Symantec NIS2005 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77

Ir a la página of

Buen manual de instrucciones

Las leyes obligan al vendedor a entregarle al comprador, junto con el producto, el manual de instrucciones Symantec NIS2005. La falta del manual o facilitar información incorrecta al consumidor constituyen una base de reclamación por no estar de acuerdo el producto con el contrato. Según la ley, está permitido adjuntar un manual de otra forma que no sea en papel, lo cual últimamente es bastante común y los fabricantes nos facilitan un manual gráfico, su versión electrónica Symantec NIS2005 o vídeos de instrucciones para usuarios. La condición es que tenga una forma legible y entendible.

¿Qué es un manual de instrucciones?

El nombre proviene de la palabra latina “instructio”, es decir, ordenar. Por lo tanto, en un manual Symantec NIS2005 se puede encontrar la descripción de las etapas de actuación. El propósito de un manual es enseñar, facilitar el encendido o el uso de un dispositivo o la realización de acciones concretas. Un manual de instrucciones también es una fuente de información acerca de un objeto o un servicio, es una pista.

Desafortunadamente pocos usuarios destinan su tiempo a leer manuales Symantec NIS2005, sin embargo, un buen manual nos permite, no solo conocer una cantidad de funcionalidades adicionales del dispositivo comprado, sino también evitar la mayoría de fallos.

Entonces, ¿qué debe contener el manual de instrucciones perfecto?

Sobre todo, un manual de instrucciones Symantec NIS2005 debe contener:
- información acerca de las especificaciones técnicas del dispositivo Symantec NIS2005
- nombre de fabricante y año de fabricación del dispositivo Symantec NIS2005
- condiciones de uso, configuración y mantenimiento del dispositivo Symantec NIS2005
- marcas de seguridad y certificados que confirmen su concordancia con determinadas normativas

¿Por qué no leemos los manuales de instrucciones?

Normalmente es por la falta de tiempo y seguridad acerca de las funcionalidades determinadas de los dispositivos comprados. Desafortunadamente la conexión y el encendido de Symantec NIS2005 no es suficiente. El manual de instrucciones siempre contiene una serie de indicaciones acerca de determinadas funcionalidades, normas de seguridad, consejos de mantenimiento (incluso qué productos usar), fallos eventuales de Symantec NIS2005 y maneras de solucionar los problemas que puedan ocurrir durante su uso. Al final, en un manual se pueden encontrar los detalles de servicio técnico Symantec en caso de que las soluciones propuestas no hayan funcionado. Actualmente gozan de éxito manuales de instrucciones en forma de animaciones interesantes o vídeo manuales que llegan al usuario mucho mejor que en forma de un folleto. Este tipo de manual ayuda a que el usuario vea el vídeo entero sin saltarse las especificaciones y las descripciones técnicas complicadas de Symantec NIS2005, como se suele hacer teniendo una versión en papel.

¿Por qué vale la pena leer los manuales de instrucciones?

Sobre todo es en ellos donde encontraremos las respuestas acerca de la construcción, las posibilidades del dispositivo Symantec NIS2005, el uso de determinados accesorios y una serie de informaciones que permiten aprovechar completamente sus funciones y comodidades.

Tras una compra exitosa de un equipo o un dispositivo, vale la pena dedicar un momento para familiarizarse con cada parte del manual Symantec NIS2005. Actualmente se preparan y traducen con dedicación, para que no solo sean comprensibles para los usuarios, sino que también cumplan su función básica de información y ayuda.

Índice de manuales de instrucciones

  • Página 1

    User’s Guide NIS2005.book Page 1 Sunday, August 1, 2004 3:24 PM[...]

  • Página 2

    Norton Internet Security ™ 2005 User’s Guide The software describe d in this book is furnished under a license agreement and may be used only in accordance w ith the terms of the agreement. Documentation version 8.0 PN: 10291345 Copyright Notice Copyright © 2004 Symantec Corporation. All Rights Reserved. Any technical documentation that i s ma[...]

