Home

Norman Security Suite FR

image

Contents

1. 2 The first dialog informs you about the scheme of the wizard and which steps are included Click Next 3 In this step you should enter a name and a password for the administrator Only this user is allowed to configure Parental Control Make sure that you pick a password you von t forget since it cannot be reset The password is case sensitive Click Next Copyright 1990 2007 Norman ASA 46 e Norman Security Suite User s Guide N Norman Parental Control NORMAN SW Virus A Spyware Protection Pa rental Control EE Personal Firewall st Parental Control a Install and Update PA Support Center Y Parental Control Wizard Step 1 Enter an administrator user name and password User name Enter 8 user name for the administrator Password Enter a password for the administrator Re enter password Note that if you forget the administrator password you cannot reset it care Now select default profile Parental Control will fall back on this profile after the specified idle time Idle time is a period where there is no activity on the system i e no keyboard strokes and no mouse movements When you ve completed the wizard you can log in as administrator and decide when Parental Control should fall back on default profile when the PC is idle You can select Child or Teenager as the profile Parental Control should fall back on after the specified idle period A user in the Child category is only allowed
2. Remove selected ox Cancel Apply Log aut Help 3 Type in the web address you wish to allow in the Add to list box and click Add Valid formats are http www newspaper com www newspaper com newspaper com Wildcards are not supported Tip Ifyou grant access to http www newspaper com kidsstuff it does not permit access to http www newspaper com If newspaper com is added all sub domains of this web address are allowed like news newspaper com cartoon newspaper com etc 4 When you have added the addresses you wish to allow click Apply Note The allowlist applies to all users in group Child How to configure group Teenager 1 Select Parental Control Group configuration Teenager 2 Click Configure allowlist Type in web addresses in the format explained in step 3 above Click Apply when you re done and then OK to return to the previous dialog 3 Click Configure blocklist and type in the addresses you don t allow for users in the Teenager group Note that you can activate Copyright 1990 2007 Norman ASA Parental Control e 51 deactivate both the allowlist and the blocklist by selecting deselecting the option Use blocklist alternatively Use allowlist 4 Click Apply when you re done and then OR to return to the previous dialog 5 Click Select categories and the following dialog appears N Norman Parental Control User Configuration User Configuration Configure Categories
3. of the Security Suite You don t have to worry about the nature of the updates as the Security Suite s agent handles everything and informs you if a restart of your computer is necessary for example You can update the Security Suite via the Internet or the internal network In the Install and update section you can update the entire Security Suite by one click on the Update now button Select update method 1 Goto Install and update Configure and click Update method The following dialog appears N Norman Install and Update Configure Internet Update NORMAN a Virus A Spyware Protection Insta Il a nd Update E Personal Firewall st Parental Control ON Install and Update a Select update method Update manually fe Automatically at set intervals Update intervals 1 day Wait for dial up connection Proxy settings ox Cancel Apply Help 2 The recommended update method is Automatically at set intervals You can select this option if you have a permanent connection to the Internet Click on Update intervals to set the frequency The alternatives are 6 hours 12 hours and 1 day Copyright 1990 2007 Norman ASA Virus amp Spyware Protection e 17 Select Update manually if you prefer to start the update mechanism manually from the tray or Start menu to check for updated packages or use Windows Scheduled Tasks utility located in Control Panel If you select this option your
4. 951 38 270 email info normanit com Web http www normanit com Norman SHARK BV Postbus 159 2130 AD Hoofddorp The Netherlands Tel 31 23 789 02 22 Fax 31 23 561 3165 email support norman nl Web http www norman nl Norman ASA Mailing address P O Box 43 N 1324 Lysaker Norway Physical address Strandveien 37 Lysaker N 1324 Norway Tel 47 67 10 97 00 Fax 47 67 58 99 40 email norman norman no Web http www norman no no Norman Data Defense Systems Camino Cerro de los Gamos 1 Edif 1 E 28224 Pozuelo de Alarc n MADRID Spain Tel 34 91 790 11 31 Fax 34 0 91 790 11 12 email norman normandata es Web http www normandata es Norman Data Defense Systems AB Korsgatan 2 602 33 Norrk ping Sweden Tel 46 11 230 330 Fax 46 11 230 349 email sales se norman no Web http www norman com se Norman Data Defense Systems AG Miinchensteinerstrasse 43 CH 4052 Basel Switzerland Tel 41 61 317 2525 Fax 41 61 317 25 26 email norman norman ch Web http www norman ch Norman Data Defense Systems UK Ltd Exchange House 494 Midsummer Boulevard Central Milton Keynes MK9 2EA United Kingdom Tel 44 08707 448044 01908 255990 Fax 0870 1202901 email norman normanuk com Web http www normanuk com iv e Norman Security Suite User s Guide Norman Data Defense Systems Inc 9302 Lee Highway Suite 950A Fairfax VA 22031 USA Tel 1 703 267 6109 Fax 1 703 934 6367 email norman nor
5. cates a Lea 19 The On access SORRA 20 How to disable the On access scanner ianraannnanna 20 The On dema nd Seanner siste bilia 21 Scan DOW ei o dialisi 22 Setting up a scheduled scan iii 22 Enable the Screen saver CAM isla 24 Right click Scala de 26 The Command line CAME 26 Starting the Command line scanner i 26 Copyright 1990 2007 Norman ASA viii e Norman Security Suite User s Guide A lhi elio sr a ii 27 Create an exclude AA vcenstaared ocseunmeesauedans 27 SCANNING Statisties carol iaia 28 Internet proteccions ilari eil lai ea 28 Advanced settings cacera ii anit tats 31 IPOTUS ei a es eon el 33 ONET ENNET EN AN El 34 Configure QUIM 34 Personal Firewall usestamnmmetamdstdsenatameiomtsnentemmmn 36 Switching mode between inexperienced and experienced user 36 Disable Enable Personal Firewall oocononococi noncnnnnninnonanc nanonoss 38 A re oo sem 38 Create a rule inexperienced mode n 39 Create a rule experienced mode ica 41 View traffic on your computer iii bis 41 Real Meli A as ea 41 Ports VW seriali erat 42 Useful facts about the Personal Firewall rina 44 Parental Control ille 45 Ru nnmg the WIZ At A ia 45 Users Groups and Categories tidad 47 Allowlist and Blocklist heal 48 Howto create a Usei ille 48 OTTO UTE groups ad ia 49 How to configure proto Child ai neneiune 49 How
6. cover the grouping of services that each Svchost exe session can contain Anti pharming implemented through protection of the HOSTS file and therefore eliminating the most common pharming attack method Copyright 1990 2007 Norman ASA Parental Control e 45 Parental Control The purpose of Parental Control is to shield the young ones from the shady sides of the Internet It s no secret that there is an abundance of bizarre web sites inappropriate for kids and most adults too for that matter The Internet is not censored but you can introduce your own censorship to protect your children from viewing web sites with undesired content deliberately or not With Parental Control you can block access to certain categories of web sites or even block all sites not explicitly approved In addition you can restrict the time a user is allowed to surf on the net and specify what time of the day surfing is permitted In short you can customize a profile for the individual user based on age or other criteria you wish to take into account After you have installed Norman Security Suite you must run a wizard before you can start using Parental Control The reason is that only the administrator can configure the program like setting the default profile create users etc Running the wizard 1 When you have installed Norman Security Suite status for Parental Control on the Home page is Information Click on this link to launch the wizard
