays the Website Blocked page when you visit harmful websites. Symantec recommends that you do not visit such websites. About Norton Phishing Protection Phishing Protection protects you from visiting unsafe websites.
Identifying fraudulent websites Disabling or enabling Norton Phishing Protection 37 Symantec analyzes the pages of these websites and verifies if they belong to the company that it represents. You can be confident that the information that you provide goes to the company with which you want to do business. If you think that the Symantec security status rating is incorrect, you can report the website to Symantec for re-evaluation.
Identifying fraudulent websites About Norton toolbar 38 toolbar of your browser. Phishing Protection also blocks navigation on a fraudulent website. You can disable or enable Phishing Protection from the Safe Web window. To disable or enable Norton Phishing Protection 1 In the Norton QuickMenu, click Norton Security. 2 In the Norton Security main window, click Advanced. 3 On the left pane, click Safe Web. 4 In the Safe Web row, click the settings icon.
Identifying fraudulent websites About Norton toolbar 39 Norton toolbar has the following features: Norton menu Lets you do the following: 1 1 1 1 1 1 Open Norton Security Hide Norton Toolbar Disable Safe Search Norton Community Buzz Norton Safe Web Site My Norton account The Disable Safe w Search option appears only if you added the Norton Safe Search box to your Norton toolbar when you first launched your browser after you installed Norton Security.
Identifying fraudulent websites About Norton toolbar Norton Secured Indicates that the website is verified by Symantec. Symantec analyzed this website and found that the website is VeriSign trusted. The website has a Secure Socket Layer (SSL) certificate provided by VeriSign. VeriSign trusted websites are virus free and are safe. Symantec categorizes the shopping websites that are VeriSign trusted as Norton Secured websites.
Identifying fraudulent websites About Norton toolbar Site is Unsafe Indicates Symantec has analyzed this website and determined that the website is unsafe to visit. This website may attempt to install malicious software on your computer. The website that you visit may have Computer Threats, Identity Threats, and Annoyance Factors. Symantec recommends that you do not visit this website. Use Caution Indicates the Symantec has analyzed this page and determined that this page provides annoying results.
Guarding files 5 This chapter includes the following topics: 1 About File Guard 1 Disabling or enabling File Guard 1 Adding files to File Guard 1 Removing files from File Guard 1 1 Granting access to guarded files for Mac OS X applications Turn on or turn off guarded file access notification About File Guard You can use the File Guard feature of Norton Security to safeguard the files that have your sensitive data.
Guarding files Disabling or enabling File Guard 1 1 43 A guarded file must be located on a local disk. It cannot be in the root folder of the local disk or in the System folder. The maximum number of files you can protect is 250. Disabling or enabling File Guard When you disable the File Guard feature, it stops protecting your files that you have added to the Guarded Files list. The files that you have added in the Guarded Files list are not deleted.
Guarding files Removing files from File Guard 44 must enable the File Guard feature to add files to the Guarded Files list. You can use the File Guard window to do the following: 1 1 1 1 Add the files that you want to protect against unauthorized access. Remove the files that are already protected. Enable or disable access to your guarded files by Mac OS X programs such as Finder and Spotlight. Disable or enable the notifications when an access to a guarded file is blocked.
Guarding files Granting access to guarded files for Mac OS X applications 45 3 On the left pane, click File Guard. 4 In the File Guard row, click the settings icon. 5 In the Guarded Files list, select the files that you want to remove. To select multiple items, use Shift-click or Command-click. 6 Click Remove File(s). 7 Click Done.
Guarding files Turn on or turn off guarded file access notification 46 Turn on or turn off guarded file access notification When there is an unauthorized access to the guarded files, the File Guard feature notifies you. You must enable the Notify me when access to a guarded file is automatically blocked option to get a notification. To turn on or turn off guarded file access notification 1 In the Norton Security main window, click Advanced. 2 On the left pane, click File Guard.
Scanning your Mac manually 6 This chapter includes the following topics: 1 About Norton Security scans 1 Running a Quick Scan 1 Running a full system scan 1 Scanning a specific file or folder 1 About Scan Facebook Wall 1 Scanning your Facebook wall 1 Running scans from the command line About Norton Security scans Norton Security lets you perform manual virus scans.
Scanning your Mac manually Running a Quick Scan 1 48 Viruses in the files that are excluded from the Automatic Scans. In this case, you can use Norton Security to scan a particular file, folder, or drive on your Mac. You can perform the following types of manual virus scans: Quick Scan Scans the important locations of your Mac that the viruses and other security threats often target. Quick Scan takes less time because this scan does not scan your entire Mac.