  • Página 3

    Contents Chapter 1 Installation System requirements ................. .................... ................... . 5 Before installation ............................... ................... ........... 11 Install Norton Internet Security .................. ..................12 After installation ... ................... .................... ...........[...]

  • Página 4

    Contents 4 Create Emergency Disks ........................ ................... ...... 47 If you need to use Emergency Disks ............................48 Chapter 5 Frequently asked questions Explore the Symantec service and supp ort Web site .................. ................... ................... ..............49 How can I find the version numb[...]

  • Página 5

    Installation 1 1 Before installing, take a moment to review the system requirements. System requirements To use Norton Internet Sec urity, your computer must have one of the following Windows operating systems installed: 1 Windows 98/98SE/Me 1 Windows 2000 Professional 1 Windows XP Professional/Home Edition 1 Windows XP Tablet PC Edition 1 Windows [...]

  • Página 6

    Installation Syst em requir ements 6 Your computer must also meet the following minimum requirements. Operatin g S ystem Requiremen ts Windows 98/98SE 1 133-MHz or hi gher proc essor 1 96 MB of RAM 1 200 MB of available har d disk space 1 Internet Explorer 5.5 1 CD-ROM or DVD-ROM drive Windows Me 1 150-MHz or hig her processor 1 128 MB of RAM 1 200[...]

  • Página 7

    Installation Syst em requirements 7 Supported email and instant messenger programs Norton Internet Security adds security features to the following email and instant messenger programs. Feature Suppor ted programs Norton AntiSpam integr ation Most POP3 email progr ams, including: 1 Micr osoft ® Outlook ® Express 5.5 and later 1 Microsoft Outlook [...]

  • Página 8

    Installation Syst em requir ements 8 Norton AntiVirus email scanning Most POP3 and SMTP emai l progr ams, including: 1 Microsoft Outlook Express 4, 5, 6 1 Microsoft Outlook 97/ 98/2000/XP/2003 1 Netsca pe Messen ger 4 1 Netscape Mail 4, 6, 7 1 Eudor a Light 3 , Eudor a Pro 4, Eudor a 5, Eudor a 6.0, Eudora 6.0J 1 Pega sus 3 1 IncrediMail XE 1 Becky[...]

  • Página 9

    Installation Syst em requirements 9 About encrypt ed email conne ctions Norton Internet Security does not support email connections that use Secure Sockets Layer. Secure Sockets Layer (SSL) is a Netscape protocol designed to provide secure communic ations on the Internet. If you use an SSL connection to access your email, you are not protected by N[...]

  • Página 10

    Installation Syst em requir ements 10 Sym a n t e c p c A ny w h e re You should have no pr oblems using Symantec pcAnywhere as either a clie nt or host with Norton Internet Security. F or maximum prot ection, if you run a Symantec pcAnywhere host, ed it the rule to limit its use to only the computers with which you use it. Symantec pcAnywhere pass[...]

  • Página 11

    Installation Bef ore installation 11 With most VPNs, when the VPN client is active, you cannot see the Internet or ot her computers on your local network. You can see only what is available through the VPN server to which you are connected. Before installation See “Create Emergency Disks” on page 47. Before you install Norton Inte rnet Security[...]

  • Página 12

    Installation Instal l Norton In ter net Secur ity 12 2 In the Control Panel window , do one of the following: 2 In the default Category View, click Network a nd Internet Connections , and then click Network Connections . 2 In the Classic View, double-click Network Connections . 3 Right-cli ck the active connect ion icon, and then c lick Properties [...]

  • Página 13

    Installation Install Norton Int ernet Security 13 If an infection is detected in an active program, Norton AntiVirus may close it. Save all your data befo re y ou beg in. 7 Do one of the following: 2 If you want to end the scan, click Stop Scan . 2 If a virus is detected, for each file that you want to delete, click Delete . 8 If you want to see th[...]

  • Página 14

    Installation After installatio n 14 15 Click Finish . Customize your installation During installation, if you select the Custom installation type, you can select the component programs that you want to install. T o customize your installation 1 Follow the Norton Internet Security install ation procedure to step 1 0, select Custom , and then click N[...]