7. field blank and still install the entire suite However the License Wizard will regularly prompt you for a key and the product s will not be updated Copyright O 1990 2007 Norman ASA Installing Norman Security Suite e 13 4 When you have entered a valid license key and pressed Next this dialog appears iW Norman Sec urity Suite InstallShield Wizard Setup Type Choose the setup type that best suits your needs Please select a setup type Typical Al program features that are covered by the product license key vell be installed Choose which program features you want installed and where they will be installed Recommended for advanced users Note If you re not currently connected to the Internet we recommend that you select Custom install Note Ifyou didn t enter a license key in the previous step the default option is called Complete rather than Typical 5 Ifyou select Typical installation all products covered by your license will be installed to c Program Files Norman You should select a Custom install if you don t want to install all products or if you want to install to a different location than c Program Files Norman 6 The next dialog allows you to enable Norman s Screen Saver Scanner This is a feature that scans your hard drive s when your system is idle and a normal screen saver would be activated This option provides a screen saver and a scanner You can select deselect this
8. installation is not updated automatically You must run Internet Update manually either from the tray menu or by selecting Install and Update Update now Note If Internet Update has not been run for 24 hours the program Tip Tray icons automatically checks for updates at start up If your machine is protected by a firewall or proxy server you may have to click the Proxy settings button and enter the required information If you use a modem to connect to the Internet select the Wait for dial up connection option for daily checks for updates on Norman s servers You just access the Internet like you normally do and the program will figure out if updated files are available If you connect to the Internet several times per day the update mechanism checks for updates the first time you connect only If you connect to the Internet once a week for example a check is performed once as soon as you re connected Click Apply when you re done During setup a Norman icon is placed in the system tray in the lower on this machine IN right hand corner of the screen This icon confirms that NSS is installed When you right click this icon the following menu appears Copyright 1990 2007 Norman ASA 18 e Norman Security Suite User s Guide Note that the options in this menu GA Internet Update will look different depending on El Norman Security which NSS products are installed The items in the list with an icon in
9. remove the check mark and click OK Alternatively insert a check mark to allow a denied application access to the Internet Note that Terminate Application and Edit Associated Rule only apply to entries handled by rule The Open Advanced Configuration option is only available for rules handled by advanced configuration Useful facts about the Personal Firewall You have seen that the Personal Firewall s rule wizard automatically can create rules for applications behavior with regard to accessing the Internet We have also established that there are different modes for experienced and inexperienced users and that the firewall features a Server mode awareness You can create and change rules and view details for traffic and port activity In addition Norman Personal Firewall offers e Launcher protection that detects attempts from an application to launch itself through another application Stealth launch protection that uncovers malicious applications attempting to access the Internet via other applications The Personal Firewall keeps track of all parent applications Process hijacking protection which prevents that malicious applications hijack a trusted process for dll or thread injection Full stealth mode that ensures that all ports on your computer are completely invisible from the outside Advanced svchost handling where each svchost service has separate rules rather than one general rule to
10. that you use Copyright 1990 2007 Norman ASA Exclude list Virus amp Spyware Protection e 27 Simply select the combination of parameters that you wish to use and specify them on the command line 3 Fora list of available parameters enter nvcc You may want to speed up the scanning process by excluding certain files from scanning Note that excluding files or areas from scanning is a decision at the expense of security Files on the Exclude list are not scanned Reasons for not scanning certain files may be that they trigger false alarms or they are too time consuming to scan At any rate we recommend that you scan files on the exclude list regularly by running scheduled or on demand scans page 21 You can create exclude lists for the On access and the On demand scanners Create an exclude list 1 Go to Virus amp Spyware Protection Configure Scanners 2 Select the relevant tab On access scanner or On demand scanner 3 Adding separate files in the Add to list box type in the path and file name and click Add and then Apply 4 Adding disk drives or folders select drive letter and click Add selected or click the drive letter and browse for the folder s you wish to exclude from scanning Click Add selected and then Apply 5 The newly added drives folders or files appear in the list in the upper part of the dialog 6 Toremove entries from the list select the relevant entry and click Remove selec
11. to view the web pages that the administrator types in the Allowlist A user in the Teenager category is restricted by the category filters see page 47 In the final step you can view and confirm your choices Click Back to make changes or Finish to complete the wizard with the current settings Copyright 1990 2007 Norman ASA Parental Control e 47 N Norman Parental Control NORMAN SU Virus A Spyware Protection Pa rental Control st Parental Control ersonal Firewall v Parental Control Wizard ION Install and Upda a Step 3 Complete the Parental Control ha Support Center A Wizard Note that if you forget the administrator password you cannot reset it Teenager Click Finish to save the administrator password and complete the wizard or click Back to change it Back 6 Click OK in the next dialog and the administrator login appears Log in with the password you entered in Step 1 and you are ready to configure the product as you like Users Groups and Categories When you create a user you must complete a couple of mandatory steps where you assign group and password for the new user There are three groups Adult Teenager and Child Adult No restrictions the user can access any web site Teenager Restricted by the category filters see below Child Only allowed to view the web pages that the administrator types in the Allowlist Categories are based on a wide range of terms and expr
12. 1 59 29 DNS Chert 1025UDP 1721704 53 Advanced Configuration 11 06 35 system 138UDP 17217 7 256 138 Advanced Cortiguration To view deteds right click a log entry 2 Right click an entry to view details and possibly change the configuration for this application 3 From the drop down menu you can change between the following views Outgoing traffic Incoming traffic Server privileges requests and Status messages from the firewall Tip Ifyou select Incoming traffic you can see attempts to connect to your computer that were denied and why Ports viewer 1 From Personal Firewall Expert Tools select Advanced Ports Viewer The following dialog appears with an overview of which application is using which port on your machine status traffic etc Copyright 1990 2007 Norman ASA Personal Firewall e 43 RE NPF Advanced Ports Viewer NORMAN Advanced Ports Viewer Pot Status Application Traffic Handed by 1025 UDP Open secure DNS Chert svchost exe sde Advanced Configuration 500 UDP Closed LSA Shell Export Version 756 ectve Advanced Comiguratin 2868 TCP Limite lo lP MEEWES EXE 2156 active Advanced Config ration 135 TCP Closes Remote Procedure Cal RPC svchost exe i active Advanced Configuration 137 UDP Lintedto LAN systen 17217743 active Advanced Configuration 138 UCP Limiedto LAN system 17217713 active Advanced Configuration 139 TCP Limiedio LAN system 17217743 active Advanced Configuration Explanation of por
