
About Vulnerability Protection ............... . . . 194
About the types of security risks ... . . . .......... 197
About configuring POP3 and SMTP
ports ................. . . ................ . . . ....... 198
About the Network Security Map . . . . ............ 201
About Metered Broadband Mode ............ . . .. 219
Chapter 6 Monitoring protection features .............. 223
About Security History . . ................ . . . ....... 223
Chapter 7 Customizing protection features . ........... 253
Feature summary .......... . . . ................ . . . ... 253
About turning off automatic features .......... 258
About customizing settings and
options .. . . . ................ . . ................ . . . 261
Chapter 8 Finding additional solutions ........ . . . ....... 307
Finding the version number of your
product ... . . . ............... . . . ................ . . 307
Finding the End-User License
Agreement ...... . . . ............... . . . .......... 308
About upgrading your product . . . ................ 308
About Norton Autofix . . . . ............... . . . ........ 311
Staying informed about protection
issues . . ............... . . . ................ . . . ..... 313
About Support . ............... . . . ................ . . . . 314
About uninstalling .. . . . ................ . . . .......... 320
Index .... . . . ................ . . . ................ . . ................ . . . ........... 325
Contents10
Kommentare zu diesen Handbüchern