Security Suite FAQs

FAQ stands for Frequently Asked Questions. Optus Internet has a vast collection of customer questions, which have been submitted to us over the years. From that list, we have selected those inquiries that appear most often. These questions, and their answers, have been broken into convenient sections for your easy reference.

    Before installation

    Installation

    Viruses

    Spyware

    Firewall

    E-mail filtering

    Browsing protection

    Parental Control

    Automatic updates

    Before installation

    Does Security Suite work with other antivirus or firewall products installed on my computer?

    No. You cannot have two antivirus or firewall products installed on your computer. Optus Security Suite automatically detects and removes most common antivirus and firewall products during the installation. You can also manually remove any other antivirus or firewall products before installing the product.

    Are two antivirus programs better than one?

    No. It is best to have one good antivirus program. An antivirus program needs to open a file to scan for malware. If another antivirus program is trying to open the same file at the same time, it has to wait for the file to become free. This may cause problems.

    Is Security Suite compatible with Windows XP SP2 or SP3 Security Center and the internal firewall of the operating system?

    Yes, it is compatible. However, you cannot use two software firewalls on the same computer simultaneously. When you install the product, the internal firewall of Windows XP is automatically turned off.

    Which operating systems does Security Suite support?

    Security Suite supports the following operating systems:

    • Windows XP
    • Windows Vista (32-bit and 64-bit)
    • Windows 7 (32-bit and 64-bit)
    However, the product does not support the server versions of the operating systems mentioned above, or Windows XP 64-bit.

    How do I know if my computer has a 32-bit or a 64-bit version of Windows XP?

    Open My Computer to check system properties:

    1. 1. Click Start > My Computer.
    2. Right-click with your mouse and select Properties. The System Properties window opens.
    3. Click the General tab and check the first line under Computer:
      • In 64-bit XP, Itanium or Itanium 2 is shown.
      • In 32-bit XP, some other value is shown.

    How can I check if my computer meets the system requirements?

    Check your system properties in Microsoft Windows:

    1. Click Start.
    2. Select Control Panel.
    3. In Windows XP and Vista:
      1. Select the Performance and Maintenance category. Note: This step may not be necessary in all computers.
      2. Double-click System. The System Properties window opens.
      3. Click the General tab.
    4. In Windows 7, select System and Security > Security.
    You can view the properties of your computer, such as operating system version, processor information and the amount of memory (RAM).

    How do I remove conflicting security programs manually?

    During the installation, the program tries to remove conflicting security programs, such as other antivirus or firewall programs, automatically. If they cannot be removed, you will be asked to remove the programs manually through the Windows Control Panel.

    1. To remove a program:
      1. In Windows XP, click Start.
      2. Click Control Panel.
      3. Double-click Add or Remove Programs.
      4. Select the program and click Remove.
      5. In Windows Vista, click the Start button.
      6. Click Control Panel.
      7. Click Programs.
      8. Click Programs and Features.
      9. Select the program and click Uninstall.
      10. In Windows 7, click the Start button.
      11. Select Control Panel.
      12. Select Programs and Features.
      13. Select the program and click Uninstall.
    2. Antivirus programs may have several related components, which have the same product name. Repeat the steps above to remove all of them.
    3. Restart your computer.

    Installation

    Why is the first Security Suite installation package so large?

    The first package downloads a lot of files from the Internet, for example all the virus definitions. The next updates are significantly smaller.

    How do I install Security Suite?

    To install the Security Suite, you need the following:

    • The downloaded version of the product.
    • A valid product subscription key.
    • An Internet connection.
    Note: If you have more than one user account, you have to log in as an administrator before the installation.

    When you start the installation, you can select how you want to install the product on your computer. You can use either automatic installation or step-by-step installation. If you select the automatic installation, the product is installed automatically. If you select the step-by-step installation, you are asked to make selections during the installation.