Scanning your Mac manually Running a full system scan 49 2 On the left pane, click Quick Scan, and then click Start a Quick Scan. You can use the following options when the scan is in process: Pause Suspends the scan temporarily. You must click the Resume option to continue the scan. Cancel Terminates the scan. Running a full system scan You can run a full system scan on your Mac. A full system scan thoroughly examines your entire computer for viruses, spyware, and different security vulnerabilities.
Scanning your Mac manually Scanning a specific file or folder 50 Scanning a specific file or folder By using Norton Security, you can scan a specific file or a folder. For example, if you have received a compressed file in an email message and if you suspect a virus, you can use the File Scan option to scan that file. To scan a specific file or folder 1 In the Norton Security main window, click Scans. 2 On the left pane, click File Scan. 3 Click Select a file and navigate to the file or folder location.
Scanning your Mac manually About Scan Facebook Wall 51 option on this page lets you give permission to Norton Safe Web to access your Facebook wall. The auto-scan feature in the Norton Safe Web application page helps you protect your Facebook wall. Norton Safe Web scans the News Feed on your Facebook wall periodically and protects you from malicious links. When Norton Safe Web detects a malicious link, it notifies you.
Scanning your Mac manually Scanning your Facebook wall Warning 52 Indicates that the website has security risks. The websites with this rating may install malicious software on your computer. Symantec recommends that you do not visit this site. Untested Indicates that Norton Safe Web has not yet tested this site and it does not have sufficient information about this website. Caution Indicates that the site may have security threats.
Scanning your Mac manually Running scans from the command line 53 Running scans from the command line Norton Security lets you perform multiple scans from the command line interface. The Norton Scanner feature in Norton Security provides this power user feature. Symantec recommends that you use this feature only if you are an advanced user. You can launch the command line interface by navigating to Finder > Applications > Utilities > Terminal.
Keeping secure on the Internet 7 This chapter includes the following topics: 1 About Vulnerability Protection 1 Turning off or turning on Vulnerability Protection 1 Excluding or including attack signatures 1 Getting information about attack signatures 1 1 Enabling or disabling notifications for blocked attack signatures Configuring the port scan sensitivity About Vulnerability Protection Vulnerability Protection feature helps you in detecting and preventing Intrusions through the Internet.
Keeping secure on the Internet Turning off or turning on Vulnerability Protection 55 attacks can slow down the performance of your Mac, cause program failure, or expose your personal data and confidential information to the hackers. Norton Security provides the signature-based solutions to protect your Mac from the most common Internet attacks. Attack signatures contain the information that identifies an attacker's attempt to exploit a known vulnerability in your operating system or your Mac programs.
Keeping secure on the Internet Excluding or including attack signatures 56 used to identify an attacker's attempt to exploit a known operating system or application vulnerability. You can choose whether you want to protect your Mac from all the attack signatures or only from the selected signatures. In some cases, benign network activity can appear to be similar to an attack signature. You might receive repeated notifications about possible attacks.
Keeping secure on the Internet Getting information about attack signatures 57 Getting information about attack signatures Vulnerability Protection uses a frequently updated list of signatures to detect known attacks. You can view the list of signatures or get information on a specific signature from the Symantec Security Response website. A web browser opens to display information about the signature from the Symantec website.
Keeping secure on the Internet Enabling or disabling notifications for blocked attack signatures 58 information about the unauthorized accesses attempts and other details. You can enable or disable notification for all blocked attacks or for individual attack signatures. To enable or disable notifications for all blocked attacks 1 In the Norton Security main window, click Advanced. 2 On the left pane, click Firewall. 3 In the Vulnerability Protection row, click the settings icon.
Keeping secure on the Internet Configuring the port scan sensitivity 59 Configuring the port scan sensitivity Port scanner is an application that randomly searches for vulnerable areas of the computers that are connected on a network. When you use the Internet, port scanners might try to infect through the vulnerabilities of your Mac. The Vulnerability Protection feature monitors your Mac for port scans and blocks the connection from unauthorized or unknown computers.
Keeping secure on the Internet Configuring the port scan sensitivity 5 Under Sensitivity, select any one of the following sensitivity level: Most secure When you set this level, Norton Security is more sensitive to port scan. It blocks any application from accessing your Mac and notifies you with alerts. You can set this option when you use a public wireless network to provide the maximum protection for your Mac.
