AV Malware umbrella term for the Norton protection line from Symantec with real-time protection through signatures, heuristics and behavioral analysis against malware
Ramsomewar layers of protection against typical ransomware patterns such as suspicious encryption and manipulation activities
Phishing web protection against fraudulent websites and scam links through blocking and alerts
AV Malware Real-time protection against viruses, spyware and other malware with continuous monitoring of files, apps and processes
Ramsomewar Defense against ransomware by detecting suspicious behavior patterns and blocking typical attack vectors
Phishing Protection against phishing attacks and dangerous websites while browsing
AV Malware Firewall protection to control network traffic and block unwanted connections
Phishing protection against online threats that target private or financial data via fraudulent sites and links
AV Malware Multi-layered device protection against malware with real-time scanning and additional layers of protection for downloads and running processes
Ramsomewar Detection and blocking of typical ransomware and tampering patterns within the device protection components
Phishing Anti-Phishing and protection against fraudulent websites through blocking and alerts
AV Malware Smart Firewall to control incoming and outgoing connections and reduce attack surfaces
AV Malware Intrusion Prevention to defend against intrusion attempts and exploitation attacks via the network
Phishing safe web mechanisms for evaluating risky pages and links, including additional protection for financial websites
AV Malware security history and event logs to track blocked threats and protection actions
AV Malware Real-time device protection against malware with multiple layers of protection for files, apps and online threats
Ramsomewar Strong protection against ransomware by detecting suspicious encryption and modification activity
Phishing web protection against phishing, scam sites and dangerous links including fraud warnings
AV Malware Smart Firewall plus intrusion prevention to block attacks before they reach the device
Phishing Secure VPN for more private surfing and protection of sensitive data in public networks
AV Malware Cloud Backup as additional protection of important data against loss due to malware or system problems depending on the plan and platform
Phishing Dark Web Monitoring to detect leaked personal data depending on region and plan
Phishing Password Manager to create, save and synchronize strong passwords
Phishing Parental Controls to control content and usage times depending on plan
AV Malware Real-time protection against viruses, spyware and other malware with continuous monitoring of files, apps and processes
Ramsomewar Defense against ransomware by detecting suspicious behavior patterns and blocking typical attack vectors
Phishing Protection against phishing attacks and dangerous websites while browsing
AV Malware Firewall protection to control network traffic and block unwanted connections
Phishing protection against online threats that target private or financial data via fraudulent sites and links
AV Malware brand umbrella for Norton Consumer Security, which focuses on blocking malware in real time using signatures, behavior monitoring and reputation checks.
Ransomware Protection against ransomware is usually provided by the central malware engine, which detects suspicious encryption and destructive file behavior.
Phishing Online threat protection focuses on blocking fraudulent websites and risky links to prevent credential theft and drive-by infections.
AV Malware Real-time protection for a single device against viruses, spyware, malware and other online threats with continuous file and process monitoring.
Ransomware Real-time protection against ransomware aims to stop encryption attacks before they lock files by detecting suspicious behavior and known threat patterns.
Phishing Fraud and Phishing Protection helps detect and block fraudulent sites and misleading links while browsing.
AV Malware Smart Firewall helps monitor incoming and outgoing connections and blocks suspicious traffic patterns.
AV Malware Multi-layered device security to protect against malware through real-time scanning, reputation signals and behavior-based detection.
Ransomware Ransomware is typically blocked within the main layers of protection by detecting encryption behavior and malicious persistence tactics.
Phishing Anti-phishing protection blocks known and suspicious sites where credentials are collected and warns of risky websites.
AV Malware Smart Firewall and Intrusion Prevention reduce vulnerability to network-based attacks by filtering and blocking hostile connection attempts.
AV Malware Suite, a multi-layered protection for devices that combines real-time malware defense with additional security features that go beyond simple antivirus protection.
Ransomware Strong protection against ransomware is integrated into the real-time protection and is usually supplemented by backup-oriented recovery options - depending on the tariff and platform.
