Exclude or include attack signatures in monitoring
In some cases, benign network activity may appear similar to an attack signature. You may receive repeated notifications about possible attacks. If you know that the attacks that trigger these notifications are safe, you can create exclusion for the attack signature that matches the benign activity.
Each exclusion that you create leaves your computer vulnerable to attacks.
If you have excluded the attack signatures that you want to monitor again, you can include them in the list of active signatures.
Exclude attack signatures from being monitored
-
Start Norton.
If you see the My Norton window, next to Device Security, click .
-
In the Norton product main window, click
. -
In the Settings window, click or .
-
Click the
tab. -
Under Intrusion Prevention, in the Intrusion Signatures row, click .
-
In the Intrusion Signatures window, enter the signature details in the Signature Search field to search for the attack signatures that you want to exclude, and then click .
-
Uncheck the attack signatures, and then click
. -
In the Settings window, click .
Include the attack signatures that were previously excluded
-
Start Norton.
If you see the My Norton window, next to Device Security, click .
-
In the Norton product main window, click
. -
In the Settings window, click or .
-
Click the
tab. -
Under Intrusion Prevention, in the Intrusion Signatures row, click .
-
In the Intrusion Signatures window, enter the signature details in the Signature Search field to search for the attack signatures that you want to include, and then click .
-
Check the attack signatures, and then click
. -
In the Settings window, click .
Help us improve this solution.
Thank you for helping to improve this experience.
What would you like to do now?
Browse for solutions, search the Norton Community, or Contact Us.
Operating System: Windows
Last modified: 01/06/2021