Promotional banner image

Upgrade for Free

Cybercrime is evolving. So is your protection. *Offer for existing members for the remainder of your subscription. Terms apply.

Applicable for: Windows

Exclude or include attack signatures in monitoring

In some cases, benign network activity may appear similar to an attack signature. You may receive repeated notifications about possible attacks. If you know that the attacks that trigger these notifications are safe, you can create exclusion for the attack signature that matches the benign activity.

Each exclusion that you create leaves your computer vulnerable to attacks.

If you have excluded the attack signatures that you want to monitor again, you can include them in the list of active signatures.

Exclude attack signatures from being monitored

  1. Open your Norton device security product.

    If you see the My Norton window, next to Device Security, click Open.

  2. In the Norton product main window, click Settings.

  3. In the Settings window, click Firewall or Network.

  4. Click the Intrusion and Browser Protection tab.

  5. Under Intrusion Prevention, in the Intrusion Signatures row, click Configure.

  6. In the Intrusion Signatures window, enter the signature details in the Signature Search field to search for the attack signatures that you want to exclude, and then click Go.

  7. Uncheck the attack signatures, and then click OK.

  8. In the Settings window, click Close.

Include the attack signatures that were previously excluded

  1. Open your Norton device security product.

    If you see the My Norton window, next to Device Security, click Open.

  2. In the Norton product main window, click Settings.

  3. In the Settings window, click Firewall or Network.

  4. Click the Intrusion and Browser Protection tab.

  5. Under Intrusion Prevention, in the Intrusion Signatures row, click Configure.

  6. In the Intrusion Signatures window, enter the signature details in the Signature Search field to search for the attack signatures that you want to include, and then click Go.

  7. Check the attack signatures, and then click OK.

  8. In the Settings window, click Close.

Need more help?

DocID: v1224806
Last modified: 08/08/2024

Was this article helpful?

Need more help?

Download
Manage my account
Buy & renew
Contact us
Community
Support scams
Norton rescue tools
Think you have virus?
Problem launching on Windows