Skip to content

TechRepublic

  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • TechRepublic Premium
  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Security

Norton AntiVirus 2009 With Antispyware

By Erik Eckel November 17, 2008, 2:11 AM PST

Image
1
of 27

249895.jpg
249895.jpg
Norton AntiVirus 2009 With Antispyware

Norton AntiVirus 2009 With Antispyware

Norton AntiVirus 2009 With Antispyware

Norton AntiVirus 2009 With Antispyware ships in the familiar yellow-and-red Norton packaging.nnThe newest edition simplifies what’s becoming a more complicated process. Norton’s newest antivirus software provides effective antivirus, antispyware, antirootkit and browser and intrusion protection, all without overly cannibalizing system capacity.nnExperience shows just how well it works. On those occasions when I’ve attempted a hurried fix and connected a client system to my main network (instead of my test network), the Norton antivirus engine on my main production system has done its job.nnOn several occasions it caught and contained threats, including a heinous W32 virus that jumped from a client’s PC to my thumbdrive (prompting me to only use CDs, now, when troubleshooting client systems). Further, Norton AntiVirus has effectively spotted compromising utilities within a special disk partition I maintain for my own network discovery, wireless probing and password recovery utilities.

Norton AntiVirus 2009 With Antispyware

Main Norton AntiVirus 2009 Console

Main Norton AntiVirus 2009 Console

Norton engineers have simplified the program’s main administrative console. Simple on/off (green/red) coded keys indicate whether antivirus, antispyware and advanced protection features are active.nnWhile possessing deep customization capabilities (all accessible from this console), the software, out-of-the-box, is easy to load and operate. That’s critical, especially for less technical users whose systems often become compromised using less effective security software and then feed botnets that work to infect countless others.

Norton AntiVirus 2009 With Antispyware

Configuring Computer Settings

Configuring Computer Settings

Users or technology professionals wishing to fine-tune Norton’s program can do so by clicking the Settings link found on the main console. Doing so opens this control panel from which settings can be configured for the antivirus, Internet, home network and other miscellaneous elements.nnHere you can see some of the default settings aimed at assisting users in protecting their PCs, from enabling removable media (thumbdrive) scans, performing idle time scans week, scanning for rootkits and other stealth items and more.

Norton AntiVirus 2009 With Antispyware

Spyware Settings

Spyware Settings

As an IT consultant, I regularly complete service calls in which spyware infections prove more invasive and confounding than virus infections. Here you can see a wide list of problematic spyware risks Norton’s automatically blocks.

Norton AntiVirus 2009 With Antispyware

Performing A System Scan

Performing A System Scan

As mentioned earlier, when you instruct Norton to perform a scan (by clicking the Scan Now link found on the main console screen), this menu appears. Three options are presented: a Quick Scan of critical system files and commonly infected directories, a FulL System Scan and a Custom Scan.

Norton AntiVirus 2009 With Antispyware

Setting Scan Exclusions

Setting Scan Exclusions

Scan exclusions are easily set. In the event a system hosts sensitive or proprietary files that should not be scanned by antivirus programs, those program directories can be excluded both from regularly scheduled scans and from the product’s auto-protect feature by clicking the respective Add button and selecting the appropriate directories to exclude.nnHere you can see my workstation is set to exclude the Programs and Utilities directory. Due to my need to frequently crack customers’ lost passwords, hack network settings and discover wireless keys, I park such files in a specific directory. I then exclude that directory from scans in order to prevent those files and programs from being cleaned by Norton’s detection and removal engines.

Norton AntiVirus 2009 With Antispyware

Signature Scans

Signature Scans

Signature exclusions, accessed by clicking the Configure link found within the Computer Settings window, permits excluding specific threat signatures from Norton’s antimalware scans. Here you can see two specific cracking utilities I’ve excluded.

Norton AntiVirus 2009 With Antispyware

Internet Settings

Internet Settings

Web browser protection, e-mail and instant messenger scans and intrusion prevention features are all configured from the Internet Settings menu, seen here.

Norton AntiVirus 2009 With Antispyware

Email Scanning

Email Scanning

This window appears when you click the e-mail Configure link found within the Internet Settings control panel.nnBy default, both incoming and outgoing e-mail messages are scanned by Norton’s antivirus engine. Additional advanced features, such as automatic removal of suspected worms and System Tray activity notifications, are enabled/disabled by selecting their respective icons.