  • Página 15

    Installation After installatio n 15 Use the Configuration Wizard The Configuration Wizard lets you activate and register Norton Internet Security an d complete post-installation tasks. You must be onli ne to activat e your product. w If you choose not t o register the software b y using the Configurat ion Wizard or if registration fails for some re[...]

  • Página 16

    Installation After installatio n 16 12 In the Subscription window , review the subscription information, and then click Next . 13 The Next Steps window lists the following post- installation tasks that Norton Internet Security automatically performs: w If the Use Norton Internet Security instead of Windows Firewall check box and the Do not share No[...]

  • Página 17

    Installation For more i nform ation 17 For more information The product documentation provides assistance for using Norton Int ernet Security. Yo u can find the informati on that you need on your computer and on the Web. Use online Help Help is available throughout your Symantec produc t. Help buttons and links to more information provide assistanc[...]

  • Página 18

    Installation For more in form ation 18 Window and dialog bo x Help Window and dialog box Help provides information about the program. Th is type of He lp is context-sensitive, meaning that it provides help for the dialog box or window that you are currently using. T o access window or dialog bo x Help 4 Do one of the following: 2 In the window, cli[...]

  • Página 19

    Installation For more i nform ation 19 T o re ad a User’s Guide from your hard disk 1 Open the location into which you copied the PDF . 2 Double-click the PDF . Symantec products on the Web The Symantec Web site pr ov ides extensive information about all Symantec products. There are seve ral ways to access the Symantec Web site. T o access the We[...]

  • Página 20

    Installation For more in form ation 20 T o access the S ymantec Web site f rom Windows Explorer 1 Open Windows Explorer . 2 On the toolbar, on the Norton AntiVirus menu, click View Virus Encyclopedia . This option connects you to the Symantec Security Response W eb page, from which you can search for information on all types of viruses. T o access [...]

  • Página 21

    Feature summary 2 Use the information in this se ction to fami li arize yourself with the product. This section includes the following information: 1 A list of all of the features in the product 1 A brief description of each feature The feature summary can help you determine which feature to use to solve a problem. Read the feature descriptions to [...]

  • Página 22

    Feature summary Security protec tion feat ures 22 Security protection features Norton Internet Security includes a suite of security tools that help keep your computer safe from security threats and privacy intrusions. Security protection features incl ude: Perso nal Fir ewall Prot ects your computer from I nter net att acks, dan ger ous Web conten[...]

  • Página 23

    Feature summary Virus a nd t hreat protec tio n features 23 Virus and threat pr otection features Norton AntiVirus provid es comprehensiv e virus prevention, threat detection, and repair software for your computer. It automatically detects and repairs known viruses. Norton AntiVirus detects viruses and other potential risks in instant me ssenger at[...]

  • Página 24

    Feature summary Virus and threat protection featur es 24 Bloodhound techn ol ogy Detects new and unknown viruses b y analyzing an ex ecutable file’s structure, behavior , and other attributes such as progr amming logic, computer instructions, and any data that is contained in the file. Pa s s w o r d protection Prot ects Norton Anti Virus options[...]

  • Página 25

    Feature summary Spam filter ing features 25 Spam filtering features As email becomes more popular, many users are receiving an inc reasing am ount of the unsolicited commercial email messages known as spam. Not only does spam make it difficul t to identify valid email messages, some spam contains offensive messages and images. Norton AntiSpam in co[...]

  • Página 26

    Feature summary Spam filtering f eatures 26 Language filter ing Blocks all email written in the language or languages you specify Automated update of spam definitions Updates copies of Sy mantec spam defi nition files auto matica ll y (s ubscri pti on requ ired ) NIS2005.book Page 26 Sunda y, August 1, 2004 3:24 PM[...]

  • Página 27

    Feature summary Ad b locking features 27 Ad blocking features Many Web sites are using more aggressive te chniques to draw attention to the ads on their pages. Some have begun using larger, more prominent ads, while others rely on ad windows that app ear when you enter or leave the site. Along with increasing the amount of time that it takes to dis[...]