Customizing settings 8 This chapter includes the following topics: 1 About Automatic Scans settings 1 Turning off or turning on Automatic Scans 1 Including files for Automatic Scans 1 Excluding files from Automatic Scans 1 Removing files from the Automatic Scans exclusion list 1 Removing files from Automatic Scans list 1 About Scheduled Scans 1 Turning on or turning off Scheduled Scans 1 Customizing Scheduled Scans settings 1 About Idle Scans 1 Turning off or turning on Idle Scans 1
Customizing settings 1 1 62 Configuring the access settings for an application Customizing the specific access settings for an application 1 Editing the access settings of an application 1 Removing access settings for an application 1 About access settings for a service 1 Configuring the access settings for services 1 Customizing the specific access settings for a service 1 Editing the access settings for a service 1 Removing the access settings for a service 1 About firewall rule for IP
Customizing settings About Automatic Scans settings 63 1 Disabling or enabling advanced protection features 1 Configuring Norton DeepSight Community Download 1 Configuring Norton DeepSight Community Submission 1 Configuring AutoBlock settings 1 Managing Excluded IP addresses 1 Configuring Signatures settings About Automatic Scans settings Automatic Scans provide enhanced security from the time you start your Mac.
Customizing settings Turning off or turning on Automatic Scans 1 1 1 1 64 Lets you specify the folders that you want to be scanned automatically. Don't scan these folders Lets you exclude specific folders from Automatic Scans. Scan files in compressed archives (Recommended) Lets you enable or disable Norton Security to scan the files within the compressed files available on your Mac. For example, files with .zip or .rar file extension with the maximum size limit of 1 MB.
Customizing settings Including files for Automatic Scans 65 To turn off or turn on Automatic Scans 1 In the Norton Security main window, in the left pane, click Advanced. 2 On the left pane, click Protect My Mac. 3 In the Automatic Scans row, do one of the following: 1 Turn off Automatic Scans, move the switch to the Off position. 1 Turn on Automatic Scans, move the switch to the On position.
Customizing settings Excluding files from Automatic Scans 66 Excluding files from Automatic Scans By default, Norton Security scans all the files and folders on your Mac. However, you can configure it not to scan certain files or directories. You can exclude some frequently used applications from Automatic Scans to reduce the scanning time. To exclude a file from Automatic Scans 1 In the Norton Security main window, click Advanced.
Customizing settings Removing files from Automatic Scans list 67 5 Select the folder that you want to remove from the exclusion list and click -. 6 Click Save. Removing files from Automatic Scans list The files that are included for Automatic Scans are listed in the Scan only these folders list. If you think that scanning a file that you included previously is not necessary, you can remove it from the Automatic Scans list.
Customizing settings Turning on or turning off Scheduled Scans 68 Norton Security displays the scan results on your computer when the scheduled scan is complete. You can use the Reset to Defaults option to reset the Scheduled Scans settings to default. Turning on or turning off Scheduled Scans You can configure Norton Security to run a scheduled scan. Norton Security runs the scan on a specific day and time.
Customizing settings Customizing Scheduled Scans settings w 69 The scheduled scan settings do not change when a different user uses the Mac. Norton Security runs the scheduled scan at the scheduled time with the settings already configured. To customize Scheduled Scans settings 1 In the Norton Security main window, click Advanced. 2 On the left pane, click Protect my Mac. 3 In the Scheduled Scans row, click the settings icon.
Customizing settings Customizing Scheduled Scans settings 4 In the Scheduled Scans window, configure your scan settings. Your options are: When to Scan Lets you specify the day and time at which you want Norton Security to run the scan. What to Scan Lets you specify the area that you want Norton Security to scan. Your options are: 1 Startup Disk 1 Performs a scan on the startup (boot) disk of your Mac. All User Folders 1 Performs a scan on all of the home folders on your Mac.
Customizing settings About Idle Scans Show Scheduled Scan Results 71 Lets you specify when you want Norton Security to notify you about the Scheduled Scan results. Your options are: 1 1 Only when infections are found Select this option if you want to be notified when a security threat is detected. Always Select this option if you want to receive notification for activities of Norton Security during the scheduled scan.
Customizing settings Turning off or turning on Idle Scans w 72 The Idle Scans option is automatically turned on when you install Norton Security. Even though idle scan automatically runs the scan, you can still customize the settings of idle scan. Norton Security decides when to run idle scan depending on your settings and a few other predefined parameters. The idle scan settings do not change when a different user uses the Mac.