13. 9 and page 45 respectively for more information Virus amp Spyware Protection This antivirus program monitors your PC for malicious software also referred to as malware Malware is viruses worms trojans and other varieties of unwanted code Spyware is not destructive like traditional viruses but the consequences of revealing personal information inadvertently could be just as damaging Norman s unique Sandbox provides proactive protection that identifies even unknown viruses gt For more information on Norman s Sandbox refer to page 56 Viruses can be automatically removed from hard disks removable media email attachments etc The Virus amp Spyware Protection application checks files when they are accessed and possible viruses are removed automatically Since we encourage users to perform manual scans of the machine you can choose Norman s screen saver which also starts a virus scan when Copyright 1990 2007 Norman ASA 10 e Norman Security Suite User s Guide it s activated When you resume work and a scan is aborted it continues where it left the next time the screen saver kicks in For regular manual scans you can use the task editor and scheduler to define what area of the machine to scan and when This product is shipped with pre selected settings that we consider sufficient to protect you against virus attacks The modules can be configured so that you can set up the application to suit your exact
14. MAN Q Virus amp Spyware Protec Virus amp Spyware Protection ersonal Firewall Ma Parental Control ON Install and Update Attachment blocking Ports Advanced settings M Block all attachments I Block files with double extension MM Block attachments with CLSID file type Block encrypted attachments Block all attachments isted below C Block all attachments except those listed below Attachment list 0 There are no items to display Add Remove selected oK Cancel Apply Help This is a short explanation of the available configuration options Block all attachments all attachments are blocked Block any attachment with double extensions many worms and e mail viruses apply a technique where an additional extension is added for example lt filename gt jpg vbs Most e mail clients will hide the last extension so that the attachment appears to only have the extension jpg However this feature is not only used by viruses legitimate files with names like myfile hlp zip and todolist 20 dec doc are both treated as double extensions Block any CLSID extensions default option some worms and e mail viruses apply a CLSID technique to fool e mail scanners and blocking software They take advantage of a feature in Windows which Copyright 1990 2007 Norman ASA 32 e Norman Security Suite User s Guide makes it possible to replace an exe extension with a extension and thus evade blocking of e
15. NORMAN Y Virus A Spyware Protection Pa rental Control EA Personal Firewall Y Select categories to block for Teenager it Parental Control DA install and Update W Sex W Gamb ng W Wespons W Drugs w Cancel Apply Log out Help 6 By default all categories are selected i e users in the group Teenager are denied access to web sites with content of this nature If you decide to allow one or more categories remove the checkmark for the relevant categorie s Click Apply to save possible changes How to schedule Internet access You have seen how you can control a user by assigning a group which restricts the surfing activity to approved web addresses You can also restrict the time a user can spend on the Internet 1 Go to Parental Control User Configuration and click Configure for the user you want to schedule Internet access for 2 Click Select Internet Access A calendar displaying the days of the week appears without any restrictions To block Internet access for a specific time place the cursor on the desired day time and left click Then move the cursor Copyright O 1990 2007 Norman ASA 52 e Norman Security Suite User s Guide to mark a period and left click again The selected field s are marked in red denoting that this period is blocked for surfing You can drag the cursor upwards downwards or sideways right left to extend the period you wish to block 4 To edit blocked p
16. Norman Security Suite for Workstations Version 7 User s Guide ii e Norman Security Suite User s Guide Limited warranty Norman guarantees that the enclosed CD ROM and documentation do not have production flaws If you report a flaw within 30 days of purchase Norman will replace the defective CD ROM and or documentation at no charge Proof of purchase must be enclosed with any claim This warranty is limited to replacement of the product Norman is not liable for any other form of loss or damage arising from use of the software or documentation or from errors or deficiencies therein including but not limited to loss of earnings With regard to defects or flaws in the CD ROM or documentation or this licensing agreement this warranty supersedes any other warranties expressed or implied including but not limited to the implied warranties of merchantability and fitness for a particular purpose In particular and without the limitations imposed by the licensing agreement with regard to any special use or purpose Norman will in no event be liable for loss of profits or other commercial damage including but not limited to incidental or consequential damages This warranty expires 30 days after purchase The information in this document as well as the functionality of the software is subject to change without notice The software may be used in accordance with the terms of the license agreement The purchaser may make one copy of th
17. Norman Security Suite e 11 Norman Security Download the installer file from Norman s web site The file is called NormanSecuritySuite SU_RxXXX exe where x represents the release number and XXX the language version In other words NormanSecuritySuite SU RIENG exe is the English version of the first release of Norman Security Suite Double click the file to start the installation and follow the instructions on the screen We recommend that you read the Readme file in step 2 In step 4 you are asked for a license key If you previously purchased a product license the license key holds information on the products you paid for If you have a copy of your license key in an email or some other electronic format the easiest way is to copy the key into the license key field Highlight the key and press Ctrl C place the cursor in the license key field and click Ctrl V to paste in the key Make 12 e Norman Security Suite User s Guide sure that there are no blank spaces included 14 Norman Sec urity Suite InstallShield Wizard Product license key Enter product icense key or evaluate Norman Securty Sute Enter the 5x5 character icense key ooo AAAMOOO You can leave the field empty F you only want to evaluate the product The License Wizard will help you to obtain a key later We recommend that you enter a key to make the most of the product during the trial period Note If you don t have a key you can leave this
18. an ASA Copyright 1990 2007 Norman ASA Support Center e 55 Uninstalling the Security Suite You can uninstall the product using Windows Control Panel s Add Remove programs on Vista from Programs and Features or running delnvc5 exe from c Program Files Norman nvc bin and choose the Remove option When the program is removed restart the computer 56 e Norman Security Suite User s Guide Appendix A What is a sandbox Sandbox is the term that best describes the technique that is used to check if a file is infected by an unknown virus The name is not randomly picked because the method allows untrusted possible viral code to play around on the computer not in the real computer but in a simulated and restricted area within the computer The sandbox is equipped with everything a virus expects to find in a real computer This is a playground where it is safe to let a virus replicate but where every step is carefully monitored and logged The virus is exposing itself in the sandbox and because its actions have been recorded the cure for this new perpetrator can be generated automatically Today a new email worm can infect ten thousands of workstations in a matter of seconds Norman s sandbox functionality can prove to be a valuable tool for trapping new destructive code Copyright 1990 2007 Norman ASA