Phishing Fraud and phishing protection helps block fraudulent websites and suspicious links, and can be extended to more comprehensive fraud detection capabilities depending on the plan.
AV Malware Smart Firewall and Intrusion Prevention blocks hacking attempts and network intrusion activities before they reach the device.
Phishing Secure VPN can protect sensitive traffic on public networks and reduce the risk of hostile Wi-Fi environments.
AV Malware Cloud backup can help reduce the impact of ransomware by enabling recovery of important files according to plan and platform.
Phishing Password Manager helps reduce the risk of account takeover by creating and storing strong passwords and supporting more secure logins.
Dark web phishing monitoring can alert when monitored personal data appears in known leak sources, depending on region and plan.
AV Malware Real-time protection for a single device against viruses, spyware, malware and other online threats with continuous file and process monitoring.
Ransomware Real-time protection against ransomware aims to stop encryption attacks before they lock files by detecting suspicious behavior and known threat patterns.
Phishing Fraud and Phishing Protection helps detect and block fraudulent sites and misleading links while browsing.
AV Malware Smart Firewall helps monitor inbound and outbound connections and blocks suspicious traffic patterns.
Norton Internet Security focuses on basic device protection, while Norton 360 offers more data protection and recovery tools such as VPN and backup, depending on the plan.
Norton Internet Security primarily offers device security and Internet protection.
Norton 360 also offers Secure VPN and cloud backup, depending on the plan and platform.
Norton 360 includes additional tools for identity and account security, depending on the region and plan.
It can put a strain on your computer, but modern versions are usually designed to run quietly in the background and you can reduce the impact by customizing scans and exceptions.
Real-time scans can be heavier for installations and large file operations.
Scheduling full scans outside of working hours will reduce the disruption.
Exclusions for trusted large folders can be helpful if used carefully.
Norton collects some diagnostic and security telemetry data to improve protection. You can review and restrict certain data sharing options in the settings.
Security applications often log threat events and performance diagnostics.
Privacy controls and marketing settings can usually be customized in the account and app settings.
Using built-in features such as VPN or monitoring tools may involve additional data processing.
Normally yes, but you should not run two real-time protection programs at the same time to avoid conflicts and performance issues.
Use only one product for real-time scanning.
Use the second tool as an on-demand scanner if needed.
If conflicts occur, add mutual exceptions or disable overlapping shields.
Norton typically quarantines or blocks threats automatically and lets you review the actions so you can safely recover from misidentified threats if needed.
Quarantine isolates files so that they cannot be executed.
You can review the history and decide whether to remove or restore items.
Restore should only be done if you are sure it is a false positive.
Reputation and phishing systems can be conservative, so you may receive warnings if a website has been newly modified, is characterized by reputation signals or uses risky transmission patterns.
Reputation can change if a website is compromised or offers suspicious scripts.
Browser extensions can set up additional blocks based on link reputation.
If you trust the source, check the URL carefully and avoid blindly ignoring repeated warnings.
Norton's firewall features can provide stronger outbound control and intrusion blocking than a basic installation. However, it should be configured so that legitimate network applications are not interrupted.
Outbound connection control can help intercept suspicious processes that phone home.
Intrusion prevention can block hostile inbound traffic patterns.
If applications stop working, you should adjust the rules instead of disabling protection completely.
Backups can be a handy safety net as they help you restore files if ransomware slips through, especially if the backups are isolated and up-to-date.
Backups help with recovery, even if files are encrypted locally.
Create backups for important folders and check whether the recovery works.
Keep at least one backup copy separate from daily access to reduce the risk of tampering.
Many "Norton Support" messages are scams. Therefore, treat unsolicited contacts as suspicious and only verify them through your official account channels.
Scammers often use urgent language about charges or infections.
Do not grant remote access based on unsolicited requests.
Check your account directly for subscription or billing messages instead of trusting the contact.
By continuing to browse our site you agree to our use of cookies, revised Privacy Policy and Terms of Service.
More information about cookies