    This product cannot be installed on a computer that uses other antivirus or firewall products. Many common antivirus products will be removed automatically during the installation.
    1. To install the downloaded product step by step:
      1. When you purchase the product online, you will receive download and installation instructions, and your unique product subscription key.
      2. Follow the instructions and download the software package to your computer.
      3. Double-click the package icon to run the installation wizard and follow the instructions on your screen.
      4. When asked, enter you subscription key (xxxx-xxxx-xxxx-xxxx-xxxx).

    The product is downloading updates after installation. That did not happen in the previous product version. Why has this changed?

    The product has always updated the virus definition databases after installation to protect your computer against the latest threats. The only difference is that now you can see how the downloading proceeds.

    I installed or upgraded Security Suite but cannot see the product icon on the system tray. What should I do?

    You can try the following:

    1. Check that the icons are not hidden in your operating system:
      1. In Windows XP or Vista: click the Show hidden icons icon to show the system tray icons.
      2. In Windows 7: click the caret to show the system tray icons.
    2. Open Task Manager. Check that the fsm32 process is visible.
    3. If the process is visible, use the Support Tool for generating an fsdiag file. Send the file to our technical support.
    4. If the process is not visible, try to install the product again.

    After installing Security Suite, I have no access to the Internet or my e-mail. What can I do?

    You may have denied your web browser's network connections. To open the product, double-click the product icon at the bottom right corner of your screen.

    To check that the network connections are allowed for your browser:

    1. On the main page, click Settings.
    2. Select Network connections > Application control.
    3. Click the Applications tab. You can view a list of denied or allowed applications.
    4. Locate the browser that you are using. For example, if you use Internet Explorer, locate iexplore.exe.
    5. Check that the connections are allowed for your browser.

    How do I uninstall Security Suite?

    1. To uninstall the product, do the following:
      1. In Windows XP, click Start.
      2. Click Control Panel.
      3. Double-click Add or Remove Programs.
      4. Select the Security Suite and click Remove.
      5. In Windows Vista, click the Start button.
      6. Click Control Panel.
      7. Click Programs.
      8. Click Programs and Features.
      9. Select the Security Suite and click Uninstall.
      10. In Windows 7, click the Start button.
      11. Select Control Panel.
      12. Select Programs and Features.
      13. Select the Security Suite and click Uninstall.
    2. When you are asked to restart your computer, restart it.

    How do I unsubscribe from Security Suite?

    You will also need to unsubscribe from the service from member services to cancel your subscription. You can access the unsubscribe facility from https://memberservices.optuszoo.com.au/securitysuite/.

    Can I install the product on several computers?

    You receive a subscription key with your product. You can install the product with the same subscription key on 3 computers.

    Viruses

    The second full scan of the computer was quite fast. Did the product really scan my whole computer?

    The product detects which files were scanned and checks if they have changed since the last scan. If they have not changed, they are not scanned again. The same applies to archives. This may mean that a different number of files are scanned each time you scan your computer, and therefore, the scanning time may vary.

    Should I manually scan my hard disks daily?

    No, this is not necessary. Virus and spyware scanning includes real-time scanning, which means that your computer is scanned for viruses in real time. You can scan manually for viruses by using scheduled scanning. To open the product, double-click the product icon at the bottom right corner of your screen. To start a scheduled scan:

    1. On the main page, click Settings.
    2. Select Computer > Scheduled scanning.
    3. Select Turn on scheduled scanning.
    4. Select which days you would like to regularly scan for viruses and spyware.
      Option Description
      Daily To scan every day.
      Weekly To scan on selected days during the week. Select on which days to scan from the list to the right.
      Monthly To scan on up to three days a month. To select which days:
      1. Select one of the Day options.
      2. Select the day of the month from the list next to the selected day.
      3. Repeat if you want to scan on another day.
    5. Select when you want to start the scan on the selected days.
      Option Description
      Start time The time when the scan will start. You should select a time when you expect to not be using the computer.
      After computer is not used for Select a period of idle time after which the scanning starts if the computer is not used.

    Security Suite shows that the virus definitions are out of date. What can I do?

    Usually, you do not have to do anything. Security Suite will update itself automatically when your computer is connected to the Internet.