19. antine before repair and Move unrepairable files to quarantine Both options are preselected and recommended Then specify minimum and maximum time files should be held in quarantine and how much disk space they are allowed to occupy A file which hasn t reached the minimum time will not be deleted though then the reserved disk space allocated for quarantined files vvill be expanded Click Apply when you re done 36 e Norman Security Suite User s Guide Personal Firewall When you install the Personal Firewall you must run the installation wizard which establishes basic rules for NPF automatically such as granting Internet access for the relevant applications You can always change automatically generated rules later using the Rule Editor It is highly recommended that you run the installation wizard which offers different steps for experienced and less experienced users The purpose of the wizard is to identify programs with a legitimate need to access the Internet and to create rules for these applications When you have completed the installation wizard select Personal Firewall from the Security Suite s home page N Norman Home NORMAN G Home OE Virus amp Spyware Protection Home hi Personal Firewall st Parental Control ION Install and Update Q Virus amp Spyware Protection PA Support Center Personal Firewall 1 Parental Control OK a Internet Update oK Automatic updates ar
20. ble the Personal Firewall from the console Internet Update NI Norman Security Suite Disable personal firewall Scan Computer Stop On access scanner Contact us Update status Windows Security Center also issues a warning when the firewall is disabled About rules Rules are necessary to allow trusted applications Internet access like so many programs rely on these days The Personal Firewall detected trusted programs installed on your machine that need to be online like web browsers and email clients and established rules for them when you ran the wizard However you may have programs installed that the firewall didn t recognize or were acquired after you installed the firewall When such a program tries to connect to the net the firewall produces a pop up that informs about the action and let you decide if you will allow or deny the action Copyright O 1990 2007 Norman ASA Personal Firewall e 39 Outgoing Application The program Internet Explorer is trying Deny to connect to the Internet through Javal TM ena senna Create rule which applies to this session O is a permanent rule Tip If you trust this application it should be safe to allow this The Personal Firewall does not allow you to create incoming rules Incoming rules are handled by the firewall s Server Mode awareness which dynamically and automatically creates incoming rules based on Server Privileg
21. e Protection main console click Scan computer The On demand scanner launches a scan of all hard drives on the system Setting up a scheduled scan 1 Select Task Editor from the Virus amp Spyware Protection main page Then click Create a Task Enter a task name for example Documents Specify area to scan Select Scan selected files and folders and click on the corresponding link Copyright O 1990 2007 Norman ASA Virus amp Spyware Protection e 23 N Norman Virus Spyware Protection Task Editor Task Editor Task Editor NORMAN Uras amp Spysore Protection Virus amp Spyware Protection Personal Firewall Whe Control ION Install and Update Areas to Scan 1 Click OK ce Apply to save changes P IF nent C Documents Remove selected Eq Oocuments Documents and Settings l orivers Program Files inec YCLER System Volume Informati on Eq WINDOWS Add selected 5 Select the drive and folder s to scan and click Add selected The area you just selected appears in a list at the top 6 Click OK 7 You re returned to the previous dialog Click Next Select frequency for the task Once Daily Weekly Monthly and start date and time Copyright 1990 2007 Norman ASA 24 e Norman Security Suite User s Guide N Norman Virus Spyware Protection Task Editor Task Editor NORMAN Virus amp Spyware Protection Virus amp Spyware Protection Personal
22. e enabled Disable Last updated 2007 10 31 09 47 46 Switching mode between inexperienced and experienced user Depending on which version of the Personal Firevvall s wizard you selected you are defined either as inexperienced or experienced user The option Use advanced rule editor Personal Firewall Configure Advanced settings is automatically selected if you ran the Copyright O 1990 2007 Norman ASA Personal Firewall e 37 experienced wizard Clear the check mark for this option to change level to inexperienced user The difference between the two categories is the degree of assistance you get when you create new rules or change existing rules As inexperienced user a rule wizard will guide you through the rule handling The experienced user is presented to this Rule Editor screen when clicking Personal Firewall Configure Rule Editor SE NPF Rule Editor NORMAN Rule Editor Description Auto crested Internet Explorer Auto crested Oubicok Express Auto crested Windows Media Player Auto created Windows Messenger Copyright 1990 2007 Norman ASA 38 e Norman Security Suite User s Guide Disable Enable Personal Firewall You can disable enable the Personal Firewall by right clicking the tray icon Select Disable Personal Firewall This entry changes to Enable Personal Firewall when the application is disabled Note This option is not available on Windows Vista where you must disable and ena
23. e software for backup purposes No part of this documentation may be reproduced or transmitted in any form or by any means electronic or mechanical including photocopying recording or information storage and retrieval systems for any purpose other than the purchaser s personal use without the explicit written permission of Norman The Norman logo is a registered trademark of Norman ASA Names of products mentioned in this documentation are either trademarks or registered trademarks of their respective owners They are mentioned for identification purposes only Norman documentation and software are Copyright 1990 2007 Norman ASA All rights reserved Last revised on 13 December 2007 Copyright 1990 2007 Norman ASA Copyright 1990 2007 Norman ASA e iii Norman Offices Norman Data Defense Systems AS Blangstedg rdsvej 1 DK Odense SO Denmark Tel 45 6311 0508 Fax 45 6313 3901 email normandk normandk com Web http www norman no dk Norman France 8 Rue de Berri 75008 Paris France Tel 33 1 42 99 94 14 Fax 33 01 42 99 95 01 email info norman fr Web http www norman fr Norman Data Defense Systems GmbH Zentrale Gladbecker Str 3 40472 Disseldorf Germany Tel 49 0211 5 86 99 0 Fax 0211 5 86 99 150 email info norman de Web http www norman de Norman Data Defense Systems Centro Direzionale Lombardo Via Roma 108 20060 Cassina de Pecchi MI Italy Tel 39 02 951 58 952 Fax 39 02
24. eriods place the cursor in a red field click and drag the mouse over the area you wish to change 5 When you are done configuring this user click Apply to save your work Copyright 1990 2007 Norman ASA Support Center e 53 Support Center If you need more assistance than the product documentation and online help can supply you should go to the Support Center N Norman Support Center NORMAN Virus amp Spyware Protection Support Center Personal Firewall arental Control I ION Install and Update Gi Help and Troubleshooting 6 Help and Troubleshooting Support Center Contact Informatian Contact information for our offices Y Automatic repair Try thes ogbon to automabcally repair technical p your installation Note Network co temporarily interrupted during this operation Help and troubleshooting Clicking the Help and troubleshooting link brings you to Norman s web which offers a range of useful resources that in most cases will help you out On this web site you ll find e Frequently Asked Questions FAQ e technical knowledge base e hot support topics e Norman s Support Forum Copyright 1990 2007 Norman ASA 54 e Norman Security Suite User s Guide e search facilities If you cannot solve your problem with these tools then try Contact information This page provides phone numbers and addresses so you can get in touch with your local Norman office representative Automatic
25. es This is an intelligent mechanism in the firewall that evaluates attempts from the outside to listen on a set of ports Legitimate requests are granted access only for the relevant ports and they are automatically closed when they are no longer needed Create a rule inexperienced mode 1 Copyright O 1990 2007 Norman ASA Select Personal Firewall Configure Rule Editor The Rule Wizard appears Select I want to create a new rule and click Next A list of eligible applications is presented 40 e Norman Security Suite User s Guide SE NPF Rule Wizard NORMAN Select application to assign a rule The wizard hes reviewed your desktop and start menu and found the tollowing applications that might be able to access ihe Internet Select the application you wish to create a rude tor and cick Next Fie name A C program es tinwrelinewie exe C iindowsleyvstem3Ziacciz exe crmndowsleystemillodoced32 exe 4 Select an application by clicking on it or select Show My Computer if the program you re looking for is missing from the list Click Next 5 Decide if this application should be Allowed or Denied access to the Internet Click Next 6 Determine ifthis is a server application or not Server applications make your computer behave as a server by holding ports open allowing other computers to connect to yours If in doubt select No Click Next Tip Ifyou change your mind you can always go back and change a rule