Customizing settings Customizing Idle Scans settings 73 Customizing Idle Scans settings w Norton Security keeps your Mac secure from latest security threats by automatically running scans on your computer using the Idle Scans feature. Idle Scans detect the time when you do not use your Mac and intelligently run the scan. The idle scan settings do not change when a different user uses the Mac. Norton Security detects the idle time of the Mac and runs the idle scan with the settings already configured.
Customizing settings Customizing Idle Scans settings 4 In the Idle Scans window, customize your scan settings. You can customize the scan in the following ways: What to Scan Lets you specify the area that you want Norton Security to scan. Your options are: 1 Startup Disk 1 Performs an idle scan on the startup (boot) disk of your Mac. All User Folders 1 Performs an idle scan on all of the home folders on your Mac. Entire System Performs an idle scan on all the available disks of your Mac.
Customizing settings About Firewall settings Show Idle Scan Results 75 Lets you view the idle scan results in the Security History window. Your options are: 1 1 Only when infections are found Select this option if you want to view the scan results when a security threat is detected. Always Select this option if you want to view the activities of Norton Security during the idle scan. You can view activities such as completed scans or scans that are canceled because of system activity.
Customizing settings About Firewall settings You can use the Firewall window to customize the following firewall settings: Application Blocking Lets you configure firewall rules for the applications that run on your Mac to connect to the Internet. The Application Blocking settings determine whether to allow or deny an application, such as a Web browser or iTunes, from connecting to the Internet. Application Blocking settings are not specific to a particular network location.
Customizing settings About Firewall settings Connection Blocking Lets you allow or block the applications, ports, services, and IP addresses that: 1 1 Connect to your Mac. Connect to a network. The Connection Blocking settings determine whether to allow or deny the incoming or the outgoing connections that use a specific service, application, or a port. You can also configure firewall to allow or block a specific IP address on the network.
Customizing settings About Firewall settings Location Awareness Lets you configure the firewall settings based on the network location to which your Mac is connected. The firewall settings that you configure contains the connection blocking settings for the application and services that run on your Mac. When you connect your portable Mac to a new network location, Norton Security prompts you to select a new firewall setting for the network location.
Customizing settings About Firewall settings DeepSight Lets you access and configure the Norton DeepSight Community Download and Norton DeepSight Community Submission features. Your options are: 1 1 Norton DeepSight Community Download This feature lets you obtain the updated list of IP addresses that Symantec identifies as attackers. You can enable the Norton DeepSight Community Download feature to obtain the updated list of IP addresses from Symantec servers.
Customizing settings About Connection Blocking settings 80 About Connection Blocking settings You can configure the Connection Blocking settings for an application, a service, or an IP address. Based on the Connection Blocking settings, the firewall allows, or blocks the incoming and the outgoing network connections. The Connection Blocking settings that you configure are specific to the selected network location. The settings apply only when your Mac connects to the specified network location.
Customizing settings Configuring Connection Blocking settings 81 Configuring Connection Blocking settings Connection Blocking settings apply to the incoming and the outgoing connections that use a specific application, service, port, or IP address. w w You can use the Connection Blocking window to configure whether an application or a service that is allowed to connect to the Internet or to the local network.
Customizing settings Configuring Connection Blocking settings 82 5 Select an option in the View menu. The options that appear in the View menu vary depending on the network location that you select in the Editing settings menu. Your options are: Applications Lets you specify the Connection Blocking settings for the applications that run on your Mac. Services/Ports Lets you specify the Connection Blocking settings for the services and ports that run on your Mac.
Customizing settings Configuring Connection Blocking settings 6 Select one of the following tabs: Incoming Lets you specify the access settings for the incoming connections that use an application or a service that runs on your Mac. Outgoing Lets you specify the access settings for the outgoing connections that use an application or a service that runs on your Mac. Incoming & Outgoing Lets you configure the access settings for connections to and from the IP addresses that you specify.
Customizing settings About access settings for an application 84 7 Use the Action pop-up menu at the bottom of the Connection Blocking window to specify other connection blocking preferences. Your options are: Logging and notification settings Lets you specify the type of access attempts for which Norton Security must maintain records. You can also specify the type of access attempts about which Norton Security must notify you. Advanced settings Lets you specify the advanced firewall options.
Customizing settings Configuring the access settings for an application 1 Edit the access settings 1 Remove the access settings 85 Configuring the access settings for an application Norton Security lets you configure the access settings for the applications that run on your Mac. Based on the settings that you configure and the network location of your Mac, the firewall allows or blocks the incoming and the outgoing connections.