    If the virus definitions are not automatically updated, you can do the following:

    1. Check that your computer is connected to the Internet.
    2. Check whether the time and date of the computer are correct. If they are wrong, updates may not be installed.
    3. Check for updates manually. To do this, open the user interface of the product:
      1. In Windows XP and Vista, double-click the product icon in the bottom right hand corner of your screen.
      2. In Windows 7, click the caret and then click the product icon.
      3. On the main page, click Check for updates.
    4. Check that automatic updates are on:
      1. On the main page, click Settings.
      2. Select Other settings > Automatic updates.
    5. Make sure that your subscription is valid.
    6. If you still do not receive updates, run the Support tool. Send the file it creates to our technical support with an explanation of the problem.

    How can I exclude a file or folder from virus and spyware scanning?

    To open the product, double-click the product icon at the bottom right corner of your screen. To exclude a file or folder from virus and spyware scanning:

    1. On the main page, click Settings.
    2. Do one of the following:
      • Select Computer > Virus and spyware scanning.
      • Select Computer > Manual scanning.
    3. Click Open excluded items list.
    4. To exclude a file, drive, or folder:
      • Select the Objects tab.
      • Select Exclude objects (files, folders, ...).
      • Click Add.
      • Select the file, drive, or folder that you want to exclude from virus scanning.
        Note: Some drives may be removable drives, such as CD, DVD or network drives. Network drives and empty removable drives cannot be excluded.
      • Click OK.
    5. Repeat the previous step to exclude other files, drives, or folders from being scanned for viruses.
    6. Click OK to close the Exclude from scanning dialog box.
    7. Click OK to apply the new settings.

    How can I clean an infected System Volume Information folder or a System Restore folder?

    System Restore is a feature of Windows Vista, Windows XP, Windows 7. If a virus infects the computer, it is possible that the virus is backed up in the System Restore folder. To scan and clean the System Restore folder, you need to turn it off.

    By turning off System Restore, you lose your last system restore point. Unfortunately there is no other way to remove infections from System Restore. If you want to continue using the System Restore feature, it is important to turn it on after removing the infected files.

    1. To turn off System Restore in Windows XP:
      1. Close all open programs.
      2. Right-click My Computer, and select Properties. The System Properties dialog box opens.
      3. Click the System Restore tab.
      4. Select the Turn off System Restore on all drives check box.
      5. Click Apply.
      6. When the system asks if you want to turn off System Restore, click Yes.
      7. Click OK.
      8. Scan all hard drives and all files for viruses.
    2. Once you have scanned and cleaned the files, turn on System Restore in XP as follows:
      1. Right-click My Computer, and select Properties. The System Properties dialog box opens.
      2. Click the System Restore tab.
      3. Clear the Turn off System Restore on all drives check box.
      4. Click Apply, and then click OK.
    3. To turn off System Restore in Windows Vista:
      1. Close all open programs.
      2. Click Start.
      3. Select All Programs > Maintenance.
      4. Select Maintenance > Backup and Restore Center.
      5. Click Create a restore point or change settings. If asked, click Continue.
      6. Under Available disks, clear the checkboxes for all drives.
      7. Click Apply.
      8. When the system asks if you want to turn off System Restore, click Turn System Restore Off.
      9. Click OK.
      10. Restart your computer.
      11. Scan all hard drives and all files for viruses.
    4. Once you have scanned and cleaned the files, turn on System Restore in Vista as follows:
      1. Close all open programs.
      2. Click Start.
      3. Select All Programs > Maintenance.
      4. Select Maintenace > Backup and Restore Center.
      5. Click Create a restore point or change settings. If asked, click Continue.
      6. Under Available Disks, select all drives.
      7. Click Apply.
      8. When the system asks if you want to turn off System Restore, click Turn System Restore Off.
      9. Click OK.
    5. To turn off System Restore in Windows 7:
      1. Close all open programs.
      2. Right-click Computer, and select Properties. The View basic information about your computer dialog box opens.
      3. Click System protection.
      4. Click the System protection tab.
      5. Click Configure.
      6. Select Turn off System protection.
      7. Click Apply.
      8. When the system asks if you want to turn off System Protection, click Yes.
      9. Click OK.
      10. Scan all hard drives and all files for viruses.
    6. Once you have scanned and cleaned the files, turn on System Restore in Windows 7 as follows:
      1. Right-click My Computer, and select Properties. The View basic information about your computer dialog box opens.
      2. Click System protection.
      3. Click the System protection tab.
      4. Click Configure.
      5. Select Restore system settings and previous versions of files.
      6. Click Apply.
      7. Click OK.