26. essions that enable the Parental Control to identify a web page as predominately sex oriented for example The program applies a technique that requires the presence of a set of conditions for a web page to be classified as Copyright 1990 2007 Norman ASA 48 e Norman Security Suite User s Guide belonging to a category The terms that the categories are based on are not accessible for viewing or editing There are four categories for the group Teenager that will block access to web pages with contents of the types sex gambling weapons and drugs All categories are by default on but the administrator can uncheck the one s that should be allowed Allowlist and Blocklist For users in the Child group an allowlist must exist since only the web addresses on this list are possible to view For users in the Teenager group you can create both an allowlist and a blocklist but for this group it is optional to use these lists In addition you can allow one or more categories for the Teenager group See How to configure group Teenager on page 50 Note Both the allowlist and the blocklist affect all users within the group How to create a user 1 Select Parental Control User configuration Add user 2 Inthe next dialog select which group the new user should be based on The default group is Child Click Next 3 Enter user name and password for the new user Click Next Copyright 1990 2007 Norman ASA Parental C
27. feature at any time Please refer to Enable the Screen saver scanner on page 24 Copyright 1990 2007 Norman ASA 14 e Norman Security Suite User s Guide 14 Norman Sec urity Suite InstallShield Wizard Screen Saver Scanner The Screen Saver Scanner scans a local system for virus infections The Norman Security Sute includes a Screen Saver Scanner that will scan the local computer for viruses and other malware when the system is idie Enable Screen Saver Scanner Note The Screen Saver Scanner can also be enabled later by using the Norman Security Suite program manager or by modifying Desktop properties 7 Click Next to complete the installation of the Security Suite When installation is complete you will be asked to restart your computer Don t restart until you re instructed to Wizards Norman Security Suite has three different wizards The License Wizard mentioned in step 3 above that keeps track of the products you have a valid license for The others are relevant if you have installed the Personal Firewall and or Parental Control Once Norman Security Suite is installed a wizard for setting up the Personal Firewall is launched see page 36 Finally you must complete a wizard before you can start using Parental Control Please refer to Running the wizard on page 45 Common for all wizards are that they are easy to use and will handle basic product configuration Copyright O 1990 2007 Nor
28. firewall st Parental Control LE Install and Update 9 Support Center Q Task Editor Schedule scans to run at regular intervals W Schedule task frequency Weekly x Start time 2007 10 24 El Bsck Nest Cancel Help 9 Click Next 10 The last dialog displays a summary of the newly created task Click Back to change your settings Cancel to abort or Finish to save the task 11 All scheduled tasks are displayed in a list in the Virus amp Spyware Protection Task Editor dialog Enable the Screen saver scanner When your select the Screen Saver scanner a virus scan of your system is performed during idle periods The On demand scanner will start a scan of all hard drives once the screen saver is launched If the scan is aborted before it s finished it will start scanning from where it was stopped the next time it s activated 1 Goto Virus amp Spyware Protection Configure and click Enable screen saver scanner The following dialog in Windows Control Panel appears Copyright 1990 2007 Norman ASA 2 3 Virus amp Spyware Protection e 25 Display Properties Themes Desktop Screen Saver Appearance Settings Noman Screensaver Wart 10 minutes 9 On resume display Welcome screen Monitor power To adjust monitor power seltings and save energy Power Select Norman Screensaver as Screen saver When you ve made possible desired changes to the set
29. front of them are copies of the items that at any time appear on the Start Programs Norman Security Suite menu Stop on access scanner Disable personal firewall Contact us License information Update status This is a shortcut to Norman Security Suite s main modules as well as some typical tasks You can Start stop the on access scanner or Disable enable the Personal Firewall by a simple mouse click Select Contact us to display contact information for our offices and distributors on Norman s web site or view the license Finally you can view update status for the Norman product s including key information for the virus definition files This function is also the originator of messages regarding outdated virus definition files expiration of licence period and other information Warnings The Norman icon also provides information regarding the state of your Security Suite installation This icon denotes that some of the N components currently running are outdated If the Norman N appears La with the red symbol blinking place the pointing device on the symbol to find out which component that needs updating or if there are other error situations Note During startup the red symbol is visible until all modules have started The older and slower the machine the longer it takes for all modules to load However the normal symbol should appear after a maximum of 1 2 minutes For Windows XP and V
30. ista users Microsoft included its Security Center with options and features for Firewall automatic updates and virus protection Norman is one of the AV vendors that the operating system detects If the virus definition files are outdated or the On access scanner is not running you will also receive a warning from Copyright O 1990 2007 Norman ASA Scanning Virus amp Spyware Protection e 19 Windows that something is wrong The Security Center symbol appears and you can click on it to view and edit the Windows settings If the warning triangle icon appears in the system tray it signifies that one of these situations have occurred 1 The On access scanner is installed but has been manually disabled To start the On access scanner select the shortcut from the right click menu or go to the Virus amp Spyware Protection main console See The On access scanner on page 20 for details 2 You have probably selected Reboot later on a previous prompt and the Security Suite is waiting for a reboot 3 An installation error that a reboot might fix Outdated virus definition files A blinking yellow triangle signifies that the virus definition files are outdated i e they are at least ten days old The same happens if the On access scanner is stopped paused from the tray menu Informational icons When the Norman icon appears with a cog Norman Program Manager is working with the program most likely an update We do n
31. l configuration options this guide focuses on tips and procedures of a practical nature Please refer to the online help for a detailed explanation of all available options Technical support Copyright 1990 2007 Norman ASA Norman provides technical support and consultancy services for the Security Suite and security issues in general Technical support also comprises quality assurance of your antivirus installation including assistance in tailoring the Security Suite to match your exact needs Note that the number of services available will vary between the different countries Vi e Norman Security Suite User s Guide Copyright 1990 2007 Norman ASA Contents e vii Contents Syst m tuali alal iaia iv About this V ETSI OM dia V ABODE this MAA cane A aa V Technical SUD Dita il v About Norman Security Suite sessseessesssecssoossoossoosssoesssesssoossososssossssesssose 9 What is Norman Security Suite ui 9 Virus amp Spyware Protection i 9 Personal Pre Wal A ei A 10 Parental Control lt a a a a a a aa 10 Installing Norman Security Suite eesooessoeessesssecssoossoossssessocssoossoossssesssee 11 Dant rali 14 Virus amp Spyware Protection sesssessseessocssoossoossscsssooesoossoossssesssesssoossooseos 15 Installing and updating products i 15 Update method rs rabbia ie 16 Select update method E etc ai ira 16 TAV ARA mia te AIR VAI E IC 17 SSC IMITATED oc