Norton AntiVirus 2009 With Antispyware

Instant Messenger Scan

Instant Messenger Scan

Instant messenging scans are also easily configured. Just select the appropriate checkbox for whichever IM tool you use. Coverage is provided for users of the Yahoo, AOL, MSN and Trillian networks. Additional new IM support can be found by clicking the provided link.

Norton AntiVirus 2009 With Antispyware

Intrusion Exclusions

Intrusion Exclusions

Intrusion Exclusions are also set from within the Internet Settings console. Clearing a checkbox for a respective item (such as may be needed to enable communication with an online free PC gaming site) enables that potential risk to pass through Norton’s protective filters.

Norton AntiVirus 2009 With Antispyware

Intrusion AutoBlock

Intrusion AutoBlock

Intrusion AutoBlock is a feature within Norton AntiVirus 2009 that enables the PC, when under attack from other systems, to simply block traffic from those systems for a set period of time (in this case 30 minutes).nnThe AutoBlock feature works dynamically, meaning Norton AntiVirus makes its own decisions as to when other systems are attacking (and automatically blocks those systems). Should a user need to manually clear any AutoBlock’ed systems, they can do so using the provided section at the bottom of this (Intrusion AutoBlock) window. From this window users can also set the port used by the Home Network feature and purge any stored network mapping information.

Norton AntiVirus 2009 With Antispyware

Home Network Settings

Home Network Settings

From within the Home Network Settings window (reached by clicking the Settings link found on the main Norton console), users can specify whether the Welcome Screen should appear during startup.

Norton AntiVirus 2009 With Antispyware

Miscellaneous Settings

Miscellaneous Settings

Norton Community Watch (infection reporting tools), tamper protection, CPU usage display and other features are enabled/disabled using the Miscellaneous Settings window, shown here.

Norton AntiVirus 2009 With Antispyware

Network Proxy Settings

Network Proxy Settings

Network proxy settings are also configured from within the Miscellaneous Settings control panel. Clicking the Configure link found next to the Network Proxy Settings section displays this window.nnHere’s where users and techs must enter any proxy server information Norton’s update engine would require to access the Internet.

Norton AntiVirus 2009 With Antispyware

Network Security Overview

Network Security Overview

Clicking the View Home Network link, found on Norton’s main console screen, displays this window. From here users can view Wireless Security, Remote Monitoring and Network Map displays.

Norton AntiVirus 2009 With Antispyware

Scan Customization

Scan Customization

Users can easily perform scans by clicking the Scan Now link found on the main console page. When users or technicians elect to perform a custom scan (reached by clicking Scan Now and selecting Custom Scan), this window appears. From here, scans can be tailored to specific folders, files, drives or the entire system.

Norton AntiVirus 2009 With Antispyware

Scan Progress Window

Scan Progress Window

While the security software performs a scan, its progress is displayed in this window. Norton lists the number of files scanned, as well as the number of risks detected and resolved.nnMore information for any risks requiring further action are listed on the Attention Required tab, while complete information for a listed risk is found on the Detailed Results tab.

Norton AntiVirus 2009 With Antispyware

Histories And Logging

Histories And Logging

Norton AntiVirus 2009 records comprehensive log files with information on detection and removal activities. These logs can be viewed by clicking the History link found within the main console.nnHere you can see the information Norton presents when viewing the recent history log.

Norton AntiVirus 2009 With Antispyware

Resolved Security Risks

Resolved Security Risks

When viewing Resolved Security Risks, Norton lists information associated with each detected risk and the corresponding removal effort.

Norton AntiVirus 2009 With Antispyware

History Detail

History Detail

Double-clicking any event listed within the History logs reveals more information about that risk/removal effort. Should a user or technician require, any risks that have been quarantined can be restored to their original location from this screen. Users need only click the Restore Risk button.nnOr, clicking the Remove From History button removes an event from the application’s history file.

Norton AntiVirus 2009 With Antispyware

Quarantine Restore

Quarantine Restore

Norton displays this confirmation screen whenever a detected risk is successfully restored. To restore risks, users must click the Restore Risk button shown earlier.

