Instruction/ maintenance manual of the product NIS2005 Symantec
Go to page of 77
User’s Guide NIS2005.book Page 1 Sunday, August 1, 2004 3:24 PM.
Norton Internet Security ™ 2005 User’s Guide The software describe d in this book is furnished under a license agreement and may be used only in accordance w ith the terms of the agreement. Documentation version 8.0 PN: 10291345 Copyright Notice Copyright © 2004 Symantec Corporation.
Contents Chapter 1 Installation System requirements ................. .................... ................... . 5 Before installation ............................... ................... ........... 11 Install Norton Internet Security ................
Contents 4 Create Emergency Disks ........................ ................... ...... 47 If you need to use Emergency Disks ............................48 Chapter 5 Frequently asked questions Explore the Symantec service and supp ort Web site ........
Installation 1 1 Before installing, take a moment to review the system requirements. System requirements To use Norton Internet Sec urity, your computer must have one of the following Windows operatin.
Installation Syst em requir ements 6 Your computer must also meet the following minimum requirements. Operatin g S ystem Requiremen ts Windows 98/98SE 1 133-MHz or hi gher proc essor 1 96 MB of RAM 1 200 MB of available har d disk space 1 Internet Explorer 5.
Installation Syst em requirements 7 Supported email and instant messenger programs Norton Internet Security adds security features to the following email and instant messenger programs. Feature Suppor ted programs Norton AntiSpam integr ation Most POP3 email progr ams, including: 1 Micr osoft ® Outlook ® Express 5.
Installation Syst em requir ements 8 Norton AntiVirus email scanning Most POP3 and SMTP emai l progr ams, including: 1 Microsoft Outlook Express 4, 5, 6 1 Microsoft Outlook 97/ 98/2000/XP/2003 1 Netsca pe Messen ger 4 1 Netscape Mail 4, 6, 7 1 Eudor a Light 3 , Eudor a Pro 4, Eudor a 5, Eudor a 6.
Installation Syst em requirements 9 About encrypt ed email conne ctions Norton Internet Security does not support email connections that use Secure Sockets Layer. Secure Sockets Layer (SSL) is a Netscape protocol designed to provide secure communic ations on the Internet.
Installation Syst em requir ements 10 Sym a n t e c p c A ny w h e re You should have no pr oblems using Symantec pcAnywhere as either a clie nt or host with Norton Internet Security. F or maximum prot ection, if you run a Symantec pcAnywhere host, ed it the rule to limit its use to only the computers with which you use it.
Installation Bef ore installation 11 With most VPNs, when the VPN client is active, you cannot see the Internet or ot her computers on your local network. You can see only what is available through the VPN server to which you are connected. Before installation See “Create Emergency Disks” on page 47.
Installation Instal l Norton In ter net Secur ity 12 2 In the Control Panel window , do one of the following: 2 In the default Category View, click Network a nd Internet Connections , and then click Network Connections . 2 In the Classic View, double-click Network Connections .
Installation Install Norton Int ernet Security 13 If an infection is detected in an active program, Norton AntiVirus may close it. Save all your data befo re y ou beg in. 7 Do one of the following: 2 If you want to end the scan, click Stop Scan . 2 If a virus is detected, for each file that you want to delete, click Delete .
Installation After installatio n 14 15 Click Finish . Customize your installation During installation, if you select the Custom installation type, you can select the component programs that you want to install.
Installation After installatio n 15 Use the Configuration Wizard The Configuration Wizard lets you activate and register Norton Internet Security an d complete post-installation tasks.
Installation After installatio n 16 12 In the Subscription window , review the subscription information, and then click Next . 13 The Next Steps window lists the following post- installation tasks tha.
Installation For more i nform ation 17 For more information The product documentation provides assistance for using Norton Int ernet Security. Yo u can find the informati on that you need on your computer and on the Web. Use online Help Help is available throughout your Symantec produc t.
Installation For more in form ation 18 Window and dialog bo x Help Window and dialog box Help provides information about the program. Th is type of He lp is context-sensitive, meaning that it provides help for the dialog box or window that you are currently using.
Installation For more i nform ation 19 T o re ad a User’s Guide from your hard disk 1 Open the location into which you copied the PDF . 2 Double-click the PDF . Symantec products on the Web The Symantec Web site pr ov ides extensive information about all Symantec products.
Installation For more in form ation 20 T o access the S ymantec Web site f rom Windows Explorer 1 Open Windows Explorer . 2 On the toolbar, on the Norton AntiVirus menu, click View Virus Encyclopedia . This option connects you to the Symantec Security Response W eb page, from which you can search for information on all types of viruses.