32. l times If the On access scanner is stopped paused from the tray menu a blinking yellow triangle appears in the system tray See Warnings on page 18 Whenever a file is accessed in a read write operation or a program is executed the On access scanner is notified and scans the file on the fly if configured to Like the On demand scanner the On access scanner detects and repairs all types of viruses Whenever possible an infected file is repaired before the file is handed over to the application Access to the infected file is denied if repair fails How to disable the On access scanner We recommend that the On access scanner is enabled at all times However if you for some reason need to disable it this is what you do 1 Fromthe tray menu select Stop the On access scanner Internet Update N Norman Security Suite Disable personal firewall Scan Computer 5 top On acc Contact us Update status If you don t manually start the scanner again it will be enabled the next time you restart your computer or when an update is installed Copyright 1990 2007 Norman ASA Virus amp Spyware Protection e 21 2 Fromthe Virus amp Spyware Protection main page click Disable for On access file scanning is enabled N Norman Virus amp Spyware Protection NORMAN Q Virus A Spyware Protection Virus amp Spyware Protection Bed Personal Firewall wt Parental Control ION Install and Update Scanned files
33. last 24 hours Q select a Task 12 13 14 13 16 17 18 19 20 21 23 72 4 93 04 03 06 07 08 09 10 1 On access file scanning enabled sa Quarantined files no files in the quarantine a Scan computer Scan your computer for viruses and malicious software Task Editor Manage and schedule automatic scans VEU Quarantined files Ml Manage quarantined files eg Configure Configure scanner settings e mail protection and quarantine 3 Note well that the configuration has now changed Disabling the On access scanner from here is the same as removing the check mark for Enable On access scanner under Virus amp Spyware Protection Configure Scanners On access scanner The scanner remains disabled until you manually enable it again 4 If you disable the On access scanner in this way no warning is issued by the Security Suite However Windows Security Center will warn The On demand scanner Use the On demand scanner for periodic scans of entire drives selected folders or files Scanning an entire hard drive is a time consuming exercise so we encourage you to set up scheduled scans using the Task Copyright 1990 2007 Norman ASA 22 e Norman Security Suite User s Guide Editor and enable the Screen Saver Scanner Thus on demand scans are performed automatically during periods of low activity Finally the On demand scanner can be launched by right clicking a file system object Scan now From the Virus amp Spywar
34. later 7 A summary dialog appears When you click Finish the rule is generated and takes effect immediately Copyright 1990 2007 Norman ASA Personal Firewall e 41 Create a rule experienced mode 1 Select Personal Firewall Configure Rule Editor A dialog listing existing rules and their status appears SE NPF Rule Editor NORMAN Rule Editor Description Auto crested Internet Explorer Auto crested Oubicok Express Auto crested Windows Media Player Auto created Windows Messenger 2 Click the Create New button 3 Complete the required fields and click OK Tip There s a detailed description of all fields in the online help View traffic on your computer Real time log The Personal Firewall employs advanced stealthing techniques that make your computer invisible and undetectable from the Internet You can keep an eye on activities on your own machine using two other features the real time log utility and the advanced ports viewer 1 From Personal Firewall Expert Tools select Real time log utility The following dialog appears with an overview of outgoing Copyright O 1990 2007 Norman ASA 42 e Norman Security Suite User s Guide applications and key information for these E NPF Real time Log Utility NORMAN Real time Log Utility Quigong traftic V ndows Time 423U0DP 207 46 232182 123 Advanced Configuration 71 59 30 DHCP Chert 68 UDP 255 255 255 255 67 Adrenced Contiguration 1
35. lease refer to Appendix A on page 56 Copyright 1990 2007 Norman ASA 30 e Norman Security Suite User s Guide Incoming Outgoing e mail scan all e mail that you receive and send to others Even your best friend closest business associate or yourself may be ignorant of a virus infection The option Newsgroups scans the traffic generated between your computer and the other participants in the group forum you are active in Instant messaging received files scans file transfer traffic during instant messaging sessions with MSN Messenger and Windows Messenger When this option is selected NIP will scan incoming files for malware If a file is infected a pop up message will warn about the incident Only file transfers are scanned so infected links still pose a threat Note that the files that are transferred will be scanned when they are written to the directory Temporary Internet Files If malware is detected it is probably a tmp file that is quarantined To restore a quarantined tmp file select the desired file choose the Save as option from the right click menu and save the file with its original name and extension gt See Quarantine on page 34 Copyright 1990 2007 Norman ASA Virus amp Spyware Protection e 31 Advanced settings Click the Advanced settings button to view this dialog N Norman Virus Spyware Protection Configure Internet Protection Attachment blocking NOR
36. man ASA Virus amp Spyware Protection e 15 Virus amp Spyware Protection Installing and updating products Go to Install and Update Configure Products for a list of all available products N Norman Install and Update Configure Products NORMAN El virus amp Spyware Protection Install and Update ersonal Firewall Select Products Note that you dear the check box for a product it will be uninstalled and Install and Update hence never updated Y Parental Control v Virus A Spyware Protection On demand Scanner Y On access Scanner Y Command line scanner Y Internet Protection iv Personal Firewall Parental Control You must log m as an administrator to mai ny changes to Parental Control ox Cancel Apply Help If and when new products components are added to the Security Suite they are downloaded automatically You must however install new products manually by selecting them from this dialog All selected products are automatically updated through the Security Suite s Internet Update Products not covered by your license will not appear in the list Copyright O 1990 2007 Norman ASA 16 e Norman Security Suite User s Guide Note well If you remove the check mark for a product it will be uninstalled and therefore never updated Update method New malware appears every day and Norman provides frequent updates to the virus definition files as well as regular program updates
37. man com Web http www norman com Training and Technical Support For training or technical support please contact your local dealer or Norman ASA System requirements This version supports installation of Norman Security Suite v7 on Windows 2000 XP and Vista machines Windows 2000 CPU any 450 MHz Pentium based platform RAM 256 MB Other requirements Service pack 4 Update Rollup 1 for Windows 2000 SP4 Internet Explorer 6 or newer 100 MB of available disk space Windows XP CPU any 450 MHz Pentium based platform RAM 256 MB at least 512 MB recommended Other requirements Service pack 2 Internet Explorer 6 or newer 100 MB of available disk space Windows Vista CPU 1 GHz 32 bit x86 or 64 bit x64 processor RAM 512 MB at least 1GB recommended Other requirements Operating system and browser details 32 bit Windows Vista Internet Explorer 7 100 MB of available disk space Copyright O 1990 2007 Norman ASA ev About this version The current release is available in several languages New languages are added at irregular intervals Contact your Norman dealer for information about the Security Suite in your language Check Norman s web sites for details or contact your local dealer for more information about language versions About this manual This manual presents an overview of products features and key functions in Norman Security Suite Rather than presenting a complete walkthrough of al