Customizing settings Configuring the access settings for an application 86 6 Select one of the following tabs: Incoming Lets you specify the access settings for the incoming connections for the application. Outgoing Lets you specify the access settings for the outgoing connections for the application. 7 Click Add application. 8 In the Choose Application dialog, select the required application. If the application that you want does not appear in the list, click Other to search for the application.
Customizing settings Customizing the specific access settings for an application 87 11 Use the Action drop-down menu at the bottom of the Connection Blocking window to specify the advanced firewall preferences. Your options are: Logging and notification settings Lets you specify the type of access attempts for which Norton Security must maintain records. Advanced settings Lets you specify the advanced firewall options. Reset to defaults Lets you reset configuration to default level. 12 Click Done.
Customizing settings Customizing the specific access settings for an application 88 3 In the Connection Blocking row, click the settings icon. 4 In the Connection Blocking window, in the Editing settings menu, select the network location for which you want to configure the specific access settings for an application. 5 In the View menu, select Applications. 6 Select one of the following tabs: Incoming Lets you specify the access settings for the incoming connections that use the application.
Customizing settings Editing the access settings of an application 9 Select the one of the following option to customize the specific access settings: All computers on my current Lets you allow or block connections to or from all network computers on your network. A single computer Allow or block connections to or from the computer with the IP address that you specify. All IP addresses beginning with Allow or block connections to or from computers with the base address that you specify.
Customizing settings Editing the access settings of an application 90 To edit the Logging and Notifications settings for an application 1 In the Norton Security main window, click Advanced. 2 On the left pane, click Firewall. 3 In the Connection Blocking row, click the settings icon. 4 In the Connection Blocking window, in the Editing settings menu, select the network location that you want to edit. 5 In the View menu, select Applications. 6 Select an application that you want to edit.
Customizing settings Editing the access settings of an application 8 In the Edit application window, edit the logging settings. Your options are: Override global logging settings Select the Override global logging settings check box to select the logging options Log allowed inbound connections Maintains a record of all the allowed incoming connections that use the application. Log allowed outbound connections Maintains a record of all the allowed outgoing connections that use the application.
Customizing settings Editing the access settings of an application 92 9 In the Edit application window, edit the notifications settings. Your options are: Override global notifications Select the Override global notifications settings check settings box to select the notification options Notify me of allowed inbound connections Displays an alert for all of the allowed incoming connections that use the application.
Customizing settings Editing the access settings of an application 93 6 Select an application for which you want to edit the specific access settings. 7 In the View pane, select the row that contains the specific access settings for the application, and then click Edit. 8 In the Edit address window, edit the required option. 9 Click Save. To edit the default access settings for an application 1 In the Norton Security main window, click Advanced. 2 On the left pane, click Firewall.
Customizing settings Removing access settings for an application 94 9 Click Save. Removing access settings for an application You can use the Connection Blocking window to remove the following access settings that you have configured for an application: 1 Access settings for an application 1 Specific access setting for an application However, you cannot remove the default Connection Blocking setting that appears in the list.
Customizing settings About access settings for a service 95 5 In the View menu, click Applications. 6 Select one of the following tabs: Incoming Lets you specify the access settings for the incoming connections that use the application. Outgoing Lets you specify the access settings for the outgoing connections that use the application. 7 Select the row that contains the specific access settings and do one of the following: 1 Click Remove.
Customizing settings Configuring the access settings for services 96 service. The specific access settings let you allow or block connections to specific computers.
Customizing settings Configuring the access settings for services 97 6 Select one of the following tabs: Incoming Lets you specify the access settings for the incoming connections that use the service. Outgoing Lets you specify the access settings for the outgoing connections that use the service. 7 Click Add service. 8 In the New Service dialog that appears, select the default access setting option that you want to apply for the service.
Customizing settings Configuring the access settings for services 10 Configure the following tabs as required: Ports Lists the ports in the firewall that the service can open. You can use the Add, Edit, and Remove options only when you add a new service. You can use these options to add or modify the port numbers that you add. Logging Lists the types of connections that Norton Security must log.
Customizing settings Customizing the specific access settings for a service 99 12 In the Action drop-down menu at the bottom of the Connection Blocking window, specify the advanced firewall preferences. Your options are: Logging and notification settings Lets you specify the type of access attempts for which you want Norton Security to maintain records. You can also specify the type of access attempts about which you want Norton Security to notify you.
