Mom working from home.

Norton Smart Firewall and Norton Intrusion Prevention System

Don’t let your files and data leave your computer without your permission.


A firewall helps defend against unwanted intrusions to your computer. Protect your Windows PC or Mac from unauthorized access with Norton Smart Firewall and Intrusion Prevention System, part of Norton Device Security plans. Norton Intrusion Prevention System is also available as part of Norton Safe Web browser extension.

Image cloud data.

What is a firewall?

As part of advanced online threat protection, a firewall is like a gatekeeper for your computer. You want to keep your personal information in and keep cybercriminals’ attacks and malware out. The firewall monitors network traffic and enforces rules about access to a computer.

Do firewalls protect against viruses?

A firewall is like a filter or barrier, but something has to inform the firewall of which rules to apply.

Learn more

What do firewalls protect against? 

You connect to the web through networks, and networks can be accessed by others.

Learn more

What is an Intrusion Prevention System? 

An Intrusion Prevention System is technology that looks at network (e.g. Internet) traffic to detect cybersecurity threats like unwanted access.

Learn more

Hacker attacking internet.

Who has access to your computer?

Problem

A cybercriminal may hack into your computer and take your valuable information.

Solution

The Norton Smart Firewall and Norton Intrusion Prevention System complement each other to help block unauthorized access and carefully inspect all traffic that is permitted in.

Close up of hands typing on laptop.

What is cryptojacking?

Problem

A cybercriminal attempts to hijack your browser and tries to run crypto-mining tasks using your computer’s resources. This is known as cryptojacking.

Solution

The Norton Intrusion Prevention System is built to detect cryptojacking attempts, and it helps prevent them from running inside your browsers.

Hacker working at night.

Keep your personal information where it belongs

Problem

Malicious apps or processes already installed on your computer can attempt to steal your private and sensitive data and put it in the wrong hands.

Solution

The Norton Intrusion Prevention System checks for potential leaks of private and personal data by analyzing the content and the reputation of remote hosts used in the communication. When a potential leak is detected, our Intrusion Prevention System helps stops the traffic and further remediates the process used in the malicious communication.

Online threats are complex. Advanced layers of security technology can help stop them

A firewall is one part of advanced security technology solutions that complement each other to help block online threats like malware, viruses and intrusions. The Norton security technology stack includes six layers of protection, and each layer works in a different way to help protect you from complex online threats:

6 layers of protection to catch malware

Image 5 layers of protection.

Intrusion Prevention Wall

Our Intrusion Prevention System helps protect your browsers and operating systems. If there’s a hole in either one, malicious code might get through. Our Intrusion Prevention System inspects bytes of traffic coming to your device. It blocks almost 60% of attack attempts.

Windows PC, Mac

Antivirus File Scan

Malware writers frequently recycle pieces of code from previous attacks. The antivirus scans the files on your device, looking for known snippets of dangerous code. We immediately add new-found malware code to our global threat intelligence database.

Windows PC, Mac, Android

Reputation Database

Every file you download gets a reputation review. Files from reputable developers, with a recognizable signature, pass through quickly. Never-seen-before files raise a flag, and Norton quarantines them to check for potential threat.

Windows PC

Sonar™ Behavior Monitoring

Malware does things that legitimate software won't, such as access your email contacts or create a communication channel with an IP address in another country. Sonar™ Behavior Monitoring notices suspicious behavior and helps stop the action on your device.

Windows PC

Script Control

Scripts are used to add functionality to documents by automating certain tasks and makes them dynamic and interactive. Scripts can include ActiveX controls, macros, data connections, add-ins, Linked object linking and embedded OLE files, color-theme files, etc. Script Control helps protect you from malware in phishing emails that you receive or download as attachments.

Windows PC

Powerful Erase and Repair

Advanced remediation tools such as Norton Power Eraser and Norton Bootable Recovery Tool seek out and are designed to destroy deep-rooted malware.

Windows PC

The first layer, the Intrusion Prevention Wall, inspects incoming traffic and helps blocks many attack attempts before they even reach devices. The other layers help defend against malware that does get onto a device. The Norton Smart Firewall and Norton Intrusion Prevention System work together at this first level of protection. A great number of online threats get onto computers through the network connection to the internet, and it's here that these technologies work together as part of the first line of defense for your devices.

Norton Smart Firewall + Norton Intrusion Prevention System

Norton Smart Firewall + Norton Intrusion Prevention System, and the other technologies that make up the network-based protection in Norton Device Security work together to help block malicious attacks before they even have a chance to reach your system.

Smart Firewall

Our Smart Firewall helps protect the personal information on your computer from unauthorized access to your personal files and financial information, by monitoring and helping block suspicious network traffic.

Intrusion Prevention System

The Intrusion Prevention System inspects traffic in a much deeper way than the Smart Firewall. Once the Smart Firewall lets permitted traffic in, the Intrusion Prevention System goes to work carefully examining the contents of all that traffic that comes through.

Young man using aptop in the kitchen.

Norton Safe Web feature

Network-level protection: Norton Smart Firewall + Intrusion Prevention System

In Norton technology, the Smart Firewall and Intrusion Prevention System complement each other to detect malware and intrusions from network traffic. Each has a different job, but they complement each other toward the same goal of detecting and helping block malware and intrusions at the network level.

You could compare the jobs of the Smart Firewall and Intrusion Prevention System in network security to the jobs of different security checks at an airport. The first security check at an airport checks passengers' identification and tickets, only allowing permitted passengers to pass through. Similarly, the Smart Firewall allows permitted traffic into a network and blocks unpermitted traffic from entering. At the next layer of airport security, security officers and x-ray machines inspect the baggage of authorized passengers who have already passed through the first layer of security. Likewise, the role of Intrusion Prevention System in network-based protection is to carefully examine the traffic that the Smart Firewall has allowed to enter in.

Many cyberthreats are caught at the network level, and for advanced malware that may sneak past, the other layers of Norton Device Security technology go to work detecting, quarantining and removing threats from your computer.

Image macbook Smart Firewall.
Screen is simulated and subject to change
Norton Smart Firewall + Norton Intrusion Prevention System

The Smart Firewall acts like a traffic cop, monitoring incoming and outgoing internet traffic to help prevent cyberthreats from reaching your computer. Complementing each other, the Smart Firewall and Intrusion Prevention System:

  • Help block unauthorized users from accessing your computers through the internet.
  • Create a shield that either allows or blocks attempts to access the information on your computer.
  • Warn you of connection attempts from other computers.
  • Warn you of connection attempts by the applications on your computer that connect to other computers.
  • Help block your data (passwords, keystrokes, files, tax returns etc.) from being taken by an outside source.

Smart Firewall is included in Norton 360

Frequently asked questions

What is a firewall?

A firewall is like a gatekeeper for your computer. You want to keep your personal information in and keep cybercriminals’ attacks out. The firewall enforces rules about access to a computer, and the Norton Smart Firewall checks not only what’s coming in, but also what’s going out. If a cybercriminal were to sneak in and try to take your information with them, they could be caught on the way out. The Smart Firewall helps block your data like passwords, keystrokes and files from going out the door. The Norton network layer of protection also includes AI-powered technology that analyzes the network traffic, quarantines anything suspicious, and updates the Smart Firewall when new protection rules come into play. A firewall is one key component of computer security protection.

2 Restrictions apply. Must have an automatically renewing device security subscription with antivirus for the virus removal service. See Norton.com/virus-protection-promise for complete details.

The Norton brand is part of Gen.

Copyright © 2025 Gen Digital Inc. All rights reserved. Gen trademarks or registered trademarks are property of Gen Digital Inc. or its affiliates. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.