Feature summary 2 Use the information in this se ction to fami li arize yourself with the product. This section includes the following information: 1 A list of all of the features in the product 1 A brief description of each feature The feature summary can help you determine which feature to use to solve a problem.
Feature summary Security protec tion feat ures 22 Security protection features Norton Internet Security includes a suite of security tools that help keep your computer safe from security threats and privacy intrusions.
Feature summary Virus a nd t hreat protec tio n features 23 Virus and threat pr otection features Norton AntiVirus provid es comprehensiv e virus prevention, threat detection, and repair software for your computer. It automatically detects and repairs known viruses.
Feature summary Virus and threat protection featur es 24 Bloodhound techn ol ogy Detects new and unknown viruses b y analyzing an ex ecutable file’s structure, behavior , and other attributes such as progr amming logic, computer instructions, and any data that is contained in the file.
Feature summary Spam filter ing features 25 Spam filtering features As email becomes more popular, many users are receiving an inc reasing am ount of the unsolicited commercial email messages known as spam. Not only does spam make it difficul t to identify valid email messages, some spam contains offensive messages and images.
Feature summary Spam filtering f eatures 26 Language filter ing Blocks all email written in the language or languages you specify Automated update of spam definitions Updates copies of Sy mantec spam defi nition files auto matica ll y (s ubscri pti on requ ired ) NIS2005.
Feature summary Ad b locking features 27 Ad blocking features Many Web sites are using more aggressive te chniques to draw attention to the ads on their pages. Some have begun using larger, more prominent ads, while others rely on ad windows that app ear when you enter or leave the site.
Feature summary Ad b loc king features 28 NIS2005.book Page 28 Sunda y, August 1, 2004 3:24 PM.
Getting started 3 This section contains inform ation about starting your Symantec product and the feat ures that are available in the main window. It is not usually necessary to open your Symantec product to benefit from the pr otection features that it provides.
Getting started Start Norton Int ernet Security 30 Start Norton Internet Security Norton Internet Secu rity protects any computer on which it is installed.
Getting started About the main wind ow 31 About the main window Use the mai n window to ac cess program components, set options, and access online Help. T o explore the main window 1 On the left side of the main window, select a category, such as Statistics or Subscription Status .
Getting started About th e main wi ndow 32 3 Inside the main window, under Status & Settings, click any of the feature names to see a brief description of the featur e and access configuration options for the feature .
Getting started Activa te your pr oduct 33 Activate your product Product activation reduces so ftware piracy and ensures that you have received genuine Symantec software. If you did not activate your product when f irst prompted, you will receive an Activation Needed alert every day until you activate the product.
Getting started Ac tivate your produ ct 34 Chec k for co nnectivity bloc kin g A connectivity problem can occur if you are using parental control software or are using an ISP that provides pa rental contro ls.
Getting started T emporarily turn o ff security pro tection 35 Temporarily turn off security protection There may be times when you want to temporarily turn off security protection. For example, you might want to see if it is prev enting a Web page from appearing correctly.
Getting started T empor arily turn off security protection 36 To ensure that your computer remains protected, you can turn on security protection manually if you complete your task before the tim e that you specif ied concludes.
Getting started T urn off Auto -Protec t temp oraril y 37 Turn off Auto-Protect temporarily If you have not changed the de fault option settings, Auto- Protect loads when you start your computer to guard against viruses, Trojan horses, worms, and other malicious threats.
Getting started Turn o ff A ut o- Pr ote c t te m p ora ril y 38 T o turn on or turn off Auto-Protect using the N orton Antivirus icon in the Windows system tr ay 4 In the Windows system tray, right-click the Norton Internet Securi ty icon, and then do one of the following: 2 Check Enable Auto-Protect to turn on Auto- Protect.
Getting started T urn of f spam filterin g 39 Turn off spam filtering By default, No rton AntiSp am remains active once it is installed. If for any reason you want to temporarily disable it, you can turn it off from within the program itself. T o turn off spam filtering 1 In the main window, under Norton AntiSp am, click Status & Settings .
Getting started T urn of f spam filterin g 40 NIS2005.book Page 40 Sunda y, August 1, 2004 3:24 PM.
Responding to emergencies 4 If you have an emergency, read these sections to try to find the solution to your problem. Common problems include: 1 Virus threats 1 Trouble re starting your co mputer 1 Lost or missing files 1 Possible disk damage w If you purchased this product to address any of the problems listed above, read these sections first.
Responding to emergencies What to do if a vi rus is found 42 What to do if a virus is found w If after reviewing the informat ion in this chapter, you have not resolved your problem, see “Frequently asked questions” on page 49.