Customizing settings Customizing the specific access settings for a service 100 To customize the specific access settings for a service 1 In the Norton Security main window, click Advanced. 2 On the left pane, click Firewall. 3 In the Connection Blocking row, click the settings icon. 4 In the Connection Blocking window, in the Editing settings menu, select the network location for which you want to specify the specific access settings. 5 In the View menu, click Services/Ports.
Customizing settings Editing the access settings for a service 101 9 Select the one of the following option to customize the specific access settings: All computers on my current Lets you allow or block connections to or from all network computers on your network. A single computer Lets you allow or block connections to or from the computer with the IP address that you specify.
Customizing settings Editing the access settings for a service 102 4 In the Connection Blocking window, in the Editing settings menu, select the network location for which you want to edit the Connection Blocking settings. 5 In the View menu, select Services/Ports. 6 Select one of the following tabs: Incoming Lets you specify the access settings for the incoming connections that use the service. Outgoing Lets you specify the access settings for the outgoing connections that use the service.
Customizing settings Removing the access settings for a service 103 8 In the Edit Service window, make the changes as required. 9 Click Save. To edit the default access settings for a service 1 In the Norton Security main window, click Advanced. 2 On the left pane, click Firewall. 3 In the Connection Blocking row, click the settings icon. 4 In the Connection Blocking window, in the Editing settings menu, select the network location for which you want to edit the Connection Blocking settings.
Customizing settings Removing the access settings for a service 104 2 On the left pane, click Firewall. 3 In the Connection Blocking row, click the settings icon. 4 In the Connection Blocking window, in the Editing settings menu, select the network location for which you want to remove the Connection Blocking settings. 5 In the View menu, select Services/Ports. 6 Select one of the following tabs: Incoming Lets you specify the access settings for the incoming connections that use the service.
Customizing settings About firewall rule for IP addresses 105 6 Select one of the following tabs: Incoming Lets you specify the access settings for the incoming connections that use the service. Outgoing Lets you specify the access settings for the outgoing connections that use the service. 7 In the View pane, select the row that contains the specific access settings for a service and do one of the following: 1 Click Remove. 1 Click the - sign next to the service name.
Customizing settings Configuring firewall rules for an IP address 106 Configuring firewall rules for an IP address You can specify the firewall rules of the IP address that is specific to a network location setting. The Trust Zone in the View pane shows the IP addresses to or from which you allowed access attempts for a network location. The Block Zone in the View pane shows the IP addresses to or from which you blocked access attempts of a network location.
Customizing settings Modifying firewall rules for an IP address 107 8 In the address menu, select an option to specify the IP addresses of computers to which you want to apply the access settings. Your options are: All computers on my current Lets you allow or block connections to or from all network computers on your network. A single computer Lets you allow or block connections to or from the computer with the IP address that you specify.
Customizing settings Removing firewall rule for an IP address 108 4 In the Connection Blocking window, in the Editing Settings menu, select the Connection Blocking setting for which you want to change the settings of an IP address. 5 In the View menu, click Zones and select a row that contains the access settings for an IP address that you want to modify. 6 Click Edit. 7 In the Edit address window, make the necessary changes. 8 Click Save.
Customizing settings About configuring firewall for an application 109 About configuring firewall for an application w The Application Blocking settings let you configure the firewall rules for the different applications that run on your Mac. Based on these settings, the firewall allows or blocks connections to the Internet from an application. You cannot specify the firewall settings for applications based on the network to which your Mac is connected.
Customizing settings Setting up firewall rules for an application 110 Allow applications that are Lets you automatically allow the applications that are signed by Apple signed by Apple to access the Internet. Notify me when a blocked Lets you configure Norton application tries to use the Security to notify you whenever a blocked Internet application attempts to access the Internet. Log all applications that use Lets you keep record of the applications that access the the Internet Internet.
Customizing settings Customizing the firewall rule for an application 111 selected application appears in the Settings list in the Application Blocking window. The application name and the firewall setting that you select appear in the Settings list in the Application Blocking window. To set up firewall rules for an application 1 In the Norton Security main window, click Advanced. 2 On the left pane, click Firewall. 3 In the Application Blocking row, click the settings icon.
Customizing settings Removing the firewall rule for an application 112 To customize the firewall rule for an application 1 In the Application Blocking window, select the application name row. 2 Click the up arrow or the down arrow next to the name of the application and do one of the following: 1 To allow the application to access Internet, choose allow. 1 To blow the application to access Internet, choose block. 3 Click Done.