38. needs Personal Firewall Whenever you re connected to the Internet reading email or surfing the web you make connections to other computers all over the world and they connect to yours This is where the trouble starts By breaking into your computer hackers may access your private documents use your computer for their own acts of evil or even render your computer useless by deleting important system files The Personal Firewall controls in and outgoing traffic on your computer based on a security policy which is established when you install the product automatically or self defined The Personal Firewall is first and foremost hacker protection Parental Control The Internet is not necessarily a good place to be and there are some web sites we certainly don t want the youngest of the family to visit Unless children and teenagers are under constant surveillance they are likely to visit web sites with undesired content deliberately or not With Parental Control you can block access to certain categories of web sites or even block all sites not explicitly approved In addition you can restrict the time a user is allowed to surf on the net and specify what time of the day surfing is permitted In short you can customize a profile for the individual user based on age or other criteria you wish to take into account Copyright 1990 2007 Norman ASA Installing Suite Tip Copyright 1990 2007 Norman ASA Installing
39. on between computers there are a some that are vital for Internet use For standardization reasons protocols have pre assigned port numbers E Advanced settings Attachment blocking Ports Incoming e mail POP3 110 Outgoing e mail SMTP 2 Newsgroups NNTP 119 Cancel Apply changes Help Port numbers In the section Internet protection on page 28 you selected which Internet traffic you wish to scan This dialog identifies the protocols needed for sending and receiving e mails for example and the corresponding port number on the PC according to industry standards If you have assigned different port numbers to one or more of the supported protocols listed here you must enter the actual port number for the affected protocol s The options presents the type of traffic they will scan and the protocol name for these functions The functions protocols below are those supported presently The list is likely to be updated whenever necessary e Incoming e mail POP3 e Outgoing e mail SMTP e Newsgroups NNTP Copyright 1990 2007 Norman ASA 34 e Norman Security Suite User s Guide Quarantine The Virus amp Spyware Protection application will try to clean infected files before they are deleted and or quarantined depending on your configuration Quarantined files are either infected or have been blocked by the Internet Protection feature When you select Virus amp Spyware Protection Quaran
40. ontrol e 49 N Norman Parental Control New user wizard NORMAN Y Virus amp Spyware Protection Parental Control Personal Firewall Y Parental Control Wizard Y Parental Control gt Se Step 2 Select user name and password for the new user Select a user name for the new user Password Select a password for the now user Re enter password Back nea Cancel Help 4 You ll receive a confirmation that a new user is created Click OR Configure groups Since the group Adult has no restrictions only Child and Teenager can be configured If a user who is assigned to group Child should be able to access the Internet at all you must specify which web pages this user is allowed to access How to configure group Child 1 Select Parental Control Group configuration Child 2 Click Configure allowlist Because all web pages for the group Child are blocked unless they are explicitly permitted there is no Blocklist or Category for this group The following dialog appears Copyright 1990 2007 Norman ASA 50 e Norman Security Suite User s Guide N Norman Parental Control Group Configuration Group Configuration Group Configuration NORMAN Parental Control PN Virus amp Spyware Protection st Farental Control ON install and Update Support Center Use allowlist 0 Deleted 1 Click OK or Apply to save changes There are no items to display Add to kst E add
41. ot recommend that you turn off your machine when NPM is working i e while this symbol is visible Note An update shouldn t take more than 5 10 minutes If the cog icon is present for a longer period of time something might be wrong with the installation In that case try the Repair option available from delnvc5 and described on page 54 Tip You can always place the cursor on any type of icon in the system tray for an explanation of errors or messages The Security Suite features two main scanners the On access scanner and the On demand scanner as well as different scanning methods Both scanners employ the unrivaled Sandbox a feature that detects new and unknown viruses Select this option if you want the Virus amp Spyware Protection application to look out for unknown virus variants By default the Sandbox option is on for both scanners Scanning time Copyright 1990 2007 Norman ASA 20 e Norman Security Suite User s Guide increases somewhat when the Sandbox is active but it is not likely to affect the overall system performance significantly If a scanner detects a virus or other type of malware it will try to clean the infected file or if the file has no other than destructive purposes delete it entirely The On access scanner The On access scanner is working in the background and offers automatic protection of your system It is an essential virus control component and should therefore be enabled at al
42. repair If you are experiencing any problems with your installed version of the Security Suite you could always try to run an automatic repair before you contact support personnel When you click Automatic repair a process is started in the background which checks your installation and if necessary updates files or components You ll see the cog symbol in the tray menu while automatic repair is running See Tray icons on page 17 for an explanation of icons that affect the Security Suite If you don t have access to a graphical user interface you can run delnvc5 exe from c Program Files Norman nvc bin and choose the Repair option Using eLogger to monitor your installation eLogger is an application located in norman npm bin that keeps track on everything the Program Manager is doing in managing the Security Suite eLogger is always running if a working installation of the Security Suite is running The application is collecting and storing the last 100 Kb of information on Security Suite related activities You can save eLogger information which automatically is stored as txt filesin Norman logs with the name ELG mmdd hhmmss There is no need to worry even if there are numerous entries in the log The eLogger records everything that s related to the Security Suite so many entries don t suggest that something is wrong eLogger information can be particularly useful for support personnel Copyright 1990 2007 Norm
43. t status Chosd An applicatico hat opened this port and beliewes that tis opened successful but the firewal blocks al traffic to this port eftectivey chosing E Secs Oriy reples to requests you send out me stored afl other tratfic is blocked The port is completely stentited Limitedto LAN The port is only open to your Local Arsa Network From the internet the port a compietety sesthed United to P Tre port is ony Open to 8 single P or a idad group of Ps From the internet the port is completely steathed Open The port is open to the Internet If one or more of your ports are open the machine is visible to the internet Only server software such as web and ftp servers shouid be operi Note operi means that is not poss se for the tread to protect this port However an application might secure E Open secre The port is open to the internet but the acpitcation is known to protect ds port successtuly nate Apskotion Et Associated Rule cue J 2 The bottom half of the screen contains explanations of the different status types 3 You can highlight an entry and stop the application by clicking the Terminate Application button Tip Highlight an entry and click the Open Advanced Configuration button EE npfports NORMAN se Network Time Protocol and allow traffic over port 123 a ri Copyright 1990 2007 Norman ASA 44 e Norman Security Suite User s Guide To change an applications configuration from allow to deny