  • Página 28

    Feature summary Ad b loc king features 28 NIS2005.book Page 28 Sunda y, August 1, 2004 3:24 PM[...]

  • Página 29

    Getting started 3 This section contains inform ation about starting your Symantec product and the feat ures that are available in the main window. It is not usually necessary to open your Symantec product to benefit from the pr otection features that it provides. Autom atic featur es that are set during installation provide you with basic protecti [...]

  • Página 30

    Getting started Start Norton Int ernet Security 30 Start Norton Internet Security Norton Internet Secu rity protects any computer on which it is installed. You do not have to start the program to be protected. T o start Nor ton Internet Security 4 Do one of the following: 2 On the Windows taskbar, click Start > Programs > Norton Internet Secu[...]

  • Página 31

    Getting started About the main wind ow 31 About the main window Use the mai n window to ac cess program components, set options, and access online Help. T o explore the main window 1 On the left side of the main window, select a category, such as Statistics or Subscription Status . A description or an expanded list of options appears in the center [...]

  • Página 32

    Getting started About th e main wi ndow 32 3 Inside the main window, under Status & Settings, click any of the feature names to see a brief description of the featur e and access configuration options for the feature . NIS2005.book Page 32 Sunda y, August 1, 2004 3:24 PM[...]

  • Página 33

    Getting started Activa te your pr oduct 33 Activate your product Product activation reduces so ftware piracy and ensures that you have received genuine Symantec software. If you did not activate your product when f irst prompted, you will receive an Activation Needed alert every day until you activate the product. w You must activate your produc t [...]

  • Página 34

    Getting started Ac tivate your produ ct 34 Chec k for co nnectivity bloc kin g A connectivity problem can occur if you are using parental control software or are using an ISP that provides pa rental contro ls. If you suspect that parental controls are blocking the connection, conf igure the parental controls so th at they do not block the activatio[...]

  • Página 35

    Getting started T emporarily turn o ff security pro tection 35 Temporarily turn off security protection There may be times when you want to temporarily turn off security protection. For example, you might want to see if it is prev enting a Web page from appearing correctly. Only Supervisor users can tem porarily turn off security protection. Child [...]

  • Página 36

    Getting started T empor arily turn off security protection 36 To ensure that your computer remains protected, you can turn on security protection manually if you complete your task before the tim e that you specif ied concludes. T o turn on security protection using the icon in the Windows system tray 4 In the Windows system tray, right-click the N[...]

  • Página 37

    Getting started T urn off Auto -Protec t temp oraril y 37 Turn off Auto-Protect temporarily If you have not changed the de fault option settings, Auto- Protect loads when you start your computer to guard against viruses, Trojan horses, worms, and other malicious threats. It checks programs for viruses as they are run and monitors your computer and [...]

  • Página 38

    Getting started Turn o ff A ut o- Pr ote c t te m p ora ril y 38 T o turn on or turn off Auto-Protect using the N orton Antivirus icon in the Windows system tr ay 4 In the Windows system tray, right-click the Norton Internet Securi ty icon, and then do one of the following: 2 Check Enable Auto-Protect to turn on Auto- Protect. 2 Uncheck Enable Auto[...]

  • Página 39

    Getting started T urn of f spam filterin g 39 Turn off spam filtering By default, No rton AntiSp am remains active once it is installed. If for any reason you want to temporarily disable it, you can turn it off from within the program itself. T o turn off spam filtering 1 In the main window, under Norton AntiSp am, click Status & Settings . 2 I[...]

  • Página 40

    Getting started T urn of f spam filterin g 40 NIS2005.book Page 40 Sunda y, August 1, 2004 3:24 PM[...]

  • Página 41

    Responding to emergencies 4 If you have an emergency, read these sections to try to find the solution to your problem. Common problems include: 1 Virus threats 1 Trouble re starting your co mputer 1 Lost or missing files 1 Possible disk damage w If you purchased this product to address any of the problems listed above, read these sections first. Im[...]