Responding to emergencies If Norton AntiVirus cannot r epair a file 43 If Norton AntiVirus cannot repair a file One of the most common reas ons that Norton AntiVirus cannot automatically repair an infected file is that you do not have the most up-to-date vir us definitions.
Responding to emergencies Look up viruses on the Sy mant ec Web site 44 Look up viruses on the Symantec Web site The Symantec Web site contains a complete list of all known viruses and related malicious code, along with descriptions. You must be c onnected to the Internet to look up viruses.
Responding to emergencies If your product won’t install 45 If your product won’t install w You must be running Window s in order to install your Symantec prod uct.
Responding to emergencies If your computer won’t start 46 If your computer won’t start If you have a virus or threat on your computer, you need to start the computer from an unin fected disk to re move the virus. Scan for viruses using the CD w You might need to change your computer’s BIOS Setup options to start from the CD-R OM drive.
Responding to emergencies Crea te Emer gency Disks 47 Create Emergency Disks Emergency Disks are used to st art your computer in case of a problem. If your computer can start from a CD, you can use the product C D in plac e of Emer gency Dis ks and d o not need to create them.
Responding to emergencies If you need to use Emerg enc y Disks 48 11 Remove the final disk from drive A. 12 Test the first disk in th e set to ensure that you can use it to restart your computer .
Frequently asked questions 5 The information in this chap ter will help you solve the most frequently encountered problems. Explore the Symant ec service and support Web site On the Symantec service a.
Frequently ask ed questions If you need to uninstall 50 If you need to uninstall See “Use online Help” on page 17 . Instructions for uninstalling are available in the online Help.
Frequently asked questions T roubleshoot virus and thre at prot ection 51 Troubleshoot virus an d threat protection Check here for possible solutions to issues that might arise with Norton AntiVirus.
Frequently ask ed questions T roubleshoo t virus and thre at prot ection 52 To s h o w t h e A u t o - P r o t e c t i c o n i n t h e W i n d o w s s y s t e m tr ay 1 In the main window, click Options . If a menu appears, click Norton AntiVirus . 2 In the Options window , under System, click Aut o- Protect .
Frequently asked questions T roubleshoot virus and thre at prot ection 53 Why is Norton AntiVirus unable to repair my infected files? If Norton AntiVirus cannot repa ir your infected f iles, you may not have the most current v irus protection on your computer.
Frequently ask ed questions T roubleshoo t virus and thre at prot ection 54 T o tur n off em ail pr otectio n 1 In the main window, click Options . If a menu appears, click Norton AntiVirus . 2 In the Options window, un der Internet, click Ema il . 3 Uncheck Scan incoming Email .
Frequently asked questions T rou bleshoot s ecurity pr otection 55 Troubleshoot security protection Check here for possible solutions to issues that might arise with Norton Internet Security. Does Norton Internet Security work with my ISP’s proxy server? Norton Internet Security works with most proxy servers.
Frequently ask ed questions T roublesh oot secu rity prote ctio n 56 4 On the Connections tab, in the Remote Service Port column, look at the information. There should be a port number following the I P address of the site that you viewed with your browser .
Frequently asked questions T rou bleshoot s ecurity pr otection 57 Can Norton Internet Security protect an FTP server? To let an FTP server run behi nd Norton Internet Securi ty, you must create the following rules: 1 Allow inbound TCP connections on port 21.
Frequently ask ed questions T roublesh oot secu rity prote ctio n 58 What is wrong with this Web site? If you cannot connec t to a Web site with Norton Internet Security turned off, t here might be a problem with the Internet or your Internet service provider.
Frequently asked questions T rou bleshoot s ecurity pr otection 59 If your email program mainta ins copies of sent messages in its Sent or Out folder, you can reopen the email message, rem ove the priva te informat ion, and send th e message again.
Frequently ask ed questions T roublesh oot secu rity prote ctio n 60 To allow the use of your local network, including file and printer sharing, place th e computers on your local network in the Trusted Zone.
Frequently asked questions T rou bleshoot s ecurity pr otection 61 4 Click Exclude . 5 Click OK . How can a Web site get my browser information? The Browser Pri vacy settings prevent your browser from sending browser inform ation.
Frequently ask ed questions T roubleshoot Norton AntiSpam 62 Troubleshoot Norton AntiSpam Check here for possible solutions to issues that might arise with Norton AntiSpam. Why do I still receive spam? Several factors make i t diffi cult to completely eliminate spam.