    How does the advanced process monitoring in DeepGuard protect my computer?

    Advanced process monitoring checks if processes are changed while they are running. Infected files may try to do that and infect the whole computer through bugs in software. Advanced process monitoring protects also the web browser against infections, which makes it an important part of browsing protection.

    Advanced process monitoring may, however, cause issues with certain games which use anti-cheat mechanisms. The problem occurs because both DeepGuard and the game try to make sure that a process is not changed. DeepGuard checks for infections, and the game checks that no scores or similar are changed. Turning off advanced process monitoring resolves the issue.

    Spyware

    What is spyware?

    Spyware are programs that collect your personal information.

    Spyware may collect personal information including:

    • Internet sites you have browsed,
    • e-mail addresses from your computer,
    • passwords, or
    • credit card numbers.
    Spyware almost always installs itself without your explicit permission. Spyware may get installed together with a useful program or by tricking you into clicking an option in a misleading pop-up window.

    An application stopped working after I removed spyware from my computer. What can I do?

    Applications that install spyware may stop working if you remove the spyware from the application. You have two options:

    1. Stop using the application and uninstall it.
    2. If you still want to use the application, do the following:
      1. Instead of removing the spyware, move it to the quarantine.
      2. When you want to use the application, restore the spyware from the quarantine.
        Note: Restored spyware starts to work again and can spy your computer and show advertising pop-ups.
      3. You may also want to deny the spyware from connecting to the Internet by using application control.

    Every time I scan my computer, I find a lot of spyware. Why?

    Most likely, the majority of found spyware items are so-called tracking cookies. Cookies are items in the web browser that web sites use to save some information on the user’s computer. Such cookies can compromise your privacy.

    Firewall

    What is a firewall?

    A firewall protects your computer by allowing safe Internet traffic and blocking unsafe traffic.

    Typically, the firewall allows all traffic from your computer to the Internet, but blocks all traffic from the Internet to your computer unless you specifically allow it. By blocking the inbound traffic, the firewall protects your computer against malicious software, such as worms, and prevents intruders from accessing your computer. Depending on your alerting settings, firewall alert pop-ups may be shown about the actions of the firewall.

    Can I use the Windows XP firewall with Security Suite?

    No. You cannot use the Windows XP firewall with the product. Security Suite already has a firewall. If you use two software firewalls simultaneously, your computer may freeze. However, you can use a hardware firewall (router) with the product.

    What is the difference between firewall profiles and firewall rules?

    Security Suite includes several firewall profiles that allow you to set more flexible or severe security policies. Firewall profiles allow you to instantly change your level of protection according to your needs. Firewall profiles are automatically updated to make sure that you are protected against the newest forms of malicious computer programs and Internet attacks.

    Every firewall profile is composed of a set of pre-configured firewall rules. Expert users may create their own firewall rules to modify the firewall profile.

    How do I change the firewall profile?

    To open the product, double-click the product icon at the bottom right corner of your screen. To change the firewall profile:

    1. On the main page, click Status.
    2. Next to Firewall, click the link, which shows the current firewall profile. The Change firewall profile dialog box opens.
    3. Read the firewall profile descriptions carefully.
    4. Select the appropriate profile from the list and click OK.
    The Status page now shows the new firewall profile. The firewall rules and application control settings change according to the selected firewall profile.

    How can I open a port through the firewall?

    You can open a port through the firewall if you want to allow some Internet traffic and you know the port number that you want to open.

    You may not be able to add your own rules to all firewall profiles. Select the firewall profile to which you want to add the new rule before you open the port.