  • Página 42

    Responding to emergencies What to do if a vi rus is found 42 What to do if a virus is found w If after reviewing the informat ion in this chapter, you have not resolved your problem, see “Frequently asked questions” on page 49. Viruses can be found during a manual or scheduled scan or by Auto-Protect when you perform an action with an infected [...]

  • Página 43

    Responding to emergencies If Norton AntiVirus cannot r epair a file 43 If Norton AntiVirus cannot repair a file One of the most common reas ons that Norton AntiVirus cannot automatically repair an infected file is that you do not have the most up-to-date vir us definitions. Before running LiveUpdate to upda te your virus definitions, ensure that Qu[...]

  • Página 44

    Responding to emergencies Look up viruses on the Sy mant ec Web site 44 Look up viruses on the Symantec Web site The Symantec Web site contains a complete list of all known viruses and related malicious code, along with descriptions. You must be c onnected to the Internet to look up viruses. To l o o k u p v i r u s e s 1 On the left side of the ma[...]

  • Página 45

    Responding to emergencies If your product won’t install 45 If your product won’t install w You must be running Window s in order to install your Symantec prod uct. If you try to install your prod uct on a com puter that has a virus and you choose not to run the Symantec Pre-Install Scanner, start over and ru n the Symantec Pre-Install Scanner a[...]

  • Página 46

    Responding to emergencies If your computer won’t start 46 If your computer won’t start If you have a virus or threat on your computer, you need to start the computer from an unin fected disk to re move the virus. Scan for viruses using the CD w You might need to change your computer’s BIOS Setup options to start from the CD-R OM drive. To do [...]

  • Página 47

    Responding to emergencies Crea te Emer gency Disks 47 Create Emergency Disks Emergency Disks are used to st art your computer in case of a problem. If your computer can start from a CD, you can use the product C D in plac e of Emer gency Dis ks and d o not need to create them. If you downloaded the software , the program for creating Emergency Disk[...]

  • Página 48

    Responding to emergencies If you need to use Emerg enc y Disks 48 11 Remove the final disk from drive A. 12 Test the first disk in th e set to ensure that you can use it to restart your computer . 13 Store the Emergency Disk set in a safe place. If you need to us e Emergency Disks You can use Emergency Disks to restart your computer and scan for vi[...]

  • Página 49

    Frequently asked questions 5 The information in this chap ter will help you solve the most frequently encountered problems. Explore the Symant ec service and support Web site On the Symantec service an d support We b site, you can find the latest protection and program updates, patches, online tutorials, Knowledge Base articles, and virus removal t[...]

  • Página 50

    Frequently ask ed questions If you need to uninstall 50 If you need to uninstall See “Use online Help” on page 17 . Instructions for uninstalling are available in the online Help. NIS2005.book Page 50 Sunda y, August 1, 2004 3:24 PM[...]

  • Página 51

    Frequently asked questions T roubleshoot virus and thre at prot ection 51 Troubleshoot virus an d threat protection Check here for possible solutions to issues that might arise with Norton AntiVirus. How do I make Auto-Protect load when I start my computer? If the Norton AntiVirus Auto-Pro tect icon is not visible on the lower-right corner of the W[...]

  • Página 52

    Frequently ask ed questions T roubleshoo t virus and thre at prot ection 52 To s h o w t h e A u t o - P r o t e c t i c o n i n t h e W i n d o w s s y s t e m tr ay 1 In the main window, click Options . If a menu appears, click Norton AntiVirus . 2 In the Options window , under System, click Aut o- Protect . 3 Ensure that Show the Auto-P rotect i[...]

  • Página 53

    Frequently asked questions T roubleshoot virus and thre at prot ection 53 Why is Norton AntiVirus unable to repair my infected files? If Norton AntiVirus cannot repa ir your infected f iles, you may not have the most current v irus protection on your computer. Update your viru s definitions regularly to protect y our compu ter from the late st viru[...]