Frequently asked questions T roubleshoot Norton An tiSpam 63 Why did an email message someone sent me never arrive? Some legitimate email messages may contain elements that are characteristic of sp am messages. This may have caused Norton AntiSpam to incorrectly identi fy the message as spam.
Frequently ask ed questions T roubleshoot Norton AntiSpam 64 Why do I need a subscription to spam definitions? Though the product is se lf-training, local spa m definitions are developed only by the criteria you input and from the sample of email messages you process.
Frequently asked questions T roubleshoot Ad Block ing 65 Troubleshoot Ad Blocking Check here for possible solutions to issues that might arise with Ad Blocking. Does Ad Blocking block all advertising on the current page? Ads that are integrated with standard content—for instance text statements—will not be blocked.
Frequently ask ed questions T roubleshoo t LiveUpdat e 66 Troubleshoot LiveUpdate Check here for possible solutions to issues that might arise with LiveUpdate. What if I can’t use LiveUpdate? When new updates become availabl e, Symantec posts them on the Symantec Web site.
Service and support solutions The Service & Support Web site at http://service.s ymantec.com supports Symant ec products. Customer Servic e helps with nontechnical issues such as orders, up grades, replace ments, and rebates. Technical Support helps with technical issues such as installing, configuring, or troubleshooting Symantec prod ucts.
Service and support solutions T echnical support 68 Technical support Symantec offers two technical support options for help with installing, configuring, or troubleshooting Symantec products: 1 Online Service a nd Support Connect to the Symantec Se rvice & Supp ort Web site at http://service.
Service and support solutions Worldwide service and support 69 When you run LiveUpdate near the end of your subscription period, you are prompted to subscri be for a nominal charge. Simply foll ow the instructions on the screen. Worldwide service and support Technical support and custom er service solutions vary by country.
Service and support solutions Worldwide ser vice and support 70 Service and support offices North America Sy mantec Corporation 55 5 International W ay Springfield, OR 9 7477 U.S.A. http://w ww .sym antec. com/ Australia and New Zealand Symantec Austr alia Lev el 2, 1 Julius Avenue North Ry de, NSW 211 3 Syd n e y Austr alia http://www .
Inde x A activate and register 15 software 15 activation phone 34 problems 33 procedure 33 active content, troubleshooting 58 ActiveX controls 58 Ad Blocking, troubleshooting 65 Adobe Reader installin.
Index 72 Emergency Disks (conti nued) using 48 emergency recovery procedures 41 F features about 22 ad blocking 27 automatic update 26 Configuration Wizard 15 email filtering 25 main window 3 1 securi.
Index 73 operating systems 5 Options button, main window 31 P Parental Control 22 password protection 24 options 22 Personal Firewall about 22 troubleshooting rules 58 phone activation 34 Pop-up Windo.
Index 74 troubleshooting (continued) networks 60 Norton AntiSpam 62 printing 60 Web sites 58 U uninstalling 50 other antivirus programs 11 previous copies of your Symantec product 11 unknown viruses 2.
SYMANTEC SOFTWARE LICENSE AGREEMENT Norton Internet Security ™ IMPORT ANT: PL EASE RE AD THE TE RMS AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE USING THE SOFTWARE.
Updates. Symantec res erves the right to designate specified Conte nt Updates as requiring purchase of a separate subscri ption at any time and without notice to You; provided, however, that if You pu.
Government end users with only those right s as granted to all othe r end users, according to the terms and conditions contained in this lice nse agreement. Manufacturer is Symant ec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014. 8. Export Regulation: Certain S ymantec product s are su bject to export controls by the U.
An important point after buying a device Symantec NIS2005 (or even before the purchase) is to read its user manual. We should do this for several simple reasons:
If you have not bought Symantec NIS2005 yet, this is a good time to familiarize yourself with the basic data on the product. First of all view first pages of the manual, you can find above. You should find there the most important technical data Symantec NIS2005 - thus you can check whether the hardware meets your expectations. When delving into next pages of the user manual, Symantec NIS2005 you will learn all the available features of the product, as well as information on its operation. The information that you get Symantec NIS2005 will certainly help you make a decision on the purchase.
If you already are a holder of Symantec NIS2005, but have not read the manual yet, you should do it for the reasons described above. You will learn then if you properly used the available features, and whether you have not made any mistakes, which can shorten the lifetime Symantec NIS2005.
However, one of the most important roles played by the user manual is to help in solving problems with Symantec NIS2005. Almost always you will find there Troubleshooting, which are the most frequently occurring failures and malfunctions of the device Symantec NIS2005 along with tips on how to solve them. Even if you fail to solve the problem, the manual will show you a further procedure – contact to the customer service center or the nearest service center