Customizing settings Disabling or enabling Location Awareness 113 location, Norton Security prompts you to select a new firewall setting for the network location. You can use the Location Awareness window to do the following: 1 1 Turn on or turn off the Location Awareness feature. View the current network location to which your Mac is connected.
Customizing settings Exporting the connection blocking settings for a network location 114 using the Location Awareness window. You can also view the history of network locations to which your Mac was connected and the connection blocking settings. To view Location Awareness settings 1 In the Norton Security main window, click Advanced. 2 On the left pane, click Firewall. 3 In the Location Awareness row, click the settings icon.
Customizing settings About advanced protection Export only these settings Lets you export only the required settings of the selected network location Your options are: 1 1 1 1 1 1 1 Password protect the exported settings w 115 Application Blocking Connection Blocking Applications Services & Ports Zones Vulnerability Protection Norton DeepSightTM Community Download Lets you add a password to protect the exported file.
Customizing settings About advanced protection The following are the different advanced protection features: Norton DeepSight Community Download Lets you configure Norton Security to automatically obtain the updated list of IP addresses of computers that Symantec identifies as attackers. Norton DeepSight Community Submission Lets you configure Norton Security to automatically submit any suspicious network activity to Symantec for evaluation.
Customizing settings Disabling or enabling advanced protection features 117 Disabling or enabling advanced protection features The Advanced window lets you disable or enable the following advanced protection features of Norton Security: 1 Norton DeepSight Community Download 1 Norton DeepSight Community Submission 1 Vulnerability Protection By default, the advanced protection features are enabled. Symantec recommends that you do not disable any of the advanced firewall features.
Customizing settings Configuring Norton DeepSight Community Download 118 To disable or enable Vulnerability Protection 1 In the Norton Security main window, click Advanced. 2 On the left pane, click Firewall. 3 In the Vulnerability Protection row, do one of the following: 1 To disable Vulnerability Protection, move the switch to the Off position. 1 To enable Vulnerability Protection, move the switch to the On position.
Customizing settings Configuring Norton DeepSight Community Submission 119 4 On the Downloads tab, select the required option to set connections for all of the IP addresses in the list. Your options are: Block all connections Lets you block the incoming and the outgoing connections from all the IP addresses in the list. Block only incoming connections Lets you block only the incoming connections from the IP addresses in the list. 5 Click Done.
Customizing settings Configuring AutoBlock settings 120 4 In the Norton DeepSight Settings window, on the Submissions tab, do one of the following: 1 To disable Norton DeepSight Community Submission, select Off. 1 To enable Norton DeepSight Community Submission, select On. Configuring AutoBlock settings You can use the AutoBlock tab in the Vulnerability Protection window to automatically block the IP addresses of computers that Symantec identifies as attackers.
Customizing settings Managing Excluded IP addresses 121 6 View the list of IP addresses blocked by the Vulnerability Protection feature in the Addresses currently blocked by AutoBlock list. 7 Set the time period for which Norton Security must block any connections in the Addresses should remain in the list for list. The default value is 30 minutes. 8 Click Done.
Customizing settings Managing Excluded IP addresses All IP addresses on a network 122 Lets you allow connections to or from all the computers on a local network that share the base address and mask address that you specify. You can use the Exclude IP addresses window to do the following: 1 1 1 Add the IP addresses you trust. Edit the IP addresses in the excluded IP address list. Remove the IP address from the excluded IP address list.
Customizing settings Configuring Signatures settings 123 6 In the Excluded IP addresses dialog, select the excluded IP address, and click Edit. 7 In the Edit AutoBlock excluded address dialog, make the changes as required. 8 Click Save. To remove an excluded IP address 1 In the Norton Security main window, click Advanced. 2 On the left pane, click Firewall. 3 In the Vulnerability Protection row, click the settings icon. 4 In the Vulnerability Protection window, select the AutoBlock tab.
Customizing settings Configuring Signatures settings 124 receive an alert whenever Vulnerability Protection blocks an attack. To configure the Signature settings 1 In the Norton Security main window, click Advanced. 2 On the left pane, click Firewall. 3 In the Vulnerability Protection row, click the settings icon. 4 In the Vulnerability Protection window, select the Signatures tab. 5 Under the Signatures list, disable or enable the required options for any signature. 6 Click Done.