44. ted Click Apply when you re done Note NSS does not check if the files folders or drives you add to the exclude list really exist Be careful to enter the correct names and paths Copyright 1990 2007 Norman ASA 28 e Norman Security Suite User s Guide Scanning statistics At the top of the Virus amp Spyware Protection home page there is a graphical representation of scanned files and detected infections over the past 24 hours The current hour is at the far right i e the example below covers the period since 3 PM yesterday till 2 PM today The statistical numbers represent the activity of the On demand and the On access scanner Place the cursor on a column to view details for that particular hour In the example below 21 663 clean files were scanned between 11 AM and noon One or more infections were detected between 2 PM and 3 PM denoted by the red color for that period Place the cursor over that period to check how many infected files were found and if they were cleaned N Norman Virus amp Spyware Protection NORMAN 1 Virus A Spyware Protection Virus amp Spyware Protection Personal Firewall arental Control A install and Update EA Support Center Q Select a Task Scanned files last 24 hours ge kh 13 16 17 8 19 20 21 22 23 00 01 02 03 04 OS 06 07 OR OF 10 13 12 13 14 On access file scanning enabled Disable Quarantined files Internet protection Norman Internet Protec
45. tine you can view all quarantined files Note A copy of a deleted or blocked file is quarantined by default N Norman Virus 4 Spyware Protection Quarantine NORMAN Q Virus amp Spyware Protection Virus amp Spyware Protection nes Personal Firewall 44 Quarantined files arental Control ON Install and Update PA support Center Total 1 files in the quarantine File name Diagnosis Date eicar zip EICAR_Test_file_not_s_viruat 2007 11 02 Save as Check all Restore Delete Refresh view Up ome level Heip J Infected files that have been quarantined appear in this list provided that you have configured the program to do so When the On access scanner detects that c eicar com is infected it is moved to quarantine However if the On access scanner detects c copy of eicar comand this file is identical to eicar com copy of eicar comis not quarantined but deleted If copy of eicar comresides on c another folder it is however moved to quarantine because of the new location This method is implemented to avoid that the quarantine is crammed in a situation where a virus has written several copies of the same file to the same area of the disk drive Configure Quarantine 1 Select Virus amp Spyware Protection Configure Quarantine Copyright 1990 2007 Norman ASA Copyright 1990 2007 Norman ASA Virus amp Spyware Protection e 35 Select if you want to Back up all files to quar
46. tings click OK In the next system idle period the On demand scanner will start scanning your hard drives displaying the progress continuously Note that a screen saver scan employs the settings specified under Virus amp Copyright 1990 2007 Norman ASA Spyware Protection Configure Scanners On demand scanner 26 e Norman Security Suite User s Guide Right click scanning You can also launch the On demand scanner by right clicking a file system object in Windows Explorer or on the desktop for example and then selecting Scan for viruses from the menu Open Print Edit Scan for viruses Open With gt Send To gt Cut Copy Create Shortcut Delete Rename Properties The Command line scanner The Command line scanner is an alternative to the GUI based scanner and offers the possibility of running batch jobs and other scanning tasks from the command line The Command line scanner is a good alternative for those familiar with this environment The command line scanner has the same basic functionality as the menu driven scanners and is not dependent on any other modules It can also be run from batch files Starting the Command line scanner 1 From the DOS prompt go to the directory where the Virus amp Spyware Protection application resides the default location is norman nvc bin 2 The syntax is nvec drive path parameters Enter A space must precede each parameter
47. tion NIP is a filter that protects against viruses that spread through e Internet mail e news readers The majority of viruses reported today use mechanisms that enable them to spread through e mail NIP is a module designed to intercept Copyright 1990 2007 Norman ASA Virus amp Spyware Protection e 29 incoming and outgoing mail and news stripping or blocking all infected attachments for undesired content NIP is both capable of scanning e mails for known viruses and block file attachments depending on content and file extensions All scanning options in the Internet Protection module are preselected N Norman Virus amp Spyware Protection Configure Internet Protection NORMAN Virus amp Spyware Protection Virus amp Spyware Protection Bad Personal Firewall at Parental Control ION Install and Update Use Sandbox I Configure Internet Protection Traffic to scan W Incoming e mail W Outgoing e mail W Newsgroups W Instant messaging received files Advenced settings Qu Cancel Apply The option Use Sandbox activates Norman s sandbox functionality to detect new unknown viruses The sandbox is particularly tuned to find new email network and peer to peer worms and file viruses and will also react to unknown security threats Scanning time will increase when this option is selected but it is not likely to have a significant effect on performance For more information about the sandbox p
48. to configure group Teenager anna anaraana 50 How to schedule Internet access SI Support Center ipsa 53 Help and troubleshooting ii aaa i 53 Contactmiformationi si eta 54 Automatic Tepair edi See a PDE 54 Using eLogger to monitor your installation 54 Uninstalling the Security Suite sirio ries 55 Copyright 1990 2007 Norman ASA Contents e ix AppendocA sleale What 18a Sandbox tad ela 56 Copyright 1990 2007 Norman ASA x e Norman Security Suite User s Guide Copyright 1990 2007 Norman ASA About Norman Security Suite e 9 About Norman Security Suite What is Norman Security Suite Norman Security Suite NSS is a software security package made up from three different security applications e Virus amp Spyware Protection e Personal Firewall e Parental Control Norman Security Suite is ready for use once you ve installed it The default configuration settings provide the protection you need and you don t have to run through the configuration options to make the program operational However it s useful to have a perception of how things work and familiarize yourself with the basic functions This manual aims at pointing out certain useful features and provide some hints on how to get the most out of the program Note that you must run a wizard before you can start using the Personal Firewall and the Parental Control Please refer to page 3
49. xe files Since there is no reason for legitimate attachments to use this type of extension this behavior is blocked by default Block encrypted attachments depending on the tools used compressed and encrypted files are generally harder to scan for viruses than plain file attachments Therefore NIP offers the option of blocking such attachments altogether Block all attachments listed below default option all names that you Add to the list are blocked Enter a specific name or use wildcard to identify attachments to stop See Attachment list below Block all attachments except those listed below all names that you Add to the list are accepted Enter a specific name or use wildcard to identify attachments to accept See Attachment list below Note Itis very important that you distinguish carefully between these two options as they represent two extremes block all entries in the list or accept all entries in the list Attachment list Use this function to explicitly select attachments you want to block or certify You can enter the exact name of an attachment or use wildcard to block certain extensions To block all exe files for example click on Add and enter exe Click OK and the entry appears in the list box where you later can edit or remove it Copyright O 1990 2007 Norman ASA Virus amp Spyware Protection e 33 Ports Among the numerous protocols for communicati

Download Pdf Manuals

image

Related Search

Related Contents

Este manual está dividido en dos secciones  COLIBRI 2000 180x236 - Servizio Assistenza Tecnica Polti  Draytek VigorSwitch P2260  Philips HQ54 shaving heads  Philips MANT901EN User's Manual  The Power Years: A User's Guide to the Rest of Your Life  JVC XL-PG37SL User's Manual  Betriebsanleitung P26 Differenzdruck- Messumformer  Kicker SKM10 Owner's Manual  Safety Instructions Product information - image  

Copyright © All rights reserved.
Failed to retrieve file