  • Página 54

    Frequently ask ed questions T roubleshoo t virus and thre at prot ection 54 T o tur n off em ail pr otectio n 1 In the main window, click Options . If a menu appears, click Norton AntiVirus . 2 In the Options window, un der Internet, click Ema il . 3 Uncheck Scan incoming Email . 4 Uncheck Scan outgoing Email . 5 Click OK . Why am I unable to send [...]

  • Página 55

    Frequently asked questions T rou bleshoot s ecurity pr otection 55 Troubleshoot security protection Check here for possible solutions to issues that might arise with Norton Internet Security. Does Norton Internet Security work with my ISP’s proxy server? Norton Internet Security works with most proxy servers. However, you might have to change som[...]

  • Página 56

    Frequently ask ed questions T roublesh oot secu rity prote ctio n 56 4 On the Connections tab, in the Remote Service Port column, look at the information. There should be a port number following the I P address of the site that you viewed with your browser . This n um be r is th e p o rt nu m be r th at i s u s ed to ac ce s s your proxy server for[...]

  • Página 57

    Frequently asked questions T rou bleshoot s ecurity pr otection 57 Can Norton Internet Security protect an FTP server? To let an FTP server run behi nd Norton Internet Securi ty, you must create the following rules: 1 Allow inbound TCP connections on port 21. 1 Allow outbound TCP connections on port 22. 1 Allow inbound TCP connections on ports 1024[...]

  • Página 58

    Frequently ask ed questions T roublesh oot secu rity prote ctio n 58 What is wrong with this Web site? If you cannot connec t to a Web site with Norton Internet Security turned off, t here might be a problem with the Internet or your Internet service provider. If your connection i s working, it’s possible a Nor ton Internet Security feature is pr[...]

  • Página 59

    Frequently asked questions T rou bleshoot s ecurity pr otection 59 If your email program mainta ins copies of sent messages in its Sent or Out folder, you can reopen the email message, rem ove the priva te informat ion, and send th e message again. Why won’t a program connect to the Internet? You might not be able to use a program to connect to t[...]

  • Página 60

    Frequently ask ed questions T roublesh oot secu rity prote ctio n 60 To allow the use of your local network, including file and printer sharing, place th e computers on your local network in the Trusted Zone. Why can’t I connect to the Internet via my cable modem? If your network accesses the Internet via a cable connection, you may need to make [...]

  • Página 61

    Frequently asked questions T rou bleshoot s ecurity pr otection 61 4 Click Exclude . 5 Click OK . How can a Web site get my browser information? The Browser Pri vacy settings prevent your browser from sending browser inform ation. However, some diagnostic sites on the Internet m ight report brow ser information even though the Browser Privac y sett[...]

  • Página 62

    Frequently ask ed questions T roubleshoot Norton AntiSpam 62 Troubleshoot Norton AntiSpam Check here for possible solutions to issues that might arise with Norton AntiSpam. Why do I still receive spam? Several factors make i t diffi cult to completely eliminate spam. For example, different peo ple will consider different classes of email me ssages [...]

  • Página 63

    Frequently asked questions T roubleshoot Norton An tiSpam 63 Why did an email message someone sent me never arrive? Some legitimate email messages may contain elements that are characteristic of sp am messages. This may have caused Norton AntiSpam to incorrectly identi fy the message as spam. Depending upon the filters you have created in your emai[...]

  • Página 64

    Frequently ask ed questions T roubleshoot Norton AntiSpam 64 Why do I need a subscription to spam definitions? Though the product is se lf-training, local spa m definitions are developed only by the criteria you input and from the sample of email messages you process. Symantec spam definitions are developed from a much larger set of information and[...]

  • Página 65

    Frequently asked questions T roubleshoot Ad Block ing 65 Troubleshoot Ad Blocking Check here for possible solutions to issues that might arise with Ad Blocking. Does Ad Blocking block all advertising on the current page? Ads that are integrated with standard content—for instance text statements—will not be blocked. Will Pop-up Window Blocking b[...]

  • Página 66

    Frequently ask ed questions T roubleshoo t LiveUpdat e 66 Troubleshoot LiveUpdate Check here for possible solutions to issues that might arise with LiveUpdate. What if I can’t use LiveUpdate? When new updates become availabl e, Symantec posts them on the Symantec Web site. If you can’t run LiveUpdate, you can obtain new updates from the Symante[...]