    When you open a port through the firewall, you create a new firewall rule and two new services.

    1. On the main page, click Tasks.
    2. Click Open firewall port.
    3. In the Name field, enter a name for the new firewall rule.
    4. In the Port number field, define the responder port for the rule. The responder port is usually mentioned in the product documentation.
    5. Click OK.
    The new rule is added to the firewall rules list and two new services are created on the firewall services list for both the TCP and UDP protocols with the specified port number.

    Why is my FTP software not working after I installed Security Suite?

    You have to add a new, outbound firewall rule to your firewall profile. To add a new rule for the FTP software:

    1. To open the product, double-click the product icon at the bottom right corner of your screen.
    2. On the main page, click Settings.
    3. Select Network connections > Firewall.
    4. Click the Rules tab.
    5. Click Add. The Add new rule dialog box opens.
    6. Follow the instructions in the dialog boxes.
    7. In step 3, select the predefined FTP / File Transfer Protocol, active mode,. as the service.
    8. Follow the instructions in the dialog boxes.
    9. In the final step, click Finish.

    How do I allow all network traffic temporarily?

    Note: Your computer is not protected when you allow all network traffic.

    To allow all network traffic:

    1. Right-click the product icon in the bottom right hand corner of your screen.
    2. Select Unload from the menu.
    3. To allow all Internet traffic, select Unload and allow all network traffic.
    4. Confirm the unload when requested.
    To restore your security again, right-click the product icon and select Reload.

    E-mail filtering

    How can I make sure that messages from a specific e-mail address are not considered spam?

    To open Security Suite, double-click the product icon at the bottom right corner of your screen. To allow messages from specific e-mail addresses, follow the instructions below. You can also do this through the Spam Control menu button (in Microsoft Outlook, Outlook Express or Windows Mail), or by right-clicking the system tray icon.

    You can add, edit or remove individual e-mail addresses or whole domains to your allowed senders list. For example, if you add *@example.com to your allowed senders list, all e-mail messages from the example.com domain are allowed.

    To edit your list of trusted e-mail addresses:

    1. On the main page, click Settings.
    2. Select Internet > E-mail filtering.
    3. Click Allow senders. The Allow senders settings page opens.
    4. Choose one of the following actions:
      • To add a new e-mail address:
      • Click Add. The Add sender/domain dialog box opens.
      • In the Address field, enter the e-mail address or domain name from which you want to allow e-mail messages. You can add a short description for the new address in the Description field.
      • Click OK. The new e-mail address is now shown on your allowed senders list.
      • To edit an e-mail address:
      • In the list, select the e-mail address you want to edit, and click Edit. The Edit sender/domain dialog box opens.
      • Edit the selected e-mail address, and click OK.
      • To remove an e-mail address from the allowed senders list:
      • In the list, select the e-mail address you want to remove, and click Remove. The e-mail address is removed from the list.

    How do I block spam from a specific e-mail address?

    To open Security Suite, double-click the product icon at the bottom right corner of your screen.

    You can add, edit or remove individual e-mail addresses or whole domains to your blocked senders list. For example, if you add *@example.com to your blocked senders list, all e-mail messages from the example.com domain are blocked.

    To edit your list of blocked e-mail addresses:

    1. On the main page, click Settings.
    2. Select Internet > E-mail filtering.
    3. Click Block senders.
    4. Choose one of the following actions:
      • To add a new e-mail address:
      • Click Add. The Add sender/domain dialog box opens.
      • In the Address field, enter the e-mail address or domain name from which you want to block e-mail messages. You can add a short description for the new address in the Description field.
      • Click OK. The new e-mail address is now shown on your blocked senders list.
      • To edit an e-mail address:
      • In the list, select the e-mail address you want to edit, and click Edit. The Edit sender/domain dialog box opens.
      • Edit the selected e-mail address, and click OK.
      • To remove an e-mail address from the blocked senders list:
      • In the list, select the e-mail address you want to remove, and click Remove. The e-mail address is removed from the list.

    How do I edit the list of trusted e-mail addresses?

