An Internet Access Control Alert appears when the firewall detects that a program on your computer is attempting to access the Internet.
 |
|
 |
Threat Type |
 |
No Virus
Virus
Security Risk
Hack Tools
Spyware
Trackware
Dialer
Remote Access
Adware
Joke Programs
Unknown Threat
Norton AntiVirus not installed
File not found
Virus scan failed
|
 |
 |
|
 |
Digitally Signed |
 |
No
Yes
Digital Signature check failed
|
 |
 |
|
 |
Traffic Direction |
 |
Inbound
Outbound
Either
|
 |
An Internet Access Control alert appears the first time that a program attempts to access the Internet.
An Internet Access Control Alert may be triggered by a program that you choose to run; by a Windows component that is accessing the Internet in the background; or by a Trojan horse or other remote-control program that is attempting to send information without your knowledge.
Read the alert information and then select one of the following available options:
Automatically configure Internet access (Recommended)
Update your security settings based on configuration information provided by Symantec.
Permit
Permits this attempt to access the Internet.
Block
Blocks this attempt to access the Internet. This is the appropriate selection if you don't recognize the program and the risk is high.
Manually configure Internet access
Lets you choose Internet access settings for this program.
If you permit or block this connection attempt and then run the program again, you receive another Internet Access Control Alert. To permit or block all connection attempts by this program, choose permit or block and then check Always use this action.
There are two ways to reduce the number of Internet Access Control Alerts that you receive:
Turn on Automatic Program Control
Automatically update security settings for programs that Symantec has identified as safe. You will not receive warnings when Automatic Program Control makes changes to your security settings.
Run a Program Scan
The firewall identifies all of the Internet-enabled programs on your computer and suggests appropriate security settings for each one. You can accept these suggestions or manually configure access for individual programs.