Managing items in Quarantine 9 This chapter includes the following topics: 1 About Norton Security Quarantine 1 Repairing an item in the Quarantine 1 Restoring an item from the Quarantine 1 Deleting an item from the Quarantine About Norton Security Quarantine Sometimes Norton Security detects an unknown virus that cannot be eliminated with the current set of virus definitions. Norton Security quarantines it automatically.
Managing items in Quarantine Restoring an item from the Quarantine 126 item. New virus definitions might repair the file that could not be repaired previously. To repair an item from the Quarantine 1 In the Norton Security main window, click Advanced. 2 On the left pane, click Activity. 3 In the Security History row, click the view icon. 4 In the Security History window, under Protect my Mac, click Quarantine. 5 In the quarantined items list, select the file item that you want to repair.
Managing items in Quarantine Deleting an item from the Quarantine 127 3 In the Security History row, click the view icon. 4 In the Security History window, under Protect my Mac, click Quarantine. 5 In the quarantined items list, select the item that you want to restore. 6 Click the Actions icon on the top-left corner, and then click Restore. 7 Click Done. Deleting an item from the Quarantine You can delete an item from the Quarantine at any time.
Protecting against new threats 10 This chapter includes the following topics: 1 About LiveUpdate 1 About program updates and definition updates 1 Checking for updates manually About LiveUpdate Using your Internet connection, Norton Security automatically downloads the latest definition updates and program updates regularly from Symantec servers. The definition updates protect your computer from the latest viruses and unknown security risks.
Protecting against new threats Checking for updates manually 129 Program updates are improvements for all the Symantec products that you installed on your Mac. Program updates differ from product upgrades, which are newer versions of the product. Program updates are usually created to improve the product’s compatibility with the operating system or hardware, adjust a performance issue, or fix program errors. w Norton Security automates the process of downloading and installing program updates.
Protecting against new threats Checking for updates manually w 130 updates regularly from Symantec servers. However, you can manually download the updates from Symantec servers using Norton Security. Some program updates may require that you restart your computer after you install them. To check for updates manually 4 In the Norton Security main window, click LiveUpdate.
Finding additional solutions 11 This chapter includes the following topics: 1 Checking for virus names and definitions 1 Uninstalling Norton Security on Mac Checking for virus names and definitions The Virus Definitions window lists the names of viruses and their details. To know if your Mac is protected from a particular virus, you can search for the virus name. By default, Norton Security automatically updates virus definitions on a regular basis.
Finding additional solutions Uninstalling Norton Security on Mac 132 Uninstalling Norton Security on Mac To uninstall Norton Security, you must know the Administrator account user name and password. w You must restart your Mac after uninstalling the product. To ensure continuous protection, Symantec recommends you to keep Norton Security installed on your Mac. To uninstall Norton Security 1 On the Mac menu bar, click the Symantec icon.
Service and support solutions 12 This chapter includes the following topics: 1 About support 1 About Self Help 1 Contact Support 1 Support Policy 1 Keeping your subscription current About support The Norton Support website provides a full range of self-help options. You can access Norton Support from the product.
Service and support solutions About support 1 1 w 134 You may find the forum a place where you can share tips, ideas, and suggestions about the Norton product. You need to first register for Norton Forum to start posting your questions. Find information about the latest viruses and risks, and find tips that help you stay protected. Access Norton Online Store and Norton product download page. Support offerings may vary based on the region, language, or product.
Service and support solutions About Self Help 135 About Self Help The Symantec website contains answers to the most common customer questions. From our website you can: 1 1 1 Find help with your subscription, download, product activation, or other nontechnical issues. Search our Support Resources for help with technical issues, such as installing, configuring, or troubleshooting errors with your Norton products. Find information about the latest virus threats and removal tools.
Service and support solutions Support Policy Phone 136 Speak to a support representative in real time. To contact a support representative, please visit the Symantec support website at the following URL: www.norton.com/macsupport The online support option is displayed along with the Contact Us link where you can select the type of support you prefer.
Service and support solutions Keeping your subscription current 137 for a nominal charge. Follow the instructions on the screen to renew. The subscription renewal alert is not displayed if you opted for the Automatic Renewal service when you purchased your Norton product. Your product is automatically renewed before it expires. If Automatic Renewal fails, the subscription renewal alert is displayed.
foo Norton from Symantec products protect consumers from traditional threats with antivirus, antispam, and Spyware Protection. They also protect against bots, drive-by downloads, and identity theft, and are light on system resources. In addition, Symantec provides services such as online backup and PC Tuneup, and is a trusted source for family online safety.