    To open Security Suite, double-click the product icon at the bottom right corner of your screen. To edit the list, see instructions in How can I make sure that messages from a specific e-mail address are not considered spam?.

    Browsing protection

    How does browsing protection work?

    Browsing protection protects your computer on several levels:

    • Safety ratings for websites:

      You can see safety ratings for websites listed on search engine results and in web mail content. The safety ratings help you avoid websites that contain security threats, such as malware (viruses, worms, trojans). They protect you against the latest Internet threats that are not yet recognized by traditional antivirus programs. The safety rating for a site can be one of the following: safe, suspicious, harmful or unknown.
    • Exploit shields:

      Exploit shields protect your computer against vulnerabilities that have been found in programs installed on your computer. Exploit shields identify and prevent malicious websites from using such vulnerabilities to, for example, force an unauthorized download that contains malware.
    • Process monitoring (in DeepGuard):

      DeepGuard monitors and blocks attempts to load malware into your web browser. If the browser becomes infected, the functionality of a trusted web site can change. For example, it may start asking for your password.

    I do not want to see safety ratings for web sites anymore. How can I turn them off?

    You can turn safety ratings off by disabling the browsing protection toolbar in your web browser. To do this:

    1. In Mozilla Firefox:
      1. Select Tools > Add-ons.
      2. Next to Browsing Protection Toolbar, click Disable.
    2. In Microsoft Internet Explorer:
      1. Select Tools > Internet Options.
      2. Click the Programs tab.
      3. Click the Manage Add-ons button.
      4. Select Browsing Protection Class.
      5. Select Disable and click OK.
      6. Select Browsing Protection Toolbar.
      7. Select Disable and click OK.

    Parental Control

    How do browsing modes in Parental Control work?

    With the Parental Control browsing modes, you can define browsing times and websites that are suitable for your teenagers and small children.

    You can give your teenagers more freedom to browse the Internet while having tighter restrictions on your small children's online activities. You can create and set up the Parent, Teenager, and Small Child browsing modes either with Start-up Wizard during the installation, or later on the Parental Control page.

    Small Child browsing mode

    The Small Child browsing mode is active after you have installed the product or restarted the computer. When the Small Child mode is active:

    • Anyone using the computer can access only those websites that you have specifically allowed.
    • Access to the Internet is allowed only during the scheduled time.
    All the web sites that you have allowed are listed on Parental Control Start Page that opens in the browser when the Small Child mode is active.

    Teenager browsing mode

    When the Teenager browsing mode is active:
    • Anyone using the computer can access all web sites, except those that contain restricted or unwanted content, for example on drugs or adult material.
    • Access to the Internet is allowed only during the scheduled time.
    If you have created both Small Child and Teenager browsing modes on your computer, tell your teenagers the password you created for the Teenager mode. When they enter the password, they can browse web pages that:
    • Do not contain restricted material, and
    • You have specifically allowed.
    Note: If you turn Web Page Filter off, your teenagers can visit web pages and sites despite their content.

    Parent browsing mode

    When the Parent browsing mode is active, anyone using the computer can access the Internet without any time or content restrictions. You are asked to create the Parent password when you are creating the browsing modes. You need the Parent password to:
    • Open the product user interface,
    • View or change the product settings,
    • Connect to the Internet with a new application, or
    • Uninstall the product.

    Why do I need the Parental Control password?

    If Parental Control is turned on, you need the Parental Control password to change Security Suite settings. The password prevents other computer users from making changes to the settings. Even the user interface cannot be opened without the password.

    How do I allow web pages for small children?

    To allow web pages for your small children, follow the instructions below. To open the product, double-click the product icon at the bottom right corner of your screen.

    Tip: If you use Internet Explorer, you can allow (or block) new sites by using the Security Suite Webfilter button in the browser’s toolbar.