  • Página 67

    Service and support solutions The Service & Support Web site at http://service.s ymantec.com supports Symant ec products. Customer Servic e helps with nontechnical issues such as orders, up grades, replace ments, and rebates. Technical Support helps with technical issues such as installing, configuring, or troubleshooting Symantec prod ucts. Me[...]

  • Página 68

    Service and support solutions T echnical support 68 Technical support Symantec offers two technical support options for help with installing, configuring, or troubleshooting Symantec products: 1 Online Service a nd Support Connect to the Symantec Se rvice & Supp ort Web site at http://service.symantec.co m, select your user type, and then selec[...]

  • Página 69

    Service and support solutions Worldwide service and support 69 When you run LiveUpdate near the end of your subscription period, you are prompted to subscri be for a nominal charge. Simply foll ow the instructions on the screen. Worldwide service and support Technical support and custom er service solutions vary by country. For Symant ec and Intern[...]

  • Página 70

    Service and support solutions Worldwide ser vice and support 70 Service and support offices North America Sy mantec Corporation 55 5 International W ay Springfield, OR 9 7477 U.S.A. http://w ww .sym antec. com/ Australia and New Zealand Symantec Austr alia Lev el 2, 1 Julius Avenue North Ry de, NSW 211 3 Syd n e y Austr alia http://www .sym antec.c[...]

  • Página 71

    Inde x A activate and register 15 software 15 activation phone 34 problems 33 procedure 33 active content, troubleshooting 58 ActiveX controls 58 Ad Blocking, troubleshooting 65 Adobe Reader installing 18 using to view PDF 18 Alert Assistant 22 Automatic LiveUpdate and proxy settings 66 Auto-Protect description 37 failure to load on startup 51 func[...]

  • Página 72

    Index 72 Emergency Disks (conti nued) using 48 emergency recovery procedures 41 F features about 22 ad blocking 27 automatic update 26 Configuration Wizard 15 email filtering 25 main window 3 1 security protection 22 virus and threat protection 23 file extensions about 43 unusual 52 firewall and LiveUpdate 66 and network 66 troubleshooting 58 Windo[...]

  • Página 73

    Index 73 operating systems 5 Options button, main window 31 P Parental Control 22 password protection 24 options 22 Personal Firewall about 22 troubleshooting rules 58 phone activation 34 Pop-up Window Blocking about 27 troubleshooting 65 ports, determining active HTTP 55 post-insta ll tasks 15 Privacy Control 22 problems activation 33 troubleshoot[...]

  • Página 74

    Index 74 troubleshooting (continued) networks 60 Norton AntiSpam 62 printing 60 Web sites 58 U uninstalling 50 other antivirus programs 11 previous copies of your Symantec product 11 unknown viruses 24 updating from Symantec Web site 66 protection 66 User’s Guide PDF on CD 18 opening 18 V version number , checking 49 virtual private network (VPN)[...]

  • Página 75

    SYMANTEC SOFTWARE LICENSE AGREEMENT Norton Internet Security ™ IMPORT ANT: PL EASE RE AD THE TE RMS AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE USING THE SOFTWARE. SYMANTEC CORPORATION AND/OR ITS SUBSIDIARIES (“SYMANTEC”) IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THE INDIVIDUAL, THE COMPANY, OR THE LEGAL ENTITY THAT WILL BE U[...]

  • Página 76

    Updates. Symantec res erves the right to designate specified Conte nt Updates as requiring purchase of a separate subscri ption at any time and without notice to You; provided, however, that if You purch ase maintenance hereunder that includes part icular Content Updates on the date of purcha se, You will not have to pay an additi onal fee to con t[...]

  • Página 77

    Government end users with only those right s as granted to all othe r end users, according to the terms and conditions contained in this lice nse agreement. Manufacturer is Symant ec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014. 8. Export Regulation: Certain S ymantec product s are su bject to export controls by the U.S. Department o[...]