A Security Alert appears when someone attempts to access your computer. This may be an Internet attack, a Trojan horse, or legitimate activity such as someone on your local network attempting to share files or printers. Not all Security Alerts are indications that your computer is under attack. Some harmless communication between computers may appear to be similar to common Internet attacks and can trigger Security Alerts.
A computer with the IP address [IP address] sent information that is characteristic of the [Attack Name] attack.
You can get detailed information about this attack at the Symantec Security Response Web site.
You do not have to do anything to protect your computer. Any communication that triggers a Security Alert is automatically blocked. By default, the computer that sent this communication is placed in AutoBlock, which blocks all communication from this computer for 30 minutes, even if subsequent communication is benign. If you are uncertain whether this alert was triggered by an attack or by legitimate activity, use Visual Tracking to trace the computer's IP address. This helps you identify where the computer is located and, if it is an actual attack, gives you information that you can use to report the attacker.
If legitimate connection attempts from a computer that you trust are triggering Security Alerts, use Networking to add the computer to the Trusted Zone. To add a computer to the Trusted Zone
If you receive frequent Security Alerts about a specific attack when you perform safe activities, you can turn off monitoring for this attack. To turn off monitoring for this attack
If someone is repeatedly using a specific computer to attack your computer, you can permanently block all communication from the IP address. Use Networking to add this computer to the Restricted Zone. To add a computer to the Restricted Zone
|