Exclude or include attack signatures

Your Norton product performs scans by comparing the signature of the files against the known attack signatures to identify threats on your Mac. An attack signature is used to identify an attacker's attempt to exploit a known operating system or application vulnerability.

You can choose whether you want to protect your Mac from all the attack signatures or only from the selected signatures. In some cases, benign network activity can appear to be similar to an attack signature. You might receive repeated notifications about possible attacks. If you know that the attacks that trigger these notifications are safe, you can create an exclusion list for the signature that matches the benign activity.

If you want protection against vulnerabilities, but you do not want to receive notifications about blocked attacks, you can stop Vulnerability Protection from displaying notifications. Unless you have a good reason to disable a signature, you should leave the signatures turned on. If you disable a signature, your computer may be vulnerable to attack.

Enable or disable attack signatures

  1. In the Norton product main window, click Advanced.

  2. On the left pane, click Firewall.

  3. In the Vulnerability Protection row, click the settings icon.

  4. In the Vulnerability Protection window, click the Signatures tab.

  5. In the Signatures list, select a signature, and do one of the following:

    • To disable the detection of the attack signature, uncheck Enable this signature

    • To enable the detection of the attack signature, check Enable this signature

  6. Click Done.

Thank you!

Thank you for using Norton Support.

< Back

Was this information helpful?

DOCID: v6773698_nsmac_retail_en_us
Operating System: Mac OS X
Last modified: 01/30/2017