    1. On the main page, click Settings.
    2. Select Internet > Parental Control.
    3. Select the Small child tab.
    4. Select Allow only selected sites. If this option is not selected, small children can browse all web sites and pages.
    5. Click View web sites.
    6. Select the Allowed tab.
    7. Click Add.
    8. In the Allow Web Site dialog box, type the address of the web page to which you want to allow access.
      • To allow access to the entire www.example.com web site, type www.example.com
      • To allow access to a part of the www.example.com web site, type www.example.com/subsite
    9. Click OK.
    You can block or allow web pages for your teenagers in a similar way.

    How can I turn off Parental Control temporarily?

    Note: You need the Parental Control password for changing all Parental Control settings.

    To turn off Parental Control temporarily:

    1. On the main page, click Settings.
    2. Select Internet > Parental Control.
    3. Clear the Turn on Parental Control check box.

    I have forgotten my Parental Control password. How can I access the settings?

    If you have forgotten your password, you can access the settings, and reset the password by using your product subscription key.

    To reset the password:

    1. Open the product interface. A dialog box opens asking you to enter the Parent password. Note: To see a hint for your password, move the cursor to the Show password hint. This hint will hopefully remind you what your password is.
    2. Click Forgot your password?
    3. Enter the first four digits of your subscription key, and click Next. You received the subscription key when you purchased the product.
    4. Do the following:
      1. Enter a new password.

        Note: When creating passwords, keep in mind the following:
        • Select a password that is easy to remember but hard to guess.
        • A password can contain any characters.
        • A password must have between 3 and 80 characters.
        • Depending on how your product is set up, your password may need to be longer than a certain number of characters.
      2. Re-enter the new password to confirm it.
      3. Click Next.
      4. Enter your password hint. Your password hint, should remind you what your password is. It should be something that tells you what your password is but does not let anyone else guess the password. Keep in mind that you children can also see this hint.
      5. Click OK.
      A message is shown telling you that you have successfully reset the password.
    5. Click OK.

    The Parental Control time lock is blocking the connection to the Internet. What can I do?

    When the time lock blocks the connection to the Internet, the web browser shows a block page which says that the time lock is active and the Internet cannot be accessed. To extend the browsing time:

    1. On the Time Lock Block Page that opens in your browser, click Extend Internet browsing time.
    2. In the dialog box, enter your Parent password, and click OK.
    3. In the Time Lock dialog box, schedule a time, and click OK.
    Tip: In Internet Explorer, you can also extend browsing time by using the Parental Control menu button.

    I created a Small Child browsing mode and now Parental Control prevents me from accessing the Internet. What can I do?

    When the Small Child browsing mode is used, Parental Control blocks all web sites that you have not specifically allowed. When you try to open the Internet, the Parental Control Start Page opens. To access the Internet, switch to the Parent browsing mode by clicking Parent. You can also allow web sites for the Small Child mode by clicking Allow new web sites for small children.

    Automatic updates

    How do I know that I have the latest updates?

    When automatic updates are turned on, the product updates itself automatically when your computer is connected to the Internet. You can also check that you have the latest updates. To open Security Suite, double-click the product icon at the bottom right corner of your screen. To check for updates:

    1. On the main page, click Settings.
    2. Select Other Settings > Automatic updates.
    3. Last update check displays the time of the latest update check.
    4. Click Check now. The product connects to the Internet and checks for the latest updates. If the protection is not up-to-date, it retrieves the latest updates.
      Note: If you are using a modem, or have an ISDN connection to the Internet, the connection must be active to check for updates.

    How can I check that my computer is protected and that automatic updates are working?

    To open the main user interface, double-click the product icon at the bottom right corner of your screen.

    To open the Status page:

    On the main page, click Status.

    The Status page opens.

    The icons show you the status of the program and its security features.

    Status icon Status name Description
    icon OK Your computer is protected. The feature is turned on, and working properly.
    icon Information The product informs you about a special status of a feature.

    This icon is shown, for example, when a feature is being updated.
    icon Warning Your computer is not fully protected.

    For example, the virus definitions may be old, the status of a feature requires attention, or the firewall is set to block all Internet traffic.
    icon Error Your computer is not protected.

    For example, your subscription has expired, the firewall has been set to allow all traffic, a critical feature is turned off, or the product is in error state.
    icon Off A non-critical feature is turned off.