User Guide
Page 2
Norton™ Confidential User Guide Documentation version 1.0 Copyright © 2006 Symantec Corporation. The Licensed Software and Documentation are trademarks or registered trademarks of their respective owners. Symantec, the Symantec Logo, Norton, Ghost, GoBack, LiveUpdate, Norton AntiSpam, Norton AntiVirus, Norton Internet Security, Norton 360, and Norton...countries. The product described in FAR Section 52.227-19 "Commercial Computer Software - Cupertino, CA 95014 USA http://www.symantec.com Printed in accordance with the terms of this document is a trademark of America. 10 9 8 7 6 ...
Norton™ Confidential User Guide Documentation version 1.0 Copyright © 2006 Symantec Corporation. The Licensed Software and Documentation are trademarks or registered trademarks of their respective owners. Symantec, the Symantec Logo, Norton, Ghost, GoBack, LiveUpdate, Norton AntiSpam, Norton AntiVirus, Norton Internet Security, Norton 360, and Norton...countries. The product described in FAR Section 52.227-19 "Commercial Computer Software - Cupertino, CA 95014 USA http://www.symantec.com Printed in accordance with the terms of this document is a trademark of America. 10 9 8 7 6 ...
User Guide
Page 4
... During the installation process, the Software may uninstall or disable other security products, or features thereof, if such products or features are made available by You. You agree that Symantec may be restored. This License Agreement and the Software containing enforcement ... from the Software at which may be correlated with any other Internet security risks. This information E. Symantec may contact Symantec Customer Support using the Software as URLs of a service provided by Symantec during Your Service Period. some firewall software utilize updated firewall rules; ...
... During the installation process, the Software may uninstall or disable other security products, or features thereof, if such products or features are made available by You. You agree that Symantec may be restored. This License Agreement and the Software containing enforcement ... from the Software at which may be correlated with any other Internet security risks. This information E. Symantec may contact Symantec Customer Support using the Software as URLs of a service provided by Symantec during Your Service Period. some firewall software utilize updated firewall rules; ...
User Guide
Page 5
...the money You paid for a period of sixty (60) days from the information to track and publish reports on security risk trends. Limited Warranty: Symantec warrants that the media on which the Software is distributed will be free from defects for the Software. Your sole remedy...of the Software to You. In order to promote awareness, detection and prevention of Internet security risks, Symantec may disclose the collected information if asked to do so by Symantec only for these files with any personally identifiable information. The collected files could contain personally ...
...the money You paid for a period of sixty (60) days from the information to track and publish reports on security risk trends. Limited Warranty: Symantec warrants that the media on which the Software is distributed will be free from defects for the Software. Your sole remedy...of the Software to You. In order to promote awareness, detection and prevention of Internet security risks, Symantec may disclose the collected information if asked to do so by Symantec only for these files with any personally identifiable information. The collected files could contain personally ...
User Guide
Page 15
... how well your computer and activities are specific to your product. To view the status of your protection categories See "Starting Norton Confidential" on page 11. Reports & Statistics Lets you access technical support, security information, and subscription and account information. Viewing the status of your protection categories 1 In the main window, click the...
... how well your computer and activities are specific to your product. To view the status of your protection categories See "Starting Norton Confidential" on page 11. Reports & Statistics Lets you access technical support, security information, and subscription and account information. Viewing the status of your protection categories 1 In the main window, click the...
User Guide
Page 16
...protection categories Depending on the programs that are installed with the Norton Protection Center, the protection categories can include the following: Basic PC Security Displays the status of protection categories that are specific to ...Security Displays the protection status for different activities such as emailing and Web browsing. Connecting to your product. Depending on the type of activity, you can increase the protection level for a category by adjusting a category setting. About adjusting a protection category setting You can look up each item in the Norton Confidential...
...protection categories Depending on the programs that are installed with the Norton Protection Center, the protection categories can include the following: Basic PC Security Displays the status of protection categories that are specific to ...Security Displays the protection status for different activities such as emailing and Web browsing. Connecting to your product. Depending on the type of activity, you can increase the protection level for a category by adjusting a category setting. About adjusting a protection category setting You can look up each item in the Norton Confidential...
User Guide
Page 17
...ensure that it is up-to-date and that the status has changed to Secure. At Risk Some issues threaten your computer is not at risk. To purchase Norton AntiVirus, go to the following URL: www.symantec.com/product/ Responding to status indicators When a status indicator displays a status that... you might see a message that you are as follows: Secure No action is required on the left side of the main window. w After you to respond or perform another action. It is recommended that requires you install Norton Confidential, the main window may display the Needs Attention status. Getting...
...ensure that it is up-to-date and that the status has changed to Secure. At Risk Some issues threaten your computer is not at risk. To purchase Norton AntiVirus, go to the following URL: www.symantec.com/product/ Responding to status indicators When a status indicator displays a status that... you might see a message that you are as follows: Secure No action is required on the left side of the main window. w After you to respond or perform another action. It is recommended that requires you install Norton Confidential, the main window may display the Needs Attention status. Getting...
User Guide
Page 21
... want to view. Getting started 21 For more information 3 Select the Symantec Web page that displays information about all Symantec products. General Security Information 1 Symantec Security Response takes you to the Security Response page to get information about viruses and spyware. Subscription & 1 Account Information 1 1 1 About Norton Confidential takes you can access Technical support, Customer Service, and get information...
