Norton for Home Run custom tasks (Norton) Turn on or turn off automatic tasks (Norton) Turn Idle Time Optimizer on (Norton) Schedule security and performance scans (Norton) Learn more about Intrusion Signatures (Norton) Configure Intrusion Prevention settings (Norton) Permanently block a computer that has been blocked by AutoBlock (Norton) Unblock computers that are blocked by […]
Category: Norton
Norton Business(256)
Norton Endpoint(1)
Norton Home(257)
Run custom tasks (Norton)
Run custom tasks Norton automatically checks your system and chooses the best settings to keep your system secure. However, you can run some specific tasks. You can choose the specific tasks that you want to run by using the options available in the Custom Tasks window. You can choose your own combination of tasks for a one-time […]
Turn on or turn off automatic tasks (Norton)
Norton runs automatic tasks as it quietly works to protect your computer. These automatic tasks include scanning for viruses, monitoring your Internet connection, downloading protection updates, and other important tasks. These activities run in the background when your computer is turned on. If any item needs your attention, Norton displays a message with the information […]
Turn Idle Time Optimizer on (Norton)
Norton automatically schedules the optimization when it detects the installation of a new application on your computer. Norton runs this optimization only when your computer is idle. You can use the Idle Time Optimizer option to optimize the boot volume during idle time. By default, this option is turned on. Turn Idle Time Optimizer on or off […]
Schedule security and performance scans (Norton)
Use the Task Scheduling settings to have Norton examine your system automatically for security and performance issues. You can specify when and how often Norton needs to perform those examinations. You have the following options for scheduling security and performance scans: Automatic (Recommended) Examine your PC for security and performance issues whenever your PC is […]
Learn more about Intrusion Signatures (Norton)
Intrusion Prevention relies on this list of attack signatures to detect and block suspicious activities. If you are confident that an attack signature matches the benign activity, you can uncheck the signature from the list to exclude the signature from monitoring. Each exclusion that you create leaves your computer vulnerable to attacks. In some cases, […]
Configure Intrusion Prevention settings (Norton)
Intrusion Prevention protects you from attacks when you are online. It scans network traffic for attack signatures, such as social threats and outbound attacks, that identify attempts to exploit vulnerabilities in your operating system or in a program that you use. To keep you secure, Intrusion Prevention discards packets from computers that try to send […]
Permanently block a computer that has been blocked by AutoBlock (Norton)
You can permanently block a computer that Norton AutoBlock temporarily blocks if you think the computer is always a threat and that you never need to access it. The permanently blocked computer is removed from the AutoBlock list and added to the list of restricted devices. Permanently block a computer that has been blocked by […]
Unblock computers that are blocked by Norton AutoBlock (Norton)
If Norton Firewall stops network traffic to a computer that you know is safe, you can restore connections to the computer by removing it from the AutoBlock list in Norton Firewall settings. Unblock an AutoBlocked computer Start Norton. If you see the My Norton window, next to Device Security, click Open. In the Norton main window, click Settings. In the Settings window, […]
Exclude or include attack signatures in monitoring (Norton)
In some cases, benign network activity may appear similar to an attack signature. You may receive repeated notifications about possible attacks. If you know that the attacks that trigger these notifications are safe, you can create exclusion for the attack signature that matches the benign activity. Each exclusion that you create leaves your computer vulnerable […]