Norton AntiVirus 2009 With Antispyware

Unresolved Security Risks

Unresolved Security Risks

Just as recent activity and resolved security risks can be viewed, so too can unresolved security risks be listed independently. Users need only select that option from the Security History’s View drop-down menu, as shown here.

Norton AntiVirus 2009 With Antispyware

Quarantine View

Quarantine View

Most every antimalware program enables users to view files that have been placed in quarantine. Norton AntiVirus 2009 is no different. By selecting Quarantine from the Security History View drop-down menu, a complete list of all quarantined items is displayed.

Norton AntiVirus 2009 With Antispyware

Resource Usage

Resource Usage

Norton touts its antivirus engine’s low resource usage. Many IT professionals, particularly those familiar with older versions of the software, will scoff.nnBut the proof is here.nnNorton’s resource monitor claims that 9% of the CPU’s capacity is in use (and that Norton’s using no system resources). While Norton’s own resource monitor isn’t perfect, it’s very close. As Microsoft’s Process Explorer reveals, only 7.68% of the CPU’s capacity is in use.

Norton AntiVirus 2009 With Antispyware

Resource Usage

Resource Usage

When Norton’s antivirus program is active, the resource monitor continues to track actual usage closely. nnHere there’s little variance between the total CPU usage being reported by Microsoft’s Process Explorer (14.56%) and Norton’s resource monitor (18%).

Norton AntiVirus 2009 With Antispyware

Resource Usage

Resource Usage

Interesting to note is Norton’s actual CPU usage. Both Norton’s resource monitor and Microsoft’s Process Explorer reveal Norton AntiVirus 2009 With Antispyware is using 2% or less of the system’s resources.nnFew other antivirus programs come close. Worse, I’ve seen many competing products completely miss active infections or, as was recently the case with one major provider, mark valid critical Windows system files as infected and encourage their removal!nnBased on its long history, improved performance and interface, and proven detection rates, Norton AntiVirus 2009 With Antispyware is the right tool for preventing Windows infections. But don’t take just my word for it. CNET, in its recent review, ranked the product Excellent and notes it “superior” protection technologies, too.

  • Security
  • Account Information

    Share with Your Friends

    Norton AntiVirus 2009 With Antispyware

    Your email has been sent

Share: Norton AntiVirus 2009 With Antispyware
Image of Erik Eckel
By Erik Eckel
Erik Eckel is a managing partner at Louisville Geek and president of Eckel Media Corp. He previously served as Executive Editor at CNET Networks' TechRepublic. He earned his Bachelor's Degree in English from the University of Louisville and received
  • Account Information

    Contact Erik Eckel

    Your message has been sent

  • |
  • See all of Erik's content

TechRepublic Premium

  • TechRepublic Premium

    Checklist: Network and systems security

    Cybersecurity demands and the stakes of failing to properly secure systems and networks are high. While every organization’s specific security needs form a unique and complex blend of interconnected requirements, numerous security fundamentals almost always apply to each of these groups. It stands to reason that cybersecurity pros who effectively identify network and systems risks ...

    Published:  June 1, 2023, 4:00 PM EDT Modified:  June 2, 2023, 7:48 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to host multiple websites on Linux with Apache

    In this guide from TechRepublic Premium we’re going to explore the various things you can do with a Linux server. We won’t leave out any steps, so you won’t have to refer to another tutorial to complete the process. The only step we will leave out is the installation of Linux, as we’ll assume you ...

    Downloads
    Published:  May 31, 2023, 4:00 PM EDT Modified:  June 1, 2023, 7:45 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to deploy an application with Kubernetes

    If you want to deploy applications into a Kubernetes cluster, be warned — it’s not the easiest task. There are a lot of moving pieces that go into these scalable containers. Don’t you wish you had a complete roadmap, from start to finish, to walk you through the process of deploying the Kubernetes cluster, deploying ...

    Downloads
    Published:  May 31, 2023, 4:00 PM EDT Modified:  June 1, 2023, 7:51 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Cross-training tool kit

    The more flexibility you can create in your technology workforce, the better you’ll be equipped to manage tomorrow, whatever the future brings. Too often, we focus on helping our teams become technical specialists who know volumes about a single technology, but quickly lose sight of how that technology connects with others. This makes their skills ...

    Downloads
    Published:  May 30, 2023, 4:00 PM EDT Modified:  May 31, 2023, 4:50 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice