We review products independently, but we may earn affiliate commissions from buying links on this page. Terms of use.

Norton Internet Security 2006

A powerful antivirus and tough firewall are just the start of this package's many excellent features.

A powerful antivirus and tough firewall are just the start of this package's many excellent features.

NIS 2006

To avoid conflicts, NIS won't install when another low-level security product is present.

NIS 2006

NIS makes a quick antivirus and system integrity check before installation.

NIS 2006

The user can choose to install Parental Control or not; this choice can be changed later using Add/Remove Programs.

NIS 2006

NIS's activation scheme, like that of Windows XP, locks the product installation to a particular computer.

NIS 2006

NIS offers to replace Windows Firewall and the Windows Security Center.

NIS 2006

During install, the Home Network Wizard detects and configures the local network.

NIS 2006

The Norton Protection Center summarizes the overall health of security protection, both from NIS and from Norton SystemWorks.

NIS 2006

Here the NPC shows partial coverage under Performance, because modules from Norton SystemWorks are not installed.

NIS 2006

If there's a problem, the NPC will display an attention-grabbing red warning message.

NIS 2006

For less urgent trouble, NPC shows a yellow warning.

NIS 2006

Whatever problem NPC is reporting, you can cure it by clicking the Fix Now button.

NIS 2006

If everything's OK, at startup the NPC will simply report that all's well.

NIS 2006

You can click a link to see more details of system status.

NIS 2006

The main screen offers fast access to the firewall configuration, as well as to all of the program's modules.

NIS 2006

The firewall's configuration dialog lets you set the overall security level as well as going into detail on program control, network locations, and advanced firewall rules.

NIS 2006

Under firewall options you can turn on advanced features that block techniques used by malware to evade normal program control.

NIS 2006

Firewall statistics include recent intrusion attempts as well as content blocked by the privacy feature.

NIS 2006

Here the firewall has detected and recognized a port scan attack, which we triggered deliberately as a test.

NIS 2006

The firewall has blocked a leak test program; hovering the mouse pointer over the cut-off program name reveals the full path and filename.

NIS 2006

Sometimes the firewall is too enthusiastic; here it offers to block another module of Norton Internet Security.

NIS 2006

The built-in security inspector scans your system and reports on specific security vulnerabilities.

NIS 2006

By default, it checks your Internet Explorer settings, IM antivirus configuration, HOSTS file, and system passwords.

NIS 2006

The security inspector quickly checks all selected items for any security problems.

NIS 2006

In this instance it found problems with shared folders and with weak passwords.

NIS 2006

For each found problem area, the inspector offers detailed information and, in some cases, an automatic fix.

NIS 2006

Until you've updated your virus definitions and made an initial full scan, the antivirus won't be happy.

NIS 2006

Until you've updated your virus definitions and made an initial full scan, the antivirus won't be happy.

NIS 2006

You can schedule a full, quick, or custom scan to run daily, weekly, monthly, at startup, r when the system is idle.

NIS 2006

On detecting a high risk threat, the antivirus immediately removes it.

NIS 2006

You can submit suspicious files to Symantec for analysis.

NIS 2006

When submitting a suspicious file, you can check off standard symptoms or enter specific information directly.

NIS 2006

You must supply your name and e-mail address when submitting files for analysis.

NIS 2006

An antivirus scan automatically removes high-risk spyware and adware.

NIS 2006

The user gets to choose whether to remove lower-risk items; also listed here are items the antivirus was unable to remove.

NIS 2006

In some cases the antivirus can't remove a particular threat, but will offer a link to manual removal instructions.

NIS 2006

Sometimes manual removal instructions include small utilities built to remove a single specific threat.

NIS 2006

NIS can block programs that attempt to hijack your home page.

NIS 2006

Besides filtering spam from e-mail, the antispam module optionally blocks popups and Web ads.

NIS 2006

Among the many configuration options are automatic blocking of e-mail messages containing specific suspect features like images and scripts.

NIS 2006

When NIS detects a supported e-mail client launching, it offers to integrate antispam support with that client.

NIS 2006

Spam messages get marked with [Norton AntiSpam] in the subject line and shunted into a separate folder.

NIS 2006

You can optionally turn on blocking of popup ads and banner ads.

NIS 2006

When the e-mail scanner finds an actual virus, it halts processing to report the fact by default; you can configure it to fix the problem and continue.

NIS 2006

You can record private information such as passwords or credit card numbers and have NIS prevent them being sent out of your system.

NIS 2006

For each private datum you can specifically block sending by e-mail, IM, or Web forms; you can also define sites as exceptions to the Web forms limitation.

NIS 2006

Advance users can take detailed control of privacy options, specifically which standard browser information elements will or won't be transmitted to sites.

NIS 2006

When multiple user accounts are enabled, you can configure the privacy control level separately for each; private data, however, is global.

NIS 2006

Here privacy control has blocked the sending of a fake social security number to Google.

NIS 2006

You can configure parental control separately for individual users.

NIS 2006

The parental control wizard starts by letting you choose whether to use existing Windows user accounts or to define accounts within NIS.

NIS 2006

You assign each user one of four account types, from Child to Supervisor.

NIS 2006

A supervisor restrict each user from viewing undesirable Web sites in 31 distinct categories.

NIS 2006

If a user attempts access to a blocked site, NIS displays a warning and also logs the event.

NIS 2006

The supervisor can also limit the types of Internet-aware programs available to each user; disallowed types will simply fail to connect.