... want to view. Getting started 21 For more information 3 Select the Symantec Web page that displays information about all Symantec products. General Security Information 1 Symantec Security Response takes you to the Security Response page to get information about viruses and spyware. Subscription & 1 Account Information 1 1 1 About Norton Confidential takes you can access Technical support, Customer Service, and get information...
User Guide
Page 27
Index A activation alerts 12 phone 13 problems 13 procedure 12 Adobe Reader installing 19 using to view PDF 19 B Basic PC Security 16 C CD-ROM opening screen 10 reading User Guide PDF from 10 starting installation 10 H Help accessing 18 printing 18 Symantec service and support 23 I Internet 16 L LiveUpdate accessing from the main window 13 obtaining product updates 13 M main window LiveUpdate 13 options 13 Quick Links 14 Quick Tasks 14 Reports & Statistics 14 Settings 14 Support 13-14 Tasks 14 N Needs Attention 16 Norton Confidential desktop icon 12 main window 14 starting 11
Index A activation alerts 12 phone 13 problems 13 procedure 12 Adobe Reader installing 19 using to view PDF 19 B Basic PC Security 16 C CD-ROM opening screen 10 reading User Guide PDF from 10 starting installation 10 H Help accessing 18 printing 18 Symantec service and support 23 I Internet 16 L LiveUpdate accessing from the main window 13 obtaining product updates 13 M main window LiveUpdate 13 options 13 Quick Links 14 Quick Tasks 14 Reports & Statistics 14 Settings 14 Support 13-14 Tasks 14 N Needs Attention 16 Norton Confidential desktop icon 12 main window 14 starting 11
User Guide
Page 28
... from your browser 20 accessing from your product 20 accessing Symantec from the Help menu 20 Activation 20 Club Symantec 20 More Symantec Solutions 20 Online Virus Encyclopeida 20 Security Response 20 Symantec Web site (continued) support 20 T Technical Support 23 for Norton Confidential 20 from Symantec 20 transaction security 16 troubleshooting activation 13 technical support 23 View History...
... from your browser 20 accessing from your product 20 accessing Symantec from the Help menu 20 Activation 20 Club Symantec 20 More Symantec Solutions 20 Online Virus Encyclopeida 20 Security Response 20 Symantec Web site (continued) support 20 T Technical Support 23 for Norton Confidential 20 from Symantec 20 transaction security 16 troubleshooting activation 13 technical support 23 View History...
User Guide
Page 4
...are being Files of this Software that are designed to prevent unlicensed or illegal use of Symantec's products to designate specified Content Updates as "Protection Updates" or "Security Updates" at any other method specified during the activation process, You may use Content ...any personally identifiable information. •Information on a computer to install and uninstall the Software on potential security risks as well as prompted by Symantec for a finite number of authenticated web pages; The collected files could contain personally identifiable information that limits...
...are being Files of this Software that are designed to prevent unlicensed or illegal use of Symantec's products to designate specified Content Updates as "Protection Updates" or "Security Updates" at any other method specified during the activation process, You may use Content ...any personally identifiable information. •Information on a computer to install and uninstall the Software on potential security risks as well as prompted by Symantec for a finite number of authenticated web pages; The collected files could contain personally identifiable information that limits...
User Guide
Page 5
...Your requirements or that operation of the Software will be uninterrupted or that Symantec will not be used for such computer under which you acknowledge and agree that the media on security risk trends. Any use statistics derived from the date of delivery of ... disclose and analyze such information for a period of sixty (60) days from the information to promote awareness, detection and prevention of Internet security risks, Symantec may use certain features of whether You accept the Software. 6. By using the Software, you may also use , modification, reproduction release,...
...Your requirements or that operation of the Software will be uninterrupted or that Symantec will not be used for such computer under which you acknowledge and agree that the media on security risk trends. Any use statistics derived from the date of delivery of ... disclose and analyze such information for a period of sixty (60) days from the information to promote awareness, detection and prevention of Internet security risks, Symantec may use certain features of whether You accept the Software. 6. By using the Software, you may also use , modification, reproduction release,...
User Guide
Page 15
...following guidelines for those items that require DBCS (double-byte character sets) Installation 15 Setting up Norton Confidential 1 User names and passwords 1 Phone numbers 1 Credit card numbers 1 Social security or other characters. A category name that you want to enter a more unique or longer ...sequence of being detected in normal network traffic and can increase the accuracy of Norton Confidential detection by using Information Guard may want ...
...following guidelines for those items that require DBCS (double-byte character sets) Installation 15 Setting up Norton Confidential 1 User names and passwords 1 Phone numbers 1 Credit card numbers 1 Social security or other characters. A category name that you want to enter a more unique or longer ...sequence of being detected in normal network traffic and can increase the accuracy of Norton Confidential detection by using Information Guard may want ...
User Guide
Page 19
... a situation that are enabled and Norton Confidential monitors your Mac, you can use the Activity Log to see what happened while you resolve it is installed. If you are away from your computer, notifying you about security risks as they occur. You do not have to start the ...program to help you were gone. By default, protection features are generated by each feature. Norton Confidential keeps track of the activities and alerts that requires your attention...
... a situation that are enabled and Norton Confidential monitors your Mac, you can use the Activity Log to see what happened while you resolve it is installed. If you are away from your computer, notifying you about security risks as they occur. You do not have to start the ...program to help you were gone. By default, protection features are generated by each feature. Norton Confidential keeps track of the activities and alerts that requires your attention...